Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
WGi85dsMNp.exe

Overview

General Information

Sample name:WGi85dsMNp.exe
renamed because original name is a hash value
Original sample name:5fd6c5f71c6fdda582775fa5822b5ed0af1e5dc9431c06d453752a6bcbbe359a.exe
Analysis ID:1588318
MD5:2275024102505f0997f027c71970750d
SHA1:10a4feb8f216f86caa840ff85ba02c85e00e8665
SHA256:5fd6c5f71c6fdda582775fa5822b5ed0af1e5dc9431c06d453752a6bcbbe359a
Tags:exeGuLoaderuser-adrian__luca
Infos:

Detection

GuLoader
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • WGi85dsMNp.exe (PID: 6996 cmdline: "C:\Users\user\Desktop\WGi85dsMNp.exe" MD5: 2275024102505F0997F027C71970750D)
    • WGi85dsMNp.exe (PID: 4484 cmdline: "C:\Users\user\Desktop\WGi85dsMNp.exe" MD5: 2275024102505F0997F027C71970750D)
      • WerFault.exe (PID: 6284 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 2536 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.1814081610.0000000003349000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2025-01-10T23:57:33.541992+010028032702Potentially Bad Traffic192.168.2.449732142.250.181.238443TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: WGi85dsMNp.exeAvira: detected
    Source: WGi85dsMNp.exeReversingLabs: Detection: 60%
    Source: WGi85dsMNp.exeVirustotal: Detection: 76%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: WGi85dsMNp.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 142.250.181.238:443 -> 192.168.2.4:49732 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 142.250.185.129:443 -> 192.168.2.4:49735 version: TLS 1.2
    Source: WGi85dsMNp.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: WGi85dsMNp.exe, 00000001.00000002.2111599681.0000000035535000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Xml.ni.pdb source: WER137F.tmp.dmp.7.dr
    Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: WGi85dsMNp.exe, 00000001.00000002.2084630438.0000000002898000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.ni.pdbRSDS source: WER137F.tmp.dmp.7.dr
    Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb5 source: WGi85dsMNp.exe, 00000001.00000002.2084630438.000000000283B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: 24UN5%%.pdb source: WGi85dsMNp.exe, 00000001.00000002.2111232358.0000000032B17000.00000004.00000010.00020000.00000000.sdmp
    Source: Binary string: n0C:\Windows\mscorlib.pdb source: WGi85dsMNp.exe, 00000001.00000002.2111232358.0000000032B17000.00000004.00000010.00020000.00000000.sdmp
    Source: Binary string: System.Configuration.ni.pdb source: WER137F.tmp.dmp.7.dr
    Source: Binary string: mscorlib.ni.pdbRSDS source: WER137F.tmp.dmp.7.dr
    Source: Binary string: System.Xml.pdbd source: WER137F.tmp.dmp.7.dr
    Source: Binary string: System.Configuration.pdb source: WER137F.tmp.dmp.7.dr
    Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: WGi85dsMNp.exe, 00000001.00000002.2084630438.0000000002898000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Xml.pdb source: WER137F.tmp.dmp.7.dr
    Source: Binary string: System.pdb source: WER137F.tmp.dmp.7.dr
    Source: Binary string: System.Xml.ni.pdbRSDS# source: WER137F.tmp.dmp.7.dr
    Source: Binary string: Microsoft.VisualBasic.pdb source: WER137F.tmp.dmp.7.dr
    Source: Binary string: System.Core.ni.pdb source: WER137F.tmp.dmp.7.dr
    Source: Binary string: System.Windows.Forms.pdb source: WER137F.tmp.dmp.7.dr
    Source: Binary string: mscorlib.pdb source: WER137F.tmp.dmp.7.dr
    Source: Binary string: mscorlib.ni.pdb source: WER137F.tmp.dmp.7.dr
    Source: Binary string: \??\C:\Users\user\Desktop\WGi85dsMNp.PDB source: WGi85dsMNp.exe, 00000001.00000002.2084630438.0000000002898000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Windows\mscorlib.pdb source: WGi85dsMNp.exe, 00000001.00000002.2084630438.00000000027D8000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Core.pdb source: WER137F.tmp.dmp.7.dr
    Source: Binary string: C:\Users\user\Desktop\WGi85dsMNp.PDB source: WGi85dsMNp.exe, 00000001.00000002.2111232358.0000000032B17000.00000004.00000010.00020000.00000000.sdmp
    Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER137F.tmp.dmp.7.dr
    Source: Binary string: System.ni.pdb source: WER137F.tmp.dmp.7.dr
    Source: Binary string: System.Core.ni.pdbRSDS source: WER137F.tmp.dmp.7.dr
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_0040672B FindFirstFileW,FindClose,0_2_0040672B
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_00405AFA CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405AFA
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_00402868 FindFirstFileW,0_2_00402868
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 1_2_00402868 FindFirstFileW,1_2_00402868
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 1_2_0040672B FindFirstFileW,FindClose,1_2_0040672B
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 1_2_00405AFA CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,1_2_00405AFA
    Source: global trafficTCP traffic: 192.168.2.4:55961 -> 162.159.36.2:53
    Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
    Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
    Source: unknownDNS query: name: checkip.dyndns.org
    Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.4:49732 -> 142.250.181.238:443
    Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1TlOsdPEqqbm9Tz6zptQP3sv7zEQ9o8Yz HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /download?id=1TlOsdPEqqbm9Tz6zptQP3sv7zEQ9o8Yz&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1TlOsdPEqqbm9Tz6zptQP3sv7zEQ9o8Yz HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /download?id=1TlOsdPEqqbm9Tz6zptQP3sv7zEQ9o8Yz&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
    Source: global trafficDNS traffic detected: DNS query: drive.google.com
    Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
    Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
    Source: global trafficDNS traffic detected: DNS query: 206.23.85.13.in-addr.arpa
    Source: WGi85dsMNp.exe, 00000001.00000002.2111294324.0000000032D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
    Source: WGi85dsMNp.exe, 00000001.00000002.2111294324.0000000032D84000.00000004.00000800.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000002.2111294324.0000000032D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
    Source: WGi85dsMNp.exe, 00000001.00000002.2111294324.0000000032D11000.00000004.00000800.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000002.2084630438.00000000027D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
    Source: WGi85dsMNp.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: WGi85dsMNp.exe, 00000001.00000002.2111294324.0000000032D11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net
    Source: WGi85dsMNp.exe, 00000001.00000003.1871463587.0000000002883000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000003.1871779345.0000000002811000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000003.1871759071.0000000002884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
    Source: WGi85dsMNp.exe, 00000001.00000003.1871779345.00000000027FB000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000002.2084630438.00000000027D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
    Source: WGi85dsMNp.exe, 00000001.00000003.1871779345.00000000027FB000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000002.2084630438.00000000027D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/K
    Source: WGi85dsMNp.exe, 00000001.00000003.1871779345.0000000002811000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000002.2084990255.0000000004140000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1TlOsdPEqqbm9Tz6zptQP3sv7zEQ9o8Yz
    Source: WGi85dsMNp.exe, 00000001.00000002.2084630438.0000000002811000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000003.1871779345.0000000002811000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1TlOsdPEqqbm9Tz6zptQP3sv7zEQ9o8Yzf$
    Source: WGi85dsMNp.exe, 00000001.00000002.2084630438.0000000002811000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000003.1871779345.0000000002811000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1TlOsdPEqqbm9Tz6zptQP3sv7zEQ9o8Yzp$
    Source: WGi85dsMNp.exe, 00000001.00000003.1909326770.000000000283E000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000002.2084630438.000000000283B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
    Source: WGi85dsMNp.exe, 00000001.00000003.1909326770.000000000283E000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000003.1871463587.0000000002883000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000002.2084630438.000000000282C000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000003.1871759071.0000000002884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1TlOsdPEqqbm9Tz6zptQP3sv7zEQ9o8Yz&export=download
    Source: WGi85dsMNp.exe, 00000001.00000003.1871779345.0000000002811000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1TlOsdPEqqbm9Tz6zptQP3sv7zEQ9o8Yz&export=download3
    Source: WGi85dsMNp.exe, 00000001.00000003.1871463587.0000000002883000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000003.1871779345.0000000002811000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000003.1871759071.0000000002884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
    Source: WGi85dsMNp.exe, 00000001.00000003.1871463587.0000000002883000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000003.1871779345.000000000282C000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000003.1871779345.0000000002811000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.google.com/translate_a/element.js
    Source: WGi85dsMNp.exe, 00000001.00000003.1871463587.0000000002883000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000003.1871463587.0000000002837000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000003.1871779345.0000000002811000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.googleapis.com/_/translate_http/_/js/;report-uri
    Source: WGi85dsMNp.exe, 00000001.00000003.1871463587.0000000002883000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000003.1871779345.0000000002811000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com/analytics.js
    Source: WGi85dsMNp.exe, 00000001.00000003.1871463587.0000000002883000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000003.1871779345.0000000002811000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000003.1871759071.0000000002884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
    Source: WGi85dsMNp.exe, 00000001.00000003.1871463587.0000000002883000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000003.1871779345.0000000002811000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000003.1871759071.0000000002884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
    Source: WGi85dsMNp.exe, 00000001.00000003.1871463587.0000000002883000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000003.1871779345.0000000002811000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000003.1871759071.0000000002884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
    Source: WGi85dsMNp.exe, 00000001.00000003.1871463587.0000000002883000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000003.1871779345.0000000002811000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000003.1871759071.0000000002884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
    Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
    Source: unknownHTTPS traffic detected: 142.250.181.238:443 -> 192.168.2.4:49732 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 142.250.185.129:443 -> 192.168.2.4:49735 version: TLS 1.2
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_0040558F GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,LdrInitializeThunk,SendMessageW,CreatePopupMenu,LdrInitializeThunk,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040558F
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_004034A5 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A5
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 1_2_004034A5 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,1_2_004034A5
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_00404DCC0_2_00404DCC
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_00406AF20_2_00406AF2
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_6F981B5F0_2_6F981B5F
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 1_2_00404DCC1_2_00404DCC
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 1_2_00406AF21_2_00406AF2
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 1_2_00162DD11_2_00162DD1
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: String function: 00402C41 appears 51 times
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 2536
    Source: WGi85dsMNp.exe, 00000000.00000000.1686496001.0000000000455000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesupraocular tailorizes.exeDVarFileInfo$ vs WGi85dsMNp.exe
    Source: WGi85dsMNp.exe, 00000001.00000000.1808394849.0000000000455000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesupraocular tailorizes.exeDVarFileInfo$ vs WGi85dsMNp.exe
    Source: WGi85dsMNp.exeBinary or memory string: OriginalFilenamesupraocular tailorizes.exeDVarFileInfo$ vs WGi85dsMNp.exe
    Source: WGi85dsMNp.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: classification engineClassification label: mal76.troj.evad.winEXE@4/13@4/3
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_004034A5 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A5
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 1_2_004034A5 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,1_2_004034A5
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_00404850 GetDlgItem,SetWindowTextW,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,LdrInitializeThunk,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404850
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_00402104 LdrInitializeThunk,CoCreateInstance,LdrInitializeThunk,0_2_00402104
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeFile created: C:\Users\user\AppData\Local\IwJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeMutant created: NULL
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4484
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeFile created: C:\Users\user\AppData\Local\Temp\nsvB561.tmpJump to behavior
    Source: WGi85dsMNp.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: WGi85dsMNp.exeReversingLabs: Detection: 60%
    Source: WGi85dsMNp.exeVirustotal: Detection: 76%
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeFile read: C:\Users\user\Desktop\WGi85dsMNp.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\WGi85dsMNp.exe "C:\Users\user\Desktop\WGi85dsMNp.exe"
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess created: C:\Users\user\Desktop\WGi85dsMNp.exe "C:\Users\user\Desktop\WGi85dsMNp.exe"
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 2536
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess created: C:\Users\user\Desktop\WGi85dsMNp.exe "C:\Users\user\Desktop\WGi85dsMNp.exe"Jump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: riched20.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: schannel.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: dpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: rasapi32.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: rasman.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: rtutils.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: dhcpcsvc6.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
    Source: WGi85dsMNp.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: WGi85dsMNp.exe, 00000001.00000002.2111599681.0000000035535000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Xml.ni.pdb source: WER137F.tmp.dmp.7.dr
    Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: WGi85dsMNp.exe, 00000001.00000002.2084630438.0000000002898000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.ni.pdbRSDS source: WER137F.tmp.dmp.7.dr
    Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb5 source: WGi85dsMNp.exe, 00000001.00000002.2084630438.000000000283B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: 24UN5%%.pdb source: WGi85dsMNp.exe, 00000001.00000002.2111232358.0000000032B17000.00000004.00000010.00020000.00000000.sdmp
    Source: Binary string: n0C:\Windows\mscorlib.pdb source: WGi85dsMNp.exe, 00000001.00000002.2111232358.0000000032B17000.00000004.00000010.00020000.00000000.sdmp
    Source: Binary string: System.Configuration.ni.pdb source: WER137F.tmp.dmp.7.dr
    Source: Binary string: mscorlib.ni.pdbRSDS source: WER137F.tmp.dmp.7.dr
    Source: Binary string: System.Xml.pdbd source: WER137F.tmp.dmp.7.dr
    Source: Binary string: System.Configuration.pdb source: WER137F.tmp.dmp.7.dr
    Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: WGi85dsMNp.exe, 00000001.00000002.2084630438.0000000002898000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Xml.pdb source: WER137F.tmp.dmp.7.dr
    Source: Binary string: System.pdb source: WER137F.tmp.dmp.7.dr
    Source: Binary string: System.Xml.ni.pdbRSDS# source: WER137F.tmp.dmp.7.dr
    Source: Binary string: Microsoft.VisualBasic.pdb source: WER137F.tmp.dmp.7.dr
    Source: Binary string: System.Core.ni.pdb source: WER137F.tmp.dmp.7.dr
    Source: Binary string: System.Windows.Forms.pdb source: WER137F.tmp.dmp.7.dr
    Source: Binary string: mscorlib.pdb source: WER137F.tmp.dmp.7.dr
    Source: Binary string: mscorlib.ni.pdb source: WER137F.tmp.dmp.7.dr
    Source: Binary string: \??\C:\Users\user\Desktop\WGi85dsMNp.PDB source: WGi85dsMNp.exe, 00000001.00000002.2084630438.0000000002898000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Windows\mscorlib.pdb source: WGi85dsMNp.exe, 00000001.00000002.2084630438.00000000027D8000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Core.pdb source: WER137F.tmp.dmp.7.dr
    Source: Binary string: C:\Users\user\Desktop\WGi85dsMNp.PDB source: WGi85dsMNp.exe, 00000001.00000002.2111232358.0000000032B17000.00000004.00000010.00020000.00000000.sdmp
    Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER137F.tmp.dmp.7.dr
    Source: Binary string: System.ni.pdb source: WER137F.tmp.dmp.7.dr
    Source: Binary string: System.Core.ni.pdbRSDS source: WER137F.tmp.dmp.7.dr

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.1814081610.0000000003349000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_6F981B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6F981B5F
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeFile created: C:\Users\user\AppData\Local\Temp\nslB6AB.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeAPI/Special instruction interceptor: Address: 3A436CE
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeAPI/Special instruction interceptor: Address: 1EE36CE
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeRDTSC instruction interceptor: First address: 3A0B40B second address: 3A0B40B instructions: 0x00000000 rdtsc 0x00000002 cmp cx, 77B0h 0x00000007 cmp ebx, ecx 0x00000009 jc 00007F01E90EFB2Dh 0x0000000b test eax, 0AF5C948h 0x00000010 inc ebp 0x00000011 test dx, bx 0x00000014 inc ebx 0x00000015 rdtsc
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeRDTSC instruction interceptor: First address: 1EAB40B second address: 1EAB40B instructions: 0x00000000 rdtsc 0x00000002 cmp cx, 77B0h 0x00000007 cmp ebx, ecx 0x00000009 jc 00007F01E84F253Dh 0x0000000b test eax, 0AF5C948h 0x00000010 inc ebp 0x00000011 test dx, bx 0x00000014 inc ebx 0x00000015 rdtsc
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeMemory allocated: 120000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeMemory allocated: 32D10000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeMemory allocated: 32C20000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nslB6AB.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_0040672B FindFirstFileW,FindClose,0_2_0040672B
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_00405AFA CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405AFA
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_00402868 FindFirstFileW,0_2_00402868
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 1_2_00402868 FindFirstFileW,1_2_00402868
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 1_2_0040672B FindFirstFileW,FindClose,1_2_0040672B
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 1_2_00405AFA CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,1_2_00405AFA
    Source: Amcache.hve.7.drBinary or memory string: VMware
    Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: WGi85dsMNp.exe, 00000001.00000003.1871779345.000000000282C000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000002.2084630438.000000000282C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: WGi85dsMNp.exe, 00000001.00000003.1871779345.000000000282C000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000002.2084630438.000000000282C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWai
    Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.7.drBinary or memory string: vmci.sys
    Source: Amcache.hve.7.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
    Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.7.drBinary or memory string: VMware20,1
    Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: WGi85dsMNp.exe, 00000001.00000003.1871779345.00000000027FB000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000002.2084630438.00000000027D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(/
    Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeAPI call chain: ExitProcess graph end nodegraph_0-4591
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeAPI call chain: ExitProcess graph end nodegraph_0-4746
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_00401E49 LdrInitializeThunk,ShowWindow,EnableWindow,0_2_00401E49
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_6F981B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6F981B5F
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeMemory allocated: page read and write | page guardJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess created: C:\Users\user\Desktop\WGi85dsMNp.exe "C:\Users\user\Desktop\WGi85dsMNp.exe"Jump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeQueries volume information: C:\Users\user\Desktop\WGi85dsMNp.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_004034A5 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A5
    Source: C:\Users\user\Desktop\WGi85dsMNp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    1
    Masquerading
    OS Credential Dumping1
    Query Registry
    Remote Services1
    Archive Collected Data
    11
    Encrypted Channel
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
    Process Injection
    1
    Virtualization/Sandbox Evasion
    LSASS Memory211
    Security Software Discovery
    Remote Desktop Protocol1
    Clipboard Data
    1
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    DLL Side-Loading
    1
    Disable or Modify Tools
    Security Account Manager1
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared Drive2
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Access Token Manipulation
    NTDS1
    System Network Configuration Discovery
    Distributed Component Object ModelInput Capture13
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
    Process Injection
    LSA Secrets2
    File and Directory Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    Deobfuscate/Decode Files or Information
    Cached Domain Credentials214
    System Information Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    Obfuscated Files or Information
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    DLL Side-Loading
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    WGi85dsMNp.exe61%ReversingLabsWin32.Trojan.Guloader
    WGi85dsMNp.exe76%VirustotalBrowse
    WGi85dsMNp.exe100%AviraHEUR/AGEN.1337946
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\nslB6AB.tmp\System.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nslB6AB.tmp\System.dll0%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    drive.google.com
    142.250.181.238
    truefalse
      high
      drive.usercontent.google.com
      142.250.185.129
      truefalse
        high
        checkip.dyndns.com
        158.101.44.242
        truefalse
          high
          checkip.dyndns.org
          unknown
          unknownfalse
            high
            206.23.85.13.in-addr.arpa
            unknown
            unknownfalse
              high
              NameMaliciousAntivirus DetectionReputation
              http://checkip.dyndns.org/false
                high
                NameSourceMaliciousAntivirus DetectionReputation
                https://www.google.comWGi85dsMNp.exe, 00000001.00000003.1871463587.0000000002883000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000003.1871779345.0000000002811000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000003.1871759071.0000000002884000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://drive.usercontent.google.com/WGi85dsMNp.exe, 00000001.00000003.1909326770.000000000283E000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000002.2084630438.000000000283B000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://upx.sf.netAmcache.hve.7.drfalse
                      high
                      http://checkip.dyndns.orgWGi85dsMNp.exe, 00000001.00000002.2111294324.0000000032D84000.00000004.00000800.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000002.2111294324.0000000032D91000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://drive.google.com/KWGi85dsMNp.exe, 00000001.00000003.1871779345.00000000027FB000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000002.2084630438.00000000027D8000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://apis.google.comWGi85dsMNp.exe, 00000001.00000003.1871463587.0000000002883000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000003.1871779345.0000000002811000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000003.1871759071.0000000002884000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://checkip.dyndns.comWGi85dsMNp.exe, 00000001.00000002.2111294324.0000000032D91000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://nsis.sf.net/NSIS_ErrorErrorWGi85dsMNp.exefalse
                                high
                                https://translate.google.com/translate_a/element.jsWGi85dsMNp.exe, 00000001.00000003.1871463587.0000000002883000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000003.1871779345.000000000282C000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000003.1871779345.0000000002811000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameWGi85dsMNp.exe, 00000001.00000002.2111294324.0000000032D11000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://drive.google.com/WGi85dsMNp.exe, 00000001.00000003.1871779345.00000000027FB000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000001.00000002.2084630438.00000000027D8000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      142.250.181.238
                                      drive.google.comUnited States
                                      15169GOOGLEUSfalse
                                      142.250.185.129
                                      drive.usercontent.google.comUnited States
                                      15169GOOGLEUSfalse
                                      158.101.44.242
                                      checkip.dyndns.comUnited States
                                      31898ORACLE-BMC-31898USfalse
                                      Joe Sandbox version:42.0.0 Malachite
                                      Analysis ID:1588318
                                      Start date and time:2025-01-10 23:56:22 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 6m 4s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:9
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:WGi85dsMNp.exe
                                      renamed because original name is a hash value
                                      Original Sample Name:5fd6c5f71c6fdda582775fa5822b5ed0af1e5dc9431c06d453752a6bcbbe359a.exe
                                      Detection:MAL
                                      Classification:mal76.troj.evad.winEXE@4/13@4/3
                                      EGA Information:
                                      • Successful, ratio: 50%
                                      HCA Information:
                                      • Successful, ratio: 91%
                                      • Number of executed functions: 61
                                      • Number of non-executed functions: 73
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                      • Excluded IPs from analysis (whitelisted): 52.168.117.173, 172.202.163.200, 40.126.32.74, 13.85.23.206, 13.107.246.44
                                      • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                      • Execution Graph export aborted for target WGi85dsMNp.exe, PID 4484 because it is empty
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                      • Report size getting too big, too many NtSetInformationFile calls found.
                                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                      TimeTypeDescription
                                      17:57:53API Interceptor1x Sleep call for process: WerFault.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      158.101.44.2423i1gMM8K4z.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                      • checkip.dyndns.org/
                                      vnV17JImCH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • checkip.dyndns.org/
                                      PK5pHX4Gu5.exeGet hashmaliciousMassLogger RATBrowse
                                      • checkip.dyndns.org/
                                      b5BQbAhwVD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                      • checkip.dyndns.org/
                                      SABXJ1B5c8.exeGet hashmaliciousMassLogger RATBrowse
                                      • checkip.dyndns.org/
                                      4UQ5wnI389.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                      • checkip.dyndns.org/
                                      jxy62Zm6c4.exeGet hashmaliciousMassLogger RATBrowse
                                      • checkip.dyndns.org/
                                      MzqLQjCwrw.exeGet hashmaliciousMassLogger RATBrowse
                                      • checkip.dyndns.org/
                                      RmIYOfX0yO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                      • checkip.dyndns.org/
                                      2V7usxd7Vc.exeGet hashmaliciousMassLogger RATBrowse
                                      • checkip.dyndns.org/
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      checkip.dyndns.com3i1gMM8K4z.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                      • 158.101.44.242
                                      2NJzy3tiny.exeGet hashmaliciousMassLogger RATBrowse
                                      • 193.122.6.168
                                      z87sammylastborn.exeGet hashmaliciousMassLogger RATBrowse
                                      • 132.226.247.73
                                      vnV17JImCH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 158.101.44.242
                                      czHx16QwGQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                      • 193.122.6.168
                                      Ddj3E3qerh.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 132.226.247.73
                                      6cicUo3f8g.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 132.226.247.73
                                      PK5pHX4Gu5.exeGet hashmaliciousMassLogger RATBrowse
                                      • 158.101.44.242
                                      7b4Iaf58Rp.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                      • 132.226.8.169
                                      C5JLkBS1CX.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                      • 193.122.130.0
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      ORACLE-BMC-31898US3i1gMM8K4z.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                      • 158.101.44.242
                                      2NJzy3tiny.exeGet hashmaliciousMassLogger RATBrowse
                                      • 193.122.6.168
                                      vnV17JImCH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 158.101.44.242
                                      czHx16QwGQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                      • 193.122.6.168
                                      PK5pHX4Gu5.exeGet hashmaliciousMassLogger RATBrowse
                                      • 158.101.44.242
                                      C5JLkBS1CX.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                      • 193.122.130.0
                                      Yef4EqsQha.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 193.122.6.168
                                      b5BQbAhwVD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                      • 158.101.44.242
                                      VQsnGWaNi5.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 193.122.130.0
                                      lsc5QN46NH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 193.122.130.0
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      37f463bf4616ecd445d4a1937da06e19WtZl31OLfA.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                      • 142.250.181.238
                                      • 142.250.185.129
                                      czHx16QwGQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                      • 142.250.181.238
                                      • 142.250.185.129
                                      Setup.exeGet hashmaliciousUnknownBrowse
                                      • 142.250.181.238
                                      • 142.250.185.129
                                      rXKfKM0T49.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                      • 142.250.181.238
                                      • 142.250.185.129
                                      4Vx2rUlb0f.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                      • 142.250.181.238
                                      • 142.250.185.129
                                      b5BQbAhwVD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                      • 142.250.181.238
                                      • 142.250.185.129
                                      9Yn5tjyOgT.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                      • 142.250.181.238
                                      • 142.250.185.129
                                      6ZoBPR3isG.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                      • 142.250.181.238
                                      • 142.250.185.129
                                      V7OHj6ISEo.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                      • 142.250.181.238
                                      • 142.250.185.129
                                      2CQ2zMn0hb.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                      • 142.250.181.238
                                      • 142.250.185.129
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      C:\Users\user\AppData\Local\Temp\nslB6AB.tmp\System.dllczHx16QwGQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                        rXKfKM0T49.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          b5BQbAhwVD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                            9Yn5tjyOgT.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                              6ZoBPR3isG.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                V7OHj6ISEo.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                  2CQ2zMn0hb.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                    6mGpn6kupm.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      v4nrZtP7K2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                        xXUnP7uCBJ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):65536
                                                          Entropy (8bit):1.2246600705706754
                                                          Encrypted:false
                                                          SSDEEP:192:Oo1glbNT0BU/ojYm9rvGmKzuiF3Z24IO8QzJ:f1glbNABU/ojfGmKzuiF3Y4IO8Q
                                                          MD5:7947943E56EF461E72F46DB72A76314E
                                                          SHA1:DC8CE7F9C924327778689C2CE04D7E22ABE9CD66
                                                          SHA-256:C10EADAE99D3866549F04D1056CEBA9D271ECEC8EDB928D2A31FF48732714975
                                                          SHA-512:85098409ADFC632E1546A201AE6540585F6CCC9C1D67B6DCDAEF85DE62E2DC812D1F41F22008FD2F70D02811D0F541591DE587376A7A9D2DC44EB71EE8E15DBC
                                                          Malicious:true
                                                          Reputation:low
                                                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.0.2.3.4.5.8.3.2.5.4.9.2.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.1.0.2.3.4.5.9.3.8.7.9.8.4.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.5.9.1.b.6.1.6.-.f.0.7.d.-.4.c.6.7.-.8.1.1.d.-.b.8.8.e.8.1.3.c.f.2.d.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.b.4.d.6.5.5.9.-.b.7.8.1.-.4.1.e.1.-.8.9.6.0.-.1.0.1.d.5.0.4.1.b.0.d.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.W.G.i.8.5.d.s.M.N.p...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.s.u.p.r.a.o.c.u.l.a.r. .t.a.i.l.o.r.i.z.e.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.1.8.4.-.0.0.0.1.-.0.0.1.4.-.c.e.5.1.-.8.8.0.4.b.3.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.1.4.3.8.b.6.9.0.7.f.0.4.1.4.7.8.0.8.2.7.1.5.6.5.d.5.7.4.d.8.4.a.0.0.0.0.0.9.0.4.!.0.0.0.0.1.0.a.4.f.e.b.8.f.2.1.6.f.8.6.c.a.a.8.4.0.
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:Mini DuMP crash report, 14 streams, Fri Jan 10 22:57:39 2025, 0x1205a4 type
                                                          Category:dropped
                                                          Size (bytes):280614
                                                          Entropy (8bit):3.7736619096552095
                                                          Encrypted:false
                                                          SSDEEP:3072:M/hFA61YEc4uEquymLTg4StHg9UwI5KASqAR3:ShFR1YEc4nykTg4StAKA
                                                          MD5:A4BB53433908B277D92CA4EE295F5569
                                                          SHA1:988B8E3E4911E131D13C3F631A57757309AFA957
                                                          SHA-256:9B5E8A63CFAD89FA22225C6DC6846B15D98DE9B2BA4A9F8187EC012C6ACEA3AF
                                                          SHA-512:95202073C3A136FE496F4907F1A94D65059368A0E2B930EA1120A4D1D2AC93AA0F8B641CBAFE12DCA7573A6AD958B0B110E77B8C3823CA147B8551DA16681700
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:MDMP..a..... ........g............t............"..|........%..._..........T.......8...........T...........Hc...............,..........................................................................................eJ..............GenuineIntel............T.............g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):6336
                                                          Entropy (8bit):3.7280474137528365
                                                          Encrypted:false
                                                          SSDEEP:192:R6l7wVeJVi6IOpIYf40Sprr89bfNsfMVm:R6lXJA6I+IYf407fGfj
                                                          MD5:D5C72977A55D83ABDA3C166AA2F6D3A7
                                                          SHA1:7D2423D47EA9F036F7A1E9D33A6A226B4DDD15D5
                                                          SHA-256:B5DCD4B8002C4487D1A54A498C7C7C95237204425074370B1D0AA1CF42E3BF90
                                                          SHA-512:39735A8918A356AA4D959FC7B8011220A21F0F031D63EDA602A7724A62CCE616B7BB15CBD099CB30C27242513C8ABC8684A1475F7730AD4B35CA4CE63FCE4ECC
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.4.8.4.<./.P.i.
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):4672
                                                          Entropy (8bit):4.49489118851658
                                                          Encrypted:false
                                                          SSDEEP:48:cvIwWl8zs3wuJg77aI9kKwVrWpW8VY/yYm8M4JPjFNn+q8tli+NDXd:uIjfXI7Xj7Vm7Jn0i+NDXd
                                                          MD5:E0AFA4023296BCBAEEA04BEF0121DBF1
                                                          SHA1:7EDFEE54A819E91AF82DA1053E1D899423ACFA81
                                                          SHA-256:14AE194ED68207ABDA9BD15FCBFAFD6BA81A20A36909DCFE7A5EE6A0E49D723D
                                                          SHA-512:E6954E313F620A4398478D5D50A3E64C441B4F38FCF520C36A18EDCF7AC2301DD70F9DF575484D7A4143C7AF72677577E76378777F51344F7AF72DFF0E394264
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="670440" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                          Process:C:\Users\user\Desktop\WGi85dsMNp.exe
                                                          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 2560x2560, components 3
                                                          Category:dropped
                                                          Size (bytes):484658
                                                          Entropy (8bit):7.809711763657168
                                                          Encrypted:false
                                                          SSDEEP:12288:W1S3xo63wl4biprI2S4WwWEcwxg9dvVAxZOCLF0DB:Wo3xX3y4bz2lWwWo6rSTZyd
                                                          MD5:5C727AE28F0DECF497FBB092BAE01B4E
                                                          SHA1:AADE364AE8C2C91C6F59F85711B53078FB0763B7
                                                          SHA-256:77CCACF58330509839E17A6CFD6B17FE3DE31577D8E2C37DC413839BA2FEEC80
                                                          SHA-512:5246C0FBA41DF66AF89D986A3CEABC99B61DB9E9C217B28B2EC18AF31E3ED17C865387223CEB3A38A804243CF3307E07E557549026F49F52829BEBC4D4546C40
                                                          Malicious:false
                                                          Reputation:moderate, very likely benign file
                                                          Preview:......JFIF.....,.,.....]http://ns.adobe.com/xap/1.0/.<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 7.2-c000 79.566ebc5, 2022/05/09-07:22:29 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:tiff="http://ns.adobe.com/tiff/1.0/" xmlns:exif="http://ns.adobe.com/exif/1.0/" xmp:CreatorTool="Adobe Photoshop CC 2018 (Windows)" xmp:CreateDate="2018-04-27T15:00:27+08:00" xmp:ModifyDate="2022-09-22T14:01:54+08:00" xmp:MetadataDate="2022-09-22T14:01:54+08:00" dc:format="image/png" photoshop:ColorMode="3" xmpMM:InstanceID="xmp.iid:b728d5c8-8822-6d4c-afc1-a393cb2a04ec"
                                                          Process:C:\Users\user\Desktop\WGi85dsMNp.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):265451
                                                          Entropy (8bit):7.782402940724189
                                                          Encrypted:false
                                                          SSDEEP:3072:MfD0sueIxWjINar/W+7HQEr2h68AS/58b3Pxlo4th+1rpu+MHr+yOvAYYR36Dbs:uTyD+7wEyzizP/o6hCtMHr+D/YR3b
                                                          MD5:0086A4711D718152A54D75819B459A34
                                                          SHA1:E2DC6C0ABE6C7F59801B94B5BA3337597FFC8D69
                                                          SHA-256:746807F1588B3611FF5B28451BDFDB07FAE73CD2F0D5502C44D7A9D0C8667C0F
                                                          SHA-512:166D1A46B2A96E6B9183265CB01893EBB45CE65B35625F3EA71BC9918BCE2BBE19277231E5112E5B06A038375FA1B6F6D2E1564FBEC93269F11C57DCB7A04417
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:......................!.////..=..........|..........xxx......K..II......................r........^^...........................m..................?...................nn........A.%%%..AA.....33..\\\\\...p.CCC...........................7...F...6....3333....|..........88...... ..8.............................<<...............,,....e../..0..y......~~.....................................r..-...xxx.........4..............NNNNN...HH.||.....-..........q...............................................u...ff..7..>.....VV...............`..........77........gggggggg.AA....................ooooo.M......ss.X.9..........N........KK.QQ............*...III................[[...........|................................m.........\..........,..................".mm.EE.......rr....7.............||.......OO..............//.....qq...........ll....l..l.......W............ .............]]]]]]......................DDDDDDDDD...........6.wwwww..KK.................P...................]]..```````......hhh...........a.A
                                                          Process:C:\Users\user\Desktop\WGi85dsMNp.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):112291
                                                          Entropy (8bit):1.249420131631438
                                                          Encrypted:false
                                                          SSDEEP:768:5R+BCpkJWjYWL2MxTVLvUjpGqik9JiAfWA2DBQwD1PzUH+HYZmIo7x31sT:WCZY21w0I2NZYD
                                                          MD5:4D1D72CFC5940B09DFBD7B65916F532E
                                                          SHA1:30A45798B534842002B103A36A3B907063F8A96C
                                                          SHA-256:479F1904096978F1011DF05D52021FAEEE028D4CF331024C965CED8AF1C8D496
                                                          SHA-512:048844A09E291903450188715BCDDF14F0F1F10BEAFBD005882EBF5D5E31A71D8F93EEBE788BD54B4AED2266C454F4DCA18AF4567977B7E773BBE29A38DEA45B
                                                          Malicious:false
                                                          Preview:..........P............+......................................................................................................................X......n..(................G...................................m.........|.......................U.............`............l..............@}.........a........................................s............y.................N...............B...............w.e..........................................Q......*...................................................................................................a...........................f..................p..................t...........................................9.Q................@....................e................................................................:..............P.......S.........................P........................9..............._.......................(...............N............................................................H.T..........c..............................
                                                          Process:C:\Users\user\Desktop\WGi85dsMNp.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):362089
                                                          Entropy (8bit):1.23992084267325
                                                          Encrypted:false
                                                          SSDEEP:768:xOeaameETrlE0+1mGOWb3h5WAV0hW+JSLSwzj2HlSdL0f6mhKZRaqOzWz6szt3cA:x+ds5dYOVxIW3hhdeRt6MeZ1W4vB
                                                          MD5:A4340182CDDD2EC1F1480360218343F9
                                                          SHA1:50EF929FEA713AA6FCC05E8B75F497B7946B285B
                                                          SHA-256:B91E5B1FF5756F0B93DCF11CBC8B467CDA0C5792DE24D27EC86E7C74388B44B3
                                                          SHA-512:021F198AFF7CCED92912C74FC97D1919A9E059F22E99AB1236FBAA36C16B520C07B78F47FC01FCFAC1B53A87CDAE3E440D0589FA2844612617FAB2EDB64A3573
                                                          Malicious:false
                                                          Preview:..........F.............................i.....................B.........................................b..Et.............................O...........h...............................................................................8..........n.....................w.................../.......|.......'........,..........(...........................W......#..................................................................................................=..........................]..........q................................................[.................2....S............................"...................................$!..............................=.......................................[f.................................................................................................................V.............................w...................................................$.............................................................j...........h.............J..............
                                                          Process:C:\Users\user\Desktop\WGi85dsMNp.exe
                                                          File Type:FoxPro FPT, blocks size 22, next free block index 285212672, field type 0
                                                          Category:dropped
                                                          Size (bytes):139354
                                                          Entropy (8bit):1.2473328695625903
                                                          Encrypted:false
                                                          SSDEEP:768:9OsMSh8lSnJGyUzWZsO2ipzPFmDZC9kpzroto48tf2+5lVp:9delFlqNawgJp
                                                          MD5:B0FB6B583D6902DE58E1202D12BA4832
                                                          SHA1:7F585B5C3A4581CE76E373C78A6513F157B20480
                                                          SHA-256:E6EA5F6D0C7F5FA407269C7F4FF6D97149B7611071BF5BF6C454B810501AE661
                                                          SHA-512:E0894FFBD76C3476DC083DAFD24F88964BF6E09E4CA955766B43FE73A764A00247C930E9996652A22B57B27826CD94F88B8178514060CA398DE568675F9E4571
                                                          Malicious:false
                                                          Preview:.......................................|...................................................................+................$......&....A........................................................Z.....................................A...............!.....Y........................l..........9..................c.............f.................F...".................................................h.......................................\..............J............................5......t.....E.................q........................:......^....................................................................................I..........................................................x......W....................................................................................M...........................X..............................,..................m.......................................................................................................................J........ ...F...........
                                                          Process:C:\Users\user\Desktop\WGi85dsMNp.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):29109
                                                          Entropy (8bit):4.571452088399361
                                                          Encrypted:false
                                                          SSDEEP:384:NAaDWUweT7xl/UzbAZX2iGjoGdjtjc0bItS4GDyIEN3+nMTrXAw2KvZ6YHx8KM/Z:NT1zMsGiGLK0bItS12lrnxHx8K0ku
                                                          MD5:88F751E865173E78E89A78BAE34FD3D3
                                                          SHA1:67825D4FBC5C0B462DAD04668080272D0E20D31B
                                                          SHA-256:CD32E850C8641C3C2CB2AB071F82651261E4B08B26C045DE2964C2C099793866
                                                          SHA-512:73445E8D885AFB4DF8D2169304035845D92DF4D0B053BBF3B9894D5E7E732AC8378EEAE215B8F0AFE22823823389091377FA0EC3895304B280A8C29589D59BAB
                                                          Malicious:false
                                                          Preview:.........vvvvv..SS..........................$$................66.................(...F............................88.!!!.........M.....................................ppp.'......,.j....B.........H.......................HH...._..........V......=...>........___.D.......888.m.ee.....uu......+....$..&&.....I...........ff.,......P.....22...............@@....////.uuu....V...ppppp.VV.oo.....}}}}}.EEE.d...>>>>..~~.S..................KKK.xx.......zz........Z.66......_...........V...M.....ii......#.........!!!!!!!!!.bbb....................?.)....xxx.EE......................................................s.....(((...............................U...................................www....44..........PP..........III.......YY.......BB.....................OO....................DDD....===.....}}......i........................................A......................??..................i.......EE..............Q.....R......o...bb..............|||..........................................n..N.h.........i..
                                                          Process:C:\Users\user\Desktop\WGi85dsMNp.exe
                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):12288
                                                          Entropy (8bit):5.719859767584478
                                                          Encrypted:false
                                                          SSDEEP:192:1enY0LWelt70elWjvfstJcVtwtYbjnIOg5AaDnbC7ypXhtIj:18PJlt70esj0Mt9vn6ay6
                                                          MD5:0D7AD4F45DC6F5AA87F606D0331C6901
                                                          SHA1:48DF0911F0484CBE2A8CDD5362140B63C41EE457
                                                          SHA-256:3EB38AE99653A7DBC724132EE240F6E5C4AF4BFE7C01D31D23FAF373F9F2EACA
                                                          SHA-512:C07DE7308CB54205E8BD703001A7FE4FD7796C9AC1B4BB330C77C872BF712B093645F40B80CE7127531FE6746A5B66E18EA073AB6A644934ABED9BB64126FEA9
                                                          Malicious:false
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                          Joe Sandbox View:
                                                          • Filename: czHx16QwGQ.exe, Detection: malicious, Browse
                                                          • Filename: rXKfKM0T49.exe, Detection: malicious, Browse
                                                          • Filename: b5BQbAhwVD.exe, Detection: malicious, Browse
                                                          • Filename: 9Yn5tjyOgT.exe, Detection: malicious, Browse
                                                          • Filename: 6ZoBPR3isG.exe, Detection: malicious, Browse
                                                          • Filename: V7OHj6ISEo.exe, Detection: malicious, Browse
                                                          • Filename: 2CQ2zMn0hb.exe, Detection: malicious, Browse
                                                          • Filename: 6mGpn6kupm.exe, Detection: malicious, Browse
                                                          • Filename: v4nrZtP7K2.exe, Detection: malicious, Browse
                                                          • Filename: xXUnP7uCBJ.exe, Detection: malicious, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L....~.\...........!....."...........).......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\WGi85dsMNp.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):1419231
                                                          Entropy (8bit):5.474882951664024
                                                          Encrypted:false
                                                          SSDEEP:12288:DTyD+pL/bfcgq1S3xo63wl4biprI2S4WwWEcwxg9dvVAxZOCLF0DQZ2:/yD0L/bfEo3xX3y4bz2lWwWo6rSTZy/
                                                          MD5:F7D9F967CA2F71E3D562937FCB24C382
                                                          SHA1:C16A775DD27444712E51E969C48B92A59BC30A42
                                                          SHA-256:FC404818413612BDF92C72AB1F5EB9CC32D86D9D30D127C4D4E0114D70620B45
                                                          SHA-512:9B448617B9A58A5F43B87165EE37BD36D2FEFEEA025E8173C00E33BCA4C0B0B0C66C765281FABEAC0857FEC2073940E021E4D0256144555DF784E91DF4A54073
                                                          Malicious:false
                                                          Preview:.6......,.......,.......\........!......:5......86..........................M...i............................H..............................................................................................................................................................................G...J...............h...............................................................g...............................................................j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:MS Windows registry file, NT/2000 or above
                                                          Category:dropped
                                                          Size (bytes):1835008
                                                          Entropy (8bit):4.465602717972394
                                                          Encrypted:false
                                                          SSDEEP:6144:pIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uN/dwBCswSbG:aXD94+WlLZMM6YFHx+G
                                                          MD5:D766A8700652B025795050B1DF9D2BAB
                                                          SHA1:2EF89DC37575F2D4EB38253089955B52342EE554
                                                          SHA-256:0BF85789EDEB4D2C20401D06F1365F48D48C10AE478509C7C6C87FC5E8334BC2
                                                          SHA-512:E079ADC975643B559CB8D1EA4675EB9869C365DACFAF97B8F827C03FB1356109AA02224285FCD127EC38B7790D02B94C8946047272A16CB1B34BC36A741B3AF2
                                                          Malicious:false
                                                          Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmj....c...............................................................................................................................................................................................................................................................................................................................................z.?........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                          Entropy (8bit):7.957075213429238
                                                          TrID:
                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                          • DOS Executable Generic (2002/1) 0.02%
                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                          File name:WGi85dsMNp.exe
                                                          File size:979'348 bytes
                                                          MD5:2275024102505f0997f027c71970750d
                                                          SHA1:10a4feb8f216f86caa840ff85ba02c85e00e8665
                                                          SHA256:5fd6c5f71c6fdda582775fa5822b5ed0af1e5dc9431c06d453752a6bcbbe359a
                                                          SHA512:1ebf7e71b121a3102d2de3c756761fe7e2efae90b2561912886da7d8a43fe9fcf29322d5f239cd21614847d9ec3c519b2d2a1213252cf3e1ee5dc622d4e24182
                                                          SSDEEP:24576:9jwKCNRVJ13mzBqtejjs3RgG9vWciasTKafa0aULP:V1CLFyqtukfiaJaCUP
                                                          TLSH:C725234A5772CCA7D8164871962BCCA7B6B57E0238946ED353C0AB0F3CB131B4D29F99
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L...$..\.................f...*.....
                                                          Icon Hash:46224e4c19391d03
                                                          Entrypoint:0x4034a5
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x5C157F24 [Sat Dec 15 22:24:36 2018 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:1f23f452093b5c1ff091a2f9fb4fa3e9
                                                          Instruction
                                                          sub esp, 000002D4h
                                                          push ebx
                                                          push esi
                                                          push edi
                                                          push 00000020h
                                                          pop edi
                                                          xor ebx, ebx
                                                          push 00008001h
                                                          mov dword ptr [esp+14h], ebx
                                                          mov dword ptr [esp+10h], 0040A230h
                                                          mov dword ptr [esp+1Ch], ebx
                                                          call dword ptr [004080ACh]
                                                          call dword ptr [004080A8h]
                                                          and eax, BFFFFFFFh
                                                          cmp ax, 00000006h
                                                          mov dword ptr [0042A24Ch], eax
                                                          je 00007F01E8C03C33h
                                                          push ebx
                                                          call 00007F01E8C06EFDh
                                                          cmp eax, ebx
                                                          je 00007F01E8C03C29h
                                                          push 00000C00h
                                                          call eax
                                                          mov esi, 004082B0h
                                                          push esi
                                                          call 00007F01E8C06E77h
                                                          push esi
                                                          call dword ptr [00408150h]
                                                          lea esi, dword ptr [esi+eax+01h]
                                                          cmp byte ptr [esi], 00000000h
                                                          jne 00007F01E8C03C0Ch
                                                          push 0000000Ah
                                                          call 00007F01E8C06ED0h
                                                          push 00000008h
                                                          call 00007F01E8C06EC9h
                                                          push 00000006h
                                                          mov dword ptr [0042A244h], eax
                                                          call 00007F01E8C06EBDh
                                                          cmp eax, ebx
                                                          je 00007F01E8C03C31h
                                                          push 0000001Eh
                                                          call eax
                                                          test eax, eax
                                                          je 00007F01E8C03C29h
                                                          or byte ptr [0042A24Fh], 00000040h
                                                          push ebp
                                                          call dword ptr [00408044h]
                                                          push ebx
                                                          call dword ptr [004082A0h]
                                                          mov dword ptr [0042A318h], eax
                                                          push ebx
                                                          lea eax, dword ptr [esp+34h]
                                                          push 000002B4h
                                                          push eax
                                                          push ebx
                                                          push 004216E8h
                                                          call dword ptr [00408188h]
                                                          push 0040A384h
                                                          Programming Language:
                                                          • [EXP] VC++ 6.0 SP5 build 8804
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x550000x21068.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x10000x64090x6600bfe2b726d49cbd922b87bad5eea65e61False0.6540287990196079data6.416186322230332IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rdata0x80000x13960x1400d45dcba8ca646543f7e339e20089687eFalse0.45234375data5.154907432640367IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .data0xa0000x203580x6008575fc5e872ca789611c386779287649False0.5026041666666666data4.004402321344153IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .ndata0x2b0000x2a0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .rsrc0x550000x210680x2120003ed2ed76ba15352dac9e48819696134False0.8714696344339623data7.556190648348207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          RT_BITMAP0x554c00x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States0.23623853211009174
                                                          RT_ICON0x558280xc2a3PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9966684729162903
                                                          RT_ICON0x61ad00x86e0PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.990210843373494
                                                          RT_ICON0x6a1b00x5085PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9867559307233299
                                                          RT_ICON0x6f2380x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.4358921161825726
                                                          RT_ICON0x717e00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.4896810506566604
                                                          RT_ICON0x728880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.5367803837953091
                                                          RT_ICON0x737300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.6913357400722022
                                                          RT_ICON0x73fd80x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.38597560975609757
                                                          RT_ICON0x746400x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.4934971098265896
                                                          RT_ICON0x74ba80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.651595744680851
                                                          RT_ICON0x750100x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.46908602150537637
                                                          RT_ICON0x752f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.5472972972972973
                                                          RT_DIALOG0x754200x120dataEnglishUnited States0.53125
                                                          RT_DIALOG0x755400x118dataEnglishUnited States0.5678571428571428
                                                          RT_DIALOG0x756580x120dataEnglishUnited States0.5104166666666666
                                                          RT_DIALOG0x757780xf8dataEnglishUnited States0.6330645161290323
                                                          RT_DIALOG0x758700xa0dataEnglishUnited States0.6125
                                                          RT_DIALOG0x759100x60dataEnglishUnited States0.7291666666666666
                                                          RT_GROUP_ICON0x759700xaedataEnglishUnited States0.6091954022988506
                                                          RT_VERSION0x75a200x308dataEnglishUnited States0.47036082474226804
                                                          RT_MANIFEST0x75d280x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                          DLLImport
                                                          KERNEL32.dllExitProcess, SetFileAttributesW, Sleep, GetTickCount, CreateFileW, GetFileSize, GetModuleFileNameW, GetCurrentProcess, SetCurrentDirectoryW, GetFileAttributesW, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, CopyFileW, GetShortPathNameW, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalUnlock, GetDiskFreeSpaceW, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                                          USER32.dllGetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage
                                                          GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                          SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW
                                                          ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                          COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                          ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                          Language of compilation systemCountry where language is spokenMap
                                                          EnglishUnited States
                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                          2025-01-10T23:57:33.541992+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.449732142.250.181.238443TCP
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Jan 10, 2025 23:57:32.421971083 CET49732443192.168.2.4142.250.181.238
                                                          Jan 10, 2025 23:57:32.422020912 CET44349732142.250.181.238192.168.2.4
                                                          Jan 10, 2025 23:57:32.422091007 CET49732443192.168.2.4142.250.181.238
                                                          Jan 10, 2025 23:57:32.503108025 CET49732443192.168.2.4142.250.181.238
                                                          Jan 10, 2025 23:57:32.503149986 CET44349732142.250.181.238192.168.2.4
                                                          Jan 10, 2025 23:57:33.165333986 CET44349732142.250.181.238192.168.2.4
                                                          Jan 10, 2025 23:57:33.165416956 CET49732443192.168.2.4142.250.181.238
                                                          Jan 10, 2025 23:57:33.166425943 CET44349732142.250.181.238192.168.2.4
                                                          Jan 10, 2025 23:57:33.166479111 CET49732443192.168.2.4142.250.181.238
                                                          Jan 10, 2025 23:57:33.233925104 CET49732443192.168.2.4142.250.181.238
                                                          Jan 10, 2025 23:57:33.233999968 CET44349732142.250.181.238192.168.2.4
                                                          Jan 10, 2025 23:57:33.234347105 CET44349732142.250.181.238192.168.2.4
                                                          Jan 10, 2025 23:57:33.234415054 CET49732443192.168.2.4142.250.181.238
                                                          Jan 10, 2025 23:57:33.244590044 CET49732443192.168.2.4142.250.181.238
                                                          Jan 10, 2025 23:57:33.291326046 CET44349732142.250.181.238192.168.2.4
                                                          Jan 10, 2025 23:57:33.542035103 CET44349732142.250.181.238192.168.2.4
                                                          Jan 10, 2025 23:57:33.542298079 CET49732443192.168.2.4142.250.181.238
                                                          Jan 10, 2025 23:57:33.542330980 CET44349732142.250.181.238192.168.2.4
                                                          Jan 10, 2025 23:57:33.542433023 CET49732443192.168.2.4142.250.181.238
                                                          Jan 10, 2025 23:57:33.542510986 CET49732443192.168.2.4142.250.181.238
                                                          Jan 10, 2025 23:57:33.542587042 CET44349732142.250.181.238192.168.2.4
                                                          Jan 10, 2025 23:57:33.542861938 CET49732443192.168.2.4142.250.181.238
                                                          Jan 10, 2025 23:57:33.597362041 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:33.597414017 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:33.597518921 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:33.597976923 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:33.597999096 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:34.232547998 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:34.232757092 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:34.246968031 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:34.247004986 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:34.247380972 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:34.247494936 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:34.247837067 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:34.291343927 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.084683895 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.084777117 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.090589046 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.090667009 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.103182077 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.103270054 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.103285074 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.103409052 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.109471083 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.109548092 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.171766996 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.171844006 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.171869040 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.171921968 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.171960115 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.171986103 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.174102068 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.174170971 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.174196959 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.174321890 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.197053909 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.197134972 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.197150946 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.197191954 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.197242975 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.197259903 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.197359085 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.197408915 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.197427988 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.197484016 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.199304104 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.199390888 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.199402094 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.199582100 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.206037998 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.206104994 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.206140041 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.206248045 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.211906910 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.212146044 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.212157011 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.212349892 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.217760086 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.218755007 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.218761921 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.218817949 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.223445892 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.223932981 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.223937988 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.224131107 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.229268074 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.229509115 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.229515076 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.229562998 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.235059023 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.235907078 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.239411116 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.239478111 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.240895987 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.242108107 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.258084059 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.258156061 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.258178949 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.258238077 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.258269072 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.258301020 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.258316994 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.258358002 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.258449078 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.260423899 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.260476112 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.260807991 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.260870934 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.266160965 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.266221046 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.266233921 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.266292095 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.266302109 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.266422033 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.271857023 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.271900892 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.271996975 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.272049904 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.276983023 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.277036905 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.277051926 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.277113914 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.281975031 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.282032967 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.282046080 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.282110929 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.286879063 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.286955118 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.286997080 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.287054062 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.291574955 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.291903973 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.291920900 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.293471098 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.296360016 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.296518087 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.296533108 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.297197104 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.301065922 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.301136017 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.301151991 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.301248074 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.305794001 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.305860996 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.305877924 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.305952072 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.310332060 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.310410976 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.310429096 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.311927080 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.314984083 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.315917969 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.315937996 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.316957951 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.319395065 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.319461107 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.319477081 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.319535971 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.323529959 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.323584080 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.323599100 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.323649883 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.323659897 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.323724031 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.323724985 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.323777914 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.323817968 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.323858023 CET44349735142.250.185.129192.168.2.4
                                                          Jan 10, 2025 23:57:37.323882103 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:37.324058056 CET49735443192.168.2.4142.250.185.129
                                                          Jan 10, 2025 23:57:38.072413921 CET4973880192.168.2.4158.101.44.242
                                                          Jan 10, 2025 23:57:38.077256918 CET8049738158.101.44.242192.168.2.4
                                                          Jan 10, 2025 23:57:38.077342987 CET4973880192.168.2.4158.101.44.242
                                                          Jan 10, 2025 23:57:38.077563047 CET4973880192.168.2.4158.101.44.242
                                                          Jan 10, 2025 23:57:38.082355976 CET8049738158.101.44.242192.168.2.4
                                                          Jan 10, 2025 23:57:38.639904022 CET8049738158.101.44.242192.168.2.4
                                                          Jan 10, 2025 23:57:38.694974899 CET4973880192.168.2.4158.101.44.242
                                                          Jan 10, 2025 23:57:46.999535084 CET5596153192.168.2.4162.159.36.2
                                                          Jan 10, 2025 23:57:47.005217075 CET5355961162.159.36.2192.168.2.4
                                                          Jan 10, 2025 23:57:47.005321980 CET5596153192.168.2.4162.159.36.2
                                                          Jan 10, 2025 23:57:47.010185957 CET5355961162.159.36.2192.168.2.4
                                                          Jan 10, 2025 23:57:47.450421095 CET5596153192.168.2.4162.159.36.2
                                                          Jan 10, 2025 23:57:47.455492973 CET5355961162.159.36.2192.168.2.4
                                                          Jan 10, 2025 23:57:47.455555916 CET5596153192.168.2.4162.159.36.2
                                                          Jan 10, 2025 23:57:57.570580959 CET4973880192.168.2.4158.101.44.242
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Jan 10, 2025 23:57:32.409724951 CET6414853192.168.2.41.1.1.1
                                                          Jan 10, 2025 23:57:32.416606903 CET53641481.1.1.1192.168.2.4
                                                          Jan 10, 2025 23:57:33.589677095 CET5856353192.168.2.41.1.1.1
                                                          Jan 10, 2025 23:57:33.596544027 CET53585631.1.1.1192.168.2.4
                                                          Jan 10, 2025 23:57:38.059799910 CET5106853192.168.2.41.1.1.1
                                                          Jan 10, 2025 23:57:38.066982031 CET53510681.1.1.1192.168.2.4
                                                          Jan 10, 2025 23:57:46.999002934 CET5351292162.159.36.2192.168.2.4
                                                          Jan 10, 2025 23:57:47.458383083 CET5899753192.168.2.41.1.1.1
                                                          Jan 10, 2025 23:57:47.466106892 CET53589971.1.1.1192.168.2.4
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Jan 10, 2025 23:57:32.409724951 CET192.168.2.41.1.1.10x8878Standard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                          Jan 10, 2025 23:57:33.589677095 CET192.168.2.41.1.1.10x9caeStandard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                          Jan 10, 2025 23:57:38.059799910 CET192.168.2.41.1.1.10x9e59Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                          Jan 10, 2025 23:57:47.458383083 CET192.168.2.41.1.1.10x7e6bStandard query (0)206.23.85.13.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Jan 10, 2025 23:57:32.416606903 CET1.1.1.1192.168.2.40x8878No error (0)drive.google.com142.250.181.238A (IP address)IN (0x0001)false
                                                          Jan 10, 2025 23:57:33.596544027 CET1.1.1.1192.168.2.40x9caeNo error (0)drive.usercontent.google.com142.250.185.129A (IP address)IN (0x0001)false
                                                          Jan 10, 2025 23:57:38.066982031 CET1.1.1.1192.168.2.40x9e59No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                          Jan 10, 2025 23:57:38.066982031 CET1.1.1.1192.168.2.40x9e59No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                          Jan 10, 2025 23:57:38.066982031 CET1.1.1.1192.168.2.40x9e59No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                          Jan 10, 2025 23:57:38.066982031 CET1.1.1.1192.168.2.40x9e59No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                          Jan 10, 2025 23:57:38.066982031 CET1.1.1.1192.168.2.40x9e59No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                          Jan 10, 2025 23:57:38.066982031 CET1.1.1.1192.168.2.40x9e59No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                          Jan 10, 2025 23:57:47.466106892 CET1.1.1.1192.168.2.40x7e6bName error (3)206.23.85.13.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                          • drive.google.com
                                                          • drive.usercontent.google.com
                                                          • checkip.dyndns.org
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.449738158.101.44.242804484C:\Users\user\Desktop\WGi85dsMNp.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 10, 2025 23:57:38.077563047 CET151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Jan 10, 2025 23:57:38.639904022 CET730INHTTP/1.1 502 Bad Gateway
                                                          Date: Fri, 10 Jan 2025 22:57:38 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 547
                                                          Connection: keep-alive
                                                          X-Request-ID: b5ad8b410d2a546244429ca31dbc555f
                                                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 [TRUNCATED]
                                                          Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.449732142.250.181.2384434484C:\Users\user\Desktop\WGi85dsMNp.exe
                                                          TimestampBytes transferredDirectionData
                                                          2025-01-10 22:57:33 UTC216OUTGET /uc?export=download&id=1TlOsdPEqqbm9Tz6zptQP3sv7zEQ9o8Yz HTTP/1.1
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                          Host: drive.google.com
                                                          Cache-Control: no-cache
                                                          2025-01-10 22:57:33 UTC1920INHTTP/1.1 303 See Other
                                                          Content-Type: application/binary
                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                          Pragma: no-cache
                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                          Date: Fri, 10 Jan 2025 22:57:33 GMT
                                                          Location: https://drive.usercontent.google.com/download?id=1TlOsdPEqqbm9Tz6zptQP3sv7zEQ9o8Yz&export=download
                                                          Strict-Transport-Security: max-age=31536000
                                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                          Content-Security-Policy: script-src 'nonce-g2cIxw7qTaLCzSasOaiL_A' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                          Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                          Cross-Origin-Opener-Policy: same-origin
                                                          Server: ESF
                                                          Content-Length: 0
                                                          X-XSS-Protection: 0
                                                          X-Frame-Options: SAMEORIGIN
                                                          X-Content-Type-Options: nosniff
                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                          Connection: close


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          1192.168.2.449735142.250.185.1294434484C:\Users\user\Desktop\WGi85dsMNp.exe
                                                          TimestampBytes transferredDirectionData
                                                          2025-01-10 22:57:34 UTC258OUTGET /download?id=1TlOsdPEqqbm9Tz6zptQP3sv7zEQ9o8Yz&export=download HTTP/1.1
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                          Cache-Control: no-cache
                                                          Host: drive.usercontent.google.com
                                                          Connection: Keep-Alive
                                                          2025-01-10 22:57:37 UTC4934INHTTP/1.1 200 OK
                                                          X-GUploader-UploadID: AFIdbgR-tVD5kvolIydHlAHyducOm7on9NxFEncAYx1NYrJCmAOeN050atVI8TkcnMI9TMS6birVc8A
                                                          Content-Type: application/octet-stream
                                                          Content-Security-Policy: sandbox
                                                          Content-Security-Policy: default-src 'none'
                                                          Content-Security-Policy: frame-ancestors 'none'
                                                          X-Content-Security-Policy: sandbox
                                                          Cross-Origin-Opener-Policy: same-origin
                                                          Cross-Origin-Embedder-Policy: require-corp
                                                          Cross-Origin-Resource-Policy: same-site
                                                          X-Content-Type-Options: nosniff
                                                          Content-Disposition: attachment; filename="pzXrb66.bin"
                                                          Access-Control-Allow-Origin: *
                                                          Access-Control-Allow-Credentials: false
                                                          Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
                                                          Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                                                          Accept-Ranges: bytes
                                                          Content-Length: 94272
                                                          Last-Modified: Sun, 08 Dec 2024 21:18:24 GMT
                                                          Date: Fri, 10 Jan 2025 22:57:36 GMT
                                                          Expires: Fri, 10 Jan 2025 22:57:36 GMT
                                                          Cache-Control: private, max-age=0
                                                          X-Goog-Hash: crc32c=/SG2kQ==
                                                          Server: UploadServer
                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                          Connection: close
                                                          2025-01-10 22:57:37 UTC4934INData Raw: df 1f 5d 34 ad a1 cb 5f 5b 3e 43 89 48 32 3a de b7 09 81 dc 9e 82 27 7e e8 71 58 07 fb ce 54 c0 9a 15 92 d6 c5 a2 e8 5b 1f aa 6c 85 fa 97 2e de ff 65 4a 5e 60 e5 d5 3d 4f 41 fa 9f 62 f9 63 8f 06 fd 93 61 6a d9 90 55 2f bb 5f 52 80 e1 d2 ae 12 71 28 9f ad 30 0b ad 9f b1 1b 86 2e 23 38 db f0 e3 44 47 46 45 96 b1 13 08 6e 6c 33 d5 2d 63 63 44 96 71 5a c5 b3 49 e9 cd d9 31 01 fb a2 43 5c d6 1e bb 20 86 ae f8 ba ee 02 78 28 1a 7f fb 8d 0c 33 80 2b fc 14 e2 44 d9 2e 1b 4c 04 60 c2 fa 9c 5a a0 20 88 13 16 b9 a9 6f d2 90 50 1c 25 04 78 c3 61 e1 40 b3 5d 2e cb f0 07 33 51 f4 bf 46 8a 93 33 6f 1d 7f 23 b5 44 96 17 7c 4a bf bf d5 ba fa 5d 4f 83 2c 3a 5e 0e 4f bb 67 05 66 33 8d 61 18 ed 86 86 be 71 e2 5d 36 b3 a8 0b 2a ea 46 d8 14 ea c1 d3 76 82 f4 ce fc 88 90 60 19
                                                          Data Ascii: ]4_[>CH2:'~qXT[l.eJ^`=OAbcajU/_Rq(0.#8DGFEnl3-ccDqZI1C\ x(3+D.L`Z oP%xa@].3QF3o#D|J]O,:^Ogf3aq]6*Fv`
                                                          2025-01-10 22:57:37 UTC4833INData Raw: e7 1c eb 03 dc ea e9 87 36 92 27 e5 8d 7d 99 03 47 f1 c8 7f 57 ee 17 d8 3d 99 03 90 86 81 59 a7 03 65 41 52 90 55 21 bb 81 5e 7f 17 fe a9 a3 1e 29 9f ad 3a 0b 71 01 a2 3e ae 1d 23 38 d1 e3 e7 44 6f 14 45 96 bb ce 1f 6c 6c 33 d5 2d 63 1d 5c 96 71 5e b7 e5 42 e9 bd cf 19 00 fb a2 49 44 37 a5 a6 25 23 a2 0c 80 57 03 34 e5 48 a7 93 e4 75 00 f6 48 95 0d 8e 25 b4 0a 0b a0 6a 0e a7 e1 32 38 c5 0a fa 77 7e f6 4f 01 f2 de 61 6e 05 69 13 c8 94 cf 4d b4 57 1b cd d8 96 33 51 fe cd 66 c4 93 43 0b 2a 7c 23 04 11 de a6 7c 40 97 f8 d5 ba f0 32 3d 83 2e 31 55 1e 19 c9 63 64 67 43 f3 74 18 ed 82 f4 2c 7a 3c a8 1f f4 a8 2b 20 85 d5 78 15 e0 c1 ad 24 82 f4 ea 8f 1c 90 62 13 8e d4 75 e6 53 44 03 30 11 e5 ce 1d 85 d3 dd ac 34 00 b8 8d a7 43 94 5e 63 0e aa 3c 22 0f 66 1d 3d 09
                                                          Data Ascii: 6'}GW=YeARU!^):q>#8DoEll3-c\q^BID7%#W4HuH%j28w~OaniMW3QfC*|#|@2=.1UcdgCt,z<+ x$buSD04C^c<"f=
                                                          2025-01-10 22:57:37 UTC1320INData Raw: 79 b5 bc 26 3f 3f 67 3e 53 55 9c 77 dd e5 29 b9 33 ea 62 bc d6 64 67 11 e0 7a 88 d1 35 65 0c 9b a4 75 bc 73 ec 67 ef c3 1a f4 5e 69 72 af 70 86 96 c2 0a f7 c1 81 a7 5f 44 2b bc 68 9b 46 8e f5 f9 ff 8e ed 1c cf 04 b3 72 e9 85 47 d9 2e ed 9f 0b 44 6a 28 71 e0 2b 5d ee 14 bd 4d 8a 07 8b 82 d3 46 a5 78 27 69 d9 94 7d f8 bb 5f 58 7f 1e d2 ac d1 3b 28 9f a9 4e 58 ad df bb 33 d2 2e 23 32 d0 f7 f0 41 56 43 69 9b b3 68 42 6e 6c 37 fd fe 63 63 4e 96 71 5a c7 c8 01 e9 cd dd 4f d2 fb a2 49 7a 9d a4 b5 2a 3e af 26 9d 47 05 18 e8 39 50 db e4 7f 17 d8 8a 93 73 9a 25 b4 0e 7a 56 26 0e ad 8a c2 6b c5 00 f0 4e 2c 99 c0 0b ff dd 0c 48 14 6e 3b aa 06 b4 01 be 57 0e e3 23 07 33 5b f4 bf 16 e5 93 33 38 2c 76 23 28 7f e3 a6 59 4a bf ae d5 b8 84 60 af 83 2a 45 6b 0f 1f bf 19 5a
                                                          Data Ascii: y&??g>SUw)3bdgz5eusg^irp_D+hFrG.Dj(q+]MFx'i}_X;(NX3.#2AVCihBnl7ccNqZOIz*>&G9Ps%zV&kN,Hn;W#3[38,v#(YJ`*EkZ
                                                          2025-01-10 22:57:37 UTC1390INData Raw: 80 5d 6e bf 71 4d 7c d9 e0 f7 0e a2 56 3d bb 1e d2 a8 08 54 32 ed eb 25 0b dd 7d 94 00 8f 41 e5 38 db f6 41 61 5b 34 25 83 b1 63 aa 46 cc 33 d5 27 70 67 3a 99 71 5a c1 a2 4d c1 83 d9 31 8b 7b ad 43 52 cd a4 a7 22 1a 7a 35 9b 5c 10 31 f4 3e 06 02 3a 70 01 f2 a7 85 7f 90 25 af 61 79 2d 6a 04 ad 52 bc 13 c7 00 fa 4c 79 89 c0 01 f0 d4 02 4f 7f fe 17 a8 04 cf 4d be 4c 3a c1 f0 4d 30 51 f4 93 16 cf 82 33 50 c5 7c 23 08 75 f9 2b 43 4a bf be f0 ac 88 97 ba 83 5e 99 70 18 6d 5d 72 63 17 91 a8 71 6a ef 90 86 ce d3 19 c1 45 ad be 2b 5a 48 4a 6c 06 ee db 5e a7 82 f4 ef d9 9e ee bc 19 9d d9 16 da 2a d1 73 5f c4 f4 c9 78 b1 f6 ca d8 ea 7e 98 87 d5 aa f1 c9 13 61 7f 2f 2a 7b df 38 25 73 f6 69 9d e0 2d 1f 4c 5f 1a 3f 6d 2d 95 b4 ad cb 41 06 ef da e3 23 bd d0 c1 5e c3 3e
                                                          Data Ascii: ]nqM|V=T2%}A8Aa[4%cF3'pg:qZM1{CR"z5\1>:p%ay-jRLyOML:M0Q3P|#u+CJ^pm]rcqjE+ZHJl^*s_x~a/*{8%si-L_?m-A#^>
                                                          2025-01-10 22:57:37 UTC1390INData Raw: d5 6f 84 be 71 2d d4 26 be 32 38 24 fb 48 0b fb ea c1 d9 25 8d e5 e0 ed 86 e2 32 03 9d a3 0b 0b 3c d1 09 27 cd 9b 26 72 13 d9 ce b6 25 70 ea d9 bd 47 97 e1 2d 0e a0 25 39 60 6c 0c 24 7e d8 69 9d e0 4c e9 4a 4d 05 a1 b2 2d 9f 09 1c fd 49 6b 26 00 f4 ff 42 1e d9 5e b2 42 90 8f 1f 6f 92 b3 b8 80 6a 8e be 59 77 96 e9 2e fc 45 b1 bc 20 64 fd 58 ad c2 83 66 6e 83 5b 76 34 32 d7 9c 83 7e ea 64 37 9e 61 8b 07 de 7a ad 4f 9a 32 bb 0b 17 56 d8 b6 2d 14 a1 ef ab 57 9e 5e 69 d6 dc d3 51 57 23 a7 22 16 d8 18 9b f2 77 0d d6 d9 02 e5 fd a6 8e 80 51 5a 40 ec 38 4b 8d 55 ac b4 8a 71 b6 5c b2 ad 6b 6f 72 8c 4b 0f f0 70 b1 4b dd a3 b9 05 98 33 d5 41 88 95 33 ff 43 9b 88 f8 11 4b 40 fb 04 5a 54 16 12 b9 bc 26 ab 32 73 d5 ef 3a de 1c c9 48 7e 14 41 4f 14 29 5b a1 27 0f 63 0a
                                                          Data Ascii: oq-&28$H%2<'&r%pG-%9`l$~iLJM-Ik&B^BojYw.E dXfn[v42~d7azO2V-W^iQW#"wQZ@8KUq\korKpK3A3CK@ZT&2s:H~AO)['c
                                                          2025-01-10 22:57:37 UTC1390INData Raw: c7 2e a0 ce 66 1f ed c2 93 e1 b2 8f 80 83 44 4b 5b 4c 27 76 62 54 b8 38 43 41 b7 3a 89 ff 7a 73 6b 9a 4c 9f 90 89 b0 4a d1 b5 87 ee 86 22 cb 46 6d 05 16 32 50 9e 93 ee 22 53 4a fa 1f 72 a9 cb 12 b3 94 68 d9 d0 62 c6 89 56 4f e0 c9 38 67 33 78 a3 66 ab 4b 89 ac 60 90 00 ba cf 44 cf 0e 90 20 03 b0 f0 0b 48 e6 37 37 3e 81 96 91 87 22 bd c7 ac 20 ac da d4 78 16 28 89 0c ba 75 81 56 2e 08 55 c9 bc c1 3e 7a 8b 84 5d a4 12 f8 8f 09 dd e8 b8 96 11 c5 c2 96 bc 23 0e 49 69 fe 39 22 8f 26 65 38 e4 1a dd f6 6b 61 77 fc 96 2a 7d e1 58 fa 97 a9 27 2a 96 1a 58 9a 52 15 62 68 a8 1f 5a 7e 39 61 88 15 fa 70 3a 76 6e f1 9e be ca 22 9e 27 af 09 b8 41 20 a8 f3 01 5c af 42 d8 16 f9 f2 59 b1 a0 ea 0f 63 a4 39 40 fc cb 4f d2 e3 c2 d0 d0 fc 3e 1a 80 10 0a 07 23 84 b1 73 2a 4b e7
                                                          Data Ascii: .fDK[L'vbT8CA:zskLJ"Fm2P"SJrhbVO8g3xfK`D H77>" x(uV.U>z]#Ii9"&e8kaw*}X'*XRbhZ~9ap:vn"'A \BYc9@O>#s*K
                                                          2025-01-10 22:57:37 UTC1390INData Raw: e7 fe 6b 1d 76 ed 9e 76 fd e1 49 f0 9b b8 1e ff bb aa 8c ff 63 00 17 09 80 51 5b 52 3e 7a 80 66 c3 88 3a 77 0b fb 99 87 86 23 42 2f 27 13 74 9b 37 74 e8 df a3 ac 5e d8 67 85 27 51 aa b7 cb 11 04 f9 50 5b 20 f4 f3 c1 e5 de c3 d7 d5 2e 0f 96 38 e5 16 24 fc ca 6b f4 1b ad 5c cc 88 22 eb ea 08 c0 5c e9 a9 67 40 9a ba 9a 70 ab 8d 35 c2 90 25 f1 fa 73 c2 d7 2a b0 ef c5 ce 26 02 d5 ee a8 bd 70 01 bc 8d 1a 8a 8a bd 8b 3d a5 41 aa 26 3a c0 a6 3b 7c 89 7c 9b d5 45 c9 79 d6 ea f8 ef e7 68 1c e1 7f 1b 4c cf 8e 81 e1 be dd 57 02 c9 3d d9 1f 17 81 eb ee 61 98 a2 58 0c ea fd fe 5d fe d8 d7 be c7 02 4c bb 71 a1 29 69 89 49 bd da d1 a2 93 0f d6 7e f8 db 0c 36 4c 90 3e e3 0b bf e6 26 c5 9f 1d 16 b0 fc a9 cc 8a 35 76 ec 13 13 68 3e b1 e3 21 05 93 6e 66 8f 23 a6 37 9e cd 44
                                                          Data Ascii: kvvIcQ[R>zf:w#B/'t7t^g'QP[ .8$k\"\g@p5%s*&p=A&:;||EyhLW=aX]Lq)iI~6L>&5vh>!nf#7D
                                                          2025-01-10 22:57:37 UTC1390INData Raw: 4d da 97 98 fa a0 0f 15 17 ea 2f d3 33 0b c6 45 ef 61 98 dc 58 62 b5 f7 d6 c3 ef d1 f9 38 ce 13 43 bc 8a a0 3a 63 b3 63 ab 0c 7a b1 98 14 d5 43 e9 81 3a 2a 4c ea 40 33 64 e0 e0 49 90 8e 14 34 0d 40 a9 ca 9f 23 73 ec 02 3c 3a dc 9c 49 51 13 b1 e7 77 88 5b 2c d5 9d ac 2e 1a 22 20 d8 15 b5 2c d7 27 0b 84 1f 8b 95 1d 33 85 f8 b9 be 69 d5 9c 83 02 22 89 c7 71 38 87 ea 28 1a e9 2b 41 71 6c 0d 2c 78 fe 12 af 2b 2a f1 dd ea 57 5f 36 e1 08 d5 81 c5 aa ef 79 64 0d 58 f0 ef 46 52 2f ba 14 b6 40 57 0a c9 c9 2c 0f 80 de e5 22 2b 53 a6 db ef e6 d2 f5 d3 82 da fe 68 51 83 85 77 36 2c 90 c4 d6 0a 26 02 d3 6f fe e8 90 c4 2b 94 e6 52 17 d8 7f 05 2b b1 74 14 3c 8f 54 d2 f7 66 24 f7 58 e3 ec 07 3b e4 5d 25 0c 28 74 b1 a0 1e 3d 49 7a 02 38 10 f8 5b 96 14 57 ef ae 00 c7 09 7f
                                                          Data Ascii: M/3EaXb8C:cczC:*L@3dI4@#s<:IQw[,." ,'3i"q8(+Aql,x+*W_6ydXFR/@W,"+ShQw6,&o+R+t<Tf$X;]%(t=Iz8[W
                                                          2025-01-10 22:57:37 UTC1390INData Raw: 33 be 00 6a 96 86 c6 07 32 48 b4 87 c9 a3 b3 bf d7 8e 86 11 50 c7 ad 80 d5 12 15 f4 98 10 1e 56 d0 59 ea e9 e1 38 f2 3e 98 c5 47 17 ac cc 2d 1a ee 70 b6 13 15 29 94 e2 62 54 55 6c ff ea d4 8a c6 50 50 d6 0c 4a 21 fc c9 62 49 7a d6 3b 38 ae 67 96 14 59 ed ad 28 a1 5b 7f a3 33 d1 10 db 7c 55 f6 4b 8c 48 db 27 43 7a 3b 8e 6b 2f c9 d5 08 83 7a d8 eb f7 07 a4 18 c3 6f 07 02 0b a4 4f 0b aa ae b8 c7 0f 93 73 73 73 e8 d1 4a f0 c3 e2 61 1a 90 d9 1b 44 6d e2 45 7b a9 c8 6a 1f e3 88 cd 1d e7 8b 6d 17 83 f1 58 34 2c 3d 85 10 7b 18 75 23 53 52 41 4c 9b d2 2f 80 a2 41 d2 d2 2a 35 f4 e3 e1 4b 11 01 db c4 60 60 a8 fa e9 67 10 6d 4a 04 73 cd 6f 69 f6 37 84 63 31 7c 38 4c 65 4f ae 54 5a 0a 91 69 0f 64 9c b1 55 5c 33 97 01 57 42 ee a8 61 dc 80 eb 99 b3 1c f3 56 38 c5 81 d1
                                                          Data Ascii: 3j2HPVY8>G-p)bTUlPPJ!bIz;8gY([3|UKH'Cz;k/zoOsssJaDmE{jmX4,={u#SRAL/A*5K``gmJsoi7c1|8LeOTZidU\3WBaV8
                                                          2025-01-10 22:57:37 UTC1390INData Raw: 8d 2f 24 35 06 7c aa 10 7b 09 75 3c 4f 69 99 4c 9b 8f 5c b3 81 2b a3 fa 64 25 f4 e9 eb 0f 17 29 22 df 50 6e a3 81 d1 21 11 5e 4a 02 11 1a 70 75 d8 e3 8c 11 61 12 a1 19 0a ed 86 1a 5c 2c 93 0c dc 62 b4 4f 42 86 2a 9a 10 7d 03 d7 bf 60 da f3 34 88 b4 68 97 42 4a ef f2 04 80 84 a8 69 fb 9d 61 57 d7 78 bc 64 e8 31 82 6e 07 48 a2 58 1d f4 6b 1b 85 2c 31 2f 02 61 35 00 9e d1 63 47 52 b7 4b bf 89 c6 2d 28 2c a3 95 a5 c8 72 a8 b3 af 28 4a 64 60 4c cb 4c 8a 05 c9 7a 29 b9 31 fb 1c e6 d3 4c f0 39 32 7c 9b d3 24 6f 25 56 cb 20 f2 72 ec 69 82 c5 60 b9 54 06 73 86 a1 8c be 5c 77 bb c7 92 aa 4e 4d 15 42 69 88 5f af fd ef 9b 8f fe 17 fa 0f 9f 75 c1 2d 3c 9f 24 fc 9e 1a 48 6a 28 71 d9 76 75 7b 1e b7 4d 8a 06 9a 86 ff 60 87 03 49 c3 d9 90 5f 23 aa 58 20 e3 02 d2 de c5 a4
                                                          Data Ascii: /$5|{u<OiL\+d%)"Pn!^Jpua\,bOB*}`4hBJiaWxd1nHXk,1/a5cGRK-(,r(Jd`LLz)1L92|$o%V ri`Ts\wNMBi_u-<$Hj(qvu{M`I_#X


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:17:57:14
                                                          Start date:10/01/2025
                                                          Path:C:\Users\user\Desktop\WGi85dsMNp.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\WGi85dsMNp.exe"
                                                          Imagebase:0x400000
                                                          File size:979'348 bytes
                                                          MD5 hash:2275024102505F0997F027C71970750D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.1814081610.0000000003349000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:1
                                                          Start time:17:57:26
                                                          Start date:10/01/2025
                                                          Path:C:\Users\user\Desktop\WGi85dsMNp.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\WGi85dsMNp.exe"
                                                          Imagebase:0x400000
                                                          File size:979'348 bytes
                                                          MD5 hash:2275024102505F0997F027C71970750D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:7
                                                          Start time:17:57:38
                                                          Start date:10/01/2025
                                                          Path:C:\Windows\SysWOW64\WerFault.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 2536
                                                          Imagebase:0x140000
                                                          File size:483'680 bytes
                                                          MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:20.3%
                                                            Dynamic/Decrypted Code Coverage:0%
                                                            Signature Coverage:20%
                                                            Total number of Nodes:1599
                                                            Total number of Limit Nodes:38
                                                            execution_graph 4163 401941 4164 401943 4163->4164 4169 402c41 4164->4169 4170 402c4d 4169->4170 4215 40640a 4170->4215 4173 401948 4175 405afa 4173->4175 4257 405dc5 4175->4257 4178 405b22 DeleteFileW 4180 401951 4178->4180 4179 405b39 4181 405c64 4179->4181 4271 4063e8 lstrcpynW 4179->4271 4181->4180 4300 40672b FindFirstFileW 4181->4300 4183 405b5f 4184 405b72 4183->4184 4185 405b65 lstrcatW 4183->4185 4272 405d09 lstrlenW 4184->4272 4186 405b78 4185->4186 4189 405b88 lstrcatW 4186->4189 4190 405b7e 4186->4190 4192 405b93 lstrlenW FindFirstFileW 4189->4192 4190->4189 4190->4192 4194 405c59 4192->4194 4213 405bb5 4192->4213 4193 405c82 4303 405cbd lstrlenW CharPrevW 4193->4303 4194->4181 4197 405c3c FindNextFileW 4201 405c52 FindClose 4197->4201 4197->4213 4198 405ab2 5 API calls 4200 405c94 4198->4200 4202 405c98 4200->4202 4203 405cae 4200->4203 4201->4194 4202->4180 4207 405450 24 API calls 4202->4207 4205 405450 24 API calls 4203->4205 4205->4180 4206 405afa 60 API calls 4206->4213 4208 405ca5 4207->4208 4209 4061ae 36 API calls 4208->4209 4211 405cac 4209->4211 4210 405450 24 API calls 4210->4197 4211->4180 4213->4197 4213->4206 4213->4210 4276 4063e8 lstrcpynW 4213->4276 4277 405ab2 4213->4277 4285 405450 4213->4285 4296 4061ae MoveFileExW 4213->4296 4228 406417 4215->4228 4216 406662 4217 402c6e 4216->4217 4248 4063e8 lstrcpynW 4216->4248 4217->4173 4232 40667c 4217->4232 4219 406630 lstrlenW 4219->4228 4220 40640a 10 API calls 4220->4219 4223 406545 GetSystemDirectoryW 4223->4228 4225 406558 GetWindowsDirectoryW 4225->4228 4226 40667c 5 API calls 4226->4228 4227 4065d3 lstrcatW 4227->4228 4228->4216 4228->4219 4228->4220 4228->4223 4228->4225 4228->4226 4228->4227 4229 40658c SHGetSpecialFolderLocation 4228->4229 4230 40640a 10 API calls 4228->4230 4241 4062b6 4228->4241 4246 40632f wsprintfW 4228->4246 4247 4063e8 lstrcpynW 4228->4247 4229->4228 4231 4065a4 SHGetPathFromIDListW CoTaskMemFree 4229->4231 4230->4228 4231->4228 4239 406689 4232->4239 4233 4066ff 4234 406704 CharPrevW 4233->4234 4236 406725 4233->4236 4234->4233 4235 4066f2 CharNextW 4235->4233 4235->4239 4236->4173 4238 4066de CharNextW 4238->4239 4239->4233 4239->4235 4239->4238 4240 4066ed CharNextW 4239->4240 4253 405cea 4239->4253 4240->4235 4249 406255 4241->4249 4244 40631a 4244->4228 4245 4062ea RegQueryValueExW RegCloseKey 4245->4244 4246->4228 4247->4228 4248->4217 4250 406264 4249->4250 4251 406268 4250->4251 4252 40626d RegOpenKeyExW 4250->4252 4251->4244 4251->4245 4252->4251 4254 405cf0 4253->4254 4255 405d06 4254->4255 4256 405cf7 CharNextW 4254->4256 4255->4239 4256->4254 4306 4063e8 lstrcpynW 4257->4306 4259 405dd6 4307 405d68 CharNextW CharNextW 4259->4307 4262 405b1a 4262->4178 4262->4179 4263 40667c 5 API calls 4269 405dec 4263->4269 4264 405e1d lstrlenW 4265 405e28 4264->4265 4264->4269 4266 405cbd 3 API calls 4265->4266 4268 405e2d GetFileAttributesW 4266->4268 4267 40672b 2 API calls 4267->4269 4268->4262 4269->4262 4269->4264 4269->4267 4270 405d09 2 API calls 4269->4270 4270->4264 4271->4183 4273 405d17 4272->4273 4274 405d29 4273->4274 4275 405d1d CharPrevW 4273->4275 4274->4186 4275->4273 4275->4274 4276->4213 4313 405eb9 GetFileAttributesW 4277->4313 4280 405adf 4280->4213 4281 405ad5 DeleteFileW 4283 405adb 4281->4283 4282 405acd RemoveDirectoryW 4282->4283 4283->4280 4284 405aeb SetFileAttributesW 4283->4284 4284->4280 4286 40546b 4285->4286 4287 40550d 4285->4287 4288 405487 lstrlenW 4286->4288 4289 40640a 17 API calls 4286->4289 4287->4213 4290 4054b0 4288->4290 4291 405495 lstrlenW 4288->4291 4289->4288 4293 4054c3 4290->4293 4294 4054b6 SetWindowTextW 4290->4294 4291->4287 4292 4054a7 lstrcatW 4291->4292 4292->4290 4293->4287 4295 4054c9 SendMessageW SendMessageW SendMessageW 4293->4295 4294->4293 4295->4287 4297 4061cf 4296->4297 4298 4061c2 4296->4298 4297->4213 4316 406034 4298->4316 4301 406741 FindClose 4300->4301 4302 405c7e 4300->4302 4301->4302 4302->4180 4302->4193 4304 405c88 4303->4304 4305 405cd9 lstrcatW 4303->4305 4304->4198 4305->4304 4306->4259 4308 405d85 4307->4308 4311 405d97 4307->4311 4310 405d92 CharNextW 4308->4310 4308->4311 4309 405dbb 4309->4262 4309->4263 4310->4309 4311->4309 4312 405cea CharNextW 4311->4312 4312->4311 4314 405abe 4313->4314 4315 405ecb SetFileAttributesW 4313->4315 4314->4280 4314->4281 4314->4282 4315->4314 4317 406064 4316->4317 4318 40608a GetShortPathNameW 4316->4318 4343 405ede GetFileAttributesW CreateFileW 4317->4343 4320 4061a9 4318->4320 4321 40609f 4318->4321 4320->4297 4321->4320 4322 4060a7 wsprintfA 4321->4322 4324 40640a 17 API calls 4322->4324 4323 40606e CloseHandle GetShortPathNameW 4323->4320 4325 406082 4323->4325 4326 4060cf 4324->4326 4325->4318 4325->4320 4344 405ede GetFileAttributesW CreateFileW 4326->4344 4328 4060dc 4328->4320 4329 4060eb GetFileSize GlobalAlloc 4328->4329 4330 4061a2 CloseHandle 4329->4330 4331 40610d 4329->4331 4330->4320 4345 405f61 ReadFile 4331->4345 4336 406140 4338 405e43 4 API calls 4336->4338 4337 40612c lstrcpyA 4339 40614e 4337->4339 4338->4339 4340 406185 SetFilePointer 4339->4340 4352 405f90 WriteFile 4340->4352 4343->4323 4344->4328 4346 405f7f 4345->4346 4346->4330 4347 405e43 lstrlenA 4346->4347 4348 405e84 lstrlenA 4347->4348 4349 405e8c 4348->4349 4350 405e5d lstrcmpiA 4348->4350 4349->4336 4349->4337 4350->4349 4351 405e7b CharNextA 4350->4351 4351->4348 4353 405fae GlobalFree 4352->4353 4353->4330 4354 4015c1 4355 402c41 17 API calls 4354->4355 4356 4015c8 4355->4356 4357 405d68 4 API calls 4356->4357 4362 4015d1 4357->4362 4358 401631 4360 401663 4358->4360 4361 401636 4358->4361 4359 405cea CharNextW 4359->4362 4365 401423 24 API calls 4360->4365 4381 401423 4361->4381 4362->4358 4362->4359 4371 401617 GetFileAttributesW 4362->4371 4373 4059b9 4362->4373 4376 40591f CreateDirectoryW 4362->4376 4385 40599c CreateDirectoryW 4362->4385 4368 40165b 4365->4368 4370 40164a SetCurrentDirectoryW 4370->4368 4371->4362 4388 4067c2 GetModuleHandleA 4373->4388 4377 405970 GetLastError 4376->4377 4378 40596c 4376->4378 4377->4378 4379 40597f SetFileSecurityW 4377->4379 4378->4362 4379->4378 4380 405995 GetLastError 4379->4380 4380->4378 4382 405450 24 API calls 4381->4382 4383 401431 4382->4383 4384 4063e8 lstrcpynW 4383->4384 4384->4370 4386 4059b0 GetLastError 4385->4386 4387 4059ac 4385->4387 4386->4387 4387->4362 4389 4067e8 GetProcAddress 4388->4389 4390 4067de 4388->4390 4392 4059c0 4389->4392 4394 406752 GetSystemDirectoryW 4390->4394 4392->4362 4393 4067e4 4393->4389 4393->4392 4395 406774 wsprintfW LoadLibraryExW 4394->4395 4395->4393 4397 4053c4 4398 4053d4 4397->4398 4399 4053e8 4397->4399 4400 4053da 4398->4400 4410 405431 4398->4410 4401 4053f0 IsWindowVisible 4399->4401 4406 405410 4399->4406 4411 4043ab 4400->4411 4404 4053fd 4401->4404 4401->4410 4402 405436 CallWindowProcW 4407 4053e4 4402->4407 4414 404d1a SendMessageW 4404->4414 4406->4402 4419 404d9a 4406->4419 4410->4402 4412 4043c3 4411->4412 4413 4043b4 SendMessageW 4411->4413 4412->4407 4413->4412 4415 404d79 SendMessageW 4414->4415 4416 404d3d GetMessagePos ScreenToClient SendMessageW 4414->4416 4417 404d71 4415->4417 4416->4417 4418 404d76 4416->4418 4417->4406 4418->4415 4428 4063e8 lstrcpynW 4419->4428 4421 404dad 4429 40632f wsprintfW 4421->4429 4423 404db7 4430 40140b 4423->4430 4427 404dc7 4427->4410 4428->4421 4429->4423 4434 401389 4430->4434 4433 4063e8 lstrcpynW 4433->4427 4436 401390 4434->4436 4435 4013fe 4435->4433 4436->4435 4437 4013cb MulDiv SendMessageW 4436->4437 4437->4436 4882 401e49 4883 402c1f 17 API calls 4882->4883 4884 401e4f 4883->4884 4885 402c1f 17 API calls 4884->4885 4886 401e5b 4885->4886 4887 401e72 EnableWindow 4886->4887 4888 401e67 ShowWindow 4886->4888 4889 402ac5 4887->4889 4888->4889 4890 40264a 4891 402c1f 17 API calls 4890->4891 4892 402659 4891->4892 4893 4026a3 ReadFile 4892->4893 4894 405f61 ReadFile 4892->4894 4895 4026e3 MultiByteToWideChar 4892->4895 4896 402798 4892->4896 4899 40273c 4892->4899 4900 402709 SetFilePointer MultiByteToWideChar 4892->4900 4901 4027a9 4892->4901 4903 402796 4892->4903 4893->4892 4893->4903 4894->4892 4895->4892 4913 40632f wsprintfW 4896->4913 4899->4892 4899->4903 4904 405fbf SetFilePointer 4899->4904 4900->4892 4902 4027ca SetFilePointer 4901->4902 4901->4903 4902->4903 4905 405fdb 4904->4905 4912 405ff3 4904->4912 4906 405f61 ReadFile 4905->4906 4907 405fe7 4906->4907 4908 406024 SetFilePointer 4907->4908 4909 405ffc SetFilePointer 4907->4909 4907->4912 4908->4912 4909->4908 4910 406007 4909->4910 4911 405f90 WriteFile 4910->4911 4911->4912 4912->4899 4913->4903 4914 6f982993 4915 6f9829e3 4914->4915 4916 6f9829a3 VirtualProtect 4914->4916 4916->4915 4917 404dcc GetDlgItem GetDlgItem 4918 404e1e 7 API calls 4917->4918 4926 405037 4917->4926 4919 404ec1 DeleteObject 4918->4919 4920 404eb4 SendMessageW 4918->4920 4921 404eca 4919->4921 4920->4919 4922 404f01 4921->4922 4924 404ed9 4921->4924 4928 40435f 18 API calls 4922->4928 4923 40511b 4929 4051c7 4923->4929 4935 4053af 4923->4935 4940 405174 SendMessageW 4923->4940 4925 40640a 17 API calls 4924->4925 4930 404ee3 SendMessageW SendMessageW 4925->4930 4926->4923 4927 4050fc 4926->4927 4933 405097 4926->4933 4927->4923 4937 40510d SendMessageW 4927->4937 4934 404f15 4928->4934 4931 4051d1 SendMessageW 4929->4931 4932 4051d9 4929->4932 4930->4921 4931->4932 4942 4051f2 4932->4942 4943 4051eb ImageList_Destroy 4932->4943 4950 405202 4932->4950 4938 404d1a 5 API calls 4933->4938 4939 40435f 18 API calls 4934->4939 4936 4043c6 8 API calls 4935->4936 4941 4053bd 4936->4941 4937->4923 4954 4050a8 4938->4954 4955 404f23 4939->4955 4940->4935 4945 405189 SendMessageW 4940->4945 4946 4051fb GlobalFree 4942->4946 4942->4950 4943->4942 4944 405371 4944->4935 4951 405383 ShowWindow GetDlgItem ShowWindow 4944->4951 4948 40519c 4945->4948 4946->4950 4947 404ff8 GetWindowLongW SetWindowLongW 4949 405011 4947->4949 4956 4051ad SendMessageW 4948->4956 4952 405017 ShowWindow 4949->4952 4953 40502f 4949->4953 4950->4944 4964 404d9a 4 API calls 4950->4964 4966 40523d 4950->4966 4951->4935 4973 404394 SendMessageW 4952->4973 4974 404394 SendMessageW 4953->4974 4954->4927 4955->4947 4957 404ff2 4955->4957 4961 404f73 SendMessageW 4955->4961 4962 404fc0 SendMessageW 4955->4962 4963 404faf SendMessageW 4955->4963 4956->4929 4957->4947 4957->4949 4958 405281 4967 405347 InvalidateRect 4958->4967 4970 4052e2 4958->4970 4972 4052f5 SendMessageW SendMessageW 4958->4972 4961->4955 4962->4955 4963->4955 4964->4966 4965 40502a 4965->4935 4966->4958 4969 40526b SendMessageW 4966->4969 4967->4944 4968 40535d 4967->4968 4975 404cd5 4968->4975 4969->4958 4970->4972 4972->4958 4973->4965 4974->4926 4978 404c0c 4975->4978 4977 404cea 4977->4944 4979 404c25 4978->4979 4980 40640a 17 API calls 4979->4980 4981 404c89 4980->4981 4982 40640a 17 API calls 4981->4982 4983 404c94 4982->4983 4984 40640a 17 API calls 4983->4984 4985 404caa lstrlenW wsprintfW SetDlgItemTextW 4984->4985 4985->4977 5291 4016cc 5292 402c41 17 API calls 5291->5292 5293 4016d2 GetFullPathNameW 5292->5293 5294 4016ec 5293->5294 5300 40170e 5293->5300 5296 40672b 2 API calls 5294->5296 5294->5300 5295 401723 GetShortPathNameW 5297 402ac5 5295->5297 5298 4016fe 5296->5298 5298->5300 5301 4063e8 lstrcpynW 5298->5301 5300->5295 5300->5297 5301->5300 5302 40234e 5303 402c41 17 API calls 5302->5303 5304 40235d 5303->5304 5305 402c41 17 API calls 5304->5305 5306 402366 5305->5306 5307 402c41 17 API calls 5306->5307 5308 402370 GetPrivateProfileStringW 5307->5308 5309 4044cf lstrlenW 5310 4044f0 WideCharToMultiByte 5309->5310 5311 4044ee 5309->5311 5311->5310 5312 404850 5313 40487c 5312->5313 5314 40488d 5312->5314 5373 405a32 GetDlgItemTextW 5313->5373 5315 404899 GetDlgItem 5314->5315 5322 4048f8 5314->5322 5318 4048ad 5315->5318 5317 404887 5320 40667c 5 API calls 5317->5320 5321 4048c1 SetWindowTextW 5318->5321 5325 405d68 4 API calls 5318->5325 5319 4049dc 5370 404b8b 5319->5370 5375 405a32 GetDlgItemTextW 5319->5375 5320->5314 5326 40435f 18 API calls 5321->5326 5322->5319 5327 40640a 17 API calls 5322->5327 5322->5370 5324 4043c6 8 API calls 5329 404b9f 5324->5329 5330 4048b7 5325->5330 5331 4048dd 5326->5331 5332 40496c SHBrowseForFolderW 5327->5332 5328 404a0c 5333 405dc5 18 API calls 5328->5333 5330->5321 5337 405cbd 3 API calls 5330->5337 5334 40435f 18 API calls 5331->5334 5332->5319 5335 404984 CoTaskMemFree 5332->5335 5336 404a12 5333->5336 5338 4048eb 5334->5338 5339 405cbd 3 API calls 5335->5339 5376 4063e8 lstrcpynW 5336->5376 5337->5321 5374 404394 SendMessageW 5338->5374 5341 404991 5339->5341 5344 4049c8 SetDlgItemTextW 5341->5344 5348 40640a 17 API calls 5341->5348 5343 4048f1 5346 4067c2 5 API calls 5343->5346 5344->5319 5345 404a29 5347 4067c2 5 API calls 5345->5347 5346->5322 5355 404a30 5347->5355 5349 4049b0 lstrcmpiW 5348->5349 5349->5344 5351 4049c1 lstrcatW 5349->5351 5350 404a71 5377 4063e8 lstrcpynW 5350->5377 5351->5344 5353 404a78 5354 405d68 4 API calls 5353->5354 5356 404a7e GetDiskFreeSpaceW 5354->5356 5355->5350 5359 405d09 2 API calls 5355->5359 5360 404ac9 5355->5360 5358 404aa2 MulDiv 5356->5358 5356->5360 5358->5360 5359->5355 5361 404cd5 20 API calls 5360->5361 5371 404b3a 5360->5371 5363 404b27 5361->5363 5362 404b5d 5378 404381 EnableWindow 5362->5378 5365 404b3c SetDlgItemTextW 5363->5365 5366 404b2c 5363->5366 5364 40140b 2 API calls 5364->5362 5365->5371 5368 404c0c 20 API calls 5366->5368 5368->5371 5369 404b79 5369->5370 5379 4047a9 5369->5379 5370->5324 5371->5362 5371->5364 5373->5317 5374->5343 5375->5328 5376->5345 5377->5353 5378->5369 5380 4047b7 5379->5380 5381 4047bc SendMessageW 5379->5381 5380->5381 5381->5370 5382 401b53 5383 402c41 17 API calls 5382->5383 5384 401b5a 5383->5384 5385 402c1f 17 API calls 5384->5385 5386 401b63 wsprintfW 5385->5386 5387 402ac5 5386->5387 5388 401956 5389 402c41 17 API calls 5388->5389 5390 40195d lstrlenW 5389->5390 5391 402592 5390->5391 5399 4014d7 5400 402c1f 17 API calls 5399->5400 5401 4014dd Sleep 5400->5401 5403 402ac5 5401->5403 5404 401f58 5405 402c41 17 API calls 5404->5405 5406 401f5f 5405->5406 5407 40672b 2 API calls 5406->5407 5408 401f65 5407->5408 5409 401f76 5408->5409 5411 40632f wsprintfW 5408->5411 5411->5409 5412 6f981000 5415 6f98101b 5412->5415 5422 6f981516 5415->5422 5417 6f981020 5418 6f981027 GlobalAlloc 5417->5418 5419 6f981024 5417->5419 5418->5419 5420 6f98153d 3 API calls 5419->5420 5421 6f981019 5420->5421 5424 6f98151c 5422->5424 5423 6f981522 5423->5417 5424->5423 5425 6f98152e GlobalFree 5424->5425 5425->5417 5426 402259 5427 402c41 17 API calls 5426->5427 5428 40225f 5427->5428 5429 402c41 17 API calls 5428->5429 5430 402268 5429->5430 5431 402c41 17 API calls 5430->5431 5432 402271 5431->5432 5433 40672b 2 API calls 5432->5433 5434 40227a 5433->5434 5435 40228b lstrlenW lstrlenW 5434->5435 5440 40227e 5434->5440 5437 405450 24 API calls 5435->5437 5436 405450 24 API calls 5438 402286 5436->5438 5439 4022c9 SHFileOperationW 5437->5439 5439->5438 5439->5440 5440->5436 5282 40175c 5283 402c41 17 API calls 5282->5283 5284 401763 5283->5284 5285 405f0d 2 API calls 5284->5285 5286 40176a 5285->5286 5287 405f0d 2 API calls 5286->5287 5287->5286 5441 401d5d GetDlgItem GetClientRect 5442 402c41 17 API calls 5441->5442 5443 401d8f LoadImageW SendMessageW 5442->5443 5444 402ac5 5443->5444 5445 401dad DeleteObject 5443->5445 5445->5444 5446 4022dd 5447 4022f7 5446->5447 5448 4022e4 5446->5448 5449 40640a 17 API calls 5448->5449 5450 4022f1 5449->5450 5451 405a4e MessageBoxIndirectW 5450->5451 5451->5447 5452 401563 5453 402a6b 5452->5453 5456 40632f wsprintfW 5453->5456 5455 402a70 5456->5455 4438 4023e4 4439 402c41 17 API calls 4438->4439 4440 4023f6 4439->4440 4441 402c41 17 API calls 4440->4441 4442 402400 4441->4442 4455 402cd1 4442->4455 4445 402438 4448 402444 4445->4448 4459 402c1f 4445->4459 4446 40288b 4447 402c41 17 API calls 4449 40242e lstrlenW 4447->4449 4451 402463 RegSetValueExW 4448->4451 4462 4031d6 4448->4462 4449->4445 4453 402479 RegCloseKey 4451->4453 4453->4446 4456 402cec 4455->4456 4477 406283 4456->4477 4460 40640a 17 API calls 4459->4460 4461 402c34 4460->4461 4461->4448 4463 403201 4462->4463 4464 4031e5 SetFilePointer 4462->4464 4481 4032de GetTickCount 4463->4481 4464->4463 4467 40329e 4467->4451 4468 405f61 ReadFile 4469 403221 4468->4469 4469->4467 4470 4032de 42 API calls 4469->4470 4471 403238 4470->4471 4471->4467 4472 4032a4 ReadFile 4471->4472 4474 403247 4471->4474 4472->4467 4474->4467 4475 405f61 ReadFile 4474->4475 4476 405f90 WriteFile 4474->4476 4475->4474 4476->4474 4478 406292 4477->4478 4479 402410 4478->4479 4480 40629d RegCreateKeyExW 4478->4480 4479->4445 4479->4446 4479->4447 4480->4479 4482 403436 4481->4482 4483 40330c 4481->4483 4484 402e8e 32 API calls 4482->4484 4494 40345d SetFilePointer 4483->4494 4490 403208 4484->4490 4486 403317 SetFilePointer 4492 40333c 4486->4492 4490->4467 4490->4468 4491 405f90 WriteFile 4491->4492 4492->4490 4492->4491 4493 403417 SetFilePointer 4492->4493 4495 403447 4492->4495 4498 406943 4492->4498 4505 402e8e 4492->4505 4493->4482 4494->4486 4496 405f61 ReadFile 4495->4496 4497 40345a 4496->4497 4497->4492 4499 406968 4498->4499 4500 406970 4498->4500 4499->4492 4500->4499 4501 406a00 GlobalAlloc 4500->4501 4502 4069f7 GlobalFree 4500->4502 4503 406a77 GlobalAlloc 4500->4503 4504 406a6e GlobalFree 4500->4504 4501->4499 4501->4500 4502->4501 4503->4499 4503->4500 4504->4503 4506 402eb7 4505->4506 4507 402e9f 4505->4507 4510 402ec7 GetTickCount 4506->4510 4511 402ebf 4506->4511 4508 402ea8 DestroyWindow 4507->4508 4509 402eaf 4507->4509 4508->4509 4509->4492 4510->4509 4513 402ed5 4510->4513 4520 4067fe 4511->4520 4514 402f0a CreateDialogParamW ShowWindow 4513->4514 4515 402edd 4513->4515 4514->4509 4515->4509 4524 402e72 4515->4524 4517 402eeb wsprintfW 4518 405450 24 API calls 4517->4518 4519 402f08 4518->4519 4519->4509 4521 40681b PeekMessageW 4520->4521 4522 406811 DispatchMessageW 4521->4522 4523 40682b 4521->4523 4522->4521 4523->4509 4525 402e81 4524->4525 4526 402e83 MulDiv 4524->4526 4525->4526 4526->4517 5457 6f98103d 5458 6f98101b 5 API calls 5457->5458 5459 6f981056 5458->5459 5460 4071e5 5463 406976 5460->5463 5461 406a00 GlobalAlloc 5461->5463 5464 4072e1 5461->5464 5462 4069f7 GlobalFree 5462->5461 5463->5461 5463->5462 5463->5463 5463->5464 5465 406a77 GlobalAlloc 5463->5465 5466 406a6e GlobalFree 5463->5466 5465->5463 5465->5464 5466->5465 5467 402868 5468 402c41 17 API calls 5467->5468 5469 40286f FindFirstFileW 5468->5469 5470 402882 5469->5470 5471 402897 5469->5471 5475 40632f wsprintfW 5471->5475 5473 4028a0 5476 4063e8 lstrcpynW 5473->5476 5475->5473 5476->5470 5477 401968 5478 402c1f 17 API calls 5477->5478 5479 40196f 5478->5479 5480 402c1f 17 API calls 5479->5480 5481 40197c 5480->5481 5482 402c41 17 API calls 5481->5482 5483 401993 lstrlenW 5482->5483 5485 4019a4 5483->5485 5484 4019e5 5485->5484 5489 4063e8 lstrcpynW 5485->5489 5487 4019d5 5487->5484 5488 4019da lstrlenW 5487->5488 5488->5484 5489->5487 5490 40166a 5491 402c41 17 API calls 5490->5491 5492 401670 5491->5492 5493 40672b 2 API calls 5492->5493 5494 401676 5493->5494 5015 40176f 5016 402c41 17 API calls 5015->5016 5017 401776 5016->5017 5018 401796 5017->5018 5019 40179e 5017->5019 5055 4063e8 lstrcpynW 5018->5055 5056 4063e8 lstrcpynW 5019->5056 5022 4017a9 5024 405cbd 3 API calls 5022->5024 5023 40179c 5026 40667c 5 API calls 5023->5026 5025 4017af lstrcatW 5024->5025 5025->5023 5039 4017bb 5026->5039 5027 40672b 2 API calls 5027->5039 5028 4017f7 5030 405eb9 2 API calls 5028->5030 5030->5039 5031 4017cd CompareFileTime 5031->5039 5032 40188d 5033 405450 24 API calls 5032->5033 5036 401897 5033->5036 5034 405450 24 API calls 5044 401879 5034->5044 5035 4063e8 lstrcpynW 5035->5039 5037 4031d6 44 API calls 5036->5037 5038 4018aa 5037->5038 5040 4018be SetFileTime 5038->5040 5042 4018d0 CloseHandle 5038->5042 5039->5027 5039->5028 5039->5031 5039->5032 5039->5035 5041 40640a 17 API calls 5039->5041 5051 405a4e MessageBoxIndirectW 5039->5051 5053 401864 5039->5053 5054 405ede GetFileAttributesW CreateFileW 5039->5054 5040->5042 5041->5039 5043 4018e1 5042->5043 5042->5044 5045 4018e6 5043->5045 5046 4018f9 5043->5046 5047 40640a 17 API calls 5045->5047 5048 40640a 17 API calls 5046->5048 5049 4018ee lstrcatW 5047->5049 5050 401901 5048->5050 5049->5050 5052 405a4e MessageBoxIndirectW 5050->5052 5051->5039 5052->5044 5053->5034 5053->5044 5054->5039 5055->5023 5056->5022 5057 4027ef 5058 4027f6 5057->5058 5061 402a70 5057->5061 5059 402c1f 17 API calls 5058->5059 5060 4027fd 5059->5060 5062 40280c SetFilePointer 5060->5062 5062->5061 5063 40281c 5062->5063 5065 40632f wsprintfW 5063->5065 5065->5061 5495 401a72 5496 402c1f 17 API calls 5495->5496 5497 401a7b 5496->5497 5498 402c1f 17 API calls 5497->5498 5499 401a20 5498->5499 5500 406af2 5501 406976 5500->5501 5502 4072e1 5501->5502 5503 406a00 GlobalAlloc 5501->5503 5504 4069f7 GlobalFree 5501->5504 5505 406a77 GlobalAlloc 5501->5505 5506 406a6e GlobalFree 5501->5506 5503->5501 5503->5502 5504->5503 5505->5501 5505->5502 5506->5505 5507 401573 5508 401583 ShowWindow 5507->5508 5509 40158c 5507->5509 5508->5509 5510 402ac5 5509->5510 5511 40159a ShowWindow 5509->5511 5511->5510 5512 401cf3 5513 402c1f 17 API calls 5512->5513 5514 401cf9 IsWindow 5513->5514 5515 401a20 5514->5515 5516 402df3 5517 402e05 SetTimer 5516->5517 5518 402e1e 5516->5518 5517->5518 5519 402e6c 5518->5519 5520 402e72 MulDiv 5518->5520 5521 402e2c wsprintfW SetWindowTextW SetDlgItemTextW 5520->5521 5521->5519 5523 4014f5 SetForegroundWindow 5524 402ac5 5523->5524 5525 402576 5526 402c41 17 API calls 5525->5526 5527 40257d 5526->5527 5530 405ede GetFileAttributesW CreateFileW 5527->5530 5529 402589 5530->5529 5531 401b77 5532 401bc8 5531->5532 5534 401b84 5531->5534 5535 401bf2 GlobalAlloc 5532->5535 5536 401bcd 5532->5536 5533 401c0d 5538 40640a 17 API calls 5533->5538 5545 4022f7 5533->5545 5534->5533 5540 401b9b 5534->5540 5537 40640a 17 API calls 5535->5537 5536->5545 5552 4063e8 lstrcpynW 5536->5552 5537->5533 5539 4022f1 5538->5539 5544 405a4e MessageBoxIndirectW 5539->5544 5550 4063e8 lstrcpynW 5540->5550 5543 401bdf GlobalFree 5543->5545 5544->5545 5546 401baa 5551 4063e8 lstrcpynW 5546->5551 5548 401bb9 5553 4063e8 lstrcpynW 5548->5553 5550->5546 5551->5548 5552->5543 5553->5545 5257 4024f8 5258 402c81 17 API calls 5257->5258 5259 402502 5258->5259 5260 402c1f 17 API calls 5259->5260 5261 40250b 5260->5261 5262 402533 RegEnumValueW 5261->5262 5263 402527 RegEnumKeyW 5261->5263 5266 40288b 5261->5266 5264 40254f RegCloseKey 5262->5264 5265 402548 5262->5265 5263->5264 5264->5266 5265->5264 5268 40167b 5269 402c41 17 API calls 5268->5269 5270 401682 5269->5270 5271 402c41 17 API calls 5270->5271 5272 40168b 5271->5272 5273 402c41 17 API calls 5272->5273 5274 401694 MoveFileW 5273->5274 5275 4016a7 5274->5275 5281 4016a0 5274->5281 5276 40672b 2 API calls 5275->5276 5278 402250 5275->5278 5279 4016b6 5276->5279 5277 401423 24 API calls 5277->5278 5279->5278 5280 4061ae 36 API calls 5279->5280 5280->5281 5281->5277 5561 401e7d 5562 402c41 17 API calls 5561->5562 5563 401e83 5562->5563 5564 402c41 17 API calls 5563->5564 5565 401e8c 5564->5565 5566 402c41 17 API calls 5565->5566 5567 401e95 5566->5567 5568 402c41 17 API calls 5567->5568 5569 401e9e 5568->5569 5570 401423 24 API calls 5569->5570 5571 401ea5 5570->5571 5578 405a14 ShellExecuteExW 5571->5578 5573 401ee7 5576 40288b 5573->5576 5579 406873 WaitForSingleObject 5573->5579 5575 401f01 CloseHandle 5575->5576 5578->5573 5580 40688d 5579->5580 5581 40689f GetExitCodeProcess 5580->5581 5582 4067fe 2 API calls 5580->5582 5581->5575 5583 406894 WaitForSingleObject 5582->5583 5583->5580 5584 4019ff 5585 402c41 17 API calls 5584->5585 5586 401a06 5585->5586 5587 402c41 17 API calls 5586->5587 5588 401a0f 5587->5588 5589 401a16 lstrcmpiW 5588->5589 5590 401a28 lstrcmpW 5588->5590 5591 401a1c 5589->5591 5590->5591 5592 401000 5593 401037 BeginPaint GetClientRect 5592->5593 5594 40100c DefWindowProcW 5592->5594 5596 4010f3 5593->5596 5597 401179 5594->5597 5598 401073 CreateBrushIndirect FillRect DeleteObject 5596->5598 5599 4010fc 5596->5599 5598->5596 5600 401102 CreateFontIndirectW 5599->5600 5601 401167 EndPaint 5599->5601 5600->5601 5602 401112 6 API calls 5600->5602 5601->5597 5602->5601 5603 6f981058 5605 6f981074 5603->5605 5604 6f9810dd 5605->5604 5606 6f981516 GlobalFree 5605->5606 5607 6f981092 5605->5607 5606->5607 5608 6f981516 GlobalFree 5607->5608 5609 6f9810a2 5608->5609 5610 6f9810a9 GlobalSize 5609->5610 5611 6f9810b2 5609->5611 5610->5611 5612 6f9810c7 5611->5612 5613 6f9810b6 GlobalAlloc 5611->5613 5615 6f9810d2 GlobalFree 5612->5615 5614 6f98153d 3 API calls 5613->5614 5614->5612 5615->5604 5616 6f9818d9 5618 6f9818fc 5616->5618 5617 6f981943 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5620 6f981272 2 API calls 5617->5620 5618->5617 5619 6f981931 GlobalFree 5618->5619 5619->5617 5621 6f981ace GlobalFree GlobalFree 5620->5621 5622 401503 5623 40150b 5622->5623 5625 40151e 5622->5625 5624 402c1f 17 API calls 5623->5624 5624->5625 4527 402484 4538 402c81 4527->4538 4530 402c41 17 API calls 4531 402497 4530->4531 4532 4024a2 RegQueryValueExW 4531->4532 4534 40288b 4531->4534 4533 4024c2 4532->4533 4535 4024c8 RegCloseKey 4532->4535 4533->4535 4543 40632f wsprintfW 4533->4543 4535->4534 4539 402c41 17 API calls 4538->4539 4540 402c98 4539->4540 4541 406255 RegOpenKeyExW 4540->4541 4542 40248e 4541->4542 4542->4530 4543->4535 5626 402104 5627 402c41 17 API calls 5626->5627 5628 40210b 5627->5628 5629 402c41 17 API calls 5628->5629 5630 402115 5629->5630 5631 402c41 17 API calls 5630->5631 5632 40211f 5631->5632 5633 402c41 17 API calls 5632->5633 5634 402129 5633->5634 5635 402c41 17 API calls 5634->5635 5637 402133 5635->5637 5636 402172 CoCreateInstance 5641 402191 5636->5641 5637->5636 5638 402c41 17 API calls 5637->5638 5638->5636 5639 401423 24 API calls 5640 402250 5639->5640 5641->5639 5641->5640 4787 403e86 4788 403fd9 4787->4788 4789 403e9e 4787->4789 4790 403fea GetDlgItem GetDlgItem 4788->4790 4799 40402a 4788->4799 4789->4788 4791 403eaa 4789->4791 4792 40435f 18 API calls 4790->4792 4794 403eb5 SetWindowPos 4791->4794 4795 403ec8 4791->4795 4798 404014 SetClassLongW 4792->4798 4793 404084 4800 4043ab SendMessageW 4793->4800 4805 403fd4 4793->4805 4794->4795 4796 403ee5 4795->4796 4797 403ecd ShowWindow 4795->4797 4801 403f07 4796->4801 4802 403eed DestroyWindow 4796->4802 4797->4796 4803 40140b 2 API calls 4798->4803 4799->4793 4804 401389 2 API calls 4799->4804 4827 404096 4800->4827 4807 403f0c SetWindowLongW 4801->4807 4808 403f1d 4801->4808 4806 404309 4802->4806 4803->4799 4809 40405c 4804->4809 4806->4805 4815 404319 ShowWindow 4806->4815 4807->4805 4812 403fc6 4808->4812 4813 403f29 GetDlgItem 4808->4813 4809->4793 4814 404060 SendMessageW 4809->4814 4810 40140b 2 API calls 4810->4827 4811 4042ea DestroyWindow EndDialog 4811->4806 4868 4043c6 4812->4868 4816 403f59 4813->4816 4817 403f3c SendMessageW IsWindowEnabled 4813->4817 4814->4805 4815->4805 4820 403f66 4816->4820 4822 403fad SendMessageW 4816->4822 4823 403f79 4816->4823 4831 403f5e 4816->4831 4817->4805 4817->4816 4819 40640a 17 API calls 4819->4827 4820->4822 4820->4831 4822->4812 4824 403f81 4823->4824 4825 403f96 4823->4825 4828 40140b 2 API calls 4824->4828 4829 40140b 2 API calls 4825->4829 4826 403f94 4826->4812 4827->4805 4827->4810 4827->4811 4827->4819 4830 40435f 18 API calls 4827->4830 4849 40422a DestroyWindow 4827->4849 4859 40435f 4827->4859 4828->4831 4832 403f9d 4829->4832 4830->4827 4865 404338 4831->4865 4832->4812 4832->4831 4834 404111 GetDlgItem 4835 404126 4834->4835 4836 40412e ShowWindow KiUserCallbackDispatcher 4834->4836 4835->4836 4862 404381 EnableWindow 4836->4862 4838 404158 EnableWindow 4843 40416c 4838->4843 4839 404171 GetSystemMenu EnableMenuItem SendMessageW 4840 4041a1 SendMessageW 4839->4840 4839->4843 4840->4843 4842 403e67 18 API calls 4842->4843 4843->4839 4843->4842 4863 404394 SendMessageW 4843->4863 4864 4063e8 lstrcpynW 4843->4864 4845 4041d0 lstrlenW 4846 40640a 17 API calls 4845->4846 4847 4041e6 SetWindowTextW 4846->4847 4848 401389 2 API calls 4847->4848 4848->4827 4849->4806 4850 404244 CreateDialogParamW 4849->4850 4850->4806 4851 404277 4850->4851 4852 40435f 18 API calls 4851->4852 4853 404282 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4852->4853 4854 401389 2 API calls 4853->4854 4855 4042c8 4854->4855 4855->4805 4856 4042d0 ShowWindow 4855->4856 4857 4043ab SendMessageW 4856->4857 4858 4042e8 4857->4858 4858->4806 4860 40640a 17 API calls 4859->4860 4861 40436a SetDlgItemTextW 4860->4861 4861->4834 4862->4838 4863->4843 4864->4845 4866 404345 SendMessageW 4865->4866 4867 40433f 4865->4867 4866->4826 4867->4866 4869 404489 4868->4869 4870 4043de GetWindowLongW 4868->4870 4869->4805 4870->4869 4871 4043f3 4870->4871 4871->4869 4872 404420 GetSysColor 4871->4872 4873 404423 4871->4873 4872->4873 4874 404433 SetBkMode 4873->4874 4875 404429 SetTextColor 4873->4875 4876 404451 4874->4876 4877 40444b GetSysColor 4874->4877 4875->4874 4878 404458 SetBkColor 4876->4878 4879 404462 4876->4879 4877->4876 4878->4879 4879->4869 4880 404475 DeleteObject 4879->4880 4881 40447c CreateBrushIndirect 4879->4881 4880->4881 4881->4869 5642 401f06 5643 402c41 17 API calls 5642->5643 5644 401f0c 5643->5644 5645 405450 24 API calls 5644->5645 5646 401f16 5645->5646 5647 4059d1 2 API calls 5646->5647 5648 401f1c 5647->5648 5649 40288b 5648->5649 5650 406873 5 API calls 5648->5650 5653 401f3f CloseHandle 5648->5653 5652 401f31 5650->5652 5652->5653 5655 40632f wsprintfW 5652->5655 5653->5649 5655->5653 5656 404809 5657 404819 5656->5657 5658 40483f 5656->5658 5659 40435f 18 API calls 5657->5659 5660 4043c6 8 API calls 5658->5660 5661 404826 SetDlgItemTextW 5659->5661 5662 40484b 5660->5662 5661->5658 5663 6f9816d4 5664 6f981703 5663->5664 5665 6f981b5f 22 API calls 5664->5665 5666 6f98170a 5665->5666 5667 6f98171d 5666->5667 5668 6f981711 5666->5668 5670 6f981744 5667->5670 5671 6f981727 5667->5671 5669 6f981272 2 API calls 5668->5669 5674 6f98171b 5669->5674 5672 6f98174a 5670->5672 5673 6f98176e 5670->5673 5675 6f98153d 3 API calls 5671->5675 5676 6f9815b4 3 API calls 5672->5676 5677 6f98153d 3 API calls 5673->5677 5678 6f98172c 5675->5678 5679 6f98174f 5676->5679 5677->5674 5680 6f9815b4 3 API calls 5678->5680 5681 6f981272 2 API calls 5679->5681 5682 6f981732 5680->5682 5683 6f981755 GlobalFree 5681->5683 5684 6f981272 2 API calls 5682->5684 5683->5674 5686 6f981769 GlobalFree 5683->5686 5685 6f981738 GlobalFree 5684->5685 5685->5674 5686->5674 5687 40190c 5688 401943 5687->5688 5689 402c41 17 API calls 5688->5689 5690 401948 5689->5690 5691 405afa 67 API calls 5690->5691 5692 401951 5691->5692 5693 40230c 5694 402314 5693->5694 5695 40231a 5693->5695 5696 402c41 17 API calls 5694->5696 5697 402328 5695->5697 5698 402c41 17 API calls 5695->5698 5696->5695 5699 402336 5697->5699 5700 402c41 17 API calls 5697->5700 5698->5697 5701 402c41 17 API calls 5699->5701 5700->5699 5702 40233f WritePrivateProfileStringW 5701->5702 5703 401f8c 5704 402c41 17 API calls 5703->5704 5705 401f93 5704->5705 5706 4067c2 5 API calls 5705->5706 5707 401fa2 5706->5707 5708 401fbe GlobalAlloc 5707->5708 5709 402026 5707->5709 5708->5709 5710 401fd2 5708->5710 5711 4067c2 5 API calls 5710->5711 5712 401fd9 5711->5712 5713 4067c2 5 API calls 5712->5713 5714 401fe3 5713->5714 5714->5709 5718 40632f wsprintfW 5714->5718 5716 402018 5719 40632f wsprintfW 5716->5719 5718->5716 5719->5709 4986 40238e 4987 4023c1 4986->4987 4988 402396 4986->4988 4990 402c41 17 API calls 4987->4990 4989 402c81 17 API calls 4988->4989 4991 40239d 4989->4991 4992 4023c8 4990->4992 4993 4023a7 4991->4993 4996 4023d5 4991->4996 4998 402cff 4992->4998 4995 402c41 17 API calls 4993->4995 4997 4023ae RegDeleteValueW RegCloseKey 4995->4997 4997->4996 4999 402d0c 4998->4999 5000 402d13 4998->5000 4999->4996 5000->4999 5002 402d44 5000->5002 5003 406255 RegOpenKeyExW 5002->5003 5004 402d72 5003->5004 5005 402d76 5004->5005 5006 402dec 5004->5006 5007 402d98 RegEnumKeyW 5005->5007 5008 402daf RegCloseKey 5005->5008 5009 402dd0 RegCloseKey 5005->5009 5011 402d44 6 API calls 5005->5011 5006->4999 5007->5005 5007->5008 5010 4067c2 5 API calls 5008->5010 5009->5006 5012 402dbf 5010->5012 5011->5005 5013 402de0 RegDeleteKeyW 5012->5013 5014 402dc3 5012->5014 5013->5006 5014->5006 5720 40190f 5721 402c41 17 API calls 5720->5721 5722 401916 5721->5722 5723 405a4e MessageBoxIndirectW 5722->5723 5724 40191f 5723->5724 5725 6f982c57 5726 6f982c6f 5725->5726 5727 6f98158f 2 API calls 5726->5727 5728 6f982c8a 5727->5728 5729 40558f 5730 4055b0 GetDlgItem GetDlgItem GetDlgItem 5729->5730 5731 405739 5729->5731 5774 404394 SendMessageW 5730->5774 5733 405742 GetDlgItem CreateThread CloseHandle 5731->5733 5736 40576a 5731->5736 5733->5736 5734 405620 5740 405627 GetClientRect GetSystemMetrics SendMessageW SendMessageW 5734->5740 5735 405795 5739 4057f5 5735->5739 5742 4057a9 5735->5742 5743 4057cf ShowWindow 5735->5743 5736->5735 5737 405781 ShowWindow ShowWindow 5736->5737 5738 4057ba 5736->5738 5776 404394 SendMessageW 5737->5776 5744 4043c6 8 API calls 5738->5744 5739->5738 5750 405803 SendMessageW 5739->5750 5748 405695 5740->5748 5749 405679 SendMessageW SendMessageW 5740->5749 5751 404338 SendMessageW 5742->5751 5746 4057e1 5743->5746 5747 4057ef 5743->5747 5745 4057c8 5744->5745 5752 405450 24 API calls 5746->5752 5753 404338 SendMessageW 5747->5753 5754 4056a8 5748->5754 5755 40569a SendMessageW 5748->5755 5749->5748 5750->5745 5756 40581c CreatePopupMenu 5750->5756 5751->5738 5752->5747 5753->5739 5758 40435f 18 API calls 5754->5758 5755->5754 5757 40640a 17 API calls 5756->5757 5759 40582c AppendMenuW 5757->5759 5760 4056b8 5758->5760 5761 405849 GetWindowRect 5759->5761 5762 40585c TrackPopupMenu 5759->5762 5763 4056c1 ShowWindow 5760->5763 5764 4056f5 GetDlgItem SendMessageW 5760->5764 5761->5762 5762->5745 5766 405877 5762->5766 5767 4056e4 5763->5767 5768 4056d7 ShowWindow 5763->5768 5764->5745 5765 40571c SendMessageW SendMessageW 5764->5765 5765->5745 5769 405893 SendMessageW 5766->5769 5775 404394 SendMessageW 5767->5775 5768->5767 5769->5769 5770 4058b0 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5769->5770 5772 4058d5 SendMessageW 5770->5772 5772->5772 5773 4058fe GlobalUnlock SetClipboardData CloseClipboard 5772->5773 5773->5745 5774->5734 5775->5764 5776->5735 5777 401491 5778 405450 24 API calls 5777->5778 5779 401498 5778->5779 5787 401d14 5788 402c1f 17 API calls 5787->5788 5789 401d1b 5788->5789 5790 402c1f 17 API calls 5789->5790 5791 401d27 GetDlgItem 5790->5791 5792 402592 5791->5792 5793 404495 lstrcpynW lstrlenW 5794 403a96 5795 403aa1 5794->5795 5796 403aa5 5795->5796 5797 403aa8 GlobalAlloc 5795->5797 5797->5796 5798 402598 5799 4025c7 5798->5799 5800 4025ac 5798->5800 5802 4025fb 5799->5802 5803 4025cc 5799->5803 5801 402c1f 17 API calls 5800->5801 5811 4025b3 5801->5811 5805 402c41 17 API calls 5802->5805 5804 402c41 17 API calls 5803->5804 5806 4025d3 WideCharToMultiByte lstrlenA 5804->5806 5807 402602 lstrlenW 5805->5807 5806->5811 5807->5811 5808 402645 5809 40262f 5809->5808 5810 405f90 WriteFile 5809->5810 5810->5808 5811->5808 5811->5809 5812 405fbf 5 API calls 5811->5812 5812->5809 5813 40451e 5814 404536 5813->5814 5817 404650 5813->5817 5818 40435f 18 API calls 5814->5818 5815 4046ba 5816 4046c4 GetDlgItem 5815->5816 5819 404784 5815->5819 5820 404745 5816->5820 5821 4046de 5816->5821 5817->5815 5817->5819 5822 40468b GetDlgItem SendMessageW 5817->5822 5823 40459d 5818->5823 5824 4043c6 8 API calls 5819->5824 5820->5819 5825 404757 5820->5825 5821->5820 5829 404704 SendMessageW LoadCursorW SetCursor 5821->5829 5846 404381 EnableWindow 5822->5846 5827 40435f 18 API calls 5823->5827 5828 40477f 5824->5828 5830 40476d 5825->5830 5831 40475d SendMessageW 5825->5831 5833 4045aa CheckDlgButton 5827->5833 5847 4047cd 5829->5847 5830->5828 5836 404773 SendMessageW 5830->5836 5831->5830 5832 4046b5 5837 4047a9 SendMessageW 5832->5837 5844 404381 EnableWindow 5833->5844 5836->5828 5837->5815 5839 4045c8 GetDlgItem 5845 404394 SendMessageW 5839->5845 5841 4045de SendMessageW 5842 404604 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5841->5842 5843 4045fb GetSysColor 5841->5843 5842->5828 5843->5842 5844->5839 5845->5841 5846->5832 5850 405a14 ShellExecuteExW 5847->5850 5849 404733 LoadCursorW SetCursor 5849->5820 5850->5849 5851 40149e 5852 4014ac PostQuitMessage 5851->5852 5853 4022f7 5851->5853 5852->5853 5854 401c1f 5855 402c1f 17 API calls 5854->5855 5856 401c26 5855->5856 5857 402c1f 17 API calls 5856->5857 5858 401c33 5857->5858 5859 401c48 5858->5859 5860 402c41 17 API calls 5858->5860 5863 402c41 17 API calls 5859->5863 5866 401c58 5859->5866 5860->5859 5861 401c63 5864 402c1f 17 API calls 5861->5864 5862 401caf 5865 402c41 17 API calls 5862->5865 5863->5866 5867 401c68 5864->5867 5868 401cb4 5865->5868 5866->5861 5866->5862 5869 402c1f 17 API calls 5867->5869 5870 402c41 17 API calls 5868->5870 5871 401c74 5869->5871 5872 401cbd FindWindowExW 5870->5872 5873 401c81 SendMessageTimeoutW 5871->5873 5874 401c9f SendMessageW 5871->5874 5875 401cdf 5872->5875 5873->5875 5874->5875 5876 402aa0 SendMessageW 5877 402ac5 5876->5877 5878 402aba InvalidateRect 5876->5878 5878->5877 5879 402821 5880 402827 5879->5880 5881 402ac5 5880->5881 5882 40282f FindClose 5880->5882 5882->5881 5883 4015a3 5884 402c41 17 API calls 5883->5884 5885 4015aa SetFileAttributesW 5884->5885 5886 4015bc 5885->5886 4544 4034a5 SetErrorMode GetVersion 4545 4034e4 4544->4545 4546 4034ea 4544->4546 4547 4067c2 5 API calls 4545->4547 4548 406752 3 API calls 4546->4548 4547->4546 4549 403500 lstrlenA 4548->4549 4549->4546 4550 403510 4549->4550 4551 4067c2 5 API calls 4550->4551 4552 403517 4551->4552 4553 4067c2 5 API calls 4552->4553 4554 40351e 4553->4554 4555 4067c2 5 API calls 4554->4555 4556 40352a #17 OleInitialize SHGetFileInfoW 4555->4556 4634 4063e8 lstrcpynW 4556->4634 4559 403576 GetCommandLineW 4635 4063e8 lstrcpynW 4559->4635 4561 403588 4562 405cea CharNextW 4561->4562 4563 4035ad CharNextW 4562->4563 4564 4036d7 GetTempPathW 4563->4564 4572 4035c6 4563->4572 4636 403474 4564->4636 4566 4036ef 4567 4036f3 GetWindowsDirectoryW lstrcatW 4566->4567 4568 403749 DeleteFileW 4566->4568 4569 403474 12 API calls 4567->4569 4646 402f30 GetTickCount GetModuleFileNameW 4568->4646 4573 40370f 4569->4573 4570 405cea CharNextW 4570->4572 4572->4570 4579 4036c2 4572->4579 4580 4036c0 4572->4580 4573->4568 4575 403713 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4573->4575 4574 40375d 4576 403810 4574->4576 4581 403800 4574->4581 4585 405cea CharNextW 4574->4585 4578 403474 12 API calls 4575->4578 4735 4039e6 4576->4735 4583 403741 4578->4583 4732 4063e8 lstrcpynW 4579->4732 4580->4564 4676 403ad8 4581->4676 4583->4568 4583->4576 4598 40377c 4585->4598 4587 40394a 4590 403952 GetCurrentProcess OpenProcessToken 4587->4590 4591 4039ce ExitProcess 4587->4591 4588 40382a 4744 405a4e 4588->4744 4596 40396a LookupPrivilegeValueW AdjustTokenPrivileges 4590->4596 4597 40399e 4590->4597 4594 403840 4600 4059b9 5 API calls 4594->4600 4595 4037da 4599 405dc5 18 API calls 4595->4599 4596->4597 4601 4067c2 5 API calls 4597->4601 4598->4594 4598->4595 4602 4037e6 4599->4602 4603 403845 lstrcatW 4600->4603 4604 4039a5 4601->4604 4602->4576 4733 4063e8 lstrcpynW 4602->4733 4605 403861 lstrcatW lstrcmpiW 4603->4605 4606 403856 lstrcatW 4603->4606 4607 4039ba ExitWindowsEx 4604->4607 4608 4039c7 4604->4608 4605->4576 4610 40387d 4605->4610 4606->4605 4607->4591 4607->4608 4611 40140b 2 API calls 4608->4611 4613 403882 4610->4613 4614 403889 4610->4614 4611->4591 4612 4037f5 4734 4063e8 lstrcpynW 4612->4734 4616 40591f 4 API calls 4613->4616 4617 40599c 2 API calls 4614->4617 4619 403887 4616->4619 4618 40388e SetCurrentDirectoryW 4617->4618 4620 4038a9 4618->4620 4621 40389e 4618->4621 4619->4618 4749 4063e8 lstrcpynW 4620->4749 4748 4063e8 lstrcpynW 4621->4748 4624 40640a 17 API calls 4625 4038e8 DeleteFileW 4624->4625 4626 4038f5 CopyFileW 4625->4626 4631 4038b7 4625->4631 4626->4631 4627 40393e 4628 4061ae 36 API calls 4627->4628 4628->4576 4629 4061ae 36 API calls 4629->4631 4630 40640a 17 API calls 4630->4631 4631->4624 4631->4627 4631->4629 4631->4630 4633 403929 CloseHandle 4631->4633 4750 4059d1 CreateProcessW 4631->4750 4633->4631 4634->4559 4635->4561 4637 40667c 5 API calls 4636->4637 4638 403480 4637->4638 4639 40348a 4638->4639 4640 405cbd 3 API calls 4638->4640 4639->4566 4641 403492 4640->4641 4642 40599c 2 API calls 4641->4642 4643 403498 4642->4643 4753 405f0d 4643->4753 4757 405ede GetFileAttributesW CreateFileW 4646->4757 4648 402f73 4675 402f80 4648->4675 4758 4063e8 lstrcpynW 4648->4758 4650 402f96 4651 405d09 2 API calls 4650->4651 4652 402f9c 4651->4652 4759 4063e8 lstrcpynW 4652->4759 4654 402fa7 GetFileSize 4655 4030a8 4654->4655 4673 402fbe 4654->4673 4656 402e8e 32 API calls 4655->4656 4657 4030af 4656->4657 4659 4030eb GlobalAlloc 4657->4659 4657->4675 4761 40345d SetFilePointer 4657->4761 4658 403447 ReadFile 4658->4673 4663 403102 4659->4663 4660 403143 4661 402e8e 32 API calls 4660->4661 4661->4675 4667 405f0d 2 API calls 4663->4667 4664 4030cc 4665 403447 ReadFile 4664->4665 4668 4030d7 4665->4668 4666 402e8e 32 API calls 4666->4673 4669 403113 CreateFileW 4667->4669 4668->4659 4668->4675 4670 40314d 4669->4670 4669->4675 4760 40345d SetFilePointer 4670->4760 4672 40315b 4674 4031d6 44 API calls 4672->4674 4673->4655 4673->4658 4673->4660 4673->4666 4673->4675 4674->4675 4675->4574 4677 4067c2 5 API calls 4676->4677 4678 403aec 4677->4678 4679 403af2 4678->4679 4680 403b04 4678->4680 4770 40632f wsprintfW 4679->4770 4681 4062b6 3 API calls 4680->4681 4682 403b34 4681->4682 4683 403b53 lstrcatW 4682->4683 4685 4062b6 3 API calls 4682->4685 4686 403b02 4683->4686 4685->4683 4762 403dae 4686->4762 4689 405dc5 18 API calls 4690 403b85 4689->4690 4691 403c19 4690->4691 4693 4062b6 3 API calls 4690->4693 4692 405dc5 18 API calls 4691->4692 4694 403c1f 4692->4694 4695 403bb7 4693->4695 4696 403c2f LoadImageW 4694->4696 4699 40640a 17 API calls 4694->4699 4695->4691 4702 403bd8 lstrlenW 4695->4702 4706 405cea CharNextW 4695->4706 4697 403cd5 4696->4697 4698 403c56 RegisterClassW 4696->4698 4701 40140b 2 API calls 4697->4701 4700 403c8c SystemParametersInfoW CreateWindowExW 4698->4700 4731 403cdf 4698->4731 4699->4696 4700->4697 4705 403cdb 4701->4705 4703 403be6 lstrcmpiW 4702->4703 4704 403c0c 4702->4704 4703->4704 4707 403bf6 GetFileAttributesW 4703->4707 4708 405cbd 3 API calls 4704->4708 4711 403dae 18 API calls 4705->4711 4705->4731 4709 403bd5 4706->4709 4710 403c02 4707->4710 4712 403c12 4708->4712 4709->4702 4710->4704 4713 405d09 2 API calls 4710->4713 4714 403cec 4711->4714 4771 4063e8 lstrcpynW 4712->4771 4713->4704 4716 403cf8 ShowWindow 4714->4716 4717 403d7b 4714->4717 4719 406752 3 API calls 4716->4719 4772 405523 OleInitialize 4717->4772 4721 403d10 4719->4721 4720 403d81 4722 403d85 4720->4722 4723 403d9d 4720->4723 4724 403d1e GetClassInfoW 4721->4724 4726 406752 3 API calls 4721->4726 4730 40140b 2 API calls 4722->4730 4722->4731 4725 40140b 2 API calls 4723->4725 4727 403d32 GetClassInfoW RegisterClassW 4724->4727 4728 403d48 DialogBoxParamW 4724->4728 4725->4731 4726->4724 4727->4728 4729 40140b 2 API calls 4728->4729 4729->4731 4730->4731 4731->4576 4732->4580 4733->4612 4734->4581 4736 403a01 4735->4736 4737 4039f7 CloseHandle 4735->4737 4738 403a15 4736->4738 4739 403a0b CloseHandle 4736->4739 4737->4736 4783 403a43 4738->4783 4739->4738 4742 405afa 67 API calls 4743 403819 OleUninitialize 4742->4743 4743->4587 4743->4588 4745 405a63 4744->4745 4746 403838 ExitProcess 4745->4746 4747 405a77 MessageBoxIndirectW 4745->4747 4747->4746 4748->4620 4749->4631 4751 405a10 4750->4751 4752 405a04 CloseHandle 4750->4752 4751->4631 4752->4751 4754 405f1a GetTickCount GetTempFileNameW 4753->4754 4755 405f50 4754->4755 4756 4034a3 4754->4756 4755->4754 4755->4756 4756->4566 4757->4648 4758->4650 4759->4654 4760->4672 4761->4664 4763 403dc2 4762->4763 4779 40632f wsprintfW 4763->4779 4765 403e33 4780 403e67 4765->4780 4767 403b63 4767->4689 4768 403e38 4768->4767 4769 40640a 17 API calls 4768->4769 4769->4768 4770->4686 4771->4691 4773 4043ab SendMessageW 4772->4773 4774 405546 4773->4774 4777 40556d 4774->4777 4778 401389 2 API calls 4774->4778 4775 4043ab SendMessageW 4776 40557f OleUninitialize 4775->4776 4776->4720 4777->4775 4778->4774 4779->4765 4781 40640a 17 API calls 4780->4781 4782 403e75 SetWindowTextW 4781->4782 4782->4768 4784 403a51 4783->4784 4785 403a1a 4784->4785 4786 403a56 FreeLibrary GlobalFree 4784->4786 4785->4742 4786->4785 4786->4786 5887 6f9822fd 5888 6f982367 5887->5888 5889 6f982372 GlobalAlloc 5888->5889 5890 6f982391 5888->5890 5889->5888 5891 404ba6 5892 404bd2 5891->5892 5893 404bb6 5891->5893 5894 404c05 5892->5894 5895 404bd8 SHGetPathFromIDListW 5892->5895 5902 405a32 GetDlgItemTextW 5893->5902 5897 404bef SendMessageW 5895->5897 5898 404be8 5895->5898 5897->5894 5900 40140b 2 API calls 5898->5900 5899 404bc3 SendMessageW 5899->5892 5900->5897 5902->5899 5917 4029a8 5918 402c1f 17 API calls 5917->5918 5919 4029ae 5918->5919 5920 4029d5 5919->5920 5921 4029ee 5919->5921 5929 40288b 5919->5929 5924 4029da 5920->5924 5925 4029eb 5920->5925 5922 402a08 5921->5922 5923 4029f8 5921->5923 5927 40640a 17 API calls 5922->5927 5926 402c1f 17 API calls 5923->5926 5931 4063e8 lstrcpynW 5924->5931 5925->5929 5932 40632f wsprintfW 5925->5932 5926->5925 5927->5925 5931->5929 5932->5929 5933 4028ad 5934 402c41 17 API calls 5933->5934 5936 4028bb 5934->5936 5935 4028d1 5938 405eb9 2 API calls 5935->5938 5936->5935 5937 402c41 17 API calls 5936->5937 5937->5935 5939 4028d7 5938->5939 5961 405ede GetFileAttributesW CreateFileW 5939->5961 5941 4028e4 5942 4028f0 GlobalAlloc 5941->5942 5943 402987 5941->5943 5944 402909 5942->5944 5945 40297e CloseHandle 5942->5945 5946 4029a2 5943->5946 5947 40298f DeleteFileW 5943->5947 5962 40345d SetFilePointer 5944->5962 5945->5943 5947->5946 5949 40290f 5950 403447 ReadFile 5949->5950 5951 402918 GlobalAlloc 5950->5951 5952 402928 5951->5952 5953 40295c 5951->5953 5955 4031d6 44 API calls 5952->5955 5954 405f90 WriteFile 5953->5954 5956 402968 GlobalFree 5954->5956 5960 402935 5955->5960 5957 4031d6 44 API calls 5956->5957 5959 40297b 5957->5959 5958 402953 GlobalFree 5958->5953 5959->5945 5960->5958 5961->5941 5962->5949 5970 401a30 5971 402c41 17 API calls 5970->5971 5972 401a39 ExpandEnvironmentStringsW 5971->5972 5973 401a4d 5972->5973 5975 401a60 5972->5975 5974 401a52 lstrcmpW 5973->5974 5973->5975 5974->5975 5066 402032 5067 402044 5066->5067 5068 4020f6 5066->5068 5069 402c41 17 API calls 5067->5069 5070 401423 24 API calls 5068->5070 5071 40204b 5069->5071 5072 402250 5070->5072 5073 402c41 17 API calls 5071->5073 5074 402054 5073->5074 5075 40206a LoadLibraryExW 5074->5075 5076 40205c GetModuleHandleW 5074->5076 5075->5068 5077 40207b 5075->5077 5076->5075 5076->5077 5089 406831 WideCharToMultiByte 5077->5089 5080 4020c5 5082 405450 24 API calls 5080->5082 5081 40208c 5083 402094 5081->5083 5084 4020ab 5081->5084 5085 40209c 5082->5085 5086 401423 24 API calls 5083->5086 5092 6f981777 5084->5092 5085->5072 5087 4020e8 FreeLibrary 5085->5087 5086->5085 5087->5072 5090 40685b GetProcAddress 5089->5090 5091 402086 5089->5091 5090->5091 5091->5080 5091->5081 5093 6f9817aa 5092->5093 5134 6f981b5f 5093->5134 5095 6f9817b1 5096 6f9818d6 5095->5096 5097 6f9817c9 5095->5097 5098 6f9817c2 5095->5098 5096->5085 5168 6f982394 5097->5168 5184 6f982352 5098->5184 5103 6f98182d 5107 6f98187e 5103->5107 5108 6f981833 5103->5108 5104 6f98180f 5197 6f982569 5104->5197 5105 6f9817f8 5122 6f9817ee 5105->5122 5194 6f982d37 5105->5194 5106 6f9817df 5110 6f9817e5 5106->5110 5115 6f9817f0 5106->5115 5113 6f982569 10 API calls 5107->5113 5216 6f9815c6 5108->5216 5110->5122 5178 6f982aac 5110->5178 5123 6f98186f 5113->5123 5114 6f981815 5208 6f9815b4 5114->5208 5188 6f982724 5115->5188 5120 6f9817f6 5120->5122 5121 6f982569 10 API calls 5121->5123 5122->5103 5122->5104 5125 6f9818c5 5123->5125 5222 6f98252c 5123->5222 5125->5096 5128 6f9818cf GlobalFree 5125->5128 5128->5096 5131 6f9818b1 5131->5125 5226 6f98153d wsprintfW 5131->5226 5132 6f9818aa FreeLibrary 5132->5131 5229 6f98121b GlobalAlloc 5134->5229 5136 6f981b83 5230 6f98121b GlobalAlloc 5136->5230 5138 6f981da9 GlobalFree GlobalFree GlobalFree 5139 6f981dc6 5138->5139 5154 6f981e10 5138->5154 5141 6f982192 5139->5141 5150 6f981ddb 5139->5150 5139->5154 5140 6f981c64 GlobalAlloc 5160 6f981b8e 5140->5160 5142 6f9821b4 GetModuleHandleW 5141->5142 5141->5154 5145 6f9821da 5142->5145 5146 6f9821c5 LoadLibraryW 5142->5146 5143 6f981caf lstrcpyW 5147 6f981cb9 lstrcpyW 5143->5147 5144 6f981ccd GlobalFree 5144->5160 5237 6f98161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5145->5237 5146->5145 5146->5154 5147->5160 5149 6f98222c 5152 6f982239 lstrlenW 5149->5152 5149->5154 5150->5154 5233 6f98122c 5150->5233 5238 6f98161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5152->5238 5153 6f982064 5236 6f98121b GlobalAlloc 5153->5236 5154->5095 5155 6f9821ec 5155->5149 5166 6f982216 GetProcAddress 5155->5166 5156 6f9820ec 5156->5154 5162 6f982134 lstrcpyW 5156->5162 5159 6f981d0b 5159->5160 5231 6f98158f GlobalSize GlobalAlloc 5159->5231 5160->5138 5160->5140 5160->5143 5160->5144 5160->5147 5160->5153 5160->5154 5160->5156 5160->5159 5161 6f981fa5 GlobalFree 5160->5161 5164 6f98122c 2 API calls 5160->5164 5161->5160 5162->5154 5163 6f982253 5163->5154 5164->5160 5166->5149 5167 6f98206d 5167->5095 5174 6f9823ac 5168->5174 5169 6f98122c GlobalAlloc lstrcpynW 5169->5174 5171 6f9824d5 GlobalFree 5172 6f9817cf 5171->5172 5171->5174 5172->5105 5172->5106 5172->5122 5173 6f98247f GlobalAlloc CLSIDFromString 5173->5171 5174->5169 5174->5171 5174->5173 5175 6f982454 GlobalAlloc WideCharToMultiByte 5174->5175 5177 6f98249e 5174->5177 5240 6f9812ba 5174->5240 5175->5171 5177->5171 5244 6f9826b8 5177->5244 5181 6f982abe 5178->5181 5179 6f982b63 CreateFileA 5180 6f982b81 5179->5180 5247 6f982a56 5180->5247 5181->5179 5183 6f982c4d 5183->5122 5185 6f982367 5184->5185 5186 6f982372 GlobalAlloc 5185->5186 5187 6f9817c8 5185->5187 5186->5185 5187->5097 5192 6f982754 5188->5192 5189 6f9827ef GlobalAlloc 5193 6f982812 5189->5193 5190 6f982802 5191 6f982808 GlobalSize 5190->5191 5190->5193 5191->5193 5192->5189 5192->5190 5193->5120 5196 6f982d42 5194->5196 5195 6f982d82 GlobalFree 5196->5195 5251 6f98121b GlobalAlloc 5197->5251 5199 6f9825ec MultiByteToWideChar 5205 6f982573 5199->5205 5200 6f98260e StringFromGUID2 5200->5205 5201 6f98261f lstrcpynW 5201->5205 5202 6f982632 wsprintfW 5202->5205 5203 6f982656 GlobalFree 5203->5205 5204 6f98268b GlobalFree 5204->5114 5205->5199 5205->5200 5205->5201 5205->5202 5205->5203 5205->5204 5206 6f981272 2 API calls 5205->5206 5252 6f9812e1 5205->5252 5206->5205 5256 6f98121b GlobalAlloc 5208->5256 5210 6f9815b9 5211 6f9815c6 2 API calls 5210->5211 5212 6f9815c3 5211->5212 5213 6f981272 5212->5213 5214 6f98127b GlobalAlloc lstrcpynW 5213->5214 5215 6f9812b5 GlobalFree 5213->5215 5214->5215 5215->5123 5217 6f9815ff lstrcpyW 5216->5217 5218 6f9815d2 wsprintfW 5216->5218 5221 6f981618 5217->5221 5218->5221 5221->5121 5223 6f981891 5222->5223 5224 6f98253a 5222->5224 5223->5131 5223->5132 5224->5223 5225 6f982556 GlobalFree 5224->5225 5225->5224 5227 6f981272 2 API calls 5226->5227 5228 6f98155e 5227->5228 5228->5125 5229->5136 5230->5160 5232 6f9815ad 5231->5232 5232->5159 5239 6f98121b GlobalAlloc 5233->5239 5235 6f98123b lstrcpynW 5235->5154 5236->5167 5237->5155 5238->5163 5239->5235 5241 6f9812c1 5240->5241 5242 6f98122c 2 API calls 5241->5242 5243 6f9812df 5242->5243 5243->5174 5245 6f98271c 5244->5245 5246 6f9826c6 VirtualAlloc 5244->5246 5245->5177 5246->5245 5248 6f982a61 5247->5248 5249 6f982a71 5248->5249 5250 6f982a66 GetLastError 5248->5250 5249->5183 5250->5249 5251->5205 5253 6f9812ea 5252->5253 5254 6f98130c 5252->5254 5253->5254 5255 6f9812f0 lstrcpyW 5253->5255 5254->5205 5255->5254 5256->5210 5981 402a35 5982 402c1f 17 API calls 5981->5982 5983 402a3b 5982->5983 5984 402a72 5983->5984 5985 40288b 5983->5985 5987 402a4d 5983->5987 5984->5985 5986 40640a 17 API calls 5984->5986 5986->5985 5987->5985 5989 40632f wsprintfW 5987->5989 5989->5985 5990 401735 5991 402c41 17 API calls 5990->5991 5992 40173c SearchPathW 5991->5992 5993 401757 5992->5993 5995 4029e6 5992->5995 5993->5995 5996 4063e8 lstrcpynW 5993->5996 5996->5995 5997 6f98166d 5998 6f981516 GlobalFree 5997->5998 6000 6f981685 5998->6000 5999 6f9816cb GlobalFree 6000->5999 6001 6f9816a0 6000->6001 6002 6f9816b7 VirtualFree 6000->6002 6001->5999 6002->5999 6003 4014b8 6004 4014be 6003->6004 6005 401389 2 API calls 6004->6005 6006 4014c6 6005->6006 6007 6f9810e1 6010 6f981111 6007->6010 6008 6f9811d8 GlobalFree 6009 6f9812ba 2 API calls 6009->6010 6010->6008 6010->6009 6011 6f9811d3 6010->6011 6012 6f9811f8 GlobalFree 6010->6012 6013 6f981272 2 API calls 6010->6013 6014 6f981164 GlobalAlloc 6010->6014 6015 6f9812e1 lstrcpyW 6010->6015 6016 6f9811c4 GlobalFree 6010->6016 6011->6008 6012->6010 6013->6016 6014->6010 6015->6010 6016->6010 6017 401db9 GetDC 6018 402c1f 17 API calls 6017->6018 6019 401dcb GetDeviceCaps MulDiv ReleaseDC 6018->6019 6020 402c1f 17 API calls 6019->6020 6021 401dfc 6020->6021 6022 40640a 17 API calls 6021->6022 6023 401e39 CreateFontIndirectW 6022->6023 6024 402592 6023->6024 6025 40283b 6026 402843 6025->6026 6027 402847 FindNextFileW 6026->6027 6028 402859 6026->6028 6027->6028 6030 4029e6 6028->6030 6031 4063e8 lstrcpynW 6028->6031 6031->6030

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 4034a5-4034e2 SetErrorMode GetVersion 1 4034e4-4034ec call 4067c2 0->1 2 4034f5 0->2 1->2 8 4034ee 1->8 4 4034fa-40350e call 406752 lstrlenA 2->4 9 403510-40352c call 4067c2 * 3 4->9 8->2 16 40353d-40359c #17 OleInitialize SHGetFileInfoW call 4063e8 GetCommandLineW call 4063e8 9->16 17 40352e-403534 9->17 24 4035a6-4035c0 call 405cea CharNextW 16->24 25 40359e-4035a5 16->25 17->16 21 403536 17->21 21->16 28 4035c6-4035cc 24->28 29 4036d7-4036f1 GetTempPathW call 403474 24->29 25->24 30 4035d5-4035d9 28->30 31 4035ce-4035d3 28->31 36 4036f3-403711 GetWindowsDirectoryW lstrcatW call 403474 29->36 37 403749-403763 DeleteFileW call 402f30 29->37 34 4035e0-4035e4 30->34 35 4035db-4035df 30->35 31->30 31->31 38 4036a3-4036b0 call 405cea 34->38 39 4035ea-4035f0 34->39 35->34 36->37 53 403713-403743 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403474 36->53 57 403814-403824 call 4039e6 OleUninitialize 37->57 58 403769-40376f 37->58 55 4036b2-4036b3 38->55 56 4036b4-4036ba 38->56 43 4035f2-4035fa 39->43 44 40360b-403644 39->44 48 403601 43->48 49 4035fc-4035ff 43->49 50 403661-40369b 44->50 51 403646-40364b 44->51 48->44 49->44 49->48 50->38 54 40369d-4036a1 50->54 51->50 52 40364d-403655 51->52 60 403657-40365a 52->60 61 40365c 52->61 53->37 53->57 54->38 63 4036c2-4036d0 call 4063e8 54->63 55->56 56->28 64 4036c0 56->64 73 40394a-403950 57->73 74 40382a-40383a call 405a4e ExitProcess 57->74 65 403804-40380b call 403ad8 58->65 66 403775-403780 call 405cea 58->66 60->50 60->61 61->50 69 4036d5 63->69 64->69 76 403810 65->76 80 403782-4037b7 66->80 81 4037ce-4037d8 66->81 69->29 78 403952-403968 GetCurrentProcess OpenProcessToken 73->78 79 4039ce-4039d6 73->79 76->57 87 40396a-403998 LookupPrivilegeValueW AdjustTokenPrivileges 78->87 88 40399e-4039ac call 4067c2 78->88 82 4039d8 79->82 83 4039dc-4039e0 ExitProcess 79->83 89 4037b9-4037bd 80->89 85 403840-403854 call 4059b9 lstrcatW 81->85 86 4037da-4037e8 call 405dc5 81->86 82->83 100 403861-40387b lstrcatW lstrcmpiW 85->100 101 403856-40385c lstrcatW 85->101 86->57 99 4037ea-403800 call 4063e8 * 2 86->99 87->88 102 4039ba-4039c5 ExitWindowsEx 88->102 103 4039ae-4039b8 88->103 90 4037c6-4037ca 89->90 91 4037bf-4037c4 89->91 90->89 95 4037cc 90->95 91->90 91->95 95->81 99->65 100->57 106 40387d-403880 100->106 101->100 102->79 104 4039c7-4039c9 call 40140b 102->104 103->102 103->104 104->79 109 403882-403887 call 40591f 106->109 110 403889 call 40599c 106->110 115 40388e-40389c SetCurrentDirectoryW 109->115 110->115 118 4038a9-4038d2 call 4063e8 115->118 119 40389e-4038a4 call 4063e8 115->119 123 4038d7-4038f3 call 40640a DeleteFileW 118->123 119->118 126 403934-40393c 123->126 127 4038f5-403905 CopyFileW 123->127 126->123 128 40393e-403945 call 4061ae 126->128 127->126 129 403907-403927 call 4061ae call 40640a call 4059d1 127->129 128->57 129->126 138 403929-403930 CloseHandle 129->138 138->126
                                                            APIs
                                                            • SetErrorMode.KERNELBASE ref: 004034C8
                                                            • GetVersion.KERNEL32 ref: 004034CE
                                                            • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403501
                                                            • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 0040353E
                                                            • OleInitialize.OLE32(00000000), ref: 00403545
                                                            • SHGetFileInfoW.SHELL32(004216E8,00000000,?,000002B4,00000000), ref: 00403561
                                                            • GetCommandLineW.KERNEL32(00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 00403576
                                                            • CharNextW.USER32(00000000,00435000,00000020,00435000,00000000,?,00000006,00000008,0000000A), ref: 004035AE
                                                              • Part of subcall function 004067C2: GetModuleHandleA.KERNEL32(?,00000020,?,00403517,0000000A), ref: 004067D4
                                                              • Part of subcall function 004067C2: GetProcAddress.KERNEL32(00000000,?), ref: 004067EF
                                                            • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 004036E8
                                                            • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 004036F9
                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403705
                                                            • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403719
                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403721
                                                            • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403732
                                                            • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 0040373A
                                                            • DeleteFileW.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 0040374E
                                                              • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,00000400,00403576,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063F5
                                                            • OleUninitialize.OLE32(00000006,?,00000006,00000008,0000000A), ref: 00403819
                                                            • ExitProcess.KERNEL32 ref: 0040383A
                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 0040384D
                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A328,C:\Users\user\AppData\Local\Temp\,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 0040385C
                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 00403867
                                                            • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 00403873
                                                            • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 0040388F
                                                            • DeleteFileW.KERNEL32(00420EE8,00420EE8,?,0042B000,00000008,?,00000006,00000008,0000000A), ref: 004038E9
                                                            • CopyFileW.KERNEL32(C:\Users\user\Desktop\WGi85dsMNp.exe,00420EE8,?,?,00000006,00000008,0000000A), ref: 004038FD
                                                            • CloseHandle.KERNEL32(00000000,00420EE8,00420EE8,?,00420EE8,00000000,?,00000006,00000008,0000000A), ref: 0040392A
                                                            • GetCurrentProcess.KERNEL32(00000028,0000000A,00000006,00000008,0000000A), ref: 00403959
                                                            • OpenProcessToken.ADVAPI32(00000000), ref: 00403960
                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403975
                                                            • AdjustTokenPrivileges.ADVAPI32 ref: 00403998
                                                            • ExitWindowsEx.USER32(00000002,80040002), ref: 004039BD
                                                            • ExitProcess.KERNEL32 ref: 004039E0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                                            • String ID: .tmp$1033$C:\Users\user\AppData\Local\Iw\Unnumberable$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\WGi85dsMNp.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                            • API String ID: 3441113951-561618104
                                                            • Opcode ID: e11a689ec9d555b5fe2f652178506891ef29a00bc77516d82e2752c077597b55
                                                            • Instruction ID: dafc1af32610b20ef8647c0cf6a3faef20d76686829591872cbc6ab955e55f97
                                                            • Opcode Fuzzy Hash: e11a689ec9d555b5fe2f652178506891ef29a00bc77516d82e2752c077597b55
                                                            • Instruction Fuzzy Hash: 4DD1F571600310ABE7206F759D49A3B3AECEB4070AF50443FF981B62D2DB7D8956876E

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 139 404dcc-404e18 GetDlgItem * 2 140 405039-405040 139->140 141 404e1e-404eb2 GlobalAlloc LoadBitmapW SetWindowLongW ImageList_Create ImageList_AddMasked SendMessageW * 2 139->141 142 405042-405052 140->142 143 405054 140->143 144 404ec1-404ec8 DeleteObject 141->144 145 404eb4-404ebf SendMessageW 141->145 146 405057-405060 142->146 143->146 147 404eca-404ed2 144->147 145->144 148 405062-405065 146->148 149 40506b-405071 146->149 150 404ed4-404ed7 147->150 151 404efb-404eff 147->151 148->149 155 40514f-405156 148->155 152 405080-405087 149->152 153 405073-40507a 149->153 156 404ed9 150->156 157 404edc-404ef9 call 40640a SendMessageW * 2 150->157 151->147 154 404f01-404f2d call 40435f * 2 151->154 159 405089-40508c 152->159 160 4050fc-4050ff 152->160 153->152 153->155 195 404f33-404f39 154->195 196 404ff8-40500b GetWindowLongW SetWindowLongW 154->196 162 4051c7-4051cf 155->162 163 405158-40515e 155->163 156->157 157->151 168 405097-4050ac call 404d1a 159->168 169 40508e-405095 159->169 160->155 164 405101-40510b 160->164 166 4051d1-4051d7 SendMessageW 162->166 167 4051d9-4051e0 162->167 171 405164-40516e 163->171 172 4053af-4053c1 call 4043c6 163->172 174 40511b-405125 164->174 175 40510d-405119 SendMessageW 164->175 166->167 176 4051e2-4051e9 167->176 177 405214-40521b 167->177 168->160 194 4050ae-4050bf 168->194 169->160 169->168 171->172 180 405174-405183 SendMessageW 171->180 174->155 182 405127-405131 174->182 175->174 183 4051f2-4051f9 176->183 184 4051eb-4051ec ImageList_Destroy 176->184 187 405371-405378 177->187 188 405221-40522d call 4011ef 177->188 180->172 189 405189-40519a SendMessageW 180->189 190 405142-40514c 182->190 191 405133-405140 182->191 192 405202-40520e 183->192 193 4051fb-4051fc GlobalFree 183->193 184->183 187->172 200 40537a-405381 187->200 213 40523d-405240 188->213 214 40522f-405232 188->214 198 4051a4-4051a6 189->198 199 40519c-4051a2 189->199 190->155 191->155 192->177 193->192 194->160 202 4050c1-4050c3 194->202 203 404f3c-404f43 195->203 201 405011-405015 196->201 205 4051a7-4051c0 call 401299 SendMessageW 198->205 199->198 199->205 200->172 206 405383-4053ad ShowWindow GetDlgItem ShowWindow 200->206 207 405017-40502a ShowWindow call 404394 201->207 208 40502f-405037 call 404394 201->208 209 4050c5-4050cc 202->209 210 4050d6 202->210 211 404fd9-404fec 203->211 212 404f49-404f71 203->212 205->162 206->172 207->172 208->140 222 4050d2-4050d4 209->222 223 4050ce-4050d0 209->223 226 4050d9-4050f5 call 40117d 210->226 211->203 217 404ff2-404ff6 211->217 224 404f73-404fa9 SendMessageW 212->224 225 404fab-404fad 212->225 218 405281-4052a5 call 4011ef 213->218 219 405242-40525b call 4012e2 call 401299 213->219 227 405234 214->227 228 405235-405238 call 404d9a 214->228 217->196 217->201 241 405347-40535b InvalidateRect 218->241 242 4052ab 218->242 249 40526b-40527a SendMessageW 219->249 250 40525d-405263 219->250 222->226 223->226 224->211 229 404fc0-404fd6 SendMessageW 225->229 230 404faf-404fbe SendMessageW 225->230 226->160 227->228 228->213 229->211 230->211 241->187 244 40535d-40536c call 404ced call 404cd5 241->244 245 4052ae-4052b9 242->245 244->187 246 4052bb-4052ca 245->246 247 40532f-405341 245->247 251 4052cc-4052d9 246->251 252 4052dd-4052e0 246->252 247->241 247->245 249->218 253 405265 250->253 254 405266-405269 250->254 251->252 256 4052e2-4052e5 252->256 257 4052e7-4052f0 252->257 253->254 254->249 254->250 259 4052f5-40532d SendMessageW * 2 256->259 257->259 260 4052f2 257->260 259->247 260->259
                                                            APIs
                                                            • GetDlgItem.USER32(?,000003F9), ref: 00404DE4
                                                            • GetDlgItem.USER32(?,00000408), ref: 00404DEF
                                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404E39
                                                            • LoadBitmapW.USER32(0000006E), ref: 00404E4C
                                                            • SetWindowLongW.USER32(?,000000FC,004053C4), ref: 00404E65
                                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404E79
                                                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404E8B
                                                            • SendMessageW.USER32(?,00001109,00000002), ref: 00404EA1
                                                            • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404EAD
                                                            • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404EBF
                                                            • DeleteObject.GDI32(00000000), ref: 00404EC2
                                                            • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404EED
                                                            • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404EF9
                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404F8F
                                                            • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404FBA
                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404FCE
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00404FFD
                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0040500B
                                                            • ShowWindow.USER32(?,00000005), ref: 0040501C
                                                            • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405119
                                                            • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040517E
                                                            • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405193
                                                            • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 004051B7
                                                            • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004051D7
                                                            • ImageList_Destroy.COMCTL32(?), ref: 004051EC
                                                            • GlobalFree.KERNEL32(?), ref: 004051FC
                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405275
                                                            • SendMessageW.USER32(?,00001102,?,?), ref: 0040531E
                                                            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040532D
                                                            • InvalidateRect.USER32(?,00000000,?), ref: 0040534D
                                                            • ShowWindow.USER32(?,00000000), ref: 0040539B
                                                            • GetDlgItem.USER32(?,000003FE), ref: 004053A6
                                                            • ShowWindow.USER32(00000000), ref: 004053AD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                            • String ID: $M$N
                                                            • API String ID: 1638840714-813528018
                                                            • Opcode ID: fb644b25ca39ae204efa7e1d1243337108994715b0d322cb34e58838b66aab8b
                                                            • Instruction ID: 7f687e55a7f93217ddba54fde82f382d197ef8b4c31ab339cf60f2545021b201
                                                            • Opcode Fuzzy Hash: fb644b25ca39ae204efa7e1d1243337108994715b0d322cb34e58838b66aab8b
                                                            • Instruction Fuzzy Hash: DD028DB0A00609EFDF209F94CD85AAE7BB5FB44354F10807AE611BA2E0C7798D52CF58
                                                            APIs
                                                              • Part of subcall function 6F98121B: GlobalAlloc.KERNEL32(00000040,?,6F98123B,?,6F9812DF,00000019,6F9811BE,-000000A0), ref: 6F981225
                                                            • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 6F981C6B
                                                            • lstrcpyW.KERNEL32(00000008,?), ref: 6F981CB3
                                                            • lstrcpyW.KERNEL32(00000808,?), ref: 6F981CBD
                                                            • GlobalFree.KERNEL32(00000000), ref: 6F981CD0
                                                            • GlobalFree.KERNEL32(?), ref: 6F981DB2
                                                            • GlobalFree.KERNEL32(?), ref: 6F981DB7
                                                            • GlobalFree.KERNEL32(?), ref: 6F981DBC
                                                            • GlobalFree.KERNEL32(00000000), ref: 6F981FA6
                                                            • lstrcpyW.KERNEL32(?,?), ref: 6F982140
                                                            • GetModuleHandleW.KERNEL32(00000008), ref: 6F9821B5
                                                            • LoadLibraryW.KERNEL32(00000008), ref: 6F9821C6
                                                            • GetProcAddress.KERNEL32(?,?), ref: 6F982220
                                                            • lstrlenW.KERNEL32(00000808), ref: 6F98223A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1843161593.000000006F981000.00000020.00000001.01000000.00000004.sdmp, Offset: 6F980000, based on PE: true
                                                            • Associated: 00000000.00000002.1843143747.000000006F980000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000000.00000002.1843217258.000000006F984000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000000.00000002.1843234521.000000006F986000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6f980000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                            • String ID:
                                                            • API String ID: 245916457-0
                                                            • Opcode ID: bcfb7d52852ec9be6e329b6bd5607fc64178ea60b7315d25f616271fe47d053f
                                                            • Instruction ID: 026e0026bdebd98e4c5ec7433c412e8c6a9436d0023d39700bb0dd6c7a687f7d
                                                            • Opcode Fuzzy Hash: bcfb7d52852ec9be6e329b6bd5607fc64178ea60b7315d25f616271fe47d053f
                                                            • Instruction Fuzzy Hash: F4225871D4460ADADB248FB8C5846EAB7B8FF06315F204E2AD1B6E72C0D774E6C58B50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 787 405afa-405b20 call 405dc5 790 405b22-405b34 DeleteFileW 787->790 791 405b39-405b40 787->791 792 405cb6-405cba 790->792 793 405b42-405b44 791->793 794 405b53-405b63 call 4063e8 791->794 795 405c64-405c69 793->795 796 405b4a-405b4d 793->796 800 405b72-405b73 call 405d09 794->800 801 405b65-405b70 lstrcatW 794->801 795->792 798 405c6b-405c6e 795->798 796->794 796->795 802 405c70-405c76 798->802 803 405c78-405c80 call 40672b 798->803 804 405b78-405b7c 800->804 801->804 802->792 803->792 811 405c82-405c96 call 405cbd call 405ab2 803->811 807 405b88-405b8e lstrcatW 804->807 808 405b7e-405b86 804->808 810 405b93-405baf lstrlenW FindFirstFileW 807->810 808->807 808->810 812 405bb5-405bbd 810->812 813 405c59-405c5d 810->813 827 405c98-405c9b 811->827 828 405cae-405cb1 call 405450 811->828 816 405bdd-405bf1 call 4063e8 812->816 817 405bbf-405bc7 812->817 813->795 815 405c5f 813->815 815->795 829 405bf3-405bfb 816->829 830 405c08-405c13 call 405ab2 816->830 819 405bc9-405bd1 817->819 820 405c3c-405c4c FindNextFileW 817->820 819->816 823 405bd3-405bdb 819->823 820->812 826 405c52-405c53 FindClose 820->826 823->816 823->820 826->813 827->802 833 405c9d-405cac call 405450 call 4061ae 827->833 828->792 829->820 834 405bfd-405c06 call 405afa 829->834 840 405c34-405c37 call 405450 830->840 841 405c15-405c18 830->841 833->792 834->820 840->820 843 405c1a-405c2a call 405450 call 4061ae 841->843 844 405c2c-405c32 841->844 843->820 844->820
                                                            APIs
                                                            • DeleteFileW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,00000000), ref: 00405B23
                                                            • lstrcatW.KERNEL32(00425730,\*.*,00425730,?,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,00000000), ref: 00405B6B
                                                            • lstrcatW.KERNEL32(?,0040A014,?,00425730,?,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,00000000), ref: 00405B8E
                                                            • lstrlenW.KERNEL32(?,?,0040A014,?,00425730,?,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,00000000), ref: 00405B94
                                                            • FindFirstFileW.KERNEL32(00425730,?,?,?,0040A014,?,00425730,?,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,00000000), ref: 00405BA4
                                                            • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405C44
                                                            • FindClose.KERNEL32(00000000), ref: 00405C53
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                            • String ID: 0WB$C:\Users\user\AppData\Local\Temp\$\*.*
                                                            • API String ID: 2035342205-1057503074
                                                            • Opcode ID: 94aee6277fb60bc187ec105b0c3c889327325094ff3d5538513028a918914a00
                                                            • Instruction ID: 490a569b50011677cd34e026f6ab1003dec3a9533e419df12a6715eb2ed0bc70
                                                            • Opcode Fuzzy Hash: 94aee6277fb60bc187ec105b0c3c889327325094ff3d5538513028a918914a00
                                                            • Instruction Fuzzy Hash: 0541BF30805B18A6EB31AB618D89BAF7678EF41718F10817BF801711D2D77C59C29EAE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 35cbb8abcdf375330cdaaed117d7ae66e2d52f36901990e867650d9b3411c4d0
                                                            • Instruction ID: 8a3521d6a9ab1c5b5eb45e3d7957e6eefdd785676f1866d9874d60d9aff9e69c
                                                            • Opcode Fuzzy Hash: 35cbb8abcdf375330cdaaed117d7ae66e2d52f36901990e867650d9b3411c4d0
                                                            • Instruction Fuzzy Hash: 1CF16770D04229CBDF18CFA8C8946ADBBB0FF45305F25816ED856BB281D7386A86DF45
                                                            APIs
                                                            • FindFirstFileW.KERNELBASE(?,00426778,00425F30,00405E0E,00425F30,00425F30,00000000,00425F30,00425F30,?,?,74DF2EE0,00405B1A,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0), ref: 00406736
                                                            • FindClose.KERNEL32(00000000), ref: 00406742
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Find$CloseFileFirst
                                                            • String ID: xgB
                                                            • API String ID: 2295610775-399326502
                                                            • Opcode ID: 8f8798618dbeb96281b7e152f222c6bef4cfc1fb78c0b92afc6d3f182eb863fd
                                                            • Instruction ID: 964bfaba6fe47efa91ae3b9d04416f3a0311ddb8c2b0a677c8b566ff70b98767
                                                            • Opcode Fuzzy Hash: 8f8798618dbeb96281b7e152f222c6bef4cfc1fb78c0b92afc6d3f182eb863fd
                                                            • Instruction Fuzzy Hash: 08D012315150205BC2011738BD4C85B7A589F553357228B37B866F61E0C7348C62869C
                                                            APIs
                                                            • ShowWindow.USER32(00000000,00000000), ref: 00401E67
                                                            • EnableWindow.USER32(00000000,00000000), ref: 00401E72
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Window$EnableShow
                                                            • String ID:
                                                            • API String ID: 1136574915-0
                                                            • Opcode ID: 93e3322236d135cf3becb144ab33be47f3bb68365a0b30391c7db73d0d040f31
                                                            • Instruction ID: b41365517dadb09c69eaf87789fd34eb77fb4a5ff64ddc4fb458d6156a5e0ce1
                                                            • Opcode Fuzzy Hash: 93e3322236d135cf3becb144ab33be47f3bb68365a0b30391c7db73d0d040f31
                                                            • Instruction Fuzzy Hash: DFE0DF32E08200CFE724EFA5AA494AD77B4EB80324B20847FF201F11D1CE7858818F6E

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 261 403e86-403e98 262 403fd9-403fe8 261->262 263 403e9e-403ea4 261->263 264 404037-40404c 262->264 265 403fea-404032 GetDlgItem * 2 call 40435f SetClassLongW call 40140b 262->265 263->262 266 403eaa-403eb3 263->266 268 40408c-404091 call 4043ab 264->268 269 40404e-404051 264->269 265->264 270 403eb5-403ec2 SetWindowPos 266->270 271 403ec8-403ecb 266->271 283 404096-4040b1 268->283 275 404053-40405e call 401389 269->275 276 404084-404086 269->276 270->271 272 403ee5-403eeb 271->272 273 403ecd-403edf ShowWindow 271->273 278 403f07-403f0a 272->278 279 403eed-403f02 DestroyWindow 272->279 273->272 275->276 298 404060-40407f SendMessageW 275->298 276->268 282 40432c 276->282 287 403f0c-403f18 SetWindowLongW 278->287 288 403f1d-403f23 278->288 284 404309-40430f 279->284 286 40432e-404335 282->286 290 4040b3-4040b5 call 40140b 283->290 291 4040ba-4040c0 283->291 284->282 293 404311-404317 284->293 287->286 296 403fc6-403fd4 call 4043c6 288->296 297 403f29-403f3a GetDlgItem 288->297 290->291 294 4040c6-4040d1 291->294 295 4042ea-404303 DestroyWindow EndDialog 291->295 293->282 299 404319-404322 ShowWindow 293->299 294->295 300 4040d7-404124 call 40640a call 40435f * 3 GetDlgItem 294->300 295->284 296->286 301 403f59-403f5c 297->301 302 403f3c-403f53 SendMessageW IsWindowEnabled 297->302 298->286 299->282 331 404126-40412b 300->331 332 40412e-40416a ShowWindow KiUserCallbackDispatcher call 404381 EnableWindow 300->332 305 403f61-403f64 301->305 306 403f5e-403f5f 301->306 302->282 302->301 310 403f72-403f77 305->310 311 403f66-403f6c 305->311 309 403f8f-403f94 call 404338 306->309 309->296 314 403fad-403fc0 SendMessageW 310->314 316 403f79-403f7f 310->316 311->314 315 403f6e-403f70 311->315 314->296 315->309 317 403f81-403f87 call 40140b 316->317 318 403f96-403f9f call 40140b 316->318 327 403f8d 317->327 318->296 328 403fa1-403fab 318->328 327->309 328->327 331->332 335 40416c-40416d 332->335 336 40416f 332->336 337 404171-40419f GetSystemMenu EnableMenuItem SendMessageW 335->337 336->337 338 4041a1-4041b2 SendMessageW 337->338 339 4041b4 337->339 340 4041ba-4041f9 call 404394 call 403e67 call 4063e8 lstrlenW call 40640a SetWindowTextW call 401389 338->340 339->340 340->283 351 4041ff-404201 340->351 351->283 352 404207-40420b 351->352 353 40422a-40423e DestroyWindow 352->353 354 40420d-404213 352->354 353->284 356 404244-404271 CreateDialogParamW 353->356 354->282 355 404219-40421f 354->355 355->283 357 404225 355->357 356->284 358 404277-4042ce call 40435f GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 356->358 357->282 358->282 363 4042d0-4042e8 ShowWindow call 4043ab 358->363 363->284
                                                            APIs
                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403EC2
                                                            • ShowWindow.USER32(?), ref: 00403EDF
                                                            • DestroyWindow.USER32 ref: 00403EF3
                                                            • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403F0F
                                                            • GetDlgItem.USER32(?,?), ref: 00403F30
                                                            • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403F44
                                                            • IsWindowEnabled.USER32(00000000), ref: 00403F4B
                                                            • GetDlgItem.USER32(?,?), ref: 00403FF9
                                                            • GetDlgItem.USER32(?,00000002), ref: 00404003
                                                            • SetClassLongW.USER32(?,000000F2,?), ref: 0040401D
                                                            • SendMessageW.USER32(0000040F,00000000,?,?), ref: 0040406E
                                                            • GetDlgItem.USER32(?,00000003), ref: 00404114
                                                            • ShowWindow.USER32(00000000,?), ref: 00404135
                                                            • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00404147
                                                            • EnableWindow.USER32(?,?), ref: 00404162
                                                            • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00404178
                                                            • EnableMenuItem.USER32(00000000), ref: 0040417F
                                                            • SendMessageW.USER32(?,000000F4,00000000,?), ref: 00404197
                                                            • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004041AA
                                                            • lstrlenW.KERNEL32(00423728,?,00423728,00000000), ref: 004041D4
                                                            • SetWindowTextW.USER32(?,00423728), ref: 004041E8
                                                            • ShowWindow.USER32(?,0000000A), ref: 0040431C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                            • String ID: (7B
                                                            • API String ID: 3282139019-3251261122
                                                            • Opcode ID: 42b69af187e06dbbd4ac4a762ea4715538cd3e369663267481291b142cb35f12
                                                            • Instruction ID: 1e1a27d6975204c591228116fe5edee23a209105d2649c04e919f1d7e5095d09
                                                            • Opcode Fuzzy Hash: 42b69af187e06dbbd4ac4a762ea4715538cd3e369663267481291b142cb35f12
                                                            • Instruction Fuzzy Hash: 6FC1A2B1644200FBDB216F61EE85D2A3BB8EB94706F40053EFA41B11F1CB7958529B6D

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 366 403ad8-403af0 call 4067c2 369 403af2-403b02 call 40632f 366->369 370 403b04-403b3b call 4062b6 366->370 378 403b5e-403b87 call 403dae call 405dc5 369->378 374 403b53-403b59 lstrcatW 370->374 375 403b3d-403b4e call 4062b6 370->375 374->378 375->374 384 403c19-403c21 call 405dc5 378->384 385 403b8d-403b92 378->385 391 403c23-403c2a call 40640a 384->391 392 403c2f-403c54 LoadImageW 384->392 385->384 386 403b98-403bb2 call 4062b6 385->386 390 403bb7-403bc0 386->390 390->384 395 403bc2-403bc6 390->395 391->392 393 403cd5-403cdd call 40140b 392->393 394 403c56-403c86 RegisterClassW 392->394 408 403ce7-403cf2 call 403dae 393->408 409 403cdf-403ce2 393->409 397 403da4 394->397 398 403c8c-403cd0 SystemParametersInfoW CreateWindowExW 394->398 400 403bd8-403be4 lstrlenW 395->400 401 403bc8-403bd5 call 405cea 395->401 406 403da6-403dad 397->406 398->393 402 403be6-403bf4 lstrcmpiW 400->402 403 403c0c-403c14 call 405cbd call 4063e8 400->403 401->400 402->403 407 403bf6-403c00 GetFileAttributesW 402->407 403->384 412 403c02-403c04 407->412 413 403c06-403c07 call 405d09 407->413 419 403cf8-403d12 ShowWindow call 406752 408->419 420 403d7b-403d83 call 405523 408->420 409->406 412->403 412->413 413->403 427 403d14-403d19 call 406752 419->427 428 403d1e-403d30 GetClassInfoW 419->428 425 403d85-403d8b 420->425 426 403d9d-403d9f call 40140b 420->426 425->409 429 403d91-403d98 call 40140b 425->429 426->397 427->428 432 403d32-403d42 GetClassInfoW RegisterClassW 428->432 433 403d48-403d6b DialogBoxParamW call 40140b 428->433 429->409 432->433 436 403d70-403d79 call 403a28 433->436 436->406
                                                            APIs
                                                              • Part of subcall function 004067C2: GetModuleHandleA.KERNEL32(?,00000020,?,00403517,0000000A), ref: 004067D4
                                                              • Part of subcall function 004067C2: GetProcAddress.KERNEL32(00000000,?), ref: 004067EF
                                                            • lstrcatW.KERNEL32(1033,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,C:\Users\user\AppData\Local\Temp\,74DF3420,00435000,00000000), ref: 00403B59
                                                            • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,00435800,1033,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,C:\Users\user\AppData\Local\Temp\), ref: 00403BD9
                                                            • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,00435800,1033,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000), ref: 00403BEC
                                                            • GetFileAttributesW.KERNEL32(Call), ref: 00403BF7
                                                            • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,00435800), ref: 00403C40
                                                              • Part of subcall function 0040632F: wsprintfW.USER32 ref: 0040633C
                                                            • RegisterClassW.USER32(004291E0), ref: 00403C7D
                                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403C95
                                                            • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403CCA
                                                            • ShowWindow.USER32(00000005,00000000), ref: 00403D00
                                                            • GetClassInfoW.USER32(00000000,RichEdit20W,004291E0), ref: 00403D2C
                                                            • GetClassInfoW.USER32(00000000,RichEdit,004291E0), ref: 00403D39
                                                            • RegisterClassW.USER32(004291E0), ref: 00403D42
                                                            • DialogBoxParamW.USER32(?,00000000,00403E86,00000000), ref: 00403D61
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                            • String ID: (7B$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                            • API String ID: 1975747703-2335571965
                                                            • Opcode ID: faef508d5617ccaf29f7204e00c3b9242aa942859a9d4d687d906c1b184c1908
                                                            • Instruction ID: f49b718e50d7a26840138b6048ee10d29e8519d5aa43f5d66e73d4226ad9b376
                                                            • Opcode Fuzzy Hash: faef508d5617ccaf29f7204e00c3b9242aa942859a9d4d687d906c1b184c1908
                                                            • Instruction Fuzzy Hash: FF61C470204700BBE220AF669E45F2B3A7CEB84B49F40447FF945B22E2DB7D5912C62D

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 440 402f30-402f7e GetTickCount GetModuleFileNameW call 405ede 443 402f80-402f85 440->443 444 402f8a-402fb8 call 4063e8 call 405d09 call 4063e8 GetFileSize 440->444 446 4031cf-4031d3 443->446 452 4030a8-4030b6 call 402e8e 444->452 453 402fbe-402fd5 444->453 459 403187-40318c 452->459 460 4030bc-4030bf 452->460 455 402fd7 453->455 456 402fd9-402fe6 call 403447 453->456 455->456 464 403143-40314b call 402e8e 456->464 465 402fec-402ff2 456->465 459->446 462 4030c1-4030d9 call 40345d call 403447 460->462 463 4030eb-403137 GlobalAlloc call 406923 call 405f0d CreateFileW 460->463 462->459 491 4030df-4030e5 462->491 488 403139-40313e 463->488 489 40314d-40317d call 40345d call 4031d6 463->489 464->459 469 403072-403076 465->469 470 402ff4-40300c call 405e99 465->470 473 403078-40307e call 402e8e 469->473 474 40307f-403085 469->474 470->474 487 40300e-403015 470->487 473->474 479 403087-403095 call 4068b5 474->479 480 403098-4030a2 474->480 479->480 480->452 480->453 487->474 490 403017-40301e 487->490 488->446 500 403182-403185 489->500 490->474 493 403020-403027 490->493 491->459 491->463 493->474 495 403029-403030 493->495 495->474 497 403032-403052 495->497 497->459 499 403058-40305c 497->499 501 403064-40306c 499->501 502 40305e-403062 499->502 500->459 503 40318e-40319f 500->503 501->474 504 40306e-403070 501->504 502->452 502->501 505 4031a1 503->505 506 4031a7-4031ac 503->506 504->474 505->506 507 4031ad-4031b3 506->507 507->507 508 4031b5-4031cd call 405e99 507->508 508->446
                                                            APIs
                                                            • GetTickCount.KERNEL32 ref: 00402F44
                                                            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\WGi85dsMNp.exe,00000400), ref: 00402F60
                                                              • Part of subcall function 00405EDE: GetFileAttributesW.KERNELBASE(00000003,00402F73,C:\Users\user\Desktop\WGi85dsMNp.exe,80000000,00000003), ref: 00405EE2
                                                              • Part of subcall function 00405EDE: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405F04
                                                            • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\WGi85dsMNp.exe,C:\Users\user\Desktop\WGi85dsMNp.exe,80000000,00000003), ref: 00402FA9
                                                            • GlobalAlloc.KERNELBASE(00000040,0040A230), ref: 004030F0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                            • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\WGi85dsMNp.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                            • API String ID: 2803837635-3561611200
                                                            • Opcode ID: 17d4548877bb422f8be7689a7878bb05eb645905850902383813b6e2c7289b3d
                                                            • Instruction ID: fab51a6d61a7302470dd91ad27108f0c0be819ae48098b15a947b51e22d3bd00
                                                            • Opcode Fuzzy Hash: 17d4548877bb422f8be7689a7878bb05eb645905850902383813b6e2c7289b3d
                                                            • Instruction Fuzzy Hash: 4961D271A00205ABDB20DFA4DD45A9A7BA8EB04356F20413FF904F62D1DB7C9A458BAD

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 724 40640a-406415 725 406417-406426 724->725 726 406428-40643e 724->726 725->726 727 406444-406451 726->727 728 406656-40665c 726->728 727->728 731 406457-40645e 727->731 729 406662-40666d 728->729 730 406463-406470 728->730 733 406678-406679 729->733 734 40666f-406673 call 4063e8 729->734 730->729 732 406476-406482 730->732 731->728 735 406643 732->735 736 406488-4064c6 732->736 734->733 740 406651-406654 735->740 741 406645-40664f 735->741 738 4065e6-4065ea 736->738 739 4064cc-4064d7 736->739 744 4065ec-4065f2 738->744 745 40661d-406621 738->745 742 4064f0 739->742 743 4064d9-4064de 739->743 740->728 741->728 749 4064f7-4064fe 742->749 743->742 746 4064e0-4064e3 743->746 747 406602-40660e call 4063e8 744->747 748 4065f4-406600 call 40632f 744->748 750 406630-406641 lstrlenW 745->750 751 406623-40662b call 40640a 745->751 746->742 753 4064e5-4064e8 746->753 762 406613-406619 747->762 748->762 755 406500-406502 749->755 756 406503-406505 749->756 750->728 751->750 753->742 758 4064ea-4064ee 753->758 755->756 760 406540-406543 756->760 761 406507-40652e call 4062b6 756->761 758->749 763 406553-406556 760->763 764 406545-406551 GetSystemDirectoryW 760->764 774 406534-40653b call 40640a 761->774 775 4065ce-4065d1 761->775 762->750 766 40661b 762->766 768 4065c1-4065c3 763->768 769 406558-406566 GetWindowsDirectoryW 763->769 767 4065c5-4065c9 764->767 771 4065de-4065e4 call 40667c 766->771 767->771 776 4065cb 767->776 768->767 773 406568-406572 768->773 769->768 771->750 779 406574-406577 773->779 780 40658c-4065a2 SHGetSpecialFolderLocation 773->780 774->767 775->771 777 4065d3-4065d9 lstrcatW 775->777 776->775 777->771 779->780 783 406579-406580 779->783 784 4065a4-4065bb SHGetPathFromIDListW CoTaskMemFree 780->784 785 4065bd 780->785 786 406588-40658a 783->786 784->767 784->785 785->768 786->767 786->780
                                                            APIs
                                                            • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 0040654B
                                                            • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,00422708,?,00405487,00422708,00000000), ref: 0040655E
                                                            • SHGetSpecialFolderLocation.SHELL32(00405487,00000000,00000000,00422708,?,00405487,00422708,00000000), ref: 0040659A
                                                            • SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 004065A8
                                                            • CoTaskMemFree.OLE32(00000000), ref: 004065B3
                                                            • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004065D9
                                                            • lstrlenW.KERNEL32(Call,00000000,00422708,?,00405487,00422708,00000000), ref: 00406631
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                            • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                            • API String ID: 717251189-1230650788
                                                            • Opcode ID: 05bff3a2d83114fcd993f4ecc25878232afbb7d489ed6444c63e00c36f1e26dc
                                                            • Instruction ID: bd17f2555f8fb0ecb5cfb39a154c1e2018f2892b34e65fa403921cbdc39efe9b
                                                            • Opcode Fuzzy Hash: 05bff3a2d83114fcd993f4ecc25878232afbb7d489ed6444c63e00c36f1e26dc
                                                            • Instruction Fuzzy Hash: A4612371A00115ABDF209F64DD41AAE37A5AF50314F62813FE903B72D0E73E9AA2C75D

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 851 40176f-401794 call 402c41 call 405d34 856 401796-40179c call 4063e8 851->856 857 40179e-4017b0 call 4063e8 call 405cbd lstrcatW 851->857 863 4017b5-4017b6 call 40667c 856->863 857->863 866 4017bb-4017bf 863->866 867 4017c1-4017cb call 40672b 866->867 868 4017f2-4017f5 866->868 876 4017dd-4017ef 867->876 877 4017cd-4017db CompareFileTime 867->877 870 4017f7-4017f8 call 405eb9 868->870 871 4017fd-401819 call 405ede 868->871 870->871 878 40181b-40181e 871->878 879 40188d-4018b6 call 405450 call 4031d6 871->879 876->868 877->876 880 401820-40185e call 4063e8 * 2 call 40640a call 4063e8 call 405a4e 878->880 881 40186f-401879 call 405450 878->881 893 4018b8-4018bc 879->893 894 4018be-4018ca SetFileTime 879->894 880->866 914 401864-401865 880->914 891 401882-401888 881->891 895 402ace 891->895 893->894 897 4018d0-4018db CloseHandle 893->897 894->897 898 402ad0-402ad4 895->898 900 4018e1-4018e4 897->900 901 402ac5-402ac8 897->901 903 4018e6-4018f7 call 40640a lstrcatW 900->903 904 4018f9-4018fc call 40640a 900->904 901->895 909 401901-4022fc call 405a4e 903->909 904->909 909->898 914->891 916 401867-401868 914->916 916->881
                                                            APIs
                                                            • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Local\Iw\Unnumberable,?,?,00000031), ref: 004017B0
                                                            • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Iw\Unnumberable,?,?,00000031), ref: 004017D5
                                                              • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,00000400,00403576,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063F5
                                                              • Part of subcall function 00405450: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                              • Part of subcall function 00405450: lstrlenW.KERNEL32(00402F08,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                              • Part of subcall function 00405450: lstrcatW.KERNEL32(00422708,00402F08,00402F08,00422708,00000000,00000000,00000000), ref: 004054AB
                                                              • Part of subcall function 00405450: SetWindowTextW.USER32(00422708,00422708), ref: 004054BD
                                                              • Part of subcall function 00405450: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                              • Part of subcall function 00405450: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                              • Part of subcall function 00405450: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                            • String ID: C:\Users\user\AppData\Local\Iw\Unnumberable$C:\Users\user\AppData\Local\Temp\nslB6AB.tmp$C:\Users\user\AppData\Local\Temp\nslB6AB.tmp\System.dll$Call
                                                            • API String ID: 1941528284-3500449080
                                                            • Opcode ID: 45b834d85ef4e1e2ed7d2d31852b9ecb22d19d59077027c4906be829d01ae2f6
                                                            • Instruction ID: 2530360bafa170a9d5e8074bf3c3c5079485a484cad24ccb9f0485aee5561d29
                                                            • Opcode Fuzzy Hash: 45b834d85ef4e1e2ed7d2d31852b9ecb22d19d59077027c4906be829d01ae2f6
                                                            • Instruction Fuzzy Hash: FF41C671900614BADF11ABA5CD85DAF3679EF05329B20433BF412B10E2CB3C86529A6E

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 917 40264a-402663 call 402c1f 920 402ac5-402ac8 917->920 921 402669-402670 917->921 922 402ace-402ad4 920->922 923 402672 921->923 924 402675-402678 921->924 923->924 926 4027dc-4027e4 924->926 927 40267e-40268d call 406348 924->927 926->920 927->926 930 402693 927->930 931 402699-40269d 930->931 932 402732-402735 931->932 933 4026a3-4026be ReadFile 931->933 935 402737-40273a 932->935 936 40274d-40275d call 405f61 932->936 933->926 934 4026c4-4026c9 933->934 934->926 938 4026cf-4026dd 934->938 935->936 939 40273c-402747 call 405fbf 935->939 936->926 944 40275f 936->944 941 4026e3-4026f5 MultiByteToWideChar 938->941 942 402798-4027a4 call 40632f 938->942 939->926 939->936 941->944 945 4026f7-4026fa 941->945 942->922 948 402762-402765 944->948 949 4026fc-402707 945->949 948->942 951 402767-40276c 948->951 949->948 952 402709-40272e SetFilePointer MultiByteToWideChar 949->952 953 4027a9-4027ad 951->953 954 40276e-402773 951->954 952->949 955 402730 952->955 957 4027ca-4027d6 SetFilePointer 953->957 958 4027af-4027b3 953->958 954->953 956 402775-402788 954->956 955->944 956->926 959 40278a-402790 956->959 957->926 960 4027b5-4027b9 958->960 961 4027bb-4027c8 958->961 959->931 962 402796 959->962 960->957 960->961 961->926 962->926
                                                            APIs
                                                            • ReadFile.KERNELBASE(?,?,?,?), ref: 004026B6
                                                            • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,?), ref: 004026F1
                                                            • SetFilePointer.KERNELBASE(?,?,?,?,?,00000008,?,?,?,?), ref: 00402714
                                                            • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,?,?,?,?,00000008,?,?,?,?), ref: 0040272A
                                                              • Part of subcall function 00405FBF: SetFilePointer.KERNEL32(?,00000000,00000000,?), ref: 00405FD5
                                                            • SetFilePointer.KERNEL32(?,?,?,?,?,?,00000002), ref: 004027D6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: File$Pointer$ByteCharMultiWide$Read
                                                            • String ID: 9
                                                            • API String ID: 163830602-2366072709
                                                            • Opcode ID: cadc99d36448674c458fec809f66667da68abd58cfb7d9264b13fa75ded684dc
                                                            • Instruction ID: add249696b334c0fceafe0529c612de3b1c59f5eaafd60b3ba6c21ea99dd66a9
                                                            • Opcode Fuzzy Hash: cadc99d36448674c458fec809f66667da68abd58cfb7d9264b13fa75ded684dc
                                                            • Instruction Fuzzy Hash: FD510A74D10219AEDF21DF95DA88AAEB779FF04304F50443BE901B72D0D7B89982CB59

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 963 406752-406772 GetSystemDirectoryW 964 406774 963->964 965 406776-406778 963->965 964->965 966 406789-40678b 965->966 967 40677a-406783 965->967 969 40678c-4067bf wsprintfW LoadLibraryExW 966->969 967->966 968 406785-406787 967->968 968->969
                                                            APIs
                                                            • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406769
                                                            • wsprintfW.USER32 ref: 004067A4
                                                            • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067B8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: DirectoryLibraryLoadSystemwsprintf
                                                            • String ID: %s%S.dll$UXTHEME$\
                                                            • API String ID: 2200240437-1946221925
                                                            • Opcode ID: 40aa1e09304642b089aa1993992f232c43871fa513f82abce0c0f0efb2bd037b
                                                            • Instruction ID: 07f60acf873a648e61080255fd3e200204736070213a9ab7c1209ab7057fe03e
                                                            • Opcode Fuzzy Hash: 40aa1e09304642b089aa1993992f232c43871fa513f82abce0c0f0efb2bd037b
                                                            • Instruction Fuzzy Hash: 27F0FC70540219AECB10AB68ED0DFAB366CA700304F10447AA64AF20D1EB789A24C798

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 970 40591f-40596a CreateDirectoryW 971 405970-40597d GetLastError 970->971 972 40596c-40596e 970->972 973 405997-405999 971->973 974 40597f-405993 SetFileSecurityW 971->974 972->973 974->972 975 405995 GetLastError 974->975 975->973
                                                            APIs
                                                            • CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 00405962
                                                            • GetLastError.KERNEL32 ref: 00405976
                                                            • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040598B
                                                            • GetLastError.KERNEL32 ref: 00405995
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                            • String ID: C:\Users\user\Desktop
                                                            • API String ID: 3449924974-224404859
                                                            • Opcode ID: c15d26eb0fd7dc0754592b558b3576eabd9f17effa54cf70e09af9e442894ad1
                                                            • Instruction ID: ca5323325ecea66cc3de0aafa4d6cbc44a00468c8660a14113972894dcb98988
                                                            • Opcode Fuzzy Hash: c15d26eb0fd7dc0754592b558b3576eabd9f17effa54cf70e09af9e442894ad1
                                                            • Instruction Fuzzy Hash: 970108B1C10219DADF009FA5C944BEFBFB4EB14314F00403AE544B6290DB789608CFA9

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 976 6f981777-6f9817b6 call 6f981b5f 980 6f9817bc-6f9817c0 976->980 981 6f9818d6-6f9818d8 976->981 982 6f9817c9-6f9817d6 call 6f982394 980->982 983 6f9817c2-6f9817c8 call 6f982352 980->983 988 6f9817d8-6f9817dd 982->988 989 6f981806-6f98180d 982->989 983->982 992 6f9817f8-6f9817fb 988->992 993 6f9817df-6f9817e0 988->993 990 6f98182d-6f981831 989->990 991 6f98180f-6f98182b call 6f982569 call 6f9815b4 call 6f981272 GlobalFree 989->991 994 6f98187e-6f981884 call 6f982569 990->994 995 6f981833-6f98187c call 6f9815c6 call 6f982569 990->995 1016 6f981885-6f981889 991->1016 992->989 996 6f9817fd-6f9817fe call 6f982d37 992->996 998 6f9817e8-6f9817e9 call 6f982aac 993->998 999 6f9817e2-6f9817e3 993->999 994->1016 995->1016 1010 6f981803 996->1010 1007 6f9817ee 998->1007 1004 6f9817f0-6f9817f6 call 6f982724 999->1004 1005 6f9817e5-6f9817e6 999->1005 1015 6f981805 1004->1015 1005->989 1005->998 1007->1010 1010->1015 1015->989 1019 6f98188b-6f981899 call 6f98252c 1016->1019 1020 6f9818c6-6f9818cd 1016->1020 1026 6f98189b-6f98189e 1019->1026 1027 6f9818b1-6f9818b8 1019->1027 1020->981 1023 6f9818cf-6f9818d0 GlobalFree 1020->1023 1023->981 1026->1027 1029 6f9818a0-6f9818a8 1026->1029 1027->1020 1028 6f9818ba-6f9818c5 call 6f98153d 1027->1028 1028->1020 1029->1027 1030 6f9818aa-6f9818ab FreeLibrary 1029->1030 1030->1027
                                                            APIs
                                                              • Part of subcall function 6F981B5F: GlobalFree.KERNEL32(?), ref: 6F981DB2
                                                              • Part of subcall function 6F981B5F: GlobalFree.KERNEL32(?), ref: 6F981DB7
                                                              • Part of subcall function 6F981B5F: GlobalFree.KERNEL32(?), ref: 6F981DBC
                                                            • GlobalFree.KERNEL32(00000000), ref: 6F981825
                                                            • FreeLibrary.KERNEL32(?), ref: 6F9818AB
                                                            • GlobalFree.KERNEL32(00000000), ref: 6F9818D0
                                                              • Part of subcall function 6F982352: GlobalAlloc.KERNEL32(00000040,?), ref: 6F982383
                                                              • Part of subcall function 6F982724: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6F9817F6,00000000), ref: 6F9827F4
                                                              • Part of subcall function 6F9815C6: wsprintfW.USER32 ref: 6F9815F4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1843161593.000000006F981000.00000020.00000001.01000000.00000004.sdmp, Offset: 6F980000, based on PE: true
                                                            • Associated: 00000000.00000002.1843143747.000000006F980000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000000.00000002.1843217258.000000006F984000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000000.00000002.1843234521.000000006F986000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6f980000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Global$Free$Alloc$Librarywsprintf
                                                            • String ID:
                                                            • API String ID: 3962662361-3916222277
                                                            • Opcode ID: 94137b6bb0acb103664286d913bddd66560d7346f3f06e76ad2e8d19b1753b7a
                                                            • Instruction ID: bf7557b68563cc4dc0cbe479aa7aacb4238702181e55c46320b6ea46d0251024
                                                            • Opcode Fuzzy Hash: 94137b6bb0acb103664286d913bddd66560d7346f3f06e76ad2e8d19b1753b7a
                                                            • Instruction Fuzzy Hash: 51418D714043049AEB149F749885BD637ACBF07324F144D6AE93A9E1D6DBB9E0C48B60

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1033 4023e4-402415 call 402c41 * 2 call 402cd1 1040 402ac5-402ad4 1033->1040 1041 40241b-402425 1033->1041 1042 402427-402434 call 402c41 lstrlenW 1041->1042 1043 402438-40243b 1041->1043 1042->1043 1046 40243d-40244e call 402c1f 1043->1046 1047 40244f-402452 1043->1047 1046->1047 1051 402463-402477 RegSetValueExW 1047->1051 1052 402454-40245e call 4031d6 1047->1052 1055 402479 1051->1055 1056 40247c-40255d RegCloseKey 1051->1056 1052->1051 1055->1056 1056->1040 1058 40288b-402892 1056->1058 1058->1040
                                                            APIs
                                                            • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nslB6AB.tmp,00000023,00000011,00000002), ref: 0040242F
                                                            • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nslB6AB.tmp,00000000,00000011,00000002), ref: 0040246F
                                                            • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nslB6AB.tmp,00000000,00000011,00000002), ref: 00402557
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: CloseValuelstrlen
                                                            • String ID: C:\Users\user\AppData\Local\Temp\nslB6AB.tmp
                                                            • API String ID: 2655323295-2755478102
                                                            • Opcode ID: 73e16f22230fec4bb41596bf14ea3730359cb40e1001d342c6dd81160fbf5f59
                                                            • Instruction ID: 2320c74fc41ffeb716861e397aa06506e2c1d49fdd3331f7b5a779c93e7e4390
                                                            • Opcode Fuzzy Hash: 73e16f22230fec4bb41596bf14ea3730359cb40e1001d342c6dd81160fbf5f59
                                                            • Instruction Fuzzy Hash: C4118471E00104BEEB10AFA5DE89EAEBB74EB44754F11803BF504B71D1DBB89D419B68

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1059 405f0d-405f19 1060 405f1a-405f4e GetTickCount GetTempFileNameW 1059->1060 1061 405f50-405f52 1060->1061 1062 405f5d-405f5f 1060->1062 1061->1060 1063 405f54 1061->1063 1064 405f57-405f5a 1062->1064 1063->1064
                                                            APIs
                                                            • GetTickCount.KERNEL32 ref: 00405F2B
                                                            • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00435000,004034A3,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,74DF3420,004036EF), ref: 00405F46
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: CountFileNameTempTick
                                                            • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                            • API String ID: 1716503409-678247507
                                                            • Opcode ID: 0c62091ad8b50aef506abc269e58e4a43f33256201187c1c154fac6de66d8f01
                                                            • Instruction ID: 076564571966e4dc9ef4834731be4d502634ae0aeddccfca5b4533d1bab5a213
                                                            • Opcode Fuzzy Hash: 0c62091ad8b50aef506abc269e58e4a43f33256201187c1c154fac6de66d8f01
                                                            • Instruction Fuzzy Hash: 14F09076601204FFEB009F59ED05E9BB7A8EB95750F10803AEE00F7250E6B49A548B68

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1065 402d44-402d6d call 406255 1067 402d72-402d74 1065->1067 1068 402d76-402d7c 1067->1068 1069 402dec-402df0 1067->1069 1070 402d98-402dad RegEnumKeyW 1068->1070 1071 402d7e-402d80 1070->1071 1072 402daf-402dc1 RegCloseKey call 4067c2 1070->1072 1073 402dd0-402dde RegCloseKey 1071->1073 1074 402d82-402d96 call 402d44 1071->1074 1079 402de0-402de6 RegDeleteKeyW 1072->1079 1080 402dc3-402dce 1072->1080 1073->1069 1074->1070 1074->1072 1079->1069 1080->1069
                                                            APIs
                                                            • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402DA9
                                                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DB2
                                                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DD3
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Close$Enum
                                                            • String ID:
                                                            • API String ID: 464197530-0
                                                            • Opcode ID: 1fd681a58c600dee98d7f7e5161f1cc79c94fe5fc9469311f060f0f5731105c3
                                                            • Instruction ID: 3410daaf41eb2a8de7896e1fb7aa518538b3e031ab7f3cb45a1fbd23233d04dd
                                                            • Opcode Fuzzy Hash: 1fd681a58c600dee98d7f7e5161f1cc79c94fe5fc9469311f060f0f5731105c3
                                                            • Instruction Fuzzy Hash: CE116A32500108FBDF12AB90CE09FEE7B7DAF44350F100076B905B61E0E7B59E21AB58
                                                            APIs
                                                              • Part of subcall function 00405D68: CharNextW.USER32(?,?,00425F30,?,00405DDC,00425F30,00425F30,?,?,74DF2EE0,00405B1A,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,00000000), ref: 00405D76
                                                              • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D7B
                                                              • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D93
                                                            • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                                                              • Part of subcall function 0040591F: CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 00405962
                                                            • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Iw\Unnumberable,?,00000000,000000F0), ref: 0040164D
                                                            Strings
                                                            • C:\Users\user\AppData\Local\Iw\Unnumberable, xrefs: 00401640
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                            • String ID: C:\Users\user\AppData\Local\Iw\Unnumberable
                                                            • API String ID: 1892508949-2910234805
                                                            • Opcode ID: c670449cb20163be3cb3cb34affd8c81282aa0e3ca4a40f31796d9e50139b1da
                                                            • Instruction ID: 0139da5d792eeb989572d84d187c25f91b4f70b2bd1842bf542401118de2a59f
                                                            • Opcode Fuzzy Hash: c670449cb20163be3cb3cb34affd8c81282aa0e3ca4a40f31796d9e50139b1da
                                                            • Instruction Fuzzy Hash: 0511E631504511EBCF30AFA4CD4159F36A0EF15329B29453BFA45B22F1DB3E49419B5D
                                                            APIs
                                                            • IsWindowVisible.USER32(?), ref: 004053F3
                                                            • CallWindowProcW.USER32(?,?,?,?), ref: 00405444
                                                              • Part of subcall function 004043AB: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004043BD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Window$CallMessageProcSendVisible
                                                            • String ID:
                                                            • API String ID: 3748168415-3916222277
                                                            • Opcode ID: 36caebe1fe8aa1eff7ff321662443c514d6827d4f2801b7b393fcb4226acda68
                                                            • Instruction ID: 343f6187318c33bb175646012d6cb398530476c6c15fe8dd96994d534b9a6b17
                                                            • Opcode Fuzzy Hash: 36caebe1fe8aa1eff7ff321662443c514d6827d4f2801b7b393fcb4226acda68
                                                            • Instruction Fuzzy Hash: CC0171B1200609ABDF305F11DD84B9B3666EBD4356F508037FA00761E1C77A8DD29A6E
                                                            APIs
                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000800,00000002,00422708,00000000,?,?,Call,?,?,0040652A,80000002), ref: 004062FC
                                                            • RegCloseKey.ADVAPI32(?,?,0040652A,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,00000000,00422708), ref: 00406307
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: CloseQueryValue
                                                            • String ID: Call
                                                            • API String ID: 3356406503-1824292864
                                                            • Opcode ID: c86c14991d827863ed80974af0b6eb11eee99485bcf286d774b2a77da772c934
                                                            • Instruction ID: efe3e51cb47fe95fa6bbb83f3cb46ebf457b8c4b35673ac5825ceff03b23bf8b
                                                            • Opcode Fuzzy Hash: c86c14991d827863ed80974af0b6eb11eee99485bcf286d774b2a77da772c934
                                                            • Instruction Fuzzy Hash: B301717250020AEBDF218F55CD09EDB3FA9EF55354F114039FD15A2150E778D964CBA4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: db40346bc9fd20083a39152eff8b5ac78f5cdc0ebc59631a5c9ad52422038ace
                                                            • Instruction ID: 2bd06e12bed6e0bcd81d630d0cd78bd49004ac77cb8b5ebb757de7108a839e92
                                                            • Opcode Fuzzy Hash: db40346bc9fd20083a39152eff8b5ac78f5cdc0ebc59631a5c9ad52422038ace
                                                            • Instruction Fuzzy Hash: 1DA14471E04228CBDF28CFA8C8446ADBBB1FF44305F14806ED856BB281D7786A86DF45
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9d32937a43efcd2dea5d1fc698e3fcc0023127280f8acdc5c544d8c7d1790a46
                                                            • Instruction ID: f1da02a2f8b93330a3d469e31e6e9edf047fa596270f1f1d86c95cc791e20b04
                                                            • Opcode Fuzzy Hash: 9d32937a43efcd2dea5d1fc698e3fcc0023127280f8acdc5c544d8c7d1790a46
                                                            • Instruction Fuzzy Hash: AA910271E04228CBEF28CF98C8447ADBBB1FB45305F14816AD856BB291C778A986DF45
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 67d6f810e310069c411d265ffcddf6abea8090fb20e8d2db1667143610fe5bd5
                                                            • Instruction ID: fb1d02f26201205f5bfcbd3029eb7cfad7cca69a3f8c46de7b35964bdd0c3f7d
                                                            • Opcode Fuzzy Hash: 67d6f810e310069c411d265ffcddf6abea8090fb20e8d2db1667143610fe5bd5
                                                            • Instruction Fuzzy Hash: 18814571E04228DFDF24CFA8C844BADBBB1FB45305F24816AD856BB291C7389986DF45
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5328a0701a0a32b67c374057837e60552721ea1a6811a44abe83e42546375677
                                                            • Instruction ID: 55fc176551b00f8465723d30588461dcf2fc1d3195b414c524ee7a2fcbdbe87b
                                                            • Opcode Fuzzy Hash: 5328a0701a0a32b67c374057837e60552721ea1a6811a44abe83e42546375677
                                                            • Instruction Fuzzy Hash: 39815971E04228DBEF24CFA8C844BADBBB1FB45305F14816AD856BB2C1C7786986DF45
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a445a859154d96951751bba7131c1a69e0b73c0895ac35a4e96b2d7ee743491b
                                                            • Instruction ID: 7645ab34ef40ba223d211dbe726f8302725d3f31b3e808d93cc70016d3e0d248
                                                            • Opcode Fuzzy Hash: a445a859154d96951751bba7131c1a69e0b73c0895ac35a4e96b2d7ee743491b
                                                            • Instruction Fuzzy Hash: 10711471E04228DBDF24CF98C8447ADBBB1FF49305F15806AD856BB281C7389A86DF45
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cd7d90a79d0f10410712768d5bba8e0713d9e8f593557aa9bf16db43d4616d0f
                                                            • Instruction ID: a4e19b7408f2815589132e7e2b866ae2b9c8caa40868d81b8a4623295251dea3
                                                            • Opcode Fuzzy Hash: cd7d90a79d0f10410712768d5bba8e0713d9e8f593557aa9bf16db43d4616d0f
                                                            • Instruction Fuzzy Hash: 0D712571E04218DBEF28CF98C844BADBBB1FF45305F15806AD856BB281C7389986DF45
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 08b8d2b65a0c1c30b5e83c7ea62cdb0658c0fab8542c410d93f606ef21acc8e7
                                                            • Instruction ID: 979076adb26e5f1e3e7a9458f232081f51f9a0722543042d1d726f4d31452a21
                                                            • Opcode Fuzzy Hash: 08b8d2b65a0c1c30b5e83c7ea62cdb0658c0fab8542c410d93f606ef21acc8e7
                                                            • Instruction Fuzzy Hash: 50714871E04228DBEF28CF98C8447ADBBB1FF45305F15806AD856BB281C7386A46DF45
                                                            APIs
                                                            • GetTickCount.KERNEL32 ref: 004032F2
                                                              • Part of subcall function 0040345D: SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040315B,?), ref: 0040346B
                                                            • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,00403208,00000004,00000000,00000000,?,?,00403182,000000FF,00000000,00000000,0040A230,?), ref: 00403325
                                                            • SetFilePointer.KERNELBASE(0015A7DF,00000000,00000000,00414ED0,00004000,?,00000000,00403208,00000004,00000000,00000000,?,?,00403182,000000FF,00000000), ref: 00403420
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: FilePointer$CountTick
                                                            • String ID:
                                                            • API String ID: 1092082344-0
                                                            • Opcode ID: 46bf3b49fb3124b20b26849d3f96ebab8958347a080c85236d637af58840fa95
                                                            • Instruction ID: a2c2ae871b20a7f651e14226ae934804f023725c52e887911cb1b1382089a511
                                                            • Opcode Fuzzy Hash: 46bf3b49fb3124b20b26849d3f96ebab8958347a080c85236d637af58840fa95
                                                            • Instruction Fuzzy Hash: 54313872610215DBD721DF29EEC496A3BA9F74039A754433FE900F62E0CBB99D018B9D
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000,?,000000F0), ref: 0040205D
                                                              • Part of subcall function 00405450: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                              • Part of subcall function 00405450: lstrlenW.KERNEL32(00402F08,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                              • Part of subcall function 00405450: lstrcatW.KERNEL32(00422708,00402F08,00402F08,00422708,00000000,00000000,00000000), ref: 004054AB
                                                              • Part of subcall function 00405450: SetWindowTextW.USER32(00422708,00422708), ref: 004054BD
                                                              • Part of subcall function 00405450: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                              • Part of subcall function 00405450: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                              • Part of subcall function 00405450: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                            • LoadLibraryExW.KERNEL32(00000000,?,00000008,?,000000F0), ref: 0040206E
                                                            • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,?,000000F0), ref: 004020EB
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                            • String ID:
                                                            • API String ID: 334405425-0
                                                            • Opcode ID: c0091ceae9cfbdad611b36e7acbab474ec2c1bafca6550aebcba3b122e164ceb
                                                            • Instruction ID: 38390b8595ebf5dc4f6cf14c4d4b7ed92d06cc21542818b97b262269bef072d5
                                                            • Opcode Fuzzy Hash: c0091ceae9cfbdad611b36e7acbab474ec2c1bafca6550aebcba3b122e164ceb
                                                            • Instruction Fuzzy Hash: DC218331D00215BACF20AFA5CE4D99E7A70BF04358F60413BF511B51E0DBBD8991DA6E
                                                            APIs
                                                            • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 0040252B
                                                            • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 0040253E
                                                            • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nslB6AB.tmp,00000000,00000011,00000002), ref: 00402557
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Enum$CloseValue
                                                            • String ID:
                                                            • API String ID: 397863658-0
                                                            • Opcode ID: 962e8dbebea2d0e856bbe812d5e95e45bdf7d67f5620c7d5b12d357826d7025c
                                                            • Instruction ID: 69a0bd767b5398a5b54c194fc83da7942780fa4e63ecbf8b5358c30743fc2944
                                                            • Opcode Fuzzy Hash: 962e8dbebea2d0e856bbe812d5e95e45bdf7d67f5620c7d5b12d357826d7025c
                                                            • Instruction Fuzzy Hash: 4B017171904204ABEB149F95DE88ABF7AB8EF80348F10403EF505B61D0DAB85E419B69
                                                            APIs
                                                            • SetFilePointer.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,?,?,00403182,000000FF,00000000,00000000,0040A230,?), ref: 004031FB
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: FilePointer
                                                            • String ID:
                                                            • API String ID: 973152223-0
                                                            • Opcode ID: 09b1e881bc629fe9623964bcd0dac9c3534a319fde10b4dd95dd132c0a2dd849
                                                            • Instruction ID: f938e70baf20f89fc7421c1cbc4d65c8cbb1a4a40291e2e844035b0cdbff1196
                                                            • Opcode Fuzzy Hash: 09b1e881bc629fe9623964bcd0dac9c3534a319fde10b4dd95dd132c0a2dd849
                                                            • Instruction Fuzzy Hash: 53314B30200219BBDB109F95ED84ADA3E68EB04759F20857EF905E62D0D6789A509BA9
                                                            APIs
                                                            • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,?,?), ref: 004024B5
                                                            • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nslB6AB.tmp,00000000,00000011,00000002), ref: 00402557
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: CloseQueryValue
                                                            • String ID:
                                                            • API String ID: 3356406503-0
                                                            • Opcode ID: 63b64fe82c2f511c8169af5ec8c0190f19a921c94039209ad64b866aaad41420
                                                            • Instruction ID: 8b4d26b48c61f4aea5aea8b01f6eaa690eaa4425e6198d6413393360261ed691
                                                            • Opcode Fuzzy Hash: 63b64fe82c2f511c8169af5ec8c0190f19a921c94039209ad64b866aaad41420
                                                            • Instruction Fuzzy Hash: 61119431910205EBDB14DF64CA585AE7BB4EF44348F20843FE445B72D0D6B85A81EB5A
                                                            APIs
                                                            • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                            • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID:
                                                            • API String ID: 3850602802-0
                                                            • Opcode ID: 23ed1533968369fb0e08a97211bc38e5ec6adcca8744e4a1682e6817b2d67833
                                                            • Instruction ID: 4945fb4554c9d48a14a82d28c5fc4c127f2c3d85d8aa5c2a63fae023cf5e702c
                                                            • Opcode Fuzzy Hash: 23ed1533968369fb0e08a97211bc38e5ec6adcca8744e4a1682e6817b2d67833
                                                            • Instruction Fuzzy Hash: AB01F431724210EBEB199B789D04B2A3698E710714F104A7FF855F62F1DA78CC529B5D
                                                            APIs
                                                            • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 004023B0
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 004023B9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: CloseDeleteValue
                                                            • String ID:
                                                            • API String ID: 2831762973-0
                                                            • Opcode ID: a00859f013a8106156cc87040160a2b11e5294e3cc8a521d5b70861134e176e9
                                                            • Instruction ID: 92c71ce55c792e737e0c56b3c5c8c262173643586798c2a655fc457b9e75749a
                                                            • Opcode Fuzzy Hash: a00859f013a8106156cc87040160a2b11e5294e3cc8a521d5b70861134e176e9
                                                            • Instruction Fuzzy Hash: 5FF0F632E041109BE700BBA49B8EABE72A49B44314F29003FFE42F31C0CAF85D42976D
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(?,00000020,?,00403517,0000000A), ref: 004067D4
                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 004067EF
                                                              • Part of subcall function 00406752: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406769
                                                              • Part of subcall function 00406752: wsprintfW.USER32 ref: 004067A4
                                                              • Part of subcall function 00406752: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067B8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                            • String ID:
                                                            • API String ID: 2547128583-0
                                                            • Opcode ID: 32c59c0b14b548542ecf76b068d43d3c76fab82d66a171b1af570515759e8b4d
                                                            • Instruction ID: 7b80e99db610fb1a261844a57c40f0e669857592e3492eb3b2a0c0f7ce0b312d
                                                            • Opcode Fuzzy Hash: 32c59c0b14b548542ecf76b068d43d3c76fab82d66a171b1af570515759e8b4d
                                                            • Instruction Fuzzy Hash: 14E086325042115BD21057745E48D3762AC9AC4704307843EF556F3041DB78DC35B66E
                                                            APIs
                                                            • GetFileAttributesW.KERNELBASE(00000003,00402F73,C:\Users\user\Desktop\WGi85dsMNp.exe,80000000,00000003), ref: 00405EE2
                                                            • CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405F04
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: File$AttributesCreate
                                                            • String ID:
                                                            • API String ID: 415043291-0
                                                            • Opcode ID: 133c91a1dbaf88dbfd801214b1c0a7aa23d67a900b7421546c440c33baf3910c
                                                            • Instruction ID: 5201df1ff3c0a0bd0294a98706b79309786c42e99614e685d4e3591f63f4d9e2
                                                            • Opcode Fuzzy Hash: 133c91a1dbaf88dbfd801214b1c0a7aa23d67a900b7421546c440c33baf3910c
                                                            • Instruction Fuzzy Hash: D5D09E31254601AFEF098F20DE16F2E7AA2EB84B04F11552CB7C2940E0DA7158199B15
                                                            APIs
                                                            • CreateDirectoryW.KERNELBASE(?,00000000,00403498,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,74DF3420,004036EF,?,00000006,00000008,0000000A), ref: 004059A2
                                                            • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 004059B0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: CreateDirectoryErrorLast
                                                            • String ID:
                                                            • API String ID: 1375471231-0
                                                            • Opcode ID: 2a128b8619e21daab1f352946d406dfe7ea7319ba132ee6f2f415100985951e7
                                                            • Instruction ID: 01a40f06620425e1c555583f7199589d3835b04f5715874dbca4219b9923c3a9
                                                            • Opcode Fuzzy Hash: 2a128b8619e21daab1f352946d406dfe7ea7319ba132ee6f2f415100985951e7
                                                            • Instruction Fuzzy Hash: D6C04C71216502DAF7115F31DF09B177A50AB60751F11843AA146E11A4DA349455D92D
                                                            APIs
                                                            • CreateFileA.KERNELBASE(00000000), ref: 6F982B6B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1843161593.000000006F981000.00000020.00000001.01000000.00000004.sdmp, Offset: 6F980000, based on PE: true
                                                            • Associated: 00000000.00000002.1843143747.000000006F980000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000000.00000002.1843217258.000000006F984000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000000.00000002.1843234521.000000006F986000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6f980000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: CreateFile
                                                            • String ID:
                                                            • API String ID: 823142352-0
                                                            • Opcode ID: 2d69599441a3c83dc3d7456e0bc643548bfdb2bf4474c282cd554e06687cee9f
                                                            • Instruction ID: 0f4db678a29a3a4d641dc43398bf8ca770e3b96414137fc4e2a980b92a3ae899
                                                            • Opcode Fuzzy Hash: 2d69599441a3c83dc3d7456e0bc643548bfdb2bf4474c282cd554e06687cee9f
                                                            • Instruction Fuzzy Hash: 5D4191B2408744DFEB20DF68D94576937A8EF16338F204C6AE5399A2C0D735E8989F91
                                                            APIs
                                                            • MoveFileW.KERNEL32(00000000,00000000), ref: 00401696
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: FileMove
                                                            • String ID:
                                                            • API String ID: 3562171763-0
                                                            • Opcode ID: f4993909eaaf04b4d10f0c262de6f8e1be0fd70d19c578988f2b9bef0751c49c
                                                            • Instruction ID: 73a88bd3a5ced7927151e6ebce11b30d6a6a5b8b2c4e1db0cab765602213b928
                                                            • Opcode Fuzzy Hash: f4993909eaaf04b4d10f0c262de6f8e1be0fd70d19c578988f2b9bef0751c49c
                                                            • Instruction Fuzzy Hash: CBF09031A0851197DF10BBA54F4DD5E22509B8236CB28073BB412B21E1DAFDC542A56E
                                                            APIs
                                                            • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 0040280D
                                                              • Part of subcall function 0040632F: wsprintfW.USER32 ref: 0040633C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: FilePointerwsprintf
                                                            • String ID:
                                                            • API String ID: 327478801-0
                                                            • Opcode ID: 38b593970e7e5e8d656344d1d4c72dba1b6d10a1f376cfd8863b7a874be62c28
                                                            • Instruction ID: 7217e66a6bf97858787bec6454aeb19e768c89e60d383eb7a66a1db5dd3d6cef
                                                            • Opcode Fuzzy Hash: 38b593970e7e5e8d656344d1d4c72dba1b6d10a1f376cfd8863b7a874be62c28
                                                            • Instruction Fuzzy Hash: 8BE06D71E00104ABD710DBA5AE098AEB7B8DB84308B60403BF601B10D0CA7959518E2E
                                                            APIs
                                                            • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402CF2,00000000,?,?), ref: 004062AC
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                                            • Instruction ID: b492cd94208fe9a136032c47e7ca6226b28abdd7f17191690e67bc203102cabe
                                                            • Opcode Fuzzy Hash: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                                            • Instruction Fuzzy Hash: 94E0E672010209BEDF195F50DD0AD7B371DEB04304F11492EFA06D4051E6B5AD706634
                                                            APIs
                                                            • ReadFile.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,00414ED0,0040CED0,0040345A,0040A230,0040A230,0040335E,00414ED0,00004000,?,00000000,00403208), ref: 00405F75
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: FileRead
                                                            • String ID:
                                                            • API String ID: 2738559852-0
                                                            • Opcode ID: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                                                            • Instruction ID: 5f0138a6a2c6563494c064dd15accf188ef387db15323854b273470b931b092f
                                                            • Opcode Fuzzy Hash: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                                                            • Instruction Fuzzy Hash: 7AE0EC3221025AAFDF109E959D04EFB7B6CEB05360F044836FD15E6150D675E8619BA4
                                                            APIs
                                                            • WriteFile.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,00410444,0040CED0,004033DE,0040CED0,00410444,00414ED0,00004000,?,00000000,00403208,00000004), ref: 00405FA4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: FileWrite
                                                            • String ID:
                                                            • API String ID: 3934441357-0
                                                            • Opcode ID: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                                                            • Instruction ID: 11bffb161eade2b6c2cb4bf4b25223a29cd6195b7324502744f40ed25e3c63a9
                                                            • Opcode Fuzzy Hash: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                                                            • Instruction Fuzzy Hash: 20E08C3220125BEBEF119E518C00AEBBB6CFB003A0F004432FD11E3180D234E9208BA8
                                                            APIs
                                                            • VirtualProtect.KERNELBASE(6F98505C,00000004,00000040,6F98504C), ref: 6F9829B1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1843161593.000000006F981000.00000020.00000001.01000000.00000004.sdmp, Offset: 6F980000, based on PE: true
                                                            • Associated: 00000000.00000002.1843143747.000000006F980000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000000.00000002.1843217258.000000006F984000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000000.00000002.1843234521.000000006F986000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6f980000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: ProtectVirtual
                                                            • String ID:
                                                            • API String ID: 544645111-0
                                                            • Opcode ID: 7bb3ad93a7db337bb2c1bc18509a5385b7404887337254ecb28106785bff1138
                                                            • Instruction ID: 572398b5da6198235d5212ea31e61b2446737f2da71b8af6787496479d975513
                                                            • Opcode Fuzzy Hash: 7bb3ad93a7db337bb2c1bc18509a5385b7404887337254ecb28106785bff1138
                                                            • Instruction Fuzzy Hash: E4F07FB0508A80DEEB50CF2C84446193FE0BB4B234B104D2AA26EEA380E374846C9F92
                                                            APIs
                                                            • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,00422708,?,?,004062E3,00422708,00000000,?,?,Call,?), ref: 00406279
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Open
                                                            • String ID:
                                                            • API String ID: 71445658-0
                                                            • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                            • Instruction ID: 7481b87947078d819ae160a747d33610cb99cd3c2235475b1dc937127606ac98
                                                            • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                            • Instruction Fuzzy Hash: C1D0123210420DBBDF11AE90DD01FAB372DAF14714F114826FE06A4091D775D530AB14
                                                            APIs
                                                            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040315B,?), ref: 0040346B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: FilePointer
                                                            • String ID:
                                                            • API String ID: 973152223-0
                                                            • Opcode ID: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                                                            • Instruction ID: c7266a3154837caca095f11e7777f6dda2278cbf6cff4ee7664d3894fc3aa091
                                                            • Opcode Fuzzy Hash: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                                                            • Instruction Fuzzy Hash: ECB01271240300BFDA214F00DF09F057B21AB90700F10C034B348380F086711035EB0D
                                                            APIs
                                                            • SendMessageW.USER32(00000028,?,?,004041BF), ref: 004043A2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID:
                                                            • API String ID: 3850602802-0
                                                            • Opcode ID: bd7e8dc2c5871e064c502d82a01b6574672f0de651032f207fd53ed2aa40cebc
                                                            • Instruction ID: e4171d0a4592585bcf4a2ca6fb2eaed9aff33c093be5cb9cf1e9125a9c9e1139
                                                            • Opcode Fuzzy Hash: bd7e8dc2c5871e064c502d82a01b6574672f0de651032f207fd53ed2aa40cebc
                                                            • Instruction Fuzzy Hash: 0EB09235290600ABDE214B40DE49F457A62E7A4701F008178B240640B0CAB200A1DB19
                                                            APIs
                                                            • GetDlgItem.USER32(?,00000403), ref: 004055ED
                                                            • GetDlgItem.USER32(?,000003EE), ref: 004055FC
                                                            • GetClientRect.USER32(?,?), ref: 00405639
                                                            • GetSystemMetrics.USER32(00000002), ref: 00405640
                                                            • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405661
                                                            • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405672
                                                            • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405685
                                                            • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405693
                                                            • SendMessageW.USER32(?,00001024,00000000,?), ref: 004056A6
                                                            • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004056C8
                                                            • ShowWindow.USER32(?,00000008), ref: 004056DC
                                                            • GetDlgItem.USER32(?,000003EC), ref: 004056FD
                                                            • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040570D
                                                            • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405726
                                                            • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405732
                                                            • GetDlgItem.USER32(?,000003F8), ref: 0040560B
                                                              • Part of subcall function 00404394: SendMessageW.USER32(00000028,?,?,004041BF), ref: 004043A2
                                                            • GetDlgItem.USER32(?,000003EC), ref: 0040574F
                                                            • CreateThread.KERNEL32(00000000,00000000,Function_00005523,00000000), ref: 0040575D
                                                            • CloseHandle.KERNEL32(00000000), ref: 00405764
                                                            • ShowWindow.USER32(00000000), ref: 00405788
                                                            • ShowWindow.USER32(?,00000008), ref: 0040578D
                                                            • ShowWindow.USER32(00000008), ref: 004057D7
                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040580B
                                                            • CreatePopupMenu.USER32 ref: 0040581C
                                                            • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405830
                                                            • GetWindowRect.USER32(?,?), ref: 00405850
                                                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405869
                                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 004058A1
                                                            • OpenClipboard.USER32(00000000), ref: 004058B1
                                                            • EmptyClipboard.USER32 ref: 004058B7
                                                            • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004058C3
                                                            • GlobalLock.KERNEL32(00000000), ref: 004058CD
                                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 004058E1
                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00405901
                                                            • SetClipboardData.USER32(0000000D,00000000), ref: 0040590C
                                                            • CloseClipboard.USER32 ref: 00405912
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                            • String ID: (7B${
                                                            • API String ID: 590372296-525222780
                                                            • Opcode ID: 1d1f977673fe441afad02026140f53aaec566053b515a361d3c8f7f727d52ca3
                                                            • Instruction ID: ef9837d71be30d97cad1ad5ee6bf48d4101bac37d77d0ad6e239d9f51a57dc01
                                                            • Opcode Fuzzy Hash: 1d1f977673fe441afad02026140f53aaec566053b515a361d3c8f7f727d52ca3
                                                            • Instruction Fuzzy Hash: C4B16A70900608FFDB11AFA0DD85AAE7B79FB48355F00403AFA45B61A0CB754E52DF68
                                                            APIs
                                                            • GetDlgItem.USER32(?,000003FB), ref: 0040489F
                                                            • SetWindowTextW.USER32(00000000,?), ref: 004048C9
                                                            • SHBrowseForFolderW.SHELL32(?), ref: 0040497A
                                                            • CoTaskMemFree.OLE32(00000000), ref: 00404985
                                                            • lstrcmpiW.KERNEL32(Call,00423728,00000000,?,?), ref: 004049B7
                                                            • lstrcatW.KERNEL32(?,Call), ref: 004049C3
                                                            • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004049D5
                                                              • Part of subcall function 00405A32: GetDlgItemTextW.USER32(?,?,00000400,00404A0C), ref: 00405A45
                                                              • Part of subcall function 0040667C: CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00435000,00403480,C:\Users\user\AppData\Local\Temp\,74DF3420,004036EF,?,00000006,00000008,0000000A), ref: 004066DF
                                                              • Part of subcall function 0040667C: CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004066EE
                                                              • Part of subcall function 0040667C: CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00435000,00403480,C:\Users\user\AppData\Local\Temp\,74DF3420,004036EF,?,00000006,00000008,0000000A), ref: 004066F3
                                                              • Part of subcall function 0040667C: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00435000,00403480,C:\Users\user\AppData\Local\Temp\,74DF3420,004036EF,?,00000006,00000008,0000000A), ref: 00406706
                                                            • GetDiskFreeSpaceW.KERNEL32(004216F8,?,?,0000040F,?,004216F8,004216F8,?,?,004216F8,?,?,000003FB,?), ref: 00404A98
                                                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404AB3
                                                              • Part of subcall function 00404C0C: lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404CAD
                                                              • Part of subcall function 00404C0C: wsprintfW.USER32 ref: 00404CB6
                                                              • Part of subcall function 00404C0C: SetDlgItemTextW.USER32(?,00423728), ref: 00404CC9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                            • String ID: (7B$A$Call
                                                            • API String ID: 2624150263-413618503
                                                            • Opcode ID: 60ed21fe2f328070877fcf4fb1291f079d9e461e65f212612ce38389da6d49e8
                                                            • Instruction ID: 217fbe9c53fcac7a38d38ba6b36a95d3c52d9e466bb1b0d29fe77156d884dce9
                                                            • Opcode Fuzzy Hash: 60ed21fe2f328070877fcf4fb1291f079d9e461e65f212612ce38389da6d49e8
                                                            • Instruction Fuzzy Hash: 01A161F1A00205ABDB11EFA5C985AAF77B8EF84315F10803BF611B62D1D77C9A418B6D
                                                            APIs
                                                            • CoCreateInstance.OLE32(004084E4,?,?,004084D4,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402183
                                                            Strings
                                                            • C:\Users\user\AppData\Local\Iw\Unnumberable, xrefs: 004021C3
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: CreateInstance
                                                            • String ID: C:\Users\user\AppData\Local\Iw\Unnumberable
                                                            • API String ID: 542301482-2910234805
                                                            • Opcode ID: 4630f11a642d4e3ef4f98d2454dc0e8d663bfbe8c95ddff176ede1b1d5b4d77b
                                                            • Instruction ID: a370b0fa9b2e606d6813e98b4c017b265e4ea8c47d708310f479c561ceb58c7b
                                                            • Opcode Fuzzy Hash: 4630f11a642d4e3ef4f98d2454dc0e8d663bfbe8c95ddff176ede1b1d5b4d77b
                                                            • Instruction Fuzzy Hash: 80414A71A00208AFCF04DFE4C988A9D7BB5FF48314B24457AF915EB2E1DBB99981CB54
                                                            APIs
                                                            • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402877
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: FileFindFirst
                                                            • String ID:
                                                            • API String ID: 1974802433-0
                                                            • Opcode ID: 6fd2962910cdf18594a7907c322fc030c9e7a26b232b9d9b5d327205302d7dac
                                                            • Instruction ID: e6f127318fd58302517648c6e406f49d0db104963aa8d987e753e5cb7f87edca
                                                            • Opcode Fuzzy Hash: 6fd2962910cdf18594a7907c322fc030c9e7a26b232b9d9b5d327205302d7dac
                                                            • Instruction Fuzzy Hash: EDF08271A14104EBDB10DBA4DA499AEB378EF14314F60467BF545F21E0DBB45D809B2A
                                                            APIs
                                                            • CheckDlgButton.USER32(?,-0000040A,?), ref: 004045BC
                                                            • GetDlgItem.USER32(?,000003E8), ref: 004045D0
                                                            • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 004045ED
                                                            • GetSysColor.USER32(?), ref: 004045FE
                                                            • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 0040460C
                                                            • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040461A
                                                            • lstrlenW.KERNEL32(?), ref: 0040461F
                                                            • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 0040462C
                                                            • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404641
                                                            • GetDlgItem.USER32(?,0000040A), ref: 0040469A
                                                            • SendMessageW.USER32(00000000), ref: 004046A1
                                                            • GetDlgItem.USER32(?,000003E8), ref: 004046CC
                                                            • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 0040470F
                                                            • LoadCursorW.USER32(00000000,00007F02), ref: 0040471D
                                                            • SetCursor.USER32(00000000), ref: 00404720
                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 00404739
                                                            • SetCursor.USER32(00000000), ref: 0040473C
                                                            • SendMessageW.USER32(00000111,?,00000000), ref: 0040476B
                                                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040477D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                            • String ID: Call$N
                                                            • API String ID: 3103080414-3438112850
                                                            • Opcode ID: c2d943e7d3074a80d89972f065d7b0d6c6867904808fb573d17a53c74c23d30b
                                                            • Instruction ID: 26ae409e5f73424340e4bb55f347a499eb46e427c8d4328441e026d38e95c6c2
                                                            • Opcode Fuzzy Hash: c2d943e7d3074a80d89972f065d7b0d6c6867904808fb573d17a53c74c23d30b
                                                            • Instruction Fuzzy Hash: 4B6173B1900209BFDB109F60DD85EAA7B69FB84314F00853AFB05772E0D7789D52CB58
                                                            APIs
                                                            • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                            • BeginPaint.USER32(?,?), ref: 00401047
                                                            • GetClientRect.USER32(?,?), ref: 0040105B
                                                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                            • DeleteObject.GDI32(?), ref: 004010ED
                                                            • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                            • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                            • SelectObject.GDI32(00000000,?), ref: 00401140
                                                            • DrawTextW.USER32(00000000,00429240,000000FF,00000010,00000820), ref: 00401156
                                                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                            • DeleteObject.GDI32(?), ref: 00401165
                                                            • EndPaint.USER32(?,?), ref: 0040116E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                            • String ID: F
                                                            • API String ID: 941294808-1304234792
                                                            • Opcode ID: a62f14d8607f0cab4b909ce482175ba86ddefa50def87cd09a38214d4056f576
                                                            • Instruction ID: b35030fe9107d9a8359b932f7918d2348922827c9ca57aaae851fe5b21190c6b
                                                            • Opcode Fuzzy Hash: a62f14d8607f0cab4b909ce482175ba86ddefa50def87cd09a38214d4056f576
                                                            • Instruction Fuzzy Hash: 92418A71800249AFCF058FA5DE459AFBBB9FF44310F00842AF991AA1A0C738E955DFA4
                                                            APIs
                                                            • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,?,?,004061CF,?,?), ref: 0040606F
                                                            • GetShortPathNameW.KERNEL32(?,00426DC8,00000400), ref: 00406078
                                                              • Part of subcall function 00405E43: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E53
                                                              • Part of subcall function 00405E43: lstrlenA.KERNEL32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E85
                                                            • GetShortPathNameW.KERNEL32(?,004275C8,00000400), ref: 00406095
                                                            • wsprintfA.USER32 ref: 004060B3
                                                            • GetFileSize.KERNEL32(00000000,00000000,004275C8,C0000000,00000004,004275C8,?,?,?,?,?), ref: 004060EE
                                                            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 004060FD
                                                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406135
                                                            • SetFilePointer.KERNEL32(0040A590,00000000,00000000,00000000,00000000,004269C8,00000000,-0000000A,0040A590,00000000,[Rename],00000000,00000000,00000000), ref: 0040618B
                                                            • GlobalFree.KERNEL32(00000000), ref: 0040619C
                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004061A3
                                                              • Part of subcall function 00405EDE: GetFileAttributesW.KERNELBASE(00000003,00402F73,C:\Users\user\Desktop\WGi85dsMNp.exe,80000000,00000003), ref: 00405EE2
                                                              • Part of subcall function 00405EDE: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405F04
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                            • String ID: %ls=%ls$[Rename]
                                                            • API String ID: 2171350718-461813615
                                                            • Opcode ID: a8f6130d4aa3065939d725957225dfc1b425243e5004b20d0867480790577512
                                                            • Instruction ID: 8c4bc4cab4d3408e43c29de3b383fd3cef376d344e04ab2aaf2f470794b42cbb
                                                            • Opcode Fuzzy Hash: a8f6130d4aa3065939d725957225dfc1b425243e5004b20d0867480790577512
                                                            • Instruction Fuzzy Hash: 34313770200719BFD2206B619D48F6B3A6CEF45704F16043EFA46FA2D3DA3C99158ABD
                                                            APIs
                                                            • GetWindowLongW.USER32(?,000000EB), ref: 004043E3
                                                            • GetSysColor.USER32(00000000), ref: 00404421
                                                            • SetTextColor.GDI32(?,00000000), ref: 0040442D
                                                            • SetBkMode.GDI32(?,?), ref: 00404439
                                                            • GetSysColor.USER32(?), ref: 0040444C
                                                            • SetBkColor.GDI32(?,?), ref: 0040445C
                                                            • DeleteObject.GDI32(?), ref: 00404476
                                                            • CreateBrushIndirect.GDI32(?), ref: 00404480
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                            • String ID:
                                                            • API String ID: 2320649405-0
                                                            • Opcode ID: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                            • Instruction ID: 4d8d1a64c5805e8a020b3744e793f2033a9a6b6b0a681029562fed9dd316a9da
                                                            • Opcode Fuzzy Hash: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                            • Instruction Fuzzy Hash: 722131715007049BCB319F68D948B5BBBF8AF81714B148A2EEE96E26E0D738D944CB54
                                                            APIs
                                                            • lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                            • lstrlenW.KERNEL32(00402F08,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                            • lstrcatW.KERNEL32(00422708,00402F08,00402F08,00422708,00000000,00000000,00000000), ref: 004054AB
                                                            • SetWindowTextW.USER32(00422708,00422708), ref: 004054BD
                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                            • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                            • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                            • String ID:
                                                            • API String ID: 2531174081-0
                                                            • Opcode ID: d8bd542d8f5d0add287beae510a16995646733a1dc03fc5179ed0d48c47eb8dc
                                                            • Instruction ID: e73fa1987b6059f35b704de59c80f6892b54c3d1ee51518932a2041d94d0b0cb
                                                            • Opcode Fuzzy Hash: d8bd542d8f5d0add287beae510a16995646733a1dc03fc5179ed0d48c47eb8dc
                                                            • Instruction Fuzzy Hash: BE21A171900558BACB119F95DD84ACFBFB5EF84314F10803AF904B22A1C3798A91CFA8
                                                            APIs
                                                            • CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00435000,00403480,C:\Users\user\AppData\Local\Temp\,74DF3420,004036EF,?,00000006,00000008,0000000A), ref: 004066DF
                                                            • CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004066EE
                                                            • CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00435000,00403480,C:\Users\user\AppData\Local\Temp\,74DF3420,004036EF,?,00000006,00000008,0000000A), ref: 004066F3
                                                            • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00435000,00403480,C:\Users\user\AppData\Local\Temp\,74DF3420,004036EF,?,00000006,00000008,0000000A), ref: 00406706
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Char$Next$Prev
                                                            • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                            • API String ID: 589700163-4010320282
                                                            • Opcode ID: 6f1dc59467bf7cdf849013f1baa50d92fe1cb62039c7f0915d7e3466f5f67e46
                                                            • Instruction ID: ccb021e8c97aa0e4e9f296cc8cc4b0d2e06c32826977e33acd3911ee1a404cd3
                                                            • Opcode Fuzzy Hash: 6f1dc59467bf7cdf849013f1baa50d92fe1cb62039c7f0915d7e3466f5f67e46
                                                            • Instruction Fuzzy Hash: E011C82580061295DB302B548C44B77A2E8EF55764F52843FE985B32C1EB7D5CE28ABD
                                                            APIs
                                                            • DestroyWindow.USER32(00000000,00000000), ref: 00402EA9
                                                            • GetTickCount.KERNEL32 ref: 00402EC7
                                                            • wsprintfW.USER32 ref: 00402EF5
                                                              • Part of subcall function 00405450: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                              • Part of subcall function 00405450: lstrlenW.KERNEL32(00402F08,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                              • Part of subcall function 00405450: lstrcatW.KERNEL32(00422708,00402F08,00402F08,00422708,00000000,00000000,00000000), ref: 004054AB
                                                              • Part of subcall function 00405450: SetWindowTextW.USER32(00422708,00422708), ref: 004054BD
                                                              • Part of subcall function 00405450: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                              • Part of subcall function 00405450: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                              • Part of subcall function 00405450: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                            • CreateDialogParamW.USER32(0000006F,00000000,00402DF3,00000000), ref: 00402F19
                                                            • ShowWindow.USER32(00000000,00000005), ref: 00402F27
                                                              • Part of subcall function 00402E72: MulDiv.KERNEL32(00017969,00000064,00017ED2), ref: 00402E87
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                            • String ID: ... %d%%
                                                            • API String ID: 722711167-2449383134
                                                            • Opcode ID: c40ddff33436de44b244b2b19f9e8da7546f4e0328de08243a0837e5050f2c6b
                                                            • Instruction ID: c65c9f61eb329069142d3a49436c3393aeffd9891ae55f37d91fa0e4ac25720a
                                                            • Opcode Fuzzy Hash: c40ddff33436de44b244b2b19f9e8da7546f4e0328de08243a0837e5050f2c6b
                                                            • Instruction Fuzzy Hash: 1A016170941614EBC7226B60EE4DA9B7B68BB01745B50413FF841F12E0CAB84459DBEE
                                                            APIs
                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404D35
                                                            • GetMessagePos.USER32 ref: 00404D3D
                                                            • ScreenToClient.USER32(?,?), ref: 00404D57
                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404D69
                                                            • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404D8F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Message$Send$ClientScreen
                                                            • String ID: f
                                                            • API String ID: 41195575-1993550816
                                                            • Opcode ID: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                                            • Instruction ID: ac2b37e4453cd55ff3643614bd1240a9a451636028a825994647dd398b99f398
                                                            • Opcode Fuzzy Hash: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                                            • Instruction Fuzzy Hash: 23015E71940218BADB00DB94DD85FFEBBBCAF95711F10412BBA50F62D0D7B499018BA4
                                                            APIs
                                                            • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402E11
                                                            • wsprintfW.USER32 ref: 00402E45
                                                            • SetWindowTextW.USER32(?,?), ref: 00402E55
                                                            • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402E67
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Text$ItemTimerWindowwsprintf
                                                            • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                            • API String ID: 1451636040-1158693248
                                                            • Opcode ID: a591fce2f88080881549ac7e7473da6278debd618655821d08f98b44133a3158
                                                            • Instruction ID: 1bfa7b94c56a1c823be81e007cf4dd9dcc28a4463181553f30e61efe61dd31fb
                                                            • Opcode Fuzzy Hash: a591fce2f88080881549ac7e7473da6278debd618655821d08f98b44133a3158
                                                            • Instruction Fuzzy Hash: 30F0317064020CABDF206F60DD4ABEE3B69EB40319F00803AFA45B51D0DBB999598F99
                                                            APIs
                                                              • Part of subcall function 6F98121B: GlobalAlloc.KERNEL32(00000040,?,6F98123B,?,6F9812DF,00000019,6F9811BE,-000000A0), ref: 6F981225
                                                            • GlobalFree.KERNEL32(?), ref: 6F982657
                                                            • GlobalFree.KERNEL32(00000000), ref: 6F98268C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1843161593.000000006F981000.00000020.00000001.01000000.00000004.sdmp, Offset: 6F980000, based on PE: true
                                                            • Associated: 00000000.00000002.1843143747.000000006F980000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000000.00000002.1843217258.000000006F984000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000000.00000002.1843234521.000000006F986000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6f980000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Global$Free$Alloc
                                                            • String ID:
                                                            • API String ID: 1780285237-0
                                                            • Opcode ID: afea5f0b2bb848ba01cc99f1e7a1c3bb87c3bc111894248fe50d5ed7f1fdf9c2
                                                            • Instruction ID: b32f0370f30ce03df469d7a9db279dfb8fd62779fa19aee2bbb3573246f89ae0
                                                            • Opcode Fuzzy Hash: afea5f0b2bb848ba01cc99f1e7a1c3bb87c3bc111894248fe50d5ed7f1fdf9c2
                                                            • Instruction Fuzzy Hash: F1318D31908601DFDB248F68D994C6A7BBAFF873247104E6AF572872E0C731E8658F52
                                                            APIs
                                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402901
                                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 0040291D
                                                            • GlobalFree.KERNEL32(?), ref: 00402956
                                                            • GlobalFree.KERNEL32(00000000), ref: 00402969
                                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402981
                                                            • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402995
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                            • String ID:
                                                            • API String ID: 2667972263-0
                                                            • Opcode ID: ad54be54d1b33f2c3e643305ac3600c2e6c22dcacd93b56e136af0bf18fa41fc
                                                            • Instruction ID: fa73a2a76dd28b4b8719808dd60f9f08d060129827b0ffc87b4efdc8f5ae5e12
                                                            • Opcode Fuzzy Hash: ad54be54d1b33f2c3e643305ac3600c2e6c22dcacd93b56e136af0bf18fa41fc
                                                            • Instruction Fuzzy Hash: 3D21BFB1D00124BBCF116FA5DE48D9E7E79EF09364F10023AF9607A2E1CB794D418B98
                                                            APIs
                                                            • lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404CAD
                                                            • wsprintfW.USER32 ref: 00404CB6
                                                            • SetDlgItemTextW.USER32(?,00423728), ref: 00404CC9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: ItemTextlstrlenwsprintf
                                                            • String ID: %u.%u%s%s$(7B
                                                            • API String ID: 3540041739-1320723960
                                                            • Opcode ID: c06007edea0c83b5e0931fd45a2cd42dabd82a11b0b4461ae96ab8921206da46
                                                            • Instruction ID: eedca0a42859d703ec1426aadcab00983e9769f6aa36ce56d5d2522b0312c54d
                                                            • Opcode Fuzzy Hash: c06007edea0c83b5e0931fd45a2cd42dabd82a11b0b4461ae96ab8921206da46
                                                            • Instruction Fuzzy Hash: A711D873A0412837EB00556DAC45EDE3298EB85374F254237FA26F31D1D9798C6282E8
                                                            APIs
                                                            • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nslB6AB.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nslB6AB.tmp\System.dll,00000400,?,?,00000021), ref: 004025E8
                                                            • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nslB6AB.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nslB6AB.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nslB6AB.tmp\System.dll,00000400,?,?,00000021), ref: 004025F3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWidelstrlen
                                                            • String ID: C:\Users\user\AppData\Local\Temp\nslB6AB.tmp$C:\Users\user\AppData\Local\Temp\nslB6AB.tmp\System.dll
                                                            • API String ID: 3109718747-1489785289
                                                            • Opcode ID: 2504939cc2fa207c3b55af63f84819462ffbd17dbd09f8919900b39cf6f986df
                                                            • Instruction ID: c13fbae436403556d6c48d38c5ac6db5007ae9437622b5a65b164b2cac9ab4a1
                                                            • Opcode Fuzzy Hash: 2504939cc2fa207c3b55af63f84819462ffbd17dbd09f8919900b39cf6f986df
                                                            • Instruction Fuzzy Hash: FB110B72A00301BADB106BB18E8999F7664AF44359F20443BF502F21D0D9FC89416B5E
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1843161593.000000006F981000.00000020.00000001.01000000.00000004.sdmp, Offset: 6F980000, based on PE: true
                                                            • Associated: 00000000.00000002.1843143747.000000006F980000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000000.00000002.1843217258.000000006F984000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000000.00000002.1843234521.000000006F986000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6f980000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: FreeGlobal
                                                            • String ID:
                                                            • API String ID: 2979337801-0
                                                            • Opcode ID: 289375cd804264fdc41d612413fbeaed929c149ca080d8b307a4e91263fa882f
                                                            • Instruction ID: 905864838b08fb036edd83b550c1d5340ee73ca8a6bd397ba3ddfbbdf07e496e
                                                            • Opcode Fuzzy Hash: 289375cd804264fdc41d612413fbeaed929c149ca080d8b307a4e91263fa882f
                                                            • Instruction Fuzzy Hash: EB51C336D041599A8B909FB8C9805AEBBBEEF47318B004E5BD434A72C0D775FEC187A1
                                                            APIs
                                                            • GlobalFree.KERNEL32(00000000), ref: 6F9824D6
                                                              • Part of subcall function 6F98122C: lstrcpynW.KERNEL32(00000000,?,6F9812DF,00000019,6F9811BE,-000000A0), ref: 6F98123C
                                                            • GlobalAlloc.KERNEL32(00000040), ref: 6F98245C
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 6F982477
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1843161593.000000006F981000.00000020.00000001.01000000.00000004.sdmp, Offset: 6F980000, based on PE: true
                                                            • Associated: 00000000.00000002.1843143747.000000006F980000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000000.00000002.1843217258.000000006F984000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000000.00000002.1843234521.000000006F986000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6f980000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                            • String ID:
                                                            • API String ID: 4216380887-0
                                                            • Opcode ID: d0e2bfe9990cda34d735d21ea0e0f14cb3d71d2293aec1197964414eb49a9274
                                                            • Instruction ID: 2e5905339d5ba37dd41418c426f32dda5d26ca165d6f79ff553569237990f14d
                                                            • Opcode Fuzzy Hash: d0e2bfe9990cda34d735d21ea0e0f14cb3d71d2293aec1197964414eb49a9274
                                                            • Instruction Fuzzy Hash: 6141AAB1008705DFD7249F38D844A6677B8FB9A324B004E5EE4768B6C1EB70E484CF61
                                                            APIs
                                                            • GetDC.USER32(?), ref: 00401DBC
                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DD6
                                                            • MulDiv.KERNEL32(00000000,00000000), ref: 00401DDE
                                                            • ReleaseDC.USER32(?,00000000), ref: 00401DEF
                                                            • CreateFontIndirectW.GDI32(0040CDD8), ref: 00401E3E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: CapsCreateDeviceFontIndirectRelease
                                                            • String ID:
                                                            • API String ID: 3808545654-0
                                                            • Opcode ID: e8aeef341752f35f6f278e7796ab08014b9ac4723c71950966d24e93e9008032
                                                            • Instruction ID: 863f18fc6204ba506076eb1f746ada73c94881a68b515e1873f2d1072bd1cf43
                                                            • Opcode Fuzzy Hash: e8aeef341752f35f6f278e7796ab08014b9ac4723c71950966d24e93e9008032
                                                            • Instruction Fuzzy Hash: 15017171944240EFE701ABB4AF8ABD97FB4AF55301F10457EE242F61E2CA7804459F2D
                                                            APIs
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,6F9821EC,?,00000808), ref: 6F981635
                                                            • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,6F9821EC,?,00000808), ref: 6F98163C
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,6F9821EC,?,00000808), ref: 6F981650
                                                            • GetProcAddress.KERNEL32(6F9821EC,00000000), ref: 6F981657
                                                            • GlobalFree.KERNEL32(00000000), ref: 6F981660
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1843161593.000000006F981000.00000020.00000001.01000000.00000004.sdmp, Offset: 6F980000, based on PE: true
                                                            • Associated: 00000000.00000002.1843143747.000000006F980000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000000.00000002.1843217258.000000006F984000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000000.00000002.1843234521.000000006F986000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6f980000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                            • String ID:
                                                            • API String ID: 1148316912-0
                                                            • Opcode ID: 8d909e758b8dd3d55f06900f7162ad2dfcd348ab37cbc6facc882b5767a7a2a9
                                                            • Instruction ID: 72e86145f439db405a2f3af5a3c1782bee1e00c56a1968a08239820ad5f8840c
                                                            • Opcode Fuzzy Hash: 8d909e758b8dd3d55f06900f7162ad2dfcd348ab37cbc6facc882b5767a7a2a9
                                                            • Instruction Fuzzy Hash: 85F0A27210A5387BDA211AAA8C4CC9B7E9CEF8B2F5B110615F628D229085615D11DFF1
                                                            APIs
                                                            • GetDlgItem.USER32(?,?), ref: 00401D63
                                                            • GetClientRect.USER32(00000000,?), ref: 00401D70
                                                            • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D91
                                                            • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D9F
                                                            • DeleteObject.GDI32(00000000), ref: 00401DAE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                            • String ID:
                                                            • API String ID: 1849352358-0
                                                            • Opcode ID: f8e0c1d3071f89bffdcd2d635822fb410905a1edc8d2ce6cb8a0a09a78f20d84
                                                            • Instruction ID: 8bbc6a183a468c813578a114873fb97f9d5ca0b11dae6a70aa3aa56fe52826a6
                                                            • Opcode Fuzzy Hash: f8e0c1d3071f89bffdcd2d635822fb410905a1edc8d2ce6cb8a0a09a78f20d84
                                                            • Instruction Fuzzy Hash: 4BF0FF72A04518AFDB01DBE4DF88CEEB7BCEB48301B14047AF641F61A0CA749D519B38
                                                            APIs
                                                            • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C8F
                                                            • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CA7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Timeout
                                                            • String ID: !
                                                            • API String ID: 1777923405-2657877971
                                                            • Opcode ID: 204806375d4f16312a37781d02af86e184349cdc68ded53cac09897120414cdc
                                                            • Instruction ID: ef61c68cd4a6cc3a6f3726d4b558d534156d03c1c75d5f5b51cfe904c604fa23
                                                            • Opcode Fuzzy Hash: 204806375d4f16312a37781d02af86e184349cdc68ded53cac09897120414cdc
                                                            • Instruction Fuzzy Hash: A621B471948209AEEF049FA5DA4AABD7BB4EB44304F14443EF605B61D0D7B845409B18
                                                            APIs
                                                            • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403492,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,74DF3420,004036EF,?,00000006,00000008,0000000A), ref: 00405CC3
                                                            • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403492,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,74DF3420,004036EF,?,00000006,00000008,0000000A), ref: 00405CCD
                                                            • lstrcatW.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 00405CDF
                                                            Strings
                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405CBD
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: CharPrevlstrcatlstrlen
                                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                                            • API String ID: 2659869361-3081826266
                                                            • Opcode ID: cc3b6fad2320eb0d125534955cb1fe8af3638bf69e103b669ecb1462063790d4
                                                            • Instruction ID: 595fb0ef6d3bfc82903baa2f142a0de03b6946227050b98ce465681b6cfad29b
                                                            • Opcode Fuzzy Hash: cc3b6fad2320eb0d125534955cb1fe8af3638bf69e103b669ecb1462063790d4
                                                            • Instruction Fuzzy Hash: AED0A771101630AAC111AB448D04CDF63ACEE45304342003BF601B70A2CB7C1D6287FD
                                                            APIs
                                                              • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,00000400,00403576,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063F5
                                                              • Part of subcall function 00405D68: CharNextW.USER32(?,?,00425F30,?,00405DDC,00425F30,00425F30,?,?,74DF2EE0,00405B1A,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,00000000), ref: 00405D76
                                                              • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D7B
                                                              • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D93
                                                            • lstrlenW.KERNEL32(00425F30,00000000,00425F30,00425F30,?,?,74DF2EE0,00405B1A,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,00000000), ref: 00405E1E
                                                            • GetFileAttributesW.KERNEL32(00425F30,00425F30,00425F30,00425F30,00425F30,00425F30,00000000,00425F30,00425F30,?,?,74DF2EE0,00405B1A,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0), ref: 00405E2E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                            • String ID: 0_B
                                                            • API String ID: 3248276644-2128305573
                                                            • Opcode ID: df6e64e4f6769b316d4c1c7beb25aaa03b2c49ca2ab4503c480f7fe4b4eab687
                                                            • Instruction ID: e2ef3bf648e1011fa726b67e088789f036b8871ba300d86fb9c867912b04298b
                                                            • Opcode Fuzzy Hash: df6e64e4f6769b316d4c1c7beb25aaa03b2c49ca2ab4503c480f7fe4b4eab687
                                                            • Instruction Fuzzy Hash: B4F0F439109E5116D62233365D09BEF0548CF82354B5A853BFC91B22D2DB3C8A539DFE
                                                            APIs
                                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426730,Error launching installer), ref: 004059FA
                                                            • CloseHandle.KERNEL32(?), ref: 00405A07
                                                            Strings
                                                            • Error launching installer, xrefs: 004059E4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: CloseCreateHandleProcess
                                                            • String ID: Error launching installer
                                                            • API String ID: 3712363035-66219284
                                                            • Opcode ID: 6d78ed6c6b667bfe634139d4e18f22187190c1a967eebebbcf2d401a0833c7e8
                                                            • Instruction ID: 166b032e71181ba573d10d742cd21a74b10ba840f41c43b266edefbe5b435367
                                                            • Opcode Fuzzy Hash: 6d78ed6c6b667bfe634139d4e18f22187190c1a967eebebbcf2d401a0833c7e8
                                                            • Instruction Fuzzy Hash: E5E04FB0A102097FEB009B64ED49F7B76ACFB04208F404531BD00F2150D774A8208A7C
                                                            APIs
                                                            • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,74DF2EE0,00403A1A,74DF3420,00403819,00000006,?,00000006,00000008,0000000A), ref: 00403A5D
                                                            • GlobalFree.KERNEL32(?), ref: 00403A64
                                                            Strings
                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00403A55
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Free$GlobalLibrary
                                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                                            • API String ID: 1100898210-3081826266
                                                            • Opcode ID: e06207bb45b670d34af272b3fb1259f6a40c1f68299225e6b4906b67dd7614d2
                                                            • Instruction ID: 7abb624b42f0eb5bf3103b67fd66c27476adae564a61ccebc81435f3e7eba37d
                                                            • Opcode Fuzzy Hash: e06207bb45b670d34af272b3fb1259f6a40c1f68299225e6b4906b67dd7614d2
                                                            • Instruction Fuzzy Hash: 73E0EC326111205BC6229F59AD44B5E776D6F58B22F0A023AE8C07B26087745D938F98
                                                            APIs
                                                            • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402F9C,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\WGi85dsMNp.exe,C:\Users\user\Desktop\WGi85dsMNp.exe,80000000,00000003), ref: 00405D0F
                                                            • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402F9C,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\WGi85dsMNp.exe,C:\Users\user\Desktop\WGi85dsMNp.exe,80000000,00000003), ref: 00405D1F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: CharPrevlstrlen
                                                            • String ID: C:\Users\user\Desktop
                                                            • API String ID: 2709904686-224404859
                                                            • Opcode ID: e4f7a16c0d3aeb27420e4918e5816bacf7b9900a4c75110623d7ea7fd9e9117e
                                                            • Instruction ID: 65148869c9b5617484fe42b3676c909fd92059a2a8224d2a454660f99163d925
                                                            • Opcode Fuzzy Hash: e4f7a16c0d3aeb27420e4918e5816bacf7b9900a4c75110623d7ea7fd9e9117e
                                                            • Instruction Fuzzy Hash: A3D0A7B7410920EAD3126B04DC04D9F73ACEF51300B46843BE840A7171D7785CD18BEC
                                                            APIs
                                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 6F98116A
                                                            • GlobalFree.KERNEL32(00000000), ref: 6F9811C7
                                                            • GlobalFree.KERNEL32(00000000), ref: 6F9811D9
                                                            • GlobalFree.KERNEL32(?), ref: 6F981203
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1843161593.000000006F981000.00000020.00000001.01000000.00000004.sdmp, Offset: 6F980000, based on PE: true
                                                            • Associated: 00000000.00000002.1843143747.000000006F980000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000000.00000002.1843217258.000000006F984000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000000.00000002.1843234521.000000006F986000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6f980000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Global$Free$Alloc
                                                            • String ID:
                                                            • API String ID: 1780285237-0
                                                            • Opcode ID: 7f9d65626a8ff746d90d66034b140e8fed25633e0f2c5c95456b20df3df8b1f1
                                                            • Instruction ID: c7fa48b6318a080dea99fdb23d64750a1e364e28d34165f3c5dfd03602ca233a
                                                            • Opcode Fuzzy Hash: 7f9d65626a8ff746d90d66034b140e8fed25633e0f2c5c95456b20df3df8b1f1
                                                            • Instruction Fuzzy Hash: 683183B1504201DFEB208F78C9459657BECEB57334B100E1AE879DB2D0E735E8958BA1
                                                            APIs
                                                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E53
                                                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405E6B
                                                            • CharNextA.USER32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E7C
                                                            • lstrlenA.KERNEL32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E85
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1813109327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1813096421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813122146.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813133982.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1813201136.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: lstrlen$CharNextlstrcmpi
                                                            • String ID:
                                                            • API String ID: 190613189-0
                                                            • Opcode ID: 7e71a0af936693ae9f9191b5a8beeb80aa55241a483ed2e2c495a4152d25f7df
                                                            • Instruction ID: 3eb9f18af2c16f81f4dc7877ab3147293eaebe45f2d41041cd024b5e05e36bdf
                                                            • Opcode Fuzzy Hash: 7e71a0af936693ae9f9191b5a8beeb80aa55241a483ed2e2c495a4152d25f7df
                                                            • Instruction Fuzzy Hash: 4AF0C831100514AFC7029B94DD4099FBBA8DF06354B25407AE844FB211D634DF01AB98
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083279971.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_160000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Xbq$$^q
                                                            • API String ID: 0-1593437937
                                                            • Opcode ID: 1f42c8821451be035834b4b730657e75c7fac768b331aca0aee5638b327b23f3
                                                            • Instruction ID: 3f59d0bacf15c910c4110363de0965fa44c24ba984fd7241b63dcd402f02895c
                                                            • Opcode Fuzzy Hash: 1f42c8821451be035834b4b730657e75c7fac768b331aca0aee5638b327b23f3
                                                            • Instruction Fuzzy Hash: 47F18E34F04248DFDB08DFB8C8945AEBBB2BF89300B14856DE456AB3A5DF359916CB41
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083279971.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_160000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Xbq$Xbq$Xbq$Xbq$Xbq$Xbq
                                                            • API String ID: 0-1317942629
                                                            • Opcode ID: 97e9ee4ff738f6c58d74b79cc1c65e4930848def0d1cc00e2a3a943a8cd7633d
                                                            • Instruction ID: 61265d03f172f4d8c4665b65c4432c0b5752ac983df88495c1b57ccef43c3c00
                                                            • Opcode Fuzzy Hash: 97e9ee4ff738f6c58d74b79cc1c65e4930848def0d1cc00e2a3a943a8cd7633d
                                                            • Instruction Fuzzy Hash: 30724E2960D3D29FDB224F305CFB595BFE09E4314576D0ADEE0C1660A3DA6A87A9C313
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083279971.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_160000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LR^q
                                                            • API String ID: 0-2625958711
                                                            • Opcode ID: 3f5e45d00135ae1e4daf5b7c575faa7ccf88b7802448b73aac25e76662b50dd7
                                                            • Instruction ID: b6038d19293c9a9c2102db248c865c22fa1118e3dd5de69ba36c90638bd8c659
                                                            • Opcode Fuzzy Hash: 3f5e45d00135ae1e4daf5b7c575faa7ccf88b7802448b73aac25e76662b50dd7
                                                            • Instruction Fuzzy Hash: 3CA19575E00249CFCB85EFA8D99499DBBF2FB49305B104629E405BB369DB31A947CF80
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083279971.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_160000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LR^q
                                                            • API String ID: 0-2625958711
                                                            • Opcode ID: 87371ca84f920125563f0a186abb9ba4448b07e5fd352b6760932d4405fde1b2
                                                            • Instruction ID: f4ae284b275b0d8dfd76ecafe574c1916235a2e44a42031152abe1b8185d2513
                                                            • Opcode Fuzzy Hash: 87371ca84f920125563f0a186abb9ba4448b07e5fd352b6760932d4405fde1b2
                                                            • Instruction Fuzzy Hash: 49A19575E00249CFCB85EFA8D99499DBBF2FB48305B104629E405BB369DB31A947CF80
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083279971.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_160000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6302c23e23680adef052758895dac9e70149086d3325db54fd55505e42ad7acc
                                                            • Instruction ID: 4c84d28d1824f200ed3ddfe11ac96af1d2ce73d7942a99281ee000bd37160079
                                                            • Opcode Fuzzy Hash: 6302c23e23680adef052758895dac9e70149086d3325db54fd55505e42ad7acc
                                                            • Instruction Fuzzy Hash: 9221B071A00106AFCB14DF74C8509AE37A5EB99768B14C11DD84E9B240EB35EE07CBD2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083045261.000000000009D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0009D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_9d000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bba3ba4f29ede735cd91951b8152e6789318321ed46edc84ababe6cd807f9393
                                                            • Instruction ID: f5b4454280c31f92839057e8ea4e7e2d212bbf2846b8b6435ce36a39e5cf1fef
                                                            • Opcode Fuzzy Hash: bba3ba4f29ede735cd91951b8152e6789318321ed46edc84ababe6cd807f9393
                                                            • Instruction Fuzzy Hash: EF213771584604DFCF15DF14D9C0B2BBFA5FB98318F24C16AE9090B256C336D856EBA2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083279971.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_160000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bdfc87d7a8117e5e988d463a66ac87eb6a22319f3ea336be81df382083df4483
                                                            • Instruction ID: 3bfb3b66c3b6cb954db9f371d9b308befadbdad062164ada038a7dd4883c0887
                                                            • Opcode Fuzzy Hash: bdfc87d7a8117e5e988d463a66ac87eb6a22319f3ea336be81df382083df4483
                                                            • Instruction Fuzzy Hash: BE217174E042089FDB06EFB9C4116AEB7B2EF8A304F0084A9D444AB399DBB45D46CF51
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083279971.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_160000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 09c6256a79655da7e0603d3f6367c1db951f48cc9664c9c68c0d576a9a0aa417
                                                            • Instruction ID: 087aa9d1b1096a5f13925db46d003f7a8dfd199c3a19a3b71b055f497092daad
                                                            • Opcode Fuzzy Hash: 09c6256a79655da7e0603d3f6367c1db951f48cc9664c9c68c0d576a9a0aa417
                                                            • Instruction Fuzzy Hash: AC31BF79E01208CFCB48EFA8D59489DBBF2FF49305B204069E819AB365D732AD42CF40
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083279971.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_160000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4e34f226b22317b3e6c3da1534fff5b526e7a819ded2b0ccb788edb5124f8db7
                                                            • Instruction ID: 195fe540ae384838ea00b4729a0abf7b6ab2c1843dc6d2e12fd98deda6b13be8
                                                            • Opcode Fuzzy Hash: 4e34f226b22317b3e6c3da1534fff5b526e7a819ded2b0ccb788edb5124f8db7
                                                            • Instruction Fuzzy Hash: 6C211475D052498FCB02DFB9D8445EEBFF4EF0A300F0941AAD445B7261EB305A96CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083045261.000000000009D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0009D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_9d000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e30d8c23d169001941ea9aa459473fa7ec8b4af4ddb27b59cb516a26a12e2698
                                                            • Instruction ID: d1a741e872e1ce4607b89ff8e39c07f22014ec1ebdd2348537134ad35ca9c363
                                                            • Opcode Fuzzy Hash: e30d8c23d169001941ea9aa459473fa7ec8b4af4ddb27b59cb516a26a12e2698
                                                            • Instruction Fuzzy Hash: E011D376544644DFCF06CF10D5C4B16BFB2FB94318F24C6AAD8490B616C33AD85ADBA2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083279971.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_160000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 10c089a7674af8ba9c92f037e0279049bcfc69dad7c9771d8c9344599760e57d
                                                            • Instruction ID: e90c17fb2c888e5a81af7fdb94c6663b05ac01ac7b701fec6623bfe9029b44ac
                                                            • Opcode Fuzzy Hash: 10c089a7674af8ba9c92f037e0279049bcfc69dad7c9771d8c9344599760e57d
                                                            • Instruction Fuzzy Hash: D8E092319113568EC7029FB0D8044EDBB30EE83710B0142A7D0546B050EB30194EC762
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083279971.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_160000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9768c843c6cf7b719e27ae9abf7289aa815758d372dbcb51443f0708865070a1
                                                            • Instruction ID: 38500f3bade9f6392afe9a83f925e0f025d31839c3fe1b8d4446b912d8b1d3f2
                                                            • Opcode Fuzzy Hash: 9768c843c6cf7b719e27ae9abf7289aa815758d372dbcb51443f0708865070a1
                                                            • Instruction Fuzzy Hash: 72D01231D2022A578B00AAA5DC044EEB738EE95665B504626D55437140EB70665986A2
                                                            APIs
                                                            • SetErrorMode.KERNEL32 ref: 004034C8
                                                            • GetVersion.KERNEL32 ref: 004034CE
                                                            • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403501
                                                            • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 0040353E
                                                            • OleInitialize.OLE32(00000000), ref: 00403545
                                                            • SHGetFileInfoW.SHELL32(004216E8,00000000,?,000002B4,00000000), ref: 00403561
                                                            • GetCommandLineW.KERNEL32(00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 00403576
                                                            • CharNextW.USER32(00000000,00435000,00000020,00435000,00000000,?,00000006,00000008,0000000A), ref: 004035AE
                                                              • Part of subcall function 004067C2: GetModuleHandleA.KERNEL32(?,00000020,?,00403517,0000000A), ref: 004067D4
                                                              • Part of subcall function 004067C2: GetProcAddress.KERNEL32(00000000,?), ref: 004067EF
                                                            • GetTempPathW.KERNEL32(00000400,00437800,?,00000006,00000008,0000000A), ref: 004036E8
                                                            • GetWindowsDirectoryW.KERNEL32(00437800,000003FB,?,00000006,00000008,0000000A), ref: 004036F9
                                                            • lstrcatW.KERNEL32(00437800,\Temp,?,00000006,00000008,0000000A), ref: 00403705
                                                            • GetTempPathW.KERNEL32(000003FC,00437800,00437800,\Temp,?,00000006,00000008,0000000A), ref: 00403719
                                                            • lstrcatW.KERNEL32(00437800,Low,?,00000006,00000008,0000000A), ref: 00403721
                                                            • SetEnvironmentVariableW.KERNEL32(TEMP,00437800,00437800,Low,?,00000006,00000008,0000000A), ref: 00403732
                                                            • SetEnvironmentVariableW.KERNEL32(TMP,00437800,?,00000006,00000008,0000000A), ref: 0040373A
                                                            • DeleteFileW.KERNEL32(00437000,?,00000006,00000008,0000000A), ref: 0040374E
                                                              • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,00000400,00403576,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063F5
                                                            • OleUninitialize.OLE32(00000006,?,00000006,00000008,0000000A), ref: 00403819
                                                            • ExitProcess.KERNEL32 ref: 0040383A
                                                            • lstrcatW.KERNEL32(00437800,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 0040384D
                                                            • lstrcatW.KERNEL32(00437800,0040A328,00437800,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 0040385C
                                                            • lstrcatW.KERNEL32(00437800,.tmp,00437800,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 00403867
                                                            • lstrcmpiW.KERNEL32(00437800,00436800,00437800,.tmp,00437800,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 00403873
                                                            • SetCurrentDirectoryW.KERNEL32(00437800,00437800,?,00000006,00000008,0000000A), ref: 0040388F
                                                            • DeleteFileW.KERNEL32(00420EE8,00420EE8,?,0042B000,00000008,?,00000006,00000008,0000000A), ref: 004038E9
                                                            • CopyFileW.KERNEL32(00438800,00420EE8,?,?,00000006,00000008,0000000A), ref: 004038FD
                                                            • CloseHandle.KERNEL32(00000000,00420EE8,00420EE8,?,00420EE8,00000000,?,00000006,00000008,0000000A), ref: 0040392A
                                                            • GetCurrentProcess.KERNEL32(00000028,0000000A,00000006,00000008,0000000A), ref: 00403959
                                                            • OpenProcessToken.ADVAPI32(00000000), ref: 00403960
                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403975
                                                            • AdjustTokenPrivileges.ADVAPI32 ref: 00403998
                                                            • ExitWindowsEx.USER32(00000002,80040002), ref: 004039BD
                                                            • ExitProcess.KERNEL32 ref: 004039E0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                                            • String ID: .tmp$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                            • API String ID: 3441113951-334447862
                                                            • Opcode ID: 05e616f99306ff785708979dde1941866962e16d7e4638c2318d7513fcce5d93
                                                            • Instruction ID: dafc1af32610b20ef8647c0cf6a3faef20d76686829591872cbc6ab955e55f97
                                                            • Opcode Fuzzy Hash: 05e616f99306ff785708979dde1941866962e16d7e4638c2318d7513fcce5d93
                                                            • Instruction Fuzzy Hash: 4DD1F571600310ABE7206F759D49A3B3AECEB4070AF50443FF981B62D2DB7D8956876E
                                                            APIs
                                                            • GetDlgItem.USER32(?,000003F9), ref: 00404DE4
                                                            • GetDlgItem.USER32(?,00000408), ref: 00404DEF
                                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404E39
                                                            • LoadBitmapW.USER32(0000006E), ref: 00404E4C
                                                            • SetWindowLongW.USER32(?,000000FC,004053C4), ref: 00404E65
                                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404E79
                                                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404E8B
                                                            • SendMessageW.USER32(?,00001109,00000002), ref: 00404EA1
                                                            • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404EAD
                                                            • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404EBF
                                                            • DeleteObject.GDI32(00000000), ref: 00404EC2
                                                            • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404EED
                                                            • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404EF9
                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404F8F
                                                            • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404FBA
                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404FCE
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00404FFD
                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0040500B
                                                            • ShowWindow.USER32(?,00000005), ref: 0040501C
                                                            • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405119
                                                            • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040517E
                                                            • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405193
                                                            • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 004051B7
                                                            • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004051D7
                                                            • ImageList_Destroy.COMCTL32(?), ref: 004051EC
                                                            • GlobalFree.KERNEL32(?), ref: 004051FC
                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405275
                                                            • SendMessageW.USER32(?,00001102,?,?), ref: 0040531E
                                                            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040532D
                                                            • InvalidateRect.USER32(?,00000000,?), ref: 0040534D
                                                            • ShowWindow.USER32(?,00000000), ref: 0040539B
                                                            • GetDlgItem.USER32(?,000003FE), ref: 004053A6
                                                            • ShowWindow.USER32(00000000), ref: 004053AD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                            • String ID: $M$N
                                                            • API String ID: 1638840714-813528018
                                                            • Opcode ID: 31df49881469a5ecb160dedc783b3d99a93962993771a60ee7fc946c0ea1256b
                                                            • Instruction ID: 7f687e55a7f93217ddba54fde82f382d197ef8b4c31ab339cf60f2545021b201
                                                            • Opcode Fuzzy Hash: 31df49881469a5ecb160dedc783b3d99a93962993771a60ee7fc946c0ea1256b
                                                            • Instruction Fuzzy Hash: DD028DB0A00609EFDF209F94CD85AAE7BB5FB44354F10807AE611BA2E0C7798D52CF58
                                                            APIs
                                                            • DeleteFileW.KERNEL32(?,?,00437800,74DF2EE0,00000000), ref: 00405B23
                                                            • lstrcatW.KERNEL32(00425730,\*.*,00425730,?,?,00437800,74DF2EE0,00000000), ref: 00405B6B
                                                            • lstrcatW.KERNEL32(?,0040A014,?,00425730,?,?,00437800,74DF2EE0,00000000), ref: 00405B8E
                                                            • lstrlenW.KERNEL32(?,?,0040A014,?,00425730,?,?,00437800,74DF2EE0,00000000), ref: 00405B94
                                                            • FindFirstFileW.KERNEL32(00425730,?,?,?,0040A014,?,00425730,?,?,00437800,74DF2EE0,00000000), ref: 00405BA4
                                                            • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405C44
                                                            • FindClose.KERNEL32(00000000), ref: 00405C53
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                            • String ID: 0WB$\*.*
                                                            • API String ID: 2035342205-351390296
                                                            • Opcode ID: c39e99c88a1dbfea07cbdfee3447eb09e3b7895857f1840ffe404f3b8fee67f3
                                                            • Instruction ID: 490a569b50011677cd34e026f6ab1003dec3a9533e419df12a6715eb2ed0bc70
                                                            • Opcode Fuzzy Hash: c39e99c88a1dbfea07cbdfee3447eb09e3b7895857f1840ffe404f3b8fee67f3
                                                            • Instruction Fuzzy Hash: 0541BF30805B18A6EB31AB618D89BAF7678EF41718F10817BF801711D2D77C59C29EAE
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 35cbb8abcdf375330cdaaed117d7ae66e2d52f36901990e867650d9b3411c4d0
                                                            • Instruction ID: 8a3521d6a9ab1c5b5eb45e3d7957e6eefdd785676f1866d9874d60d9aff9e69c
                                                            • Opcode Fuzzy Hash: 35cbb8abcdf375330cdaaed117d7ae66e2d52f36901990e867650d9b3411c4d0
                                                            • Instruction Fuzzy Hash: 1CF16770D04229CBDF18CFA8C8946ADBBB0FF45305F25816ED856BB281D7386A86DF45
                                                            APIs
                                                            • FindFirstFileW.KERNEL32(00437800,00426778,00425F30,00405E0E,00425F30,00425F30,00000000,00425F30,00425F30,00437800,?,74DF2EE0,00405B1A,?,00437800,74DF2EE0), ref: 00406736
                                                            • FindClose.KERNEL32(00000000), ref: 00406742
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Find$CloseFileFirst
                                                            • String ID: xgB
                                                            • API String ID: 2295610775-399326502
                                                            • Opcode ID: 8f8798618dbeb96281b7e152f222c6bef4cfc1fb78c0b92afc6d3f182eb863fd
                                                            • Instruction ID: 964bfaba6fe47efa91ae3b9d04416f3a0311ddb8c2b0a677c8b566ff70b98767
                                                            • Opcode Fuzzy Hash: 8f8798618dbeb96281b7e152f222c6bef4cfc1fb78c0b92afc6d3f182eb863fd
                                                            • Instruction Fuzzy Hash: 08D012315150205BC2011738BD4C85B7A589F553357228B37B866F61E0C7348C62869C
                                                            APIs
                                                            • GetDlgItem.USER32(?,00000403), ref: 004055ED
                                                            • GetDlgItem.USER32(?,000003EE), ref: 004055FC
                                                            • GetClientRect.USER32(?,?), ref: 00405639
                                                            • GetSystemMetrics.USER32(00000002), ref: 00405640
                                                            • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405661
                                                            • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405672
                                                            • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405685
                                                            • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405693
                                                            • SendMessageW.USER32(?,00001024,00000000,?), ref: 004056A6
                                                            • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004056C8
                                                            • ShowWindow.USER32(?,00000008), ref: 004056DC
                                                            • GetDlgItem.USER32(?,000003EC), ref: 004056FD
                                                            • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040570D
                                                            • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405726
                                                            • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405732
                                                            • GetDlgItem.USER32(?,000003F8), ref: 0040560B
                                                              • Part of subcall function 00404394: SendMessageW.USER32(00000028,?,?,004041BF), ref: 004043A2
                                                            • GetDlgItem.USER32(?,000003EC), ref: 0040574F
                                                            • CreateThread.KERNEL32(00000000,00000000,Function_00005523,00000000), ref: 0040575D
                                                            • CloseHandle.KERNEL32(00000000), ref: 00405764
                                                            • ShowWindow.USER32(00000000), ref: 00405788
                                                            • ShowWindow.USER32(?,00000008), ref: 0040578D
                                                            • ShowWindow.USER32(00000008), ref: 004057D7
                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040580B
                                                            • CreatePopupMenu.USER32 ref: 0040581C
                                                            • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405830
                                                            • GetWindowRect.USER32(?,?), ref: 00405850
                                                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405869
                                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 004058A1
                                                            • OpenClipboard.USER32(00000000), ref: 004058B1
                                                            • EmptyClipboard.USER32 ref: 004058B7
                                                            • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004058C3
                                                            • GlobalLock.KERNEL32(00000000), ref: 004058CD
                                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 004058E1
                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00405901
                                                            • SetClipboardData.USER32(0000000D,00000000), ref: 0040590C
                                                            • CloseClipboard.USER32 ref: 00405912
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                            • String ID: (7B${
                                                            • API String ID: 590372296-525222780
                                                            • Opcode ID: f04ab8e6c053f28f703b7489d19dc379b83f29f3476edfbeb8782164aeb73afa
                                                            • Instruction ID: ef9837d71be30d97cad1ad5ee6bf48d4101bac37d77d0ad6e239d9f51a57dc01
                                                            • Opcode Fuzzy Hash: f04ab8e6c053f28f703b7489d19dc379b83f29f3476edfbeb8782164aeb73afa
                                                            • Instruction Fuzzy Hash: C4B16A70900608FFDB11AFA0DD85AAE7B79FB48355F00403AFA45B61A0CB754E52DF68
                                                            APIs
                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403EC2
                                                            • ShowWindow.USER32(?), ref: 00403EDF
                                                            • DestroyWindow.USER32 ref: 00403EF3
                                                            • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403F0F
                                                            • GetDlgItem.USER32(?,?), ref: 00403F30
                                                            • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403F44
                                                            • IsWindowEnabled.USER32(00000000), ref: 00403F4B
                                                            • GetDlgItem.USER32(?,?), ref: 00403FF9
                                                            • GetDlgItem.USER32(?,00000002), ref: 00404003
                                                            • SetClassLongW.USER32(?,000000F2,?), ref: 0040401D
                                                            • SendMessageW.USER32(0000040F,00000000,?,?), ref: 0040406E
                                                            • GetDlgItem.USER32(?,00000003), ref: 00404114
                                                            • ShowWindow.USER32(00000000,?), ref: 00404135
                                                            • EnableWindow.USER32(?,?), ref: 00404147
                                                            • EnableWindow.USER32(?,?), ref: 00404162
                                                            • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00404178
                                                            • EnableMenuItem.USER32(00000000), ref: 0040417F
                                                            • SendMessageW.USER32(?,000000F4,00000000,?), ref: 00404197
                                                            • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004041AA
                                                            • lstrlenW.KERNEL32(00423728,?,00423728,00000000), ref: 004041D4
                                                            • SetWindowTextW.USER32(?,00423728), ref: 004041E8
                                                            • ShowWindow.USER32(?,0000000A), ref: 0040431C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                            • String ID: (7B
                                                            • API String ID: 184305955-3251261122
                                                            • Opcode ID: 030bf1c90a5d59ce14a62ff8eb631d2412c8a49503263f6ef8a14511ced3c4f7
                                                            • Instruction ID: 1e1a27d6975204c591228116fe5edee23a209105d2649c04e919f1d7e5095d09
                                                            • Opcode Fuzzy Hash: 030bf1c90a5d59ce14a62ff8eb631d2412c8a49503263f6ef8a14511ced3c4f7
                                                            • Instruction Fuzzy Hash: 6FC1A2B1644200FBDB216F61EE85D2A3BB8EB94706F40053EFA41B11F1CB7958529B6D
                                                            APIs
                                                              • Part of subcall function 004067C2: GetModuleHandleA.KERNEL32(?,00000020,?,00403517,0000000A), ref: 004067D4
                                                              • Part of subcall function 004067C2: GetProcAddress.KERNEL32(00000000,?), ref: 004067EF
                                                            • lstrcatW.KERNEL32(00437000,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,00437800,74DF3420,00435000,00000000), ref: 00403B59
                                                            • lstrlenW.KERNEL32(004281E0,?,?,?,004281E0,00000000,00435800,00437000,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,00437800), ref: 00403BD9
                                                            • lstrcmpiW.KERNEL32(004281D8,.exe,004281E0,?,?,?,004281E0,00000000,00435800,00437000,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000), ref: 00403BEC
                                                            • GetFileAttributesW.KERNEL32(004281E0), ref: 00403BF7
                                                            • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,00435800), ref: 00403C40
                                                              • Part of subcall function 0040632F: wsprintfW.USER32 ref: 0040633C
                                                            • RegisterClassW.USER32(004291E0), ref: 00403C7D
                                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403C95
                                                            • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403CCA
                                                            • ShowWindow.USER32(00000005,00000000), ref: 00403D00
                                                            • GetClassInfoW.USER32(00000000,RichEdit20W,004291E0), ref: 00403D2C
                                                            • GetClassInfoW.USER32(00000000,RichEdit,004291E0), ref: 00403D39
                                                            • RegisterClassW.USER32(004291E0), ref: 00403D42
                                                            • DialogBoxParamW.USER32(?,00000000,00403E86,00000000), ref: 00403D61
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                            • String ID: (7B$.DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                            • API String ID: 1975747703-1425696872
                                                            • Opcode ID: fa642e9f5f159fa40c6df89367760cd7b58c30057714375835671963a1e6ccc9
                                                            • Instruction ID: f49b718e50d7a26840138b6048ee10d29e8519d5aa43f5d66e73d4226ad9b376
                                                            • Opcode Fuzzy Hash: fa642e9f5f159fa40c6df89367760cd7b58c30057714375835671963a1e6ccc9
                                                            • Instruction Fuzzy Hash: FF61C470204700BBE220AF669E45F2B3A7CEB84B49F40447FF945B22E2DB7D5912C62D
                                                            APIs
                                                            • CheckDlgButton.USER32(?,-0000040A,?), ref: 004045BC
                                                            • GetDlgItem.USER32(?,000003E8), ref: 004045D0
                                                            • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 004045ED
                                                            • GetSysColor.USER32(?), ref: 004045FE
                                                            • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 0040460C
                                                            • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040461A
                                                            • lstrlenW.KERNEL32(?), ref: 0040461F
                                                            • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 0040462C
                                                            • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404641
                                                            • GetDlgItem.USER32(?,0000040A), ref: 0040469A
                                                            • SendMessageW.USER32(00000000), ref: 004046A1
                                                            • GetDlgItem.USER32(?,000003E8), ref: 004046CC
                                                            • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 0040470F
                                                            • LoadCursorW.USER32(00000000,00007F02), ref: 0040471D
                                                            • SetCursor.USER32(00000000), ref: 00404720
                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 00404739
                                                            • SetCursor.USER32(00000000), ref: 0040473C
                                                            • SendMessageW.USER32(00000111,?,00000000), ref: 0040476B
                                                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040477D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                            • String ID: N
                                                            • API String ID: 3103080414-1130791706
                                                            • Opcode ID: c2d943e7d3074a80d89972f065d7b0d6c6867904808fb573d17a53c74c23d30b
                                                            • Instruction ID: 26ae409e5f73424340e4bb55f347a499eb46e427c8d4328441e026d38e95c6c2
                                                            • Opcode Fuzzy Hash: c2d943e7d3074a80d89972f065d7b0d6c6867904808fb573d17a53c74c23d30b
                                                            • Instruction Fuzzy Hash: 4B6173B1900209BFDB109F60DD85EAA7B69FB84314F00853AFB05772E0D7789D52CB58
                                                            APIs
                                                            • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                            • BeginPaint.USER32(?,?), ref: 00401047
                                                            • GetClientRect.USER32(?,?), ref: 0040105B
                                                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                            • DeleteObject.GDI32(?), ref: 004010ED
                                                            • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                            • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                            • SelectObject.GDI32(00000000,?), ref: 00401140
                                                            • DrawTextW.USER32(00000000,00429240,000000FF,00000010,00000820), ref: 00401156
                                                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                            • DeleteObject.GDI32(?), ref: 00401165
                                                            • EndPaint.USER32(?,?), ref: 0040116E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                            • String ID: F
                                                            • API String ID: 941294808-1304234792
                                                            • Opcode ID: a62f14d8607f0cab4b909ce482175ba86ddefa50def87cd09a38214d4056f576
                                                            • Instruction ID: b35030fe9107d9a8359b932f7918d2348922827c9ca57aaae851fe5b21190c6b
                                                            • Opcode Fuzzy Hash: a62f14d8607f0cab4b909ce482175ba86ddefa50def87cd09a38214d4056f576
                                                            • Instruction Fuzzy Hash: 92418A71800249AFCF058FA5DE459AFBBB9FF44310F00842AF991AA1A0C738E955DFA4
                                                            APIs
                                                            • GetDlgItem.USER32(?,000003FB), ref: 0040489F
                                                            • SetWindowTextW.USER32(00000000,?), ref: 004048C9
                                                            • SHBrowseForFolderW.SHELL32(?), ref: 0040497A
                                                            • CoTaskMemFree.OLE32(00000000), ref: 00404985
                                                            • lstrcmpiW.KERNEL32(004281E0,00423728,00000000,?,?), ref: 004049B7
                                                            • lstrcatW.KERNEL32(?,004281E0), ref: 004049C3
                                                            • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004049D5
                                                              • Part of subcall function 00405A32: GetDlgItemTextW.USER32(?,?,00000400,00404A0C), ref: 00405A45
                                                              • Part of subcall function 0040667C: CharNextW.USER32(?,*?|<>/":,00000000,00000000,00437800,00437800,00435000,00403480,00437800,74DF3420,004036EF,?,00000006,00000008,0000000A), ref: 004066DF
                                                              • Part of subcall function 0040667C: CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004066EE
                                                              • Part of subcall function 0040667C: CharNextW.USER32(?,00000000,00437800,00437800,00435000,00403480,00437800,74DF3420,004036EF,?,00000006,00000008,0000000A), ref: 004066F3
                                                              • Part of subcall function 0040667C: CharPrevW.USER32(?,?,00437800,00437800,00435000,00403480,00437800,74DF3420,004036EF,?,00000006,00000008,0000000A), ref: 00406706
                                                            • GetDiskFreeSpaceW.KERNEL32(004216F8,?,?,0000040F,?,004216F8,004216F8,?,?,004216F8,?,?,000003FB,?), ref: 00404A98
                                                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404AB3
                                                              • Part of subcall function 00404C0C: lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404CAD
                                                              • Part of subcall function 00404C0C: wsprintfW.USER32 ref: 00404CB6
                                                              • Part of subcall function 00404C0C: SetDlgItemTextW.USER32(?,00423728), ref: 00404CC9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                            • String ID: (7B$A
                                                            • API String ID: 2624150263-3645020878
                                                            • Opcode ID: e24882e00550f6ead3a1036a7d6e943431ff60c63dfc37ca84bce6dbb49f36c9
                                                            • Instruction ID: 217fbe9c53fcac7a38d38ba6b36a95d3c52d9e466bb1b0d29fe77156d884dce9
                                                            • Opcode Fuzzy Hash: e24882e00550f6ead3a1036a7d6e943431ff60c63dfc37ca84bce6dbb49f36c9
                                                            • Instruction Fuzzy Hash: 01A161F1A00205ABDB11EFA5C985AAF77B8EF84315F10803BF611B62D1D77C9A418B6D
                                                            APIs
                                                            • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,?,?,004061CF,?,?), ref: 0040606F
                                                            • GetShortPathNameW.KERNEL32(?,00426DC8,00000400), ref: 00406078
                                                              • Part of subcall function 00405E43: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E53
                                                              • Part of subcall function 00405E43: lstrlenA.KERNEL32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E85
                                                            • GetShortPathNameW.KERNEL32(?,004275C8,00000400), ref: 00406095
                                                            • wsprintfA.USER32 ref: 004060B3
                                                            • GetFileSize.KERNEL32(00000000,00000000,004275C8,C0000000,00000004,004275C8,?,?,?,?,?), ref: 004060EE
                                                            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 004060FD
                                                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406135
                                                            • SetFilePointer.KERNEL32(0040A590,00000000,00000000,00000000,00000000,004269C8,00000000,-0000000A,0040A590,00000000,[Rename],00000000,00000000,00000000), ref: 0040618B
                                                            • GlobalFree.KERNEL32(00000000), ref: 0040619C
                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004061A3
                                                              • Part of subcall function 00405EDE: GetFileAttributesW.KERNEL32(00000003,00402F73,00438800,80000000,00000003), ref: 00405EE2
                                                              • Part of subcall function 00405EDE: CreateFileW.KERNEL32(?,?,?,00000000,?,00000001,00000000), ref: 00405F04
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                            • String ID: %ls=%ls$[Rename]
                                                            • API String ID: 2171350718-461813615
                                                            • Opcode ID: 743beb3988d04f7b57c6902fe00ffd967832125f1abdce8c9c4456724f210b8f
                                                            • Instruction ID: 8c4bc4cab4d3408e43c29de3b383fd3cef376d344e04ab2aaf2f470794b42cbb
                                                            • Opcode Fuzzy Hash: 743beb3988d04f7b57c6902fe00ffd967832125f1abdce8c9c4456724f210b8f
                                                            • Instruction Fuzzy Hash: 34313770200719BFD2206B619D48F6B3A6CEF45704F16043EFA46FA2D3DA3C99158ABD
                                                            APIs
                                                            • GetTickCount.KERNEL32 ref: 00402F44
                                                            • GetModuleFileNameW.KERNEL32(00000000,00438800,00000400), ref: 00402F60
                                                              • Part of subcall function 00405EDE: GetFileAttributesW.KERNEL32(00000003,00402F73,00438800,80000000,00000003), ref: 00405EE2
                                                              • Part of subcall function 00405EDE: CreateFileW.KERNEL32(?,?,?,00000000,?,00000001,00000000), ref: 00405F04
                                                            • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,00436800,00436800,00438800,00438800,80000000,00000003), ref: 00402FA9
                                                            • GlobalAlloc.KERNEL32(00000040,0040A230), ref: 004030F0
                                                            Strings
                                                            • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00403139
                                                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403187
                                                            • soft, xrefs: 00403020
                                                            • Null, xrefs: 00403029
                                                            • Error launching installer, xrefs: 00402F80
                                                            • Inst, xrefs: 00403017
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                            • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                            • API String ID: 2803837635-787788815
                                                            • Opcode ID: da7d1d4a2d7cfe0a4d95b8b78dbffc0a58d971e607472f26681b65440013a3aa
                                                            • Instruction ID: fab51a6d61a7302470dd91ad27108f0c0be819ae48098b15a947b51e22d3bd00
                                                            • Opcode Fuzzy Hash: da7d1d4a2d7cfe0a4d95b8b78dbffc0a58d971e607472f26681b65440013a3aa
                                                            • Instruction Fuzzy Hash: 4961D271A00205ABDB20DFA4DD45A9A7BA8EB04356F20413FF904F62D1DB7C9A458BAD
                                                            APIs
                                                            • GetSystemDirectoryW.KERNEL32(004281E0,00000400), ref: 0040654B
                                                            • GetWindowsDirectoryW.KERNEL32(004281E0,00000400,00000000,00422708,?,00405487,00422708,00000000), ref: 0040655E
                                                            • SHGetSpecialFolderLocation.SHELL32(00405487,00000000,00000000,00422708,?,00405487,00422708,00000000), ref: 0040659A
                                                            • SHGetPathFromIDListW.SHELL32(00000000,004281E0), ref: 004065A8
                                                            • CoTaskMemFree.OLE32(00000000), ref: 004065B3
                                                            • lstrcatW.KERNEL32(004281E0,\Microsoft\Internet Explorer\Quick Launch), ref: 004065D9
                                                            • lstrlenW.KERNEL32(004281E0,00000000,00422708,?,00405487,00422708,00000000), ref: 00406631
                                                            Strings
                                                            • \Microsoft\Internet Explorer\Quick Launch, xrefs: 004065D3
                                                            • Software\Microsoft\Windows\CurrentVersion, xrefs: 0040651B
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                            • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                            • API String ID: 717251189-730719616
                                                            • Opcode ID: fadb749951e57590abd2d4ee5972ead553d40ab2c5c4ce1725a089f13c923e34
                                                            • Instruction ID: bd17f2555f8fb0ecb5cfb39a154c1e2018f2892b34e65fa403921cbdc39efe9b
                                                            • Opcode Fuzzy Hash: fadb749951e57590abd2d4ee5972ead553d40ab2c5c4ce1725a089f13c923e34
                                                            • Instruction Fuzzy Hash: A4612371A00115ABDF209F64DD41AAE37A5AF50314F62813FE903B72D0E73E9AA2C75D
                                                            APIs
                                                            • GetWindowLongW.USER32(?,000000EB), ref: 004043E3
                                                            • GetSysColor.USER32(00000000), ref: 00404421
                                                            • SetTextColor.GDI32(?,00000000), ref: 0040442D
                                                            • SetBkMode.GDI32(?,?), ref: 00404439
                                                            • GetSysColor.USER32(?), ref: 0040444C
                                                            • SetBkColor.GDI32(?,?), ref: 0040445C
                                                            • DeleteObject.GDI32(?), ref: 00404476
                                                            • CreateBrushIndirect.GDI32(?), ref: 00404480
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                            • String ID:
                                                            • API String ID: 2320649405-0
                                                            • Opcode ID: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                            • Instruction ID: 4d8d1a64c5805e8a020b3744e793f2033a9a6b6b0a681029562fed9dd316a9da
                                                            • Opcode Fuzzy Hash: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                            • Instruction Fuzzy Hash: 722131715007049BCB319F68D948B5BBBF8AF81714B148A2EEE96E26E0D738D944CB54
                                                            APIs
                                                            • ReadFile.KERNEL32(?,?,?,?), ref: 004026B6
                                                            • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,?), ref: 004026F1
                                                            • SetFilePointer.KERNEL32(?,?,?,?,?,00000008,?,?,?,?), ref: 00402714
                                                            • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,?,?,?,?,00000008,?,?,?,?), ref: 0040272A
                                                              • Part of subcall function 00405FBF: SetFilePointer.KERNEL32(?,00000000,00000000,?), ref: 00405FD5
                                                            • SetFilePointer.KERNEL32(?,?,?,?,?,?,00000002), ref: 004027D6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: File$Pointer$ByteCharMultiWide$Read
                                                            • String ID: 9
                                                            • API String ID: 163830602-2366072709
                                                            • Opcode ID: 1fdfab34e77cf90ebe23e3371142485a67670726d5f4eeccdfcf92a02d0001b8
                                                            • Instruction ID: add249696b334c0fceafe0529c612de3b1c59f5eaafd60b3ba6c21ea99dd66a9
                                                            • Opcode Fuzzy Hash: 1fdfab34e77cf90ebe23e3371142485a67670726d5f4eeccdfcf92a02d0001b8
                                                            • Instruction Fuzzy Hash: FD510A74D10219AEDF21DF95DA88AAEB779FF04304F50443BE901B72D0D7B89982CB59
                                                            APIs
                                                            • lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                            • lstrlenW.KERNEL32(00402F08,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                            • lstrcatW.KERNEL32(00422708,00402F08,00402F08,00422708,00000000,00000000,00000000), ref: 004054AB
                                                            • SetWindowTextW.USER32(00422708,00422708), ref: 004054BD
                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                            • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                            • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                            • String ID:
                                                            • API String ID: 2531174081-0
                                                            • Opcode ID: b84216cbe2d5722ff5c8c30ae43643c8050e8425152119dcc0cd5bf76baef7c3
                                                            • Instruction ID: e73fa1987b6059f35b704de59c80f6892b54c3d1ee51518932a2041d94d0b0cb
                                                            • Opcode Fuzzy Hash: b84216cbe2d5722ff5c8c30ae43643c8050e8425152119dcc0cd5bf76baef7c3
                                                            • Instruction Fuzzy Hash: BE21A171900558BACB119F95DD84ACFBFB5EF84314F10803AF904B22A1C3798A91CFA8
                                                            APIs
                                                            • DestroyWindow.USER32(?,00000000), ref: 00402EA9
                                                            • GetTickCount.KERNEL32 ref: 00402EC7
                                                            • wsprintfW.USER32 ref: 00402EF5
                                                              • Part of subcall function 00405450: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                              • Part of subcall function 00405450: lstrlenW.KERNEL32(00402F08,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                              • Part of subcall function 00405450: lstrcatW.KERNEL32(00422708,00402F08,00402F08,00422708,00000000,00000000,00000000), ref: 004054AB
                                                              • Part of subcall function 00405450: SetWindowTextW.USER32(00422708,00422708), ref: 004054BD
                                                              • Part of subcall function 00405450: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                              • Part of subcall function 00405450: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                              • Part of subcall function 00405450: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                            • CreateDialogParamW.USER32(0000006F,00000000,00402DF3,00000000), ref: 00402F19
                                                            • ShowWindow.USER32(00000000,00000005), ref: 00402F27
                                                              • Part of subcall function 00402E72: MulDiv.KERNEL32(?,00000064,?), ref: 00402E87
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                            • String ID: ... %d%%
                                                            • API String ID: 722711167-2449383134
                                                            • Opcode ID: c40ddff33436de44b244b2b19f9e8da7546f4e0328de08243a0837e5050f2c6b
                                                            • Instruction ID: c65c9f61eb329069142d3a49436c3393aeffd9891ae55f37d91fa0e4ac25720a
                                                            • Opcode Fuzzy Hash: c40ddff33436de44b244b2b19f9e8da7546f4e0328de08243a0837e5050f2c6b
                                                            • Instruction Fuzzy Hash: 1A016170941614EBC7226B60EE4DA9B7B68BB01745B50413FF841F12E0CAB84459DBEE
                                                            APIs
                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404D35
                                                            • GetMessagePos.USER32 ref: 00404D3D
                                                            • ScreenToClient.USER32(?,?), ref: 00404D57
                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404D69
                                                            • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404D8F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Message$Send$ClientScreen
                                                            • String ID: f
                                                            • API String ID: 41195575-1993550816
                                                            • Opcode ID: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                                            • Instruction ID: ac2b37e4453cd55ff3643614bd1240a9a451636028a825994647dd398b99f398
                                                            • Opcode Fuzzy Hash: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                                            • Instruction Fuzzy Hash: 23015E71940218BADB00DB94DD85FFEBBBCAF95711F10412BBA50F62D0D7B499018BA4
                                                            APIs
                                                            • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406769
                                                            • wsprintfW.USER32 ref: 004067A4
                                                            • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067B8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: DirectoryLibraryLoadSystemwsprintf
                                                            • String ID: %s%S.dll$UXTHEME$\
                                                            • API String ID: 2200240437-1946221925
                                                            • Opcode ID: 40aa1e09304642b089aa1993992f232c43871fa513f82abce0c0f0efb2bd037b
                                                            • Instruction ID: 07f60acf873a648e61080255fd3e200204736070213a9ab7c1209ab7057fe03e
                                                            • Opcode Fuzzy Hash: 40aa1e09304642b089aa1993992f232c43871fa513f82abce0c0f0efb2bd037b
                                                            • Instruction Fuzzy Hash: 27F0FC70540219AECB10AB68ED0DFAB366CA700304F10447AA64AF20D1EB789A24C798
                                                            APIs
                                                            • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402E11
                                                            • wsprintfW.USER32 ref: 00402E45
                                                            • SetWindowTextW.USER32(?,?), ref: 00402E55
                                                            • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402E67
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Text$ItemTimerWindowwsprintf
                                                            • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                            • API String ID: 1451636040-1158693248
                                                            • Opcode ID: a591fce2f88080881549ac7e7473da6278debd618655821d08f98b44133a3158
                                                            • Instruction ID: 1bfa7b94c56a1c823be81e007cf4dd9dcc28a4463181553f30e61efe61dd31fb
                                                            • Opcode Fuzzy Hash: a591fce2f88080881549ac7e7473da6278debd618655821d08f98b44133a3158
                                                            • Instruction Fuzzy Hash: 30F0317064020CABDF206F60DD4ABEE3B69EB40319F00803AFA45B51D0DBB999598F99
                                                            APIs
                                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402901
                                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 0040291D
                                                            • GlobalFree.KERNEL32(?), ref: 00402956
                                                            • GlobalFree.KERNEL32(00000000), ref: 00402969
                                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402981
                                                            • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402995
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                            • String ID:
                                                            • API String ID: 2667972263-0
                                                            • Opcode ID: e143629cae8b78290b003201c05bc4b587d1aa12e059c50f50ac21e9d0b7acf9
                                                            • Instruction ID: fa73a2a76dd28b4b8719808dd60f9f08d060129827b0ffc87b4efdc8f5ae5e12
                                                            • Opcode Fuzzy Hash: e143629cae8b78290b003201c05bc4b587d1aa12e059c50f50ac21e9d0b7acf9
                                                            • Instruction Fuzzy Hash: 3D21BFB1D00124BBCF116FA5DE48D9E7E79EF09364F10023AF9607A2E1CB794D418B98
                                                            APIs
                                                            • lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404CAD
                                                            • wsprintfW.USER32 ref: 00404CB6
                                                            • SetDlgItemTextW.USER32(?,00423728), ref: 00404CC9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: ItemTextlstrlenwsprintf
                                                            • String ID: %u.%u%s%s$(7B
                                                            • API String ID: 3540041739-1320723960
                                                            • Opcode ID: 44adf824a3a4d92ef29847c02d08b50033dbaa36d23830bd28d3a669162fbcd6
                                                            • Instruction ID: eedca0a42859d703ec1426aadcab00983e9769f6aa36ce56d5d2522b0312c54d
                                                            • Opcode Fuzzy Hash: 44adf824a3a4d92ef29847c02d08b50033dbaa36d23830bd28d3a669162fbcd6
                                                            • Instruction Fuzzy Hash: A711D873A0412837EB00556DAC45EDE3298EB85374F254237FA26F31D1D9798C6282E8
                                                            APIs
                                                            • CharNextW.USER32(?,*?|<>/":,00000000,00000000,00437800,00437800,00435000,00403480,00437800,74DF3420,004036EF,?,00000006,00000008,0000000A), ref: 004066DF
                                                            • CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004066EE
                                                            • CharNextW.USER32(?,00000000,00437800,00437800,00435000,00403480,00437800,74DF3420,004036EF,?,00000006,00000008,0000000A), ref: 004066F3
                                                            • CharPrevW.USER32(?,?,00437800,00437800,00435000,00403480,00437800,74DF3420,004036EF,?,00000006,00000008,0000000A), ref: 00406706
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Char$Next$Prev
                                                            • String ID: *?|<>/":
                                                            • API String ID: 589700163-165019052
                                                            • Opcode ID: 6f1dc59467bf7cdf849013f1baa50d92fe1cb62039c7f0915d7e3466f5f67e46
                                                            • Instruction ID: ccb021e8c97aa0e4e9f296cc8cc4b0d2e06c32826977e33acd3911ee1a404cd3
                                                            • Opcode Fuzzy Hash: 6f1dc59467bf7cdf849013f1baa50d92fe1cb62039c7f0915d7e3466f5f67e46
                                                            • Instruction Fuzzy Hash: E011C82580061295DB302B548C44B77A2E8EF55764F52843FE985B32C1EB7D5CE28ABD
                                                            APIs
                                                            • lstrcatW.KERNEL32(00000000,00000000,0040A5D8,00436000,?,?,00000031), ref: 004017B0
                                                            • CompareFileTime.KERNEL32(-00000014,?,0040A5D8,0040A5D8,00000000,00000000,0040A5D8,00436000,?,?,00000031), ref: 004017D5
                                                              • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,00000400,00403576,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063F5
                                                              • Part of subcall function 00405450: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                              • Part of subcall function 00405450: lstrlenW.KERNEL32(00402F08,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                              • Part of subcall function 00405450: lstrcatW.KERNEL32(00422708,00402F08,00402F08,00422708,00000000,00000000,00000000), ref: 004054AB
                                                              • Part of subcall function 00405450: SetWindowTextW.USER32(00422708,00422708), ref: 004054BD
                                                              • Part of subcall function 00405450: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                              • Part of subcall function 00405450: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                              • Part of subcall function 00405450: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                            • String ID:
                                                            • API String ID: 1941528284-0
                                                            • Opcode ID: 55b9c7873fef6a42146c5bba3a7473b4437248d5263e1ddde9fdc16840247bc8
                                                            • Instruction ID: 2530360bafa170a9d5e8074bf3c3c5079485a484cad24ccb9f0485aee5561d29
                                                            • Opcode Fuzzy Hash: 55b9c7873fef6a42146c5bba3a7473b4437248d5263e1ddde9fdc16840247bc8
                                                            • Instruction Fuzzy Hash: FF41C671900614BADF11ABA5CD85DAF3679EF05329B20433BF412B10E2CB3C86529A6E
                                                            APIs
                                                            • GetDC.USER32(?), ref: 00401DBC
                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DD6
                                                            • MulDiv.KERNEL32(00000000,00000000), ref: 00401DDE
                                                            • ReleaseDC.USER32(?,00000000), ref: 00401DEF
                                                            • CreateFontIndirectW.GDI32(0040CDD8), ref: 00401E3E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: CapsCreateDeviceFontIndirectRelease
                                                            • String ID:
                                                            • API String ID: 3808545654-0
                                                            • Opcode ID: e24a725036941366799e1b60f9567993ca488f5885cb4975d99fb3ecb50d70e9
                                                            • Instruction ID: 863f18fc6204ba506076eb1f746ada73c94881a68b515e1873f2d1072bd1cf43
                                                            • Opcode Fuzzy Hash: e24a725036941366799e1b60f9567993ca488f5885cb4975d99fb3ecb50d70e9
                                                            • Instruction Fuzzy Hash: 15017171944240EFE701ABB4AF8ABD97FB4AF55301F10457EE242F61E2CA7804459F2D
                                                            APIs
                                                            • GetDlgItem.USER32(?,?), ref: 00401D63
                                                            • GetClientRect.USER32(00000000,?), ref: 00401D70
                                                            • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D91
                                                            • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D9F
                                                            • DeleteObject.GDI32(00000000), ref: 00401DAE
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                            • String ID:
                                                            • API String ID: 1849352358-0
                                                            • Opcode ID: cecd7757bc9d55480b756717b9ac07822063c1f28e7ac406cf665e6dd60447a2
                                                            • Instruction ID: 8bbc6a183a468c813578a114873fb97f9d5ca0b11dae6a70aa3aa56fe52826a6
                                                            • Opcode Fuzzy Hash: cecd7757bc9d55480b756717b9ac07822063c1f28e7ac406cf665e6dd60447a2
                                                            • Instruction Fuzzy Hash: 4BF0FF72A04518AFDB01DBE4DF88CEEB7BCEB48301B14047AF641F61A0CA749D519B38
                                                            APIs
                                                            • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C8F
                                                            • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CA7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Timeout
                                                            • String ID: !
                                                            • API String ID: 1777923405-2657877971
                                                            • Opcode ID: 204806375d4f16312a37781d02af86e184349cdc68ded53cac09897120414cdc
                                                            • Instruction ID: ef61c68cd4a6cc3a6f3726d4b558d534156d03c1c75d5f5b51cfe904c604fa23
                                                            • Opcode Fuzzy Hash: 204806375d4f16312a37781d02af86e184349cdc68ded53cac09897120414cdc
                                                            • Instruction Fuzzy Hash: A621B471948209AEEF049FA5DA4AABD7BB4EB44304F14443EF605B61D0D7B845409B18
                                                            APIs
                                                            • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402DA9
                                                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DB2
                                                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DD3
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Close$Enum
                                                            • String ID:
                                                            • API String ID: 464197530-0
                                                            • Opcode ID: 1fd681a58c600dee98d7f7e5161f1cc79c94fe5fc9469311f060f0f5731105c3
                                                            • Instruction ID: 3410daaf41eb2a8de7896e1fb7aa518538b3e031ab7f3cb45a1fbd23233d04dd
                                                            • Opcode Fuzzy Hash: 1fd681a58c600dee98d7f7e5161f1cc79c94fe5fc9469311f060f0f5731105c3
                                                            • Instruction Fuzzy Hash: CE116A32500108FBDF12AB90CE09FEE7B7DAF44350F100076B905B61E0E7B59E21AB58
                                                            APIs
                                                            • CreateDirectoryW.KERNEL32(?,?,00000000), ref: 00405962
                                                            • GetLastError.KERNEL32 ref: 00405976
                                                            • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040598B
                                                            • GetLastError.KERNEL32 ref: 00405995
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                            • String ID:
                                                            • API String ID: 3449924974-0
                                                            • Opcode ID: c15d26eb0fd7dc0754592b558b3576eabd9f17effa54cf70e09af9e442894ad1
                                                            • Instruction ID: ca5323325ecea66cc3de0aafa4d6cbc44a00468c8660a14113972894dcb98988
                                                            • Opcode Fuzzy Hash: c15d26eb0fd7dc0754592b558b3576eabd9f17effa54cf70e09af9e442894ad1
                                                            • Instruction Fuzzy Hash: 970108B1C10219DADF009FA5C944BEFBFB4EB14314F00403AE544B6290DB789608CFA9
                                                            APIs
                                                              • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,00000400,00403576,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063F5
                                                              • Part of subcall function 00405D68: CharNextW.USER32(?,?,00425F30,?,00405DDC,00425F30,00425F30,00437800,?,74DF2EE0,00405B1A,?,00437800,74DF2EE0,00000000), ref: 00405D76
                                                              • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D7B
                                                              • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D93
                                                            • lstrlenW.KERNEL32(00425F30,00000000,00425F30,00425F30,00437800,?,74DF2EE0,00405B1A,?,00437800,74DF2EE0,00000000), ref: 00405E1E
                                                            • GetFileAttributesW.KERNEL32(00425F30,00425F30,00425F30,00425F30,00425F30,00425F30,00000000,00425F30,00425F30,00437800,?,74DF2EE0,00405B1A,?,00437800,74DF2EE0), ref: 00405E2E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                            • String ID: 0_B
                                                            • API String ID: 3248276644-2128305573
                                                            • Opcode ID: df6e64e4f6769b316d4c1c7beb25aaa03b2c49ca2ab4503c480f7fe4b4eab687
                                                            • Instruction ID: e2ef3bf648e1011fa726b67e088789f036b8871ba300d86fb9c867912b04298b
                                                            • Opcode Fuzzy Hash: df6e64e4f6769b316d4c1c7beb25aaa03b2c49ca2ab4503c480f7fe4b4eab687
                                                            • Instruction Fuzzy Hash: B4F0F439109E5116D62233365D09BEF0548CF82354B5A853BFC91B22D2DB3C8A539DFE
                                                            APIs
                                                            • IsWindowVisible.USER32(?), ref: 004053F3
                                                            • CallWindowProcW.USER32(?,?,?,?), ref: 00405444
                                                              • Part of subcall function 004043AB: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004043BD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: Window$CallMessageProcSendVisible
                                                            • String ID:
                                                            • API String ID: 3748168415-3916222277
                                                            • Opcode ID: 36caebe1fe8aa1eff7ff321662443c514d6827d4f2801b7b393fcb4226acda68
                                                            • Instruction ID: 343f6187318c33bb175646012d6cb398530476c6c15fe8dd96994d534b9a6b17
                                                            • Opcode Fuzzy Hash: 36caebe1fe8aa1eff7ff321662443c514d6827d4f2801b7b393fcb4226acda68
                                                            • Instruction Fuzzy Hash: CC0171B1200609ABDF305F11DD84B9B3666EBD4356F508037FA00761E1C77A8DD29A6E
                                                            APIs
                                                            • GetTickCount.KERNEL32 ref: 00405F2B
                                                            • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,00435000,004034A3,00437000,00437800,00437800,00437800,00437800,00437800,74DF3420,004036EF), ref: 00405F46
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: CountFileNameTempTick
                                                            • String ID: nsa
                                                            • API String ID: 1716503409-2209301699
                                                            • Opcode ID: 0c62091ad8b50aef506abc269e58e4a43f33256201187c1c154fac6de66d8f01
                                                            • Instruction ID: 076564571966e4dc9ef4834731be4d502634ae0aeddccfca5b4533d1bab5a213
                                                            • Opcode Fuzzy Hash: 0c62091ad8b50aef506abc269e58e4a43f33256201187c1c154fac6de66d8f01
                                                            • Instruction Fuzzy Hash: 14F09076601204FFEB009F59ED05E9BB7A8EB95750F10803AEE00F7250E6B49A548B68
                                                            APIs
                                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426730,Error launching installer), ref: 004059FA
                                                            • CloseHandle.KERNEL32(?), ref: 00405A07
                                                            Strings
                                                            • Error launching installer, xrefs: 004059E4
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: CloseCreateHandleProcess
                                                            • String ID: Error launching installer
                                                            • API String ID: 3712363035-66219284
                                                            • Opcode ID: 6d78ed6c6b667bfe634139d4e18f22187190c1a967eebebbcf2d401a0833c7e8
                                                            • Instruction ID: 166b032e71181ba573d10d742cd21a74b10ba840f41c43b266edefbe5b435367
                                                            • Opcode Fuzzy Hash: 6d78ed6c6b667bfe634139d4e18f22187190c1a967eebebbcf2d401a0833c7e8
                                                            • Instruction Fuzzy Hash: E5E04FB0A102097FEB009B64ED49F7B76ACFB04208F404531BD00F2150D774A8208A7C
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: db40346bc9fd20083a39152eff8b5ac78f5cdc0ebc59631a5c9ad52422038ace
                                                            • Instruction ID: 2bd06e12bed6e0bcd81d630d0cd78bd49004ac77cb8b5ebb757de7108a839e92
                                                            • Opcode Fuzzy Hash: db40346bc9fd20083a39152eff8b5ac78f5cdc0ebc59631a5c9ad52422038ace
                                                            • Instruction Fuzzy Hash: 1DA14471E04228CBDF28CFA8C8446ADBBB1FF44305F14806ED856BB281D7786A86DF45
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9d32937a43efcd2dea5d1fc698e3fcc0023127280f8acdc5c544d8c7d1790a46
                                                            • Instruction ID: f1da02a2f8b93330a3d469e31e6e9edf047fa596270f1f1d86c95cc791e20b04
                                                            • Opcode Fuzzy Hash: 9d32937a43efcd2dea5d1fc698e3fcc0023127280f8acdc5c544d8c7d1790a46
                                                            • Instruction Fuzzy Hash: AA910271E04228CBEF28CF98C8447ADBBB1FB45305F14816AD856BB291C778A986DF45
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 67d6f810e310069c411d265ffcddf6abea8090fb20e8d2db1667143610fe5bd5
                                                            • Instruction ID: fb1d02f26201205f5bfcbd3029eb7cfad7cca69a3f8c46de7b35964bdd0c3f7d
                                                            • Opcode Fuzzy Hash: 67d6f810e310069c411d265ffcddf6abea8090fb20e8d2db1667143610fe5bd5
                                                            • Instruction Fuzzy Hash: 18814571E04228DFDF24CFA8C844BADBBB1FB45305F24816AD856BB291C7389986DF45
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5328a0701a0a32b67c374057837e60552721ea1a6811a44abe83e42546375677
                                                            • Instruction ID: 55fc176551b00f8465723d30588461dcf2fc1d3195b414c524ee7a2fcbdbe87b
                                                            • Opcode Fuzzy Hash: 5328a0701a0a32b67c374057837e60552721ea1a6811a44abe83e42546375677
                                                            • Instruction Fuzzy Hash: 39815971E04228DBEF24CFA8C844BADBBB1FB45305F14816AD856BB2C1C7786986DF45
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a445a859154d96951751bba7131c1a69e0b73c0895ac35a4e96b2d7ee743491b
                                                            • Instruction ID: 7645ab34ef40ba223d211dbe726f8302725d3f31b3e808d93cc70016d3e0d248
                                                            • Opcode Fuzzy Hash: a445a859154d96951751bba7131c1a69e0b73c0895ac35a4e96b2d7ee743491b
                                                            • Instruction Fuzzy Hash: 10711471E04228DBDF24CF98C8447ADBBB1FF49305F15806AD856BB281C7389A86DF45
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cd7d90a79d0f10410712768d5bba8e0713d9e8f593557aa9bf16db43d4616d0f
                                                            • Instruction ID: a4e19b7408f2815589132e7e2b866ae2b9c8caa40868d81b8a4623295251dea3
                                                            • Opcode Fuzzy Hash: cd7d90a79d0f10410712768d5bba8e0713d9e8f593557aa9bf16db43d4616d0f
                                                            • Instruction Fuzzy Hash: 0D712571E04218DBEF28CF98C844BADBBB1FF45305F15806AD856BB281C7389986DF45
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 08b8d2b65a0c1c30b5e83c7ea62cdb0658c0fab8542c410d93f606ef21acc8e7
                                                            • Instruction ID: 979076adb26e5f1e3e7a9458f232081f51f9a0722543042d1d726f4d31452a21
                                                            • Opcode Fuzzy Hash: 08b8d2b65a0c1c30b5e83c7ea62cdb0658c0fab8542c410d93f606ef21acc8e7
                                                            • Instruction Fuzzy Hash: 50714871E04228DBEF28CF98C8447ADBBB1FF45305F15806AD856BB281C7386A46DF45
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083279971.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_160000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Xbq$Xbq$Xbq$Xbq
                                                            • API String ID: 0-2732225958
                                                            • Opcode ID: 4a19f300d539f5a80c65697af47c6681574d0c800c6ba6d0e4f371dab14c8792
                                                            • Instruction ID: 754a7ef0d7f9745d3213d6aa133241386f62a77bad56f8f31bcdd4ae39cbaf70
                                                            • Opcode Fuzzy Hash: 4a19f300d539f5a80c65697af47c6681574d0c800c6ba6d0e4f371dab14c8792
                                                            • Instruction Fuzzy Hash: 41319230E0121A9FDF648BB9CD403AEBBB6AF84310F1944B9C855A7254EB70CD90CB92
                                                            APIs
                                                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E53
                                                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405E6B
                                                            • CharNextA.USER32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E7C
                                                            • lstrlenA.KERNEL32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E85
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2083443870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.2083422317.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083471681.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083489453.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.2083515795.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_WGi85dsMNp.jbxd
                                                            Similarity
                                                            • API ID: lstrlen$CharNextlstrcmpi
                                                            • String ID:
                                                            • API String ID: 190613189-0
                                                            • Opcode ID: 7e71a0af936693ae9f9191b5a8beeb80aa55241a483ed2e2c495a4152d25f7df
                                                            • Instruction ID: 3eb9f18af2c16f81f4dc7877ab3147293eaebe45f2d41041cd024b5e05e36bdf
                                                            • Opcode Fuzzy Hash: 7e71a0af936693ae9f9191b5a8beeb80aa55241a483ed2e2c495a4152d25f7df
                                                            • Instruction Fuzzy Hash: 4AF0C831100514AFC7029B94DD4099FBBA8DF06354B25407AE844FB211D634DF01AB98