Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe
Analysis ID:1428520
MD5:7482be7c2a16e99a446247d1565c712b
SHA1:c461c7c5dd1db679a0273ba4748365514ceeba35
SHA256:83e35edc0fd7e57ec7cebdaa269cb563ad49180fe01ad9e0fb417ce06f2bd6e7
Tags:exe
Infos:

Detection

Score:4
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
PE file contains an invalid checksum
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Analysis Advice

Sample drops PE files which have not been started, submit dropped PE samples for a secondary analysis to Joe Sandbox
Sample has a GUI, but Joe Sandbox has not found any clickable buttons, likely more UI automation may extend behavior
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeStatic PE information: certificate valid
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeCode function: 0_2_00405D07 FindFirstFileA,FindClose,0_2_00405D07
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeCode function: 0_2_00405331 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_00405331
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeCode function: 0_2_0040263E FindFirstFileA,0_2_0040263E
Source: SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeString found in binary or memory: http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0Q
Source: SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeString found in binary or memory: http://cert.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.cer0Q
Source: SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeString found in binary or memory: http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0
Source: SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeString found in binary or memory: http://crls.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.crl0
Source: SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeString found in binary or memory: http://crls.ssl.com/ssl.com-rsa-RootCA.crl0
Source: SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
Source: SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeString found in binary or memory: http://ocsps.ssl.com0
Source: SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeString found in binary or memory: http://ocsps.ssl.com0?
Source: SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeString found in binary or memory: http://sslcom.crl.certum.pl/ctnca.crl0s
Source: SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeString found in binary or memory: http://sslcom.ocsp-certum.com08
Source: SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeString found in binary or memory: http://sslcom.repository.certum.pl/ctnca.cer0:
Source: SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeString found in binary or memory: http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0
Source: SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeString found in binary or memory: https://www.certum.pl/CPS0
Source: SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeString found in binary or memory: https://www.ssl.com/repository0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeCode function: 0_2_00404EE8 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00404EE8
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeCode function: 0_2_004030FA EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_004030FA
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeCode function: 0_2_004061280_2_00406128
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeCode function: 0_2_004046F90_2_004046F9
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeCode function: 0_2_004068FF0_2_004068FF
Source: SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: clean4.winEXE@1/1@0/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeCode function: 0_2_004041FC GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_004041FC
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeCode function: 0_2_00402020 CoCreateInstance,MultiByteToWideChar,0_2_00402020
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeFile created: C:\Users\user\AppData\Local\Temp\nsf620B.tmpJump to behavior
Source: SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeStatic PE information: certificate valid
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeCode function: 0_2_00405D2E GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405D2E
Source: SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeStatic PE information: real checksum: 0xe26bd should be: 0xe2b3d
Source: System.dll.0.drStatic PE information: real checksum: 0x0 should be: 0xa27d
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeCode function: 0_2_10002A10 push eax; ret 0_2_10002A3E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeFile created: C:\Users\user\AppData\Local\Temp\nsf620C.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsf620C.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeCode function: 0_2_00405D07 FindFirstFileA,FindClose,0_2_00405D07
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeCode function: 0_2_00405331 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_00405331
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeCode function: 0_2_0040263E FindFirstFileA,0_2_0040263E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeAPI call chain: ExitProcess graph end nodegraph_0-3977
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeAPI call chain: ExitProcess graph end nodegraph_0-3976
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeCode function: 0_2_00405D2E GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405D2E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exeCode function: 0_2_00405A2E GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405A2E
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping2
File and Directory Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Obfuscated Files or Information
LSASS Memory3
System Information Discovery
Remote Desktop Protocol1
Clipboard Data
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe8%ReversingLabsWin32.Trojan.Generic
SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe3%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\nsf620C.tmp\System.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsf620C.tmp\System.dll0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://ocsps.ssl.com0?0%URL Reputationsafe
http://ocsps.ssl.com00%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crls.ssl.com/ssl.com-rsa-RootCA.crl0SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exefalse
    high
    http://cert.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.cer0QSecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exefalse
      high
      http://nsis.sf.net/NSIS_ErrorSecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exefalse
        high
        http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exefalse
          high
          https://www.ssl.com/repository0SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exefalse
            high
            http://ocsps.ssl.com0?SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exefalse
            • URL Reputation: safe
            unknown
            http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exefalse
              high
              http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0QSecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exefalse
                high
                http://ocsps.ssl.com0SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exefalse
                • URL Reputation: safe
                unknown
                http://sslcom.ocsp-certum.com08SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exefalse
                  unknown
                  http://sslcom.crl.certum.pl/ctnca.crl0sSecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exefalse
                    high
                    http://nsis.sf.net/NSIS_ErrorErrorSecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exefalse
                      high
                      https://www.certum.pl/CPS0SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exefalse
                        high
                        http://crls.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.crl0SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exefalse
                          high
                          http://sslcom.repository.certum.pl/ctnca.cer0:SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exefalse
                            high
                            No contacted IP infos
                            Joe Sandbox version:40.0.0 Tourmaline
                            Analysis ID:1428520
                            Start date and time:2024-04-19 05:35:05 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 4m 18s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:6
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe
                            Detection:CLEAN
                            Classification:clean4.winEXE@1/1@0/0
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 25
                            • Number of non-executed functions: 37
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            No simulations
                            No context
                            No context
                            No context
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            C:\Users\user\AppData\Local\Temp\nsf620C.tmp\System.dllaccelax.exeGet hashmaliciousUnknownBrowse
                              https://portal.vector.com/shared/8aacc900-9a36-4b0e-a5a6-c8ad0daf4733Get hashmaliciousUnknownBrowse
                                ibaLicenseService-V2_v2.5.2.zipGet hashmaliciousUnknownBrowse
                                  SecuriteInfo.com.Win32.Malware-gen.31849.9616.exeGet hashmaliciousUnknownBrowse
                                    SecuriteInfo.com.BScope.Trojan.Yakes.32515.19044.exeGet hashmaliciousUnknownBrowse
                                      SecuriteInfo.com.BScope.Trojan.Yakes.32515.19044.exeGet hashmaliciousUnknownBrowse
                                        https://storage.googleapis.com/vectric_public/Cut2DDesktopTrialEdition_Setup.exeGet hashmaliciousUnknownBrowse
                                          Dlabel_PC.exeGet hashmaliciousUnknownBrowse
                                            Dlabel_PC.exeGet hashmaliciousUnknownBrowse
                                              NSD_5.20_2023081417.exeGet hashmaliciousUnknownBrowse
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe
                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):11264
                                                Entropy (8bit):5.568877095847681
                                                Encrypted:false
                                                SSDEEP:192:7DKnJZCv6VmbJQC+tFiUdK7ckD4gRXKQx+LQ2CSF:7ViJrtFRdbmXK8+PCw
                                                MD5:C17103AE9072A06DA581DEC998343FC1
                                                SHA1:B72148C6BDFAADA8B8C3F950E610EE7CF1DA1F8D
                                                SHA-256:DC58D8AD81CACB0C1ED72E33BFF8F23EA40B5252B5BB55D393A0903E6819AE2F
                                                SHA-512:D32A71AAEF18E993F28096D536E41C4D016850721B31171513CE28BBD805A54FD290B7C3E9D935F72E676A1ACFB4F0DCC89D95040A0DD29F2B6975855C18986F
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                Joe Sandbox View:
                                                • Filename: accelax.exe, Detection: malicious, Browse
                                                • Filename: , Detection: malicious, Browse
                                                • Filename: ibaLicenseService-V2_v2.5.2.zip, Detection: malicious, Browse
                                                • Filename: SecuriteInfo.com.Win32.Malware-gen.31849.9616.exe, Detection: malicious, Browse
                                                • Filename: SecuriteInfo.com.BScope.Trojan.Yakes.32515.19044.exe, Detection: malicious, Browse
                                                • Filename: SecuriteInfo.com.BScope.Trojan.Yakes.32515.19044.exe, Detection: malicious, Browse
                                                • Filename: , Detection: malicious, Browse
                                                • Filename: Dlabel_PC.exe, Detection: malicious, Browse
                                                • Filename: Dlabel_PC.exe, Detection: malicious, Browse
                                                • Filename: NSD_5.20_2023081417.exe, Detection: malicious, Browse
                                                Reputation:moderate, very likely benign file
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......)...m.m.m...k.m.~....j....l.9..i....l.Richm.........................PE..L......K...........!................0).......0...............................`......................................p2......t0..P............................P.......................................................0..X............................text...1........................... ..`.rdata.......0......."..............@..@.data...d....@.......&..............@....reloc.......P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                Entropy (8bit):7.952575987251712
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 92.16%
                                                • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe
                                                File size:925'928 bytes
                                                MD5:7482be7c2a16e99a446247d1565c712b
                                                SHA1:c461c7c5dd1db679a0273ba4748365514ceeba35
                                                SHA256:83e35edc0fd7e57ec7cebdaa269cb563ad49180fe01ad9e0fb417ce06f2bd6e7
                                                SHA512:a32b6b8e14c136b47337ebe229033078c5846afcaeddf2cb046c2945a68e82235177c36cabb88eb1cc4a7e225828998b92b1ca0679f2fc8bb186444cd3e90d0c
                                                SSDEEP:24576:Zc/jWCuJsRymipcunnFh4zzEMkC9svdoOFsoE:wKDs+nv96svdzO
                                                TLSH:1B152385297DB19FE84C4B7025F2D274A63ABCAB1135176F276A7EE76837103A90900E
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..iu..i...iw..iu..i...i...id..i!..i...i...it..iRichu..i........................PE..L......K.................^.........
                                                Icon Hash:4d9729dc4567964d
                                                Entrypoint:0x4030fa
                                                Entrypoint Section:.text
                                                Digitally signed:true
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                                Time Stamp:0x4B1AE3CC [Sat Dec 5 22:50:52 2009 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:7fa974366048f9c551ef45714595665e
                                                Signature Valid:true
                                                Signature Issuer:CN=SSL.com Code Signing Intermediate CA RSA R1, O=SSL Corp, L=Houston, S=Texas, C=US
                                                Signature Validation Error:The operation completed successfully
                                                Error Number:0
                                                Not Before, Not After
                                                • 07/07/2023 12:01:50 06/07/2026 12:01:50
                                                Subject Chain
                                                • CN=MegaJogos Entretenimentos Ltda, O=MegaJogos Entretenimentos Ltda, L=Florian\xf3polis, S=Santa Catarina, C=BR
                                                Version:3
                                                Thumbprint MD5:9BFBAC0BBE67C42FC812A07DC311E9F7
                                                Thumbprint SHA-1:3234826742CDC8DFD0973ACB72144E60DACC6C0C
                                                Thumbprint SHA-256:2B12FCDFE5EB1FC6E8E316BA96DF77C9F689AC768D37B8F73DEE212B631149B0
                                                Serial:6B6B037A08B8C14BD582AD3D891259AE
                                                Instruction
                                                sub esp, 00000180h
                                                push ebx
                                                push ebp
                                                push esi
                                                xor ebx, ebx
                                                push edi
                                                mov dword ptr [esp+18h], ebx
                                                mov dword ptr [esp+10h], 00409160h
                                                xor esi, esi
                                                mov byte ptr [esp+14h], 00000020h
                                                call dword ptr [00407030h]
                                                push 00008001h
                                                call dword ptr [004070B0h]
                                                push ebx
                                                call dword ptr [0040727Ch]
                                                push 00000008h
                                                mov dword ptr [0042EC18h], eax
                                                call 00007FC4904CBA16h
                                                mov dword ptr [0042EB64h], eax
                                                push ebx
                                                lea eax, dword ptr [esp+34h]
                                                push 00000160h
                                                push eax
                                                push ebx
                                                push 00428F98h
                                                call dword ptr [00407158h]
                                                push 00409154h
                                                push 0042E360h
                                                call 00007FC4904CB6C9h
                                                call dword ptr [004070ACh]
                                                mov edi, 00434000h
                                                push eax
                                                push edi
                                                call 00007FC4904CB6B7h
                                                push ebx
                                                call dword ptr [0040710Ch]
                                                cmp byte ptr [00434000h], 00000022h
                                                mov dword ptr [0042EB60h], eax
                                                mov eax, edi
                                                jne 00007FC4904C8E2Ch
                                                mov byte ptr [esp+14h], 00000022h
                                                mov eax, 00434001h
                                                push dword ptr [esp+14h]
                                                push eax
                                                call 00007FC4904CB1AAh
                                                push eax
                                                call dword ptr [0040721Ch]
                                                mov dword ptr [esp+1Ch], eax
                                                jmp 00007FC4904C8E85h
                                                cmp cl, 00000020h
                                                jne 00007FC4904C8E28h
                                                inc eax
                                                cmp byte ptr [eax], 00000020h
                                                je 00007FC4904C8E1Ch
                                                cmp byte ptr [eax], 00000022h
                                                mov byte ptr [eax+eax+00h], 00000000h
                                                Programming Language:
                                                • [EXP] VC++ 6.0 SP5 build 8804
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x74b00xb4.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x390000x127f8.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0xdf5800x2b68
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x70000x28c.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x5c4c0x5e00856b32eb77dfd6fb67f21d6543272da5False0.6697140957446809data6.440105549497952IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x70000x129c0x1400dc77f8a1e6985a4361c55642680ddb4fFalse0.43359375data5.046835307909969IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0x90000x25c580x4007922d4ce117d7d5b3ac2cffe4b0b5e4fFalse0.5849609375data4.801003752715384IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .ndata0x2f0000xa0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0x390000x127f80x12800b2ed7e8cf74983adddff0a57004f4782False0.7307194890202703data6.928818624995742IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_BITMAP0x394780x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States0.23623853211009174
                                                RT_ICON0x397e00x5b39PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9977304843060849
                                                RT_ICON0x3f3200x4fbePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0002939159400412
                                                RT_ICON0x442e00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.25798755186721994
                                                RT_ICON0x468880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.3231707317073171
                                                RT_ICON0x479300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishUnited States0.517590618336887
                                                RT_ICON0x487d80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0EnglishUnited States0.4430327868852459
                                                RT_ICON0x491600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.618231046931408
                                                RT_ICON0x49a080x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0EnglishUnited States0.6768433179723502
                                                RT_ICON0x4a0d00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.6654624277456648
                                                RT_ICON0x4a6380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.5460992907801419
                                                RT_ICON0x4aaa00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishUnited States0.49193548387096775
                                                RT_ICON0x4ad880x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishUnited States0.5844594594594594
                                                RT_DIALOG0x4aeb00xb8dataEnglishUnited States0.6467391304347826
                                                RT_DIALOG0x4af680x144dataEnglishUnited States0.5216049382716049
                                                RT_DIALOG0x4b0b00x13cdataEnglishUnited States0.5506329113924051
                                                RT_DIALOG0x4b1f00x100dataEnglishUnited States0.5234375
                                                RT_DIALOG0x4b2f00x11cdataEnglishUnited States0.6056338028169014
                                                RT_DIALOG0x4b4100x60dataEnglishUnited States0.7291666666666666
                                                RT_GROUP_ICON0x4b4700xaedataEnglishUnited States0.6436781609195402
                                                RT_MANIFEST0x4b5200x2d7XML 1.0 document, ASCII text, with very long lines (727), with no line terminatorsEnglishUnited States0.5639614855570839
                                                DLLImport
                                                KERNEL32.dllCompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, GetWindowsDirectoryA, SetFileTime, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetTempPathA
                                                USER32.dllEndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
                                                GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
                                                SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
                                                ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
                                                COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                                VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                No network behavior found

                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Target ID:0
                                                Start time:05:35:53
                                                Start date:19/04/2024
                                                Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe"
                                                Imagebase:0x400000
                                                File size:925'928 bytes
                                                MD5 hash:7482BE7C2A16E99A446247D1565C712B
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low
                                                Has exited:false

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:15.6%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:19.6%
                                                  Total number of Nodes:1431
                                                  Total number of Limit Nodes:27
                                                  execution_graph 4355 10001000 4362 100017fe 4355->4362 4357 10001017 4358 1000101b 4357->4358 4359 1000101e GlobalAlloc 4357->4359 4360 10001825 3 API calls 4358->4360 4359->4358 4361 1000102d 4360->4361 4363 10001561 3 API calls 4362->4363 4364 10001804 4363->4364 4365 1000180a 4364->4365 4366 10001816 GlobalFree 4364->4366 4365->4357 4366->4357 4367 401cc1 GetDlgItem GetClientRect 4368 4029f6 18 API calls 4367->4368 4369 401cf1 LoadImageA SendMessageA 4368->4369 4370 40288b 4369->4370 4371 401d0f DeleteObject 4369->4371 4371->4370 4372 401dc1 4373 4029f6 18 API calls 4372->4373 4374 401dc7 4373->4374 4375 4029f6 18 API calls 4374->4375 4376 401dd0 4375->4376 4377 4029f6 18 API calls 4376->4377 4378 401dd9 4377->4378 4379 4029f6 18 API calls 4378->4379 4380 401de2 4379->4380 4381 401423 25 API calls 4380->4381 4382 401de9 ShellExecuteA 4381->4382 4383 401e16 4382->4383 4384 401645 4385 4029f6 18 API calls 4384->4385 4386 40164c 4385->4386 4387 4029f6 18 API calls 4386->4387 4388 401655 4387->4388 4389 4029f6 18 API calls 4388->4389 4390 40165e MoveFileA 4389->4390 4391 401671 4390->4391 4392 40166a 4390->4392 4393 405d07 2 API calls 4391->4393 4396 402169 4391->4396 4394 401423 25 API calls 4392->4394 4395 401680 4393->4395 4394->4396 4395->4396 4397 40575a 38 API calls 4395->4397 4397->4392 4398 401ec5 4399 4029f6 18 API calls 4398->4399 4400 401ecc GetFileVersionInfoSizeA 4399->4400 4401 401eef GlobalAlloc 4400->4401 4408 401f45 4400->4408 4402 401f03 GetFileVersionInfoA 4401->4402 4401->4408 4403 401f14 VerQueryValueA 4402->4403 4402->4408 4404 401f2d 4403->4404 4403->4408 4409 40596a wsprintfA 4404->4409 4406 401f39 4410 40596a wsprintfA 4406->4410 4409->4406 4410->4408 4411 4014ca 4412 404daa 25 API calls 4411->4412 4413 4014d1 4412->4413 4414 4025cc 4415 4025d3 4414->4415 4416 402838 4414->4416 4422 4029d9 4415->4422 4418 4025de 4419 4025e5 SetFilePointer 4418->4419 4419->4416 4420 4025f5 4419->4420 4425 40596a wsprintfA 4420->4425 4423 405a2e 18 API calls 4422->4423 4424 4029ed 4423->4424 4424->4418 4425->4416 3539 401f51 3540 401f63 3539->3540 3550 402012 3539->3550 3560 4029f6 3540->3560 3542 401423 25 API calls 3548 402169 3542->3548 3544 4029f6 18 API calls 3545 401f73 3544->3545 3546 401f88 LoadLibraryExA 3545->3546 3547 401f7b GetModuleHandleA 3545->3547 3549 401f98 GetProcAddress 3546->3549 3546->3550 3547->3546 3547->3549 3551 401fe5 3549->3551 3552 401fa8 3549->3552 3550->3542 3609 404daa 3551->3609 3553 401fb0 3552->3553 3554 401fc7 3552->3554 3606 401423 3553->3606 3566 1000198f 3554->3566 3557 401fb8 3557->3548 3558 402006 FreeLibrary 3557->3558 3558->3548 3561 402a02 3560->3561 3620 405a2e 3561->3620 3564 401f6a 3564->3544 3567 100019bf 3566->3567 3659 10001d3b 3567->3659 3569 100019c6 3570 100019d1 3569->3570 3571 10001adc 3569->3571 3572 100019dd 3570->3572 3686 100023f6 3570->3686 3571->3557 3690 10002440 3572->3690 3576 10001a42 3582 10001a84 3576->3582 3583 10001a48 3576->3583 3577 10001a24 3715 100025fe 3577->3715 3578 100019f4 3581 100019fa 3578->3581 3585 10001a05 3578->3585 3579 10001a0d 3591 10001a03 3579->3591 3712 100014c7 3579->3712 3581->3591 3702 1000120c 3581->3702 3589 100025fe 15 API calls 3582->3589 3587 100018a1 3 API calls 3583->3587 3706 100027cc 3585->3706 3593 10001a5e 3587->3593 3597 10001a76 3589->3597 3591->3576 3591->3577 3595 100025fe 15 API calls 3593->3595 3595->3597 3605 10001acb 3597->3605 3740 100025c4 3597->3740 3600 10001ad5 GlobalFree 3600->3571 3602 10001ab7 3602->3605 3744 10001825 wsprintfA 3602->3744 3603 10001ab0 FreeLibrary 3603->3602 3605->3571 3605->3600 3607 404daa 25 API calls 3606->3607 3608 401431 3607->3608 3608->3557 3610 404dc5 3609->3610 3619 404e68 3609->3619 3611 404de2 lstrlenA 3610->3611 3612 405a2e 18 API calls 3610->3612 3613 404df0 lstrlenA 3611->3613 3614 404e0b 3611->3614 3612->3611 3615 404e02 lstrcatA 3613->3615 3613->3619 3616 404e11 SetWindowTextA 3614->3616 3617 404e1e 3614->3617 3615->3614 3616->3617 3618 404e24 SendMessageA SendMessageA SendMessageA 3617->3618 3617->3619 3618->3619 3619->3557 3636 405a3b 3620->3636 3621 405c55 3622 402a23 3621->3622 3654 405a0c lstrcpynA 3621->3654 3622->3564 3638 405c6e 3622->3638 3624 405ad3 GetVersion 3624->3636 3625 405c2c lstrlenA 3625->3636 3626 405a2e 10 API calls 3626->3625 3629 405b4b GetSystemDirectoryA 3629->3636 3631 405b5e GetWindowsDirectoryA 3631->3636 3632 405c6e 5 API calls 3632->3636 3633 405a2e 10 API calls 3633->3636 3634 405bd5 lstrcatA 3634->3636 3635 405b92 SHGetSpecialFolderLocation 3635->3636 3637 405baa SHGetPathFromIDListA CoTaskMemFree 3635->3637 3636->3621 3636->3624 3636->3625 3636->3626 3636->3629 3636->3631 3636->3632 3636->3633 3636->3634 3636->3635 3647 4058f3 RegOpenKeyExA 3636->3647 3652 40596a wsprintfA 3636->3652 3653 405a0c lstrcpynA 3636->3653 3637->3636 3645 405c7a 3638->3645 3639 405ce6 CharPrevA 3642 405ce2 3639->3642 3640 405cd7 CharNextA 3640->3642 3640->3645 3642->3639 3643 405d01 3642->3643 3643->3564 3644 405cc5 CharNextA 3644->3645 3645->3640 3645->3642 3645->3644 3646 405cd2 CharNextA 3645->3646 3655 40552a 3645->3655 3646->3640 3648 405964 3647->3648 3649 405926 RegQueryValueExA 3647->3649 3648->3636 3650 405947 RegCloseKey 3649->3650 3650->3648 3652->3636 3653->3636 3654->3622 3656 405530 3655->3656 3657 405543 3656->3657 3658 405536 CharNextA 3656->3658 3657->3645 3658->3656 3747 10001541 GlobalAlloc 3659->3747 3661 10001d5c 3748 10001541 GlobalAlloc 3661->3748 3663 10001d67 3749 10001561 3663->3749 3665 10001f77 GlobalFree GlobalFree GlobalFree 3666 10001f94 3665->3666 3678 10001fde 3665->3678 3667 100022c0 3666->3667 3676 10001fa9 3666->3676 3666->3678 3669 100022d9 GetModuleHandleA 3667->3669 3667->3678 3668 10001e21 GlobalAlloc 3683 10001d6f 3668->3683 3672 100022ea LoadLibraryA 3669->3672 3673 100022fb GetProcAddress 3669->3673 3670 10001e70 lstrcpyA 3674 10001e7a lstrcpyA 3670->3674 3671 10001e95 GlobalFree 3671->3683 3672->3673 3672->3678 3675 1000231a lstrcatA GetProcAddress 3673->3675 3673->3678 3674->3683 3675->3678 3676->3678 3756 10001550 3676->3756 3678->3569 3680 10002267 lstrcpyA 3680->3683 3681 10001ed7 3681->3683 3754 1000187c GlobalSize GlobalAlloc 3681->3754 3682 1000212b GlobalFree 3682->3683 3683->3665 3683->3668 3683->3670 3683->3671 3683->3674 3683->3680 3683->3681 3683->3682 3684 10001550 2 API calls 3683->3684 3759 10001541 GlobalAlloc 3683->3759 3684->3683 3687 10002406 3686->3687 3688 1000243c 3686->3688 3687->3688 3689 10002418 GlobalAlloc 3687->3689 3688->3572 3689->3687 3699 10002458 3690->3699 3691 10001550 GlobalAlloc lstrcpyA 3691->3699 3692 10001561 3 API calls 3692->3699 3694 1000258d GlobalFree 3695 100019e4 3694->3695 3694->3699 3695->3578 3695->3579 3695->3591 3696 10002515 GlobalAlloc MultiByteToWideChar 3698 10002542 GlobalAlloc 3696->3698 3696->3699 3697 100024f4 lstrlenA 3697->3694 3697->3699 3700 10002559 GlobalFree 3698->3700 3699->3691 3699->3692 3699->3694 3699->3696 3699->3697 3762 100015e5 3699->3762 3767 1000276e 3699->3767 3700->3694 3703 1000121e 3702->3703 3704 100013d2 GetLastError 3703->3704 3705 100013dd 3703->3705 3704->3705 3705->3591 3707 100027e9 3706->3707 3708 10002817 GlobalAlloc 3707->3708 3709 1000282a 3707->3709 3711 1000283a 3708->3711 3710 10002830 GlobalSize 3709->3710 3709->3711 3710->3711 3711->3591 3713 100014d2 3712->3713 3714 10001512 GlobalFree 3713->3714 3723 10002619 3715->3723 3717 10002706 lstrcpyA 3717->3723 3718 10002659 wsprintfA 3718->3723 3719 10002727 GlobalFree 3719->3723 3720 10002750 GlobalFree 3720->3723 3725 10001a2a 3720->3725 3721 100026c6 lstrlenA 3721->3723 3724 100026dc lstrcpynA 3721->3724 3722 100026b0 WideCharToMultiByte 3722->3723 3723->3717 3723->3718 3723->3719 3723->3720 3723->3721 3723->3722 3723->3724 3726 1000266d GlobalAlloc StringFromGUID2 WideCharToMultiByte GlobalFree 3723->3726 3727 1000159e 2 API calls 3723->3727 3770 10001541 GlobalAlloc 3723->3770 3771 1000160e 3723->3771 3724->3723 3729 100018a1 3725->3729 3726->3723 3727->3723 3775 10001541 GlobalAlloc 3729->3775 3731 100018a7 3732 100018b4 lstrcpyA 3731->3732 3733 100018ce 3731->3733 3736 100018e8 3732->3736 3735 100018d3 wsprintfA 3733->3735 3733->3736 3735->3736 3737 1000159e 3736->3737 3738 100015e0 GlobalFree 3737->3738 3739 100015a7 GlobalAlloc lstrcpynA 3737->3739 3738->3597 3739->3738 3741 10001a97 3740->3741 3742 100025d2 3740->3742 3741->3602 3741->3603 3742->3741 3743 100025eb GlobalFree 3742->3743 3743->3742 3745 1000159e 2 API calls 3744->3745 3746 1000184f 3745->3746 3746->3605 3747->3661 3748->3663 3750 1000159a 3749->3750 3751 1000156b 3749->3751 3750->3683 3751->3750 3760 10001541 GlobalAlloc 3751->3760 3753 10001577 lstrcpyA GlobalFree 3753->3683 3755 1000189a 3754->3755 3755->3681 3761 10001541 GlobalAlloc 3756->3761 3758 10001559 lstrcpyA 3758->3678 3759->3683 3760->3753 3761->3758 3763 10001609 3762->3763 3764 100015ed 3762->3764 3763->3763 3764->3763 3765 10001550 2 API calls 3764->3765 3766 10001607 3765->3766 3766->3699 3768 100027c4 3767->3768 3769 1000277c VirtualAlloc 3767->3769 3768->3699 3769->3768 3770->3723 3772 10001617 3771->3772 3773 1000163c 3771->3773 3772->3773 3774 10001623 lstrcpyA 3772->3774 3773->3723 3774->3773 3775->3731 4426 403ed2 lstrcpynA lstrlenA 4427 4014d6 4428 4029d9 18 API calls 4427->4428 4429 4014dc Sleep 4428->4429 4431 40288b 4429->4431 4437 4018d8 4438 40190f 4437->4438 4439 4029f6 18 API calls 4438->4439 4440 401914 4439->4440 4441 405331 68 API calls 4440->4441 4442 40191d 4441->4442 4443 4018db 4444 4029f6 18 API calls 4443->4444 4445 4018e2 4444->4445 4446 4052cd MessageBoxIndirectA 4445->4446 4447 4018eb 4446->4447 4448 100023a1 4449 10002406 4448->4449 4451 1000243c 4448->4451 4450 10002418 GlobalAlloc 4449->4450 4449->4451 4450->4449 4452 401ae5 4453 4029f6 18 API calls 4452->4453 4454 401aec 4453->4454 4455 4029d9 18 API calls 4454->4455 4456 401af5 wsprintfA 4455->4456 4457 40288b 4456->4457 4458 402866 SendMessageA 4459 402880 InvalidateRect 4458->4459 4460 40288b 4458->4460 4459->4460 4461 4019e6 4462 4029f6 18 API calls 4461->4462 4463 4019ef ExpandEnvironmentStringsA 4462->4463 4464 401a03 4463->4464 4466 401a16 4463->4466 4465 401a08 lstrcmpA 4464->4465 4464->4466 4465->4466 4467 402267 4468 4029f6 18 API calls 4467->4468 4469 402275 4468->4469 4470 4029f6 18 API calls 4469->4470 4471 40227e 4470->4471 4472 4029f6 18 API calls 4471->4472 4473 402288 GetPrivateProfileStringA 4472->4473 4474 404ee8 4475 405094 4474->4475 4476 404f09 GetDlgItem GetDlgItem GetDlgItem 4474->4476 4478 4050c5 4475->4478 4479 40509d GetDlgItem CreateThread CloseHandle 4475->4479 4520 403df3 SendMessageA 4476->4520 4481 4050f0 4478->4481 4483 405112 4478->4483 4484 4050dc ShowWindow ShowWindow 4478->4484 4479->4478 4480 404f7a 4488 404f81 GetClientRect GetSystemMetrics SendMessageA SendMessageA 4480->4488 4482 40514e 4481->4482 4485 405101 4481->4485 4486 405127 ShowWindow 4481->4486 4482->4483 4495 405159 SendMessageA 4482->4495 4487 403e25 8 API calls 4483->4487 4522 403df3 SendMessageA 4484->4522 4490 403d97 SendMessageA 4485->4490 4491 405147 4486->4491 4492 405139 4486->4492 4501 405120 4487->4501 4493 404ff0 4488->4493 4494 404fd4 SendMessageA SendMessageA 4488->4494 4490->4483 4497 403d97 SendMessageA 4491->4497 4496 404daa 25 API calls 4492->4496 4498 405003 4493->4498 4499 404ff5 SendMessageA 4493->4499 4494->4493 4500 405172 CreatePopupMenu 4495->4500 4495->4501 4496->4491 4497->4482 4503 403dbe 19 API calls 4498->4503 4499->4498 4502 405a2e 18 API calls 4500->4502 4504 405182 AppendMenuA 4502->4504 4505 405013 4503->4505 4506 405195 GetWindowRect 4504->4506 4507 4051a8 4504->4507 4508 405050 GetDlgItem SendMessageA 4505->4508 4509 40501c ShowWindow 4505->4509 4510 4051b1 TrackPopupMenu 4506->4510 4507->4510 4508->4501 4513 405077 SendMessageA SendMessageA 4508->4513 4511 405032 ShowWindow 4509->4511 4512 40503f 4509->4512 4510->4501 4514 4051cf 4510->4514 4511->4512 4521 403df3 SendMessageA 4512->4521 4513->4501 4515 4051eb SendMessageA 4514->4515 4515->4515 4517 405208 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4515->4517 4518 40522a SendMessageA 4517->4518 4518->4518 4519 40524b GlobalUnlock SetClipboardData CloseClipboard 4518->4519 4519->4501 4520->4480 4521->4508 4522->4481 4273 4038eb 4274 403903 4273->4274 4275 403a3e 4273->4275 4274->4275 4276 40390f 4274->4276 4277 403a8f 4275->4277 4278 403a4f GetDlgItem GetDlgItem 4275->4278 4281 40391a SetWindowPos 4276->4281 4282 40392d 4276->4282 4280 403ae9 4277->4280 4290 401389 2 API calls 4277->4290 4279 403dbe 19 API calls 4278->4279 4285 403a79 SetClassLongA 4279->4285 4286 403e0a SendMessageA 4280->4286 4334 403a39 4280->4334 4281->4282 4283 403932 ShowWindow 4282->4283 4284 40394a 4282->4284 4283->4284 4287 403952 DestroyWindow 4284->4287 4288 40396c 4284->4288 4289 40140b 2 API calls 4285->4289 4332 403afb 4286->4332 4342 403d47 4287->4342 4291 403971 SetWindowLongA 4288->4291 4292 403982 4288->4292 4289->4277 4293 403ac1 4290->4293 4291->4334 4295 403a2b 4292->4295 4296 40398e GetDlgItem 4292->4296 4293->4280 4297 403ac5 SendMessageA 4293->4297 4294 403d49 DestroyWindow EndDialog 4294->4342 4300 403e25 8 API calls 4295->4300 4299 4039a1 SendMessageA IsWindowEnabled 4296->4299 4303 4039be 4296->4303 4297->4334 4298 40140b 2 API calls 4298->4332 4299->4303 4299->4334 4300->4334 4301 403d78 ShowWindow 4301->4334 4302 405a2e 18 API calls 4302->4332 4304 4039cb 4303->4304 4306 403a12 SendMessageA 4303->4306 4307 4039de 4303->4307 4314 4039c3 4303->4314 4304->4306 4304->4314 4306->4295 4309 4039e6 4307->4309 4310 4039fb 4307->4310 4308 4039f9 4308->4295 4311 40140b 2 API calls 4309->4311 4313 40140b 2 API calls 4310->4313 4311->4314 4312 403dbe 19 API calls 4312->4332 4315 403a02 4313->4315 4346 403d97 4314->4346 4315->4295 4315->4314 4316 403dbe 19 API calls 4317 403b76 GetDlgItem 4316->4317 4318 403b93 ShowWindow KiUserCallbackDispatcher 4317->4318 4319 403b8b 4317->4319 4343 403de0 EnableWindow 4318->4343 4319->4318 4321 403bbd EnableWindow 4324 403bd1 4321->4324 4322 403bd6 GetSystemMenu EnableMenuItem SendMessageA 4323 403c06 SendMessageA 4322->4323 4322->4324 4323->4324 4324->4322 4344 403df3 SendMessageA 4324->4344 4345 405a0c lstrcpynA 4324->4345 4327 403c34 lstrlenA 4328 405a2e 18 API calls 4327->4328 4329 403c45 SetWindowTextA 4328->4329 4330 401389 2 API calls 4329->4330 4330->4332 4331 403c89 DestroyWindow 4333 403ca3 CreateDialogParamA 4331->4333 4331->4342 4332->4294 4332->4298 4332->4302 4332->4312 4332->4316 4332->4331 4332->4334 4335 403cd6 4333->4335 4333->4342 4336 403dbe 19 API calls 4335->4336 4337 403ce1 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4336->4337 4338 401389 2 API calls 4337->4338 4339 403d27 4338->4339 4339->4334 4340 403d2f ShowWindow 4339->4340 4341 403e0a SendMessageA 4340->4341 4341->4342 4342->4301 4342->4334 4343->4321 4344->4324 4345->4327 4347 403da4 SendMessageA 4346->4347 4348 403d9e 4346->4348 4347->4308 4348->4347 4523 401c6d 4524 4029d9 18 API calls 4523->4524 4525 401c73 IsWindow 4524->4525 4526 4019d6 4525->4526 4527 1000102f 4528 10001561 3 API calls 4527->4528 4530 1000104b 4528->4530 4529 100010b3 4530->4529 4531 100017fe 4 API calls 4530->4531 4532 10001068 4530->4532 4531->4532 4533 100017fe 4 API calls 4532->4533 4534 10001078 4533->4534 4535 10001088 4534->4535 4536 1000107f GlobalSize 4534->4536 4537 1000108c GlobalAlloc 4535->4537 4538 1000109d 4535->4538 4536->4535 4539 10001825 3 API calls 4537->4539 4540 100010a8 GlobalFree 4538->4540 4539->4538 4540->4529 3536 10002930 3537 10002940 VirtualProtect 3536->3537 3538 1000297b 3536->3538 3537->3538 4541 4014f0 SetForegroundWindow 4542 40288b 4541->4542 4543 402172 4544 4029f6 18 API calls 4543->4544 4545 402178 4544->4545 4546 4029f6 18 API calls 4545->4546 4547 402181 4546->4547 4548 4029f6 18 API calls 4547->4548 4549 40218a 4548->4549 4550 405d07 2 API calls 4549->4550 4551 402193 4550->4551 4552 4021a4 lstrlenA lstrlenA 4551->4552 4553 402197 4551->4553 4555 404daa 25 API calls 4552->4555 4554 404daa 25 API calls 4553->4554 4556 40219f 4553->4556 4554->4556 4557 4021e0 SHFileOperationA 4555->4557 4557->4553 4557->4556 4558 4021f4 4559 40220e 4558->4559 4560 4021fb 4558->4560 4561 405a2e 18 API calls 4560->4561 4562 402208 4561->4562 4563 4052cd MessageBoxIndirectA 4562->4563 4563->4559 4564 100010b7 4565 100017fe 4 API calls 4564->4565 4566 100010ce GlobalFree 4565->4566 4567 4046f9 GetDlgItem GetDlgItem 4568 40474d 7 API calls 4567->4568 4573 40496a 4567->4573 4569 4047f3 DeleteObject 4568->4569 4570 4047e6 SendMessageA 4568->4570 4571 4047fe 4569->4571 4570->4569 4572 404835 4571->4572 4576 405a2e 18 API calls 4571->4576 4574 403dbe 19 API calls 4572->4574 4581 404a54 4573->4581 4599 4049de 4573->4599 4620 404679 SendMessageA 4573->4620 4580 404849 4574->4580 4575 404b03 4577 404b18 4575->4577 4578 404b0c SendMessageA 4575->4578 4579 404817 SendMessageA SendMessageA 4576->4579 4587 404b31 4577->4587 4588 404b2a ImageList_Destroy 4577->4588 4601 404b41 4577->4601 4578->4577 4579->4571 4584 403dbe 19 API calls 4580->4584 4581->4575 4585 404aad SendMessageA 4581->4585 4608 40495d 4581->4608 4582 404a46 SendMessageA 4582->4581 4600 404857 4584->4600 4590 404ac2 SendMessageA 4585->4590 4585->4608 4586 403e25 8 API calls 4591 404cf3 4586->4591 4592 404b3a GlobalFree 4587->4592 4587->4601 4588->4587 4589 404ca7 4596 404cb9 ShowWindow GetDlgItem ShowWindow 4589->4596 4589->4608 4594 404ad5 4590->4594 4592->4601 4593 40492b GetWindowLongA SetWindowLongA 4595 404944 4593->4595 4606 404ae6 SendMessageA 4594->4606 4597 404962 4595->4597 4598 40494a ShowWindow 4595->4598 4596->4608 4619 403df3 SendMessageA 4597->4619 4618 403df3 SendMessageA 4598->4618 4599->4581 4599->4582 4600->4593 4604 4048a6 SendMessageA 4600->4604 4607 404925 4600->4607 4609 4048e2 SendMessageA 4600->4609 4610 4048f3 SendMessageA 4600->4610 4601->4589 4605 40140b 2 API calls 4601->4605 4614 404b73 4601->4614 4604->4600 4605->4614 4606->4575 4607->4593 4607->4595 4608->4586 4609->4600 4610->4600 4611 404c7d InvalidateRect 4611->4589 4612 404c93 4611->4612 4625 404597 4612->4625 4613 404ba1 SendMessageA 4617 404bb7 4613->4617 4614->4613 4614->4617 4616 404c2b SendMessageA SendMessageA 4616->4617 4617->4611 4617->4616 4618->4608 4619->4573 4621 4046d8 SendMessageA 4620->4621 4622 40469c GetMessagePos ScreenToClient SendMessageA 4620->4622 4623 4046d0 4621->4623 4622->4623 4624 4046d5 4622->4624 4623->4599 4624->4621 4626 4045b1 4625->4626 4627 405a2e 18 API calls 4626->4627 4628 4045e6 4627->4628 4629 405a2e 18 API calls 4628->4629 4630 4045f1 4629->4630 4631 405a2e 18 API calls 4630->4631 4632 404622 lstrlenA wsprintfA SetDlgItemTextA 4631->4632 4632->4589 3942 4030fa #17 SetErrorMode OleInitialize 4012 405d2e GetModuleHandleA 3942->4012 3946 403168 GetCommandLineA 4017 405a0c lstrcpynA 3946->4017 3948 40317a GetModuleHandleA 3949 403191 3948->3949 3950 40552a CharNextA 3949->3950 3951 4031a5 CharNextA 3950->3951 3956 4031b2 3951->3956 3952 40321b 3953 40322e GetTempPathA 3952->3953 4018 4030c6 3953->4018 3955 403244 3957 403268 DeleteFileA 3955->3957 3958 403248 GetWindowsDirectoryA lstrcatA 3955->3958 3956->3952 3959 40552a CharNextA 3956->3959 3963 40321d 3956->3963 4026 402c22 GetTickCount GetModuleFileNameA 3957->4026 3960 4030c6 11 API calls 3958->3960 3959->3956 3962 403264 3960->3962 3962->3957 4007 4032e2 3962->4007 4108 405a0c lstrcpynA 3963->4108 3964 403279 3968 40552a CharNextA 3964->3968 3999 4032d2 3964->3999 3964->4007 3972 403290 3968->3972 3970 4032fb 3973 4052cd MessageBoxIndirectA 3970->3973 3971 4033e0 3974 405d2e 3 API calls 3971->3974 3976 403463 ExitProcess 3971->3976 3979 403311 lstrcatA lstrcmpiA 3972->3979 3980 4032ad 3972->3980 3977 403309 ExitProcess 3973->3977 3978 4033ef 3974->3978 3983 405d2e 3 API calls 3978->3983 3982 40332d CreateDirectoryA SetCurrentDirectoryA 3979->3982 3979->4007 4109 4055e0 3980->4109 3985 403344 3982->3985 3986 40334f 3982->3986 3987 4033f8 3983->3987 4132 405a0c lstrcpynA 3985->4132 4133 405a0c lstrcpynA 3986->4133 3990 405d2e 3 API calls 3987->3990 3992 403401 3990->3992 3994 40344f ExitWindowsEx 3992->3994 3998 40340f GetCurrentProcess 3992->3998 3993 4032c7 4124 405a0c lstrcpynA 3993->4124 3994->3976 3997 40345c 3994->3997 3996 405a2e 18 API calls 4000 40337f DeleteFileA 3996->4000 4163 40140b 3997->4163 4003 40341f 3998->4003 4054 403555 3999->4054 4002 40338c CopyFileA 4000->4002 4009 40335d 4000->4009 4002->4009 4003->3994 4004 4033d4 4005 40575a 38 API calls 4004->4005 4005->4007 4125 40347b 4007->4125 4008 405a2e 18 API calls 4008->4009 4009->3996 4009->4004 4009->4008 4011 4033c0 CloseHandle 4009->4011 4134 40575a 4009->4134 4160 40526c CreateProcessA 4009->4160 4011->4009 4013 405d55 GetProcAddress 4012->4013 4014 405d4a LoadLibraryA 4012->4014 4015 40313d SHGetFileInfoA 4013->4015 4014->4013 4014->4015 4016 405a0c lstrcpynA 4015->4016 4016->3946 4017->3948 4019 405c6e 5 API calls 4018->4019 4021 4030d2 4019->4021 4020 4030dc 4020->3955 4021->4020 4022 4054ff 3 API calls 4021->4022 4023 4030e4 CreateDirectoryA 4022->4023 4024 405712 2 API calls 4023->4024 4025 4030f8 4024->4025 4025->3955 4166 4056e3 GetFileAttributesA CreateFileA 4026->4166 4028 402c62 4047 402c72 4028->4047 4167 405a0c lstrcpynA 4028->4167 4030 402c88 4168 405546 lstrlenA 4030->4168 4034 402c99 GetFileSize 4035 402d95 4034->4035 4053 402cb0 4034->4053 4173 402bbe 4035->4173 4037 402d9e 4039 402dce GlobalAlloc 4037->4039 4037->4047 4185 4030af SetFilePointer 4037->4185 4038 40307d ReadFile 4038->4053 4184 4030af SetFilePointer 4039->4184 4040 402e01 4044 402bbe 6 API calls 4040->4044 4043 402de9 4046 402e5b 33 API calls 4043->4046 4044->4047 4045 402db7 4048 40307d ReadFile 4045->4048 4051 402df5 4046->4051 4047->3964 4050 402dc2 4048->4050 4049 402bbe 6 API calls 4049->4053 4050->4039 4050->4047 4051->4047 4051->4051 4052 402e32 SetFilePointer 4051->4052 4052->4047 4053->4035 4053->4038 4053->4040 4053->4047 4053->4049 4055 405d2e 3 API calls 4054->4055 4056 403569 4055->4056 4057 403581 4056->4057 4058 40356f 4056->4058 4059 4058f3 3 API calls 4057->4059 4199 40596a wsprintfA 4058->4199 4060 4035a2 4059->4060 4061 4035c0 lstrcatA 4060->4061 4063 4058f3 3 API calls 4060->4063 4064 40357f 4061->4064 4063->4061 4190 40381e 4064->4190 4067 4055e0 18 API calls 4068 4035f2 4067->4068 4069 40367b 4068->4069 4071 4058f3 3 API calls 4068->4071 4070 4055e0 18 API calls 4069->4070 4072 403681 4070->4072 4073 40361e 4071->4073 4074 403691 LoadImageA 4072->4074 4077 405a2e 18 API calls 4072->4077 4073->4069 4080 40363a lstrlenA 4073->4080 4083 40552a CharNextA 4073->4083 4075 403745 4074->4075 4076 4036bc RegisterClassA 4074->4076 4079 40140b 2 API calls 4075->4079 4078 4036f8 SystemParametersInfoA CreateWindowExA 4076->4078 4105 40374f 4076->4105 4077->4074 4078->4075 4086 40374b 4079->4086 4081 403648 lstrcmpiA 4080->4081 4082 40366e 4080->4082 4081->4082 4085 403658 GetFileAttributesA 4081->4085 4087 4054ff 3 API calls 4082->4087 4084 403638 4083->4084 4084->4080 4088 403664 4085->4088 4089 40381e 19 API calls 4086->4089 4086->4105 4090 403674 4087->4090 4088->4082 4091 405546 2 API calls 4088->4091 4092 40375c 4089->4092 4200 405a0c lstrcpynA 4090->4200 4091->4082 4094 403768 ShowWindow LoadLibraryA 4092->4094 4095 4037eb 4092->4095 4097 403787 LoadLibraryA 4094->4097 4098 40378e GetClassInfoA 4094->4098 4201 404e7c OleInitialize 4095->4201 4097->4098 4100 4037a2 GetClassInfoA RegisterClassA 4098->4100 4101 4037b8 DialogBoxParamA 4098->4101 4099 4037f1 4102 4037f5 4099->4102 4103 40380d 4099->4103 4100->4101 4104 40140b 2 API calls 4101->4104 4102->4105 4107 40140b 2 API calls 4102->4107 4106 40140b 2 API calls 4103->4106 4104->4105 4105->4007 4106->4105 4107->4105 4108->3953 4216 405a0c lstrcpynA 4109->4216 4111 4055f1 4112 405593 4 API calls 4111->4112 4113 4055f7 4112->4113 4114 4032b8 4113->4114 4115 405c6e 5 API calls 4113->4115 4114->4007 4123 405a0c lstrcpynA 4114->4123 4120 405607 4115->4120 4116 405632 lstrlenA 4117 40563d 4116->4117 4116->4120 4119 4054ff 3 API calls 4117->4119 4118 405d07 2 API calls 4118->4120 4121 405642 GetFileAttributesA 4119->4121 4120->4114 4120->4116 4120->4118 4122 405546 2 API calls 4120->4122 4121->4114 4122->4116 4123->3993 4124->3999 4126 403493 4125->4126 4127 403485 CloseHandle 4125->4127 4217 4034c0 4126->4217 4127->4126 4132->3986 4133->4009 4135 405d2e 3 API calls 4134->4135 4136 405765 4135->4136 4137 4057c2 GetShortPathNameA 4136->4137 4140 4058b7 4136->4140 4265 4056e3 GetFileAttributesA CreateFileA 4136->4265 4139 4057d7 4137->4139 4137->4140 4139->4140 4142 4057df wsprintfA 4139->4142 4140->4009 4141 4057a6 CloseHandle GetShortPathNameA 4141->4140 4143 4057ba 4141->4143 4144 405a2e 18 API calls 4142->4144 4143->4137 4143->4140 4145 405807 4144->4145 4266 4056e3 GetFileAttributesA CreateFileA 4145->4266 4147 405814 4147->4140 4148 405823 GetFileSize GlobalAlloc 4147->4148 4149 4058b0 CloseHandle 4148->4149 4150 405841 ReadFile 4148->4150 4149->4140 4150->4149 4151 405855 4150->4151 4151->4149 4267 405658 lstrlenA 4151->4267 4154 4058c4 4156 405658 4 API calls 4154->4156 4155 40586a 4272 405a0c lstrcpynA 4155->4272 4158 405878 4156->4158 4159 40588b SetFilePointer WriteFile GlobalFree 4158->4159 4159->4149 4161 4052a7 4160->4161 4162 40529b CloseHandle 4160->4162 4161->4009 4162->4161 4164 401389 2 API calls 4163->4164 4165 401420 4164->4165 4165->3976 4166->4028 4167->4030 4169 405553 4168->4169 4170 402c8e 4169->4170 4171 405558 CharPrevA 4169->4171 4172 405a0c lstrcpynA 4170->4172 4171->4169 4171->4170 4172->4034 4174 402bc7 4173->4174 4175 402bdf 4173->4175 4176 402bd0 DestroyWindow 4174->4176 4177 402bd7 4174->4177 4178 402be7 4175->4178 4179 402bef GetTickCount 4175->4179 4176->4177 4177->4037 4186 405d67 4178->4186 4181 402c20 4179->4181 4182 402bfd CreateDialogParamA ShowWindow 4179->4182 4181->4037 4182->4181 4184->4043 4185->4045 4187 405d84 PeekMessageA 4186->4187 4188 402bed 4187->4188 4189 405d7a DispatchMessageA 4187->4189 4188->4037 4189->4187 4191 403832 4190->4191 4208 40596a wsprintfA 4191->4208 4193 4038a3 4194 405a2e 18 API calls 4193->4194 4195 4038af SetWindowTextA 4194->4195 4196 4035d0 4195->4196 4197 4038cb 4195->4197 4196->4067 4197->4196 4198 405a2e 18 API calls 4197->4198 4198->4197 4199->4064 4200->4069 4209 403e0a 4201->4209 4203 403e0a SendMessageA 4205 404ed8 OleUninitialize 4203->4205 4204 404e9f 4207 404ec6 4204->4207 4212 401389 4204->4212 4205->4099 4207->4203 4208->4193 4210 403e22 4209->4210 4211 403e13 SendMessageA 4209->4211 4210->4204 4211->4210 4214 401390 4212->4214 4213 4013fe 4213->4204 4214->4213 4215 4013cb MulDiv SendMessageA 4214->4215 4215->4214 4216->4111 4218 4034ce 4217->4218 4219 403498 4218->4219 4220 4034d3 FreeLibrary GlobalFree 4218->4220 4221 405331 4219->4221 4220->4219 4220->4220 4222 4055e0 18 API calls 4221->4222 4223 405345 4222->4223 4224 405365 4223->4224 4225 40534e DeleteFileA 4223->4225 4227 4054a4 4224->4227 4263 405a0c lstrcpynA 4224->4263 4226 4032eb OleUninitialize 4225->4226 4226->3970 4226->3971 4227->4226 4233 405d07 2 API calls 4227->4233 4229 40538f 4230 4053a0 4229->4230 4231 405393 lstrcatA 4229->4231 4232 405546 2 API calls 4230->4232 4234 4053a6 4231->4234 4232->4234 4237 4054bf 4233->4237 4235 4053b4 lstrcatA 4234->4235 4236 4053ab 4234->4236 4238 4053bf lstrlenA FindFirstFileA 4235->4238 4236->4235 4236->4238 4237->4226 4239 4054c3 4237->4239 4240 40549a 4238->4240 4253 4053e3 4238->4253 4241 4054ff 3 API calls 4239->4241 4240->4227 4243 4054c9 4241->4243 4242 40552a CharNextA 4242->4253 4244 4056c4 2 API calls 4243->4244 4245 4054cf RemoveDirectoryA 4244->4245 4246 4054f1 4245->4246 4247 4054da 4245->4247 4248 404daa 25 API calls 4246->4248 4247->4226 4251 404daa 25 API calls 4247->4251 4248->4226 4249 405479 FindNextFileA 4252 405491 FindClose 4249->4252 4249->4253 4254 4054e8 4251->4254 4252->4240 4253->4242 4253->4249 4256 4056c4 2 API calls 4253->4256 4257 405331 59 API calls 4253->4257 4260 404daa 25 API calls 4253->4260 4261 404daa 25 API calls 4253->4261 4262 40575a 38 API calls 4253->4262 4264 405a0c lstrcpynA 4253->4264 4255 40575a 38 API calls 4254->4255 4258 4054ef 4255->4258 4259 405446 DeleteFileA 4256->4259 4257->4253 4258->4226 4259->4253 4260->4249 4261->4253 4262->4253 4263->4229 4264->4253 4265->4141 4266->4147 4268 40568e lstrlenA 4267->4268 4269 405698 4268->4269 4270 40566c lstrcmpiA 4268->4270 4269->4154 4269->4155 4270->4269 4271 405685 CharNextA 4270->4271 4271->4268 4272->4158 4633 404cfa 4634 404d08 4633->4634 4635 404d1f 4633->4635 4636 404d0e 4634->4636 4651 404d88 4634->4651 4637 404d2d IsWindowVisible 4635->4637 4641 404d44 4635->4641 4638 403e0a SendMessageA 4636->4638 4640 404d3a 4637->4640 4637->4651 4642 404d18 4638->4642 4639 404d8e CallWindowProcA 4639->4642 4643 404679 5 API calls 4640->4643 4641->4639 4652 405a0c lstrcpynA 4641->4652 4643->4641 4645 404d73 4653 40596a wsprintfA 4645->4653 4647 404d7a 4648 40140b 2 API calls 4647->4648 4649 404d81 4648->4649 4654 405a0c lstrcpynA 4649->4654 4651->4639 4652->4645 4653->4647 4654->4651 4655 4016fa 4656 4029f6 18 API calls 4655->4656 4657 401701 SearchPathA 4656->4657 4658 40171c 4657->4658 4659 4025fb 4660 402602 4659->4660 4661 40288b 4659->4661 4662 402608 FindClose 4660->4662 4662->4661 4663 40267c 4664 4029f6 18 API calls 4663->4664 4666 40268a 4664->4666 4665 4026a0 4668 4056c4 2 API calls 4665->4668 4666->4665 4667 4029f6 18 API calls 4666->4667 4667->4665 4669 4026a6 4668->4669 4689 4056e3 GetFileAttributesA CreateFileA 4669->4689 4671 4026b3 4672 40275c 4671->4672 4673 4026bf GlobalAlloc 4671->4673 4676 402764 DeleteFileA 4672->4676 4677 402777 4672->4677 4674 402753 CloseHandle 4673->4674 4675 4026d8 4673->4675 4674->4672 4690 4030af SetFilePointer 4675->4690 4676->4677 4679 4026de 4680 40307d ReadFile 4679->4680 4681 4026e7 GlobalAlloc 4680->4681 4682 4026f7 4681->4682 4683 40272b WriteFile GlobalFree 4681->4683 4684 402e5b 33 API calls 4682->4684 4685 402e5b 33 API calls 4683->4685 4686 402704 4684->4686 4687 402750 4685->4687 4688 402722 GlobalFree 4686->4688 4687->4674 4688->4683 4689->4671 4690->4679 4691 4041fc 4692 40423a 4691->4692 4693 40422d 4691->4693 4695 404243 GetDlgItem 4692->4695 4727 4042a6 4692->4727 4752 4052b1 GetDlgItemTextA 4693->4752 4699 404257 4695->4699 4696 404234 4698 405c6e 5 API calls 4696->4698 4697 40438a 4701 404516 4697->4701 4754 4052b1 GetDlgItemTextA 4697->4754 4698->4692 4700 40426b SetWindowTextA 4699->4700 4703 405593 4 API calls 4699->4703 4704 403dbe 19 API calls 4700->4704 4707 403e25 8 API calls 4701->4707 4709 404261 4703->4709 4710 404289 4704->4710 4705 405a2e 18 API calls 4711 40431c SHBrowseForFolderA 4705->4711 4706 4043b6 4712 4055e0 18 API calls 4706->4712 4708 40452a 4707->4708 4709->4700 4716 4054ff 3 API calls 4709->4716 4713 403dbe 19 API calls 4710->4713 4711->4697 4714 404334 CoTaskMemFree 4711->4714 4715 4043bc 4712->4715 4717 404297 4713->4717 4718 4054ff 3 API calls 4714->4718 4755 405a0c lstrcpynA 4715->4755 4716->4700 4753 403df3 SendMessageA 4717->4753 4720 404341 4718->4720 4723 404378 SetDlgItemTextA 4720->4723 4728 405a2e 18 API calls 4720->4728 4722 40429f 4725 405d2e 3 API calls 4722->4725 4723->4697 4724 4043d3 4726 405d2e 3 API calls 4724->4726 4725->4727 4734 4043db 4726->4734 4727->4697 4727->4701 4727->4705 4729 404360 lstrcmpiA 4728->4729 4729->4723 4732 404371 lstrcatA 4729->4732 4730 404415 4756 405a0c lstrcpynA 4730->4756 4732->4723 4733 40441e 4735 405593 4 API calls 4733->4735 4734->4730 4739 405546 2 API calls 4734->4739 4740 404468 4734->4740 4736 404424 GetDiskFreeSpaceA 4735->4736 4738 404446 MulDiv 4736->4738 4736->4740 4738->4740 4739->4734 4741 4044c5 4740->4741 4743 404597 21 API calls 4740->4743 4742 4044e8 4741->4742 4744 40140b 2 API calls 4741->4744 4757 403de0 EnableWindow 4742->4757 4745 4044b7 4743->4745 4744->4742 4747 4044c7 SetDlgItemTextA 4745->4747 4748 4044bc 4745->4748 4747->4741 4750 404597 21 API calls 4748->4750 4749 404504 4749->4701 4751 404191 SendMessageA 4749->4751 4750->4741 4751->4701 4752->4696 4753->4722 4754->4706 4755->4724 4756->4733 4757->4749 4758 4014fe 4759 401506 4758->4759 4761 401519 4758->4761 4760 4029d9 18 API calls 4759->4760 4760->4761 4762 401000 4763 401037 BeginPaint GetClientRect 4762->4763 4764 40100c DefWindowProcA 4762->4764 4766 4010f3 4763->4766 4767 401179 4764->4767 4768 401073 CreateBrushIndirect FillRect DeleteObject 4766->4768 4769 4010fc 4766->4769 4768->4766 4770 401102 CreateFontIndirectA 4769->4770 4771 401167 EndPaint 4769->4771 4770->4771 4772 401112 6 API calls 4770->4772 4771->4767 4772->4771 4773 402803 4774 4029d9 18 API calls 4773->4774 4775 402809 4774->4775 4776 40283a 4775->4776 4777 402817 4775->4777 4780 40265c 4775->4780 4778 405a2e 18 API calls 4776->4778 4776->4780 4777->4780 4781 40596a wsprintfA 4777->4781 4778->4780 4781->4780 4782 402303 4783 402309 4782->4783 4784 4029f6 18 API calls 4783->4784 4785 40231b 4784->4785 4786 4029f6 18 API calls 4785->4786 4787 402325 RegCreateKeyExA 4786->4787 4788 40234f 4787->4788 4791 40265c 4787->4791 4789 402367 4788->4789 4790 4029f6 18 API calls 4788->4790 4793 4029d9 18 API calls 4789->4793 4795 402373 4789->4795 4792 402360 lstrlenA 4790->4792 4792->4789 4793->4795 4794 40238e RegSetValueExA 4796 4023a4 RegCloseKey 4794->4796 4795->4794 4797 402e5b 33 API calls 4795->4797 4796->4791 4797->4794 3890 403f06 3891 403f1c 3890->3891 3896 404029 3890->3896 3919 403dbe 3891->3919 3892 404098 3893 40416c 3892->3893 3895 4040a2 GetDlgItem 3892->3895 3928 403e25 3893->3928 3898 4040b8 3895->3898 3899 40412a 3895->3899 3896->3892 3896->3893 3900 40406d GetDlgItem SendMessageA 3896->3900 3897 403f72 3902 403dbe 19 API calls 3897->3902 3898->3899 3907 4040de 6 API calls 3898->3907 3899->3893 3903 40413c 3899->3903 3924 403de0 EnableWindow 3900->3924 3906 403f7f CheckDlgButton 3902->3906 3908 404142 SendMessageA 3903->3908 3909 404153 3903->3909 3905 404167 3922 403de0 EnableWindow 3906->3922 3907->3899 3908->3909 3909->3905 3912 404159 SendMessageA 3909->3912 3910 404093 3925 404191 3910->3925 3912->3905 3914 403f9d GetDlgItem 3923 403df3 SendMessageA 3914->3923 3916 403fb3 SendMessageA 3917 403fd1 GetSysColor 3916->3917 3918 403fda SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 3916->3918 3917->3918 3918->3905 3920 405a2e 18 API calls 3919->3920 3921 403dc9 SetDlgItemTextA 3920->3921 3921->3897 3922->3914 3923->3916 3924->3910 3926 4041a4 SendMessageA 3925->3926 3927 40419f 3925->3927 3926->3892 3927->3926 3929 403e3d GetWindowLongA 3928->3929 3939 403ec6 3928->3939 3930 403e4e 3929->3930 3929->3939 3931 403e60 3930->3931 3932 403e5d GetSysColor 3930->3932 3933 403e70 SetBkMode 3931->3933 3934 403e66 SetTextColor 3931->3934 3932->3931 3935 403e88 GetSysColor 3933->3935 3936 403e8e 3933->3936 3934->3933 3935->3936 3937 403e95 SetBkColor 3936->3937 3938 403e9f 3936->3938 3937->3938 3938->3939 3940 403eb2 DeleteObject 3938->3940 3941 403eb9 CreateBrushIndirect 3938->3941 3939->3905 3940->3941 3941->3939 4799 401b06 4800 401b13 4799->4800 4801 401b57 4799->4801 4804 4021fb 4800->4804 4807 401b2a 4800->4807 4802 401b80 GlobalAlloc 4801->4802 4803 401b5b 4801->4803 4805 405a2e 18 API calls 4802->4805 4812 401b9b 4803->4812 4820 405a0c lstrcpynA 4803->4820 4806 405a2e 18 API calls 4804->4806 4805->4812 4809 402208 4806->4809 4818 405a0c lstrcpynA 4807->4818 4813 4052cd MessageBoxIndirectA 4809->4813 4811 401b6d GlobalFree 4811->4812 4813->4812 4814 401b39 4819 405a0c lstrcpynA 4814->4819 4816 401b48 4821 405a0c lstrcpynA 4816->4821 4818->4814 4819->4816 4820->4811 4821->4812 4822 402506 4823 4029d9 18 API calls 4822->4823 4824 402510 4823->4824 4825 402544 ReadFile 4824->4825 4826 402588 4824->4826 4827 402598 4824->4827 4830 402586 4824->4830 4825->4824 4825->4830 4831 40596a wsprintfA 4826->4831 4829 4025ae SetFilePointer 4827->4829 4827->4830 4829->4830 4831->4830 4832 401c8a 4833 4029d9 18 API calls 4832->4833 4834 401c91 4833->4834 4835 4029d9 18 API calls 4834->4835 4836 401c99 GetDlgItem 4835->4836 4837 4024b8 4836->4837 4838 403513 4839 40351e 4838->4839 4840 403522 4839->4840 4841 403525 GlobalAlloc 4839->4841 4841->4840 4842 402615 4843 402618 4842->4843 4846 402630 4842->4846 4844 402625 FindNextFileA 4843->4844 4845 40266f 4844->4845 4844->4846 4848 405a0c lstrcpynA 4845->4848 4848->4846 4849 401e95 4850 4029f6 18 API calls 4849->4850 4851 401e9c 4850->4851 4852 405d07 2 API calls 4851->4852 4853 401ea2 4852->4853 4855 401eb4 4853->4855 4856 40596a wsprintfA 4853->4856 4856->4855 4857 401595 4858 4029f6 18 API calls 4857->4858 4859 40159c SetFileAttributesA 4858->4859 4860 4015ae 4859->4860 4861 401d95 4862 4029d9 18 API calls 4861->4862 4863 401d9b 4862->4863 4864 4029d9 18 API calls 4863->4864 4865 401da4 4864->4865 4866 401db6 EnableWindow 4865->4866 4867 401dab ShowWindow 4865->4867 4868 40288b 4866->4868 4867->4868 4869 100010d6 4870 10001104 4869->4870 4871 10001561 3 API calls 4870->4871 4873 10001114 4871->4873 4872 100011ba GlobalFree 4873->4872 4874 100015e5 2 API calls 4873->4874 4875 100011b9 4873->4875 4876 10001561 3 API calls 4873->4876 4877 1000159e 2 API calls 4873->4877 4878 1000114b GlobalAlloc 4873->4878 4879 100011e0 GlobalFree 4873->4879 4880 100011a7 GlobalFree 4873->4880 4881 1000160e lstrcpyA 4873->4881 4874->4873 4875->4872 4876->4873 4877->4880 4878->4873 4879->4873 4880->4873 4881->4873 4882 401696 4883 4029f6 18 API calls 4882->4883 4884 40169c GetFullPathNameA 4883->4884 4885 4016d4 4884->4885 4886 4016b3 4884->4886 4887 4016e8 GetShortPathNameA 4885->4887 4888 40288b 4885->4888 4886->4885 4889 405d07 2 API calls 4886->4889 4887->4888 4890 4016c4 4889->4890 4890->4885 4892 405a0c lstrcpynA 4890->4892 4892->4885 4893 401e1b 4894 4029f6 18 API calls 4893->4894 4895 401e21 4894->4895 4896 404daa 25 API calls 4895->4896 4897 401e2b 4896->4897 4898 40526c 2 API calls 4897->4898 4901 401e31 4898->4901 4899 401e87 CloseHandle 4903 40265c 4899->4903 4900 401e50 WaitForSingleObject 4900->4901 4902 401e5e GetExitCodeProcess 4900->4902 4901->4899 4901->4900 4901->4903 4904 405d67 2 API calls 4901->4904 4905 401e70 4902->4905 4907 401e79 4902->4907 4904->4900 4908 40596a wsprintfA 4905->4908 4907->4899 4908->4907 4909 401d1b GetDC GetDeviceCaps 4910 4029d9 18 API calls 4909->4910 4911 401d37 MulDiv 4910->4911 4912 4029d9 18 API calls 4911->4912 4913 401d4c 4912->4913 4914 405a2e 18 API calls 4913->4914 4915 401d85 CreateFontIndirectA 4914->4915 4916 4024b8 4915->4916 4917 40249c 4918 4029f6 18 API calls 4917->4918 4919 4024a3 4918->4919 4922 4056e3 GetFileAttributesA CreateFileA 4919->4922 4921 4024af 4922->4921 4923 10001adf 4924 10001561 3 API calls 4923->4924 4925 10001b05 4924->4925 4926 10001561 3 API calls 4925->4926 4927 10001b0d 4926->4927 4928 10001561 3 API calls 4927->4928 4930 10001b4a __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 4927->4930 4929 10001b2f 4928->4929 4931 10001b38 GlobalFree 4929->4931 4932 1000159e 2 API calls 4930->4932 4931->4930 4933 10001cc1 GlobalFree GlobalFree 4932->4933 4934 402020 4935 4029f6 18 API calls 4934->4935 4936 402027 4935->4936 4937 4029f6 18 API calls 4936->4937 4938 402031 4937->4938 4939 4029f6 18 API calls 4938->4939 4940 40203a 4939->4940 4941 4029f6 18 API calls 4940->4941 4942 402044 4941->4942 4943 4029f6 18 API calls 4942->4943 4945 40204e 4943->4945 4944 402062 CoCreateInstance 4947 402137 4944->4947 4950 402081 4944->4950 4945->4944 4946 4029f6 18 API calls 4945->4946 4946->4944 4948 401423 25 API calls 4947->4948 4949 402169 4947->4949 4948->4949 4950->4947 4951 402116 MultiByteToWideChar 4950->4951 4951->4947 3776 401721 3777 4029f6 18 API calls 3776->3777 3778 401728 3777->3778 3782 405712 3778->3782 3780 40172f 3781 405712 2 API calls 3780->3781 3781->3780 3783 40571d GetTickCount GetTempFileNameA 3782->3783 3784 405749 3783->3784 3785 40574d 3783->3785 3784->3783 3784->3785 3785->3780 4952 401922 4953 4029f6 18 API calls 4952->4953 4954 401929 lstrlenA 4953->4954 4955 4024b8 4954->4955 4956 402223 4957 40222b 4956->4957 4959 402231 4956->4959 4958 4029f6 18 API calls 4957->4958 4958->4959 4960 4029f6 18 API calls 4959->4960 4962 402241 4959->4962 4960->4962 4961 40224f 4963 4029f6 18 API calls 4961->4963 4962->4961 4964 4029f6 18 API calls 4962->4964 4965 402258 WritePrivateProfileStringA 4963->4965 4964->4961 4966 401ca5 4967 4029d9 18 API calls 4966->4967 4968 401cb5 SetWindowLongA 4967->4968 4969 40288b 4968->4969 4970 401a26 4971 4029d9 18 API calls 4970->4971 4972 401a2c 4971->4972 4973 4029d9 18 API calls 4972->4973 4974 4019d6 4973->4974 4975 402427 4985 402b00 4975->4985 4977 402431 4978 4029d9 18 API calls 4977->4978 4979 40243a 4978->4979 4980 402451 RegEnumKeyA 4979->4980 4981 40245d RegEnumValueA 4979->4981 4982 40265c 4979->4982 4983 402476 RegCloseKey 4980->4983 4981->4982 4981->4983 4983->4982 4986 4029f6 18 API calls 4985->4986 4987 402b19 4986->4987 4988 402b27 RegOpenKeyExA 4987->4988 4988->4977 4989 4022a7 4990 4022d7 4989->4990 4991 4022ac 4989->4991 4992 4029f6 18 API calls 4990->4992 4993 402b00 19 API calls 4991->4993 4994 4022de 4992->4994 4995 4022b3 4993->4995 5000 402a36 RegOpenKeyExA 4994->5000 4996 4029f6 18 API calls 4995->4996 4998 4022f4 4995->4998 4999 4022c4 RegDeleteValueA RegCloseKey 4996->4999 4999->4998 5007 402a61 5000->5007 5009 402aad 5000->5009 5001 402a87 RegEnumKeyA 5002 402a99 RegCloseKey 5001->5002 5001->5007 5004 405d2e 3 API calls 5002->5004 5003 402abe RegCloseKey 5003->5009 5005 402aa9 5004->5005 5008 402ad9 RegDeleteKeyA 5005->5008 5005->5009 5006 402a36 3 API calls 5006->5007 5007->5001 5007->5002 5007->5003 5007->5006 5008->5009 5009->4998 5010 100013e7 5011 100013ff 5010->5011 5012 1000187c 2 API calls 5011->5012 5013 1000141a 5012->5013 5014 100018ec 5015 1000191b 5014->5015 5016 10001d3b 20 API calls 5015->5016 5017 10001922 5016->5017 5018 10001935 5017->5018 5019 10001929 5017->5019 5020 1000195c 5018->5020 5021 1000193f 5018->5021 5022 1000159e 2 API calls 5019->5022 5024 10001962 5020->5024 5025 10001986 5020->5025 5023 10001825 3 API calls 5021->5023 5026 10001933 5022->5026 5028 10001944 5023->5028 5029 100018a1 3 API calls 5024->5029 5027 10001825 3 API calls 5025->5027 5027->5026 5030 100018a1 3 API calls 5028->5030 5031 10001967 5029->5031 5032 1000194a 5030->5032 5033 1000159e 2 API calls 5031->5033 5034 1000159e 2 API calls 5032->5034 5035 1000196d GlobalFree 5033->5035 5036 10001950 GlobalFree 5034->5036 5035->5026 5037 10001981 GlobalFree 5035->5037 5036->5026 5037->5026 5038 401bad 5039 4029d9 18 API calls 5038->5039 5040 401bb4 5039->5040 5041 4029d9 18 API calls 5040->5041 5042 401bbe 5041->5042 5043 401bce 5042->5043 5044 4029f6 18 API calls 5042->5044 5045 401bde 5043->5045 5048 4029f6 18 API calls 5043->5048 5044->5043 5046 401be9 5045->5046 5047 401c2d 5045->5047 5049 4029d9 18 API calls 5046->5049 5050 4029f6 18 API calls 5047->5050 5048->5045 5051 401bee 5049->5051 5052 401c32 5050->5052 5053 4029d9 18 API calls 5051->5053 5054 4029f6 18 API calls 5052->5054 5055 401bf7 5053->5055 5056 401c3b FindWindowExA 5054->5056 5057 401c1d SendMessageA 5055->5057 5058 401bff SendMessageTimeoutA 5055->5058 5059 401c59 5056->5059 5057->5059 5058->5059 5060 4023af 5061 402b00 19 API calls 5060->5061 5062 4023b9 5061->5062 5063 4029f6 18 API calls 5062->5063 5064 4023c2 5063->5064 5065 4023cc RegQueryValueExA 5064->5065 5069 40265c 5064->5069 5066 4023f2 RegCloseKey 5065->5066 5067 4023ec 5065->5067 5066->5069 5067->5066 5071 40596a wsprintfA 5067->5071 5071->5066 5072 404531 5073 404541 5072->5073 5074 40455d 5072->5074 5083 4052b1 GetDlgItemTextA 5073->5083 5076 404590 5074->5076 5077 404563 SHGetPathFromIDListA 5074->5077 5079 40457a SendMessageA 5077->5079 5080 404573 5077->5080 5078 40454e SendMessageA 5078->5074 5079->5076 5081 40140b 2 API calls 5080->5081 5081->5079 5083->5078 3786 4015b3 3787 4029f6 18 API calls 3786->3787 3788 4015ba 3787->3788 3804 405593 CharNextA CharNextA 3788->3804 3790 40160a 3791 40162d 3790->3791 3792 40160f 3790->3792 3797 401423 25 API calls 3791->3797 3794 401423 25 API calls 3792->3794 3793 40552a CharNextA 3795 4015d0 CreateDirectoryA 3793->3795 3796 401616 3794->3796 3798 4015e5 GetLastError 3795->3798 3801 4015c2 3795->3801 3810 405a0c lstrcpynA 3796->3810 3803 402169 3797->3803 3800 4015f2 GetFileAttributesA 3798->3800 3798->3801 3800->3801 3801->3790 3801->3793 3802 401621 SetCurrentDirectoryA 3802->3803 3805 4055ad 3804->3805 3809 4055b9 3804->3809 3806 4055b4 CharNextA 3805->3806 3805->3809 3807 4055d6 3806->3807 3807->3801 3808 40552a CharNextA 3808->3809 3809->3807 3809->3808 3810->3802 3811 401734 3812 4029f6 18 API calls 3811->3812 3813 40173b 3812->3813 3814 401761 3813->3814 3815 401759 3813->3815 3873 405a0c lstrcpynA 3814->3873 3872 405a0c lstrcpynA 3815->3872 3818 40176c 3874 4054ff lstrlenA CharPrevA 3818->3874 3819 40175f 3822 405c6e 5 API calls 3819->3822 3826 40177e 3822->3826 3824 4017bf 3880 4056c4 GetFileAttributesA 3824->3880 3826->3824 3828 401795 CompareFileTime 3826->3828 3829 401859 3826->3829 3834 405a0c lstrcpynA 3826->3834 3837 405a2e 18 API calls 3826->3837 3848 401830 3826->3848 3850 4056e3 GetFileAttributesA CreateFileA 3826->3850 3877 405d07 FindFirstFileA 3826->3877 3883 4052cd 3826->3883 3828->3826 3830 404daa 25 API calls 3829->3830 3832 401863 3830->3832 3831 404daa 25 API calls 3849 401845 3831->3849 3851 402e5b 3832->3851 3834->3826 3836 40188a SetFileTime 3838 40189c FindCloseChangeNotification 3836->3838 3837->3826 3839 4018ad 3838->3839 3838->3849 3840 4018b2 3839->3840 3841 4018c5 3839->3841 3842 405a2e 18 API calls 3840->3842 3843 405a2e 18 API calls 3841->3843 3844 4018ba lstrcatA 3842->3844 3845 4018cd 3843->3845 3844->3845 3847 4052cd MessageBoxIndirectA 3845->3847 3847->3849 3848->3831 3848->3849 3850->3826 3852 402e71 3851->3852 3853 402e9f 3852->3853 3889 4030af SetFilePointer 3852->3889 3887 40307d ReadFile 3853->3887 3857 403011 3859 403015 3857->3859 3860 40302d 3857->3860 3858 402ebc GetTickCount 3861 402f0b 3858->3861 3866 401876 3858->3866 3863 40307d ReadFile 3859->3863 3864 40307d ReadFile 3860->3864 3865 403048 WriteFile 3860->3865 3860->3866 3862 40307d ReadFile 3861->3862 3861->3866 3868 402f61 GetTickCount 3861->3868 3869 402f86 MulDiv wsprintfA 3861->3869 3871 402fc4 WriteFile 3861->3871 3862->3861 3863->3866 3864->3860 3865->3866 3867 40305d 3865->3867 3866->3836 3866->3838 3867->3860 3867->3866 3868->3861 3870 404daa 25 API calls 3869->3870 3870->3861 3871->3861 3871->3866 3872->3819 3873->3818 3875 401772 lstrcatA 3874->3875 3876 405519 lstrcatA 3874->3876 3875->3819 3876->3875 3878 405d1d FindClose 3877->3878 3879 405d28 3877->3879 3878->3879 3879->3826 3881 4056e0 3880->3881 3882 4056d3 SetFileAttributesA 3880->3882 3881->3826 3882->3881 3884 4052e2 3883->3884 3885 40532e 3884->3885 3886 4052f6 MessageBoxIndirectA 3884->3886 3885->3826 3886->3885 3888 402eaa 3887->3888 3888->3857 3888->3858 3888->3866 3889->3853 5084 401634 5085 4029f6 18 API calls 5084->5085 5086 40163a 5085->5086 5087 405d07 2 API calls 5086->5087 5088 401640 5087->5088 5089 401934 5090 4029d9 18 API calls 5089->5090 5091 40193b 5090->5091 5092 4029d9 18 API calls 5091->5092 5093 401945 5092->5093 5094 4029f6 18 API calls 5093->5094 5095 40194e 5094->5095 5096 401961 lstrlenA 5095->5096 5097 40199c 5095->5097 5098 40196b 5096->5098 5098->5097 5102 405a0c lstrcpynA 5098->5102 5100 401985 5100->5097 5101 401992 lstrlenA 5100->5101 5101->5097 5102->5100 5103 4041b5 5104 4041c5 5103->5104 5105 4041eb 5103->5105 5106 403dbe 19 API calls 5104->5106 5107 403e25 8 API calls 5105->5107 5108 4041d2 SetDlgItemTextA 5106->5108 5109 4041f7 5107->5109 5108->5105 5110 4019b5 5111 4029f6 18 API calls 5110->5111 5112 4019bc 5111->5112 5113 4029f6 18 API calls 5112->5113 5114 4019c5 5113->5114 5115 4019cc lstrcmpiA 5114->5115 5116 4019de lstrcmpA 5114->5116 5117 4019d2 5115->5117 5116->5117 5118 4014b7 5119 4014bd 5118->5119 5120 401389 2 API calls 5119->5120 5121 4014c5 5120->5121 5122 402b3b 5123 402b63 5122->5123 5124 402b4a SetTimer 5122->5124 5125 402bb8 5123->5125 5126 402b7d MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 5123->5126 5124->5123 5126->5125 5127 40263e 5128 4029f6 18 API calls 5127->5128 5129 402645 FindFirstFileA 5128->5129 5130 402668 5129->5130 5134 402658 5129->5134 5132 40266f 5130->5132 5135 40596a wsprintfA 5130->5135 5136 405a0c lstrcpynA 5132->5136 5135->5132 5136->5134 5137 4024be 5138 4024c3 5137->5138 5139 4024d4 5137->5139 5140 4029d9 18 API calls 5138->5140 5141 4029f6 18 API calls 5139->5141 5143 4024ca 5140->5143 5142 4024db lstrlenA 5141->5142 5142->5143 5144 4024fa WriteFile 5143->5144 5145 40265c 5143->5145 5144->5145

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 4030fa-40318f #17 SetErrorMode OleInitialize call 405d2e SHGetFileInfoA call 405a0c GetCommandLineA call 405a0c GetModuleHandleA 7 403191-403196 0->7 8 40319b-4031b0 call 40552a CharNextA 0->8 7->8 11 403215-403219 8->11 12 4031b2-4031b5 11->12 13 40321b 11->13 14 4031b7-4031bb 12->14 15 4031bd-4031c5 12->15 16 40322e-403246 GetTempPathA call 4030c6 13->16 14->14 14->15 17 4031c7-4031c8 15->17 18 4031cd-4031d0 15->18 25 403268-40327f DeleteFileA call 402c22 16->25 26 403248-403266 GetWindowsDirectoryA lstrcatA call 4030c6 16->26 17->18 21 4031d2-4031d6 18->21 22 403205-403212 call 40552a 18->22 23 4031e6-4031ec 21->23 24 4031d8-4031e1 21->24 22->11 38 403214 22->38 30 4031fc-403203 23->30 31 4031ee-4031f7 23->31 24->23 28 4031e3 24->28 39 4032e6-4032f5 call 40347b OleUninitialize 25->39 40 403281-403287 25->40 26->25 26->39 28->23 30->22 36 40321d-403229 call 405a0c 30->36 31->30 35 4031f9 31->35 35->30 36->16 38->11 50 4033e0-4033e6 39->50 51 4032fb-40330b call 4052cd ExitProcess 39->51 42 4032d6-4032dd call 403555 40->42 43 403289-403292 call 40552a 40->43 48 4032e2 42->48 54 40329d-40329f 43->54 48->39 52 403463-40346b 50->52 53 4033e8-403405 call 405d2e * 3 50->53 57 403471-403475 ExitProcess 52->57 58 40346d 52->58 82 403407-403409 53->82 83 40344f-40345a ExitWindowsEx 53->83 59 4032a1-4032ab 54->59 60 403294-40329a 54->60 58->57 64 403311-40332b lstrcatA lstrcmpiA 59->64 65 4032ad-4032ba call 4055e0 59->65 60->59 63 40329c 60->63 63->54 64->39 67 40332d-403342 CreateDirectoryA SetCurrentDirectoryA 64->67 65->39 73 4032bc-4032d2 call 405a0c * 2 65->73 70 403344-40334a call 405a0c 67->70 71 40334f-403369 call 405a0c 67->71 70->71 81 40336e-40338a call 405a2e DeleteFileA 71->81 73->42 92 4033cb-4033d2 81->92 93 40338c-40339c CopyFileA 81->93 82->83 84 40340b-40340d 82->84 83->52 87 40345c-40345e call 40140b 83->87 84->83 88 40340f-403421 GetCurrentProcess 84->88 87->52 88->83 97 403423-403445 88->97 92->81 95 4033d4-4033db call 40575a 92->95 93->92 96 40339e-4033be call 40575a call 405a2e call 40526c 93->96 95->39 96->92 107 4033c0-4033c7 CloseHandle 96->107 97->83 107->92
                                                  APIs
                                                  • #17.COMCTL32 ref: 00403119
                                                  • SetErrorMode.KERNELBASE(00008001), ref: 00403124
                                                  • OleInitialize.OLE32(00000000), ref: 0040312B
                                                    • Part of subcall function 00405D2E: GetModuleHandleA.KERNEL32(?,?,00000000,0040313D,00000008), ref: 00405D40
                                                    • Part of subcall function 00405D2E: LoadLibraryA.KERNELBASE(?,?,00000000,0040313D,00000008), ref: 00405D4B
                                                    • Part of subcall function 00405D2E: GetProcAddress.KERNEL32(00000000,?), ref: 00405D5C
                                                  • SHGetFileInfoA.SHELL32(00428F98,00000000,?,00000160,00000000,00000008), ref: 00403153
                                                    • Part of subcall function 00405A0C: lstrcpynA.KERNEL32(?,?,00000400,00403168,Instalao do MegaJogos ,NSIS Error), ref: 00405A19
                                                  • GetCommandLineA.KERNEL32(Instalao do MegaJogos ,NSIS Error), ref: 00403168
                                                  • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe",00000000), ref: 0040317B
                                                  • CharNextA.USER32(00000000,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe",00000020), ref: 004031A6
                                                  • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 00403239
                                                  • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040324E
                                                  • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040325A
                                                  • DeleteFileA.KERNELBASE(1046), ref: 0040326D
                                                  • OleUninitialize.OLE32(00000000), ref: 004032EB
                                                  • ExitProcess.KERNEL32 ref: 0040330B
                                                  • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe",00000000,00000000), ref: 00403317
                                                  • lstrcmpiA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop), ref: 00403323
                                                  • CreateDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040332F
                                                  • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 00403336
                                                  • DeleteFileA.KERNEL32(00428B98,00428B98,?,0042F000,?), ref: 00403380
                                                  • CopyFileA.KERNEL32(C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe,00428B98,00000001), ref: 00403394
                                                  • CloseHandle.KERNEL32(00000000,00428B98,00428B98,?,00428B98,00000000), ref: 004033C1
                                                  • GetCurrentProcess.KERNEL32(00000028,?,00000005,00000004,00000003), ref: 00403416
                                                  • ExitWindowsEx.USER32(00000002,00000000), ref: 00403452
                                                  • ExitProcess.KERNEL32 ref: 00403475
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: File$DirectoryExitHandleProcess$CurrentDeleteModuleWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                                  • String ID: /D=$ _?=$"$"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe"$1046$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe$C:\Users\user\MegaJogos$Error launching installer$Instalao do MegaJogos $NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp
                                                  • API String ID: 2278157092-3295072936
                                                  • Opcode ID: 887d7e41ec913eb4d3a43acf5bc763ee08892f48294b24a27a74905eda1b21f9
                                                  • Instruction ID: 1e9e478c3a9e7f3573a82b9cae4fcf3dc9ecc54075f91e84b1854e8c20532e3f
                                                  • Opcode Fuzzy Hash: 887d7e41ec913eb4d3a43acf5bc763ee08892f48294b24a27a74905eda1b21f9
                                                  • Instruction Fuzzy Hash: 4191D130A08344AFE7216F61AD4AB6B7E9CEB0530AF04057FF541B61D2C77C99058B6E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 568 405331-40534c call 4055e0 571 405365-40536f 568->571 572 40534e-405360 DeleteFileA 568->572 574 405371-405373 571->574 575 405383-405391 call 405a0c 571->575 573 4054f9-4054fc 572->573 576 4054a4-4054aa 574->576 577 405379-40537d 574->577 583 4053a0-4053a1 call 405546 575->583 584 405393-40539e lstrcatA 575->584 576->573 579 4054ac-4054af 576->579 577->575 577->576 581 4054b1-4054b7 579->581 582 4054b9-4054c1 call 405d07 579->582 581->573 582->573 592 4054c3-4054d8 call 4054ff call 4056c4 RemoveDirectoryA 582->592 587 4053a6-4053a9 583->587 584->587 588 4053b4-4053ba lstrcatA 587->588 589 4053ab-4053b2 587->589 591 4053bf-4053dd lstrlenA FindFirstFileA 588->591 589->588 589->591 593 4053e3-4053fa call 40552a 591->593 594 40549a-40549e 591->594 604 4054f1-4054f4 call 404daa 592->604 605 4054da-4054de 592->605 601 405405-405408 593->601 602 4053fc-405400 593->602 594->576 596 4054a0 594->596 596->576 607 40540a-40540f 601->607 608 40541b-405429 call 405a0c 601->608 602->601 606 405402 602->606 604->573 605->581 609 4054e0-4054ef call 404daa call 40575a 605->609 606->601 611 405411-405413 607->611 612 405479-40548b FindNextFileA 607->612 618 405440-40544f call 4056c4 DeleteFileA 608->618 619 40542b-405433 608->619 609->573 611->608 617 405415-405419 611->617 612->593 616 405491-405494 FindClose 612->616 616->594 617->608 617->612 628 405471-405474 call 404daa 618->628 629 405451-405455 618->629 619->612 621 405435-40543e call 405331 619->621 621->612 628->612 631 405457-405467 call 404daa call 40575a 629->631 632 405469-40546f 629->632 631->612 632->612
                                                  APIs
                                                  • DeleteFileA.KERNELBASE(?,?,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe",00000000), ref: 0040534F
                                                  • lstrcatA.KERNEL32(0042AFE8,\*.*,0042AFE8,?,00000000,?,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe",00000000), ref: 00405399
                                                  • lstrcatA.KERNEL32(?,00409010,?,0042AFE8,?,00000000,?,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe",00000000), ref: 004053BA
                                                  • lstrlenA.KERNEL32(?,?,00409010,?,0042AFE8,?,00000000,?,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe",00000000), ref: 004053C0
                                                  • FindFirstFileA.KERNEL32(0042AFE8,?,?,?,00409010,?,0042AFE8,?,00000000,?,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe",00000000), ref: 004053D1
                                                  • FindNextFileA.KERNEL32(?,00000010,000000F2,?), ref: 00405483
                                                  • FindClose.KERNEL32(?), ref: 00405494
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405331
                                                  • "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe", xrefs: 0040533B
                                                  • \*.*, xrefs: 00405393
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                  • String ID: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                                  • API String ID: 2035342205-2246660588
                                                  • Opcode ID: eeee1fe6d78b479acfa35fd6cd9b42f31f1d942e4a3e46f321804d068e117fb2
                                                  • Instruction ID: 46a167c19d0f92bb62e791f7a1b0a3e0954e7dde2177130d433e16ae92940f3d
                                                  • Opcode Fuzzy Hash: eeee1fe6d78b479acfa35fd6cd9b42f31f1d942e4a3e46f321804d068e117fb2
                                                  • Instruction Fuzzy Hash: 84510130904A5476DB21AB218C85BFF3A68DF4231AF14813BF941752D2C77C49C2DE5E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 637 405a2e-405a39 638 405a3b-405a4a 637->638 639 405a4c-405a69 637->639 638->639 640 405c4b-405c4f 639->640 641 405a6f-405a76 639->641 642 405c55-405c5f 640->642 643 405a7b-405a85 640->643 641->640 645 405c61-405c65 call 405a0c 642->645 646 405c6a-405c6b 642->646 643->642 644 405a8b-405a92 643->644 647 405a98-405acd 644->647 648 405c3e 644->648 645->646 650 405ad3-405ade GetVersion 647->650 651 405be8-405beb 647->651 652 405c40-405c46 648->652 653 405c48-405c4a 648->653 654 405ae0-405ae4 650->654 655 405af8 650->655 656 405c1b-405c1e 651->656 657 405bed-405bf0 651->657 652->640 653->640 654->655 660 405ae6-405aea 654->660 663 405aff-405b06 655->663 658 405c20-405c27 call 405a2e 656->658 659 405c2c-405c3c lstrlenA 656->659 661 405c00-405c0c call 405a0c 657->661 662 405bf2-405bfe call 40596a 657->662 658->659 659->640 660->655 665 405aec-405af0 660->665 674 405c11-405c17 661->674 662->674 667 405b08-405b0a 663->667 668 405b0b-405b0d 663->668 665->655 670 405af2-405af6 665->670 667->668 672 405b46-405b49 668->672 673 405b0f-405b2a call 4058f3 668->673 670->663 675 405b59-405b5c 672->675 676 405b4b-405b57 GetSystemDirectoryA 672->676 679 405b2f-405b32 673->679 674->659 678 405c19 674->678 682 405bc6-405bc8 675->682 683 405b5e-405b6c GetWindowsDirectoryA 675->683 681 405bca-405bcd 676->681 680 405be0-405be6 call 405c6e 678->680 684 405b38-405b41 call 405a2e 679->684 685 405bcf-405bd3 679->685 680->659 681->680 681->685 682->681 686 405b6e-405b78 682->686 683->682 684->681 685->680 689 405bd5-405bdb lstrcatA 685->689 691 405b92-405ba8 SHGetSpecialFolderLocation 686->691 692 405b7a-405b7d 686->692 689->680 695 405bc3 691->695 696 405baa-405bc1 SHGetPathFromIDListA CoTaskMemFree 691->696 692->691 694 405b7f-405b90 692->694 694->681 694->691 695->682 696->681 696->695
                                                  APIs
                                                  • GetVersion.KERNEL32(00000000,004297B8,00000000,00404DE2,004297B8,00000000), ref: 00405AD6
                                                  • GetSystemDirectoryA.KERNEL32(Por favor reveja o acordo da licena antes de instalar o MegaJogos . Se voc aceita todos os termos do acordo, clique em Eu Concordo.,00000400), ref: 00405B51
                                                  • GetWindowsDirectoryA.KERNEL32(Por favor reveja o acordo da licena antes de instalar o MegaJogos . Se voc aceita todos os termos do acordo, clique em Eu Concordo.,00000400), ref: 00405B64
                                                  • SHGetSpecialFolderLocation.SHELL32(?,0041B788), ref: 00405BA0
                                                  • SHGetPathFromIDListA.SHELL32(0041B788,Por favor reveja o acordo da licena antes de instalar o MegaJogos . Se voc aceita todos os termos do acordo, clique em Eu Concordo.), ref: 00405BAE
                                                  • CoTaskMemFree.OLE32(0041B788), ref: 00405BB9
                                                  • lstrcatA.KERNEL32(Por favor reveja o acordo da licena antes de instalar o MegaJogos . Se voc aceita todos os termos do acordo, clique em Eu Concordo.,\Microsoft\Internet Explorer\Quick Launch), ref: 00405BDB
                                                  • lstrlenA.KERNEL32(Por favor reveja o acordo da licena antes de instalar o MegaJogos . Se voc aceita todos os termos do acordo, clique em Eu Concordo.,00000000,004297B8,00000000,00404DE2,004297B8,00000000), ref: 00405C2D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                  • String ID: Por favor reveja o acordo da licena antes de instalar o MegaJogos . Se voc aceita todos os termos do acordo, clique em Eu Concordo.$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                  • API String ID: 900638850-1010822850
                                                  • Opcode ID: 2186f0a572909ee7fe9cb4e0d6eb1b9fbf4b40f7d794580e00560e96569ee878
                                                  • Instruction ID: e3937826694aa96a66c9679703be47664347117baa65301e61951ea2719d1281
                                                  • Opcode Fuzzy Hash: 2186f0a572909ee7fe9cb4e0d6eb1b9fbf4b40f7d794580e00560e96569ee878
                                                  • Instruction Fuzzy Hash: DB51F331A04B05AAEF219B689C84BBF3BB4DB15314F54423BE912B62D0D27C6D42DF4E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(?,?,00000000,0040313D,00000008), ref: 00405D40
                                                  • LoadLibraryA.KERNELBASE(?,?,00000000,0040313D,00000008), ref: 00405D4B
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00405D5C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: AddressHandleLibraryLoadModuleProc
                                                  • String ID:
                                                  • API String ID: 310444273-0
                                                  • Opcode ID: 7acfb344228b968400b962badda7c36266698eee5c55508006b44164a923ef80
                                                  • Instruction ID: 58781945b1ebe0d6425232f008294b0fb1b641fb0524d4e5e5734917004db801
                                                  • Opcode Fuzzy Hash: 7acfb344228b968400b962badda7c36266698eee5c55508006b44164a923ef80
                                                  • Instruction Fuzzy Hash: 8CE08C36A04510BBD3215B30AE08A6B73ACEEC9B41304897EF615F6251D734AC11DBBA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FindFirstFileA.KERNELBASE(?,0042C030,0042B3E8,00405623,0042B3E8,0042B3E8,00000000,0042B3E8,0042B3E8,?,?,00000000,00405345,?,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe",00000000), ref: 00405D12
                                                  • FindClose.KERNEL32(00000000), ref: 00405D1E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFileFirst
                                                  • String ID:
                                                  • API String ID: 2295610775-0
                                                  • Opcode ID: 0ba34ad688579e7913e3aeb04dcfdbb9c24dd4cd636fec125d72bd6057fbbed4
                                                  • Instruction ID: 6bc8dc8487d68019062fb65c0caa7a5850599756ae9c65598668cc32d68c0862
                                                  • Opcode Fuzzy Hash: 0ba34ad688579e7913e3aeb04dcfdbb9c24dd4cd636fec125d72bd6057fbbed4
                                                  • Instruction Fuzzy Hash: C5D0123195D5309BD31017797C0C85B7A58DF293317108A33F025F22E0D3749C519AED
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 108 4038eb-4038fd 109 403903-403909 108->109 110 403a3e-403a4d 108->110 109->110 111 40390f-403918 109->111 112 403a9c-403ab1 110->112 113 403a4f-403a97 GetDlgItem * 2 call 403dbe SetClassLongA call 40140b 110->113 117 40391a-403927 SetWindowPos 111->117 118 40392d-403930 111->118 115 403af1-403af6 call 403e0a 112->115 116 403ab3-403ab6 112->116 113->112 130 403afb-403b16 115->130 122 403ab8-403ac3 call 401389 116->122 123 403ae9-403aeb 116->123 117->118 119 403932-403944 ShowWindow 118->119 120 40394a-403950 118->120 119->120 125 403952-403967 DestroyWindow 120->125 126 40396c-40396f 120->126 122->123 143 403ac5-403ae4 SendMessageA 122->143 123->115 129 403d8b 123->129 132 403d68-403d6e 125->132 134 403971-40397d SetWindowLongA 126->134 135 403982-403988 126->135 131 403d8d-403d94 129->131 137 403b18-403b1a call 40140b 130->137 138 403b1f-403b25 130->138 132->129 144 403d70-403d76 132->144 134->131 141 403a2b-403a39 call 403e25 135->141 142 40398e-40399f GetDlgItem 135->142 137->138 139 403d49-403d62 DestroyWindow EndDialog 138->139 140 403b2b-403b36 138->140 139->132 140->139 146 403b3c-403b89 call 405a2e call 403dbe * 3 GetDlgItem 140->146 141->131 147 4039a1-4039b8 SendMessageA IsWindowEnabled 142->147 148 4039be-4039c1 142->148 143->131 144->129 150 403d78-403d81 ShowWindow 144->150 178 403b93-403bcf ShowWindow KiUserCallbackDispatcher call 403de0 EnableWindow 146->178 179 403b8b-403b90 146->179 147->129 147->148 152 4039c3-4039c4 148->152 153 4039c6-4039c9 148->153 150->129 156 4039f4-4039f9 call 403d97 152->156 157 4039d7-4039dc 153->157 158 4039cb-4039d1 153->158 156->141 161 403a12-403a25 SendMessageA 157->161 163 4039de-4039e4 157->163 158->161 162 4039d3-4039d5 158->162 161->141 162->156 166 4039e6-4039ec call 40140b 163->166 167 4039fb-403a04 call 40140b 163->167 174 4039f2 166->174 167->141 176 403a06-403a10 167->176 174->156 176->174 182 403bd1-403bd2 178->182 183 403bd4 178->183 179->178 184 403bd6-403c04 GetSystemMenu EnableMenuItem SendMessageA 182->184 183->184 185 403c06-403c17 SendMessageA 184->185 186 403c19 184->186 187 403c1f-403c58 call 403df3 call 405a0c lstrlenA call 405a2e SetWindowTextA call 401389 185->187 186->187 187->130 196 403c5e-403c60 187->196 196->130 197 403c66-403c6a 196->197 198 403c89-403c9d DestroyWindow 197->198 199 403c6c-403c72 197->199 198->132 201 403ca3-403cd0 CreateDialogParamA 198->201 199->129 200 403c78-403c7e 199->200 200->130 202 403c84 200->202 201->132 203 403cd6-403d2d call 403dbe GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 201->203 202->129 203->129 208 403d2f-403d42 ShowWindow call 403e0a 203->208 210 403d47 208->210 210->132
                                                  APIs
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403927
                                                  • ShowWindow.USER32(?), ref: 00403944
                                                  • DestroyWindow.USER32 ref: 00403958
                                                  • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403974
                                                  • GetDlgItem.USER32(?,?), ref: 00403995
                                                  • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 004039A9
                                                  • IsWindowEnabled.USER32(00000000), ref: 004039B0
                                                  • GetDlgItem.USER32(?,00000001), ref: 00403A5E
                                                  • GetDlgItem.USER32(?,00000002), ref: 00403A68
                                                  • SetClassLongA.USER32(?,000000F2,?), ref: 00403A82
                                                  • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403AD3
                                                  • GetDlgItem.USER32(?,00000003), ref: 00403B79
                                                  • ShowWindow.USER32(00000000,?), ref: 00403B9A
                                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403BAC
                                                  • EnableWindow.USER32(?,?), ref: 00403BC7
                                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403BDD
                                                  • EnableMenuItem.USER32(00000000), ref: 00403BE4
                                                  • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403BFC
                                                  • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403C0F
                                                  • lstrlenA.KERNEL32(00429FE0,?,00429FE0,Instalao do MegaJogos ), ref: 00403C38
                                                  • SetWindowTextA.USER32(?,00429FE0), ref: 00403C47
                                                  • ShowWindow.USER32(?,0000000A), ref: 00403D7B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                  • String ID: Instalao do MegaJogos
                                                  • API String ID: 3282139019-732584578
                                                  • Opcode ID: b74f75b602d2e00be57d5aeeab29875f08be8d9e3197c87b2c2a2e3f47af270f
                                                  • Instruction ID: 552f9e5d3371f53337095c5be2d86efa37a563823f2766eb5c4291c6ef6876bd
                                                  • Opcode Fuzzy Hash: b74f75b602d2e00be57d5aeeab29875f08be8d9e3197c87b2c2a2e3f47af270f
                                                  • Instruction Fuzzy Hash: B8C1B171604204AFD721AF62ED85E2B7F6CEB44706F40053EF941B51E1C779A942DB2E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 211 403555-40356d call 405d2e 214 403581-4035a8 call 4058f3 211->214 215 40356f-40357f call 40596a 211->215 219 4035c0-4035c6 lstrcatA 214->219 220 4035aa-4035bb call 4058f3 214->220 223 4035cb-4035f4 call 40381e call 4055e0 215->223 219->223 220->219 229 4035fa-4035ff 223->229 230 40367b-403683 call 4055e0 223->230 229->230 231 403601-403625 call 4058f3 229->231 236 403691-4036b6 LoadImageA 230->236 237 403685-40368c call 405a2e 230->237 231->230 240 403627-403629 231->240 238 403745-40374d call 40140b 236->238 239 4036bc-4036f2 RegisterClassA 236->239 237->236 254 403757-403762 call 40381e 238->254 255 40374f-403752 238->255 242 403814 239->242 243 4036f8-403740 SystemParametersInfoA CreateWindowExA 239->243 245 40363a-403646 lstrlenA 240->245 246 40362b-403638 call 40552a 240->246 250 403816-40381d 242->250 243->238 247 403648-403656 lstrcmpiA 245->247 248 40366e-403676 call 4054ff call 405a0c 245->248 246->245 247->248 253 403658-403662 GetFileAttributesA 247->253 248->230 257 403664-403666 253->257 258 403668-403669 call 405546 253->258 264 403768-403785 ShowWindow LoadLibraryA 254->264 265 4037eb-4037f3 call 404e7c 254->265 255->250 257->248 257->258 258->248 267 403787-40378c LoadLibraryA 264->267 268 40378e-4037a0 GetClassInfoA 264->268 272 4037f5-4037fb 265->272 273 40380d-40380f call 40140b 265->273 267->268 270 4037a2-4037b2 GetClassInfoA RegisterClassA 268->270 271 4037b8-4037db DialogBoxParamA call 40140b 268->271 270->271 275 4037e0-4037e9 call 4034a5 271->275 272->255 276 403801-403808 call 40140b 272->276 273->242 275->250 276->255
                                                  APIs
                                                    • Part of subcall function 00405D2E: GetModuleHandleA.KERNEL32(?,?,00000000,0040313D,00000008), ref: 00405D40
                                                    • Part of subcall function 00405D2E: LoadLibraryA.KERNELBASE(?,?,00000000,0040313D,00000008), ref: 00405D4B
                                                    • Part of subcall function 00405D2E: GetProcAddress.KERNEL32(00000000,?), ref: 00405D5C
                                                  • lstrcatA.KERNEL32(1046,00429FE0,80000001,Control Panel\Desktop\ResourceLocale,00000000,00429FE0,00000000,00000006,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe",00000000,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004035C6
                                                  • lstrlenA.KERNEL32(Por favor reveja o acordo da licena antes de instalar o MegaJogos . Se voc aceita todos os termos do acordo, clique em Eu Concordo.,?,?,?,Por favor reveja o acordo da licena antes de instalar o MegaJogos . Se voc aceita todos os termos do acordo, clique em Eu Concordo.,00000000,C:\Users\user\MegaJogos,1046,00429FE0,80000001,Control Panel\Desktop\ResourceLocale,00000000,00429FE0,00000000,00000006,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe"), ref: 0040363B
                                                  • lstrcmpiA.KERNEL32(?,.exe), ref: 0040364E
                                                  • GetFileAttributesA.KERNEL32(Por favor reveja o acordo da licena antes de instalar o MegaJogos . Se voc aceita todos os termos do acordo, clique em Eu Concordo.), ref: 00403659
                                                  • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\MegaJogos), ref: 004036A2
                                                    • Part of subcall function 0040596A: wsprintfA.USER32 ref: 00405977
                                                  • RegisterClassA.USER32 ref: 004036E9
                                                  • SystemParametersInfoA.USER32(00000030,00000000,_Nb,00000000), ref: 00403701
                                                  • CreateWindowExA.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 0040373A
                                                  • ShowWindow.USER32(00000005,00000000), ref: 00403770
                                                  • LoadLibraryA.KERNELBASE(RichEd20), ref: 00403781
                                                  • LoadLibraryA.KERNEL32(RichEd32), ref: 0040378C
                                                  • GetClassInfoA.USER32(00000000,RichEdit20A,0042E300), ref: 0040379C
                                                  • GetClassInfoA.USER32(00000000,RichEdit,0042E300), ref: 004037A9
                                                  • RegisterClassA.USER32(0042E300), ref: 004037B2
                                                  • DialogBoxParamA.USER32(?,00000000,004038EB,00000000), ref: 004037D1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe"$.DEFAULT\Control Panel\International$.exe$1046$C:\Users\user\AppData\Local\Temp\$C:\Users\user\MegaJogos$Control Panel\Desktop\ResourceLocale$Por favor reveja o acordo da licena antes de instalar o MegaJogos . Se voc aceita todos os termos do acordo, clique em Eu Concordo.$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                  • API String ID: 914957316-2476969353
                                                  • Opcode ID: 782b108d1da47bddfbaca8903c2197d8ebfbe362545614604deef5b885922f04
                                                  • Instruction ID: af9374935d7a54fd1dce6881c110e57d7cc589bc1fe1380e1b33b637fa7f222c
                                                  • Opcode Fuzzy Hash: 782b108d1da47bddfbaca8903c2197d8ebfbe362545614604deef5b885922f04
                                                  • Instruction Fuzzy Hash: E161C571604204BAD220AF669D85F273EACE744759F40447FF941B22E1D779AD028B3E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 282 403f06-403f16 283 404029-40403c 282->283 284 403f1c-403f24 282->284 285 404098-40409c 283->285 286 40403e-404047 283->286 287 403f26-403f35 284->287 288 403f37-403fcf call 403dbe * 2 CheckDlgButton call 403de0 GetDlgItem call 403df3 SendMessageA 284->288 292 4040a2-4040b6 GetDlgItem 285->292 293 40416c-404173 285->293 289 40417b 286->289 290 40404d-404055 286->290 287->288 320 403fd1-403fd4 GetSysColor 288->320 321 403fda-404024 SendMessageA * 2 lstrlenA SendMessageA * 2 288->321 296 40417e-404185 call 403e25 289->296 290->289 294 40405b-404067 290->294 298 4040b8-4040bf 292->298 299 40412a-404131 292->299 293->289 295 404175 293->295 294->289 301 40406d-404093 GetDlgItem SendMessageA call 403de0 call 404191 294->301 295->289 307 40418a-40418e 296->307 298->299 304 4040c1-4040dc 298->304 299->296 300 404133-40413a 299->300 300->296 305 40413c-404140 300->305 301->285 304->299 309 4040de-404127 SendMessageA LoadCursorA SetCursor ShellExecuteA LoadCursorA SetCursor 304->309 310 404142-404151 SendMessageA 305->310 311 404153-404157 305->311 309->299 310->311 314 404167-40416a 311->314 315 404159-404165 SendMessageA 311->315 314->307 315->314 320->321 321->307
                                                  APIs
                                                  • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00403F91
                                                  • GetDlgItem.USER32(00000000,000003E8), ref: 00403FA5
                                                  • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00403FC3
                                                  • GetSysColor.USER32(?), ref: 00403FD4
                                                  • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00403FE3
                                                  • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00403FF2
                                                  • lstrlenA.KERNEL32(?), ref: 00403FFC
                                                  • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 0040400A
                                                  • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 00404019
                                                  • GetDlgItem.USER32(?,0000040A), ref: 0040407C
                                                  • SendMessageA.USER32(00000000), ref: 0040407F
                                                  • GetDlgItem.USER32(?,000003E8), ref: 004040AA
                                                  • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 004040EA
                                                  • LoadCursorA.USER32(00000000,00007F02), ref: 004040F9
                                                  • SetCursor.USER32(00000000), ref: 00404102
                                                  • ShellExecuteA.SHELL32(0000070B,open,0042DB00,00000000,00000000,00000001), ref: 00404115
                                                  • LoadCursorA.USER32(00000000,00007F00), ref: 00404122
                                                  • SetCursor.USER32(00000000), ref: 00404125
                                                  • SendMessageA.USER32(00000111,00000001,00000000), ref: 00404151
                                                  • SendMessageA.USER32(00000010,00000000,00000000), ref: 00404165
                                                  Strings
                                                  • Por favor reveja o acordo da licena antes de instalar o MegaJogos . Se voc aceita todos os termos do acordo, clique em Eu Concordo., xrefs: 004040D5
                                                  • N, xrefs: 00404098
                                                  • open, xrefs: 0040410D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                  • String ID: N$Por favor reveja o acordo da licena antes de instalar o MegaJogos . Se voc aceita todos os termos do acordo, clique em Eu Concordo.$open
                                                  • API String ID: 3615053054-3050142716
                                                  • Opcode ID: ca9ac3b64147b6f3934cc3f9d65700a8f1bf1296ace46b7c3bfa8303cb2a33ee
                                                  • Instruction ID: 0605a8af88f24b8a239437e517aaa265f180be2417519ff34b25117700073a86
                                                  • Opcode Fuzzy Hash: ca9ac3b64147b6f3934cc3f9d65700a8f1bf1296ace46b7c3bfa8303cb2a33ee
                                                  • Instruction Fuzzy Hash: D161C1B1A40209BBEB109F60DD45F6A3B69FF54715F108036FB01BA2D1C7B8A991CF98
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 322 402c22-402c70 GetTickCount GetModuleFileNameA call 4056e3 325 402c72-402c77 322->325 326 402c7c-402caa call 405a0c call 405546 call 405a0c GetFileSize 322->326 327 402e54-402e58 325->327 334 402cb0 326->334 335 402d97-402da5 call 402bbe 326->335 337 402cb5-402ccc 334->337 341 402da7-402daa 335->341 342 402dfa-402dff 335->342 339 402cd0-402cd2 call 40307d 337->339 340 402cce 337->340 346 402cd7-402cd9 339->346 340->339 344 402dac-402dc4 call 4030af call 40307d 341->344 345 402dce-402df8 GlobalAlloc call 4030af call 402e5b 341->345 342->327 344->342 369 402dc6-402dcc 344->369 345->342 373 402e0b-402e1c 345->373 347 402e01-402e09 call 402bbe 346->347 348 402cdf-402ce6 346->348 347->342 351 402d62-402d66 348->351 352 402ce8-402cfc call 4056a4 348->352 359 402d70-402d76 351->359 360 402d68-402d6f call 402bbe 351->360 352->359 371 402cfe-402d05 352->371 362 402d85-402d8f 359->362 363 402d78-402d82 call 405d9a 359->363 360->359 362->337 372 402d95 362->372 363->362 369->342 369->345 371->359 375 402d07-402d0e 371->375 372->335 376 402e24-402e29 373->376 377 402e1e 373->377 375->359 378 402d10-402d17 375->378 379 402e2a-402e30 376->379 377->376 378->359 380 402d19-402d20 378->380 379->379 381 402e32-402e4d SetFilePointer call 4056a4 379->381 380->359 382 402d22-402d42 380->382 384 402e52 381->384 382->342 385 402d48-402d4c 382->385 384->327 386 402d54-402d5c 385->386 387 402d4e-402d52 385->387 386->359 388 402d5e-402d60 386->388 387->372 387->386 388->359
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00402C33
                                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe,00000400), ref: 00402C4F
                                                    • Part of subcall function 004056E3: GetFileAttributesA.KERNELBASE(00000003,00402C62,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe,80000000,00000003), ref: 004056E7
                                                    • Part of subcall function 004056E3: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405709
                                                  • GetFileSize.KERNEL32(00000000,00000000,SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe,80000000,00000003), ref: 00402C9B
                                                  Strings
                                                  • C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe, xrefs: 00402C39, 00402C48, 00402C5C, 00402C7C
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00402C22
                                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402DFA
                                                  • "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe", xrefs: 00402C2C
                                                  • Null, xrefs: 00402D19
                                                  • soft, xrefs: 00402D10
                                                  • Inst, xrefs: 00402D07
                                                  • C:\Users\user\Desktop, xrefs: 00402C7D, 00402C82, 00402C88
                                                  • SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe, xrefs: 00402C8F
                                                  • Error launching installer, xrefs: 00402C72
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                  • String ID: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe$soft
                                                  • API String ID: 4283519449-94061026
                                                  • Opcode ID: 1aa0d1efbed9786f842be751fafdabbb11e6860e74167932e572fcfd279c9ed7
                                                  • Instruction ID: 5cdc40c0d59b83eec34e45f83230a383a342561faf5f4e8ee161a7b3089b1b43
                                                  • Opcode Fuzzy Hash: 1aa0d1efbed9786f842be751fafdabbb11e6860e74167932e572fcfd279c9ed7
                                                  • Instruction Fuzzy Hash: 40512371A00214ABDB20DF61DE89B9E7BA8EF04329F10413BF905B62D1D7BC9D418B9D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 10001541: GlobalAlloc.KERNELBASE(00000040,10001577,?,?,10001804,?,10001017), ref: 10001549
                                                    • Part of subcall function 10001561: lstrcpyA.KERNEL32(00000000,?,?,?,10001804,?,10001017), ref: 1000157E
                                                    • Part of subcall function 10001561: GlobalFree.KERNEL32 ref: 1000158F
                                                  • GlobalAlloc.KERNELBASE(00000040,000014A4), ref: 10001E28
                                                  • lstrcpyA.KERNEL32(00000008,?), ref: 10001E74
                                                  • lstrcpyA.KERNEL32(00000408,?), ref: 10001E7E
                                                  • GlobalFree.KERNEL32(00000000), ref: 10001E98
                                                  • GlobalFree.KERNEL32(?), ref: 10001F80
                                                  • GlobalFree.KERNEL32(?), ref: 10001F85
                                                  • GlobalFree.KERNEL32(?), ref: 10001F8A
                                                  • GlobalFree.KERNEL32(00000000), ref: 1000212C
                                                  • lstrcpyA.KERNEL32(?,?), ref: 10002273
                                                  • GetModuleHandleA.KERNEL32(00000008), ref: 100022DA
                                                  • LoadLibraryA.KERNEL32(00000008), ref: 100022EB
                                                  • GetProcAddress.KERNEL32(?,00000408), ref: 1000230E
                                                  • lstrcatA.KERNEL32(00000408,10004024), ref: 10002320
                                                  • GetProcAddress.KERNEL32(?,00000408), ref: 1000232D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2906916090.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                  • Associated: 00000000.00000002.2906890423.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906940489.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906964895.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Global$Free$lstrcpy$AddressAllocProc$HandleLibraryLoadModulelstrcat
                                                  • String ID:
                                                  • API String ID: 2432367840-0
                                                  • Opcode ID: ee092e71ca505709d651e0729bf6a215d1fa5f7789b41da9f2bb1e621745af8d
                                                  • Instruction ID: 43630dbe77052cbd99e7b50fc19318fc31bc1fc88c17e7e17ecc67392abc93a9
                                                  • Opcode Fuzzy Hash: ee092e71ca505709d651e0729bf6a215d1fa5f7789b41da9f2bb1e621745af8d
                                                  • Instruction Fuzzy Hash: 94029C71D0464ADFEB60CFA4C8807EEBBF4FB043C4F21852AE5A5A7189D7749A81DB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 698 401734-401757 call 4029f6 call 40556c 703 401761-401773 call 405a0c call 4054ff lstrcatA 698->703 704 401759-40175f call 405a0c 698->704 710 401778-40177e call 405c6e 703->710 704->710 714 401783-401787 710->714 715 401789-401793 call 405d07 714->715 716 4017ba-4017bd 714->716 724 4017a5-4017b7 715->724 725 401795-4017a3 CompareFileTime 715->725 718 4017c5-4017e1 call 4056e3 716->718 719 4017bf-4017c0 call 4056c4 716->719 726 4017e3-4017e6 718->726 727 401859-401882 call 404daa call 402e5b 718->727 719->718 724->716 725->724 728 4017e8-40182a call 405a0c * 2 call 405a2e call 405a0c call 4052cd 726->728 729 40183b-401845 call 404daa 726->729 741 401884-401888 727->741 742 40188a-401896 SetFileTime 727->742 728->714 762 401830-401831 728->762 739 40184e-401854 729->739 743 402894 739->743 741->742 745 40189c-4018a7 FindCloseChangeNotification 741->745 742->745 747 402896-40289a 743->747 748 40288b-40288e 745->748 749 4018ad-4018b0 745->749 748->743 751 4018b2-4018c3 call 405a2e lstrcatA 749->751 752 4018c5-4018c8 call 405a2e 749->752 757 4018cd-402213 call 4052cd 751->757 752->757 757->747 765 40265c-402663 757->765 762->739 764 401833-401834 762->764 764->729 765->748
                                                  APIs
                                                  • lstrcatA.KERNEL32(00000000,00000000,C:\Users\user\MegaJogos,00434800,00000000,00000000,00000031), ref: 00401773
                                                  • CompareFileTime.KERNEL32(-00000014,?,C:\Users\user\MegaJogos,C:\Users\user\MegaJogos,00000000,00000000,C:\Users\user\MegaJogos,00434800,00000000,00000000,00000031), ref: 0040179D
                                                    • Part of subcall function 00405A0C: lstrcpynA.KERNEL32(?,?,00000400,00403168,Instalao do MegaJogos ,NSIS Error), ref: 00405A19
                                                    • Part of subcall function 00404DAA: lstrlenA.KERNEL32(004297B8,00000000,0041B788,74DF23A0,?,?,?,?,?,?,?,?,?,00402FB6,00000000,?), ref: 00404DE3
                                                    • Part of subcall function 00404DAA: lstrlenA.KERNEL32(00402FB6,004297B8,00000000,0041B788,74DF23A0,?,?,?,?,?,?,?,?,?,00402FB6,00000000), ref: 00404DF3
                                                    • Part of subcall function 00404DAA: lstrcatA.KERNEL32(004297B8,00402FB6,00402FB6,004297B8,00000000,0041B788,74DF23A0), ref: 00404E06
                                                    • Part of subcall function 00404DAA: SetWindowTextA.USER32(004297B8,004297B8), ref: 00404E18
                                                    • Part of subcall function 00404DAA: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404E3E
                                                    • Part of subcall function 00404DAA: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404E58
                                                    • Part of subcall function 00404DAA: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404E66
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsf620C.tmp$C:\Users\user\AppData\Local\Temp\nsf620C.tmp\System.dll$C:\Users\user\MegaJogos
                                                  • API String ID: 1941528284-217881959
                                                  • Opcode ID: 182276ebfff280579eabee0cb65024e2aa931d0bdbdb1331e97a56f91b16d277
                                                  • Instruction ID: 2412d90e5cc6ef50ac46e2462e63b4f26081636668b1d4f665875a47291bc265
                                                  • Opcode Fuzzy Hash: 182276ebfff280579eabee0cb65024e2aa931d0bdbdb1331e97a56f91b16d277
                                                  • Instruction Fuzzy Hash: 4341D831A10515BACF10BBB5DD86DAF3A69EF41328B24433BF511F11E2D67C4A418E6D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 766 402e5b-402e6f 767 402e71 766->767 768 402e78-402e81 766->768 767->768 769 402e83 768->769 770 402e8a-402e8f 768->770 769->770 771 402e91-402e9a call 4030af 770->771 772 402e9f-402eac call 40307d 770->772 771->772 776 402eb2-402eb6 772->776 777 403028 772->777 779 403011-403013 776->779 780 402ebc-402f05 GetTickCount 776->780 778 40302a-40302b 777->778 781 403076-40307a 778->781 782 403015-403018 779->782 783 403068-40306c 779->783 784 403073 780->784 785 402f0b-402f13 780->785 788 40301a 782->788 789 40301d-403026 call 40307d 782->789 786 40302d-403033 783->786 787 40306e 783->787 784->781 790 402f15 785->790 791 402f18-402f26 call 40307d 785->791 793 403035 786->793 794 403038-403046 call 40307d 786->794 787->784 788->789 789->777 801 403070 789->801 790->791 791->777 799 402f2c-402f35 791->799 793->794 794->777 803 403048-40305b WriteFile 794->803 802 402f3b-402f5b call 405e08 799->802 801->784 809 402f61-402f74 GetTickCount 802->809 810 403009-40300b 802->810 805 40300d-40300f 803->805 806 40305d-403060 803->806 805->778 806->805 808 403062-403065 806->808 808->783 811 402f76-402f7e 809->811 812 402fb9-402fbd 809->812 810->778 813 402f80-402f84 811->813 814 402f86-402fb6 MulDiv wsprintfA call 404daa 811->814 815 402ffe-403001 812->815 816 402fbf-402fc2 812->816 813->812 813->814 814->812 815->785 817 403007 815->817 819 402fe4-402fef 816->819 820 402fc4-402fd8 WriteFile 816->820 817->784 822 402ff2-402ff6 819->822 820->805 821 402fda-402fdd 820->821 821->805 824 402fdf-402fe2 821->824 822->802 825 402ffc 822->825 824->822 825->784
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00402EC2
                                                  • GetTickCount.KERNEL32 ref: 00402F69
                                                  • MulDiv.KERNEL32(7FFFFFFF,00000064,00000020), ref: 00402F92
                                                  • wsprintfA.USER32 ref: 00402FA2
                                                  • WriteFile.KERNELBASE(00000000,00000000,0041B788,7FFFFFFF,00000000), ref: 00402FD0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CountTick$FileWritewsprintf
                                                  • String ID: ... %d%%
                                                  • API String ID: 4209647438-2449383134
                                                  • Opcode ID: 41e35a0a14bb3f2fd38d9c716afd6c3ba0ace6c0ea9dec4adf0e27dc0e0f292a
                                                  • Instruction ID: 0d39cdfb2b20f01ea0ef459ff81ac6f09524c508dd7874cbed1e127a204ff5ac
                                                  • Opcode Fuzzy Hash: 41e35a0a14bb3f2fd38d9c716afd6c3ba0ace6c0ea9dec4adf0e27dc0e0f292a
                                                  • Instruction Fuzzy Hash: 3D618D7190121AEBDF10CF65DA44A9E7BB8EF04366F10413BF800B72D4D7789A51DBAA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 826 401f51-401f5d 827 401f63-401f79 call 4029f6 * 2 826->827 828 402019-40201b 826->828 837 401f88-401f96 LoadLibraryExA 827->837 838 401f7b-401f86 GetModuleHandleA 827->838 829 402164-402169 call 401423 828->829 835 40288b-40289a 829->835 840 401f98-401fa6 GetProcAddress 837->840 841 402012-402014 837->841 838->837 838->840 843 401fe5-401fea call 404daa 840->843 844 401fa8-401fae 840->844 841->829 849 401fef-401ff2 843->849 845 401fb0-401fbc call 401423 844->845 846 401fc7-401fde call 1000198f 844->846 845->849 857 401fbe-401fc5 845->857 852 401fe0-401fe3 846->852 849->835 850 401ff8-402000 call 4034f5 849->850 850->835 856 402006-40200d FreeLibrary 850->856 852->849 856->835 857->849
                                                  APIs
                                                  • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 00401F7C
                                                    • Part of subcall function 00404DAA: lstrlenA.KERNEL32(004297B8,00000000,0041B788,74DF23A0,?,?,?,?,?,?,?,?,?,00402FB6,00000000,?), ref: 00404DE3
                                                    • Part of subcall function 00404DAA: lstrlenA.KERNEL32(00402FB6,004297B8,00000000,0041B788,74DF23A0,?,?,?,?,?,?,?,?,?,00402FB6,00000000), ref: 00404DF3
                                                    • Part of subcall function 00404DAA: lstrcatA.KERNEL32(004297B8,00402FB6,00402FB6,004297B8,00000000,0041B788,74DF23A0), ref: 00404E06
                                                    • Part of subcall function 00404DAA: SetWindowTextA.USER32(004297B8,004297B8), ref: 00404E18
                                                    • Part of subcall function 00404DAA: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404E3E
                                                    • Part of subcall function 00404DAA: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404E58
                                                    • Part of subcall function 00404DAA: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404E66
                                                  • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00401F8C
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00401F9C
                                                  • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 00402007
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                  • String ID: B
                                                  • API String ID: 2987980305-3806887055
                                                  • Opcode ID: 7801585ffc0b9ac36e2f6c86c8f002994cbbb77bfdbfe2fb33793952b630982a
                                                  • Instruction ID: bf94c0598684f4a2e8798aed6ecd64900ad0f6fcd097f114c8a1beddd358b100
                                                  • Opcode Fuzzy Hash: 7801585ffc0b9ac36e2f6c86c8f002994cbbb77bfdbfe2fb33793952b630982a
                                                  • Instruction Fuzzy Hash: 5121EE72D04216EBCF107FA5CE49A6E75B06F45358F20433BF511B62E1C77C4941A65E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 859 405712-40571c 860 40571d-405747 GetTickCount GetTempFileNameA 859->860 861 405756-405758 860->861 862 405749-40574b 860->862 863 405750-405753 861->863 862->860 864 40574d 862->864 864->863
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00405725
                                                  • GetTempFileNameA.KERNELBASE(?,0061736E,00000000,?), ref: 0040573F
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405712, 00405715
                                                  • nsa, xrefs: 0040571E
                                                  • "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe", xrefs: 00405719
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CountFileNameTempTick
                                                  • String ID: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                                  • API String ID: 1716503409-704565180
                                                  • Opcode ID: fc5e126f8815d4696b9f295c06fae67d9d4e63728d0dbdda5093f58b42bfadad
                                                  • Instruction ID: 857343acb9398127b83b67a88284cb3acf20d602f6beb627bdaaa73bf87bc8f8
                                                  • Opcode Fuzzy Hash: fc5e126f8815d4696b9f295c06fae67d9d4e63728d0dbdda5093f58b42bfadad
                                                  • Instruction Fuzzy Hash: 19F0A736348204BAE7105E55DC04B9B7F99DFD1750F14C027F9449B1C0D6F099589BA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 865 1000198f-100019c1 call 10001d3b 868 100019c6-100019cb 865->868 869 100019d1-100019d5 868->869 870 10001adc-10001ade 868->870 871 100019d7-100019dd call 100023f6 869->871 872 100019de-100019eb call 10002440 869->872 871->872 877 10001a1b-10001a22 872->877 878 100019ed-100019f2 872->878 879 10001a42-10001a46 877->879 880 10001a24-10001a40 call 100025fe call 100018a1 call 1000159e GlobalFree 877->880 881 100019f4-100019f5 878->881 882 10001a0d-10001a10 878->882 886 10001a84-10001a8a call 100025fe 879->886 887 10001a48-10001a82 call 100018a1 call 100025fe 879->887 902 10001a8b-10001a8f 880->902 884 100019f7-100019f8 881->884 885 100019fd-10001a03 call 1000120c 881->885 882->877 888 10001a12-10001a13 call 100014c7 882->888 890 10001a05-10001a0b call 100027cc 884->890 891 100019fa-100019fb 884->891 900 10001a18 885->900 886->902 887->902 888->900 906 10001a1a 890->906 891->877 891->885 900->906 907 10001a91-10001a9f call 100025c4 902->907 908 10001acc-10001ad3 902->908 906->877 915 10001aa1-10001aa4 907->915 916 10001ab7-10001abe 907->916 908->870 913 10001ad5-10001ad6 GlobalFree 908->913 913->870 915->916 917 10001aa6-10001aae 915->917 916->908 918 10001ac0-10001acb call 10001825 916->918 917->916 919 10001ab0-10001ab1 FreeLibrary 917->919 918->908 919->916
                                                  APIs
                                                    • Part of subcall function 10001D3B: GlobalFree.KERNEL32(?), ref: 10001F80
                                                    • Part of subcall function 10001D3B: GlobalFree.KERNEL32(?), ref: 10001F85
                                                    • Part of subcall function 10001D3B: GlobalFree.KERNEL32(?), ref: 10001F8A
                                                  • GlobalFree.KERNEL32(00000000), ref: 10001A3A
                                                  • FreeLibrary.KERNEL32(?), ref: 10001AB1
                                                  • GlobalFree.KERNEL32(00000000), ref: 10001AD6
                                                    • Part of subcall function 100023F6: GlobalAlloc.KERNEL32(00000040,E8002080), ref: 10002428
                                                    • Part of subcall function 100027CC: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,?,10001A0B,00000000), ref: 1000281C
                                                    • Part of subcall function 100018A1: lstrcpyA.KERNEL32(00000000,10004018,00000000,10001967,00000000), ref: 100018BA
                                                    • Part of subcall function 100025FE: wsprintfA.USER32 ref: 1000265F
                                                    • Part of subcall function 100025FE: GlobalFree.KERNEL32(?), ref: 10002728
                                                    • Part of subcall function 100025FE: GlobalFree.KERNEL32(00000000), ref: 10002751
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2906916090.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                  • Associated: 00000000.00000002.2906890423.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906940489.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906964895.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Global$Free$Alloc$Librarylstrcpywsprintf
                                                  • String ID:
                                                  • API String ID: 1767494692-3916222277
                                                  • Opcode ID: 6e0759a576b18076926cce8c598bb7c3c4ce6d2cf8641f24577731197bddaade
                                                  • Instruction ID: 73a644c0497f06cd708a10c3248ea791f84cf5318f3d9e6ca3c0cc3a1fe5f0c9
                                                  • Opcode Fuzzy Hash: 6e0759a576b18076926cce8c598bb7c3c4ce6d2cf8641f24577731197bddaade
                                                  • Instruction Fuzzy Hash: 8031A075601245AAFB41DF649CC5BDA3BE8FF062D0F148429F9066A09FCF749845CBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 922 4015b3-4015c6 call 4029f6 call 405593 927 4015c8-4015e3 call 40552a CreateDirectoryA 922->927 928 40160a-40160d 922->928 937 401600-401608 927->937 938 4015e5-4015f0 GetLastError 927->938 929 40162d-402169 call 401423 928->929 930 40160f-401628 call 401423 call 405a0c SetCurrentDirectoryA 928->930 944 40288b-40289a 929->944 930->944 937->927 937->928 941 4015f2-4015fb GetFileAttributesA 938->941 942 4015fd 938->942 941->937 941->942 942->937
                                                  APIs
                                                    • Part of subcall function 00405593: CharNextA.USER32(ES@,?,0042B3E8,00000000,004055F7,0042B3E8,0042B3E8,?,?,00000000,00405345,?,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe",00000000), ref: 004055A1
                                                    • Part of subcall function 00405593: CharNextA.USER32(00000000), ref: 004055A6
                                                    • Part of subcall function 00405593: CharNextA.USER32(00000000), ref: 004055B5
                                                  • CreateDirectoryA.KERNELBASE(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015DB
                                                  • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015E5
                                                  • GetFileAttributesA.KERNELBASE(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015F3
                                                  • SetCurrentDirectoryA.KERNEL32(00000000,00434800,00000000,00000000,000000F0), ref: 00401622
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                                  • String ID:
                                                  • API String ID: 3751793516-0
                                                  • Opcode ID: e9d59eda693b922a5fdb80184fc3babb31ba0cd8e1a3062a527ae998bf2baf8a
                                                  • Instruction ID: bf1eb0eabc3c1df6ff2fb323ed3efcd7168262dea338722757ad05095e7f5395
                                                  • Opcode Fuzzy Hash: e9d59eda693b922a5fdb80184fc3babb31ba0cd8e1a3062a527ae998bf2baf8a
                                                  • Instruction Fuzzy Hash: AB012631908180AFDB217F756D449BF6BB0EA56365728073FF492B22E2C23C4D42962E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 00405C6E: CharNextA.USER32(?,*?|<>/":,00000000,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030D2,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405CC6
                                                    • Part of subcall function 00405C6E: CharNextA.USER32(?,?,?,00000000), ref: 00405CD3
                                                    • Part of subcall function 00405C6E: CharNextA.USER32(?,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030D2,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405CD8
                                                    • Part of subcall function 00405C6E: CharPrevA.USER32(?,?,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030D2,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405CE8
                                                  • CreateDirectoryA.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 004030E7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Char$Next$CreateDirectoryPrev
                                                  • String ID: 1046$C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 4115351271-2278334880
                                                  • Opcode ID: 9fc94c8ce289ceace51d82d7694160c71b26e7ee5232ad3accb455f1d4d4e313
                                                  • Instruction ID: 7f1b43601f0a10077d0081c2ba5ec5825ac71a1bded9547d22d949ebda8a6a9f
                                                  • Opcode Fuzzy Hash: 9fc94c8ce289ceace51d82d7694160c71b26e7ee5232ad3accb455f1d4d4e313
                                                  • Instruction Fuzzy Hash: B6D0922150AD3031D651322A3E06BCF154D8F4636AF65807BF944B608A4A6C2A825AEE
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 958 4058f3-405924 RegOpenKeyExA 959 405964-405967 958->959 960 405926-405945 RegQueryValueExA 958->960 961 405953 960->961 962 405947-40594b 960->962 963 405955-40595e RegCloseKey 961->963 962->963 964 40594d-405951 962->964 963->959 964->961 964->963
                                                  APIs
                                                  • RegOpenKeyExA.KERNELBASE(80000002,00405B2F,00000000,00000002,?,00000002,0035B8D9,?,00405B2F,80000002,Software\Microsoft\Windows\CurrentVersion,0035B8D9,Por favor reveja o acordo da licena antes de instalar o MegaJogos . Se voc aceita todos os termos do acordo, clique em Eu Concordo.,0078A471), ref: 0040591C
                                                  • RegQueryValueExA.KERNELBASE(0035B8D9,?,00000000,00405B2F,0035B8D9,00405B2F), ref: 0040593D
                                                  • RegCloseKey.KERNELBASE(?), ref: 0040595E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID:
                                                  • API String ID: 3677997916-0
                                                  • Opcode ID: 20ca1dc64cf80f35bde4a5a459f169022cfe0f17446037da1f5ac97088a586f8
                                                  • Instruction ID: 7f29002dde4dac3a19eb3905e2141cfc53fc6fe5580d4c3066aa5286193c6294
                                                  • Opcode Fuzzy Hash: 20ca1dc64cf80f35bde4a5a459f169022cfe0f17446037da1f5ac97088a586f8
                                                  • Instruction Fuzzy Hash: 16015AB104020AEFDF128F64EC44AEB3FACEF153A4F004436F954E6220D235D968DBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                  • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: cf7b3020d7635a73a7f034f7f9c2b240c5e2222d46fcf66a2415134205071e91
                                                  • Instruction ID: 8223ec958efd2c964e321ebce6dca8e406ed2778dd364e0d2667d4e2a9ef0db3
                                                  • Opcode Fuzzy Hash: cf7b3020d7635a73a7f034f7f9c2b240c5e2222d46fcf66a2415134205071e91
                                                  • Instruction Fuzzy Hash: FE01F4317242109BE7299B799D04B6A36D8E710325F14453FF955F72F1D678DC028B4D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetFileAttributesA.KERNELBASE(00000003,00402C62,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe,80000000,00000003), ref: 004056E7
                                                  • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405709
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: File$AttributesCreate
                                                  • String ID:
                                                  • API String ID: 415043291-0
                                                  • Opcode ID: f96d5d8e90d761c4e0dddf78ec48930a46771e4615b27f2c581d09f506512028
                                                  • Instruction ID: 518821d5ca0a74227a37217cadb520a33af9faec79942caa6648154b48e23ab6
                                                  • Opcode Fuzzy Hash: f96d5d8e90d761c4e0dddf78ec48930a46771e4615b27f2c581d09f506512028
                                                  • Instruction Fuzzy Hash: DDD09E71658301AFEF098F20DE1AF2E7AA2EB84B01F10962CB646940E0D6715C15DB16
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,00402EAA,000000FF,00000004,00000000,00000000,00000000), ref: 00403094
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: FileRead
                                                  • String ID:
                                                  • API String ID: 2738559852-0
                                                  • Opcode ID: 728267699a9b44ddad9e6e694247195ab13049bac6004c2e56fc09e99b3f0f19
                                                  • Instruction ID: 43e3c0ed55451ca58d66c179b0d5cd373ba627774d09ad719adf1b780fd88a5d
                                                  • Opcode Fuzzy Hash: 728267699a9b44ddad9e6e694247195ab13049bac6004c2e56fc09e99b3f0f19
                                                  • Instruction Fuzzy Hash: F0E08631101119BBCF105E61AC00A9B3F9CEB05362F00C032FA04E5190D538DA14DBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • VirtualProtect.KERNELBASE(1000404C,00000004,00000040,1000403C), ref: 1000294E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2906916090.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                  • Associated: 00000000.00000002.2906890423.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906940489.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906964895.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID:
                                                  • API String ID: 544645111-0
                                                  • Opcode ID: 34d967791fa0c81937acb5e832d60935bd6fac481f559dacb71f15d92aed8369
                                                  • Instruction ID: 48d6293a520ab1310b80528f385a012c899c9e0ceb66e9e696cbd892b99779f9
                                                  • Opcode Fuzzy Hash: 34d967791fa0c81937acb5e832d60935bd6fac481f559dacb71f15d92aed8369
                                                  • Instruction Fuzzy Hash: 1BE0AEF15092A0DEF360DF688CC47023EE4A3983C5B03842AE348F6269EB3841448B19
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SendMessageA.USER32(00000028,?,00000001,00403C24), ref: 00403E01
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: acb417c3046c5230bf261fb3a85c5b045a6b8022903fbd0a553d80ffe77ce434
                                                  • Instruction ID: d5eec3387bf9f2af87c3deac1be3c081a68759b5cbc5052c90a1cd046c0f3978
                                                  • Opcode Fuzzy Hash: acb417c3046c5230bf261fb3a85c5b045a6b8022903fbd0a553d80ffe77ce434
                                                  • Instruction Fuzzy Hash: BCB01275BC4201FBEE219B01DE09F457E62E764701F008074B305240F0C6B210A1DF0D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402DE9,0001A1E4), ref: 004030BD
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: 2028dafccfaa88a297be93e7ba1f52e009ec02dcd94d5fd44c1761bf2bffe23e
                                                  • Instruction ID: eafd0aff1283cdec3023edec91852d87283cefa69c9b21bce59c6677f93a42a7
                                                  • Opcode Fuzzy Hash: 2028dafccfaa88a297be93e7ba1f52e009ec02dcd94d5fd44c1761bf2bffe23e
                                                  • Instruction Fuzzy Hash: 14B01271644200BFDB214F00DF06F057B21A790701F108030B344380F082712420EB1E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GlobalAlloc.KERNELBASE(00000040,10001577,?,?,10001804,?,10001017), ref: 10001549
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2906916090.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                  • Associated: 00000000.00000002.2906890423.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906940489.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906964895.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: AllocGlobal
                                                  • String ID:
                                                  • API String ID: 3761449716-0
                                                  • Opcode ID: 7b5eed81e2901482d8b61a1c6600ff8eb3952a21cb33a114867dcac47047f9af
                                                  • Instruction ID: 305db27d9feb3ad942446de8fc5e9d5ce911d10906235a569225c64140842302
                                                  • Opcode Fuzzy Hash: 7b5eed81e2901482d8b61a1c6600ff8eb3952a21cb33a114867dcac47047f9af
                                                  • Instruction Fuzzy Hash: 86A002B25415609BFE466BD08D9EF463F25F744781F128040E719650B8CA750064DF19
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgItem.USER32(?,000003F9), ref: 00404710
                                                  • GetDlgItem.USER32(?,00000408), ref: 0040471D
                                                  • GlobalAlloc.KERNEL32(00000040,00000004), ref: 00404769
                                                  • LoadBitmapA.USER32(0000006E), ref: 0040477C
                                                  • SetWindowLongA.USER32(?,000000FC,00404CFA), ref: 00404796
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 004047AA
                                                  • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 004047BE
                                                  • SendMessageA.USER32(?,00001109,00000002), ref: 004047D3
                                                  • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 004047DF
                                                  • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 004047F1
                                                  • DeleteObject.GDI32(?), ref: 004047F6
                                                  • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404821
                                                  • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 0040482D
                                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 004048C2
                                                  • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 004048ED
                                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404901
                                                  • GetWindowLongA.USER32(?,000000F0), ref: 00404930
                                                  • SetWindowLongA.USER32(?,000000F0,00000000), ref: 0040493E
                                                  • ShowWindow.USER32(?,00000005), ref: 0040494F
                                                  • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404A52
                                                  • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404AB7
                                                  • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404ACC
                                                  • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404AF0
                                                  • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404B16
                                                  • ImageList_Destroy.COMCTL32(?), ref: 00404B2B
                                                  • GlobalFree.KERNEL32(?), ref: 00404B3B
                                                  • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404BAB
                                                  • SendMessageA.USER32(?,00001102,00000410,?), ref: 00404C54
                                                  • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404C63
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00404C83
                                                  • ShowWindow.USER32(?,00000000), ref: 00404CD1
                                                  • GetDlgItem.USER32(?,000003FE), ref: 00404CDC
                                                  • ShowWindow.USER32(00000000), ref: 00404CE3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                  • String ID: $<{x$M$N
                                                  • API String ID: 1638840714-3923691584
                                                  • Opcode ID: 891e731a8221ae253933017c2eccba6e957e132fc7a2eea92a41face644f869f
                                                  • Instruction ID: 30a51c26aaa2b30bd696497e7e47c5adc9155ce2862f65cc436e234c57937e2f
                                                  • Opcode Fuzzy Hash: 891e731a8221ae253933017c2eccba6e957e132fc7a2eea92a41face644f869f
                                                  • Instruction Fuzzy Hash: D402AFB0A00208AFDB20DF55DD45AAE7BB5FB84314F10817AF611BA2E1D7799E42CF58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgItem.USER32(?,00000403), ref: 00404F47
                                                  • GetDlgItem.USER32(?,000003EE), ref: 00404F56
                                                  • GetClientRect.USER32(?,?), ref: 00404F93
                                                  • GetSystemMetrics.USER32(00000015), ref: 00404F9B
                                                  • SendMessageA.USER32(?,0000101B,00000000,00000002), ref: 00404FBC
                                                  • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00404FCD
                                                  • SendMessageA.USER32(?,00001001,00000000,00000110), ref: 00404FE0
                                                  • SendMessageA.USER32(?,00001026,00000000,00000110), ref: 00404FEE
                                                  • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405001
                                                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405023
                                                  • ShowWindow.USER32(?,00000008), ref: 00405037
                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405058
                                                  • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405068
                                                  • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 00405081
                                                  • SendMessageA.USER32(00000000,00002001,00000000,00000110), ref: 0040508D
                                                  • GetDlgItem.USER32(?,000003F8), ref: 00404F65
                                                    • Part of subcall function 00403DF3: SendMessageA.USER32(00000028,?,00000001,00403C24), ref: 00403E01
                                                  • GetDlgItem.USER32(?,000003EC), ref: 004050AA
                                                  • CreateThread.KERNEL32(00000000,00000000,Function_00004E7C,00000000), ref: 004050B8
                                                  • CloseHandle.KERNEL32(00000000), ref: 004050BF
                                                  • ShowWindow.USER32(00000000), ref: 004050E3
                                                  • ShowWindow.USER32(00000000,00000008), ref: 004050E8
                                                  • ShowWindow.USER32(00000008), ref: 0040512F
                                                  • SendMessageA.USER32(00000000,00001004,00000000,00000000), ref: 00405161
                                                  • CreatePopupMenu.USER32 ref: 00405172
                                                  • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 00405187
                                                  • GetWindowRect.USER32(00000000,?), ref: 0040519A
                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004051BE
                                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004051F9
                                                  • OpenClipboard.USER32(00000000), ref: 00405209
                                                  • EmptyClipboard.USER32 ref: 0040520F
                                                  • GlobalAlloc.KERNEL32(00000042,?,?,?,00000000,?,00000000), ref: 00405218
                                                  • GlobalLock.KERNEL32(00000000,?,?,00000000,?,00000000), ref: 00405222
                                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405236
                                                  • GlobalUnlock.KERNEL32(00000000,?,?,00000000,?,00000000), ref: 0040524E
                                                  • SetClipboardData.USER32(00000001,00000000), ref: 00405259
                                                  • CloseClipboard.USER32 ref: 0040525F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                  • String ID: {
                                                  • API String ID: 590372296-366298937
                                                  • Opcode ID: 153c9e6010363238f160c746c773255f4702a7c761463e895ee127b4dfd74375
                                                  • Instruction ID: ecf959edf644124ae9a18d4fa2a520563b4821934e06b5e1f2851b0e4fc8d151
                                                  • Opcode Fuzzy Hash: 153c9e6010363238f160c746c773255f4702a7c761463e895ee127b4dfd74375
                                                  • Instruction Fuzzy Hash: FBA14870900208BFEB219FA1DD89AAE7F79FB08355F40407AFA05AA2A0C7755E41DF59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgItem.USER32(?,000003FB), ref: 00404248
                                                  • SetWindowTextA.USER32(?,?), ref: 00404275
                                                  • SHBrowseForFolderA.SHELL32(?,004293B0,?), ref: 0040432A
                                                  • CoTaskMemFree.OLE32(00000000), ref: 00404335
                                                  • lstrcmpiA.KERNEL32(Por favor reveja o acordo da licena antes de instalar o MegaJogos . Se voc aceita todos os termos do acordo, clique em Eu Concordo.,00429FE0), ref: 00404367
                                                  • lstrcatA.KERNEL32(?,Por favor reveja o acordo da licena antes de instalar o MegaJogos . Se voc aceita todos os termos do acordo, clique em Eu Concordo.), ref: 00404373
                                                  • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404383
                                                    • Part of subcall function 004052B1: GetDlgItemTextA.USER32(?,?,00000400,004043B6), ref: 004052C4
                                                    • Part of subcall function 00405C6E: CharNextA.USER32(?,*?|<>/":,00000000,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030D2,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405CC6
                                                    • Part of subcall function 00405C6E: CharNextA.USER32(?,?,?,00000000), ref: 00405CD3
                                                    • Part of subcall function 00405C6E: CharNextA.USER32(?,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030D2,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405CD8
                                                    • Part of subcall function 00405C6E: CharPrevA.USER32(?,?,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030D2,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405CE8
                                                  • GetDiskFreeSpaceA.KERNEL32(00428FA8,?,?,0000040F,?,00428FA8,00428FA8,?,00000000,00428FA8,?,?,000003FB,?), ref: 0040443C
                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404457
                                                  • SetDlgItemTextA.USER32(00000000,00000400,00428F98), ref: 004044D0
                                                  Strings
                                                  • C:\Users\user\MegaJogos, xrefs: 00404350
                                                  • A, xrefs: 00404323
                                                  • Por favor reveja o acordo da licena antes de instalar o MegaJogos . Se voc aceita todos os termos do acordo, clique em Eu Concordo., xrefs: 00404361, 00404366, 00404371
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                                  • String ID: A$C:\Users\user\MegaJogos$Por favor reveja o acordo da licena antes de instalar o MegaJogos . Se voc aceita todos os termos do acordo, clique em Eu Concordo.
                                                  • API String ID: 2246997448-3924065046
                                                  • Opcode ID: 3afcbafaa1f058f4e60f2d98426583bbe197eeeba94faa728f80af3a79449a75
                                                  • Instruction ID: 52dfe11e264a0fce323933678d720eed1997f61c196974170264a293bd140da1
                                                  • Opcode Fuzzy Hash: 3afcbafaa1f058f4e60f2d98426583bbe197eeeba94faa728f80af3a79449a75
                                                  • Instruction Fuzzy Hash: 19915FB1A00219ABDF11AFA1CC85AAF7BB8EF84315F10407BFA00B6291D77C99418F59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CoCreateInstance.OLE32(00407490,?,00000001,00407480,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402073
                                                  • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,00409378,00000400,?,00000001,00407480,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040212D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ByteCharCreateInstanceMultiWide
                                                  • String ID:
                                                  • API String ID: 123533781-0
                                                  • Opcode ID: 68441b76e02daf5c94a04c817994d866479800aff39ed8a12ba88c5297dbe799
                                                  • Instruction ID: ee874f8c2dec57c4877f78095a0f9dac743c80c93ea62094aeb2a8065092a27c
                                                  • Opcode Fuzzy Hash: 68441b76e02daf5c94a04c817994d866479800aff39ed8a12ba88c5297dbe799
                                                  • Instruction Fuzzy Hash: 07417D75A00205BFCB40DFA4CD88E9E7BBABF48354B204269FA15FB2D1CA799D41CB54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 0040264D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: FileFindFirst
                                                  • String ID:
                                                  • API String ID: 1974802433-0
                                                  • Opcode ID: 5ec8cfe3ecd6d47a33181b223f4745e968f2e88ce0dfbd25e8ae3887cda06d2f
                                                  • Instruction ID: c4edc1118dc91e0c9440d01bfde8b8f2caf312925950fbc99ec99334c7621aa2
                                                  • Opcode Fuzzy Hash: 5ec8cfe3ecd6d47a33181b223f4745e968f2e88ce0dfbd25e8ae3887cda06d2f
                                                  • Instruction Fuzzy Hash: E3F0E572648101DFD700EBB49D49AEEB768DF51328FA007BBF502F20C1C2B84945DB2A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c2605cf98d0f5e4d904242d25cd3a4b56aad5cd8bbaf3b06cd26a7c18d89d64d
                                                  • Instruction ID: 671146196c1174ec618cbc22bbed2adbdbe1d7b4d249fb8fe9215707769dedfe
                                                  • Opcode Fuzzy Hash: c2605cf98d0f5e4d904242d25cd3a4b56aad5cd8bbaf3b06cd26a7c18d89d64d
                                                  • Instruction Fuzzy Hash: 3FE16971901B09DFDB24CF58C880BAABBF5EB44305F15852EE897A72D1D378AA51CF44
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b751e5aff08849ce342a749075ab7f0bf0a9efd73ac853bc595c300a3c4f69bb
                                                  • Instruction ID: ce73a9d55fc041a401e528a6b0bed7c2fc314d3430b7e91baefc2d4226deaab1
                                                  • Opcode Fuzzy Hash: b751e5aff08849ce342a749075ab7f0bf0a9efd73ac853bc595c300a3c4f69bb
                                                  • Instruction Fuzzy Hash: 51C13A71A002698BDF14CF68C4905EEB7B2FF99314F26827AD856B7380D7346952CF94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                  • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                  • SetTextColor.GDI32(00000000,?), ref: 00401130
                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                  • DrawTextA.USER32(00000000,Instalao do MegaJogos ,000000FF,00000010,00000820), ref: 00401156
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                  • String ID: F$Instalao do MegaJogos
                                                  • API String ID: 941294808-3151221053
                                                  • Opcode ID: 3029600e7a8438bcc5a7b1f7b0fc9c629607e2b31f65c15310fafe19c7710355
                                                  • Instruction ID: 226a36137513f208ef2a020474f107b038e547e09bed9ebbc09fe29577f91b00
                                                  • Opcode Fuzzy Hash: 3029600e7a8438bcc5a7b1f7b0fc9c629607e2b31f65c15310fafe19c7710355
                                                  • Instruction Fuzzy Hash: C0419B71804249AFCF058FA5CD459BFBFB9FF44314F00812AF952AA1A0C738AA51DFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00405D2E: GetModuleHandleA.KERNEL32(?,?,00000000,0040313D,00000008), ref: 00405D40
                                                    • Part of subcall function 00405D2E: LoadLibraryA.KERNELBASE(?,?,00000000,0040313D,00000008), ref: 00405D4B
                                                    • Part of subcall function 00405D2E: GetProcAddress.KERNEL32(00000000,?), ref: 00405D5C
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,00000001,?,00000000,?,?,004054EF,?,00000000,000000F1,?), ref: 004057A7
                                                  • GetShortPathNameA.KERNEL32(?,0042C170,00000400), ref: 004057B0
                                                  • GetShortPathNameA.KERNEL32(00000000,0042BBE8,00000400), ref: 004057CD
                                                  • wsprintfA.USER32 ref: 004057EB
                                                  • GetFileSize.KERNEL32(00000000,00000000,0042BBE8,C0000000,00000004,0042BBE8,?,?,?,00000000,000000F1,?), ref: 00405826
                                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,00000000,000000F1,?), ref: 00405835
                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,000000F1,?), ref: 0040584B
                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,?,0042B7E8,00000000,-0000000A,00409330,00000000,[Rename],?,?,00000000,000000F1,?), ref: 00405891
                                                  • WriteFile.KERNEL32(00000000,00000000,?,?,00000000,?,?,00000000,000000F1,?), ref: 004058A3
                                                  • GlobalFree.KERNEL32(00000000), ref: 004058AA
                                                  • CloseHandle.KERNEL32(00000000,?,?,00000000,000000F1,?), ref: 004058B1
                                                    • Part of subcall function 00405658: lstrlenA.KERNEL32(00000000,?,00000000,00000000,00405866,00000000,[Rename],?,?,00000000,000000F1,?), ref: 0040565F
                                                    • Part of subcall function 00405658: lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,00405866,00000000,[Rename],?,?,00000000,000000F1,?), ref: 0040568F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: File$Handle$CloseGlobalNamePathShortlstrlen$AddressAllocFreeLibraryLoadModulePointerProcReadSizeWritewsprintf
                                                  • String ID: %s=%s$[Rename]
                                                  • API String ID: 3772915668-1727408572
                                                  • Opcode ID: d6848731387948ff75e39ed6852cb277ecc17c22ae43fa64dc91eb97f8f45519
                                                  • Instruction ID: 426fb2abaf3c2c6495405564ff4e517f65c757b77f6bed08917e1be6c8ffeb7f
                                                  • Opcode Fuzzy Hash: d6848731387948ff75e39ed6852cb277ecc17c22ae43fa64dc91eb97f8f45519
                                                  • Instruction Fuzzy Hash: 6341FF32606B15ABE3206B619C49F6B3A5CDF80705F004436FD05F62C2E678E8118EBD
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • wsprintfA.USER32 ref: 1000265F
                                                  • GlobalAlloc.KERNEL32(00000040,?,?,?,?,00000000,00000001,10001A8A,00000000), ref: 10002677
                                                  • StringFromGUID2.OLE32(?,00000000,?,?,?,?,00000000,00000001,10001A8A,00000000), ref: 1000268A
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000000,00000001,10001A8A,00000000), ref: 1000269F
                                                  • GlobalFree.KERNEL32(00000000), ref: 100026A6
                                                    • Part of subcall function 1000160E: lstrcpyA.KERNEL32(-10004047,00000000,?,1000118F,?,00000000), ref: 10001636
                                                  • GlobalFree.KERNEL32(?), ref: 10002728
                                                  • GlobalFree.KERNEL32(00000000), ref: 10002751
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2906916090.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                  • Associated: 00000000.00000002.2906890423.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906940489.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906964895.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Global$Free$AllocByteCharFromMultiStringWidelstrcpywsprintf
                                                  • String ID:
                                                  • API String ID: 2278267121-0
                                                  • Opcode ID: f2d90fb7604344b88e62606892e29dab83ffb9f5e480ef13eb80547e1e232e8e
                                                  • Instruction ID: 08b3d8036d164c5881487be7a8a394305a4816547ccba51f0c52e2d45aca7b17
                                                  • Opcode Fuzzy Hash: f2d90fb7604344b88e62606892e29dab83ffb9f5e480ef13eb80547e1e232e8e
                                                  • Instruction Fuzzy Hash: 97419D71109555EFF712DF24CC88E2BBBEDFB843C0B124519FA45C616DDB32AC509A21
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrlenA.KERNEL32(?), ref: 100024F5
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 1000251F
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 10002537
                                                  • GlobalAlloc.KERNEL32(00000040,00000010), ref: 10002546
                                                  • CLSIDFromString.OLE32(00000000,00000000), ref: 10002553
                                                  • GlobalFree.KERNEL32(00000000), ref: 1000255A
                                                  • GlobalFree.KERNEL32(00000000), ref: 1000258E
                                                    • Part of subcall function 10001550: lstrcpyA.KERNEL32(00000000,?,10001607,?,100011A1,-000000A0), ref: 1000155A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2906916090.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                  • Associated: 00000000.00000002.2906890423.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906940489.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906964895.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpylstrlen
                                                  • String ID: @Hmu
                                                  • API String ID: 520554397-887474944
                                                  • Opcode ID: 73698bcf168bc25748ca8d9a57d83aa9733e480b4e517d970f119df6c2bd3c01
                                                  • Instruction ID: 5e8646e4445d362173c86146a51869b75f136194909619477c3c659b9c9ef311
                                                  • Opcode Fuzzy Hash: 73698bcf168bc25748ca8d9a57d83aa9733e480b4e517d970f119df6c2bd3c01
                                                  • Instruction Fuzzy Hash: 5041BB71505B02DFF324CF248C94B6AB7F8FB443E2F614919F946DA189DB70E8808B66
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CharNextA.USER32(?,*?|<>/":,00000000,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030D2,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405CC6
                                                  • CharNextA.USER32(?,?,?,00000000), ref: 00405CD3
                                                  • CharNextA.USER32(?,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030D2,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405CD8
                                                  • CharPrevA.USER32(?,?,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030D2,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405CE8
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405C6F, 00405CAA
                                                  • "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe", xrefs: 00405C74
                                                  • *?|<>/":, xrefs: 00405CB6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Char$Next$Prev
                                                  • String ID: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 589700163-923893557
                                                  • Opcode ID: 5aa71b13a4eda0142438c40892e2bf660e792717ed83394db4a483eb7dc85cb7
                                                  • Instruction ID: 3b67653c5ee308ebbdbeafcda2e7905df7fa5ba98b11233f7c0ae47683edab57
                                                  • Opcode Fuzzy Hash: 5aa71b13a4eda0142438c40892e2bf660e792717ed83394db4a483eb7dc85cb7
                                                  • Instruction Fuzzy Hash: 0811905180CB912EFB3206245D44BB7BF89CB567A0F58447BE9C5B22C2CA7C5C429A6D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetWindowLongA.USER32(?,000000EB), ref: 00403E42
                                                  • GetSysColor.USER32(00000000), ref: 00403E5E
                                                  • SetTextColor.GDI32(?,00000000), ref: 00403E6A
                                                  • SetBkMode.GDI32(?,?), ref: 00403E76
                                                  • GetSysColor.USER32(?), ref: 00403E89
                                                  • SetBkColor.GDI32(?,?), ref: 00403E99
                                                  • DeleteObject.GDI32(?), ref: 00403EB3
                                                  • CreateBrushIndirect.GDI32(?), ref: 00403EBD
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                  • String ID:
                                                  • API String ID: 2320649405-0
                                                  • Opcode ID: 54c4c26d0880f537c7164b4e2121e342b47f232b14c6c2566c024284623f766e
                                                  • Instruction ID: df06335cf3b4afc37a3544ae2d30c5d34a8579c70edf0d6bae8496df32602c64
                                                  • Opcode Fuzzy Hash: 54c4c26d0880f537c7164b4e2121e342b47f232b14c6c2566c024284623f766e
                                                  • Instruction Fuzzy Hash: DC219671904709ABCB219F78DD08B4B7FF8AF00715F048A29F855E22E0D338E904CB95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,0001A200,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 004026D0
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,000000F0), ref: 004026EC
                                                  • GlobalFree.KERNEL32(?), ref: 00402725
                                                  • WriteFile.KERNEL32(FFFFFD66,00000000,?,FFFFFD66,?,?,?,?,000000F0), ref: 00402737
                                                  • GlobalFree.KERNEL32(00000000), ref: 0040273E
                                                  • CloseHandle.KERNEL32(FFFFFD66,?,?,000000F0), ref: 00402756
                                                  • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 0040276A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                  • String ID:
                                                  • API String ID: 3294113728-0
                                                  • Opcode ID: 127149d4f0cce16dfe4a3af1efdcab4b76b2a353eb8979ce4d539156ac24bc73
                                                  • Instruction ID: 62f2159171fbc9033078dd1539b67ba065abfcd1800d5973976be9d0b9eda31e
                                                  • Opcode Fuzzy Hash: 127149d4f0cce16dfe4a3af1efdcab4b76b2a353eb8979ce4d539156ac24bc73
                                                  • Instruction Fuzzy Hash: DE319F71C00128BBDF216FA5CD89EAE7E78EF04364F10422AF524772E0C7795D419BA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrlenA.KERNEL32(004297B8,00000000,0041B788,74DF23A0,?,?,?,?,?,?,?,?,?,00402FB6,00000000,?), ref: 00404DE3
                                                  • lstrlenA.KERNEL32(00402FB6,004297B8,00000000,0041B788,74DF23A0,?,?,?,?,?,?,?,?,?,00402FB6,00000000), ref: 00404DF3
                                                  • lstrcatA.KERNEL32(004297B8,00402FB6,00402FB6,004297B8,00000000,0041B788,74DF23A0), ref: 00404E06
                                                  • SetWindowTextA.USER32(004297B8,004297B8), ref: 00404E18
                                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404E3E
                                                  • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404E58
                                                  • SendMessageA.USER32(?,00001013,?,00000000), ref: 00404E66
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                  • String ID:
                                                  • API String ID: 2531174081-0
                                                  • Opcode ID: 9ef0e2670907023d07375e8b034d823c091f4981704811d48de470d933e2da59
                                                  • Instruction ID: 64f14355eea1465708e63b557f2fc924fecf56a011f776fb8de10cf69f9f2b8c
                                                  • Opcode Fuzzy Hash: 9ef0e2670907023d07375e8b034d823c091f4981704811d48de470d933e2da59
                                                  • Instruction Fuzzy Hash: F7216071A00118BBDB119FA9DD85ADEBFA9FF44354F14807AF904B6290C7398E418F98
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404694
                                                  • GetMessagePos.USER32 ref: 0040469C
                                                  • ScreenToClient.USER32(?,?), ref: 004046B6
                                                  • SendMessageA.USER32(?,00001111,00000000,?), ref: 004046C8
                                                  • SendMessageA.USER32(?,0000110C,00000000,?), ref: 004046EE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Message$Send$ClientScreen
                                                  • String ID: f
                                                  • API String ID: 41195575-1993550816
                                                  • Opcode ID: 2a5698d5089c35727aab5c3c5da7bcfb0b51a0b1d2cb1bbeaafe9db8233e3477
                                                  • Instruction ID: b5388fb2048f9adb4f66bcd81e9da03b2d8faafec29f08353259a6dacb87349b
                                                  • Opcode Fuzzy Hash: 2a5698d5089c35727aab5c3c5da7bcfb0b51a0b1d2cb1bbeaafe9db8233e3477
                                                  • Instruction Fuzzy Hash: 0E014071D00219BADB00DB94DC45BEEBBB8AB59711F10016ABA11B61C0D7B865418BA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402B56
                                                  • MulDiv.KERNEL32(000DF57B,00000064,000E20E8), ref: 00402B81
                                                  • wsprintfA.USER32 ref: 00402B91
                                                  • SetWindowTextA.USER32(?,?), ref: 00402BA1
                                                  • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BB3
                                                  Strings
                                                  • verifying installer: %d%%, xrefs: 00402B8B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                  • String ID: verifying installer: %d%%
                                                  • API String ID: 1451636040-82062127
                                                  • Opcode ID: fb9d5c419c19e2bdb6c378f6819b1ebc1dc21d5e7d0f0b4f2b85ce684f360012
                                                  • Instruction ID: 3d98ddf4d84b742d5460afe4edfb6d9be597fa80bf04213b3bc288f28cb5f5da
                                                  • Opcode Fuzzy Hash: fb9d5c419c19e2bdb6c378f6819b1ebc1dc21d5e7d0f0b4f2b85ce684f360012
                                                  • Instruction Fuzzy Hash: 82014470A40209ABDB209F60DD09FAE3779BB04345F008039FA06A92D1D7B8AA558F99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • RegCreateKeyExA.ADVAPI32(00000000,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 00402341
                                                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsf620C.tmp,00000023,?,?,?,00000000,?,?,?,00000011,00000002), ref: 00402361
                                                  • RegSetValueExA.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsf620C.tmp,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 0040239A
                                                  • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsf620C.tmp,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 0040247D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateValuelstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsf620C.tmp
                                                  • API String ID: 1356686001-274236517
                                                  • Opcode ID: feee39b2995d5713698e39181d4267c001e0350d88117aa5d933f9716d921611
                                                  • Instruction ID: 74c2b7e5efa1a9b7d251dd878628ee018497e02546d33d1ea7114f4406d6c15c
                                                  • Opcode Fuzzy Hash: feee39b2995d5713698e39181d4267c001e0350d88117aa5d933f9716d921611
                                                  • Instruction Fuzzy Hash: 721160B1E00209BFEB10AFA5DE89EAF767CFB40398F10453AF901B71D0D6B85D019669
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetWindowTextA.USER32(00000000,Instalao do MegaJogos ), ref: 004038B6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: TextWindow
                                                  • String ID: 1046$<{x$C:\Users\user\AppData\Local\Temp\$Instalao do MegaJogos
                                                  • API String ID: 530164218-4179805400
                                                  • Opcode ID: 54cba3151bdb836b7f04a6f3dbbe3676eed0e5b9ffc4346e82b5f0bc9fe969d0
                                                  • Instruction ID: f58d08b88b77c55e92e539ad5181c9965f6bbcffbd0d008a8b371c472e4a47a6
                                                  • Opcode Fuzzy Hash: 54cba3151bdb836b7f04a6f3dbbe3676eed0e5b9ffc4346e82b5f0bc9fe969d0
                                                  • Instruction Fuzzy Hash: 9311D176B001009BC734EF56DC809737BADEB8471636881BFEC02A7390D639A8038A98
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 10001561: lstrcpyA.KERNEL32(00000000,?,?,?,10001804,?,10001017), ref: 1000157E
                                                    • Part of subcall function 10001561: GlobalFree.KERNEL32 ref: 1000158F
                                                  • GlobalFree.KERNEL32(?), ref: 10001B41
                                                  • GlobalFree.KERNEL32(?), ref: 10001CCD
                                                  • GlobalFree.KERNEL32(?), ref: 10001CD2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2906916090.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                  • Associated: 00000000.00000002.2906890423.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906940489.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906964895.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: FreeGlobal$lstrcpy
                                                  • String ID:
                                                  • API String ID: 176019282-0
                                                  • Opcode ID: 16e7fc8dfb2109add019363551953530b2221b6c08ce197826e595f4a50a0593
                                                  • Instruction ID: ec181f717125864b891e508b79773b0a6be540bcfc5555760108aa08b7b6b632
                                                  • Opcode Fuzzy Hash: 16e7fc8dfb2109add019363551953530b2221b6c08ce197826e595f4a50a0593
                                                  • Instruction Fuzzy Hash: DD510332D84159EBFB22CFA48880EEDB7E5EF812C4FA24159E801A311DD771EE009B52
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • RegOpenKeyExA.ADVAPI32(?,?,00000000,00000000,?), ref: 00402A57
                                                  • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402A93
                                                  • RegCloseKey.ADVAPI32(?), ref: 00402A9C
                                                  • RegCloseKey.ADVAPI32(?), ref: 00402AC1
                                                  • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402ADF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Close$DeleteEnumOpen
                                                  • String ID:
                                                  • API String ID: 1912718029-0
                                                  • Opcode ID: b26b43b9b7666f40e9fdb218fe96b22a79156d573bb7d5cc257a1d138f5a7564
                                                  • Instruction ID: 324dab2b24170647655e9dcbeda369d8ff673eed47d89bab0de13a8960c84090
                                                  • Opcode Fuzzy Hash: b26b43b9b7666f40e9fdb218fe96b22a79156d573bb7d5cc257a1d138f5a7564
                                                  • Instruction Fuzzy Hash: 4F115675A00008FFEF31AF91DE49DAB7B6DEB40384B104436FA05B10A0DBB59E51AE69
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgItem.USER32(?), ref: 00401CC5
                                                  • GetClientRect.USER32(00000000,?), ref: 00401CD2
                                                  • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401CF3
                                                  • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D01
                                                  • DeleteObject.GDI32(00000000), ref: 00401D10
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                  • String ID:
                                                  • API String ID: 1849352358-0
                                                  • Opcode ID: bcf2014c00065f5201b430a5429a32b7385cfa622623bd2341514d29d8348619
                                                  • Instruction ID: f89edaf4e673e5a696cf4c500be88082f9c29b5fdabb6c66a10e118bddb835aa
                                                  • Opcode Fuzzy Hash: bcf2014c00065f5201b430a5429a32b7385cfa622623bd2341514d29d8348619
                                                  • Instruction Fuzzy Hash: 71F01DB2E04105BFD700EBA4EE89DAFB7BDEB44345B104576F602F6190C678AD018B69
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrlenA.KERNEL32(00429FE0,00429FE0,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004044B7,000000DF,0000040F,00000400,00000000), ref: 00404625
                                                  • wsprintfA.USER32 ref: 0040462D
                                                  • SetDlgItemTextA.USER32(?,00429FE0), ref: 00404640
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ItemTextlstrlenwsprintf
                                                  • String ID: %u.%u%s%s
                                                  • API String ID: 3540041739-3551169577
                                                  • Opcode ID: 578a37cc82449f790b84d9ba049d0e77a25ba7e856f263b49df89ba90d0e0462
                                                  • Instruction ID: a73c68329ee831a229c644748369bffc84c82a565a353c3d841dc2820e0c3950
                                                  • Opcode Fuzzy Hash: 578a37cc82449f790b84d9ba049d0e77a25ba7e856f263b49df89ba90d0e0462
                                                  • Instruction Fuzzy Hash: 9911D0737001243BDB10A66D9C46EEF329ADBC6334F14023BFA25F61D1E9388C5286E8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C0D
                                                  • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C25
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Timeout
                                                  • String ID: !
                                                  • API String ID: 1777923405-2657877971
                                                  • Opcode ID: 5e77a80833e19dc55b8a20fadec5ab0659a97bc6c71de6bcb2193ca436d8299f
                                                  • Instruction ID: e870f9960eb541ab862ab70d99fa676f0883abea00e9f1964bf1c40a5587cb5b
                                                  • Opcode Fuzzy Hash: 5e77a80833e19dc55b8a20fadec5ab0659a97bc6c71de6bcb2193ca436d8299f
                                                  • Instruction Fuzzy Hash: 3B21C4B1A44209BFEF01AFB4CE4AAAE7B75EF40344F14053EF602B60D1D6B84980E718
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,0042BFE8,Error launching installer), ref: 00405291
                                                  • CloseHandle.KERNEL32(?), ref: 0040529E
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 0040526C
                                                  • Error launching installer, xrefs: 0040527F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateHandleProcess
                                                  • String ID: C:\Users\user\AppData\Local\Temp\$Error launching installer
                                                  • API String ID: 3712363035-1785902839
                                                  • Opcode ID: dc33ac1254d82063a7b9e43172f0f507123e59eb9c5a5fd92b1179a08dc1bdb0
                                                  • Instruction ID: 9c205d3d1494e9e4afb0e3639077779a104ecf70f113e6d393e41fe649cd8d97
                                                  • Opcode Fuzzy Hash: dc33ac1254d82063a7b9e43172f0f507123e59eb9c5a5fd92b1179a08dc1bdb0
                                                  • Instruction Fuzzy Hash: FBE0ECB4A04209ABEB00EF64ED09D7B7BBCEB00304B408522A911E2290D778E410CEB9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004030E4,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405505
                                                  • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004030E4,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 0040550E
                                                  • lstrcatA.KERNEL32(?,00409010), ref: 0040551F
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 004054FF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CharPrevlstrcatlstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 2659869361-3081826266
                                                  • Opcode ID: f17b2ccdaa8efd10834e0f4341d4d5b977b2bb6e8559feba5c8cad9ccc1df0ef
                                                  • Instruction ID: dfec000a3f5bf2671270dd29e8f8c50a5f72ee918dd093ba8f25731816a648b4
                                                  • Opcode Fuzzy Hash: f17b2ccdaa8efd10834e0f4341d4d5b977b2bb6e8559feba5c8cad9ccc1df0ef
                                                  • Instruction Fuzzy Hash: FCD0A972705A307ED2022A19AC06F8F2A88CF17301B044822F100B62D2C23C9E418FFE
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetFileVersionInfoSizeA.VERSION(00000000,?,000000EE), ref: 00401ED4
                                                  • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401EF2
                                                  • GetFileVersionInfoA.VERSION(?,?,?,00000000), ref: 00401F0B
                                                  • VerQueryValueA.VERSION(?,00409010,?,?,?,?,?,00000000), ref: 00401F24
                                                    • Part of subcall function 0040596A: wsprintfA.USER32 ref: 00405977
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                                  • String ID:
                                                  • API String ID: 1404258612-0
                                                  • Opcode ID: 099a0aa409c47306a0e5e8436e4e2e7c61bc24b53b401cebe12c2d8cce08dfb0
                                                  • Instruction ID: ac83c8b0d38e5b491d5bd27050ffdb4091974a4b49ad9b19d675067d3fb65d11
                                                  • Opcode Fuzzy Hash: 099a0aa409c47306a0e5e8436e4e2e7c61bc24b53b401cebe12c2d8cce08dfb0
                                                  • Instruction Fuzzy Hash: 201148B2900108BFDB01EFA5D981DAEBBB9EF04344B24807AF505F61E1D7389A54DB28
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CharNextA.USER32(ES@,?,0042B3E8,00000000,004055F7,0042B3E8,0042B3E8,?,?,00000000,00405345,?,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe",00000000), ref: 004055A1
                                                  • CharNextA.USER32(00000000), ref: 004055A6
                                                  • CharNextA.USER32(00000000), ref: 004055B5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CharNext
                                                  • String ID: ES@
                                                  • API String ID: 3213498283-1851447614
                                                  • Opcode ID: 68c7f773aafbecf3834176a21eebbfbca0b4bda0270daf5a8c718fc322178301
                                                  • Instruction ID: f60ec20427defc95a9886ae099bd540e39d30c8fbbaad3333d1940da6ed1a81e
                                                  • Opcode Fuzzy Hash: 68c7f773aafbecf3834176a21eebbfbca0b4bda0270daf5a8c718fc322178301
                                                  • Instruction Fuzzy Hash: F8F0A7A2D44B25B6E73222A84C44B6B6BADDB55711F244437E200B61D597B84C828FBA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDC.USER32(?), ref: 00401D22
                                                  • GetDeviceCaps.GDI32(00000000), ref: 00401D29
                                                  • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D38
                                                  • CreateFontIndirectA.GDI32(0040AF84), ref: 00401D8A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CapsCreateDeviceFontIndirect
                                                  • String ID:
                                                  • API String ID: 3272661963-0
                                                  • Opcode ID: 4c009d8e42cd314c12390cccfdb28b49937efeaf870ca6d05dd4fe7a3002520f
                                                  • Instruction ID: 580b179190550232f88f4ba5e52f5296c98f8c4b0afe68c870f47754878f2485
                                                  • Opcode Fuzzy Hash: 4c009d8e42cd314c12390cccfdb28b49937efeaf870ca6d05dd4fe7a3002520f
                                                  • Instruction Fuzzy Hash: 68F044F1A45342AEE702A7B0AE4B7993B649725309F100436F545BA1E2C5BC00149B7F
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DestroyWindow.USER32(00000000,00000000,00402D9E,00000001), ref: 00402BD1
                                                  • GetTickCount.KERNEL32 ref: 00402BEF
                                                  • CreateDialogParamA.USER32(0000006F,00000000,00402B3B,00000000), ref: 00402C0C
                                                  • ShowWindow.USER32(00000000,00000005), ref: 00402C1A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                  • String ID:
                                                  • API String ID: 2102729457-0
                                                  • Opcode ID: c87a5157f8204693ca179b822d2a85440fc20d6be017f85e77c31dbe1d2c93c5
                                                  • Instruction ID: df45f881ccb5ca36463c1a09230da8cf23750fca8468dec1cd15007da7f5e5e8
                                                  • Opcode Fuzzy Hash: c87a5157f8204693ca179b822d2a85440fc20d6be017f85e77c31dbe1d2c93c5
                                                  • Instruction Fuzzy Hash: 22F0F430A09120EBC6716F95FD4C99B7F64E704B157504437F001B55F5D67878829B9D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • IsWindowVisible.USER32(?), ref: 00404D30
                                                  • CallWindowProcA.USER32(?,00000200,?,?), ref: 00404D9E
                                                    • Part of subcall function 00403E0A: SendMessageA.USER32(00010444,00000000,00000000,00000000), ref: 00403E1C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Window$CallMessageProcSendVisible
                                                  • String ID:
                                                  • API String ID: 3748168415-3916222277
                                                  • Opcode ID: 498d22ec92de87507460055f31d3341dd140a7d0c04a54d74523ea2b6bf50dd0
                                                  • Instruction ID: b16bf2df46199d4e0f4b20eb531931f7d117dfa55111be6f57691eac5a9fa7e0
                                                  • Opcode Fuzzy Hash: 498d22ec92de87507460055f31d3341dd140a7d0c04a54d74523ea2b6bf50dd0
                                                  • Instruction Fuzzy Hash: 25114F71600218BBDB219F52DC41AAB3B69AF84365F00813FFA04B91E1C37D8D51CFA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrlenA.KERNEL32(00000000,00000011), ref: 004024DC
                                                  • WriteFile.KERNEL32(00000000,?,C:\Users\user\AppData\Local\Temp\nsf620C.tmp\System.dll,00000000,?,?,00000000,00000011), ref: 004024FB
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\nsf620C.tmp\System.dll, xrefs: 004024CA, 004024EF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: FileWritelstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsf620C.tmp\System.dll
                                                  • API String ID: 427699356-3980397305
                                                  • Opcode ID: 737d5f13839744d6a9d30165a229b9e08489258fe4ae5c83f7ff32dd2acb6c44
                                                  • Instruction ID: 266b505f4b4a70e0031bd9b61304a7f29979de1156be46298b6644775383f0d6
                                                  • Opcode Fuzzy Hash: 737d5f13839744d6a9d30165a229b9e08489258fe4ae5c83f7ff32dd2acb6c44
                                                  • Instruction Fuzzy Hash: 70F0B4B2B04201AFDB00EBA19E49AAF36589B40348F14443BB142F50C2D6BC4941AB6D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • OleInitialize.OLE32(00000000), ref: 00404E8C
                                                    • Part of subcall function 00403E0A: SendMessageA.USER32(00010444,00000000,00000000,00000000), ref: 00403E1C
                                                  • OleUninitialize.OLE32(00000404,00000000), ref: 00404ED8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: InitializeMessageSendUninitialize
                                                  • String ID: <{x
                                                  • API String ID: 2896919175-1076206805
                                                  • Opcode ID: 40dbed6342c342f19cf155c60ec5393d5941e5f8c4ce0c4d617a2ddd15e81d86
                                                  • Instruction ID: 553340d25051964c1d9f2091c6121c40533f6be98ef284e5afc8434be7077bea
                                                  • Opcode Fuzzy Hash: 40dbed6342c342f19cf155c60ec5393d5941e5f8c4ce0c4d617a2ddd15e81d86
                                                  • Instruction Fuzzy Hash: 33F096B3A0820086E71197A6DD01B567BA4BBD4312F55403AFF45622E1D775584286DD
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FreeLibrary.KERNEL32(?,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe",00000000,00000000,00403498,004032EB,00000000), ref: 004034DA
                                                  • GlobalFree.KERNEL32(0077E438), ref: 004034E1
                                                  Strings
                                                  • "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe", xrefs: 004034D2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Free$GlobalLibrary
                                                  • String ID: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe"
                                                  • API String ID: 1100898210-2007186727
                                                  • Opcode ID: 46acf84ebda6383aa3704241e203cd439e3c816428f1e63aa7a51627b246d5e2
                                                  • Instruction ID: a7ab284cabc648ba81e11ba063b903b3b671d5f7e61a69f5101281db245b6d62
                                                  • Opcode Fuzzy Hash: 46acf84ebda6383aa3704241e203cd439e3c816428f1e63aa7a51627b246d5e2
                                                  • Instruction Fuzzy Hash: E1E08C329110209BD6221F05AE0575A7B6D6B44B32F02802AE9407B2A087746C424BDD
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402C8E,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe,80000000,00000003), ref: 0040554C
                                                  • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402C8E,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71996476.31717.4987.exe,80000000,00000003), ref: 0040555A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CharPrevlstrlen
                                                  • String ID: C:\Users\user\Desktop
                                                  • API String ID: 2709904686-224404859
                                                  • Opcode ID: 49376fbf8c9c30057c1bc985cc011eea510fd351d3a644e674ee9e82abf7fe19
                                                  • Instruction ID: fca702df0190f5d4796b13fce4c8f5ccfdab60c3fa8ed772e71c257c4247ae30
                                                  • Opcode Fuzzy Hash: 49376fbf8c9c30057c1bc985cc011eea510fd351d3a644e674ee9e82abf7fe19
                                                  • Instruction Fuzzy Hash: 39D0A772508EB07EE70366149C00B9F7A88CF13340F094462E040A61D4C27C4D418FFD
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 10001561: lstrcpyA.KERNEL32(00000000,?,?,?,10001804,?,10001017), ref: 1000157E
                                                    • Part of subcall function 10001561: GlobalFree.KERNEL32 ref: 1000158F
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 10001151
                                                  • GlobalFree.KERNEL32(00000000), ref: 100011AA
                                                  • GlobalFree.KERNEL32(?), ref: 100011BD
                                                  • GlobalFree.KERNEL32(?), ref: 100011EB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2906916090.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                  • Associated: 00000000.00000002.2906890423.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906940489.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906964895.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Global$Free$Alloclstrcpy
                                                  • String ID:
                                                  • API String ID: 852173138-0
                                                  • Opcode ID: 63b0637edc7530645d46bec010932f639f2f746b6ed29226dfb72de0ebfb049a
                                                  • Instruction ID: ed341c900a7ce6bdf815d06216e218db22d2bbb6d3afa64795f6a6593979f754
                                                  • Opcode Fuzzy Hash: 63b0637edc7530645d46bec010932f639f2f746b6ed29226dfb72de0ebfb049a
                                                  • Instruction Fuzzy Hash: D031BCB5404655AFF705CF64DCC9BEA7FFCEB092D1B164029FA45D626CEB3099008B64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrlenA.KERNEL32(00000000,?,00000000,00000000,00405866,00000000,[Rename],?,?,00000000,000000F1,?), ref: 0040565F
                                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405678
                                                  • CharNextA.USER32(00000000,?,?,00000000,000000F1,?), ref: 00405686
                                                  • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,00405866,00000000,[Rename],?,?,00000000,000000F1,?), ref: 0040568F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2905963439.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2905935384.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2905989660.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906014473.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2906120634.0000000000439000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                  • String ID:
                                                  • API String ID: 190613189-0
                                                  • Opcode ID: 0108cf067d6f6d80c8ed850288af8a4b3b9133f156f8bdff26d83f0dd252fb59
                                                  • Instruction ID: fee4d645b7b415a6dc1afaac75e8b1817c7eae67fc86a6e8a33b60f3285d70db
                                                  • Opcode Fuzzy Hash: 0108cf067d6f6d80c8ed850288af8a4b3b9133f156f8bdff26d83f0dd252fb59
                                                  • Instruction Fuzzy Hash: 05F0A736309D519AC2125B295C04A6F6A98EF91314B58097AF444F2140E33A9C119BBF
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%