Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Setup_x86.exe

Overview

General Information

Sample name:Setup_x86.exe
Analysis ID:1510208
MD5:082affcde6ca901604f231478fa478bc
SHA1:6d99b489ae327ee594e6e32cce43c5ccbeae103a
SHA256:c1be908ddb3f7fb95aa3f6e53ac6c6415cb344ccc528719462d95b05a95d0339
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Multi AV Scanner detection for submitted file
Checks for available system drives (often done to infect USB drives)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Setup_x86.exe (PID: 5700 cmdline: "C:\Users\user\Desktop\Setup_x86.exe" MD5: 082AFFCDE6CA901604F231478FA478BC)
    • msiexec.exe (PID: 5052 cmdline: msiexec.exe /i "MATRIX.msi" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • msiexec.exe (PID: 5972 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 7120 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 08F32C09D8E409B79A08038C54E7DD5E C MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\user\AppData\Local\Scienta Omicron\Installer\{4B7066F8-B6E1-4A46-BF42-5395F35020B9}\MATRIX.msiAvira: detection malicious, Label: APPL/TFTPD.wdona
Source: Setup_x86.exeReversingLabs: Detection: 58%
Source: Setup_x86.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: Setup_x86.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: E:\PkgInstaller\base\ntsetup\SrvPack.Main\tools\sfxcab\sfxcab\objfre\i386\sfxcab.pdb source: Setup_x86.exe, 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmp
Source: Binary string: E:\PkgInstaller\base\ntsetup\SrvPack.Main\tools\sfxcab\sfxcab\objfre\i386\sfxcab.pdbU source: Setup_x86.exe, 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmp
Source: Binary string: h:\nt.obj.x86fre\base\wcp\tools\msmcustomaction\objfre\i386\msmcustomaction.pdb source: MATRIX.msi.0.dr
Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: c:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
Source: C:\Users\user\Desktop\Setup_x86.exeCode function: 0_2_0040603A FindFirstFileA,FindClose,0_2_0040603A
Source: C:\Users\user\Desktop\Setup_x86.exeCode function: 0_2_004055F6 CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004055F6
Source: C:\Users\user\Desktop\Setup_x86.exeCode function: 0_2_00402645 FindFirstFileA,0_2_00402645
Source: MATRIX.msi.0.dr, nsh4356.tmp.0.drString found in binary or memory: http://community.installshield.com/showthread.php?t=125455&highlight=update
Source: nsh4356.tmp.0.drString found in binary or memory: http://dennisbareis.com/makemsi.htm)
Source: MATRIX.msi.0.dr, nsh4356.tmp.0.drString found in binary or memory: http://dennisbareis.com/ppwizard.htm
Source: Setup_x86.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
Source: Setup_x86.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: MATRIX.msi.0.dr, nsh4356.tmp.0.drString found in binary or memory: http://www.installsite.org/pages/en/msi/articles/MultiListBox/index.htm
Source: MATRIX.msi.0.dr, nsh4356.tmp.0.drString found in binary or memory: http://www.scientaomicron.com/ARPURLINFOABOUTProductVersionMATRIX
Source: C:\Users\user\Desktop\Setup_x86.exeCode function: 0_2_0040515D GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040515D
Source: C:\Users\user\Desktop\Setup_x86.exeCode function: 0_2_00403217 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_00403217
Source: C:\Users\user\Desktop\Setup_x86.exeCode function: 0_2_004063100_2_00406310
Source: C:\Users\user\Desktop\Setup_x86.exeCode function: 0_2_0040499C0_2_0040499C
Source: Setup_x86.exe, 00000000.00000000.2048711336.000000000042D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSetup.exe4 vs Setup_x86.exe
Source: Setup_x86.exeBinary or memory string: OriginalFilenameSetup.exe4 vs Setup_x86.exe
Source: Setup_x86.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: Setup_x86.exeBinary or memory string: !!.sLnE
Source: classification engineClassification label: mal56.winEXE@6/5@0/0
Source: C:\Users\user\Desktop\Setup_x86.exeCode function: 0_2_0040442A GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_0040442A
Source: C:\Users\user\Desktop\Setup_x86.exeCode function: 0_2_00402036 CoCreateInstance,MultiByteToWideChar,0_2_00402036
Source: C:\Users\user\Desktop\Setup_x86.exeFile created: C:\Users\user\AppData\Local\Scienta OmicronJump to behavior
Source: C:\Users\user\Desktop\Setup_x86.exeMutant created: \Sessions\1\BaseNamedObjects\Setup.exe
Source: C:\Users\user\Desktop\Setup_x86.exeFile created: C:\Users\user\AppData\Local\Temp\nsr420D.tmpJump to behavior
Source: Setup_x86.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Setup_x86.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\Setup_x86.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\Setup_x86.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Setup_x86.exeReversingLabs: Detection: 58%
Source: C:\Users\user\Desktop\Setup_x86.exeFile read: C:\Users\user\Desktop\Setup_x86.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\Setup_x86.exe "C:\Users\user\Desktop\Setup_x86.exe"
Source: C:\Users\user\Desktop\Setup_x86.exeProcess created: C:\Windows\SysWOW64\msiexec.exe msiexec.exe /i "MATRIX.msi"
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 08F32C09D8E409B79A08038C54E7DD5E C
Source: C:\Users\user\Desktop\Setup_x86.exeProcess created: C:\Windows\SysWOW64\msiexec.exe msiexec.exe /i "MATRIX.msi" Jump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 08F32C09D8E409B79A08038C54E7DD5E CJump to behavior
Source: C:\Users\user\Desktop\Setup_x86.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_x86.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_x86.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_x86.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_x86.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_x86.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_x86.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_x86.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msihnd.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\Setup_x86.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: Setup_x86.exeStatic file information: File size 49308734 > 1048576
Source: Setup_x86.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: E:\PkgInstaller\base\ntsetup\SrvPack.Main\tools\sfxcab\sfxcab\objfre\i386\sfxcab.pdb source: Setup_x86.exe, 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmp
Source: Binary string: E:\PkgInstaller\base\ntsetup\SrvPack.Main\tools\sfxcab\sfxcab\objfre\i386\sfxcab.pdbU source: Setup_x86.exe, 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmp
Source: Binary string: h:\nt.obj.x86fre\base\wcp\tools\msmcustomaction\objfre\i386\msmcustomaction.pdb source: MATRIX.msi.0.dr
Source: C:\Users\user\Desktop\Setup_x86.exeCode function: 0_2_00406061 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406061
Source: C:\Users\user\Desktop\Setup_x86.exeCode function: 0_2_10002D30 push eax; ret 0_2_10002D5E
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Users\user\Desktop\Setup_x86.exeFile created: C:\Users\user\AppData\Local\Temp\nsm4376.tmp\UserInfo.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup_x86.exeFile created: C:\Users\user\AppData\Local\Temp\nsm4376.tmp\version.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup_x86.exeFile created: C:\Users\user\AppData\Local\Temp\nsm4376.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup_x86.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Setup_x86.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsm4376.tmp\UserInfo.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup_x86.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsm4376.tmp\System.dllJump to dropped file
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\Setup_x86.exeCode function: 0_2_0040603A FindFirstFileA,FindClose,0_2_0040603A
Source: C:\Users\user\Desktop\Setup_x86.exeCode function: 0_2_004055F6 CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004055F6
Source: C:\Users\user\Desktop\Setup_x86.exeCode function: 0_2_00402645 FindFirstFileA,0_2_00402645
Source: Setup_x86.exeBinary or memory string: 9hgfSw
Source: C:\Users\user\Desktop\Setup_x86.exeAPI call chain: ExitProcess graph end nodegraph_0-4008
Source: C:\Users\user\Desktop\Setup_x86.exeAPI call chain: ExitProcess graph end nodegraph_0-4175
Source: C:\Users\user\Desktop\Setup_x86.exeCode function: 0_2_00406061 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406061
Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Setup_x86.exeCode function: 0_2_00405D58 GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405D58
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Replication Through Removable Media
1
Native API
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory11
Peripheral Device Discovery
Remote Desktop Protocol1
Clipboard Data
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Obfuscated Files or Information
Security Account Manager2
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Software Packing
NTDS14
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1510208 Sample: Setup_x86.exe Startdate: 12/09/2024 Architecture: WINDOWS Score: 56 23 Antivirus detection for dropped file 2->23 25 Multi AV Scanner detection for submitted file 2->25 6 Setup_x86.exe 22 2->6         started        9 msiexec.exe 2->9         started        process3 file4 15 C:\Users\user\AppData\Local\...\MATRIX.msi, Composite 6->15 dropped 17 C:\Users\user\AppData\Local\...\version.dll, PE32 6->17 dropped 19 C:\Users\user\AppData\Local\...\UserInfo.dll, PE32 6->19 dropped 21 C:\Users\user\AppData\Local\...\System.dll, PE32 6->21 dropped 11 msiexec.exe 5 6->11         started        13 msiexec.exe 1 9->13         started        process5

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Setup_x86.exe58%ReversingLabsWin32.PUA.Generic
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Scienta Omicron\Installer\{4B7066F8-B6E1-4A46-BF42-5395F35020B9}\MATRIX.msi100%AviraAPPL/TFTPD.wdona
C:\Users\user\AppData\Local\Temp\nsm4376.tmp\System.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsm4376.tmp\UserInfo.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsm4376.tmp\version.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
http://nsis.sf.net/NSIS_Error0%Avira URL Cloudsafe
http://dennisbareis.com/ppwizard.htm0%Avira URL Cloudsafe
http://www.installsite.org/pages/en/msi/articles/MultiListBox/index.htm0%Avira URL Cloudsafe
http://www.scientaomicron.com/ARPURLINFOABOUTProductVersionMATRIX0%Avira URL Cloudsafe
http://community.installshield.com/showthread.php?t=125455&highlight=update0%Avira URL Cloudsafe
http://dennisbareis.com/makemsi.htm)0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.scientaomicron.com/ARPURLINFOABOUTProductVersionMATRIXMATRIX.msi.0.dr, nsh4356.tmp.0.drfalse
  • Avira URL Cloud: safe
unknown
http://dennisbareis.com/ppwizard.htmMATRIX.msi.0.dr, nsh4356.tmp.0.drfalse
  • Avira URL Cloud: safe
unknown
http://community.installshield.com/showthread.php?t=125455&highlight=updateMATRIX.msi.0.dr, nsh4356.tmp.0.drfalse
  • Avira URL Cloud: safe
unknown
http://nsis.sf.net/NSIS_ErrorSetup_x86.exefalse
  • Avira URL Cloud: safe
unknown
http://nsis.sf.net/NSIS_ErrorErrorSetup_x86.exefalse
  • URL Reputation: safe
unknown
http://www.installsite.org/pages/en/msi/articles/MultiListBox/index.htmMATRIX.msi.0.dr, nsh4356.tmp.0.drfalse
  • Avira URL Cloud: safe
unknown
http://dennisbareis.com/makemsi.htm)nsh4356.tmp.0.drfalse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1510208
Start date and time:2024-09-12 17:18:28 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 34s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:7
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:Setup_x86.exe
Detection:MAL
Classification:mal56.winEXE@6/5@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 33
  • Number of non-executed functions: 36
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, 4.8.2.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.0.2.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • VT rate limit hit for: Setup_x86.exe
TimeTypeDescription
11:19:29API Interceptor1x Sleep call for process: msiexec.exe modified
No context
No context
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
C:\Users\user\AppData\Local\Temp\nsm4376.tmp\System.dllORDER.exeGet hashmaliciousFormBook, GuLoaderBrowse
    ORDER.exeGet hashmaliciousUnknownBrowse
      ulACwpUCSU.exeGet hashmaliciousFormBook, GuLoaderBrowse
        fJuwM4Bwi7.exeGet hashmaliciousFormBook, GuLoaderBrowse
          ulACwpUCSU.exeGet hashmaliciousGuLoaderBrowse
            fJuwM4Bwi7.exeGet hashmaliciousGuLoaderBrowse
              Factura 02297-23042024.exeGet hashmaliciousFormBook, GuLoaderBrowse
                anebilledes.exeGet hashmaliciousFormBook, GuLoaderBrowse
                  Factura 02297-23042024.exeGet hashmaliciousGuLoaderBrowse
                    anebilledes.exeGet hashmaliciousGuLoaderBrowse
                      C:\Users\user\AppData\Local\Temp\nsm4376.tmp\UserInfo.dll3443424611#U00b7pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        UTN RFP_24-0676#U00b7pdf.exeGet hashmaliciousGuLoader, LokibotBrowse
                          RFQ_22Q7305A-N23A-01#U00b7pdf.exeGet hashmaliciousRemcosBrowse
                            PLANT PROJECT PROPOSAL BID_24-0676#U00b7pdf.exeGet hashmaliciousGuLoader, LokibotBrowse
                              #U5e33#U55ae#U767c#U7968_200548224648#U00b7pdf.exeGet hashmaliciousRemcosBrowse
                                LHDNM TAKSIRAN 2023#U00b7pdf.exeGet hashmaliciousRemcosBrowse
                                  faktura_7171503997#U00b7pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                    Document BT24#U00b7pdf.exeGet hashmaliciousGuLoader, LokibotBrowse
                                      Quote Request (Tupy S.A.) 523AM - 924BR#U00b7pdf.exeGet hashmaliciousGuLoader, LokibotBrowse
                                        windows.10.codec.pack.v2.2.0.setup.exeGet hashmaliciousPrivateLoader, PureLog StealerBrowse
                                          Process:C:\Users\user\Desktop\Setup_x86.exe
                                          File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Keywords: Installer,MSI,Database, Code page: 1252, Name of Creating Application: MakeMsi version 11.087, a free tool by Dennis Bareis (http://dennisbareis.com/makemsi.htm), Security: 0, Revision Number: {FFD19FF1-CCA4-46B5-B657-67A96BD11AF3}, Template: Intel;1033, Number of Pages: 301, Title: MATRIX - V3.2.4, Subject: 00.00.00000.78 (created Thu Jul 2 2020 at 3:02:58pm), Number of Words: 2, Create Time/Date: Thu Jul 2 14:04:25 2020, Total Editing Time: Thu Jul 2 14:04:25 2020, Comments: This is the MATRIX Control System software., Author: Scienta Omicron GmbH, Last Saved By: Scienta Omicron GmbH
                                          Category:dropped
                                          Size (bytes):51146752
                                          Entropy (8bit):7.97957091801813
                                          Encrypted:false
                                          SSDEEP:1572864:kh91bDtxIr++knNw0Fdezv3ovM6zehC7vKvOj:kh91bDTI6+xkYzv3qgCcOj
                                          MD5:EE371347338C4533D6F4CBC99AD38CA8
                                          SHA1:453FD87D53D3BF666F8BEA66FC132F0E36B784E4
                                          SHA-256:A0AAD548683197D90B03316BA272C2CE5FB2B0CCB3AEC6A969001CD8BD5AED32
                                          SHA-512:94C9060B1A2C30C05D561E9178DD41C17B954E87480279C93358E50957E23A2E069F075B2CA7E2FF43CF549FBC59F231E1800D32F0224C889F61D991A42DA2DF
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Avira, Detection: 100%
                                          Reputation:low
                                          Preview:......................>............................................6........................................................................................................................................................................................................................................................................... ... ...!...!..."..."...#...#...$...$...%...%...&...&...'...'...(...(...)...)...*...*...+...+...,...,...-...-.........../.../...0...0...1...1...2...2...3...3...4...4...5...5.............................................................................................................................. ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                          Process:C:\Users\user\Desktop\Setup_x86.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):51220270
                                          Entropy (8bit):7.978955184192779
                                          Encrypted:false
                                          SSDEEP:1572864:+h91bDtxIr++knNw0Fdezv3ovM6zehC7vKvOjG:+h91bDTI6+xkYzv3qgCcOjG
                                          MD5:58CAC049BB5250F8BBEC7B4862578DD4
                                          SHA1:A58264E995A7691926B1FE00A153FEFF8F2E2046
                                          SHA-256:2A675534598BEEC94B9F2281D0ABD55A59C6BFDDD6688E0F0BF267502CB51008
                                          SHA-512:7E7DA6FBEFC97903235ED756BC7AEE7811835A085B5E85853EE6052F7C9C628219DE6CA889C5694951C687444502D2AE7DE2B58C62E0DA35974BDF1E2E931435
                                          Malicious:false
                                          Reputation:low
                                          Preview:+.......,.......,.......D...n...L...............+...........................................................................................................................................................................................................................................J...h...........-...................V.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\Setup_x86.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):11264
                                          Entropy (8bit):5.779474184733856
                                          Encrypted:false
                                          SSDEEP:96:zPDYcJ+nx4vVp76JX7zBlkCg21Fxz4THxtrqw1at0JgwLEjo+OB3yUVCdl/wNj+y:zPtkuWJX7zB3kGwfy0nyUVsxCjOM61u
                                          MD5:6F5257C0B8C0EF4D440F4F4FCE85FB1B
                                          SHA1:B6AC111DFB0D1FC75AD09C56BDE7830232395785
                                          SHA-256:B7CCB923387CC346731471B20FC3DF1EAD13EC8C2E3147353C71BB0BD59BC8B1
                                          SHA-512:A3CC27F1EFB52FB8ECDA54A7C36ADA39CEFEABB7B16F2112303EA463B0E1A4D745198D413EEBB3551E012C84A20DCDF4359E511E51BC3F1A60B13F1E3BAD1AA8
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Joe Sandbox View:
                                          • Filename: ORDER.exe, Detection: malicious, Browse
                                          • Filename: ORDER.exe, Detection: malicious, Browse
                                          • Filename: ulACwpUCSU.exe, Detection: malicious, Browse
                                          • Filename: fJuwM4Bwi7.exe, Detection: malicious, Browse
                                          • Filename: ulACwpUCSU.exe, Detection: malicious, Browse
                                          • Filename: fJuwM4Bwi7.exe, Detection: malicious, Browse
                                          • Filename: Factura 02297-23042024.exe, Detection: malicious, Browse
                                          • Filename: anebilledes.exe, Detection: malicious, Browse
                                          • Filename: Factura 02297-23042024.exe, Detection: malicious, Browse
                                          • Filename: anebilledes.exe, Detection: malicious, Browse
                                          Reputation:moderate, very likely benign file
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......)...m.m.m...k.m.~....j.9..i....l....l.Richm.........................PE..L....\.U...........!.................'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text..._........................... ..`.rdata..S....0......."..............@..@.data...h....@.......&..............@....reloc..b....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\Setup_x86.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):4096
                                          Entropy (8bit):3.287401211095633
                                          Encrypted:false
                                          SSDEEP:48:qK94n2rZ4vuXXqQr1wH+zL/o0o/X/3MVyjlZSn15gaoFU:5a4ZxKQruHkJwvcVyo4FU
                                          MD5:8EF0E4EB7C89CDD2B552DE746F5E2A53
                                          SHA1:820F681E7CEC409A02B194A487D1C8AF1038ACF0
                                          SHA-256:41293B9F6588E0FBDC8FCF2A9BD8E2B244CD5FF038FC13033378DA337219C9DC
                                          SHA-512:A68533E8A19637D0D44219549B24BABA0DC4824424842F125600FDA3EDCAFC4BB6BB340D57A00815F262D82373B440D58D6E4E5B2CEB29BB3F6BC4CBDE66C3C5
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Joe Sandbox View:
                                          • Filename: 3443424611#U00b7pdf.exe, Detection: malicious, Browse
                                          • Filename: UTN RFP_24-0676#U00b7pdf.exe, Detection: malicious, Browse
                                          • Filename: RFQ_22Q7305A-N23A-01#U00b7pdf.exe, Detection: malicious, Browse
                                          • Filename: PLANT PROJECT PROPOSAL BID_24-0676#U00b7pdf.exe, Detection: malicious, Browse
                                          • Filename: #U5e33#U55ae#U767c#U7968_200548224648#U00b7pdf.exe, Detection: malicious, Browse
                                          • Filename: LHDNM TAKSIRAN 2023#U00b7pdf.exe, Detection: malicious, Browse
                                          • Filename: faktura_7171503997#U00b7pdf.exe, Detection: malicious, Browse
                                          • Filename: Document BT24#U00b7pdf.exe, Detection: malicious, Browse
                                          • Filename: Quote Request (Tupy S.A.) 523AM - 924BR#U00b7pdf.exe, Detection: malicious, Browse
                                          • Filename: windows.10.codec.pack.v2.2.0.setup.exe, Detection: malicious, Browse
                                          Reputation:moderate, very likely benign file
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K..................[.........Rich..........................PE..L....\.U...........!................i........ ...............................P...................................... "......L ..<............................@..p.................................................... ..L............................text............................... ..`.rdata....... ......................@..@.data...x....0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\Setup_x86.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
                                          Category:dropped
                                          Size (bytes):22528
                                          Entropy (8bit):7.558597682232844
                                          Encrypted:false
                                          SSDEEP:384:6Qx38r8QfiLpVjOXf4Rrd2IpZn8LI2EdGZ5D6PDo3rsyfyC8n:6Qx38r8Qgp1OvYd2zqGZ5D6PDmXf98
                                          MD5:FBE588B15EB1BD86DEFADE69F796B56F
                                          SHA1:2F63CF44039ADDDDB22C2C0497673B49E6B3AD7A
                                          SHA-256:31144E8B156FE87317073C48A09ABCB033FDA8DBDD96986C4ABEA8C00C00355F
                                          SHA-512:E1A9E29E4C62E77A2EC2C539344F0B5A8CD67CA3FD8DFEFB0B0666A992EB2FABADB0034D439C4ADBBDFFD9C9439F23EE5757FAC0ED669D3C9DB48F50C677143D
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:moderate, very likely benign file
                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................P........................@.......................... ..................................................<...................................................................................................................UPX0....................................UPX1.....P.......N..................@....rsrc................R..............@..............................................................................................................................................................................................................................................................................................................................................................................3.09.UPX!....
                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                          Entropy (8bit):7.999987432656561
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                          • DOS Executable Generic (2002/1) 0.02%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:Setup_x86.exe
                                          File size:49'308'734 bytes
                                          MD5:082affcde6ca901604f231478fa478bc
                                          SHA1:6d99b489ae327ee594e6e32cce43c5ccbeae103a
                                          SHA256:c1be908ddb3f7fb95aa3f6e53ac6c6415cb344ccc528719462d95b05a95d0339
                                          SHA512:f41959d70de2be46de824e2db44414910769cf3c54ee63c1eb9eda6fb3a50fa3478080e278c179a79cd92498fe1d7b3b35ecd2c619c0940f2a3071a74d44e493
                                          SSDEEP:786432:oE2PdrfsvL6tFEmg3XZO0vSpXIWB3StPAuy0wNJcrXKIwud5Brl5KLJJk:F2Ppsvetpg3JO06pY2+P/y0FaIB5BTUG
                                          TLSH:44B73312E021E2A7DB1F6072E248AA9E0DC174D979E7CFD306FBC6E3444BC561D58DA2
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1p.:u..iu..iu..i...iw..iu..i...i...id..i!2.i...i...it..iRichu..i........PE..L....\.U.................^...........2.......p....@
                                          Icon Hash:3371d2d0d0607117
                                          Entrypoint:0x403217
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x55C15CE3 [Wed Aug 5 00:46:27 2015 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:59a4a44a250c4cf4f2d9de2b3fe5d95f
                                          Instruction
                                          sub esp, 00000184h
                                          push ebx
                                          push ebp
                                          push esi
                                          xor ebx, ebx
                                          push edi
                                          mov dword ptr [esp+18h], ebx
                                          mov dword ptr [esp+10h], 00409130h
                                          mov dword ptr [esp+20h], ebx
                                          mov byte ptr [esp+14h], 00000020h
                                          call dword ptr [00407034h]
                                          push 00008001h
                                          call dword ptr [004070B4h]
                                          push ebx
                                          call dword ptr [0040728Ch]
                                          push 00000009h
                                          mov dword ptr [004237B8h], eax
                                          call 00007F4E24822A3Ah
                                          mov dword ptr [00423704h], eax
                                          push ebx
                                          lea eax, dword ptr [esp+38h]
                                          push 00000160h
                                          push eax
                                          push ebx
                                          push 0041ECB8h
                                          call dword ptr [00407164h]
                                          push 004091E4h
                                          push 00422F00h
                                          call 00007F4E248226E4h
                                          call dword ptr [004070B0h]
                                          mov ebp, 00429000h
                                          push eax
                                          push ebp
                                          call 00007F4E248226D2h
                                          push ebx
                                          call dword ptr [00407118h]
                                          cmp byte ptr [00429000h], 00000022h
                                          mov dword ptr [00423700h], eax
                                          mov eax, ebp
                                          jne 00007F4E2481FC3Ch
                                          mov byte ptr [esp+14h], 00000022h
                                          mov eax, 00429001h
                                          push dword ptr [esp+14h]
                                          push eax
                                          call 00007F4E24822162h
                                          push eax
                                          call dword ptr [00407220h]
                                          mov dword ptr [esp+1Ch], eax
                                          jmp 00007F4E2481FCF5h
                                          cmp cl, 00000020h
                                          jne 00007F4E2481FC38h
                                          inc eax
                                          cmp byte ptr [eax], 00000020h
                                          je 00007F4E2481FC2Ch
                                          Programming Language:
                                          • [EXP] VC++ 6.0 SP5 build 8804
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x2d0000x4e38.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x70000x298.rdata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x5c3a0x5e00e5e7adda692e6e028f515fe3daa2b69fFalse0.658951130319149data6.410406825129756IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x70000x11ce0x12005801d712ecba58aa87d1e7d1aa24f3aaFalse0.4522569444444444OpenPGP Secret Key5.236122428806677IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0x90000x1a7f80x400cc58d0a55ac015d8f1470ea90f440596False0.615234375data5.02661163746607IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .ndata0x240000x90000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .rsrc0x2d0000x4e380x5000e04a8a273d60b54c0adfa06ccf472574False0.378515625data6.0726778819197165IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_ICON0x2d2080x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.3491701244813278
                                          RT_ICON0x2f7b00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.45145403377110693
                                          RT_ICON0x308580x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.5614754098360656
                                          RT_ICON0x311e00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6436170212765957
                                          RT_DIALOG0x316480x60dataEnglishUnited States0.7291666666666666
                                          RT_GROUP_ICON0x316a80x3edataEnglishUnited States0.8064516129032258
                                          RT_VERSION0x316e80x3fcdataEnglishGreat Britain0.4627450980392157
                                          RT_MANIFEST0x31ae80x34aXML 1.0 document, ASCII text, with very long lines (842), with no line terminatorsEnglishUnited States0.5522565320665083
                                          DLLImport
                                          KERNEL32.dllGetTickCount, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, SearchPathA, GetShortPathNameA, CreateFileA, GetFileSize, GetModuleFileNameA, ReadFile, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, Sleep, CloseHandle, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrlenA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrcpyA, lstrcatA, GetSystemDirectoryA, GetVersion, GetProcAddress, GlobalAlloc, CompareFileTime, SetFileTime, ExpandEnvironmentStringsA, lstrcmpiA, lstrcmpA, WaitForSingleObject, GlobalFree, GetExitCodeProcess, GetModuleHandleA, GetTempPathA, GetWindowsDirectoryA, LoadLibraryExA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, WriteFile, FindClose, WritePrivateProfileStringA, MultiByteToWideChar, MulDiv, GetPrivateProfileStringA, FreeLibrary
                                          USER32.dllCreateWindowExA, EndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, GetDC, SystemParametersInfoA, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, DestroyWindow, CreateDialogParamA, SetTimer, GetDlgItem, wsprintfA, SetForegroundWindow, ShowWindow, IsWindow, LoadImageA, SetWindowLongA, SetClipboardData, EmptyClipboard, OpenClipboard, EndPaint, PostQuitMessage, FindWindowExA, SendMessageTimeoutA, SetWindowTextA
                                          GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                          SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA
                                          ADVAPI32.dllRegCloseKey, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegEnumValueA, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                                          COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                          ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                                          VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishUnited States
                                          EnglishGreat Britain
                                          TimestampSource PortDest PortSource IPDest IP
                                          Sep 12, 2024 17:20:05.769892931 CEST5359395162.159.36.2192.168.2.5
                                          Sep 12, 2024 17:20:06.251652002 CEST53607011.1.1.1192.168.2.5

                                          Click to jump to process

                                          Click to jump to process

                                          Click to jump to process

                                          Target ID:0
                                          Start time:11:19:20
                                          Start date:12/09/2024
                                          Path:C:\Users\user\Desktop\Setup_x86.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\Setup_x86.exe"
                                          Imagebase:0x400000
                                          File size:49'308'734 bytes
                                          MD5 hash:082AFFCDE6CA901604F231478FA478BC
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:Borland Delphi
                                          Reputation:low
                                          Has exited:false

                                          Target ID:2
                                          Start time:11:19:28
                                          Start date:12/09/2024
                                          Path:C:\Windows\SysWOW64\msiexec.exe
                                          Wow64 process (32bit):true
                                          Commandline:msiexec.exe /i "MATRIX.msi"
                                          Imagebase:0xfa0000
                                          File size:59'904 bytes
                                          MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:false

                                          Target ID:3
                                          Start time:11:19:29
                                          Start date:12/09/2024
                                          Path:C:\Windows\System32\msiexec.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\msiexec.exe /V
                                          Imagebase:0x7ff76b450000
                                          File size:69'632 bytes
                                          MD5 hash:E5DA170027542E25EDE42FC54C929077
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:false

                                          Target ID:4
                                          Start time:11:19:29
                                          Start date:12/09/2024
                                          Path:C:\Windows\SysWOW64\msiexec.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 08F32C09D8E409B79A08038C54E7DD5E C
                                          Imagebase:0xfa0000
                                          File size:59'904 bytes
                                          MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:false

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:13.1%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:19.5%
                                            Total number of Nodes:1467
                                            Total number of Limit Nodes:27
                                            execution_graph 4621 10001000 4624 1000101b 4621->4624 4631 100014bb 4624->4631 4626 10001020 4627 10001024 4626->4627 4628 10001027 GlobalAlloc 4626->4628 4629 100014e2 3 API calls 4627->4629 4628->4627 4630 10001019 4629->4630 4633 100014c1 4631->4633 4632 100014c7 4632->4626 4633->4632 4634 100014d3 GlobalFree 4633->4634 4634->4626 4635 4022c0 4636 4022f0 4635->4636 4637 4022c5 4635->4637 4639 4029fd 18 API calls 4636->4639 4646 402b07 4637->4646 4641 4022f7 4639->4641 4640 4022cc 4642 4029fd 18 API calls 4640->4642 4645 40230d 4640->4645 4650 402a3d RegOpenKeyExA 4641->4650 4644 4022dd RegDeleteValueA RegCloseKey 4642->4644 4644->4645 4647 4029fd 18 API calls 4646->4647 4648 402b20 4647->4648 4649 402b2e RegOpenKeyExA 4648->4649 4649->4640 4657 402a68 4650->4657 4659 402ab4 4650->4659 4651 402a8e RegEnumKeyA 4652 402aa0 RegCloseKey 4651->4652 4651->4657 4654 406061 3 API calls 4652->4654 4653 402ac5 RegCloseKey 4653->4659 4656 402ab0 4654->4656 4655 402a3d 3 API calls 4655->4657 4658 402ae0 RegDeleteKeyA 4656->4658 4656->4659 4657->4651 4657->4652 4657->4653 4657->4655 4658->4659 4659->4645 4660 4019c0 4661 4029fd 18 API calls 4660->4661 4662 4019c7 4661->4662 4663 4029fd 18 API calls 4662->4663 4664 4019d0 4663->4664 4665 4019d7 lstrcmpiA 4664->4665 4666 4019e9 lstrcmpA 4664->4666 4667 4019dd 4665->4667 4666->4667 4668 402b42 4669 402b51 SetTimer 4668->4669 4670 402b6a 4668->4670 4669->4670 4671 402bb8 4670->4671 4672 402bbe MulDiv 4670->4672 4673 402b78 wsprintfA SetWindowTextA SetDlgItemTextA 4672->4673 4673->4671 4675 402645 4676 4029fd 18 API calls 4675->4676 4677 40264c FindFirstFileA 4676->4677 4678 40266f 4677->4678 4679 40265f 4677->4679 4683 405c94 wsprintfA 4678->4683 4681 402676 4684 405d36 lstrcpynA 4681->4684 4683->4681 4684->4679 4692 403745 4693 403750 4692->4693 4694 403754 4693->4694 4695 403757 GlobalAlloc 4693->4695 4695->4694 4703 4023c8 4704 402b07 19 API calls 4703->4704 4705 4023d2 4704->4705 4706 4029fd 18 API calls 4705->4706 4707 4023db 4706->4707 4708 4023e5 RegQueryValueExA 4707->4708 4711 402663 4707->4711 4709 40240b RegCloseKey 4708->4709 4710 402405 4708->4710 4709->4711 4710->4709 4714 405c94 wsprintfA 4710->4714 4714->4709 4718 401ccc GetDlgItem GetClientRect 4719 4029fd 18 API calls 4718->4719 4720 401cfc LoadImageA SendMessageA 4719->4720 4721 402892 4720->4721 4722 401d1a DeleteObject 4720->4722 4722->4721 4723 1000180d 4724 10001830 4723->4724 4725 10001860 GlobalFree 4724->4725 4726 10001872 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 4724->4726 4725->4726 4727 10001266 2 API calls 4726->4727 4728 100019e3 GlobalFree GlobalFree 4727->4728 4577 1000270f 4578 1000275f 4577->4578 4579 1000271f VirtualProtect 4577->4579 4579->4578 4736 4024d1 4737 4024d6 4736->4737 4738 4024e7 4736->4738 4745 4029e0 4737->4745 4740 4029fd 18 API calls 4738->4740 4741 4024ee lstrlenA 4740->4741 4742 4024dd 4741->4742 4743 40250d WriteFile 4742->4743 4744 402663 4742->4744 4743->4744 4746 405d58 18 API calls 4745->4746 4747 4029f4 4746->4747 4747->4742 4748 4025d3 4749 4025da 4748->4749 4751 40283f 4748->4751 4750 4029e0 18 API calls 4749->4750 4752 4025e5 4750->4752 4753 4025ec SetFilePointer 4752->4753 4753->4751 4754 4025fc 4753->4754 4756 405c94 wsprintfA 4754->4756 4756->4751 4757 4014d6 4758 4029e0 18 API calls 4757->4758 4759 4014dc Sleep 4758->4759 4761 402892 4759->4761 4762 401dd8 4763 4029fd 18 API calls 4762->4763 4764 401dde 4763->4764 4765 4029fd 18 API calls 4764->4765 4766 401de7 4765->4766 4767 4029fd 18 API calls 4766->4767 4768 401df0 4767->4768 4769 4029fd 18 API calls 4768->4769 4770 401df9 4769->4770 4771 401423 25 API calls 4770->4771 4772 401e00 ShellExecuteA 4771->4772 4773 401e2d 4772->4773 4774 1000161a 4775 10001649 4774->4775 4776 10001a5d 18 API calls 4775->4776 4777 10001650 4776->4777 4778 10001663 4777->4778 4779 10001657 4777->4779 4781 1000168a 4778->4781 4782 1000166d 4778->4782 4780 10001266 2 API calls 4779->4780 4783 10001661 4780->4783 4785 10001690 4781->4785 4786 100016b4 4781->4786 4784 100014e2 3 API calls 4782->4784 4788 10001672 4784->4788 4789 10001559 3 API calls 4785->4789 4787 100014e2 3 API calls 4786->4787 4787->4783 4790 10001559 3 API calls 4788->4790 4791 10001695 4789->4791 4793 10001678 4790->4793 4792 10001266 2 API calls 4791->4792 4794 1000169b GlobalFree 4792->4794 4795 10001266 2 API calls 4793->4795 4794->4783 4796 100016af GlobalFree 4794->4796 4797 1000167e GlobalFree 4795->4797 4796->4783 4797->4783 4798 40155b 4799 401577 ShowWindow 4798->4799 4800 40157e 4798->4800 4799->4800 4801 402892 4800->4801 4802 40158c ShowWindow 4800->4802 4802->4801 4810 401edc 4811 4029fd 18 API calls 4810->4811 4812 401ee3 GetFileVersionInfoSizeA 4811->4812 4813 401f06 GlobalAlloc 4812->4813 4815 401f5c 4812->4815 4814 401f1a GetFileVersionInfoA 4813->4814 4813->4815 4814->4815 4816 401f2b VerQueryValueA 4814->4816 4816->4815 4817 401f44 4816->4817 4821 405c94 wsprintfA 4817->4821 4819 401f50 4822 405c94 wsprintfA 4819->4822 4821->4819 4822->4815 4823 40515d 4824 405308 4823->4824 4825 40517f GetDlgItem GetDlgItem GetDlgItem 4823->4825 4827 405310 GetDlgItem CreateThread CloseHandle 4824->4827 4828 405338 4824->4828 4868 404021 SendMessageA 4825->4868 4827->4828 4830 405366 4828->4830 4832 405387 4828->4832 4833 40534e ShowWindow ShowWindow 4828->4833 4829 4051ef 4837 4051f6 GetClientRect GetSystemMetrics SendMessageA SendMessageA 4829->4837 4831 4053c1 4830->4831 4834 405376 4830->4834 4835 40539a ShowWindow 4830->4835 4831->4832 4844 4053ce SendMessageA 4831->4844 4877 404053 4832->4877 4873 404021 SendMessageA 4833->4873 4874 403fc5 4834->4874 4840 4053ba 4835->4840 4841 4053ac 4835->4841 4842 405264 4837->4842 4843 405248 SendMessageA SendMessageA 4837->4843 4846 403fc5 SendMessageA 4840->4846 4845 40501f 25 API calls 4841->4845 4847 405277 4842->4847 4848 405269 SendMessageA 4842->4848 4843->4842 4849 4053e7 CreatePopupMenu 4844->4849 4850 405393 4844->4850 4845->4840 4846->4831 4869 403fec 4847->4869 4848->4847 4852 405d58 18 API calls 4849->4852 4853 4053f7 AppendMenuA 4852->4853 4855 405415 GetWindowRect 4853->4855 4856 405428 TrackPopupMenu 4853->4856 4854 405287 4857 405290 ShowWindow 4854->4857 4858 4052c4 GetDlgItem SendMessageA 4854->4858 4855->4856 4856->4850 4859 405444 4856->4859 4860 4052b3 4857->4860 4861 4052a6 ShowWindow 4857->4861 4858->4850 4862 4052eb SendMessageA SendMessageA 4858->4862 4863 405463 SendMessageA 4859->4863 4872 404021 SendMessageA 4860->4872 4861->4860 4862->4850 4863->4863 4864 405480 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4863->4864 4866 4054a2 SendMessageA 4864->4866 4866->4866 4867 4054c4 GlobalUnlock SetClipboardData CloseClipboard 4866->4867 4867->4850 4868->4829 4870 405d58 18 API calls 4869->4870 4871 403ff7 SetDlgItemTextA 4870->4871 4871->4854 4872->4858 4873->4830 4875 403fd2 SendMessageA 4874->4875 4876 403fcc 4874->4876 4875->4832 4876->4875 4878 40406b GetWindowLongA 4877->4878 4888 4040f4 4877->4888 4879 40407c 4878->4879 4878->4888 4880 40408b GetSysColor 4879->4880 4881 40408e 4879->4881 4880->4881 4882 404094 SetTextColor 4881->4882 4883 40409e SetBkMode 4881->4883 4882->4883 4884 4040b6 GetSysColor 4883->4884 4885 4040bc 4883->4885 4884->4885 4886 4040c3 SetBkColor 4885->4886 4887 4040cd 4885->4887 4886->4887 4887->4888 4889 4040e0 DeleteObject 4887->4889 4890 4040e7 CreateBrushIndirect 4887->4890 4888->4850 4889->4890 4890->4888 4896 4018e3 4897 40191a 4896->4897 4898 4029fd 18 API calls 4897->4898 4899 40191f 4898->4899 4900 4055f6 71 API calls 4899->4900 4901 401928 4900->4901 4902 4043e3 4903 4043f3 4902->4903 4904 404419 4902->4904 4905 403fec 19 API calls 4903->4905 4906 404053 8 API calls 4904->4906 4907 404400 SetDlgItemTextA 4905->4907 4908 404425 4906->4908 4907->4904 4909 4018e6 4910 4029fd 18 API calls 4909->4910 4911 4018ed 4910->4911 4912 40554a MessageBoxIndirectA 4911->4912 4913 4018f6 4912->4913 4383 401f68 4384 401f7a 4383->4384 4385 402028 4383->4385 4386 4029fd 18 API calls 4384->4386 4388 401423 25 API calls 4385->4388 4387 401f81 4386->4387 4389 4029fd 18 API calls 4387->4389 4393 402181 4388->4393 4390 401f8a 4389->4390 4391 401f92 GetModuleHandleA 4390->4391 4392 401f9f LoadLibraryExA 4390->4392 4391->4392 4394 401faf GetProcAddress 4391->4394 4392->4385 4392->4394 4395 401ffb 4394->4395 4396 401fbe 4394->4396 4397 40501f 25 API calls 4395->4397 4398 401fc6 4396->4398 4399 401fdd 4396->4399 4401 401fce 4397->4401 4400 401423 25 API calls 4398->4400 4404 100016bd 4399->4404 4400->4401 4401->4393 4402 40201c FreeLibrary 4401->4402 4402->4393 4405 100016ed 4404->4405 4446 10001a5d 4405->4446 4407 100016f4 4408 1000180a 4407->4408 4409 10001705 4407->4409 4410 1000170c 4407->4410 4408->4401 4495 100021b0 4409->4495 4478 100021fa 4410->4478 4415 10001770 4421 100017b2 4415->4421 4422 10001776 4415->4422 4416 10001752 4508 100023da 4416->4508 4417 10001722 4420 10001728 4417->4420 4426 10001733 4417->4426 4418 1000173b 4433 10001731 4418->4433 4505 10002aa7 4418->4505 4420->4433 4489 100027ec 4420->4489 4424 100023da 11 API calls 4421->4424 4428 10001559 3 API calls 4422->4428 4434 100017a4 4424->4434 4425 10001758 4519 10001559 4425->4519 4499 1000258d 4426->4499 4431 1000178c 4428->4431 4432 100023da 11 API calls 4431->4432 4432->4434 4433->4415 4433->4416 4437 100017f9 4434->4437 4530 100023a0 4434->4530 4436 10001739 4436->4433 4437->4408 4439 10001803 GlobalFree 4437->4439 4439->4408 4443 100017e5 4443->4437 4534 100014e2 wsprintfA 4443->4534 4444 100017de FreeLibrary 4444->4443 4537 10001215 GlobalAlloc 4446->4537 4448 10001a81 4538 10001215 GlobalAlloc 4448->4538 4450 10001cbb GlobalFree GlobalFree GlobalFree 4451 10001cd8 4450->4451 4466 10001d22 4450->4466 4452 1000201a 4451->4452 4460 10001ced 4451->4460 4451->4466 4454 1000203c GetModuleHandleA 4452->4454 4452->4466 4453 10001b60 GlobalAlloc 4473 10001a8c 4453->4473 4455 10002062 4454->4455 4456 1000204d LoadLibraryA 4454->4456 4545 100015a4 GetProcAddress 4455->4545 4456->4455 4456->4466 4457 10001bab lstrcpyA 4461 10001bb5 lstrcpyA 4457->4461 4458 10001bc9 GlobalFree 4458->4473 4460->4466 4541 10001224 4460->4541 4461->4473 4462 100020b3 4465 100020c0 lstrlenA 4462->4465 4462->4466 4464 10001f7a 4464->4466 4470 10001fbe lstrcpyA 4464->4470 4546 100015a4 GetProcAddress 4465->4546 4466->4407 4467 10002074 4467->4462 4477 1000209d GetProcAddress 4467->4477 4470->4466 4471 10001c07 4471->4473 4539 10001534 GlobalSize GlobalAlloc 4471->4539 4472 10001e75 GlobalFree 4472->4473 4473->4450 4473->4453 4473->4457 4473->4458 4473->4461 4473->4464 4473->4466 4473->4471 4473->4472 4476 10001224 2 API calls 4473->4476 4544 10001215 GlobalAlloc 4473->4544 4474 100020d9 4474->4466 4476->4473 4477->4462 4479 10002212 4478->4479 4481 10002349 GlobalFree 4479->4481 4483 100022b9 GlobalAlloc MultiByteToWideChar 4479->4483 4484 1000230a lstrlenA 4479->4484 4485 10001224 GlobalAlloc lstrcpynA 4479->4485 4548 100012ad 4479->4548 4481->4479 4482 10001712 4481->4482 4482->4417 4482->4418 4482->4433 4486 100022e3 GlobalAlloc CLSIDFromString GlobalFree 4483->4486 4488 10002303 4483->4488 4484->4481 4484->4488 4485->4479 4486->4481 4488->4481 4552 10002521 4488->4552 4491 100027fe 4489->4491 4490 100028a3 CreateMutexA 4492 100028c1 4490->4492 4491->4490 4493 100029b2 GetLastError 4492->4493 4494 100029bd 4492->4494 4493->4494 4494->4433 4496 100021c0 4495->4496 4498 1000170b 4495->4498 4497 100021d2 GlobalAlloc 4496->4497 4496->4498 4497->4496 4498->4410 4503 100025a9 4499->4503 4500 100025fa GlobalAlloc 4504 1000261c 4500->4504 4501 1000260d 4502 10002612 GlobalSize 4501->4502 4501->4504 4502->4504 4503->4500 4503->4501 4504->4436 4506 10002ab2 4505->4506 4507 10002af2 GlobalFree 4506->4507 4555 10001215 GlobalAlloc 4508->4555 4510 10002473 WideCharToMultiByte 4513 100023e6 4510->4513 4511 1000243a lstrcpynA 4511->4513 4512 1000244b StringFromGUID2 WideCharToMultiByte 4512->4513 4513->4510 4513->4511 4513->4512 4514 10002494 wsprintfA 4513->4514 4515 100024b8 GlobalFree 4513->4515 4516 100024f2 GlobalFree 4513->4516 4517 10001266 2 API calls 4513->4517 4556 100012d1 4513->4556 4514->4513 4515->4513 4516->4425 4517->4513 4560 10001215 GlobalAlloc 4519->4560 4521 1000155f 4522 1000156c lstrcpyA 4521->4522 4524 10001586 4521->4524 4525 100015a0 4522->4525 4524->4525 4526 1000158b wsprintfA 4524->4526 4527 10001266 4525->4527 4526->4525 4528 100012a8 GlobalFree 4527->4528 4529 1000126f GlobalAlloc lstrcpynA 4527->4529 4528->4434 4529->4528 4531 100017c5 4530->4531 4532 100023ae 4530->4532 4531->4443 4531->4444 4532->4531 4533 100023c7 GlobalFree 4532->4533 4533->4532 4535 10001266 2 API calls 4534->4535 4536 10001503 4535->4536 4536->4437 4537->4448 4538->4473 4540 10001552 4539->4540 4540->4471 4547 10001215 GlobalAlloc 4541->4547 4543 10001233 lstrcpynA 4543->4466 4544->4473 4545->4467 4546->4474 4547->4543 4549 100012b4 4548->4549 4550 10001224 2 API calls 4549->4550 4551 100012cf 4550->4551 4551->4479 4553 10002585 4552->4553 4554 1000252f VirtualAlloc 4552->4554 4553->4488 4554->4553 4555->4513 4557 100012f9 4556->4557 4558 100012da 4556->4558 4557->4513 4558->4557 4559 100012e0 lstrcpyA 4558->4559 4559->4557 4560->4521 4914 40286d SendMessageA 4915 402892 4914->4915 4916 402887 InvalidateRect 4914->4916 4916->4915 4917 4014f0 SetForegroundWindow 4918 402892 4917->4918 4919 401af0 4920 4029fd 18 API calls 4919->4920 4921 401af7 4920->4921 4922 4029e0 18 API calls 4921->4922 4923 401b00 wsprintfA 4922->4923 4924 402892 4923->4924 4925 4019f1 4926 4029fd 18 API calls 4925->4926 4927 4019fa ExpandEnvironmentStringsA 4926->4927 4928 401a0e 4927->4928 4930 401a21 4927->4930 4929 401a13 lstrcmpA 4928->4929 4928->4930 4929->4930 4931 100015b3 4932 100014bb GlobalFree 4931->4932 4934 100015cb 4932->4934 4933 10001611 GlobalFree 4934->4933 4935 100015e6 4934->4935 4936 100015fd VirtualFree 4934->4936 4935->4933 4936->4933 4944 401c78 4945 4029e0 18 API calls 4944->4945 4946 401c7e IsWindow 4945->4946 4947 4019e1 4946->4947 4948 40477a 4949 4047a6 4948->4949 4950 40478a 4948->4950 4952 4047d9 4949->4952 4953 4047ac SHGetPathFromIDListA 4949->4953 4959 40552e GetDlgItemTextA 4950->4959 4954 4047bc 4953->4954 4958 4047c3 SendMessageA 4953->4958 4956 40140b 2 API calls 4954->4956 4955 404797 SendMessageA 4955->4949 4956->4958 4958->4952 4959->4955 4960 1000103d 4961 1000101b 5 API calls 4960->4961 4962 10001056 4961->4962 4963 4014fe 4964 401506 4963->4964 4966 401519 4963->4966 4965 4029e0 18 API calls 4964->4965 4965->4966 4967 40227f 4968 4029fd 18 API calls 4967->4968 4969 402290 4968->4969 4970 4029fd 18 API calls 4969->4970 4971 402299 4970->4971 4972 4029fd 18 API calls 4971->4972 4973 4022a3 GetPrivateProfileStringA 4972->4973 4974 401000 4975 401037 BeginPaint GetClientRect 4974->4975 4976 40100c DefWindowProcA 4974->4976 4978 4010f3 4975->4978 4979 401179 4976->4979 4980 401073 CreateBrushIndirect FillRect DeleteObject 4978->4980 4981 4010fc 4978->4981 4980->4978 4982 401102 CreateFontIndirectA 4981->4982 4983 401167 EndPaint 4981->4983 4982->4983 4984 401112 6 API calls 4982->4984 4983->4979 4984->4983 4985 404100 lstrcpynA lstrlenA 4986 402602 4987 402892 4986->4987 4988 402609 4986->4988 4989 40260f FindClose 4988->4989 4989->4987 4997 402683 4998 4029fd 18 API calls 4997->4998 4999 402691 4998->4999 5000 4026a7 4999->5000 5002 4029fd 18 API calls 4999->5002 5001 4059a2 2 API calls 5000->5001 5003 4026ad 5001->5003 5002->5000 5023 4059c7 GetFileAttributesA CreateFileA 5003->5023 5005 4026ba 5006 402763 5005->5006 5007 4026c6 GlobalAlloc 5005->5007 5010 40276b DeleteFileA 5006->5010 5011 40277e 5006->5011 5008 40275a CloseHandle 5007->5008 5009 4026df 5007->5009 5008->5006 5024 4031cc SetFilePointer 5009->5024 5010->5011 5013 4026e5 5014 4031b6 ReadFile 5013->5014 5015 4026ee GlobalAlloc 5014->5015 5016 402732 WriteFile GlobalFree 5015->5016 5017 4026fe 5015->5017 5018 402f1f 46 API calls 5016->5018 5019 402f1f 46 API calls 5017->5019 5020 402757 5018->5020 5022 40270b 5019->5022 5020->5008 5021 402729 GlobalFree 5021->5016 5022->5021 5023->5005 5024->5013 5025 401705 5026 4029fd 18 API calls 5025->5026 5027 40170c SearchPathA 5026->5027 5028 4027bd 5027->5028 5029 401727 5027->5029 5029->5028 5031 405d36 lstrcpynA 5029->5031 5031->5028 5032 100029c7 5033 100029df 5032->5033 5034 10001534 2 API calls 5033->5034 5035 100029fa 5034->5035 4567 401389 4569 401390 4567->4569 4568 4013fe 4569->4568 4570 4013cb MulDiv SendMessageA 4569->4570 4570->4569 5036 40280a 5037 4029e0 18 API calls 5036->5037 5038 402810 5037->5038 5039 402841 5038->5039 5040 402663 5038->5040 5042 40281e 5038->5042 5039->5040 5041 405d58 18 API calls 5039->5041 5041->5040 5042->5040 5044 405c94 wsprintfA 5042->5044 5044->5040 5045 40218a 5046 4029fd 18 API calls 5045->5046 5047 402190 5046->5047 5048 4029fd 18 API calls 5047->5048 5049 402199 5048->5049 5050 4029fd 18 API calls 5049->5050 5051 4021a2 5050->5051 5052 40603a 2 API calls 5051->5052 5053 4021ab 5052->5053 5054 4021bc lstrlenA lstrlenA 5053->5054 5058 4021af 5053->5058 5056 40501f 25 API calls 5054->5056 5055 40501f 25 API calls 5059 4021b7 5055->5059 5057 4021f8 SHFileOperationA 5056->5057 5057->5058 5057->5059 5058->5055 5058->5059 5060 40220c 5061 402213 5060->5061 5065 402226 5060->5065 5062 405d58 18 API calls 5061->5062 5063 402220 5062->5063 5064 40554a MessageBoxIndirectA 5063->5064 5064->5065 5066 401490 5067 40501f 25 API calls 5066->5067 5068 401497 5067->5068 5069 406310 5071 406194 5069->5071 5070 406aff 5071->5070 5072 406215 GlobalFree 5071->5072 5073 40621e GlobalAlloc 5071->5073 5074 406295 GlobalAlloc 5071->5074 5075 40628c GlobalFree 5071->5075 5072->5073 5073->5070 5073->5071 5074->5070 5074->5071 5075->5074 5076 401b11 5077 401b62 5076->5077 5078 401b1e 5076->5078 5079 401b66 5077->5079 5080 401b8b GlobalAlloc 5077->5080 5081 401ba6 5078->5081 5086 401b35 5078->5086 5089 402226 5079->5089 5097 405d36 lstrcpynA 5079->5097 5082 405d58 18 API calls 5080->5082 5083 405d58 18 API calls 5081->5083 5081->5089 5082->5081 5085 402220 5083->5085 5090 40554a MessageBoxIndirectA 5085->5090 5095 405d36 lstrcpynA 5086->5095 5088 401b78 GlobalFree 5088->5089 5090->5089 5091 401b44 5096 405d36 lstrcpynA 5091->5096 5093 401b53 5098 405d36 lstrcpynA 5093->5098 5095->5091 5096->5093 5097->5088 5098->5089 5099 404f93 5100 404fa3 5099->5100 5101 404fb7 5099->5101 5102 404fa9 5100->5102 5111 405000 5100->5111 5103 404fbf IsWindowVisible 5101->5103 5107 404fd6 5101->5107 5105 404038 SendMessageA 5102->5105 5106 404fcc 5103->5106 5103->5111 5104 405005 CallWindowProcA 5108 404fb3 5104->5108 5105->5108 5112 4048ea SendMessageA 5106->5112 5107->5104 5117 40496a 5107->5117 5111->5104 5113 404949 SendMessageA 5112->5113 5114 40490d GetMessagePos ScreenToClient SendMessageA 5112->5114 5115 404941 5113->5115 5114->5115 5116 404946 5114->5116 5115->5107 5116->5113 5126 405d36 lstrcpynA 5117->5126 5119 40497d 5127 405c94 wsprintfA 5119->5127 5121 404987 5122 40140b 2 API calls 5121->5122 5123 404990 5122->5123 5128 405d36 lstrcpynA 5123->5128 5125 404997 5125->5111 5126->5119 5127->5121 5128->5125 5129 401c95 5130 4029e0 18 API calls 5129->5130 5131 401c9c 5130->5131 5132 4029e0 18 API calls 5131->5132 5133 401ca4 GetDlgItem 5132->5133 5134 4024cb 5133->5134 5135 401595 5136 4029fd 18 API calls 5135->5136 5137 40159c SetFileAttributesA 5136->5137 5138 4015ae 5137->5138 3974 403217 #17 SetErrorMode OleInitialize 4049 406061 GetModuleHandleA 3974->4049 3978 403287 GetCommandLineA 4054 405d36 lstrcpynA 3978->4054 3980 403299 GetModuleHandleA 3981 4032b0 3980->3981 3982 4057f1 CharNextA 3981->3982 3983 4032c4 CharNextA 3982->3983 3989 4032d4 3983->3989 3984 40339e 3985 4033b1 GetTempPathA 3984->3985 4055 4031e3 3985->4055 3987 4033c9 3990 403423 DeleteFileA 3987->3990 3991 4033cd GetWindowsDirectoryA lstrcatA 3987->3991 3988 4057f1 CharNextA 3988->3989 3989->3984 3989->3988 3994 4033a0 3989->3994 4063 402c79 GetTickCount GetModuleFileNameA 3990->4063 3993 4031e3 11 API calls 3991->3993 3996 4033e9 3993->3996 4148 405d36 lstrcpynA 3994->4148 3995 403437 4003 4057f1 CharNextA 3995->4003 4032 4034bd 3995->4032 4043 4034cd 3995->4043 3996->3990 3998 4033ed GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 3996->3998 3999 4031e3 11 API calls 3998->3999 4001 40341b 3999->4001 4001->3990 4001->4043 4005 403452 4003->4005 4012 403498 4005->4012 4013 4034fc lstrcatA lstrcmpiA 4005->4013 4006 4034e6 4174 40554a 4006->4174 4007 4035da 4008 40367d ExitProcess 4007->4008 4011 406061 3 API calls 4007->4011 4015 4035ed 4011->4015 4149 4058b4 4012->4149 4017 403518 CreateDirectoryA SetCurrentDirectoryA 4013->4017 4013->4043 4020 406061 3 API calls 4015->4020 4018 40353a 4017->4018 4019 40352f 4017->4019 4179 405d36 lstrcpynA 4018->4179 4178 405d36 lstrcpynA 4019->4178 4024 4035f6 4020->4024 4026 406061 3 API calls 4024->4026 4028 4035ff 4026->4028 4027 4034b2 4164 405d36 lstrcpynA 4027->4164 4031 40361d 4028->4031 4037 40360d GetCurrentProcess 4028->4037 4030 405d58 18 API calls 4033 403579 DeleteFileA 4030->4033 4034 406061 3 API calls 4031->4034 4093 403787 4032->4093 4035 403586 CopyFileA 4033->4035 4046 403548 4033->4046 4036 403654 4034->4036 4035->4046 4039 403669 ExitWindowsEx 4036->4039 4042 403676 4036->4042 4037->4031 4038 4035ce 4040 405bea 40 API calls 4038->4040 4039->4008 4039->4042 4040->4043 4185 40140b 4042->4185 4165 403695 4043->4165 4045 405d58 18 API calls 4045->4046 4046->4030 4046->4038 4046->4045 4047 4054e5 2 API calls 4046->4047 4048 4035ba CloseHandle 4046->4048 4180 405bea 4046->4180 4047->4046 4048->4046 4050 406088 GetProcAddress 4049->4050 4051 40607d LoadLibraryA 4049->4051 4052 40325c SHGetFileInfoA 4050->4052 4051->4050 4051->4052 4053 405d36 lstrcpynA 4052->4053 4053->3978 4054->3980 4056 405fa1 5 API calls 4055->4056 4058 4031ef 4056->4058 4057 4031f9 4057->3987 4058->4057 4188 4057c6 lstrlenA CharPrevA 4058->4188 4195 4059c7 GetFileAttributesA CreateFileA 4063->4195 4065 402cbc 4092 402cc9 4065->4092 4196 405d36 lstrcpynA 4065->4196 4067 402cdf 4197 40580d lstrlenA 4067->4197 4071 402cf0 GetFileSize 4072 402df1 4071->4072 4074 402d07 4071->4074 4202 402bda 4072->4202 4074->4072 4078 402e8c 4074->4078 4085 402bda 33 API calls 4074->4085 4074->4092 4233 4031b6 4074->4233 4077 402e34 GlobalAlloc 4082 402e4b 4077->4082 4079 402bda 33 API calls 4078->4079 4079->4092 4081 402e15 4084 4031b6 ReadFile 4081->4084 4083 4059f6 2 API calls 4082->4083 4086 402e5c CreateFileA 4083->4086 4087 402e20 4084->4087 4085->4074 4088 402e96 4086->4088 4086->4092 4087->4077 4087->4092 4217 4031cc SetFilePointer 4088->4217 4090 402ea4 4218 402f1f 4090->4218 4092->3995 4094 406061 3 API calls 4093->4094 4095 40379b 4094->4095 4096 4037a1 4095->4096 4097 4037b3 4095->4097 4272 405c94 wsprintfA 4096->4272 4098 405c1d 3 API calls 4097->4098 4099 4037de 4098->4099 4100 4037fc lstrcatA 4099->4100 4102 405c1d 3 API calls 4099->4102 4103 4037b1 4100->4103 4102->4100 4263 403a4c 4103->4263 4106 4058b4 18 API calls 4108 40382e 4106->4108 4107 4038b7 4109 4058b4 18 API calls 4107->4109 4108->4107 4110 405c1d 3 API calls 4108->4110 4111 4038bd 4109->4111 4113 40385a 4110->4113 4112 4038cd LoadImageA 4111->4112 4114 405d58 18 API calls 4111->4114 4115 403973 4112->4115 4116 4038f4 RegisterClassA 4112->4116 4113->4107 4117 403876 lstrlenA 4113->4117 4120 4057f1 CharNextA 4113->4120 4114->4112 4119 40140b 2 API calls 4115->4119 4118 40392a SystemParametersInfoA CreateWindowExA 4116->4118 4147 40397d 4116->4147 4121 403884 lstrcmpiA 4117->4121 4122 4038aa 4117->4122 4118->4115 4123 403979 4119->4123 4124 403874 4120->4124 4121->4122 4125 403894 GetFileAttributesA 4121->4125 4126 4057c6 3 API calls 4122->4126 4128 403a4c 19 API calls 4123->4128 4123->4147 4124->4117 4127 4038a0 4125->4127 4129 4038b0 4126->4129 4127->4122 4130 40580d 2 API calls 4127->4130 4131 40398a 4128->4131 4273 405d36 lstrcpynA 4129->4273 4130->4122 4133 403996 ShowWindow LoadLibraryA 4131->4133 4134 403a19 4131->4134 4136 4039b5 LoadLibraryA 4133->4136 4137 4039bc GetClassInfoA 4133->4137 4274 4050f1 OleInitialize 4134->4274 4136->4137 4139 4039d0 GetClassInfoA RegisterClassA 4137->4139 4140 4039e6 DialogBoxParamA 4137->4140 4138 403a1f 4142 403a23 4138->4142 4143 403a3b 4138->4143 4139->4140 4141 40140b 2 API calls 4140->4141 4144 403a0e 4141->4144 4146 40140b 2 API calls 4142->4146 4142->4147 4145 40140b 2 API calls 4143->4145 4144->4147 4145->4147 4146->4147 4147->4043 4148->3985 4289 405d36 lstrcpynA 4149->4289 4151 4058c5 4152 40585f 4 API calls 4151->4152 4153 4058cb 4152->4153 4154 4034a3 4153->4154 4155 405fa1 5 API calls 4153->4155 4154->4043 4163 405d36 lstrcpynA 4154->4163 4161 4058db 4155->4161 4156 405906 lstrlenA 4157 405911 4156->4157 4156->4161 4159 4057c6 3 API calls 4157->4159 4160 405916 GetFileAttributesA 4159->4160 4160->4154 4161->4154 4161->4156 4162 40580d 2 API calls 4161->4162 4290 40603a FindFirstFileA 4161->4290 4162->4156 4163->4027 4164->4032 4166 4036b0 4165->4166 4167 4036a6 CloseHandle 4165->4167 4168 4036c4 4166->4168 4169 4036ba CloseHandle 4166->4169 4167->4166 4293 4036f2 4168->4293 4169->4168 4177 40555f 4174->4177 4175 4034f4 ExitProcess 4176 405573 MessageBoxIndirectA 4176->4175 4177->4175 4177->4176 4178->4018 4179->4046 4181 406061 3 API calls 4180->4181 4182 405bf1 4181->4182 4184 405c12 4182->4184 4351 405a6e lstrcpyA 4182->4351 4184->4046 4186 401389 2 API calls 4185->4186 4187 401420 4186->4187 4187->4008 4189 4057e0 lstrcatA 4188->4189 4190 403201 CreateDirectoryA 4188->4190 4189->4190 4191 4059f6 4190->4191 4192 405a01 GetTickCount GetTempFileNameA 4191->4192 4193 403215 4192->4193 4194 405a2e 4192->4194 4193->3987 4194->4192 4194->4193 4195->4065 4196->4067 4198 40581a 4197->4198 4199 402ce5 4198->4199 4200 40581f CharPrevA 4198->4200 4201 405d36 lstrcpynA 4199->4201 4200->4198 4200->4199 4201->4071 4203 402c00 4202->4203 4204 402be8 4202->4204 4206 402c10 GetTickCount 4203->4206 4207 402c08 4203->4207 4205 402bf1 DestroyWindow 4204->4205 4212 402bf8 4204->4212 4205->4212 4209 402c1e 4206->4209 4206->4212 4208 40609a 2 API calls 4207->4208 4208->4212 4210 402c53 CreateDialogParamA ShowWindow 4209->4210 4211 402c26 4209->4211 4210->4212 4211->4212 4237 402bbe 4211->4237 4212->4077 4212->4092 4236 4031cc SetFilePointer 4212->4236 4214 402c34 wsprintfA 4215 40501f 25 API calls 4214->4215 4216 402c51 4215->4216 4216->4212 4217->4090 4219 402f4b 4218->4219 4220 402f2f SetFilePointer 4218->4220 4240 40303a GetTickCount 4219->4240 4220->4219 4225 40303a 43 API calls 4226 402f82 4225->4226 4227 402ffc ReadFile 4226->4227 4229 402ff6 4226->4229 4232 402f92 4226->4232 4227->4229 4229->4092 4230 405a3f ReadFile 4230->4232 4231 402fc5 WriteFile 4231->4229 4231->4232 4232->4229 4232->4230 4232->4231 4234 405a3f ReadFile 4233->4234 4235 4031c9 4234->4235 4235->4074 4236->4081 4238 402bcd 4237->4238 4239 402bcf MulDiv 4237->4239 4238->4239 4239->4214 4241 4031a4 4240->4241 4242 403069 4240->4242 4243 402bda 33 API calls 4241->4243 4255 4031cc SetFilePointer 4242->4255 4245 402f52 4243->4245 4245->4229 4253 405a3f ReadFile 4245->4253 4246 403074 SetFilePointer 4248 403099 4246->4248 4247 4031b6 ReadFile 4247->4248 4248->4245 4248->4247 4250 402bda 33 API calls 4248->4250 4251 40312e WriteFile 4248->4251 4252 403185 SetFilePointer 4248->4252 4256 406161 4248->4256 4250->4248 4251->4245 4251->4248 4252->4241 4254 402f6b 4253->4254 4254->4225 4254->4229 4255->4246 4257 406186 4256->4257 4260 40618e 4256->4260 4257->4248 4258 406215 GlobalFree 4259 40621e GlobalAlloc 4258->4259 4259->4257 4259->4260 4260->4257 4260->4258 4260->4259 4260->4260 4261 406295 GlobalAlloc 4260->4261 4262 40628c GlobalFree 4260->4262 4261->4257 4261->4260 4262->4261 4264 403a60 4263->4264 4281 405c94 wsprintfA 4264->4281 4266 403ad1 4267 405d58 18 API calls 4266->4267 4268 403add SetWindowTextA 4267->4268 4269 40380c 4268->4269 4270 403af9 4268->4270 4269->4106 4270->4269 4271 405d58 18 API calls 4270->4271 4271->4270 4272->4103 4273->4107 4282 404038 4274->4282 4276 40513b 4277 404038 SendMessageA 4276->4277 4279 40514d OleUninitialize 4277->4279 4278 405114 4278->4276 4285 401389 4278->4285 4279->4138 4281->4266 4283 404050 4282->4283 4284 404041 SendMessageA 4282->4284 4283->4278 4284->4283 4287 401390 4285->4287 4286 4013fe 4286->4278 4287->4286 4288 4013cb MulDiv SendMessageA 4287->4288 4288->4287 4289->4151 4291 406050 FindClose 4290->4291 4292 40605b 4290->4292 4291->4292 4292->4161 4294 403700 4293->4294 4295 4036c9 4294->4295 4296 403705 FreeLibrary GlobalFree 4294->4296 4297 4055f6 4295->4297 4296->4295 4296->4296 4298 4058b4 18 API calls 4297->4298 4299 405616 4298->4299 4300 405635 4299->4300 4301 40561e DeleteFileA 4299->4301 4303 40576d 4300->4303 4338 405d36 lstrcpynA 4300->4338 4302 4034d6 OleUninitialize 4301->4302 4302->4006 4302->4007 4303->4302 4308 40603a 2 API calls 4303->4308 4305 40565b 4306 405661 lstrcatA 4305->4306 4307 40566e 4305->4307 4309 405674 4306->4309 4310 40580d 2 API calls 4307->4310 4311 405787 4308->4311 4312 405682 lstrcatA 4309->4312 4313 405679 4309->4313 4310->4309 4311->4302 4314 40578b 4311->4314 4315 40568d lstrlenA FindFirstFileA 4312->4315 4313->4312 4313->4315 4316 4057c6 3 API calls 4314->4316 4317 405763 4315->4317 4326 4056b1 4315->4326 4318 405791 4316->4318 4317->4303 4320 4055ae 5 API calls 4318->4320 4319 4057f1 CharNextA 4319->4326 4321 40579d 4320->4321 4322 4057a1 4321->4322 4323 4057b7 4321->4323 4322->4302 4329 40501f 25 API calls 4322->4329 4324 40501f 25 API calls 4323->4324 4324->4302 4325 405742 FindNextFileA 4325->4326 4328 40575a FindClose 4325->4328 4326->4319 4326->4325 4333 4055f6 64 API calls 4326->4333 4335 40501f 25 API calls 4326->4335 4336 40501f 25 API calls 4326->4336 4337 405bea 40 API calls 4326->4337 4339 405d36 lstrcpynA 4326->4339 4340 4055ae 4326->4340 4328->4317 4330 4057ae 4329->4330 4331 405bea 40 API calls 4330->4331 4334 4057b5 4331->4334 4333->4326 4334->4302 4335->4325 4336->4326 4337->4326 4338->4305 4339->4326 4348 4059a2 GetFileAttributesA 4340->4348 4343 4055db 4343->4326 4344 4055d1 DeleteFileA 4346 4055d7 4344->4346 4345 4055c9 RemoveDirectoryA 4345->4346 4346->4343 4347 4055e7 SetFileAttributesA 4346->4347 4347->4343 4349 4055ba 4348->4349 4350 4059b4 SetFileAttributesA 4348->4350 4349->4343 4349->4344 4349->4345 4350->4349 4352 405a97 4351->4352 4353 405abd GetShortPathNameA 4351->4353 4376 4059c7 GetFileAttributesA CreateFileA 4352->4376 4355 405ad2 4353->4355 4356 405be4 4353->4356 4355->4356 4358 405ada wsprintfA 4355->4358 4356->4184 4357 405aa1 CloseHandle GetShortPathNameA 4357->4356 4359 405ab5 4357->4359 4360 405d58 18 API calls 4358->4360 4359->4353 4359->4356 4361 405b02 4360->4361 4377 4059c7 GetFileAttributesA CreateFileA 4361->4377 4363 405b0f 4363->4356 4364 405b1e GetFileSize GlobalAlloc 4363->4364 4365 405b40 4364->4365 4366 405bdd CloseHandle 4364->4366 4367 405a3f ReadFile 4365->4367 4366->4356 4368 405b48 4367->4368 4368->4366 4378 40592c lstrlenA 4368->4378 4371 405b73 4373 40592c 4 API calls 4371->4373 4372 405b5f lstrcpyA 4374 405b81 4372->4374 4373->4374 4375 405bb8 SetFilePointer WriteFile GlobalFree 4374->4375 4375->4366 4376->4357 4377->4363 4379 40596d lstrlenA 4378->4379 4380 405975 4379->4380 4381 405946 lstrcmpiA 4379->4381 4380->4371 4380->4372 4381->4380 4382 405964 CharNextA 4381->4382 4382->4379 5139 10001058 5141 10001074 5139->5141 5140 100010dc 5141->5140 5142 100014bb GlobalFree 5141->5142 5143 10001091 5141->5143 5142->5143 5144 100014bb GlobalFree 5143->5144 5145 100010a1 5144->5145 5146 100010b1 5145->5146 5147 100010a8 GlobalSize 5145->5147 5148 100010b5 GlobalAlloc 5146->5148 5149 100010c6 5146->5149 5147->5146 5150 100014e2 3 API calls 5148->5150 5151 100010d1 GlobalFree 5149->5151 5150->5149 5151->5140 5159 403b19 5160 403b31 5159->5160 5161 403c6c 5159->5161 5160->5161 5162 403b3d 5160->5162 5163 403cbd 5161->5163 5164 403c7d GetDlgItem GetDlgItem 5161->5164 5165 403b48 SetWindowPos 5162->5165 5166 403b5b 5162->5166 5168 403d17 5163->5168 5176 401389 2 API calls 5163->5176 5167 403fec 19 API calls 5164->5167 5165->5166 5170 403b60 ShowWindow 5166->5170 5171 403b78 5166->5171 5172 403ca7 SetClassLongA 5167->5172 5169 404038 SendMessageA 5168->5169 5189 403c67 5168->5189 5198 403d29 5169->5198 5170->5171 5173 403b80 DestroyWindow 5171->5173 5174 403b9a 5171->5174 5175 40140b 2 API calls 5172->5175 5226 403f75 5173->5226 5177 403bb0 5174->5177 5178 403b9f SetWindowLongA 5174->5178 5175->5163 5179 403cef 5176->5179 5183 403c27 5177->5183 5184 403bbc GetDlgItem 5177->5184 5178->5189 5179->5168 5180 403cf3 SendMessageA 5179->5180 5180->5189 5181 40140b 2 API calls 5181->5198 5182 403f77 DestroyWindow EndDialog 5182->5226 5185 404053 8 API calls 5183->5185 5187 403bec 5184->5187 5188 403bcf SendMessageA IsWindowEnabled 5184->5188 5185->5189 5186 403fa6 ShowWindow 5186->5189 5191 403bf9 5187->5191 5192 403c40 SendMessageA 5187->5192 5193 403c0c 5187->5193 5201 403bf1 5187->5201 5188->5187 5188->5189 5190 405d58 18 API calls 5190->5198 5191->5192 5191->5201 5192->5183 5196 403c14 5193->5196 5197 403c29 5193->5197 5194 403fc5 SendMessageA 5194->5183 5195 403fec 19 API calls 5195->5198 5199 40140b 2 API calls 5196->5199 5200 40140b 2 API calls 5197->5200 5198->5181 5198->5182 5198->5189 5198->5190 5198->5195 5202 403fec 19 API calls 5198->5202 5217 403eb7 DestroyWindow 5198->5217 5199->5201 5200->5201 5201->5183 5201->5194 5203 403da4 GetDlgItem 5202->5203 5204 403dc1 ShowWindow EnableWindow 5203->5204 5205 403db9 5203->5205 5227 40400e EnableWindow 5204->5227 5205->5204 5207 403deb EnableWindow 5211 403dff 5207->5211 5208 403e04 GetSystemMenu EnableMenuItem SendMessageA 5209 403e34 SendMessageA 5208->5209 5208->5211 5209->5211 5211->5208 5228 404021 SendMessageA 5211->5228 5229 405d36 lstrcpynA 5211->5229 5213 403e62 lstrlenA 5214 405d58 18 API calls 5213->5214 5215 403e73 SetWindowTextA 5214->5215 5216 401389 2 API calls 5215->5216 5216->5198 5218 403ed1 CreateDialogParamA 5217->5218 5217->5226 5219 403f04 5218->5219 5218->5226 5220 403fec 19 API calls 5219->5220 5221 403f0f GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5220->5221 5222 401389 2 API calls 5221->5222 5223 403f55 5222->5223 5223->5189 5224 403f5d ShowWindow 5223->5224 5225 404038 SendMessageA 5224->5225 5225->5226 5226->5186 5226->5189 5227->5207 5228->5211 5229->5213 5230 402519 5231 4029e0 18 API calls 5230->5231 5235 402523 5231->5235 5232 40258d 5233 405a3f ReadFile 5233->5235 5234 40258f 5239 405c94 wsprintfA 5234->5239 5235->5232 5235->5233 5235->5234 5236 40259f 5235->5236 5236->5232 5238 4025b5 SetFilePointer 5236->5238 5238->5232 5239->5232 5240 40261c 5241 402637 5240->5241 5242 40261f 5240->5242 5244 4027bd 5241->5244 5246 405d36 lstrcpynA 5241->5246 5243 40262c FindNextFileA 5242->5243 5243->5241 5246->5244 5247 40231c 5248 402322 5247->5248 5249 4029fd 18 API calls 5248->5249 5250 402334 5249->5250 5251 4029fd 18 API calls 5250->5251 5252 40233e RegCreateKeyExA 5251->5252 5253 402663 5252->5253 5254 402368 5252->5254 5255 402380 5254->5255 5256 4029fd 18 API calls 5254->5256 5257 40238c 5255->5257 5260 4029e0 18 API calls 5255->5260 5259 402379 lstrlenA 5256->5259 5258 4023a7 RegSetValueExA 5257->5258 5261 402f1f 46 API calls 5257->5261 5262 4023bd RegCloseKey 5258->5262 5259->5255 5260->5257 5261->5258 5262->5253 5264 40499c GetDlgItem GetDlgItem 5265 4049ee 7 API calls 5264->5265 5307 404c06 5264->5307 5266 404a91 DeleteObject 5265->5266 5267 404a84 SendMessageA 5265->5267 5268 404a9a 5266->5268 5267->5266 5270 404ad1 5268->5270 5271 405d58 18 API calls 5268->5271 5269 404cea 5273 404d96 5269->5273 5278 404bf9 5269->5278 5283 404d43 SendMessageA 5269->5283 5272 403fec 19 API calls 5270->5272 5274 404ab3 SendMessageA SendMessageA 5271->5274 5277 404ae5 5272->5277 5275 404da0 SendMessageA 5273->5275 5276 404da8 5273->5276 5274->5268 5275->5276 5285 404dc1 5276->5285 5286 404dba ImageList_Destroy 5276->5286 5294 404dd1 5276->5294 5282 403fec 19 API calls 5277->5282 5279 404053 8 API calls 5278->5279 5284 404f8c 5279->5284 5280 404cdc SendMessageA 5280->5269 5281 4048ea 5 API calls 5297 404c77 5281->5297 5298 404af3 5282->5298 5283->5278 5288 404d58 SendMessageA 5283->5288 5289 404dca GlobalFree 5285->5289 5285->5294 5286->5285 5287 404f40 5287->5278 5292 404f52 ShowWindow GetDlgItem ShowWindow 5287->5292 5291 404d6b 5288->5291 5289->5294 5290 404bc7 GetWindowLongA SetWindowLongA 5293 404be0 5290->5293 5299 404d7c SendMessageA 5291->5299 5292->5278 5295 404be6 ShowWindow 5293->5295 5296 404bfe 5293->5296 5294->5287 5306 40496a 4 API calls 5294->5306 5311 404e0c 5294->5311 5315 404021 SendMessageA 5295->5315 5316 404021 SendMessageA 5296->5316 5297->5269 5297->5280 5298->5290 5300 404bc1 5298->5300 5303 404b42 SendMessageA 5298->5303 5304 404b7e SendMessageA 5298->5304 5305 404b8f SendMessageA 5298->5305 5299->5273 5300->5290 5300->5293 5303->5298 5304->5298 5305->5298 5306->5311 5307->5269 5307->5281 5307->5297 5308 404f16 InvalidateRect 5308->5287 5309 404f2c 5308->5309 5317 4048a5 5309->5317 5310 404e3a SendMessageA 5314 404e50 5310->5314 5311->5310 5311->5314 5313 404ec4 SendMessageA SendMessageA 5313->5314 5314->5308 5314->5313 5315->5278 5316->5307 5320 4047e0 5317->5320 5319 4048ba 5319->5287 5321 4047f6 5320->5321 5322 405d58 18 API calls 5321->5322 5323 40485a 5322->5323 5324 405d58 18 API calls 5323->5324 5325 404865 5324->5325 5326 405d58 18 API calls 5325->5326 5327 40487b lstrlenA wsprintfA SetDlgItemTextA 5326->5327 5327->5319 5328 100010e0 5329 1000110e 5328->5329 5330 100011c4 GlobalFree 5329->5330 5331 100012ad 2 API calls 5329->5331 5332 100011c3 5329->5332 5333 10001266 2 API calls 5329->5333 5334 10001155 GlobalAlloc 5329->5334 5335 100011ea GlobalFree 5329->5335 5336 100011b1 GlobalFree 5329->5336 5337 100012d1 lstrcpyA 5329->5337 5331->5329 5332->5330 5333->5336 5334->5329 5335->5329 5336->5329 5337->5329 5338 4016a1 5339 4029fd 18 API calls 5338->5339 5340 4016a7 GetFullPathNameA 5339->5340 5341 4016be 5340->5341 5342 4016df 5340->5342 5341->5342 5345 40603a 2 API calls 5341->5345 5343 402892 5342->5343 5344 4016f3 GetShortPathNameA 5342->5344 5344->5343 5346 4016cf 5345->5346 5346->5342 5348 405d36 lstrcpynA 5346->5348 5348->5342 5349 10002162 5350 100021c0 5349->5350 5352 100021f6 5349->5352 5351 100021d2 GlobalAlloc 5350->5351 5350->5352 5351->5350 5353 401d26 GetDC GetDeviceCaps 5354 4029e0 18 API calls 5353->5354 5355 401d44 MulDiv ReleaseDC 5354->5355 5356 4029e0 18 API calls 5355->5356 5357 401d63 5356->5357 5358 405d58 18 API calls 5357->5358 5359 401d9c CreateFontIndirectA 5358->5359 5360 4024cb 5359->5360 5361 40442a 5362 404456 5361->5362 5363 404467 5361->5363 5422 40552e GetDlgItemTextA 5362->5422 5365 404473 GetDlgItem 5363->5365 5366 4044d2 5363->5366 5369 404487 5365->5369 5367 4045b6 5366->5367 5376 405d58 18 API calls 5366->5376 5420 40475f 5366->5420 5367->5420 5424 40552e GetDlgItemTextA 5367->5424 5368 404461 5370 405fa1 5 API calls 5368->5370 5371 40449b SetWindowTextA 5369->5371 5374 40585f 4 API calls 5369->5374 5370->5363 5375 403fec 19 API calls 5371->5375 5373 404053 8 API calls 5378 404773 5373->5378 5379 404491 5374->5379 5380 4044b7 5375->5380 5381 404546 SHBrowseForFolderA 5376->5381 5377 4045e6 5382 4058b4 18 API calls 5377->5382 5379->5371 5386 4057c6 3 API calls 5379->5386 5383 403fec 19 API calls 5380->5383 5381->5367 5384 40455e CoTaskMemFree 5381->5384 5385 4045ec 5382->5385 5387 4044c5 5383->5387 5388 4057c6 3 API calls 5384->5388 5425 405d36 lstrcpynA 5385->5425 5386->5371 5423 404021 SendMessageA 5387->5423 5390 40456b 5388->5390 5393 4045a2 SetDlgItemTextA 5390->5393 5397 405d58 18 API calls 5390->5397 5392 4044cb 5395 406061 3 API calls 5392->5395 5393->5367 5394 404603 5396 406061 3 API calls 5394->5396 5395->5366 5403 40460b 5396->5403 5399 40458a lstrcmpiA 5397->5399 5398 404645 5426 405d36 lstrcpynA 5398->5426 5399->5393 5400 40459b lstrcatA 5399->5400 5400->5393 5402 40464e 5404 40585f 4 API calls 5402->5404 5403->5398 5408 40580d 2 API calls 5403->5408 5409 40469d 5403->5409 5405 404654 GetDiskFreeSpaceA 5404->5405 5407 404676 MulDiv 5405->5407 5405->5409 5407->5409 5408->5403 5410 40470e 5409->5410 5412 4048a5 21 API calls 5409->5412 5411 404731 5410->5411 5413 40140b 2 API calls 5410->5413 5427 40400e EnableWindow 5411->5427 5414 4046fb 5412->5414 5413->5411 5416 404710 SetDlgItemTextA 5414->5416 5417 404700 5414->5417 5416->5410 5418 4047e0 21 API calls 5417->5418 5418->5410 5419 40474d 5419->5420 5428 4043bf 5419->5428 5420->5373 5422->5368 5423->5392 5424->5377 5425->5394 5426->5402 5427->5419 5429 4043d2 SendMessageA 5428->5429 5430 4043cd 5428->5430 5429->5420 5430->5429 4571 40172c 4572 4029fd 18 API calls 4571->4572 4573 401733 4572->4573 4574 4059f6 2 API calls 4573->4574 4575 40173a 4574->4575 4576 4059f6 2 API calls 4575->4576 4576->4575 5431 401eac 5432 4029fd 18 API calls 5431->5432 5433 401eb3 5432->5433 5434 40603a 2 API calls 5433->5434 5435 401eb9 5434->5435 5437 401ecb 5435->5437 5438 405c94 wsprintfA 5435->5438 5438->5437 5439 401dac 5440 4029e0 18 API calls 5439->5440 5441 401db2 5440->5441 5442 4029e0 18 API calls 5441->5442 5443 401dbb 5442->5443 5444 401dc2 ShowWindow 5443->5444 5445 401dcd EnableWindow 5443->5445 5446 402892 5444->5446 5445->5446 5447 40192d 5448 4029fd 18 API calls 5447->5448 5449 401934 lstrlenA 5448->5449 5450 4024cb 5449->5450 5451 4024af 5452 4029fd 18 API calls 5451->5452 5453 4024b6 5452->5453 5456 4059c7 GetFileAttributesA CreateFileA 5453->5456 5455 4024c2 5456->5455 5464 401cb0 5465 4029e0 18 API calls 5464->5465 5466 401cc0 SetWindowLongA 5465->5466 5467 402892 5466->5467 5468 401a31 5469 4029e0 18 API calls 5468->5469 5470 401a37 5469->5470 5471 4029e0 18 API calls 5470->5471 5472 4019e1 5471->5472 3866 401e32 3882 4029fd 3866->3882 3872 401e9e CloseHandle 3874 402663 3872->3874 3873 401e67 WaitForSingleObject 3875 401e48 3873->3875 3876 401e75 GetExitCodeProcess 3873->3876 3875->3872 3875->3873 3875->3874 3902 40609a 3875->3902 3878 401e92 3876->3878 3879 401e87 3876->3879 3878->3872 3880 401e90 3878->3880 3906 405c94 wsprintfA 3879->3906 3880->3872 3883 402a09 3882->3883 3907 405d58 3883->3907 3886 401e38 3888 40501f 3886->3888 3889 401e42 3888->3889 3890 40503a 3888->3890 3899 4054e5 CreateProcessA 3889->3899 3891 405057 lstrlenA 3890->3891 3892 405d58 18 API calls 3890->3892 3893 405080 3891->3893 3894 405065 lstrlenA 3891->3894 3892->3891 3896 405093 3893->3896 3897 405086 SetWindowTextA 3893->3897 3894->3889 3895 405077 lstrcatA 3894->3895 3895->3893 3896->3889 3898 405099 SendMessageA SendMessageA SendMessageA 3896->3898 3897->3896 3898->3889 3900 405524 3899->3900 3901 405518 CloseHandle 3899->3901 3900->3875 3901->3900 3903 4060b7 PeekMessageA 3902->3903 3904 4060c7 3903->3904 3905 4060ad DispatchMessageA 3903->3905 3904->3873 3905->3903 3906->3880 3923 405d65 3907->3923 3908 405f88 3909 402a2a 3908->3909 3941 405d36 lstrcpynA 3908->3941 3909->3886 3925 405fa1 3909->3925 3911 405e06 GetVersion 3911->3923 3912 405f5f lstrlenA 3912->3923 3915 405d58 10 API calls 3915->3912 3917 405e7e GetSystemDirectoryA 3917->3923 3918 405e91 GetWindowsDirectoryA 3918->3923 3919 405fa1 5 API calls 3919->3923 3920 405d58 10 API calls 3920->3923 3921 405f08 lstrcatA 3921->3923 3922 405ec5 SHGetSpecialFolderLocation 3922->3923 3924 405edd SHGetPathFromIDListA CoTaskMemFree 3922->3924 3923->3908 3923->3911 3923->3912 3923->3915 3923->3917 3923->3918 3923->3919 3923->3920 3923->3921 3923->3922 3934 405c1d RegOpenKeyExA 3923->3934 3939 405c94 wsprintfA 3923->3939 3940 405d36 lstrcpynA 3923->3940 3924->3923 3926 405fad 3925->3926 3928 40600a CharNextA 3926->3928 3930 406015 3926->3930 3932 405ff8 CharNextA 3926->3932 3933 406005 CharNextA 3926->3933 3942 4057f1 3926->3942 3927 406019 CharPrevA 3927->3930 3928->3926 3928->3930 3930->3927 3931 406034 3930->3931 3931->3886 3932->3926 3933->3928 3935 405c50 RegQueryValueExA 3934->3935 3936 405c8e 3934->3936 3937 405c71 RegCloseKey 3935->3937 3936->3923 3937->3936 3939->3923 3940->3923 3941->3909 3943 4057f7 3942->3943 3944 40580a 3943->3944 3945 4057fd CharNextA 3943->3945 3944->3926 3945->3943 3946 4015b3 3947 4029fd 18 API calls 3946->3947 3948 4015ba 3947->3948 3964 40585f CharNextA CharNextA 3948->3964 3950 40160a 3951 40160f 3950->3951 3954 401638 3950->3954 3970 401423 3951->3970 3952 4057f1 CharNextA 3955 4015d0 CreateDirectoryA 3952->3955 3959 401423 25 API calls 3954->3959 3957 4015c2 3955->3957 3958 4015e5 GetLastError 3955->3958 3957->3950 3957->3952 3958->3957 3961 4015f2 GetFileAttributesA 3958->3961 3963 401630 3959->3963 3961->3957 3962 401621 SetCurrentDirectoryA 3962->3963 3965 40587a 3964->3965 3967 40588a 3964->3967 3965->3967 3968 405885 CharNextA 3965->3968 3966 4058aa 3966->3957 3967->3966 3969 4057f1 CharNextA 3967->3969 3968->3966 3969->3967 3971 40501f 25 API calls 3970->3971 3972 401431 3971->3972 3973 405d36 lstrcpynA 3972->3973 3973->3962 5473 404135 5474 40414b 5473->5474 5478 404257 5473->5478 5477 403fec 19 API calls 5474->5477 5475 4042c6 5476 4042d0 GetDlgItem 5475->5476 5479 40439a 5475->5479 5483 4042e6 5476->5483 5484 404358 5476->5484 5480 4041a1 5477->5480 5478->5475 5478->5479 5485 40429b GetDlgItem SendMessageA 5478->5485 5481 404053 8 API calls 5479->5481 5482 403fec 19 API calls 5480->5482 5486 404395 5481->5486 5487 4041ae CheckDlgButton 5482->5487 5483->5484 5488 40430c 6 API calls 5483->5488 5484->5479 5489 40436a 5484->5489 5504 40400e EnableWindow 5485->5504 5502 40400e EnableWindow 5487->5502 5488->5484 5492 404370 SendMessageA 5489->5492 5493 404381 5489->5493 5492->5493 5493->5486 5496 404387 SendMessageA 5493->5496 5494 4042c1 5497 4043bf SendMessageA 5494->5497 5495 4041cc GetDlgItem 5503 404021 SendMessageA 5495->5503 5496->5486 5497->5475 5499 4041e2 SendMessageA 5500 404200 GetSysColor 5499->5500 5501 404209 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5499->5501 5500->5501 5501->5486 5502->5495 5503->5499 5504->5494 5505 402036 5506 4029fd 18 API calls 5505->5506 5507 40203d 5506->5507 5508 4029fd 18 API calls 5507->5508 5509 402047 5508->5509 5510 4029fd 18 API calls 5509->5510 5511 402051 5510->5511 5512 4029fd 18 API calls 5511->5512 5513 40205b 5512->5513 5514 4029fd 18 API calls 5513->5514 5515 402064 5514->5515 5516 40207a CoCreateInstance 5515->5516 5517 4029fd 18 API calls 5515->5517 5520 402099 5516->5520 5521 40214d 5516->5521 5517->5516 5518 401423 25 API calls 5519 402181 5518->5519 5520->5521 5522 40212f MultiByteToWideChar 5520->5522 5521->5518 5521->5519 5522->5521 5523 4014b7 5524 4014bd 5523->5524 5525 401389 2 API calls 5524->5525 5526 4014c5 5525->5526 5527 401bb8 5528 4029e0 18 API calls 5527->5528 5529 401bbf 5528->5529 5530 4029e0 18 API calls 5529->5530 5531 401bc9 5530->5531 5532 401bd9 5531->5532 5533 4029fd 18 API calls 5531->5533 5534 4029fd 18 API calls 5532->5534 5538 401be9 5532->5538 5533->5532 5534->5538 5535 401bf4 5539 4029e0 18 API calls 5535->5539 5536 401c38 5537 4029fd 18 API calls 5536->5537 5540 401c3d 5537->5540 5538->5535 5538->5536 5541 401bf9 5539->5541 5542 4029fd 18 API calls 5540->5542 5543 4029e0 18 API calls 5541->5543 5544 401c46 FindWindowExA 5542->5544 5545 401c02 5543->5545 5548 401c64 5544->5548 5546 401c28 SendMessageA 5545->5546 5547 401c0a SendMessageTimeoutA 5545->5547 5546->5548 5547->5548 5549 40243a 5550 402b07 19 API calls 5549->5550 5551 402444 5550->5551 5552 4029e0 18 API calls 5551->5552 5553 40244d 5552->5553 5554 402470 RegEnumValueA 5553->5554 5555 402464 RegEnumKeyA 5553->5555 5556 402663 5553->5556 5554->5556 5557 402489 RegCloseKey 5554->5557 5555->5557 5557->5556 5559 40223b 5560 402243 5559->5560 5561 402249 5559->5561 5562 4029fd 18 API calls 5560->5562 5563 4029fd 18 API calls 5561->5563 5566 402259 5561->5566 5562->5561 5563->5566 5564 4029fd 18 API calls 5567 402267 5564->5567 5565 4029fd 18 API calls 5568 402270 WritePrivateProfileStringA 5565->5568 5566->5564 5566->5567 5567->5565 4580 40173f 4581 4029fd 18 API calls 4580->4581 4582 401746 4581->4582 4583 401764 4582->4583 4584 40176c 4582->4584 4619 405d36 lstrcpynA 4583->4619 4620 405d36 lstrcpynA 4584->4620 4587 40176a 4591 405fa1 5 API calls 4587->4591 4588 401777 4589 4057c6 3 API calls 4588->4589 4590 40177d lstrcatA 4589->4590 4590->4587 4612 401789 4591->4612 4592 40603a 2 API calls 4592->4612 4593 4059a2 2 API calls 4593->4612 4595 4017a0 CompareFileTime 4595->4612 4596 401864 4598 40501f 25 API calls 4596->4598 4597 40183b 4599 40501f 25 API calls 4597->4599 4606 401850 4597->4606 4600 40186e 4598->4600 4599->4606 4601 402f1f 46 API calls 4600->4601 4602 401881 4601->4602 4603 401895 SetFileTime 4602->4603 4605 4018a7 CloseHandle 4602->4605 4603->4605 4604 405d58 18 API calls 4604->4612 4605->4606 4607 4018b8 4605->4607 4609 4018d0 4607->4609 4610 4018bd 4607->4610 4608 405d36 lstrcpynA 4608->4612 4611 405d58 18 API calls 4609->4611 4613 405d58 18 API calls 4610->4613 4615 4018d8 4611->4615 4612->4592 4612->4593 4612->4595 4612->4596 4612->4597 4612->4604 4612->4608 4616 40554a MessageBoxIndirectA 4612->4616 4618 4059c7 GetFileAttributesA CreateFileA 4612->4618 4614 4018c5 lstrcatA 4613->4614 4614->4615 4617 40554a MessageBoxIndirectA 4615->4617 4616->4612 4617->4606 4618->4612 4619->4587 4620->4588 5569 40163f 5570 4029fd 18 API calls 5569->5570 5571 401645 5570->5571 5572 40603a 2 API calls 5571->5572 5573 40164b 5572->5573 5574 40193f 5575 4029e0 18 API calls 5574->5575 5576 401946 5575->5576 5577 4029e0 18 API calls 5576->5577 5578 401950 5577->5578 5579 4029fd 18 API calls 5578->5579 5580 401959 5579->5580 5581 40196c lstrlenA 5580->5581 5582 4019a7 5580->5582 5583 401976 5581->5583 5583->5582 5587 405d36 lstrcpynA 5583->5587 5585 401990 5585->5582 5586 40199d lstrlenA 5585->5586 5586->5582 5587->5585

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 403217-4032ae #17 SetErrorMode OleInitialize call 406061 SHGetFileInfoA call 405d36 GetCommandLineA call 405d36 GetModuleHandleA 7 4032b0-4032b5 0->7 8 4032ba-4032cf call 4057f1 CharNextA 0->8 7->8 11 403394-403398 8->11 12 4032d4-4032d7 11->12 13 40339e 11->13 14 4032d9-4032dd 12->14 15 4032df-4032e7 12->15 16 4033b1-4033cb GetTempPathA call 4031e3 13->16 14->14 14->15 17 4032e9-4032ea 15->17 18 4032ef-4032f2 15->18 26 403423-40343d DeleteFileA call 402c79 16->26 27 4033cd-4033eb GetWindowsDirectoryA lstrcatA call 4031e3 16->27 17->18 20 403384-403391 call 4057f1 18->20 21 4032f8-4032fc 18->21 20->11 36 403393 20->36 24 403314-403341 21->24 25 4032fe-403304 21->25 32 403343-403349 24->32 33 403354-403382 24->33 30 403306-403308 25->30 31 40330a 25->31 41 4034d1-4034e0 call 403695 OleUninitialize 26->41 42 403443-403449 26->42 27->26 44 4033ed-40341d GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4031e3 27->44 30->24 30->31 31->24 38 40334b-40334d 32->38 39 40334f 32->39 33->20 35 4033a0-4033ac call 405d36 33->35 35->16 36->11 38->33 38->39 39->33 55 4034e6-4034f6 call 40554a ExitProcess 41->55 56 4035da-4035e0 41->56 46 4034c1-4034c8 call 403787 42->46 47 40344b-403456 call 4057f1 42->47 44->26 44->41 53 4034cd 46->53 59 403458-403481 47->59 60 40348c-403496 47->60 53->41 57 4035e6-403603 call 406061 * 3 56->57 58 40367d-403685 56->58 89 403605-403607 57->89 90 40364d-40365b call 406061 57->90 62 403687 58->62 63 40368b-40368f ExitProcess 58->63 65 403483-403485 59->65 66 403498-4034a5 call 4058b4 60->66 67 4034fc-403516 lstrcatA lstrcmpiA 60->67 62->63 65->60 70 403487-40348a 65->70 66->41 77 4034a7-4034bd call 405d36 * 2 66->77 67->41 72 403518-40352d CreateDirectoryA SetCurrentDirectoryA 67->72 70->60 70->65 73 40353a-403562 call 405d36 72->73 74 40352f-403535 call 405d36 72->74 85 403568-403584 call 405d58 DeleteFileA 73->85 74->73 77->46 95 4035c5-4035cc 85->95 96 403586-403596 CopyFileA 85->96 89->90 94 403609-40360b 89->94 101 403669-403674 ExitWindowsEx 90->101 102 40365d-403667 90->102 94->90 98 40360d-40361f GetCurrentProcess 94->98 95->85 99 4035ce-4035d5 call 405bea 95->99 96->95 100 403598-4035b8 call 405bea call 405d58 call 4054e5 96->100 98->90 107 403621-403643 98->107 99->41 100->95 117 4035ba-4035c1 CloseHandle 100->117 101->58 106 403676-403678 call 40140b 101->106 102->101 102->106 106->58 107->90 117->95
                                            APIs
                                            • #17.COMCTL32 ref: 00403238
                                            • SetErrorMode.KERNELBASE(00008001), ref: 00403243
                                            • OleInitialize.OLE32(00000000), ref: 0040324A
                                              • Part of subcall function 00406061: GetModuleHandleA.KERNEL32(?,?,?,0040325C,00000009), ref: 00406073
                                              • Part of subcall function 00406061: LoadLibraryA.KERNELBASE(?,?,?,0040325C,00000009), ref: 0040607E
                                              • Part of subcall function 00406061: GetProcAddress.KERNEL32(00000000,?), ref: 0040608F
                                            • SHGetFileInfoA.SHELL32(0041ECB8,00000000,?,00000160,00000000,00000009), ref: 00403272
                                              • Part of subcall function 00405D36: lstrcpynA.KERNEL32(?,?,00000400,00403287,00422F00,NSIS Error), ref: 00405D43
                                            • GetCommandLineA.KERNEL32(00422F00,NSIS Error), ref: 00403287
                                            • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\Setup_x86.exe",00000000), ref: 0040329A
                                            • CharNextA.USER32(00000000,"C:\Users\user\Desktop\Setup_x86.exe",00000020), ref: 004032C5
                                            • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 004033C2
                                            • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004033D3
                                            • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004033DF
                                            • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004033F3
                                            • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004033FB
                                            • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 0040340C
                                            • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 00403414
                                            • DeleteFileA.KERNELBASE(1033), ref: 00403428
                                            • OleUninitialize.OLE32(?), ref: 004034D6
                                            • ExitProcess.KERNEL32 ref: 004034F6
                                            • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\Setup_x86.exe",00000000,?), ref: 00403502
                                            • lstrcmpiA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop), ref: 0040350E
                                            • CreateDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040351A
                                            • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 00403521
                                            • DeleteFileA.KERNEL32(0041E8B8,0041E8B8,?,00424000,?), ref: 0040357A
                                            • CopyFileA.KERNEL32(C:\Users\user\Desktop\Setup_x86.exe,0041E8B8,00000001), ref: 0040358E
                                            • CloseHandle.KERNEL32(00000000,0041E8B8,0041E8B8,?,0041E8B8,00000000), ref: 004035BB
                                            • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000005,00000004), ref: 00403614
                                            • ExitWindowsEx.USER32(00000002,80040002), ref: 0040366C
                                            • ExitProcess.KERNEL32 ref: 0040368F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                            • String ID: "$"C:\Users\user\Desktop\Setup_x86.exe"$1033$C:\Users\user\AppData\Local\Scienta Omicron\Installer\{4B7066F8-B6E1-4A46-BF42-5395F35020B9}$C:\Users\user\AppData\Local\Scienta Omicron\Installer\{4B7066F8-B6E1-4A46-BF42-5395F35020B9}$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Setup_x86.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                                            • API String ID: 4107622049-3820123011
                                            • Opcode ID: a00b215820a1fa6a230efcb39fea29283eff6eac4ca07d0765cafeb017810fa6
                                            • Instruction ID: 3d26bb40307c87b2cd60c260c775e6d0301d96a10e68b952128d49a18977981a
                                            • Opcode Fuzzy Hash: a00b215820a1fa6a230efcb39fea29283eff6eac4ca07d0765cafeb017810fa6
                                            • Instruction Fuzzy Hash: 85B107706082517AE721AF659D8DA2B3EACEB41706F04447FF541BA1E2C77C9E01CB6E

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 260 405d58-405d63 261 405d65-405d74 260->261 262 405d76-405d8b 260->262 261->262 263 405d91-405d9c 262->263 264 405f7e-405f82 262->264 263->264 265 405da2-405da9 263->265 266 405f88-405f92 264->266 267 405dae-405db8 264->267 265->264 269 405f94-405f98 call 405d36 266->269 270 405f9d-405f9e 266->270 267->266 268 405dbe-405dc5 267->268 272 405f71 268->272 273 405dcb-405e00 268->273 269->270 274 405f73-405f79 272->274 275 405f7b-405f7d 272->275 276 405e06-405e11 GetVersion 273->276 277 405f1b-405f1e 273->277 274->264 275->264 278 405e13-405e17 276->278 279 405e2b 276->279 280 405f20-405f23 277->280 281 405f4e-405f51 277->281 278->279 285 405e19-405e1d 278->285 282 405e32-405e39 279->282 286 405f33-405f3f call 405d36 280->286 287 405f25-405f31 call 405c94 280->287 283 405f53-405f5a call 405d58 281->283 284 405f5f-405f6f lstrlenA 281->284 289 405e3b-405e3d 282->289 290 405e3e-405e40 282->290 283->284 284->264 285->279 293 405e1f-405e23 285->293 297 405f44-405f4a 286->297 287->297 289->290 295 405e42-405e65 call 405c1d 290->295 296 405e79-405e7c 290->296 293->279 298 405e25-405e29 293->298 308 405f02-405f06 295->308 309 405e6b-405e74 call 405d58 295->309 301 405e8c-405e8f 296->301 302 405e7e-405e8a GetSystemDirectoryA 296->302 297->284 300 405f4c 297->300 298->282 304 405f13-405f19 call 405fa1 300->304 306 405e91-405e9f GetWindowsDirectoryA 301->306 307 405ef9-405efb 301->307 305 405efd-405f00 302->305 304->284 305->304 305->308 306->307 307->305 310 405ea1-405eab 307->310 308->304 313 405f08-405f0e lstrcatA 308->313 309->305 315 405ec5-405edb SHGetSpecialFolderLocation 310->315 316 405ead-405eb0 310->316 313->304 318 405ef6 315->318 319 405edd-405ef4 SHGetPathFromIDListA CoTaskMemFree 315->319 316->315 317 405eb2-405eb9 316->317 321 405ec1-405ec3 317->321 318->307 319->305 319->318 321->305 321->315
                                            APIs
                                            • GetVersion.KERNEL32(?,0041F4D8,00000000,00405057,0041F4D8,00000000), ref: 00405E09
                                            • GetSystemDirectoryA.KERNEL32(msiexec.exe /i "MATRIX.msi" ,00000400), ref: 00405E84
                                            • GetWindowsDirectoryA.KERNEL32(msiexec.exe /i "MATRIX.msi" ,00000400), ref: 00405E97
                                            • SHGetSpecialFolderLocation.SHELL32(?,00000000), ref: 00405ED3
                                            • SHGetPathFromIDListA.SHELL32(00000000,msiexec.exe /i "MATRIX.msi" ), ref: 00405EE1
                                            • CoTaskMemFree.OLE32(00000000), ref: 00405EEC
                                            • lstrcatA.KERNEL32(msiexec.exe /i "MATRIX.msi" ,\Microsoft\Internet Explorer\Quick Launch), ref: 00405F0E
                                            • lstrlenA.KERNEL32(msiexec.exe /i "MATRIX.msi" ,?,0041F4D8,00000000,00405057,0041F4D8,00000000), ref: 00405F60
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                            • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$msiexec.exe /i "MATRIX.msi"
                                            • API String ID: 900638850-605872798
                                            • Opcode ID: 0d90defceccf7a3314d6588998510e1a0ef65c4c2f55f086f079bc5466073577
                                            • Instruction ID: 9c0e267699f90c8e910d98bdf84d4b8f2614ab6024826f89c9d009b20b1e8bc4
                                            • Opcode Fuzzy Hash: 0d90defceccf7a3314d6588998510e1a0ef65c4c2f55f086f079bc5466073577
                                            • Instruction Fuzzy Hash: 10610571A04905ABDF215F64DC84B7B3BA8DB55304F10813BE641B62D1D33C4A42DF9E

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 322 4055f6-40561c call 4058b4 325 405635-40563c 322->325 326 40561e-405630 DeleteFileA 322->326 328 40563e-405640 325->328 329 40564f-40565f call 405d36 325->329 327 4057bf-4057c3 326->327 330 405646-405649 328->330 331 40576d-405772 328->331 337 405661-40566c lstrcatA 329->337 338 40566e-40566f call 40580d 329->338 330->329 330->331 331->327 334 405774-405777 331->334 335 405781-405789 call 40603a 334->335 336 405779-40577f 334->336 335->327 345 40578b-40579f call 4057c6 call 4055ae 335->345 336->327 340 405674-405677 337->340 338->340 343 405682-405688 lstrcatA 340->343 344 405679-405680 340->344 346 40568d-4056ab lstrlenA FindFirstFileA 343->346 344->343 344->346 361 4057a1-4057a4 345->361 362 4057b7-4057ba call 40501f 345->362 348 4056b1-4056c8 call 4057f1 346->348 349 405763-405767 346->349 355 4056d3-4056d6 348->355 356 4056ca-4056ce 348->356 349->331 351 405769 349->351 351->331 359 4056d8-4056dd 355->359 360 4056e9-4056f7 call 405d36 355->360 356->355 358 4056d0 356->358 358->355 364 405742-405754 FindNextFileA 359->364 365 4056df-4056e1 359->365 372 4056f9-405701 360->372 373 40570e-405719 call 4055ae 360->373 361->336 367 4057a6-4057b5 call 40501f call 405bea 361->367 362->327 364->348 370 40575a-40575d FindClose 364->370 365->360 368 4056e3-4056e7 365->368 367->327 368->360 368->364 370->349 372->364 375 405703-40570c call 4055f6 372->375 381 40573a-40573d call 40501f 373->381 382 40571b-40571e 373->382 375->364 381->364 384 405720-405730 call 40501f call 405bea 382->384 385 405732-405738 382->385 384->364 385->364
                                            APIs
                                            • DeleteFileA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 0040561F
                                            • lstrcatA.KERNEL32(00420D00,\*.*,00420D00,?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 00405667
                                            • lstrcatA.KERNEL32(?,00409014,?,00420D00,?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 00405688
                                            • lstrlenA.KERNEL32(?,?,00409014,?,00420D00,?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 0040568E
                                            • FindFirstFileA.KERNEL32(00420D00,?,?,?,00409014,?,00420D00,?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 0040569F
                                            • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 0040574C
                                            • FindClose.KERNEL32(00000000), ref: 0040575D
                                            Strings
                                            • "C:\Users\user\Desktop\Setup_x86.exe", xrefs: 004055F6
                                            • \*.*, xrefs: 00405661
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405604
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                            • String ID: "C:\Users\user\Desktop\Setup_x86.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                            • API String ID: 2035342205-3171667911
                                            • Opcode ID: 2c0e135ab85e8c1b684459b6fe88bffee4ab9643b255028ced496145508b1eab
                                            • Instruction ID: a1a18f6d4a87cf364f513f4d5348cf8987bf6841df45d5f239a42b9e89fe31fb
                                            • Opcode Fuzzy Hash: 2c0e135ab85e8c1b684459b6fe88bffee4ab9643b255028ced496145508b1eab
                                            • Instruction Fuzzy Hash: 8051D230905A04FADB216B618C89BBF7AB8DF42714F54803BF445721D2D73C4942EE6E

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 615 406310-406315 616 406386-4063a4 615->616 617 406317-406346 615->617 620 40697c-406991 616->620 618 406348-40634b 617->618 619 40634d-406351 617->619 621 40635d-406360 618->621 624 406353-406357 619->624 625 406359 619->625 622 406993-4069a9 620->622 623 4069ab-4069c1 620->623 627 406362-40636b 621->627 628 40637e-406381 621->628 626 4069c4-4069cb 622->626 623->626 624->621 625->621 629 4069f2-4069fe 626->629 630 4069cd-4069d1 626->630 631 406370-40637c 627->631 632 40636d 627->632 633 406553-406571 628->633 642 406194-40619d 629->642 636 406b80-406b8a 630->636 637 4069d7-4069ef 630->637 639 4063e6-406414 631->639 632->631 634 406573-406587 633->634 635 406589-40659b 633->635 641 40659e-4065a8 634->641 635->641 640 406b96-406ba9 636->640 637->629 643 406430-40644a 639->643 644 406416-40642e 639->644 650 406bae-406bb2 640->650 648 4065aa 641->648 649 40654b-406551 641->649 645 4061a3 642->645 646 406bab 642->646 647 40644d-406457 643->647 644->647 651 4061aa-4061ae 645->651 652 4062ea-40630b 645->652 653 40624f-406253 645->653 654 4062bf-4062c3 645->654 646->650 656 40645d 647->656 657 4063ce-4063d4 647->657 658 406526-40652a 648->658 659 4066bb-4066c8 648->659 649->633 655 4064ef-4064f9 649->655 651->640 660 4061b4-4061c1 651->660 652->620 664 406259-406272 653->664 665 406aff-406b09 653->665 662 4062c9-4062dd 654->662 663 406b0e-406b18 654->663 666 406b3e-406b48 655->666 667 4064ff-406521 655->667 676 4063b3-4063cb 656->676 677 406b1a-406b24 656->677 668 406487-40648d 657->668 669 4063da-4063e0 657->669 670 406530-406548 658->670 671 406b32-406b3c 658->671 659->642 660->646 672 4061c7-40620d 660->672 673 4062e0-4062e8 662->673 663->640 678 406275-406279 664->678 665->640 666->640 667->659 674 4064eb 668->674 675 40648f-4064ad 668->675 669->639 669->674 670->649 671->640 679 406235-406237 672->679 680 40620f-406213 672->680 673->652 673->654 674->655 681 4064c5-4064d7 675->681 682 4064af-4064c3 675->682 676->657 677->640 678->653 683 40627b-406281 678->683 687 406245-40624d 679->687 688 406239-406243 679->688 684 406215-406218 GlobalFree 680->684 685 40621e-40622c GlobalAlloc 680->685 686 4064da-4064e4 681->686 682->686 689 406283-40628a 683->689 690 4062ab-4062bd 683->690 684->685 685->646 693 406232 685->693 686->668 694 4064e6 686->694 687->678 688->687 688->688 691 406295-4062a5 GlobalAlloc 689->691 692 40628c-40628f GlobalFree 689->692 690->673 691->646 691->690 692->691 693->679 696 406b26-406b30 694->696 697 40646c-406484 694->697 696->640 697->668
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 743aa33a108d29f9cab5e819e308a9554fb8e98817c33194d1e30fb36f92eda3
                                            • Instruction ID: 49e2905b870d629617cd54a3ad4ea64d750052a334705c7e6b68d35cedeefd19
                                            • Opcode Fuzzy Hash: 743aa33a108d29f9cab5e819e308a9554fb8e98817c33194d1e30fb36f92eda3
                                            • Instruction Fuzzy Hash: 28F17970D00229CBCF28CFA8C8946ADBBB1FF45305F25856ED856BB281D3785A96CF45

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 712 40603a-40604e FindFirstFileA 713 406050-406059 FindClose 712->713 714 40605b 712->714 715 40605d-40605e 713->715 714->715
                                            APIs
                                            • FindFirstFileA.KERNELBASE(?,00421548,C:\Users\user\AppData\Local\Temp\nsm4376.tmp,004058F7,C:\Users\user\AppData\Local\Temp\nsm4376.tmp,C:\Users\user\AppData\Local\Temp\nsm4376.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsm4376.tmp,C:\Users\user\AppData\Local\Temp\nsm4376.tmp,?,?,75922EE0,00405616,?,C:\Users\user\AppData\Local\Temp\,75922EE0), ref: 00406045
                                            • FindClose.KERNEL32(00000000), ref: 00406051
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\nsm4376.tmp, xrefs: 0040603A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: Find$CloseFileFirst
                                            • String ID: C:\Users\user\AppData\Local\Temp\nsm4376.tmp
                                            • API String ID: 2295610775-259832687
                                            • Opcode ID: 1aa7e4dc1003f693668b82639e535814eeaefdc3a4332bebb0b1aa5890d42f5a
                                            • Instruction ID: ffb9975cce6792308ede9dbdbab0a2e32819aea082b360212a672f9e7c6ece7a
                                            • Opcode Fuzzy Hash: 1aa7e4dc1003f693668b82639e535814eeaefdc3a4332bebb0b1aa5890d42f5a
                                            • Instruction Fuzzy Hash: 7BD012319490306BC3106B787C0C85B7A599F573317118A33B56AF12F0C7389C7286ED
                                            APIs
                                            • GetModuleHandleA.KERNEL32(?,?,?,0040325C,00000009), ref: 00406073
                                            • LoadLibraryA.KERNELBASE(?,?,?,0040325C,00000009), ref: 0040607E
                                            • GetProcAddress.KERNEL32(00000000,?), ref: 0040608F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: AddressHandleLibraryLoadModuleProc
                                            • String ID:
                                            • API String ID: 310444273-0
                                            • Opcode ID: 14778026069da28af87b9950d589da7dca929d2a00fc8d83b3a738ce3464f0c4
                                            • Instruction ID: 2c1b19e4de550b622e70843c6ca25527790cfa0381149662c4593fbace01eca7
                                            • Opcode Fuzzy Hash: 14778026069da28af87b9950d589da7dca929d2a00fc8d83b3a738ce3464f0c4
                                            • Instruction Fuzzy Hash: 00E0C232A04211ABC321AB749D48D3B73ACAFD8751309493EF50AF6150D734AC21EBBA

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 118 403787-40379f call 406061 121 4037a1-4037b1 call 405c94 118->121 122 4037b3-4037e4 call 405c1d 118->122 130 403807-403830 call 403a4c call 4058b4 121->130 126 4037e6-4037f7 call 405c1d 122->126 127 4037fc-403802 lstrcatA 122->127 126->127 127->130 136 403836-40383b 130->136 137 4038b7-4038bf call 4058b4 130->137 136->137 138 40383d-403861 call 405c1d 136->138 142 4038c1-4038c8 call 405d58 137->142 143 4038cd-4038f2 LoadImageA 137->143 138->137 148 403863-403865 138->148 142->143 146 403973-40397b call 40140b 143->146 147 4038f4-403924 RegisterClassA 143->147 161 403985-403990 call 403a4c 146->161 162 40397d-403980 146->162 151 403a42 147->151 152 40392a-40396e SystemParametersInfoA CreateWindowExA 147->152 149 403876-403882 lstrlenA 148->149 150 403867-403874 call 4057f1 148->150 155 403884-403892 lstrcmpiA 149->155 156 4038aa-4038b2 call 4057c6 call 405d36 149->156 150->149 158 403a44-403a4b 151->158 152->146 155->156 160 403894-40389e GetFileAttributesA 155->160 156->137 164 4038a0-4038a2 160->164 165 4038a4-4038a5 call 40580d 160->165 171 403996-4039b3 ShowWindow LoadLibraryA 161->171 172 403a19-403a21 call 4050f1 161->172 162->158 164->156 164->165 165->156 174 4039b5-4039ba LoadLibraryA 171->174 175 4039bc-4039ce GetClassInfoA 171->175 180 403a23-403a29 172->180 181 403a3b-403a3d call 40140b 172->181 174->175 177 4039d0-4039e0 GetClassInfoA RegisterClassA 175->177 178 4039e6-403a17 DialogBoxParamA call 40140b call 4036d7 175->178 177->178 178->158 180->162 183 403a2f-403a36 call 40140b 180->183 181->151 183->162
                                            APIs
                                              • Part of subcall function 00406061: GetModuleHandleA.KERNEL32(?,?,?,0040325C,00000009), ref: 00406073
                                              • Part of subcall function 00406061: LoadLibraryA.KERNELBASE(?,?,?,0040325C,00000009), ref: 0040607E
                                              • Part of subcall function 00406061: GetProcAddress.KERNEL32(00000000,?), ref: 0040608F
                                            • lstrcatA.KERNEL32(1033,0041FCF8,80000001,Control Panel\Desktop\ResourceLocale,00000000,0041FCF8,00000000,00000002,C:\Users\user\AppData\Local\Temp\,75923410,"C:\Users\user\Desktop\Setup_x86.exe",00000000), ref: 00403802
                                            • lstrlenA.KERNEL32(msiexec.exe /i "MATRIX.msi" ,?,?,?,msiexec.exe /i "MATRIX.msi" ,00000000,C:\Users\user\AppData\Local\Scienta Omicron\Installer\{4B7066F8-B6E1-4A46-BF42-5395F35020B9},1033,0041FCF8,80000001,Control Panel\Desktop\ResourceLocale,00000000,0041FCF8,00000000,00000002,C:\Users\user\AppData\Local\Temp\), ref: 00403877
                                            • lstrcmpiA.KERNEL32(?,.exe), ref: 0040388A
                                            • GetFileAttributesA.KERNEL32(msiexec.exe /i "MATRIX.msi" ), ref: 00403895
                                            • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Scienta Omicron\Installer\{4B7066F8-B6E1-4A46-BF42-5395F35020B9}), ref: 004038DE
                                              • Part of subcall function 00405C94: wsprintfA.USER32 ref: 00405CA1
                                            • RegisterClassA.USER32(00422EA0), ref: 0040391B
                                            • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403933
                                            • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403968
                                            • ShowWindow.USER32(00000005,00000000), ref: 0040399E
                                            • LoadLibraryA.KERNEL32(RichEd20), ref: 004039AF
                                            • LoadLibraryA.KERNEL32(RichEd32), ref: 004039BA
                                            • GetClassInfoA.USER32(00000000,RichEdit20A,00422EA0), ref: 004039CA
                                            • GetClassInfoA.USER32(00000000,RichEdit,00422EA0), ref: 004039D7
                                            • RegisterClassA.USER32(00422EA0), ref: 004039E0
                                            • DialogBoxParamA.USER32(?,00000000,00403B19,00000000), ref: 004039FF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                            • String ID: "C:\Users\user\Desktop\Setup_x86.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Scienta Omicron\Installer\{4B7066F8-B6E1-4A46-BF42-5395F35020B9}$C:\Users\user\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$msiexec.exe /i "MATRIX.msi"
                                            • API String ID: 914957316-3522456079
                                            • Opcode ID: 4a258d8796fa34fddb02ec2619d55facefc74f4564d7f9f136a4b3ccd76ffb40
                                            • Instruction ID: 361ceaa5e45529a70bb989737ed67fdedcb7c759bf8cf29c3cde223c60b7be46
                                            • Opcode Fuzzy Hash: 4a258d8796fa34fddb02ec2619d55facefc74f4564d7f9f136a4b3ccd76ffb40
                                            • Instruction Fuzzy Hash: E661E6B16442007EE720AF659D45F273E6CEB8475AF40407FF941B22E2D67C9D02DA6E

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 189 402c79-402cc7 GetTickCount GetModuleFileNameA call 4059c7 192 402cd3-402d01 call 405d36 call 40580d call 405d36 GetFileSize 189->192 193 402cc9-402cce 189->193 201 402df1-402dff call 402bda 192->201 202 402d07-402d1e 192->202 194 402f18-402f1c 193->194 208 402ed0-402ed5 201->208 209 402e05-402e08 201->209 204 402d20 202->204 205 402d22-402d2f call 4031b6 202->205 204->205 213 402d35-402d3b 205->213 214 402e8c-402e94 call 402bda 205->214 208->194 211 402e34-402e80 GlobalAlloc call 406141 call 4059f6 CreateFileA 209->211 212 402e0a-402e22 call 4031cc call 4031b6 209->212 238 402e82-402e87 211->238 239 402e96-402ec6 call 4031cc call 402f1f 211->239 212->208 241 402e28-402e2e 212->241 218 402dbb-402dbf 213->218 219 402d3d-402d55 call 405982 213->219 214->208 222 402dc1-402dc7 call 402bda 218->222 223 402dc8-402dce 218->223 219->223 234 402d57-402d5e 219->234 222->223 230 402dd0-402dde call 4060d3 223->230 231 402de1-402deb 223->231 230->231 231->201 231->202 234->223 240 402d60-402d67 234->240 238->194 249 402ecb-402ece 239->249 240->223 242 402d69-402d70 240->242 241->208 241->211 242->223 244 402d72-402d79 242->244 244->223 246 402d7b-402d9b 244->246 246->208 248 402da1-402da5 246->248 250 402da7-402dab 248->250 251 402dad-402db5 248->251 249->208 252 402ed7-402ee8 249->252 250->201 250->251 251->223 253 402db7-402db9 251->253 254 402ef0-402ef5 252->254 255 402eea 252->255 253->223 256 402ef6-402efc 254->256 255->254 256->256 257 402efe-402f16 call 405982 256->257 257->194
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00402C8D
                                            • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\Setup_x86.exe,00000400), ref: 00402CA9
                                              • Part of subcall function 004059C7: GetFileAttributesA.KERNELBASE(00000003,00402CBC,C:\Users\user\Desktop\Setup_x86.exe,80000000,00000003), ref: 004059CB
                                              • Part of subcall function 004059C7: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004059ED
                                            • GetFileSize.KERNEL32(00000000,00000000,0042B000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Setup_x86.exe,C:\Users\user\Desktop\Setup_x86.exe,80000000,00000003), ref: 00402CF2
                                            • GlobalAlloc.KERNELBASE(00000040,00409130), ref: 00402E39
                                            Strings
                                            • Error launching installer, xrefs: 00402CC9
                                            • C:\Users\user\Desktop\Setup_x86.exe, xrefs: 00402C93, 00402CA2, 00402CB6, 00402CD3
                                            • "C:\Users\user\Desktop\Setup_x86.exe", xrefs: 00402C79
                                            • Null, xrefs: 00402D72
                                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402ED0
                                            • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402E82
                                            • Inst, xrefs: 00402D60
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00402C86, 00402E51
                                            • soft, xrefs: 00402D69
                                            • C:\Users\user\Desktop, xrefs: 00402CD4, 00402CD9, 00402CDF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                            • String ID: "C:\Users\user\Desktop\Setup_x86.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Setup_x86.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                            • API String ID: 2803837635-2960337637
                                            • Opcode ID: 91e4b9dee6fe50fd73dc962a53e9cdaf65c065133738040780962d54176249d0
                                            • Instruction ID: 2a27acbe37a486d3f9fadad6f2898e15cdcbef103c1943e89973ac3215dbffb0
                                            • Opcode Fuzzy Hash: 91e4b9dee6fe50fd73dc962a53e9cdaf65c065133738040780962d54176249d0
                                            • Instruction Fuzzy Hash: BC61C671A40205ABDF20AF64DE89B9A76B4EF00315F20413BF904B72D1D7BC9E418BAD

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 391 40173f-401762 call 4029fd call 405833 396 401764-40176a call 405d36 391->396 397 40176c-40177e call 405d36 call 4057c6 lstrcatA 391->397 403 401783-401789 call 405fa1 396->403 397->403 407 40178e-401792 403->407 408 401794-40179e call 40603a 407->408 409 4017c5-4017c8 407->409 417 4017b0-4017c2 408->417 418 4017a0-4017ae CompareFileTime 408->418 411 4017d0-4017ec call 4059c7 409->411 412 4017ca-4017cb call 4059a2 409->412 419 401864-40188d call 40501f call 402f1f 411->419 420 4017ee-4017f1 411->420 412->411 417->409 418->417 434 401895-4018a1 SetFileTime 419->434 435 40188f-401893 419->435 421 4017f3-401835 call 405d36 * 2 call 405d58 call 405d36 call 40554a 420->421 422 401846-401850 call 40501f 420->422 421->407 455 40183b-40183c 421->455 432 401859-40185f 422->432 436 40289b 432->436 438 4018a7-4018b2 CloseHandle 434->438 435->434 435->438 439 40289d-4028a1 436->439 441 402892-402895 438->441 442 4018b8-4018bb 438->442 441->436 444 4018d0-4018d3 call 405d58 442->444 445 4018bd-4018ce call 405d58 lstrcatA 442->445 450 4018d8-40222b call 40554a 444->450 445->450 450->439 455->432 457 40183e-40183f 455->457 457->422
                                            APIs
                                            • lstrcatA.KERNEL32(00000000,00000000,msiexec.exe /i "MATRIX.msi" ,C:\Users\user\AppData\Local\Scienta Omicron\Installer\{4B7066F8-B6E1-4A46-BF42-5395F35020B9},00000000,00000000,00000031), ref: 0040177E
                                            • CompareFileTime.KERNEL32(-00000014,?,msiexec.exe /i "MATRIX.msi" ,msiexec.exe /i "MATRIX.msi" ,00000000,00000000,msiexec.exe /i "MATRIX.msi" ,C:\Users\user\AppData\Local\Scienta Omicron\Installer\{4B7066F8-B6E1-4A46-BF42-5395F35020B9},00000000,00000000,00000031), ref: 004017A8
                                              • Part of subcall function 00405D36: lstrcpynA.KERNEL32(?,?,00000400,00403287,00422F00,NSIS Error), ref: 00405D43
                                              • Part of subcall function 0040501F: lstrlenA.KERNEL32(0041F4D8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405058
                                              • Part of subcall function 0040501F: lstrlenA.KERNEL32(00402C51,0041F4D8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405068
                                              • Part of subcall function 0040501F: lstrcatA.KERNEL32(0041F4D8,00402C51,00402C51,0041F4D8,00000000,00000000,00000000), ref: 0040507B
                                              • Part of subcall function 0040501F: SetWindowTextA.USER32(0041F4D8,0041F4D8), ref: 0040508D
                                              • Part of subcall function 0040501F: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004050B3
                                              • Part of subcall function 0040501F: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004050CD
                                              • Part of subcall function 0040501F: SendMessageA.USER32(?,00001013,?,00000000), ref: 004050DB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                            • String ID: C:\Users\user\AppData\Local\Scienta Omicron\Installer\{4B7066F8-B6E1-4A46-BF42-5395F35020B9}$C:\Users\user\AppData\Local\Temp\nsm4376.tmp\version.dll$msiexec.exe /i "MATRIX.msi"
                                            • API String ID: 1941528284-3721251280
                                            • Opcode ID: cec972a2b1698894bf5ae45e109c831223027fdbe68364e7f7d85183dc249dda
                                            • Instruction ID: 7da2985f373e49f587e0f88560f455237d5d3a700d2e38046b33ad83bb6d7614
                                            • Opcode Fuzzy Hash: cec972a2b1698894bf5ae45e109c831223027fdbe68364e7f7d85183dc249dda
                                            • Instruction Fuzzy Hash: 0341B871910515BACF10BFA5DC46DAF3679DF41369F20823BF511F10E1D63C8A419A6E

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 458 40303a-403063 GetTickCount 459 4031a4-4031ac call 402bda 458->459 460 403069-403094 call 4031cc SetFilePointer 458->460 465 4031ae-4031b3 459->465 466 403099-4030ab 460->466 467 4030ad 466->467 468 4030af-4030bd call 4031b6 466->468 467->468 471 4030c3-4030cf 468->471 472 403196-403199 468->472 473 4030d5-4030db 471->473 472->465 474 403106-403122 call 406161 473->474 475 4030dd-4030e3 473->475 481 403124-40312c 474->481 482 40319f 474->482 475->474 476 4030e5-403105 call 402bda 475->476 476->474 484 403160-403166 481->484 485 40312e-403144 WriteFile 481->485 483 4031a1-4031a2 482->483 483->465 484->482 486 403168-40316a 484->486 487 403146-40314a 485->487 488 40319b-40319d 485->488 486->482 489 40316c-40317f 486->489 487->488 490 40314c-403158 487->490 488->483 489->466 491 403185-403194 SetFilePointer 489->491 490->473 492 40315e 490->492 491->459 492->489
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 0040304F
                                              • Part of subcall function 004031CC: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402EA4,?), ref: 004031DA
                                            • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,?,00402F52,00000004,00000000,00000000,?,?,?,00402ECB,000000FF,00000000,00000000), ref: 00403082
                                            • WriteFile.KERNELBASE(0040A8A0,00412435,00000000,00000000,004128A0,00004000,?,00000000,?,00402F52,00000004,00000000,00000000,?,?), ref: 0040313C
                                            • SetFilePointer.KERNELBASE(030CB337,00000000,00000000,004128A0,00004000,?,00000000,?,00402F52,00000004,00000000,00000000,?,?,?,00402ECB), ref: 0040318E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: File$Pointer$CountTickWrite
                                            • String ID: 5$A
                                            • API String ID: 2146148272-768765641
                                            • Opcode ID: 24d90e6fe24fc4b927ba7929ca5aee42abf3264703176f7c86ada2f370568673
                                            • Instruction ID: 01a25493adf58fb9a894681412e440a2e883d4234beea4965eba9eb13e735820
                                            • Opcode Fuzzy Hash: 24d90e6fe24fc4b927ba7929ca5aee42abf3264703176f7c86ada2f370568673
                                            • Instruction Fuzzy Hash: CC414F725052019FDB10BF29EE849663BFCFB4431A715863BE810BA2E4D7389D52CB5E

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 493 4015b3-4015c6 call 4029fd call 40585f 498 4015c8-4015e3 call 4057f1 CreateDirectoryA 493->498 499 40160a-40160d 493->499 507 401600-401608 498->507 508 4015e5-4015f0 GetLastError 498->508 500 401638-402181 call 401423 499->500 501 40160f-40162a call 401423 call 405d36 SetCurrentDirectoryA 499->501 514 402892-4028a1 500->514 501->514 516 401630-401633 501->516 507->498 507->499 511 4015f2-4015fb GetFileAttributesA 508->511 512 4015fd 508->512 511->507 511->512 512->507 516->514
                                            APIs
                                              • Part of subcall function 0040585F: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsm4376.tmp,?,004058CB,C:\Users\user\AppData\Local\Temp\nsm4376.tmp,C:\Users\user\AppData\Local\Temp\nsm4376.tmp,?,?,75922EE0,00405616,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 0040586D
                                              • Part of subcall function 0040585F: CharNextA.USER32(00000000), ref: 00405872
                                              • Part of subcall function 0040585F: CharNextA.USER32(00000000), ref: 00405886
                                            • CreateDirectoryA.KERNELBASE(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015DB
                                            • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015E5
                                            • GetFileAttributesA.KERNELBASE(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015F3
                                            • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Local\Scienta Omicron\Installer\{4B7066F8-B6E1-4A46-BF42-5395F35020B9},00000000,00000000,000000F0), ref: 00401622
                                            Strings
                                            • C:\Users\user\AppData\Local\Scienta Omicron\Installer\{4B7066F8-B6E1-4A46-BF42-5395F35020B9}, xrefs: 00401617
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                            • String ID: C:\Users\user\AppData\Local\Scienta Omicron\Installer\{4B7066F8-B6E1-4A46-BF42-5395F35020B9}
                                            • API String ID: 3751793516-3830421350
                                            • Opcode ID: 2a622bc09443ca50187ba2ee159019b7cd2e59548df6293550867165e211735f
                                            • Instruction ID: decf54c0780f34986dcb1f6dc2400c6331eb5c21fa926316ee50895bb5337331
                                            • Opcode Fuzzy Hash: 2a622bc09443ca50187ba2ee159019b7cd2e59548df6293550867165e211735f
                                            • Instruction Fuzzy Hash: CE11E931908150ABDB217F755D4496F67B4EA62365728473FF891B22D2C23C4D42E62E

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 519 4059f6-405a00 520 405a01-405a2c GetTickCount GetTempFileNameA 519->520 521 405a3b-405a3d 520->521 522 405a2e-405a30 520->522 524 405a35-405a38 521->524 522->520 523 405a32 522->523 523->524
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00405A0A
                                            • GetTempFileNameA.KERNELBASE(?,?,00000000,?), ref: 00405A24
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: CountFileNameTempTick
                                            • String ID: "C:\Users\user\Desktop\Setup_x86.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                            • API String ID: 1716503409-329392158
                                            • Opcode ID: 41eb4eacc2b5e04bba23a072be30983b5b4707d802c2e92527758f248babbe87
                                            • Instruction ID: 2f7b9810ed7c5924072585cf2130ed1295747d9915b618abfa336aedeca5813d
                                            • Opcode Fuzzy Hash: 41eb4eacc2b5e04bba23a072be30983b5b4707d802c2e92527758f248babbe87
                                            • Instruction Fuzzy Hash: C1F0E2327482487BDB008F1ADC44B9B7B9CDF91710F00C03BF904AA280D2B0A8008B68

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 525 100016bd-100016f9 call 10001a5d 529 1000180a-1000180c 525->529 530 100016ff-10001703 525->530 531 10001705-1000170b call 100021b0 530->531 532 1000170c-10001719 call 100021fa 530->532 531->532 537 10001749-10001750 532->537 538 1000171b-10001720 532->538 539 10001770-10001774 537->539 540 10001752-1000176e call 100023da call 10001559 call 10001266 GlobalFree 537->540 541 10001722-10001723 538->541 542 1000173b-1000173e 538->542 547 100017b2-100017b8 call 100023da 539->547 548 10001776-100017b0 call 10001559 call 100023da 539->548 564 100017b9-100017bd 540->564 545 10001725-10001726 541->545 546 1000172b-1000172c call 100027ec 541->546 542->537 543 10001740-10001741 call 10002aa7 542->543 556 10001746 543->556 552 10001733-10001739 call 1000258d 545->552 553 10001728-10001729 545->553 559 10001731 546->559 547->564 548->564 563 10001748 552->563 553->537 553->546 556->563 559->556 563->537 568 100017fa-10001801 564->568 569 100017bf-100017cd call 100023a0 564->569 568->529 571 10001803-10001804 GlobalFree 568->571 575 100017e5-100017ec 569->575 576 100017cf-100017d2 569->576 571->529 575->568 578 100017ee-100017f9 call 100014e2 575->578 576->575 577 100017d4-100017dc 576->577 577->575 579 100017de-100017df FreeLibrary 577->579 578->568 579->575
                                            APIs
                                              • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC4
                                              • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC9
                                              • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CCE
                                            • GlobalFree.KERNEL32(00000000), ref: 10001768
                                            • FreeLibrary.KERNEL32(?), ref: 100017DF
                                            • GlobalFree.KERNEL32(00000000), ref: 10001804
                                              • Part of subcall function 100021B0: GlobalAlloc.KERNEL32(00000040,7D8BEC45), ref: 100021E2
                                              • Part of subcall function 1000258D: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,10001739,00000000), ref: 100025FF
                                              • Part of subcall function 10001559: lstrcpyA.KERNEL32(00000000,10004010,00000000,10001695,00000000), ref: 10001572
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3311204738.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 00000000.00000002.3311181301.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.3311228891.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.3311315344.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_10000000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: Global$Free$Alloc$Librarylstrcpy
                                            • String ID:
                                            • API String ID: 1791698881-3916222277
                                            • Opcode ID: cd3a49c7226bd267e48e570e062e78a21ab1dc0dccc3f926e80528383bd8a00b
                                            • Instruction ID: 946e86dc2be410c0748ecba0c1d48508df540d87c222276c6f0f58241c559a10
                                            • Opcode Fuzzy Hash: cd3a49c7226bd267e48e570e062e78a21ab1dc0dccc3f926e80528383bd8a00b
                                            • Instruction Fuzzy Hash: C5318B79408205DAFB41DF649CC5BCA37ECFB042D5F018465FA0A9A09ADF78A8458A60

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 582 401f68-401f74 583 401f7a-401f90 call 4029fd * 2 582->583 584 40202f-402031 582->584 593 401f92-401f9d GetModuleHandleA 583->593 594 401f9f-401fad LoadLibraryExA 583->594 586 40217c-402181 call 401423 584->586 591 402892-4028a1 586->591 593->594 597 401faf-401fbc GetProcAddress 593->597 594->597 598 402028-40202a 594->598 599 401ffb-402000 call 40501f 597->599 600 401fbe-401fc4 597->600 598->586 604 402005-402008 599->604 602 401fc6-401fd2 call 401423 600->602 603 401fdd-401ff4 call 100016bd 600->603 602->604 612 401fd4-401fdb 602->612 606 401ff6-401ff9 603->606 604->591 607 40200e-402016 call 403727 604->607 606->604 607->591 613 40201c-402023 FreeLibrary 607->613 612->604 613->591
                                            APIs
                                            • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 00401F93
                                              • Part of subcall function 0040501F: lstrlenA.KERNEL32(0041F4D8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405058
                                              • Part of subcall function 0040501F: lstrlenA.KERNEL32(00402C51,0041F4D8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405068
                                              • Part of subcall function 0040501F: lstrcatA.KERNEL32(0041F4D8,00402C51,00402C51,0041F4D8,00000000,00000000,00000000), ref: 0040507B
                                              • Part of subcall function 0040501F: SetWindowTextA.USER32(0041F4D8,0041F4D8), ref: 0040508D
                                              • Part of subcall function 0040501F: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004050B3
                                              • Part of subcall function 0040501F: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004050CD
                                              • Part of subcall function 0040501F: SendMessageA.USER32(?,00001013,?,00000000), ref: 004050DB
                                            • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00401FA3
                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00401FB3
                                            • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 0040201D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                            • String ID:
                                            • API String ID: 2987980305-0
                                            • Opcode ID: 9e9a7f8751caddec8a7bc4708f41f8174cbfb9b9be016fb447ac8878fba62911
                                            • Instruction ID: 23a464ffe6ca8440643a385a127484fd4ee8ad6b227fb7efa4d26ad3fc5b3ac3
                                            • Opcode Fuzzy Hash: 9e9a7f8751caddec8a7bc4708f41f8174cbfb9b9be016fb447ac8878fba62911
                                            • Instruction Fuzzy Hash: D7210872904211BACF107FA48E49A6E39B0AB44358F60823BF601B62D1D7BC4941AA6E

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 698 4054e5-405516 CreateProcessA 699 405524-405525 698->699 700 405518-405521 CloseHandle 698->700 700->699
                                            APIs
                                            • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00421500,Error launching installer), ref: 0040550E
                                            • CloseHandle.KERNEL32(?), ref: 0040551B
                                            Strings
                                            • Error launching installer, xrefs: 004054F8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: CloseCreateHandleProcess
                                            • String ID: Error launching installer
                                            • API String ID: 3712363035-66219284
                                            • Opcode ID: a807c8c1498f9a3ccd34e9273e49e04dcb617f56f5cccdb726230c0895ca6d7f
                                            • Instruction ID: 0ae392a05d3974bec86de51aa2f8a5c28ff0ee3cdd976454f3eed0d5dd72dd2a
                                            • Opcode Fuzzy Hash: a807c8c1498f9a3ccd34e9273e49e04dcb617f56f5cccdb726230c0895ca6d7f
                                            • Instruction Fuzzy Hash: 2BE0BFB4A00209BFEB109FA4ED05F7B76ADEB14745F508561BD11F2160E774A9108A79

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 00405FA1: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Setup_x86.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,75923410,004033C9), ref: 00405FF9
                                              • Part of subcall function 00405FA1: CharNextA.USER32(?,?,?,00000000), ref: 00406006
                                              • Part of subcall function 00405FA1: CharNextA.USER32(?,"C:\Users\user\Desktop\Setup_x86.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,75923410,004033C9), ref: 0040600B
                                              • Part of subcall function 00405FA1: CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,75923410,004033C9), ref: 0040601B
                                            • CreateDirectoryA.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923410,004033C9), ref: 00403204
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: Char$Next$CreateDirectoryPrev
                                            • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                                            • API String ID: 4115351271-2030658151
                                            • Opcode ID: ee23c129dd8a5d49f4f649e38bc420fd14e59507522fd77197c34cef7b8656a6
                                            • Instruction ID: 89773af62672bbf6302d30782f314b1c1bc42d6855f09756152acd8bf908297a
                                            • Opcode Fuzzy Hash: ee23c129dd8a5d49f4f649e38bc420fd14e59507522fd77197c34cef7b8656a6
                                            • Instruction Fuzzy Hash: 24D0C71290AD3066D5513B6A7C46FCF050C8F4675DF11807BF904751C58F6C555395EF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fa6151eb6114a7c7dde5596e7ed141339a6810161cd6e35f889c2edb9118ca88
                                            • Instruction ID: d3f30c549e8eaa155af2d8805db43d359078549a114e1d1e4cfdde4495a9482f
                                            • Opcode Fuzzy Hash: fa6151eb6114a7c7dde5596e7ed141339a6810161cd6e35f889c2edb9118ca88
                                            • Instruction Fuzzy Hash: 13A14471E00228CBDF28DFA8C8447ADBBB1FB45305F15816ED816BB281D7785A96DF44
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e9dede487193b96133ea94438acbc75bab27e7ac1b94d370ef06066709f64446
                                            • Instruction ID: 66af66db22d428e7cee4185570621c0262e28a8f97ef0091af547b150b1cef7f
                                            • Opcode Fuzzy Hash: e9dede487193b96133ea94438acbc75bab27e7ac1b94d370ef06066709f64446
                                            • Instruction Fuzzy Hash: 7F912170E00228CBDF28DF98C8947ADBBB1FB45305F15816ED816BB281C7786A96DF44
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d2d995426ddd841542114576c7cd3986778113386b5e0d0d2bb3b42046c5d03f
                                            • Instruction ID: 36158da5dd70985ab85e2c4d41886ca33cae813362c0b87a96f868d92fb05337
                                            • Opcode Fuzzy Hash: d2d995426ddd841542114576c7cd3986778113386b5e0d0d2bb3b42046c5d03f
                                            • Instruction Fuzzy Hash: 65815771D00228CFDF24CFA8C8847ADBBB1FB45305F25816AD816BB281D778A996DF15
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 68ae08bc292ff831ddf939399879833efa26d2e617e1386947dce183f6739e75
                                            • Instruction ID: 1715bfb1c3d5716620224504c503b3d15fe2aa0a2bbcc08a305e6ffc6cb4203b
                                            • Opcode Fuzzy Hash: 68ae08bc292ff831ddf939399879833efa26d2e617e1386947dce183f6739e75
                                            • Instruction Fuzzy Hash: 53817771D00228DBDF24CFA8C8447ADBBB0FB44301F2581AED856BB281D7786A96DF45
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2929f55d3e8b81ac1e584e7399a4f2facda7d772583105b5c0ec75abe6cb9a93
                                            • Instruction ID: 032b7c8430df6362c90b97cb5f8c3133674bcd2d0f853081a3cdcc23126a0f5c
                                            • Opcode Fuzzy Hash: 2929f55d3e8b81ac1e584e7399a4f2facda7d772583105b5c0ec75abe6cb9a93
                                            • Instruction Fuzzy Hash: 87711371D00228CFDF24CF98C8847ADBBB1FB48305F15806AD816BB281D7785996DF45
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 948a468c2091db2feb9fa4c22586628b65dd678cc983fa395508304452d62250
                                            • Instruction ID: 3e9dbefe820a1d4baf734be7fb741bb2fb66d8e6f9ed59188b506b6c9edb630d
                                            • Opcode Fuzzy Hash: 948a468c2091db2feb9fa4c22586628b65dd678cc983fa395508304452d62250
                                            • Instruction Fuzzy Hash: AB711371E00228CBDF28CF98C884BADBBB1FB44305F15816ED816BB281D7786996DF45
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2d63a3d575cf43ccaec2b316c623d79440d1cb8ee82c5371297a3fda91248972
                                            • Instruction ID: 1812ff5f5430a706778d8acc512246fd3c212bc7acfdfbe5d0fa3af8c8d1a12f
                                            • Opcode Fuzzy Hash: 2d63a3d575cf43ccaec2b316c623d79440d1cb8ee82c5371297a3fda91248972
                                            • Instruction Fuzzy Hash: AD712471E00228CBDF28DF98C844BADBBB1FB44305F15806ED856BB291C7786A96DF45
                                            APIs
                                            • SetFilePointer.KERNELBASE(00409130,00000000,00000000,00000000,00000000,?,?,?,00402ECB,000000FF,00000000,00000000,00409130,?), ref: 00402F45
                                            • WriteFile.KERNELBASE(00000000,004128A0,?,000000FF,00000000,004128A0,00004000,00409130,00409130,00000004,00000004,00000000,00000000,?,?), ref: 00402FD2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: File$PointerWrite
                                            • String ID:
                                            • API String ID: 539440098-0
                                            • Opcode ID: 41928112f34441f9b3539e2a42aa88ab340ce8e3764aaba8d566e6229e32b04b
                                            • Instruction ID: 3b6e370e410e3f669d4a968ba26e16673121f6254c39c59cd6eb20204b18cf3c
                                            • Opcode Fuzzy Hash: 41928112f34441f9b3539e2a42aa88ab340ce8e3764aaba8d566e6229e32b04b
                                            • Instruction Fuzzy Hash: 14313931502259FFDF20DF55DD44A9E3BA8EF04395F20403AF908A61D0D2789A41EBA9
                                            APIs
                                              • Part of subcall function 0040501F: lstrlenA.KERNEL32(0041F4D8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405058
                                              • Part of subcall function 0040501F: lstrlenA.KERNEL32(00402C51,0041F4D8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405068
                                              • Part of subcall function 0040501F: lstrcatA.KERNEL32(0041F4D8,00402C51,00402C51,0041F4D8,00000000,00000000,00000000), ref: 0040507B
                                              • Part of subcall function 0040501F: SetWindowTextA.USER32(0041F4D8,0041F4D8), ref: 0040508D
                                              • Part of subcall function 0040501F: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004050B3
                                              • Part of subcall function 0040501F: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004050CD
                                              • Part of subcall function 0040501F: SendMessageA.USER32(?,00001013,?,00000000), ref: 004050DB
                                              • Part of subcall function 004054E5: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00421500,Error launching installer), ref: 0040550E
                                              • Part of subcall function 004054E5: CloseHandle.KERNEL32(?), ref: 0040551B
                                            • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00401E6C
                                            • GetExitCodeProcess.KERNEL32(?,?), ref: 00401E7C
                                            • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcat
                                            • String ID:
                                            • API String ID: 3521207402-0
                                            • Opcode ID: c7546c7acf1ab707d2e8ca4c0905e090d58f4ec16d430388d15c8422db244cfe
                                            • Instruction ID: a57a420adebbec2e463a2757bf84d9d81012cc1a8c5c1569ff173e75ada2264d
                                            • Opcode Fuzzy Hash: c7546c7acf1ab707d2e8ca4c0905e090d58f4ec16d430388d15c8422db244cfe
                                            • Instruction Fuzzy Hash: 66014031904114FBDF21AFA1DD859EE7B71EB40345F10857BFA01B51E1C3794A81EBAA
                                            APIs
                                            • CreateMutexA.KERNELBASE(00000000), ref: 100028AB
                                            • GetLastError.KERNEL32 ref: 100029B2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3311204738.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 00000000.00000002.3311181301.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.3311228891.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.3311315344.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_10000000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: CreateErrorLastMutex
                                            • String ID:
                                            • API String ID: 1925916568-0
                                            • Opcode ID: 10da2a693ced731503c2d5b3de2f7fe8e431c949d2a6016fe146597bbe82a282
                                            • Instruction ID: 2b4501ff186f60f2b29b8b71d76009b37135a14f8b8ad132536a4a21bb517402
                                            • Opcode Fuzzy Hash: 10da2a693ced731503c2d5b3de2f7fe8e431c949d2a6016fe146597bbe82a282
                                            • Instruction Fuzzy Hash: 9E51A4BA908214DFFB14DF60DCC5B5937A8EB443D4F218429EA08E725DDF38A981CB94
                                            APIs
                                            • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                            • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: a519dadb84f5fbb5742ded63e05e15cde03a873041ee9604df24846d4002906c
                                            • Instruction ID: da56ad7cfcb2a9fecb994a09e4a0bd113f750103611445cd7b28aada07ee45e3
                                            • Opcode Fuzzy Hash: a519dadb84f5fbb5742ded63e05e15cde03a873041ee9604df24846d4002906c
                                            • Instruction Fuzzy Hash: 2E012831B24210ABE7294B389D04B6A369CE710328F11823BF811F72F1D6B8DC42DB4D
                                            APIs
                                            • GetFileAttributesA.KERNELBASE(00000003,00402CBC,C:\Users\user\Desktop\Setup_x86.exe,80000000,00000003), ref: 004059CB
                                            • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004059ED
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: File$AttributesCreate
                                            • String ID:
                                            • API String ID: 415043291-0
                                            • Opcode ID: b262a0f40d66ad03986e5cb00ab33bb84fd1bf9937e58ea257525f7228853690
                                            • Instruction ID: 21e5f81f3e52fa2c8f9e5bc24a994218dd140026ef3a1e453d479de883aad6ce
                                            • Opcode Fuzzy Hash: b262a0f40d66ad03986e5cb00ab33bb84fd1bf9937e58ea257525f7228853690
                                            • Instruction Fuzzy Hash: 94D09E31668301AFEF098F20DD16F2E7BA2EB84B00F10562CB682D40E0D6755815DB16
                                            APIs
                                            • GetFileAttributesA.KERNELBASE(?,?,004055BA,?,?,00000000,0040579D,?,?,?,?), ref: 004059A7
                                            • SetFileAttributesA.KERNEL32(?,00000000), ref: 004059BB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: AttributesFile
                                            • String ID:
                                            • API String ID: 3188754299-0
                                            • Opcode ID: 9001e84463e5b3d4dd00ca1d2e00f3bb66c1d6c16300b22364f3152d7eb201de
                                            • Instruction ID: a98ca5448702c3e829ea1667e49b0be7f6aa4c87fef4348ac0342a167d80fd98
                                            • Opcode Fuzzy Hash: 9001e84463e5b3d4dd00ca1d2e00f3bb66c1d6c16300b22364f3152d7eb201de
                                            • Instruction Fuzzy Hash: 19D0C9B2918120EBC2102728AD0889BBF69EB542717018B31F865A22B0C7304C52DAA9
                                            APIs
                                            • ReadFile.KERNELBASE(00409130,00000000,00000000,00000000,00000000,004128A0,0040A8A0,004031C9,00409130,00409130,004030BB,004128A0,00004000,?,00000000,?), ref: 00405A53
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: FileRead
                                            • String ID:
                                            • API String ID: 2738559852-0
                                            • Opcode ID: 36ce21e0183dc59356ed1b7b138b7ffe2bb5c4fd6ccae5392a8977301763c5ee
                                            • Instruction ID: 55609983f428609d3339a900fe5ea2c3161a13bcf9e808ef2cae39733250456b
                                            • Opcode Fuzzy Hash: 36ce21e0183dc59356ed1b7b138b7ffe2bb5c4fd6ccae5392a8977301763c5ee
                                            • Instruction Fuzzy Hash: F7E08C3231025AABDF109EA09C40AEB3B6CEB00760F084432FA14E2040D230E9218FA5
                                            APIs
                                            • VirtualProtect.KERNELBASE(1000404C,00000004,00000040,1000403C), ref: 1000272D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3311204738.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 00000000.00000002.3311181301.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.3311228891.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.3311315344.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_10000000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: ProtectVirtual
                                            • String ID:
                                            • API String ID: 544645111-0
                                            • Opcode ID: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                                            • Instruction ID: 4dab7c069dd6fc30f8915db09394f7f991a1b088a201bba37056324bf7fcc065
                                            • Opcode Fuzzy Hash: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                                            • Instruction Fuzzy Hash: 98F09BF19092A0DEF360DF688CC47063FE4E3993D5B03852AE358F6269EB7441448B19
                                            APIs
                                            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402EA4,?), ref: 004031DA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: FilePointer
                                            • String ID:
                                            • API String ID: 973152223-0
                                            • Opcode ID: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                                            • Instruction ID: 49fdcfdf8b1973cd13611e97ba0bfafd8618b6cb304eeeee9131019f9f046fb0
                                            • Opcode Fuzzy Hash: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                                            • Instruction Fuzzy Hash: 03B01271644200BFDA214F00DF05F057B21A790700F10C030B748380F082712420EB4D
                                            APIs
                                            • GlobalAlloc.KERNELBASE(00000040,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3311204738.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 00000000.00000002.3311181301.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.3311228891.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.3311315344.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_10000000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: AllocGlobal
                                            • String ID:
                                            • API String ID: 3761449716-0
                                            • Opcode ID: 6989041179a6ec659f8410a82a3610e1053cc9f4ca9d652552d89decbf4b4a90
                                            • Instruction ID: 35b308b173d9b0532f6cde55f5bface33093279d7ce3c78a2cc6db588f634b90
                                            • Opcode Fuzzy Hash: 6989041179a6ec659f8410a82a3610e1053cc9f4ca9d652552d89decbf4b4a90
                                            • Instruction Fuzzy Hash: 6CA002B1945620DBFE429BE08D9EF1B3B25E748781F01C040E315641BCCA754010DF39
                                            APIs
                                            • GetDlgItem.USER32(?,000003F9), ref: 004049B4
                                            • GetDlgItem.USER32(?,00000408), ref: 004049BF
                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404A09
                                            • LoadBitmapA.USER32(0000006E), ref: 00404A1C
                                            • SetWindowLongA.USER32(?,000000FC,00404F93), ref: 00404A35
                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A49
                                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404A5B
                                            • SendMessageA.USER32(?,00001109,00000002), ref: 00404A71
                                            • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404A7D
                                            • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404A8F
                                            • DeleteObject.GDI32(00000000), ref: 00404A92
                                            • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404ABD
                                            • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404AC9
                                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404B5E
                                            • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404B89
                                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404B9D
                                            • GetWindowLongA.USER32(?,000000F0), ref: 00404BCC
                                            • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404BDA
                                            • ShowWindow.USER32(?,00000005), ref: 00404BEB
                                            • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404CE8
                                            • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404D4D
                                            • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404D62
                                            • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404D86
                                            • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404DA6
                                            • ImageList_Destroy.COMCTL32(?), ref: 00404DBB
                                            • GlobalFree.KERNEL32(?), ref: 00404DCB
                                            • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404E44
                                            • SendMessageA.USER32(?,00001102,?,?), ref: 00404EED
                                            • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404EFC
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00404F1C
                                            • ShowWindow.USER32(?,00000000), ref: 00404F6A
                                            • GetDlgItem.USER32(?,000003FE), ref: 00404F75
                                            • ShowWindow.USER32(00000000), ref: 00404F7C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                            • String ID: $M$N
                                            • API String ID: 1638840714-813528018
                                            • Opcode ID: f96aeeab4a25318005a3a9f7b7ecea2fbdc3284bb246aef355b8d85046c4ff9d
                                            • Instruction ID: ec1b41ef9246f4b5ca9c31e675ea93c5522bc938a585a88f05d0904c7564d9ec
                                            • Opcode Fuzzy Hash: f96aeeab4a25318005a3a9f7b7ecea2fbdc3284bb246aef355b8d85046c4ff9d
                                            • Instruction Fuzzy Hash: 7A025FB0900209AFEB10DF94DC85AAE7BB5FB84315F10817AFA10B62E1D7789D42DF58
                                            APIs
                                            • GetDlgItem.USER32(?,00000403), ref: 004051BC
                                            • GetDlgItem.USER32(?,000003EE), ref: 004051CB
                                            • GetClientRect.USER32(?,?), ref: 00405208
                                            • GetSystemMetrics.USER32(00000002), ref: 0040520F
                                            • SendMessageA.USER32(?,0000101B,00000000,?), ref: 00405230
                                            • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405241
                                            • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405254
                                            • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405262
                                            • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405275
                                            • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405297
                                            • ShowWindow.USER32(?,00000008), ref: 004052AB
                                            • GetDlgItem.USER32(?,000003EC), ref: 004052CC
                                            • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004052DC
                                            • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004052F5
                                            • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 00405301
                                            • GetDlgItem.USER32(?,000003F8), ref: 004051DA
                                              • Part of subcall function 00404021: SendMessageA.USER32(00000028,?,00000001,00403E52), ref: 0040402F
                                            • GetDlgItem.USER32(?,000003EC), ref: 0040531D
                                            • CreateThread.KERNEL32(00000000,00000000,Function_000050F1,00000000), ref: 0040532B
                                            • CloseHandle.KERNEL32(00000000), ref: 00405332
                                            • ShowWindow.USER32(00000000), ref: 00405355
                                            • ShowWindow.USER32(?,00000008), ref: 0040535C
                                            • ShowWindow.USER32(00000008), ref: 004053A2
                                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004053D6
                                            • CreatePopupMenu.USER32 ref: 004053E7
                                            • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004053FC
                                            • GetWindowRect.USER32(?,000000FF), ref: 0040541C
                                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405435
                                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405471
                                            • OpenClipboard.USER32(00000000), ref: 00405481
                                            • EmptyClipboard.USER32 ref: 00405487
                                            • GlobalAlloc.KERNEL32(00000042,?), ref: 00405490
                                            • GlobalLock.KERNEL32(00000000), ref: 0040549A
                                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004054AE
                                            • GlobalUnlock.KERNEL32(00000000), ref: 004054C7
                                            • SetClipboardData.USER32(00000001,00000000), ref: 004054D2
                                            • CloseClipboard.USER32 ref: 004054D8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                            • String ID:
                                            • API String ID: 590372296-0
                                            • Opcode ID: 5fccc0b628b5d146bb46abdfcf0f3fd18cc91aed4c2004e16f4bf8579c4053ce
                                            • Instruction ID: 24acf85f457993e5d1a00f4a74fbc0a00d7f38a893508f9c9f1f5035b4e63235
                                            • Opcode Fuzzy Hash: 5fccc0b628b5d146bb46abdfcf0f3fd18cc91aed4c2004e16f4bf8579c4053ce
                                            • Instruction Fuzzy Hash: 5FA15BB1900208BFDB219FA0DD89AAE7F79FB08355F10407AFA04B61A0C7B55E51DF69
                                            APIs
                                            • GetDlgItem.USER32(?,000003FB), ref: 00404479
                                            • SetWindowTextA.USER32(00000000,?), ref: 004044A3
                                            • SHBrowseForFolderA.SHELL32(?,0041F0D0,?), ref: 00404554
                                            • CoTaskMemFree.OLE32(00000000), ref: 0040455F
                                            • lstrcmpiA.KERNEL32(msiexec.exe /i "MATRIX.msi" ,0041FCF8), ref: 00404591
                                            • lstrcatA.KERNEL32(?,msiexec.exe /i "MATRIX.msi" ), ref: 0040459D
                                            • SetDlgItemTextA.USER32(?,000003FB,?), ref: 004045AF
                                              • Part of subcall function 0040552E: GetDlgItemTextA.USER32(?,?,00000400,004045E6), ref: 00405541
                                              • Part of subcall function 00405FA1: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Setup_x86.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,75923410,004033C9), ref: 00405FF9
                                              • Part of subcall function 00405FA1: CharNextA.USER32(?,?,?,00000000), ref: 00406006
                                              • Part of subcall function 00405FA1: CharNextA.USER32(?,"C:\Users\user\Desktop\Setup_x86.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,75923410,004033C9), ref: 0040600B
                                              • Part of subcall function 00405FA1: CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,75923410,004033C9), ref: 0040601B
                                            • GetDiskFreeSpaceA.KERNEL32(0041ECC8,?,?,0000040F,?,0041ECC8,0041ECC8,?,00000000,0041ECC8,?,?,000003FB,?), ref: 0040466C
                                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404687
                                              • Part of subcall function 004047E0: lstrlenA.KERNEL32(0041FCF8,0041FCF8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004046FB,000000DF,00000000,00000400,?), ref: 0040487E
                                              • Part of subcall function 004047E0: wsprintfA.USER32 ref: 00404886
                                              • Part of subcall function 004047E0: SetDlgItemTextA.USER32(?,0041FCF8), ref: 00404899
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                            • String ID: A$C:\Users\user\AppData\Local\Scienta Omicron\Installer\{4B7066F8-B6E1-4A46-BF42-5395F35020B9}$msiexec.exe /i "MATRIX.msi"
                                            • API String ID: 2624150263-601605399
                                            • Opcode ID: f98f00a644f458d2e02a584555e30f134e65ef2c05e9b8026b1db21ee3dd4a2e
                                            • Instruction ID: 5a451af96f6c61f8b8aedc9e732e962e3b59a2a539d705b9404eba0a1a8e20eb
                                            • Opcode Fuzzy Hash: f98f00a644f458d2e02a584555e30f134e65ef2c05e9b8026b1db21ee3dd4a2e
                                            • Instruction Fuzzy Hash: A6A162B1900208ABDB11AFA6CD45AEFB7B9EF85314F10843BF611B72D1D77C89418B69
                                            APIs
                                            • CoCreateInstance.OLE32(00407384,?,00000001,00407374,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040208B
                                            • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,00407374,?,?), ref: 00402143
                                            Strings
                                            • C:\Users\user\AppData\Local\Scienta Omicron\Installer\{4B7066F8-B6E1-4A46-BF42-5395F35020B9}, xrefs: 004020CB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: ByteCharCreateInstanceMultiWide
                                            • String ID: C:\Users\user\AppData\Local\Scienta Omicron\Installer\{4B7066F8-B6E1-4A46-BF42-5395F35020B9}
                                            • API String ID: 123533781-3830421350
                                            • Opcode ID: 6766bdf138d9a3476f59e6ec973922d24ccafdcf77b7cead4b35a4f15cd1a772
                                            • Instruction ID: 1053df79af30500630abfeafbcf843dcec04d0d4e3091bc204b5fde3a4f6985c
                                            • Opcode Fuzzy Hash: 6766bdf138d9a3476f59e6ec973922d24ccafdcf77b7cead4b35a4f15cd1a772
                                            • Instruction Fuzzy Hash: 3B416D71A00209BFCB40EFA4CE88E9E7BB5BF48354B2042A9F911FB2D1D6799D41DB54
                                            APIs
                                            • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 00402654
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: FileFindFirst
                                            • String ID:
                                            • API String ID: 1974802433-0
                                            • Opcode ID: 8c73969c0d40863ae126986d1f1e8202bdf4bd21bda08d418c229d82633c171d
                                            • Instruction ID: 2b7524724565807a685c72c68d6b6eabb337ae57375c882a310f3ed35d4a28aa
                                            • Opcode Fuzzy Hash: 8c73969c0d40863ae126986d1f1e8202bdf4bd21bda08d418c229d82633c171d
                                            • Instruction Fuzzy Hash: D4F0EC72504110EBD700EBB4994DAEE77B8DF51314F60457BE141F21C1D3B84945E72E
                                            APIs
                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403B55
                                            • ShowWindow.USER32(?), ref: 00403B72
                                            • DestroyWindow.USER32 ref: 00403B86
                                            • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403BA2
                                            • GetDlgItem.USER32(?,?), ref: 00403BC3
                                            • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403BD7
                                            • IsWindowEnabled.USER32(00000000), ref: 00403BDE
                                            • GetDlgItem.USER32(?,00000001), ref: 00403C8C
                                            • GetDlgItem.USER32(?,00000002), ref: 00403C96
                                            • SetClassLongA.USER32(?,000000F2,?), ref: 00403CB0
                                            • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403D01
                                            • GetDlgItem.USER32(?,00000003), ref: 00403DA7
                                            • ShowWindow.USER32(00000000,?), ref: 00403DC8
                                            • EnableWindow.USER32(?,?), ref: 00403DDA
                                            • EnableWindow.USER32(?,?), ref: 00403DF5
                                            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403E0B
                                            • EnableMenuItem.USER32(00000000), ref: 00403E12
                                            • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403E2A
                                            • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403E3D
                                            • lstrlenA.KERNEL32(0041FCF8,?,0041FCF8,00422F00), ref: 00403E66
                                            • SetWindowTextA.USER32(?,0041FCF8), ref: 00403E75
                                            • ShowWindow.USER32(?,0000000A), ref: 00403FA9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                            • String ID:
                                            • API String ID: 184305955-0
                                            • Opcode ID: 0715b8fe610bdd71fae90ba33bb4a09e8b5ebb3c50d1a2f397537002d346961d
                                            • Instruction ID: 1f8690e76de68066656ca8d54ad2d010e53819933bf2384d883f7e4ba9537b83
                                            • Opcode Fuzzy Hash: 0715b8fe610bdd71fae90ba33bb4a09e8b5ebb3c50d1a2f397537002d346961d
                                            • Instruction Fuzzy Hash: 17C1C071A04205BBDB21AF21ED48D2B7EBCFB44706F40443EF601B11E1C7799942AB6E
                                            APIs
                                            • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 004041C0
                                            • GetDlgItem.USER32(00000000,000003E8), ref: 004041D4
                                            • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 004041F2
                                            • GetSysColor.USER32(?), ref: 00404203
                                            • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404212
                                            • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404221
                                            • lstrlenA.KERNEL32(?), ref: 00404224
                                            • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404233
                                            • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 00404248
                                            • GetDlgItem.USER32(?,0000040A), ref: 004042AA
                                            • SendMessageA.USER32(00000000), ref: 004042AD
                                            • GetDlgItem.USER32(?,000003E8), ref: 004042D8
                                            • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404318
                                            • LoadCursorA.USER32(00000000,00007F02), ref: 00404327
                                            • SetCursor.USER32(00000000), ref: 00404330
                                            • ShellExecuteA.SHELL32(0000070B,open,004226A0,00000000,00000000,00000001), ref: 00404343
                                            • LoadCursorA.USER32(00000000,00007F00), ref: 00404350
                                            • SetCursor.USER32(00000000), ref: 00404353
                                            • SendMessageA.USER32(00000111,00000001,00000000), ref: 0040437F
                                            • SendMessageA.USER32(00000010,00000000,00000000), ref: 00404393
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                            • String ID: N$msiexec.exe /i "MATRIX.msi" $open
                                            • API String ID: 3615053054-459888845
                                            • Opcode ID: aa854a75b9a8ef41e2656ff54a1ab69c816baf86c41e2f577b142ace3155aca6
                                            • Instruction ID: 47d1c741c4840d0b501b4796cf3fe0e3440e9ec9cd7b0debe1a5eac4f9bfffd7
                                            • Opcode Fuzzy Hash: aa854a75b9a8ef41e2656ff54a1ab69c816baf86c41e2f577b142ace3155aca6
                                            • Instruction Fuzzy Hash: 8F61A0B1A40309BFEB109F61DD45F6A7B69FB84704F108026FB04BB2D1C7B8A951CB99
                                            APIs
                                            • lstrcpyA.KERNEL32(00421A88,NUL,?,00000000,?,00000000,?,00405C12,?,?,00000001,004057B5,?,00000000,000000F1,?), ref: 00405A7E
                                            • CloseHandle.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,?,00405C12,?,?,00000001,004057B5,?,00000000,000000F1,?), ref: 00405AA2
                                            • GetShortPathNameA.KERNEL32(00000000,00421A88,00000400), ref: 00405AAB
                                              • Part of subcall function 0040592C: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405B5B,00000000,[Rename],00000000,00000000,00000000), ref: 0040593C
                                              • Part of subcall function 0040592C: lstrlenA.KERNEL32(00405B5B,?,00000000,00405B5B,00000000,[Rename],00000000,00000000,00000000), ref: 0040596E
                                            • GetShortPathNameA.KERNEL32(?,00421E88,00000400), ref: 00405AC8
                                            • wsprintfA.USER32 ref: 00405AE6
                                            • GetFileSize.KERNEL32(00000000,00000000,00421E88,C0000000,00000004,00421E88,?,?,?,?,?), ref: 00405B21
                                            • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405B30
                                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405B68
                                            • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00421688,00000000,-0000000A,004093A0,00000000,[Rename],00000000,00000000,00000000), ref: 00405BBE
                                            • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405BD0
                                            • GlobalFree.KERNEL32(00000000), ref: 00405BD7
                                            • CloseHandle.KERNEL32(00000000), ref: 00405BDE
                                              • Part of subcall function 004059C7: GetFileAttributesA.KERNELBASE(00000003,00402CBC,C:\Users\user\Desktop\Setup_x86.exe,80000000,00000003), ref: 004059CB
                                              • Part of subcall function 004059C7: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004059ED
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                                            • String ID: %s=%s$NUL$[Rename]
                                            • API String ID: 1265525490-4148678300
                                            • Opcode ID: 10d4b8fe51d6b6f2625f365b8b26cf256cf2f07af5c2bd562b8105816d8408bc
                                            • Instruction ID: 2d1e09aab0418ff75005a817fdb93eb8b9645243d234663ae25a64343302d3c0
                                            • Opcode Fuzzy Hash: 10d4b8fe51d6b6f2625f365b8b26cf256cf2f07af5c2bd562b8105816d8408bc
                                            • Instruction Fuzzy Hash: BE41DEB1604A15BFD6206B219C49F6B3A6CDF45718F14053BBE01FA2D2EA7CB8018E7D
                                            APIs
                                            • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                            • BeginPaint.USER32(?,?), ref: 00401047
                                            • GetClientRect.USER32(?,?), ref: 0040105B
                                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                            • DeleteObject.GDI32(?), ref: 004010ED
                                            • CreateFontIndirectA.GDI32(?), ref: 00401105
                                            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                            • SelectObject.GDI32(00000000,?), ref: 00401140
                                            • DrawTextA.USER32(00000000,00422F00,000000FF,00000010,00000820), ref: 00401156
                                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                            • DeleteObject.GDI32(?), ref: 00401165
                                            • EndPaint.USER32(?,?), ref: 0040116E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                            • String ID: F
                                            • API String ID: 941294808-1304234792
                                            • Opcode ID: c2d680870d7abd1e1a74e136b5aebc8f23ebe5596e06de1d1944de18111d68fb
                                            • Instruction ID: ce5436bc7dfccdabf5b2378cdbc04c65b8fc1f8d51739f20964cb8902a5fcb59
                                            • Opcode Fuzzy Hash: c2d680870d7abd1e1a74e136b5aebc8f23ebe5596e06de1d1944de18111d68fb
                                            • Instruction Fuzzy Hash: F2419A72804249AFCF058F94CD459AFBFB9FF44310F00812AF961AA1A0C738EA50DFA5
                                            APIs
                                            • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Setup_x86.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,75923410,004033C9), ref: 00405FF9
                                            • CharNextA.USER32(?,?,?,00000000), ref: 00406006
                                            • CharNextA.USER32(?,"C:\Users\user\Desktop\Setup_x86.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,75923410,004033C9), ref: 0040600B
                                            • CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,75923410,004033C9), ref: 0040601B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: Char$Next$Prev
                                            • String ID: "C:\Users\user\Desktop\Setup_x86.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                            • API String ID: 589700163-2386977304
                                            • Opcode ID: cac177dc58e6cdce4745106bcf32f060ca56d97be21c35c0cc42ba282efa81fa
                                            • Instruction ID: 96a923a8ee4f60b6f191beee89bac6a1f57d38d5d4ddb578b75945660f6dc773
                                            • Opcode Fuzzy Hash: cac177dc58e6cdce4745106bcf32f060ca56d97be21c35c0cc42ba282efa81fa
                                            • Instruction Fuzzy Hash: 57110451908B9229FB325A284C40B777F99CF5A760F18047FE5C1722C2C67C5C529B6E
                                            APIs
                                            • GetWindowLongA.USER32(?,000000EB), ref: 00404070
                                            • GetSysColor.USER32(00000000), ref: 0040408C
                                            • SetTextColor.GDI32(?,00000000), ref: 00404098
                                            • SetBkMode.GDI32(?,?), ref: 004040A4
                                            • GetSysColor.USER32(?), ref: 004040B7
                                            • SetBkColor.GDI32(?,?), ref: 004040C7
                                            • DeleteObject.GDI32(?), ref: 004040E1
                                            • CreateBrushIndirect.GDI32(?), ref: 004040EB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                            • String ID:
                                            • API String ID: 2320649405-0
                                            • Opcode ID: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                                            • Instruction ID: 47825c477eeffae7bcc1b4b45db8633c52535f80fcd06c8b97140eed864a5805
                                            • Opcode Fuzzy Hash: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                                            • Instruction Fuzzy Hash: 0621A4B18047049BCB309F68DD08B4BBBF8AF40714F048639EA95F26E1C738E944CB65
                                            APIs
                                            • GlobalFree.KERNEL32(00000000), ref: 1000234A
                                              • Part of subcall function 10001224: lstrcpynA.KERNEL32(00000000,?,100012CF,-1000404B,100011AB,-000000A0), ref: 10001234
                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 100022C3
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 100022D8
                                            • GlobalAlloc.KERNEL32(00000040,00000010), ref: 100022E7
                                            • CLSIDFromString.OLE32(00000000,00000000), ref: 100022F4
                                            • GlobalFree.KERNEL32(00000000), ref: 100022FB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3311204738.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 00000000.00000002.3311181301.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.3311228891.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.3311315344.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_10000000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                                            • String ID:
                                            • API String ID: 3730416702-0
                                            • Opcode ID: 5812f53bea9c9c9f79666072e50bc0f3831b96dbb387c6cf78516ccbd9521935
                                            • Instruction ID: fe65b043c70383bd2b49c92c90746d4950a0c6047a38c1932a2dc3020861886a
                                            • Opcode Fuzzy Hash: 5812f53bea9c9c9f79666072e50bc0f3831b96dbb387c6cf78516ccbd9521935
                                            • Instruction Fuzzy Hash: F6418BB1108711EFF720DFA48884B5BB7F8FF443D1F218929F946D61A9DB34AA448B61
                                            APIs
                                              • Part of subcall function 10001215: GlobalAlloc.KERNELBASE(00000040,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                                            • GlobalFree.KERNEL32(?), ref: 100024B9
                                            • GlobalFree.KERNEL32(00000000), ref: 100024F3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3311204738.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 00000000.00000002.3311181301.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.3311228891.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.3311315344.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_10000000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: Global$Free$Alloc
                                            • String ID:
                                            • API String ID: 1780285237-0
                                            • Opcode ID: 28705be4039c1f606362c20ff13fdce37c258c5b4734a68cc6567389004174f8
                                            • Instruction ID: 82133e1bc6da927614d5bcfc3b496831b4cb396c3e6da136b8b2dca3161aa200
                                            • Opcode Fuzzy Hash: 28705be4039c1f606362c20ff13fdce37c258c5b4734a68cc6567389004174f8
                                            • Instruction Fuzzy Hash: 75319CB1504251EFF722CF94CCC4C6B7BBDEB852D4B128569FA4193228DB31AC54DB62
                                            APIs
                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 004026D7
                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,000000F0), ref: 004026F3
                                            • GlobalFree.KERNEL32(?), ref: 0040272C
                                            • WriteFile.KERNEL32(FFFFFD66,00000000,?,FFFFFD66,?,?,?,?,000000F0), ref: 0040273E
                                            • GlobalFree.KERNEL32(00000000), ref: 00402745
                                            • CloseHandle.KERNEL32(FFFFFD66,?,?,000000F0), ref: 0040275D
                                            • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 00402771
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                            • String ID:
                                            • API String ID: 3294113728-0
                                            • Opcode ID: 0f129fd7f7df80537c5f9e1eb6f54556ad660c5267986f7df7bd7c5007d73d3e
                                            • Instruction ID: 552098977e22cffcc29eaacdabede243c0f20e1b5d71923adfcfca28e3e686eb
                                            • Opcode Fuzzy Hash: 0f129fd7f7df80537c5f9e1eb6f54556ad660c5267986f7df7bd7c5007d73d3e
                                            • Instruction Fuzzy Hash: 63318DB1C00118BFCF216FA5CD89DAE7E79EF09364F10423AF520762E1C6795D419BA9
                                            APIs
                                            • lstrlenA.KERNEL32(0041F4D8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405058
                                            • lstrlenA.KERNEL32(00402C51,0041F4D8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405068
                                            • lstrcatA.KERNEL32(0041F4D8,00402C51,00402C51,0041F4D8,00000000,00000000,00000000), ref: 0040507B
                                            • SetWindowTextA.USER32(0041F4D8,0041F4D8), ref: 0040508D
                                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004050B3
                                            • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004050CD
                                            • SendMessageA.USER32(?,00001013,?,00000000), ref: 004050DB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                            • String ID:
                                            • API String ID: 2531174081-0
                                            • Opcode ID: fe51e3db3acd615496ccbf9ac5cad90a085764a87c5addfa2b073bf2a2aea827
                                            • Instruction ID: 2b33129011dff48d1edd85efe61027b37dbb0349f6b457de8e93b882053e083c
                                            • Opcode Fuzzy Hash: fe51e3db3acd615496ccbf9ac5cad90a085764a87c5addfa2b073bf2a2aea827
                                            • Instruction Fuzzy Hash: C2219071900508BBDB119FA5CD84ADFBFB9EF14354F14807AF544B6290C2794E45DFA8
                                            APIs
                                            • DestroyWindow.USER32(00000000,00000000), ref: 00402BF2
                                            • GetTickCount.KERNEL32 ref: 00402C10
                                            • wsprintfA.USER32 ref: 00402C3E
                                              • Part of subcall function 0040501F: lstrlenA.KERNEL32(0041F4D8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405058
                                              • Part of subcall function 0040501F: lstrlenA.KERNEL32(00402C51,0041F4D8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405068
                                              • Part of subcall function 0040501F: lstrcatA.KERNEL32(0041F4D8,00402C51,00402C51,0041F4D8,00000000,00000000,00000000), ref: 0040507B
                                              • Part of subcall function 0040501F: SetWindowTextA.USER32(0041F4D8,0041F4D8), ref: 0040508D
                                              • Part of subcall function 0040501F: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004050B3
                                              • Part of subcall function 0040501F: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004050CD
                                              • Part of subcall function 0040501F: SendMessageA.USER32(?,00001013,?,00000000), ref: 004050DB
                                            • CreateDialogParamA.USER32(0000006F,00000000,00402B42,00000000), ref: 00402C62
                                            • ShowWindow.USER32(00000000,00000005), ref: 00402C70
                                              • Part of subcall function 00402BBE: MulDiv.KERNEL32(00000000,00000064,0000489A), ref: 00402BD3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                            • String ID: ... %d%%
                                            • API String ID: 722711167-2449383134
                                            • Opcode ID: 71ceea4fecd240b715e1583c6742d443c774c4b1fc767c2b6efff362cb3abd53
                                            • Instruction ID: 53b2eec8c243fd5a5b591a6d8e7090b5e500d3da6e0592f5c5af2241ed808ea0
                                            • Opcode Fuzzy Hash: 71ceea4fecd240b715e1583c6742d443c774c4b1fc767c2b6efff362cb3abd53
                                            • Instruction Fuzzy Hash: AB0188B0949614ABDB216F64AE4DE9F7B7CFB017057148037FA01B11E1C6B8D541CBAE
                                            APIs
                                            • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404905
                                            • GetMessagePos.USER32 ref: 0040490D
                                            • ScreenToClient.USER32(?,?), ref: 00404927
                                            • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404939
                                            • SendMessageA.USER32(?,0000110C,00000000,?), ref: 0040495F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: Message$Send$ClientScreen
                                            • String ID: f
                                            • API String ID: 41195575-1993550816
                                            • Opcode ID: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                                            • Instruction ID: 7baaa9b85802c8a5173365c44ed2834cc31749f5d024e9fb4d2ec5e64c2f69ce
                                            • Opcode Fuzzy Hash: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                                            • Instruction Fuzzy Hash: E40140B1D00218BADB01DBA4DC85FFFBBBCAB95721F10412BBA10B61D0C7B469018BA5
                                            APIs
                                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402B5D
                                            • wsprintfA.USER32 ref: 00402B91
                                            • SetWindowTextA.USER32(?,?), ref: 00402BA1
                                            • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BB3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: Text$ItemTimerWindowwsprintf
                                            • String ID: unpacking data: %d%%$verifying installer: %d%%
                                            • API String ID: 1451636040-1158693248
                                            • Opcode ID: bccffcf18056edd42c20cb723d80919439a72dcdb3cc8cc3de12e394d3f134cc
                                            • Instruction ID: 4b4d840d1cf11f9656568dd8641bec75cd76f4f3bd4f461a87d93eb2d0bf3f96
                                            • Opcode Fuzzy Hash: bccffcf18056edd42c20cb723d80919439a72dcdb3cc8cc3de12e394d3f134cc
                                            • Instruction Fuzzy Hash: F7F01D70900208BBEF215F61DD4ABEE3779EB00345F00803AFA06B51D0D7F8AA558B9A
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3311204738.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 00000000.00000002.3311181301.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.3311228891.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.3311315344.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_10000000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: FreeGlobal
                                            • String ID:
                                            • API String ID: 2979337801-0
                                            • Opcode ID: 0c473814e0966ac58776859a9061c1e440c53011a0554eaa903a9fb75293bb16
                                            • Instruction ID: 97b6efd1b10b48d7ee9b7c7fbc92de58723c24235f199e6d6d25645bb0e8c5d4
                                            • Opcode Fuzzy Hash: 0c473814e0966ac58776859a9061c1e440c53011a0554eaa903a9fb75293bb16
                                            • Instruction Fuzzy Hash: DC512532D04159AEFB55DFB488A4AEEBBF6EF453C0F12416AE841B315DCA306E4087D2
                                            APIs
                                            • RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?), ref: 00402A5E
                                            • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402A9A
                                            • RegCloseKey.ADVAPI32(?), ref: 00402AA3
                                            • RegCloseKey.ADVAPI32(?), ref: 00402AC8
                                            • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402AE6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: Close$DeleteEnumOpen
                                            • String ID:
                                            • API String ID: 1912718029-0
                                            • Opcode ID: 5733a3c7ed8837a4e33d89bc0436a18c4a21248f1d51b77dead4e3ad8d80db37
                                            • Instruction ID: 1cfc72d501241f28ff1c9237e437913a5e8660848d06dce24e2e83bd327c9a1b
                                            • Opcode Fuzzy Hash: 5733a3c7ed8837a4e33d89bc0436a18c4a21248f1d51b77dead4e3ad8d80db37
                                            • Instruction Fuzzy Hash: EA114F71A00108FFDF219F90DE48EAA3B7DEB44349B104076FA05B11A0DBB49E559F69
                                            APIs
                                            • GetDlgItem.USER32(?), ref: 00401CD0
                                            • GetClientRect.USER32(00000000,?), ref: 00401CDD
                                            • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401CFE
                                            • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D0C
                                            • DeleteObject.GDI32(00000000), ref: 00401D1B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                            • String ID:
                                            • API String ID: 1849352358-0
                                            • Opcode ID: feff7bd0ac8b8d98e410c971607266924d1cc5c353d4854e70ab97e8d29ee8d5
                                            • Instruction ID: 68903ef9478fc0d920f95a79cd5396482650d24808bb52901199de5d2149753e
                                            • Opcode Fuzzy Hash: feff7bd0ac8b8d98e410c971607266924d1cc5c353d4854e70ab97e8d29ee8d5
                                            • Instruction Fuzzy Hash: 06F062B2A05114BFD701DBA4EE88CAF77BCEB44301B008576F501F2091C7389D019B79
                                            APIs
                                            • GetDC.USER32(?), ref: 00401D29
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D36
                                            • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D45
                                            • ReleaseDC.USER32(?,00000000), ref: 00401D56
                                            • CreateFontIndirectA.GDI32(0040A7D0), ref: 00401DA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: CapsCreateDeviceFontIndirectRelease
                                            • String ID:
                                            • API String ID: 3808545654-0
                                            • Opcode ID: 7af4cf4b66e980d364c2e3aa9c64882f60449cc7f52f10eab55021efc1d5f786
                                            • Instruction ID: b452d76144ce78c1ea2c31cbd89393ff29a213aa8dcca448cc35c7c7cb6754f7
                                            • Opcode Fuzzy Hash: 7af4cf4b66e980d364c2e3aa9c64882f60449cc7f52f10eab55021efc1d5f786
                                            • Instruction Fuzzy Hash: F8011271948340AFE701DBB0AE0EB9A7F74EB19705F108535F141B72E2C6B954159B2F
                                            APIs
                                            • lstrlenA.KERNEL32(0041FCF8,0041FCF8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004046FB,000000DF,00000000,00000400,?), ref: 0040487E
                                            • wsprintfA.USER32 ref: 00404886
                                            • SetDlgItemTextA.USER32(?,0041FCF8), ref: 00404899
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: ItemTextlstrlenwsprintf
                                            • String ID: %u.%u%s%s
                                            • API String ID: 3540041739-3551169577
                                            • Opcode ID: 878f77dbdcb51275c09da16e61d4023f379ce68319930481f66ff31823ee0149
                                            • Instruction ID: 8631c14a921e8479d2aaee063571767324bc63c1cfe9171b6f21c1c007081b9c
                                            • Opcode Fuzzy Hash: 878f77dbdcb51275c09da16e61d4023f379ce68319930481f66ff31823ee0149
                                            • Instruction Fuzzy Hash: 90112433A441283BDB0065AD9C49EAF328CDF81334F244637FA25F61D1E9788C1292E8
                                            APIs
                                            • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C18
                                            • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C30
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: MessageSend$Timeout
                                            • String ID: !
                                            • API String ID: 1777923405-2657877971
                                            • Opcode ID: 223d8f7865d2b1dd0e95bc8f55079009c40be9e2a37a1be7db68750e4265ac19
                                            • Instruction ID: c8505a4ed1fbcfe48898eca751f608fe424cacc25c72cee6cab93c7adb8e4515
                                            • Opcode Fuzzy Hash: 223d8f7865d2b1dd0e95bc8f55079009c40be9e2a37a1be7db68750e4265ac19
                                            • Instruction Fuzzy Hash: 742190B1A44208BFEF41AFB4CD4AAAE7BB5EF40344F14453EF541B61D1D6B89A40E728
                                            APIs
                                            • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,75922EE0,004036C9,75923410,004034D6,?), ref: 0040370C
                                            • GlobalFree.KERNEL32(00535C20), ref: 00403713
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: Free$GlobalLibrary
                                            • String ID: \S$C:\Users\user\AppData\Local\Temp\
                                            • API String ID: 1100898210-1999665533
                                            • Opcode ID: 86ea4e8f2e330b4051334ac2fa91e3adcb647da4565bec0431381526e270e322
                                            • Instruction ID: 0fe4964e98027e88380181352afc78dea88c0f551701ba437740c6db36bc47f5
                                            • Opcode Fuzzy Hash: 86ea4e8f2e330b4051334ac2fa91e3adcb647da4565bec0431381526e270e322
                                            • Instruction Fuzzy Hash: 0EE0EC7390512097C6215F96AD04B5ABB686B89B62F06842AED407B3A18B746C418BD9
                                            APIs
                                            • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403201,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923410,004033C9), ref: 004057CC
                                            • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403201,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923410,004033C9), ref: 004057D5
                                            • lstrcatA.KERNEL32(?,00409014), ref: 004057E6
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 004057C6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: CharPrevlstrcatlstrlen
                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                            • API String ID: 2659869361-823278215
                                            • Opcode ID: 890135f98a5a9138db31eb4b1572133a55ea61a04d2c03425938916b0e2dddc9
                                            • Instruction ID: c144259923a6e848a034fe90771ae4f3275bad2fdba58d127270a3e6eafdfb33
                                            • Opcode Fuzzy Hash: 890135f98a5a9138db31eb4b1572133a55ea61a04d2c03425938916b0e2dddc9
                                            • Instruction Fuzzy Hash: 00D0A962606A306BD20222168C09E8F6A08CF06300B044033F204B62B2C63C0D418FFE
                                            APIs
                                            • RegCreateKeyExA.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040235A
                                            • lstrlenA.KERNEL32(00409BC8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040237A
                                            • RegSetValueExA.ADVAPI32(?,?,?,?,00409BC8,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B3
                                            • RegCloseKey.ADVAPI32(?,?,?,00409BC8,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402490
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: CloseCreateValuelstrlen
                                            • String ID:
                                            • API String ID: 1356686001-0
                                            • Opcode ID: b5d2e43241cc5f1c643ac0585cf0187cb16dde17b219008d57ea00b15267c4df
                                            • Instruction ID: 937c1904c824b73ffe337d2eacc138a1f8ac1658d2030852d1a46e58dbdf142b
                                            • Opcode Fuzzy Hash: b5d2e43241cc5f1c643ac0585cf0187cb16dde17b219008d57ea00b15267c4df
                                            • Instruction Fuzzy Hash: D71172B1E00118BFEB10EFA4DE89EAF7678FB50358F10413AF905B61D1D7B85D41A668
                                            APIs
                                            • GetFileVersionInfoSizeA.VERSION(00000000,?,000000EE), ref: 00401EEB
                                            • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401F09
                                            • GetFileVersionInfoA.VERSION(?,?,?,00000000), ref: 00401F22
                                            • VerQueryValueA.VERSION(?,00409014,?,?,?,?,?,00000000), ref: 00401F3B
                                              • Part of subcall function 00405C94: wsprintfA.USER32 ref: 00405CA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                            • String ID:
                                            • API String ID: 1404258612-0
                                            • Opcode ID: ec7151e13ff031cd6146c14c1100c40685b360c9b493fb258c96d19e35a9089b
                                            • Instruction ID: 9791f4c70c1528f8983e13c97e2cb0ced061aec02aec85b9ff59acd402aedfa8
                                            • Opcode Fuzzy Hash: ec7151e13ff031cd6146c14c1100c40685b360c9b493fb258c96d19e35a9089b
                                            • Instruction Fuzzy Hash: A0117071901209BEDF01EFA5DD85DAEBBB9EF04344B20807AF505F61A1D7388E55DB28
                                            APIs
                                            • CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsm4376.tmp,?,004058CB,C:\Users\user\AppData\Local\Temp\nsm4376.tmp,C:\Users\user\AppData\Local\Temp\nsm4376.tmp,?,?,75922EE0,00405616,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 0040586D
                                            • CharNextA.USER32(00000000), ref: 00405872
                                            • CharNextA.USER32(00000000), ref: 00405886
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\nsm4376.tmp, xrefs: 00405860
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: CharNext
                                            • String ID: C:\Users\user\AppData\Local\Temp\nsm4376.tmp
                                            • API String ID: 3213498283-259832687
                                            • Opcode ID: 2ea991d7d7ffd85479a521eab3fc1e567f9f9a9fdda000af801139d1d19966a1
                                            • Instruction ID: 725a23b4e930c3b6c27a7d0cd0e333612dd42f6c53d199a680129a9385ae8045
                                            • Opcode Fuzzy Hash: 2ea991d7d7ffd85479a521eab3fc1e567f9f9a9fdda000af801139d1d19966a1
                                            • Instruction Fuzzy Hash: 74F06253914F516AFB3276645C44B7B5A8CCF56361F188477EE40A62C2C2BC4C618F9A
                                            APIs
                                            • SetWindowTextA.USER32(00000000,00422F00), ref: 00403AE4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: TextWindow
                                            • String ID: "C:\Users\user\Desktop\Setup_x86.exe"$1033
                                            • API String ID: 530164218-2672335317
                                            • Opcode ID: c20953c35db1116ecdf277b9f7b3923fed37fef6e8e5c3a171d6f7dc7f85f207
                                            • Instruction ID: 694a286dd4981efc18ef326c294584d4bec2a1602357d8abc11fec8a6f834ca0
                                            • Opcode Fuzzy Hash: c20953c35db1116ecdf277b9f7b3923fed37fef6e8e5c3a171d6f7dc7f85f207
                                            • Instruction Fuzzy Hash: EC11D4B1B046109BCB24DF15DC809337BBDEB8471A329813BE941A73A1C73D9E029A98
                                            APIs
                                            • IsWindowVisible.USER32(?), ref: 00404FC2
                                            • CallWindowProcA.USER32(?,?,?,?), ref: 00405013
                                              • Part of subcall function 00404038: SendMessageA.USER32(00000000,00000000,00000000,00000000), ref: 0040404A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: Window$CallMessageProcSendVisible
                                            • String ID:
                                            • API String ID: 3748168415-3916222277
                                            • Opcode ID: a1366604d20516d7a227b416e124a8c8ccbf6a8c92e3cea699473ae65b9a4b61
                                            • Instruction ID: 01da3f5901ddaf9404fa7d81b8fd4ad62d8e53e58d7af57a61279808ed2d7cb1
                                            • Opcode Fuzzy Hash: a1366604d20516d7a227b416e124a8c8ccbf6a8c92e3cea699473ae65b9a4b61
                                            • Instruction Fuzzy Hash: EA018F7110020DABDF209F11DC85E9F3B6AF784758F208037FA04752D1D77A8C92AAAE
                                            APIs
                                              • Part of subcall function 00405D36: lstrcpynA.KERNEL32(?,?,00000400,00403287,00422F00,NSIS Error), ref: 00405D43
                                              • Part of subcall function 0040585F: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsm4376.tmp,?,004058CB,C:\Users\user\AppData\Local\Temp\nsm4376.tmp,C:\Users\user\AppData\Local\Temp\nsm4376.tmp,?,?,75922EE0,00405616,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 0040586D
                                              • Part of subcall function 0040585F: CharNextA.USER32(00000000), ref: 00405872
                                              • Part of subcall function 0040585F: CharNextA.USER32(00000000), ref: 00405886
                                            • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsm4376.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsm4376.tmp,C:\Users\user\AppData\Local\Temp\nsm4376.tmp,?,?,75922EE0,00405616,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 00405907
                                            • GetFileAttributesA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsm4376.tmp,C:\Users\user\AppData\Local\Temp\nsm4376.tmp,C:\Users\user\AppData\Local\Temp\nsm4376.tmp,C:\Users\user\AppData\Local\Temp\nsm4376.tmp,C:\Users\user\AppData\Local\Temp\nsm4376.tmp,C:\Users\user\AppData\Local\Temp\nsm4376.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsm4376.tmp,C:\Users\user\AppData\Local\Temp\nsm4376.tmp,?,?,75922EE0,00405616,?,C:\Users\user\AppData\Local\Temp\,75922EE0), ref: 00405917
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                            • String ID: C:\Users\user\AppData\Local\Temp\nsm4376.tmp
                                            • API String ID: 3248276644-259832687
                                            • Opcode ID: 681a1499075d1ef18d3e94b36260b5cb5e6403957cf75bde6daaeed28ee23a5f
                                            • Instruction ID: cee4b60d78671bb78a10d3fddc0396ac835ea714c96625339261d657e7680c9f
                                            • Opcode Fuzzy Hash: 681a1499075d1ef18d3e94b36260b5cb5e6403957cf75bde6daaeed28ee23a5f
                                            • Instruction Fuzzy Hash: 0AF02823105D6026C63233391C09AAF1B95CE86368B24853FFC51B22D1DB3C8863DE7E
                                            APIs
                                            • lstrlenA.KERNEL32(00000000,00000011), ref: 004024EF
                                            • WriteFile.KERNEL32(00000000,?,C:\Users\user\AppData\Local\Temp\nsm4376.tmp\version.dll,00000000,?,?,00000000,00000011), ref: 0040250E
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\nsm4376.tmp\version.dll, xrefs: 004024DD, 00402502
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: FileWritelstrlen
                                            • String ID: C:\Users\user\AppData\Local\Temp\nsm4376.tmp\version.dll
                                            • API String ID: 427699356-3374748803
                                            • Opcode ID: 940008227e3000e27693e8b891f8179a8cfec3dced6337216f9b89fca6ff3594
                                            • Instruction ID: 4826b5ec7f58a8945af1d05ae4e09a11cd1e532a13e769836b40841c5f4177c7
                                            • Opcode Fuzzy Hash: 940008227e3000e27693e8b891f8179a8cfec3dced6337216f9b89fca6ff3594
                                            • Instruction Fuzzy Hash: 80F054B2A54244BFDB40ABA19E499EB66A4DB40309F10443FB141F61C2D5BC4941A66A
                                            APIs
                                            • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402CE5,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Setup_x86.exe,C:\Users\user\Desktop\Setup_x86.exe,80000000,00000003), ref: 00405813
                                            • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402CE5,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Setup_x86.exe,C:\Users\user\Desktop\Setup_x86.exe,80000000,00000003), ref: 00405821
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: CharPrevlstrlen
                                            • String ID: C:\Users\user\Desktop
                                            • API String ID: 2709904686-1246513382
                                            • Opcode ID: c27a981e79bb352b20b7a8c74a9367836393bd04b8b6ccbc39cacac652a51138
                                            • Instruction ID: ba052d51ab232c33a65bcd29671eceb75c11827358d6bb1c4ef4a0a5cf44e1aa
                                            • Opcode Fuzzy Hash: c27a981e79bb352b20b7a8c74a9367836393bd04b8b6ccbc39cacac652a51138
                                            • Instruction Fuzzy Hash: 94D0A77341AD701EE30372109C04B8F6A48CF16300F098462E440B61A0C2780C414BED
                                            APIs
                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 1000115B
                                            • GlobalFree.KERNEL32(00000000), ref: 100011B4
                                            • GlobalFree.KERNEL32(?), ref: 100011C7
                                            • GlobalFree.KERNEL32(?), ref: 100011F5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3311204738.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 00000000.00000002.3311181301.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.3311228891.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.3311315344.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_10000000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: Global$Free$Alloc
                                            • String ID:
                                            • API String ID: 1780285237-0
                                            • Opcode ID: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                                            • Instruction ID: 5d3a3765e571093bf703368c32e31ec5bfeafbef09712c331e02e9e13643e521
                                            • Opcode Fuzzy Hash: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                                            • Instruction Fuzzy Hash: 6531ABB1808255AFF715CFA8DC89AEA7FE8EB052C1B164115FA45D726CDB34D910CB24
                                            APIs
                                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405B5B,00000000,[Rename],00000000,00000000,00000000), ref: 0040593C
                                            • lstrcmpiA.KERNEL32(00405B5B,00000000), ref: 00405954
                                            • CharNextA.USER32(00405B5B,?,00000000,00405B5B,00000000,[Rename],00000000,00000000,00000000), ref: 00405965
                                            • lstrlenA.KERNEL32(00405B5B,?,00000000,00405B5B,00000000,[Rename],00000000,00000000,00000000), ref: 0040596E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3309433404.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3309414506.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309461480.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309479994.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3309636714.000000000042D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Setup_x86.jbxd
                                            Similarity
                                            • API ID: lstrlen$CharNextlstrcmpi
                                            • String ID:
                                            • API String ID: 190613189-0
                                            • Opcode ID: 0add82ed76356020c4ee8264c56a6ad6875436601f5ed096891bbb40787d2247
                                            • Instruction ID: 6acf3bc3cda9f3bfd2525b0ac34aa546eab038af588102683640af0afc927a81
                                            • Opcode Fuzzy Hash: 0add82ed76356020c4ee8264c56a6ad6875436601f5ed096891bbb40787d2247
                                            • Instruction Fuzzy Hash: 27F0C232604518FFC7129BA4DD40D9FBBA8EF06360B2500AAE800F7250D274EE019FAA