Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
HHn9tNeZd8.exe

Overview

General Information

Sample name:HHn9tNeZd8.exe
renamed because original name is a hash value
Original sample name:ac181e995def08ad2ca48afff1aa70b0d534504e6cb9e4056644d616fcce77db.exe
Analysis ID:1550284
MD5:e568ed81e7672a30a6954c966b617de2
SHA1:f488b104c27b490d4d2b69d2fe8206dd45036347
SHA256:ac181e995def08ad2ca48afff1aa70b0d534504e6cb9e4056644d616fcce77db
Tags:exeuser-adrian__luca
Infos:

Detection

GuLoader
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Opens the same file many times (likely Sandbox evasion)
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
PE / OLE file has an invalid certificate
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • HHn9tNeZd8.exe (PID: 4524 cmdline: "C:\Users\user\Desktop\HHn9tNeZd8.exe" MD5: E568ED81E7672A30A6954C966B617DE2)
    • HHn9tNeZd8.exe (PID: 2060 cmdline: "C:\Users\user\Desktop\HHn9tNeZd8.exe" MD5: E568ED81E7672A30A6954C966B617DE2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.2255135290.000000000568E000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    0000000B.00000002.2503937084.0000000003F2E000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-11-06T16:30:42.169878+010020229301A Network Trojan was detected20.12.23.50443192.168.2.749734TCP
      2024-11-06T16:31:21.149647+010020229301A Network Trojan was detected20.12.23.50443192.168.2.749814TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: HHn9tNeZd8.exeAvira: detected
      Source: HHn9tNeZd8.exeReversingLabs: Detection: 44%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: HHn9tNeZd8.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: HHn9tNeZd8.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: HHn9tNeZd8.exe, 0000000B.00000001.2253796368.0000000000649000.00000020.00000001.01000000.00000007.sdmp
      Source: Binary string: mshtml.pdbUGP source: HHn9tNeZd8.exe, 0000000B.00000001.2253796368.0000000000649000.00000020.00000001.01000000.00000007.sdmp
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeCode function: 0_2_00405C60 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C60
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeCode function: 0_2_004068B1 FindFirstFileW,FindClose,0_2_004068B1
      Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.12.23.50:443 -> 192.168.2.7:49734
      Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.12.23.50:443 -> 192.168.2.7:49814
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficDNS traffic detected: DNS query: kmsaksesuar.com
      Source: HHn9tNeZd8.exeString found in binary or memory: http://crl.apple.com/root.crl0
      Source: HHn9tNeZd8.exeString found in binary or memory: http://crl.apple.com/timestamp.crl0
      Source: HHn9tNeZd8.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: HHn9tNeZd8.exeString found in binary or memory: http://www.apple.com/appleca0
      Source: HHn9tNeZd8.exe, 0000000B.00000001.2253796368.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.ftp.ftp://ftp.gopher.
      Source: HHn9tNeZd8.exe, 0000000B.00000001.2253796368.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
      Source: HHn9tNeZd8.exe, 0000000B.00000001.2253796368.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
      Source: HHn9tNeZd8.exe, 0000000B.00000001.2253796368.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
      Source: HHn9tNeZd8.exe, 0000000B.00000002.2507997746.00000000051F8000.00000004.00000020.00020000.00000000.sdmp, HHn9tNeZd8.exe, 0000000B.00000002.2507997746.0000000005248000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kmsaksesuar.com/
      Source: HHn9tNeZd8.exe, 0000000B.00000002.2507997746.00000000051F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kmsaksesuar.com/-=
      Source: HHn9tNeZd8.exe, 0000000B.00000002.2507997746.0000000005248000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kmsaksesuar.com/h
      Source: HHn9tNeZd8.exe, 0000000B.00000002.2507997746.0000000005235000.00000004.00000020.00020000.00000000.sdmp, HHn9tNeZd8.exe, 0000000B.00000002.2527446826.00000000347B0000.00000004.00001000.00020000.00000000.sdmp, HHn9tNeZd8.exe, 0000000B.00000002.2507997746.00000000051F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kmsaksesuar.com/mAtGyGKTsvvO213.bin
      Source: HHn9tNeZd8.exe, 0000000B.00000002.2507997746.0000000005235000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kmsaksesuar.com/mAtGyGKTsvvO213.bin)
      Source: HHn9tNeZd8.exe, 0000000B.00000002.2507997746.0000000005235000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kmsaksesuar.com/mAtGyGKTsvvO213.bin0
      Source: HHn9tNeZd8.exe, 0000000B.00000002.2507997746.0000000005235000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kmsaksesuar.com/mAtGyGKTsvvO213.binA
      Source: HHn9tNeZd8.exeString found in binary or memory: https://www.apple.com/appleca/0
      Source: unknownNetwork traffic detected: HTTP traffic on port 49970 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49970
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeCode function: 0_2_0040352F EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352F
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeFile created: C:\Windows\resources\primy.iniJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeCode function: 0_2_70341BFF0_2_70341BFF
      Source: HHn9tNeZd8.exeStatic PE information: invalid certificate
      Source: HHn9tNeZd8.exe, 00000000.00000000.1254673975.00000000007F6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamealbuestdene nondisparate.exe4 vs HHn9tNeZd8.exe
      Source: HHn9tNeZd8.exe, 0000000B.00000000.2252790337.00000000007F6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamealbuestdene nondisparate.exe4 vs HHn9tNeZd8.exe
      Source: HHn9tNeZd8.exeBinary or memory string: OriginalFilenamealbuestdene nondisparate.exe4 vs HHn9tNeZd8.exe
      Source: HHn9tNeZd8.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal80.troj.evad.winEXE@2/12@1/1
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeCode function: 0_2_0040352F EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352F
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeFile created: C:\Users\user\imaumsJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeFile created: C:\Users\user~1\AppData\Local\Temp\nsuD9FE.tmpJump to behavior
      Source: HHn9tNeZd8.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: HHn9tNeZd8.exeReversingLabs: Detection: 44%
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeFile read: C:\Users\user\Desktop\HHn9tNeZd8.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\HHn9tNeZd8.exe "C:\Users\user\Desktop\HHn9tNeZd8.exe"
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeProcess created: C:\Users\user\Desktop\HHn9tNeZd8.exe "C:\Users\user\Desktop\HHn9tNeZd8.exe"
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeFile written: C:\Windows\Resources\primy.iniJump to behavior
      Source: HHn9tNeZd8.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: HHn9tNeZd8.exe, 0000000B.00000001.2253796368.0000000000649000.00000020.00000001.01000000.00000007.sdmp
      Source: Binary string: mshtml.pdbUGP source: HHn9tNeZd8.exe, 0000000B.00000001.2253796368.0000000000649000.00000020.00000001.01000000.00000007.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000000.00000002.2255135290.000000000568E000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.2503937084.0000000003F2E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeCode function: 0_2_70341BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_70341BFF
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeCode function: 0_2_703430C0 push eax; ret 0_2_703430EE
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeFile created: C:\Users\user\AppData\Local\Temp\nsf288C.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeFile opened: C:\Program Files (x86)\salinity\hypophyllum.ter count: 40076Jump to behavior
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeAPI/Special instruction interceptor: Address: 5BA2AEB
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeAPI/Special instruction interceptor: Address: 4442AEB
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeRDTSC instruction interceptor: First address: 5B6A223 second address: 5B6A223 instructions: 0x00000000 rdtsc 0x00000002 cmp ecx, edx 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F75E0CA4B68h 0x00000008 inc ebp 0x00000009 inc ebx 0x0000000a rdtsc
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeRDTSC instruction interceptor: First address: 440A223 second address: 440A223 instructions: 0x00000000 rdtsc 0x00000002 cmp ecx, edx 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F75E0CFA278h 0x00000008 inc ebp 0x00000009 inc ebx 0x0000000a rdtsc
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsf288C.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeCode function: 0_2_00405C60 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C60
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeCode function: 0_2_004068B1 FindFirstFileW,FindClose,0_2_004068B1
      Source: HHn9tNeZd8.exe, 0000000B.00000002.2507997746.000000000524E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: HHn9tNeZd8.exe, 0000000B.00000002.2507997746.00000000051F8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh0%
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeAPI call chain: ExitProcess graph end nodegraph_0-2644
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeAPI call chain: ExitProcess graph end nodegraph_0-2870
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeCode function: 0_2_70341BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_70341BFF
      Source: C:\Users\user\Desktop\HHn9tNeZd8.exeCode function: 0_2_0040352F EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352F
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      DLL Side-Loading
      1
      Access Token Manipulation
      11
      Masquerading
      OS Credential Dumping21
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      12
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      Process Injection
      1
      Virtualization/Sandbox Evasion
      LSASS Memory1
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable Media1
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      1
      Access Token Manipulation
      Security Account Manager3
      File and Directory Discovery
      SMB/Windows Admin SharesData from Network Shared Drive2
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Process Injection
      NTDS22
      System Information Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Obfuscated Files or Information
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      DLL Side-Loading
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      HHn9tNeZd8.exe45%ReversingLabsWin32.Trojan.Guloader
      HHn9tNeZd8.exe100%AviraHEUR/AGEN.1331786
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nsf288C.tmp\System.dll0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://kmsaksesuar.com/mAtGyGKTsvvO213.bin0%Avira URL Cloudsafe
      https://kmsaksesuar.com/mAtGyGKTsvvO213.bin)0%Avira URL Cloudsafe
      https://kmsaksesuar.com/0%Avira URL Cloudsafe
      https://kmsaksesuar.com/mAtGyGKTsvvO213.binA0%Avira URL Cloudsafe
      https://kmsaksesuar.com/-=0%Avira URL Cloudsafe
      https://kmsaksesuar.com/h0%Avira URL Cloudsafe
      https://kmsaksesuar.com/mAtGyGKTsvvO213.bin00%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      kmsaksesuar.com
      44.28.239.165
      truefalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtdHHn9tNeZd8.exe, 0000000B.00000001.2253796368.00000000005F2000.00000020.00000001.01000000.00000007.sdmpfalse
          high
          https://kmsaksesuar.com/mAtGyGKTsvvO213.binHHn9tNeZd8.exe, 0000000B.00000002.2507997746.0000000005235000.00000004.00000020.00020000.00000000.sdmp, HHn9tNeZd8.exe, 0000000B.00000002.2527446826.00000000347B0000.00000004.00001000.00020000.00000000.sdmp, HHn9tNeZd8.exe, 0000000B.00000002.2507997746.00000000051F8000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.ftp.ftp://ftp.gopher.HHn9tNeZd8.exe, 0000000B.00000001.2253796368.0000000000649000.00000020.00000001.01000000.00000007.sdmpfalse
            high
            https://kmsaksesuar.com/HHn9tNeZd8.exe, 0000000B.00000002.2507997746.00000000051F8000.00000004.00000020.00020000.00000000.sdmp, HHn9tNeZd8.exe, 0000000B.00000002.2507997746.0000000005248000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtdHHn9tNeZd8.exe, 0000000B.00000001.2253796368.00000000005F2000.00000020.00000001.01000000.00000007.sdmpfalse
              high
              https://kmsaksesuar.com/mAtGyGKTsvvO213.bin)HHn9tNeZd8.exe, 0000000B.00000002.2507997746.0000000005235000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://nsis.sf.net/NSIS_ErrorErrorHHn9tNeZd8.exefalse
                high
                https://kmsaksesuar.com/hHHn9tNeZd8.exe, 0000000B.00000002.2507997746.0000000005248000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://kmsaksesuar.com/-=HHn9tNeZd8.exe, 0000000B.00000002.2507997746.00000000051F8000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://kmsaksesuar.com/mAtGyGKTsvvO213.binAHHn9tNeZd8.exe, 0000000B.00000002.2507997746.0000000005235000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://kmsaksesuar.com/mAtGyGKTsvvO213.bin0HHn9tNeZd8.exe, 0000000B.00000002.2507997746.0000000005235000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214HHn9tNeZd8.exe, 0000000B.00000001.2253796368.0000000000649000.00000020.00000001.01000000.00000007.sdmpfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  44.28.239.165
                  kmsaksesuar.comUnited States
                  7377UCSDUSfalse
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1550284
                  Start date and time:2024-11-06 16:29:26 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 6m 48s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:14
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:HHn9tNeZd8.exe
                  renamed because original name is a hash value
                  Original Sample Name:ac181e995def08ad2ca48afff1aa70b0d534504e6cb9e4056644d616fcce77db.exe
                  Detection:MAL
                  Classification:mal80.troj.evad.winEXE@2/12@1/1
                  EGA Information:
                  • Successful, ratio: 50%
                  HCA Information:
                  • Successful, ratio: 57%
                  • Number of executed functions: 27
                  • Number of non-executed functions: 16
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                  • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • VT rate limit hit for: HHn9tNeZd8.exe
                  No simulations
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  44.28.239.165qmt875Vf1A.exeGet hashmaliciousGuLoaderBrowse
                    qmt875Vf1A.exeGet hashmaliciousGuLoaderBrowse
                      czffIfANiL.exeGet hashmaliciousGuLoaderBrowse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        kmsaksesuar.comqmt875Vf1A.exeGet hashmaliciousGuLoaderBrowse
                        • 44.28.239.165
                        qmt875Vf1A.exeGet hashmaliciousGuLoaderBrowse
                        • 44.28.239.165
                        czffIfANiL.exeGet hashmaliciousGuLoaderBrowse
                        • 44.28.239.165
                        Scan_20241030.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                        • 46.28.239.165
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        UCSDUSqmt875Vf1A.exeGet hashmaliciousGuLoaderBrowse
                        • 44.28.239.165
                        qmt875Vf1A.exeGet hashmaliciousGuLoaderBrowse
                        • 44.28.239.165
                        czffIfANiL.exeGet hashmaliciousGuLoaderBrowse
                        • 44.28.239.165
                        yakuza.ppc.elfGet hashmaliciousUnknownBrowse
                        • 44.104.164.11
                        yakuza.mipsel.elfGet hashmaliciousUnknownBrowse
                        • 44.11.2.160
                        yakuza.arm5.elfGet hashmaliciousUnknownBrowse
                        • 44.75.136.84
                        h0r0zx00x.x86.elfGet hashmaliciousMiraiBrowse
                        • 44.130.5.86
                        sh4.elfGet hashmaliciousMirai, GafgytBrowse
                        • 44.86.163.224
                        nuklear.arm.elfGet hashmaliciousMirai, MoobotBrowse
                        • 44.102.22.151
                        ppc.elfGet hashmaliciousMiraiBrowse
                        • 44.10.221.60
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        C:\Users\user\AppData\Local\Temp\nsf288C.tmp\System.dllqmt875Vf1A.exeGet hashmaliciousGuLoaderBrowse
                          wmKmOQ868z.exeGet hashmaliciousFormBook, GuLoaderBrowse
                            qmt875Vf1A.exeGet hashmaliciousGuLoaderBrowse
                              czffIfANiL.exeGet hashmaliciousGuLoaderBrowse
                                0GuwV0t2UU.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                  0GuwV0t2UU.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                    eXaiza8cQ5.exeGet hashmaliciousGuLoaderBrowse
                                      eXaiza8cQ5.exeGet hashmaliciousGuLoaderBrowse
                                        NacahSetup.exeGet hashmaliciousUnknownBrowse
                                          NacahSetup.exeGet hashmaliciousUnknownBrowse
                                            Process:C:\Users\user\Desktop\HHn9tNeZd8.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):12288
                                            Entropy (8bit):5.804946284177748
                                            Encrypted:false
                                            SSDEEP:192:ljHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZqE0QPi:R/Qlt7wiij/lMRv/9V4bfr
                                            MD5:192639861E3DC2DC5C08BB8F8C7260D5
                                            SHA1:58D30E460609E22FA0098BC27D928B689EF9AF78
                                            SHA-256:23D618A0293C78CE00F7C6E6DD8B8923621DA7DD1F63A070163EF4C0EC3033D6
                                            SHA-512:6E573D8B2EF6ED719E271FD0B2FD9CD451F61FC9A9459330108D6D7A65A0F64016303318CAD787AA1D5334BA670D8F1C7C13074E1BE550B4A316963ECC465CDC
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Joe Sandbox View:
                                            • Filename: qmt875Vf1A.exe, Detection: malicious, Browse
                                            • Filename: wmKmOQ868z.exe, Detection: malicious, Browse
                                            • Filename: qmt875Vf1A.exe, Detection: malicious, Browse
                                            • Filename: czffIfANiL.exe, Detection: malicious, Browse
                                            • Filename: 0GuwV0t2UU.exe, Detection: malicious, Browse
                                            • Filename: 0GuwV0t2UU.exe, Detection: malicious, Browse
                                            • Filename: eXaiza8cQ5.exe, Detection: malicious, Browse
                                            • Filename: eXaiza8cQ5.exe, Detection: malicious, Browse
                                            • Filename: NacahSetup.exe, Detection: malicious, Browse
                                            • Filename: NacahSetup.exe, Detection: malicious, Browse
                                            Reputation:moderate, very likely benign file
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L....C.f...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\HHn9tNeZd8.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):267575
                                            Entropy (8bit):7.796054563912965
                                            Encrypted:false
                                            SSDEEP:6144:SwqR4VAHAaBgMA1a0bkY8oV6YZxAyAu+bLN3Hv86vI:1qOmH9MbvA8+/N3HZw
                                            MD5:D61648D26008666B0A0A2BCC616093D2
                                            SHA1:DC0E4886A3F314D175B174F863AF49F22F6707A7
                                            SHA-256:D20E76D03FD5427C06641730DE2F301E24F1FDDC8B858C282E506F33F7D5772B
                                            SHA-512:81F66779531205E0315B383565DE3BC2EA3F86237CF161BDB4BD480B7E468E01E96BB8EBA845F081EC9DD028B7B676B71C114813BEE9CF603F23189FB43B877E
                                            Malicious:false
                                            Reputation:low
                                            Preview:..................ii.......QQ.X...................WW.nnn.......... ..j.................ss.........##.P.Z.I.&..........................................a..........f...................\....k....uuuu........R...p.... ..N.....C......j.SSS...??.............^..j...Q.##.OO.nnn......f...........@......I.........BBBB......JJ.v...............>>>.......8........bb.....##....ww......}}}}..zzz......../.TTT...........99...e....................'................................F....M....................;;.DD.f.....K....U..v.....kk...]................................eeeeeeeeeeeee....j.*.@.........:.NNN...........'.u......4..........k....{{{.`.................T............00.s....III.f..v...........fff..@........cc...I.(((((........y........n.www...............VVVV....<....................7.................................~........<.......{...&........S...........HHH...........|..Q..D.......MM.......EE.."....++..........U...............9..............................s..............c......:...............
                                            Process:C:\Users\user\Desktop\HHn9tNeZd8.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):246772
                                            Entropy (8bit):1.2570033577927036
                                            Encrypted:false
                                            SSDEEP:768:jF+X5GwMbRR6v/H4EwYatl23bka4FtbP30qIlbXc/B/VDYFgHUAHFLO3+u1uNnEA:jFROqkCEr2/Vd0WP9Ph0nVc
                                            MD5:51B771910E4858E4E5CDD09DF62F5BB8
                                            SHA1:8F52AC9FB80E1F75FB4C20112D83E41F6B51B9A5
                                            SHA-256:673C982F75C3CDD0EACAD35785FB01475D01964806072C2DE8E4B011C8EF4DB7
                                            SHA-512:ADE1E430583B64F3A8EE77931B24CD4C179A44CF5C88CA46444F41616812D524660274F426D5AB7EC62E0277B58EB5E13F737ABDFDCA83DB55853EAD4CA78E5F
                                            Malicious:false
                                            Reputation:low
                                            Preview:...............f......................-......................y.............R...............}.........~................................................................(................g...........................2...........................................................................................u...................W..............Z......_....................................m..........................................H........s.......................................Q........K..................................................b.....k...................................w....i.................................................t.........................................................................=.........................................................R.........[.....................................................\.....................3...........Z............................................................k.....................................H.....................q.......!.........
                                            Process:C:\Users\user\Desktop\HHn9tNeZd8.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):379
                                            Entropy (8bit):4.329981128856023
                                            Encrypted:false
                                            SSDEEP:6:9xjkVqlVDbW189uc6q9KReE9cypokkFqpiL3XP2MkdmFiFNSdqkDrD60s++JuGgz:LxPDbWA9weQcyF+n+Mwm8FYFDKpJbJf0
                                            MD5:F6E659DE27C7920DA8122DCD7C1EBBFD
                                            SHA1:FF974B124B5C7F75694B9821FCF43A71E80FF8FD
                                            SHA-256:4014208ED19D8A82A79EF53A86178D0B3AAF527A872BBC34D4D55476BA52C66A
                                            SHA-512:77B7C164E8A422B7DB2B3FF9978689A2A67DF34F84DE2FBE25EF3517259908682DE46C59264A4C3CDDD5DBDE16EE37232678097EFEE26FADBA351332200CA010
                                            Malicious:false
                                            Reputation:low
                                            Preview:klodsmajorens frugtavlerens upboiling.topartisystemerne eyelash sartorii weightlifting.falcks zebeck commissionership orobanchaceous vilifies chokstarter,sammentrngningers crayoned physicomental aabenbare omnivident syrian cowbirds satsvis..ballastic citrul somatoplastic hypotekforeningernes lambert enevldiges formularlngderne.skarrehvlenes paratrichosis landwire alvorstalers,
                                            Process:C:\Users\user\Desktop\HHn9tNeZd8.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):391326
                                            Entropy (8bit):1.2598991897339225
                                            Encrypted:false
                                            SSDEEP:768:GcJYS2pZ+e16MV4+KZgNQ97FkX/E+Lt97IkW3F4OvAPwmcMUoaFu4vMBUq2L0BQZ:/TmK4iiR6XUq0Qw1rfyivGfSopD6uH0y
                                            MD5:6E6832896907F1F51F42BAE57CE341BC
                                            SHA1:9294AC513B5968808BE70F6EFE2D027E7837B989
                                            SHA-256:C65E4FF0B7A80E686858F6C34B686DE908540CCDE1A3AE5E627272DFC4E40D20
                                            SHA-512:BC04F0319512812E54A7E612991A7BD71FEAE1E955DAFCAEE407C835F70D1E1F4212E4085D123A046BFBFCE2F96BF9DD80B456E308B11D0584E933FE6D456324
                                            Malicious:false
                                            Reputation:low
                                            Preview:...............c.....y....R.............T....b..T......................................k...:...........................+.............................5........................................<...................................................(........2.....I..........:......................................................{........b...o...........................q...W...................m...........................Q...................................,......-......................c....................................]........a........................................................................=....(.......................6.=......................................=......................C...................C.....................K...................................................................................I..........................N...........................Y.......................................l.............c..................V.................L......................i..........
                                            Process:C:\Users\user\Desktop\HHn9tNeZd8.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):94596
                                            Entropy (8bit):4.617825489661229
                                            Encrypted:false
                                            SSDEEP:1536:fb0Qns7L9ja2T3zN3nOn4SX4GCZY6vfkB7QEqT2Aes6T7xEn:4z7LRaMjN3nO4K4GCq6vfSLqSn9k
                                            MD5:935DB226075ADD353A773223AC3A4E1C
                                            SHA1:A4DE27FA1323A5F795294430AA17D8B2D3A4D53B
                                            SHA-256:922A066A18A4F90BD69874F239CD67DED44A7FD3CCB4AA56BC4393C0EE3862F6
                                            SHA-512:DA9E74A2D61540192D3D4BCC8C03A4D3DB6B4C0E192456F9D0B1AA1EB95A34792AF574286883BE6906B5CF07E1D477D121F6D35FF99572289E688BC7C1FD0B2E
                                            Malicious:false
                                            Reputation:low
                                            Preview:......-..HHH.....""....... .***...rrr.}}..E......nnn...i.......................gg......__.g........]].......:..........................'.........tt.II..{{{......$....m...........-..................~.......................................VV....q...........WWWW.......=====.....///.`........................... ..........s...................~~.......[.........................ff.........&&&&.........................i.......11../...................................___...............&&&&&.||....................a....j..A...............vvv................ .....Z..................................FF..Z.*.]].................111......<...............................2..++..``.....nnn...R..........qqqqqq.....777.....................u.............n.1.............................................rr.++..........""".........F.............qq.......((.. ..>>>>........9..........%.................))...C....3...........2..H..N..........................WWW...............................................d......
                                            Process:C:\Users\user\Desktop\HHn9tNeZd8.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):258798
                                            Entropy (8bit):1.2490334020377054
                                            Encrypted:false
                                            SSDEEP:768:T2PLd1hgU1SmVlqVwusTqMdrtd5jsctJuIsiIZtRlAf9tpjc9GI+DFENhHiXP7yj:ad1euLPsb39GIqFruRChk
                                            MD5:3269394F73B2ADA0574A74284D8B2E17
                                            SHA1:8CC597FD67D71D56F489C2B970682D9DED1392FC
                                            SHA-256:510850D30CEC95EB1A0BF4FCA7B7F0113F0D4C42726B794EFA98937AF62A516B
                                            SHA-512:A4BFAA7C52CF5EE5E9CDB900A3228A17109BFE46B08266DAE3057F17A6EAAAAB5DFD91DBB4833FA47FC961B5809FB41C340BCF82139ACD7A4B9AB54DF94351D8
                                            Malicious:false
                                            Reputation:low
                                            Preview:..........`................0...........................................................k.......................p.............................. .................................(...................................J...................... .|......J..........H......A...............................................x..........w....................................J.................................................,.....M.[.............................................................l...................C....................................................o................9............................!......P...1..L..................d..7..........................................B.....8................................................................$.................................................... ..........................................'.F...............................................................................@..........................................V....sJ.0......Y.....c....|....
                                            Process:C:\Users\user\Desktop\HHn9tNeZd8.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):323693
                                            Entropy (8bit):1.2536949862219147
                                            Encrypted:false
                                            SSDEEP:1536:FCN4UE4Tjyohd/qCWOGtHCIFy58RqmA3I:FCN4GiVCuyuw3I
                                            MD5:AEE2F83A7C4C7F24701B741521FB2E16
                                            SHA1:A8FEFDB29A731112A30BB5E2B3EF87B89A6D0F3E
                                            SHA-256:CAEBFE32548B8DC684AA35B144A20A99FA6F36692BED690DE4900691A525DA30
                                            SHA-512:075E80AC88843441E4B3A24D525DD1043AAEFCA9EBCB8C445E442C3B4F421C955A2A5A93D9E37327BB50228B81F2036C0D9842CFED7D186A05DABD5C211C3879
                                            Malicious:false
                                            Preview:..........^.......r..........................'.......................F.........................5...................&.Z..........p.......}......................................................................................................E...................................6... ............`.......................:.....................................................................J.......................................B............................................p..........n...........6.......................Z............................B.B...............[.....................................a@..............j.....................(.....-...R............................{.............................................Y.h................L..................................._............h....<.......................................l............................................~..............n................n......G............................................................................
                                            Process:C:\Users\user\Desktop\HHn9tNeZd8.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):218367
                                            Entropy (8bit):1.246980092990912
                                            Encrypted:false
                                            SSDEEP:768:5c8SYAdyufvUy3CuNMJAdaM+KCzP6QcG9wghZ0cL52j/i10qEDYiaXF44Xrrocc1:5hAdayyxFVZ64Xve5rsW4
                                            MD5:9EC9F165C9E1D40A5FE69E13F4E40BB2
                                            SHA1:4F35529EB907F3DD41D2F1C1F8114896B0049FEF
                                            SHA-256:3C494D3A6F8E831560EDCAF571F1AED0DB2699D951DCE31555FFC8EEB0C68E8E
                                            SHA-512:1F8BC071520584402BE5692375F40AF319914777AD3CF7CAF4291D4281E4FF3EB18FEE781F22C84F4336B8E403A21D59D8F4EECF17009DA34D7DA9B6B6EDA14F
                                            Malicious:false
                                            Preview:..............s..............:..........8......D...............n....1..g.................9.................................(....................................................a...........................................................................S.........................................................................................................................I.........................................................................S..3........7u.s.............................[.....................5.\....................................................y.............~........R..........a...................i..............................t.......................................................................................................................................................................................................................................................$.......|.....y....................................0P...............q..........................
                                            Process:C:\Users\user\Desktop\HHn9tNeZd8.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):465079
                                            Entropy (8bit):1.2524740649146269
                                            Encrypted:false
                                            SSDEEP:1536:Rv7GJmqRTpKBSpacoAbleU7c0PReL6HSE1/hqQ79/:RzG5n7DRe+jqQ
                                            MD5:E2123D8FCF95DD997B5B57C859952C42
                                            SHA1:C57FA1122078B47A37E0D2FADD0ABC4C2B8B6185
                                            SHA-256:7D67F05679B2132F418A353DC26498F79E93133C482B28D20EE18C3A83534B3E
                                            SHA-512:1A5339D733B08A760BE0D69162422A3A9199AC496D970A57050C3C009FE9EF47095CE2F4D14E6F96F7CB5E870E1CAF8EAFE2AF4660FCEC2AADEAD2884F27A27D
                                            Malicious:false
                                            Preview:................................ ..................0..2............c....................z..../.............~...........W...........z...........~...............................P.............>...............................#..........R.......U.....3.........................................<....Y........$......................................U.............]s............................^.......................................................................7..................w...`...........................k...........................@.......c....................................k...........................y......Y................................................X..................................e....J......................?..r................!..0....................P...................%...........e..........7........v............................................a...........$...........................9........./...........................................................................M....
                                            Process:C:\Users\user\Desktop\HHn9tNeZd8.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):442049
                                            Entropy (8bit):1.2574037958564046
                                            Encrypted:false
                                            SSDEEP:1536:9U42WMwaAJbj1SWgmYjFLw5pUEx6Yszh92PbGwT/:9UM9ffpcFLwYuHszj2Pbf
                                            MD5:436F0693F85A9463E53FC25016A6E62E
                                            SHA1:70920FF51C4E0CAA612419FFB860FDDC24F0B7C5
                                            SHA-256:F4190EE3362CE3585A4A921077C1AD14E895C80AD7D17455B55AAC27335E2093
                                            SHA-512:CEC32BAF315AE9D3480D221E54503898E2EB31C5FD0B81A87852AD6EA566BA8584B0CA02D3E898C5CBB078F60B20EFA490F6B2D8D4F1ED22169C8DF2DC7BB392
                                            Malicious:false
                                            Preview:...............................................0....#..._...........................................................fs.....D.......v.................................^...................r....%.............O....;.........aH................1...................................\..............z.............................................................W.............m...............................................t..................-......................$........a...........................M.........`m..........o.....9.....I...............................................m@..............................1.........................................................................................>."............e...F.........F..*...............*.v...................................|............................................................................>................e................................................................................................................p...........
                                            Process:C:\Users\user\Desktop\HHn9tNeZd8.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:modified
                                            Size (bytes):33
                                            Entropy (8bit):3.9653141049815805
                                            Encrypted:false
                                            SSDEEP:3:KmIAWRY2Wd3:MzRUp
                                            MD5:76D9175A3DB7407EB0BFC3C07DDCD9D2
                                            SHA1:72071127E9A44935CB02650ED715CCAF6A8F8418
                                            SHA-256:1F7119996DD17AF05BF05E497104715BBBC3909676AFA4329FBD59502BE1A1A5
                                            SHA-512:5032DAB71E70A4BD1DAD2F5CF9380E0097BE7993BC46886FED6E4BDD8781F2B10D31338D90D0DC5804665BDA2CBFE93F1172250E1A8AB7C9118BAF9F156E3C69
                                            Malicious:false
                                            Preview:[enspirit]..rbestof=Kursusforms..
                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                            Entropy (8bit):7.830812784257768
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:HHn9tNeZd8.exe
                                            File size:827'024 bytes
                                            MD5:e568ed81e7672a30a6954c966b617de2
                                            SHA1:f488b104c27b490d4d2b69d2fe8206dd45036347
                                            SHA256:ac181e995def08ad2ca48afff1aa70b0d534504e6cb9e4056644d616fcce77db
                                            SHA512:b3c32301715b836fabf25e0d7f4d2d95457206dfb77cd2450d79f293dde321aa290c896554dcac396b945c35e4d2bd8e5963494d00600dcfed4a863af00faf82
                                            SSDEEP:24576:TG+y7etk5qAChl5H87LE8oy9jRKta3uja581Cm:6mk547c7L7o/aE
                                            TLSH:94052300A570A433EAD95730CE5EE5726976ECB81C21294B1353BF4FB9B2642ED3DB12
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!.@.@...@...@../O...@...@..O@../O...@...c...@..+F...@..Rich.@..........................PE..L....C.f.................h....:....
                                            Icon Hash:06860fcf871b1f07
                                            Entrypoint:0x40352f
                                            Entrypoint Section:.text
                                            Digitally signed:true
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x660843EA [Sat Mar 30 16:55:06 2024 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f4639a0b3116c2cfc71144b88a929cfd
                                            Signature Valid:false
                                            Signature Issuer:CN=Bideternes, O=Bideternes, L=Gaddesby, C=GB
                                            Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                            Error Number:-2146762487
                                            Not Before, Not After
                                            • 09/10/2024 10:42:04 09/10/2027 10:42:04
                                            Subject Chain
                                            • CN=Bideternes, O=Bideternes, L=Gaddesby, C=GB
                                            Version:3
                                            Thumbprint MD5:D2C35B52541D2A7224B177C0489672A5
                                            Thumbprint SHA-1:DAB32181293C3811113A05372CD3B25369BBD8EA
                                            Thumbprint SHA-256:B14539847E70F750F2250A62A0CD390E4E9597BFF2B008C1A7CD59AC563CE76C
                                            Serial:299E758B75D7F63AE5770E746552527B20CC6672
                                            Instruction
                                            sub esp, 000003F8h
                                            push ebp
                                            push esi
                                            push edi
                                            push 00000020h
                                            pop edi
                                            xor ebp, ebp
                                            push 00008001h
                                            mov dword ptr [esp+20h], ebp
                                            mov dword ptr [esp+18h], 0040A2D8h
                                            mov dword ptr [esp+14h], ebp
                                            call dword ptr [004080A4h]
                                            mov esi, dword ptr [004080A8h]
                                            lea eax, dword ptr [esp+34h]
                                            push eax
                                            mov dword ptr [esp+4Ch], ebp
                                            mov dword ptr [esp+0000014Ch], ebp
                                            mov dword ptr [esp+00000150h], ebp
                                            mov dword ptr [esp+38h], 0000011Ch
                                            call esi
                                            test eax, eax
                                            jne 00007F75E0C7340Ah
                                            lea eax, dword ptr [esp+34h]
                                            mov dword ptr [esp+34h], 00000114h
                                            push eax
                                            call esi
                                            mov ax, word ptr [esp+48h]
                                            mov ecx, dword ptr [esp+62h]
                                            sub ax, 00000053h
                                            add ecx, FFFFFFD0h
                                            neg ax
                                            sbb eax, eax
                                            mov byte ptr [esp+0000014Eh], 00000004h
                                            not eax
                                            and eax, ecx
                                            mov word ptr [esp+00000148h], ax
                                            cmp dword ptr [esp+38h], 0Ah
                                            jnc 00007F75E0C733D8h
                                            and word ptr [esp+42h], 0000h
                                            mov eax, dword ptr [esp+40h]
                                            movzx ecx, byte ptr [esp+3Ch]
                                            mov dword ptr [007A8318h], eax
                                            xor eax, eax
                                            mov ah, byte ptr [esp+38h]
                                            movzx eax, ax
                                            or eax, ecx
                                            xor ecx, ecx
                                            mov ch, byte ptr [esp+00000148h]
                                            movzx ecx, cx
                                            shl eax, 10h
                                            or eax, ecx
                                            movzx ecx, byte ptr [esp+0000004Eh]
                                            Programming Language:
                                            • [EXP] VC++ 6.0 SP5 build 8804
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x3f60000x10078.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0xc7bc80x22c8.data
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x66d10x68001cb1571d2754df0a2b7df66b1b8d9089False0.6727388822115384data6.4708065613184305IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0x80000x13580x1400f0b500ff912dda10f31f36da3efc8a1eFalse0.44296875data5.102094016108248IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0xa0000x39e3780x60092e7d2d711bd61815cb4cc2d30d795b1unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .ndata0x3a90000x4d0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0x3f60000x100780x102002f803b37b807a2b1d5cbde829bcf3ad9False0.38117732558139533data3.911000282332835IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_BITMAP0x3f64600x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States0.23623853211009174
                                            RT_ICON0x3f67c80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.3824988190836089
                                            RT_ICON0x3fa9f00x3228Device independent bitmap graphic, 64 x 128 x 24, image size 12800EnglishUnited States0.32118380062305296
                                            RT_ICON0x3fdc180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.4403526970954357
                                            RT_ICON0x4001c00x1ca8Device independent bitmap graphic, 48 x 96 x 24, image size 7296EnglishUnited States0.3501908396946565
                                            RT_ICON0x401e680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.549718574108818
                                            RT_ICON0x402f100xca8Device independent bitmap graphic, 32 x 64 x 24, image size 3200EnglishUnited States0.38117283950617287
                                            RT_ICON0x403bb80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.6311475409836066
                                            RT_ICON0x4045400x748Device independent bitmap graphic, 24 x 48 x 24, image size 1824EnglishUnited States0.4093347639484979
                                            RT_ICON0x404c880x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6693262411347518
                                            RT_ICON0x4050f00x368Device independent bitmap graphic, 16 x 32 x 24, image size 832EnglishUnited States0.4323394495412844
                                            RT_DIALOG0x4054580x144dataEnglishUnited States0.5216049382716049
                                            RT_DIALOG0x4055a00x13cdataEnglishUnited States0.5506329113924051
                                            RT_DIALOG0x4056e00x100dataEnglishUnited States0.5234375
                                            RT_DIALOG0x4057e00x11cdataEnglishUnited States0.6056338028169014
                                            RT_DIALOG0x4059000xc4dataEnglishUnited States0.5918367346938775
                                            RT_DIALOG0x4059c80x60dataEnglishUnited States0.7291666666666666
                                            RT_GROUP_ICON0x405a280x92dataEnglishUnited States0.636986301369863
                                            RT_VERSION0x405ac00x274dataEnglishUnited States0.5015923566878981
                                            RT_MANIFEST0x405d380x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                            DLLImport
                                            ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
                                            SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
                                            ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
                                            COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                            USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
                                            GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
                                            KERNEL32.dlllstrcmpiA, CreateFileW, GetTempFileNameW, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, WriteFile, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, SetEnvironmentVariableW
                                            Language of compilation systemCountry where language is spokenMap
                                            EnglishUnited States
                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                            2024-11-06T16:30:42.169878+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.12.23.50443192.168.2.749734TCP
                                            2024-11-06T16:31:21.149647+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.12.23.50443192.168.2.749814TCP
                                            TimestampSource PortDest PortSource IPDest IP
                                            Nov 6, 2024 16:32:13.006392002 CET49970443192.168.2.744.28.239.165
                                            Nov 6, 2024 16:32:13.006426096 CET4434997044.28.239.165192.168.2.7
                                            Nov 6, 2024 16:32:13.006504059 CET49970443192.168.2.744.28.239.165
                                            Nov 6, 2024 16:32:13.046528101 CET49970443192.168.2.744.28.239.165
                                            Nov 6, 2024 16:32:13.046540976 CET4434997044.28.239.165192.168.2.7
                                            Nov 6, 2024 16:32:30.023243904 CET4434997044.28.239.165192.168.2.7
                                            Nov 6, 2024 16:32:30.023298979 CET49970443192.168.2.744.28.239.165
                                            TimestampSource PortDest PortSource IPDest IP
                                            Nov 6, 2024 16:32:12.909513950 CET5020353192.168.2.71.1.1.1
                                            Nov 6, 2024 16:32:12.994782925 CET53502031.1.1.1192.168.2.7
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Nov 6, 2024 16:32:12.909513950 CET192.168.2.71.1.1.10x11c4Standard query (0)kmsaksesuar.comA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Nov 6, 2024 16:32:12.994782925 CET1.1.1.1192.168.2.70x11c4No error (0)kmsaksesuar.com44.28.239.165A (IP address)IN (0x0001)false

                                            Click to jump to process

                                            Click to jump to process

                                            Click to jump to process

                                            Target ID:0
                                            Start time:10:30:20
                                            Start date:06/11/2024
                                            Path:C:\Users\user\Desktop\HHn9tNeZd8.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\HHn9tNeZd8.exe"
                                            Imagebase:0x400000
                                            File size:827'024 bytes
                                            MD5 hash:E568ED81E7672A30A6954C966B617DE2
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2255135290.000000000568E000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:true

                                            Target ID:11
                                            Start time:11:54:56
                                            Start date:06/11/2024
                                            Path:C:\Users\user\Desktop\HHn9tNeZd8.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\HHn9tNeZd8.exe"
                                            Imagebase:0x400000
                                            File size:827'024 bytes
                                            MD5 hash:E568ED81E7672A30A6954C966B617DE2
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 0000000B.00000002.2503937084.0000000003F2E000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:24.6%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:18.7%
                                              Total number of Nodes:710
                                              Total number of Limit Nodes:23
                                              execution_graph 3019 70341774 3020 703417a3 3019->3020 3021 70341bff 22 API calls 3020->3021 3022 703417aa 3021->3022 3023 703417b1 3022->3023 3024 703417bd 3022->3024 3025 70341312 2 API calls 3023->3025 3026 703417e4 3024->3026 3027 703417c7 3024->3027 3028 703417bb 3025->3028 3030 7034180e 3026->3030 3031 703417ea 3026->3031 3029 703415dd 3 API calls 3027->3029 3033 703417cc 3029->3033 3032 703415dd 3 API calls 3030->3032 3034 70341654 3 API calls 3031->3034 3032->3028 3036 70341654 3 API calls 3033->3036 3035 703417ef 3034->3035 3037 70341312 2 API calls 3035->3037 3038 703417d2 3036->3038 3039 703417f5 GlobalFree 3037->3039 3040 70341312 2 API calls 3038->3040 3039->3028 3041 70341809 GlobalFree 3039->3041 3042 703417d8 GlobalFree 3040->3042 3041->3028 3042->3028 2270 70341817 2271 7034184a 2270->2271 2312 70341bff 2271->2312 2273 70341851 2274 70341976 2273->2274 2275 70341862 2273->2275 2276 70341869 2273->2276 2362 7034243e 2275->2362 2346 70342480 2276->2346 2281 703418cd 2287 703418d3 2281->2287 2288 7034191e 2281->2288 2282 703418af 2375 70342655 2282->2375 2283 7034187f 2286 70341885 2283->2286 2293 70341890 2283->2293 2284 70341898 2298 7034188e 2284->2298 2372 70342e23 2284->2372 2286->2298 2356 70342b98 2286->2356 2394 70341666 2287->2394 2291 70342655 10 API calls 2288->2291 2296 7034190f 2291->2296 2292 703418b5 2386 70341654 2292->2386 2366 70342810 2293->2366 2311 70341965 2296->2311 2400 70342618 2296->2400 2298->2281 2298->2282 2300 70341896 2300->2298 2301 70342655 10 API calls 2301->2296 2304 7034196f GlobalFree 2304->2274 2308 70341951 2308->2311 2404 703415dd wsprintfW 2308->2404 2310 7034194a FreeLibrary 2310->2308 2311->2274 2311->2304 2407 703412bb GlobalAlloc 2312->2407 2314 70341c26 2408 703412bb GlobalAlloc 2314->2408 2316 70341e6b GlobalFree GlobalFree GlobalFree 2317 70341e88 2316->2317 2330 70341ed2 2316->2330 2319 7034227e 2317->2319 2327 70341e9d 2317->2327 2317->2330 2318 70341d26 GlobalAlloc 2333 70341c31 2318->2333 2320 703422a0 GetModuleHandleW 2319->2320 2319->2330 2321 703422c6 2320->2321 2322 703422b1 LoadLibraryW 2320->2322 2415 703416bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 2321->2415 2322->2321 2322->2330 2323 70341d71 lstrcpyW 2326 70341d7b lstrcpyW 2323->2326 2324 70341d8f GlobalFree 2324->2333 2326->2333 2327->2330 2411 703412cc 2327->2411 2328 70342318 2328->2330 2332 70342325 lstrlenW 2328->2332 2329 70342126 2414 703412bb GlobalAlloc 2329->2414 2330->2273 2416 703416bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 2332->2416 2333->2316 2333->2318 2333->2323 2333->2324 2333->2326 2333->2329 2333->2330 2337 70342067 GlobalFree 2333->2337 2338 703421ae 2333->2338 2339 70341dcd 2333->2339 2341 703412cc 2 API calls 2333->2341 2335 703422d8 2335->2328 2344 70342302 GetProcAddress 2335->2344 2337->2333 2338->2330 2343 70342216 lstrcpyW 2338->2343 2339->2333 2409 7034162f GlobalSize GlobalAlloc 2339->2409 2340 7034233f 2340->2330 2341->2333 2343->2330 2344->2328 2345 7034212f 2345->2273 2354 70342498 2346->2354 2347 703412cc GlobalAlloc lstrcpynW 2347->2354 2349 703425c1 GlobalFree 2352 7034186f 2349->2352 2349->2354 2350 70342540 GlobalAlloc WideCharToMultiByte 2350->2349 2351 7034256b GlobalAlloc 2353 70342582 2351->2353 2352->2283 2352->2284 2352->2298 2353->2349 2422 703427a4 2353->2422 2354->2347 2354->2349 2354->2350 2354->2351 2354->2353 2418 7034135a 2354->2418 2358 70342baa 2356->2358 2357 70342c4f CreateFileA 2361 70342c6d 2357->2361 2358->2357 2360 70342d39 2360->2298 2425 70342b42 2361->2425 2363 70342453 2362->2363 2364 7034245e GlobalAlloc 2363->2364 2365 70341868 2363->2365 2364->2363 2365->2276 2370 70342840 2366->2370 2367 703428ee 2369 703428f4 GlobalSize 2367->2369 2371 703428fe 2367->2371 2368 703428db GlobalAlloc 2368->2371 2369->2371 2370->2367 2370->2368 2371->2300 2373 70342e2e 2372->2373 2374 70342e6e GlobalFree 2373->2374 2429 703412bb GlobalAlloc 2375->2429 2377 703426d8 MultiByteToWideChar 2381 7034265f 2377->2381 2378 703426fa StringFromGUID2 2378->2381 2379 7034270b lstrcpynW 2379->2381 2380 70342742 GlobalFree 2380->2381 2381->2377 2381->2378 2381->2379 2381->2380 2382 7034271e wsprintfW 2381->2382 2383 70342777 GlobalFree 2381->2383 2384 70341312 2 API calls 2381->2384 2430 70341381 2381->2430 2382->2381 2383->2292 2384->2381 2434 703412bb GlobalAlloc 2386->2434 2388 70341659 2389 70341666 2 API calls 2388->2389 2390 70341663 2389->2390 2391 70341312 2390->2391 2392 70341355 GlobalFree 2391->2392 2393 7034131b GlobalAlloc lstrcpynW 2391->2393 2392->2296 2393->2392 2395 70341672 wsprintfW 2394->2395 2396 7034169f lstrcpyW 2394->2396 2399 703416b8 2395->2399 2396->2399 2399->2301 2401 70341931 2400->2401 2402 70342626 2400->2402 2401->2308 2401->2310 2402->2401 2403 70342642 GlobalFree 2402->2403 2403->2402 2405 70341312 2 API calls 2404->2405 2406 703415fe 2405->2406 2406->2311 2407->2314 2408->2333 2410 7034164d 2409->2410 2410->2339 2417 703412bb GlobalAlloc 2411->2417 2413 703412db lstrcpynW 2413->2330 2414->2345 2415->2335 2416->2340 2417->2413 2419 70341361 2418->2419 2420 703412cc 2 API calls 2419->2420 2421 7034137f 2420->2421 2421->2354 2423 703427b2 VirtualAlloc 2422->2423 2424 70342808 2422->2424 2423->2424 2424->2353 2426 70342b4d 2425->2426 2427 70342b52 GetLastError 2426->2427 2428 70342b5d 2426->2428 2427->2428 2428->2360 2429->2381 2431 703413ac 2430->2431 2432 7034138a 2430->2432 2431->2381 2432->2431 2433 70341390 lstrcpyW 2432->2433 2433->2431 2434->2388 3077 7034103d 3078 7034101b 5 API calls 3077->3078 3079 70341056 3078->3079 2596 70342a7f 2597 70342acf 2596->2597 2598 70342a8f VirtualProtect 2596->2598 2598->2597 3086 70341058 3088 70341074 3086->3088 3087 703410dd 3088->3087 3089 703415b6 GlobalFree 3088->3089 3090 70341092 3088->3090 3089->3090 3091 703415b6 GlobalFree 3090->3091 3092 703410a2 3091->3092 3093 703410b2 3092->3093 3094 703410a9 GlobalSize 3092->3094 3095 703410b6 GlobalAlloc 3093->3095 3096 703410c7 3093->3096 3094->3093 3097 703415dd 3 API calls 3095->3097 3098 703410d2 GlobalFree 3096->3098 3097->3096 3098->3087 3099 70341979 3100 7034199c 3099->3100 3101 703419e3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 3100->3101 3102 703419d1 GlobalFree 3100->3102 3103 70341312 2 API calls 3101->3103 3102->3101 3104 70341b6e GlobalFree GlobalFree 3103->3104 2599 40352f SetErrorMode GetVersionExW 2600 403583 GetVersionExW 2599->2600 2601 4035bb 2599->2601 2600->2601 2602 403612 2601->2602 2603 406948 5 API calls 2601->2603 2604 4068d8 3 API calls 2602->2604 2603->2602 2605 403628 lstrlenA 2604->2605 2605->2602 2606 403638 2605->2606 2607 406948 5 API calls 2606->2607 2608 40363f 2607->2608 2609 406948 5 API calls 2608->2609 2610 403646 2609->2610 2611 406948 5 API calls 2610->2611 2612 403652 #17 OleInitialize SHGetFileInfoW 2611->2612 2688 406554 lstrcpynW 2612->2688 2615 4036a1 GetCommandLineW 2689 406554 lstrcpynW 2615->2689 2617 4036b3 2618 405e50 CharNextW 2617->2618 2619 4036d9 CharNextW 2618->2619 2625 4036eb 2619->2625 2620 4037ed 2621 403801 GetTempPathW 2620->2621 2690 4034fe 2621->2690 2623 403819 2626 403873 DeleteFileW 2623->2626 2627 40381d GetWindowsDirectoryW lstrcatW 2623->2627 2624 405e50 CharNextW 2624->2625 2625->2620 2625->2624 2633 4037ef 2625->2633 2700 4030a2 GetTickCount GetModuleFileNameW 2626->2700 2628 4034fe 12 API calls 2627->2628 2630 403839 2628->2630 2630->2626 2632 40383d GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 2630->2632 2631 403887 2639 405e50 CharNextW 2631->2639 2670 40392e 2631->2670 2680 40393e 2631->2680 2634 4034fe 12 API calls 2632->2634 2798 406554 lstrcpynW 2633->2798 2637 40386b 2634->2637 2637->2626 2637->2680 2655 4038a6 2639->2655 2641 403ab0 2644 403b34 ExitProcess 2641->2644 2645 403ab8 GetCurrentProcess OpenProcessToken 2641->2645 2642 403a8c 2868 405bb4 2642->2868 2650 403ad0 LookupPrivilegeValueW AdjustTokenPrivileges 2645->2650 2651 403b04 2645->2651 2646 403904 2799 405f2b 2646->2799 2647 403947 2784 405b1f 2647->2784 2650->2651 2652 406948 5 API calls 2651->2652 2659 403b0b 2652->2659 2655->2646 2655->2647 2658 403b20 ExitWindowsEx 2658->2644 2662 403b2d 2658->2662 2659->2658 2659->2662 2661 403966 2664 40397e 2661->2664 2815 406554 lstrcpynW 2661->2815 2665 40140b 2 API calls 2662->2665 2669 4039a4 wsprintfW 2664->2669 2664->2680 2683 406314 40 API calls 2664->2683 2684 406591 21 API calls 2664->2684 2686 403aa2 CloseHandle 2664->2686 2795 405b37 CreateProcessW 2664->2795 2858 4068b1 FindFirstFileW 2664->2858 2665->2644 2666 403923 2814 406554 lstrcpynW 2666->2814 2671 406591 21 API calls 2669->2671 2728 403c26 2670->2728 2674 4039c8 2671->2674 2675 4039e0 GetFileAttributesW 2674->2675 2676 403a1a SetCurrentDirectoryW 2674->2676 2788 405aa8 CreateDirectoryW 2674->2788 2816 405b02 CreateDirectoryW 2674->2816 2677 4039f7 2675->2677 2678 4039ec DeleteFileW 2675->2678 2791 406314 MoveFileExW 2676->2791 2677->2664 2677->2669 2677->2680 2819 405c60 2677->2819 2678->2677 2861 403b4c 2680->2861 2683->2664 2684->2664 2686->2680 2688->2615 2689->2617 2691 406802 5 API calls 2690->2691 2692 40350a 2691->2692 2693 403514 2692->2693 2872 405e23 lstrlenW CharPrevW 2692->2872 2693->2623 2696 405b02 2 API calls 2697 403522 2696->2697 2875 406073 2697->2875 2879 406044 GetFileAttributesW CreateFileW 2700->2879 2702 4030e2 2723 4030f2 2702->2723 2880 406554 lstrcpynW 2702->2880 2704 403108 2881 405e6f lstrlenW 2704->2881 2708 403119 GetFileSize 2709 403213 2708->2709 2721 403130 2708->2721 2886 40303e 2709->2886 2711 40321c 2713 40324c GlobalAlloc 2711->2713 2711->2723 2922 4034e7 SetFilePointer 2711->2922 2897 4034e7 SetFilePointer 2713->2897 2715 40327f 2719 40303e 6 API calls 2715->2719 2717 403235 2720 4034d1 ReadFile 2717->2720 2718 403267 2898 4032d9 2718->2898 2719->2723 2724 403240 2720->2724 2721->2709 2721->2715 2721->2723 2725 40303e 6 API calls 2721->2725 2919 4034d1 2721->2919 2723->2631 2724->2713 2724->2723 2725->2721 2726 403273 2726->2723 2726->2726 2727 4032b0 SetFilePointer 2726->2727 2727->2723 2729 406948 5 API calls 2728->2729 2730 403c3a 2729->2730 2731 403c40 2730->2731 2732 403c52 2730->2732 2951 40649b wsprintfW 2731->2951 2733 406422 3 API calls 2732->2733 2734 403c82 2733->2734 2736 403ca1 lstrcatW 2734->2736 2738 406422 3 API calls 2734->2738 2737 403c50 2736->2737 2943 403efc 2737->2943 2738->2736 2741 405f2b 18 API calls 2742 403cd3 2741->2742 2743 403d67 2742->2743 2745 406422 3 API calls 2742->2745 2744 405f2b 18 API calls 2743->2744 2746 403d6d 2744->2746 2747 403d05 2745->2747 2748 403d7d LoadImageW 2746->2748 2749 406591 21 API calls 2746->2749 2747->2743 2752 403d26 lstrlenW 2747->2752 2755 405e50 CharNextW 2747->2755 2750 403e23 2748->2750 2751 403da4 RegisterClassW 2748->2751 2749->2748 2754 40140b 2 API calls 2750->2754 2753 403dda SystemParametersInfoW CreateWindowExW 2751->2753 2783 403e2d 2751->2783 2756 403d34 lstrcmpiW 2752->2756 2757 403d5a 2752->2757 2753->2750 2758 403e29 2754->2758 2760 403d23 2755->2760 2756->2757 2761 403d44 GetFileAttributesW 2756->2761 2759 405e23 3 API calls 2757->2759 2762 403efc 22 API calls 2758->2762 2758->2783 2763 403d60 2759->2763 2760->2752 2764 403d50 2761->2764 2766 403e3a 2762->2766 2952 406554 lstrcpynW 2763->2952 2764->2757 2765 405e6f 2 API calls 2764->2765 2765->2757 2768 403e46 ShowWindow 2766->2768 2769 403ec9 2766->2769 2771 4068d8 3 API calls 2768->2771 2953 4056ac OleInitialize 2769->2953 2773 403e5e 2771->2773 2772 403ecf 2774 403ed3 2772->2774 2775 403eeb 2772->2775 2776 403e6c GetClassInfoW 2773->2776 2778 4068d8 3 API calls 2773->2778 2781 40140b 2 API calls 2774->2781 2774->2783 2777 40140b 2 API calls 2775->2777 2779 403e80 GetClassInfoW RegisterClassW 2776->2779 2780 403e96 DialogBoxParamW 2776->2780 2777->2783 2778->2776 2779->2780 2782 40140b 2 API calls 2780->2782 2781->2783 2782->2783 2783->2680 2785 406948 5 API calls 2784->2785 2786 40394c lstrlenW 2785->2786 2787 406554 lstrcpynW 2786->2787 2787->2661 2789 405af4 2788->2789 2790 405af8 GetLastError 2788->2790 2789->2674 2790->2789 2792 403a29 CopyFileW 2791->2792 2793 406328 2791->2793 2792->2664 2792->2680 2961 40619a 2793->2961 2796 405b76 2795->2796 2797 405b6a CloseHandle 2795->2797 2796->2664 2797->2796 2798->2621 2995 406554 lstrcpynW 2799->2995 2801 405f3c 2996 405ece CharNextW CharNextW 2801->2996 2804 403910 2804->2680 2813 406554 lstrcpynW 2804->2813 2805 406802 5 API calls 2811 405f52 2805->2811 2806 405f83 lstrlenW 2807 405f8e 2806->2807 2806->2811 2808 405e23 3 API calls 2807->2808 2810 405f93 GetFileAttributesW 2808->2810 2809 4068b1 2 API calls 2809->2811 2810->2804 2811->2804 2811->2806 2811->2809 2812 405e6f 2 API calls 2811->2812 2812->2806 2813->2666 2814->2670 2815->2664 2817 405b12 2816->2817 2818 405b16 GetLastError 2816->2818 2817->2674 2818->2817 2820 405f2b 18 API calls 2819->2820 2821 405c80 2820->2821 2822 405c88 DeleteFileW 2821->2822 2823 405c9f 2821->2823 2824 405dd6 2822->2824 2825 405dbf 2823->2825 3002 406554 lstrcpynW 2823->3002 2824->2677 2825->2824 2832 4068b1 2 API calls 2825->2832 2827 405cc5 2828 405cd8 2827->2828 2829 405ccb lstrcatW 2827->2829 2831 405e6f 2 API calls 2828->2831 2830 405cde 2829->2830 2833 405cee lstrcatW 2830->2833 2835 405cf9 lstrlenW FindFirstFileW 2830->2835 2831->2830 2834 405de4 2832->2834 2833->2835 2834->2824 2836 405de8 2834->2836 2835->2825 2843 405d1b 2835->2843 2837 405e23 3 API calls 2836->2837 2838 405dee 2837->2838 2839 405c18 5 API calls 2838->2839 2842 405dfa 2839->2842 2841 405da2 FindNextFileW 2841->2843 2844 405db8 FindClose 2841->2844 2845 405e14 2842->2845 2846 405dfe 2842->2846 2843->2841 2852 405d63 2843->2852 3003 406554 lstrcpynW 2843->3003 2844->2825 2848 4055d9 28 API calls 2845->2848 2846->2824 2849 4055d9 28 API calls 2846->2849 2848->2824 2851 405e0b 2849->2851 2850 405c60 64 API calls 2850->2852 2854 406314 40 API calls 2851->2854 2852->2841 2852->2850 2853 4055d9 28 API calls 2852->2853 2856 4055d9 28 API calls 2852->2856 2857 406314 40 API calls 2852->2857 3004 405c18 2852->3004 2853->2841 2855 405e12 2854->2855 2855->2824 2856->2852 2857->2852 2859 4068d2 2858->2859 2860 4068c7 FindClose 2858->2860 2859->2664 2860->2859 2862 403b64 2861->2862 2863 403b56 CloseHandle 2861->2863 3015 403b91 2862->3015 2863->2862 2866 405c60 71 API calls 2867 403a7f OleUninitialize 2866->2867 2867->2641 2867->2642 2869 405bc9 2868->2869 2870 403a9a ExitProcess 2869->2870 2871 405bdd MessageBoxIndirectW 2869->2871 2871->2870 2873 40351c 2872->2873 2874 405e3f lstrcatW 2872->2874 2873->2696 2874->2873 2876 406080 GetTickCount GetTempFileNameW 2875->2876 2877 40352d 2876->2877 2878 4060b6 2876->2878 2877->2623 2878->2876 2878->2877 2879->2702 2880->2704 2882 405e7d 2881->2882 2883 405e83 CharPrevW 2882->2883 2884 40310e 2882->2884 2883->2882 2883->2884 2885 406554 lstrcpynW 2884->2885 2885->2708 2887 403047 2886->2887 2888 40305f 2886->2888 2889 403050 DestroyWindow 2887->2889 2890 403057 2887->2890 2891 403067 2888->2891 2892 40306f GetTickCount 2888->2892 2889->2890 2890->2711 2923 406984 2891->2923 2894 4030a0 2892->2894 2895 40307d CreateDialogParamW ShowWindow 2892->2895 2894->2711 2895->2894 2897->2718 2900 4032f2 2898->2900 2899 403320 2902 4034d1 ReadFile 2899->2902 2900->2899 2929 4034e7 SetFilePointer 2900->2929 2903 40332b 2902->2903 2904 40346a 2903->2904 2905 40333d GetTickCount 2903->2905 2910 403454 2903->2910 2906 4034ac 2904->2906 2912 40346e 2904->2912 2907 403369 2905->2907 2905->2910 2909 4034d1 ReadFile 2906->2909 2908 4034d1 ReadFile 2907->2908 2907->2910 2914 4033bf GetTickCount 2907->2914 2915 4033e4 MulDiv wsprintfW 2907->2915 2927 4060f6 WriteFile 2907->2927 2908->2907 2909->2910 2910->2726 2911 4034d1 ReadFile 2911->2912 2912->2910 2912->2911 2913 4060f6 WriteFile 2912->2913 2913->2912 2914->2907 2930 4055d9 2915->2930 2941 4060c7 ReadFile 2919->2941 2922->2717 2924 4069a1 PeekMessageW 2923->2924 2925 40306d 2924->2925 2926 406997 DispatchMessageW 2924->2926 2925->2711 2926->2924 2928 406114 2927->2928 2928->2907 2929->2899 2931 4055f4 2930->2931 2940 40341a 2930->2940 2932 405610 lstrlenW 2931->2932 2933 406591 21 API calls 2931->2933 2934 405639 2932->2934 2935 40561e lstrlenW 2932->2935 2933->2932 2937 40564c 2934->2937 2938 40563f SetWindowTextW 2934->2938 2936 405630 lstrcatW 2935->2936 2935->2940 2936->2934 2939 405652 SendMessageW SendMessageW SendMessageW 2937->2939 2937->2940 2938->2937 2939->2940 2940->2907 2942 4034e4 2941->2942 2942->2721 2944 403f10 2943->2944 2960 40649b wsprintfW 2944->2960 2946 403f81 2947 403fb5 22 API calls 2946->2947 2949 403f86 2947->2949 2948 403cb1 2948->2741 2949->2948 2950 406591 21 API calls 2949->2950 2950->2949 2951->2737 2952->2743 2954 40451f SendMessageW 2953->2954 2958 4056cf 2954->2958 2955 4056f6 2956 40451f SendMessageW 2955->2956 2957 405708 OleUninitialize 2956->2957 2957->2772 2958->2955 2959 401389 2 API calls 2958->2959 2959->2958 2960->2946 2962 4061f0 GetShortPathNameW 2961->2962 2963 4061ca 2961->2963 2965 406205 2962->2965 2966 40630f 2962->2966 2988 406044 GetFileAttributesW CreateFileW 2963->2988 2965->2966 2968 40620d wsprintfA 2965->2968 2966->2792 2967 4061d4 CloseHandle GetShortPathNameW 2967->2966 2969 4061e8 2967->2969 2970 406591 21 API calls 2968->2970 2969->2962 2969->2966 2971 406235 2970->2971 2989 406044 GetFileAttributesW CreateFileW 2971->2989 2973 406242 2973->2966 2974 406251 GetFileSize GlobalAlloc 2973->2974 2975 406273 2974->2975 2976 406308 CloseHandle 2974->2976 2977 4060c7 ReadFile 2975->2977 2976->2966 2978 40627b 2977->2978 2978->2976 2990 405fa9 lstrlenA 2978->2990 2981 406292 lstrcpyA 2984 4062b4 2981->2984 2982 4062a6 2983 405fa9 4 API calls 2982->2983 2983->2984 2985 4062eb SetFilePointer 2984->2985 2986 4060f6 WriteFile 2985->2986 2987 406301 GlobalFree 2986->2987 2987->2976 2988->2967 2989->2973 2991 405fea lstrlenA 2990->2991 2992 405fc3 lstrcmpiA 2991->2992 2994 405ff2 2991->2994 2993 405fe1 CharNextA 2992->2993 2992->2994 2993->2991 2994->2981 2994->2982 2995->2801 2997 405eeb 2996->2997 2999 405efd 2996->2999 2998 405ef8 CharNextW 2997->2998 2997->2999 3001 405f21 2998->3001 3000 405e50 CharNextW 2999->3000 2999->3001 3000->2999 3001->2804 3001->2805 3002->2827 3003->2843 3012 40601f GetFileAttributesW 3004->3012 3007 405c33 RemoveDirectoryW 3010 405c41 3007->3010 3008 405c3b DeleteFileW 3008->3010 3009 405c45 3009->2852 3010->3009 3011 405c51 SetFileAttributesW 3010->3011 3011->3009 3013 406031 SetFileAttributesW 3012->3013 3014 405c24 3012->3014 3013->3014 3014->3007 3014->3008 3014->3009 3016 403b9f 3015->3016 3017 403b69 3016->3017 3018 403ba4 FreeLibrary GlobalFree 3016->3018 3017->2866 3018->3017 3018->3018 2435 403fd4 2436 403fec 2435->2436 2437 40414d 2435->2437 2436->2437 2438 403ff8 2436->2438 2439 40415e GetDlgItem GetDlgItem 2437->2439 2448 40419e 2437->2448 2440 404003 SetWindowPos 2438->2440 2441 404016 2438->2441 2442 4044d3 22 API calls 2439->2442 2440->2441 2445 404061 2441->2445 2446 40401f ShowWindow 2441->2446 2447 404188 SetClassLongW 2442->2447 2443 4041f8 2457 404148 2443->2457 2509 40451f 2443->2509 2451 404080 2445->2451 2452 404069 DestroyWindow 2445->2452 2449 40413a 2446->2449 2450 40403f GetWindowLongW 2446->2450 2453 40140b 2 API calls 2447->2453 2448->2443 2454 401389 2 API calls 2448->2454 2548 40453a 2449->2548 2450->2449 2456 404058 ShowWindow 2450->2456 2459 404085 SetWindowLongW 2451->2459 2460 404096 2451->2460 2458 40447d 2452->2458 2453->2448 2461 4041d0 2454->2461 2456->2445 2458->2457 2466 40448d ShowWindow 2458->2466 2459->2457 2460->2449 2464 4040a2 GetDlgItem 2460->2464 2461->2443 2465 4041d4 SendMessageW 2461->2465 2462 40140b 2 API calls 2498 40420a 2462->2498 2463 40445e DestroyWindow EndDialog 2463->2458 2467 4040d0 2464->2467 2468 4040b3 SendMessageW IsWindowEnabled 2464->2468 2465->2457 2466->2457 2470 4040dd 2467->2470 2471 404124 SendMessageW 2467->2471 2472 4040f0 2467->2472 2480 4040d5 2467->2480 2468->2457 2468->2467 2470->2471 2470->2480 2471->2449 2474 4040f8 2472->2474 2475 40410d 2472->2475 2542 40140b 2474->2542 2478 40140b 2 API calls 2475->2478 2476 40410b 2476->2449 2481 404114 2478->2481 2479 4044d3 22 API calls 2479->2498 2545 4044ac 2480->2545 2481->2449 2481->2480 2483 404285 GetDlgItem 2484 4042a2 ShowWindow KiUserCallbackDispatcher 2483->2484 2485 40429a 2483->2485 2532 4044f5 EnableWindow 2484->2532 2485->2484 2487 4042cc EnableWindow 2492 4042e0 2487->2492 2488 4042e5 GetSystemMenu EnableMenuItem SendMessageW 2489 404315 SendMessageW 2488->2489 2488->2492 2489->2492 2492->2488 2533 404508 SendMessageW 2492->2533 2534 403fb5 2492->2534 2537 406554 lstrcpynW 2492->2537 2494 404344 lstrlenW 2495 406591 21 API calls 2494->2495 2496 40435a SetWindowTextW 2495->2496 2538 401389 2496->2538 2498->2457 2498->2462 2498->2463 2498->2479 2499 40439e DestroyWindow 2498->2499 2512 406591 2498->2512 2529 4044d3 2498->2529 2499->2458 2500 4043b8 CreateDialogParamW 2499->2500 2500->2458 2501 4043eb 2500->2501 2502 4044d3 22 API calls 2501->2502 2503 4043f6 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 2502->2503 2504 401389 2 API calls 2503->2504 2505 40443c 2504->2505 2505->2457 2506 404444 ShowWindow 2505->2506 2507 40451f SendMessageW 2506->2507 2508 40445c 2507->2508 2508->2458 2510 404537 2509->2510 2511 404528 SendMessageW 2509->2511 2510->2498 2511->2510 2527 40659c 2512->2527 2513 4067e3 2514 4067fc 2513->2514 2584 406554 lstrcpynW 2513->2584 2514->2498 2516 4067b4 lstrlenW 2516->2527 2518 4066ad GetSystemDirectoryW 2518->2527 2519 406591 15 API calls 2519->2516 2522 4066c3 GetWindowsDirectoryW 2522->2527 2523 406591 15 API calls 2523->2527 2524 406755 lstrcatW 2524->2527 2527->2513 2527->2516 2527->2518 2527->2519 2527->2522 2527->2523 2527->2524 2528 406725 SHGetPathFromIDListW CoTaskMemFree 2527->2528 2562 406422 2527->2562 2567 406948 GetModuleHandleA 2527->2567 2573 406802 2527->2573 2582 40649b wsprintfW 2527->2582 2583 406554 lstrcpynW 2527->2583 2528->2527 2530 406591 21 API calls 2529->2530 2531 4044de SetDlgItemTextW 2530->2531 2531->2483 2532->2487 2533->2492 2535 406591 21 API calls 2534->2535 2536 403fc3 SetWindowTextW 2535->2536 2536->2492 2537->2494 2540 401390 2538->2540 2539 4013fe 2539->2498 2540->2539 2541 4013cb MulDiv SendMessageW 2540->2541 2541->2540 2543 401389 2 API calls 2542->2543 2544 401420 2543->2544 2544->2480 2546 4044b3 2545->2546 2547 4044b9 SendMessageW 2545->2547 2546->2547 2547->2476 2549 4045fd 2548->2549 2550 404552 GetWindowLongW 2548->2550 2549->2457 2550->2549 2551 404567 2550->2551 2551->2549 2552 404594 GetSysColor 2551->2552 2553 404597 2551->2553 2552->2553 2554 4045a7 SetBkMode 2553->2554 2555 40459d SetTextColor 2553->2555 2556 4045c5 2554->2556 2557 4045bf GetSysColor 2554->2557 2555->2554 2558 4045d6 2556->2558 2559 4045cc SetBkColor 2556->2559 2557->2556 2558->2549 2560 4045f0 CreateBrushIndirect 2558->2560 2561 4045e9 DeleteObject 2558->2561 2559->2558 2560->2549 2561->2560 2585 4063c1 2562->2585 2565 406456 RegQueryValueExW RegCloseKey 2566 406486 2565->2566 2566->2527 2568 406964 2567->2568 2569 40696e GetProcAddress 2567->2569 2589 4068d8 GetSystemDirectoryW 2568->2589 2571 40697d 2569->2571 2571->2527 2572 40696a 2572->2569 2572->2571 2580 40680f 2573->2580 2574 40688a CharPrevW 2576 406885 2574->2576 2575 406878 CharNextW 2575->2576 2575->2580 2576->2574 2577 4068ab 2576->2577 2577->2527 2579 406864 CharNextW 2579->2580 2580->2575 2580->2576 2580->2579 2581 406873 CharNextW 2580->2581 2592 405e50 2580->2592 2581->2575 2582->2527 2583->2527 2584->2514 2586 4063d0 2585->2586 2587 4063d4 2586->2587 2588 4063d9 RegOpenKeyExW 2586->2588 2587->2565 2587->2566 2588->2587 2590 4068fa wsprintfW LoadLibraryExW 2589->2590 2590->2572 2593 405e56 2592->2593 2594 405e6c 2593->2594 2595 405e5d CharNextW 2593->2595 2594->2580 2595->2593 3043 70341000 3046 7034101b 3043->3046 3053 703415b6 3046->3053 3048 70341020 3049 70341024 3048->3049 3050 70341027 GlobalAlloc 3048->3050 3051 703415dd 3 API calls 3049->3051 3050->3049 3052 70341019 3051->3052 3054 703415bc 3053->3054 3055 703415c2 3054->3055 3056 703415ce GlobalFree 3054->3056 3055->3048 3056->3048 3057 703410e1 3063 70341111 3057->3063 3058 703412b0 GlobalFree 3059 703411d7 GlobalAlloc 3059->3063 3060 70341240 GlobalFree 3060->3063 3061 7034135a 2 API calls 3061->3063 3062 703412ab 3062->3058 3063->3058 3063->3059 3063->3060 3063->3061 3063->3062 3064 70341312 2 API calls 3063->3064 3065 7034129a GlobalFree 3063->3065 3066 7034116b GlobalAlloc 3063->3066 3067 70341381 lstrcpyW 3063->3067 3064->3063 3065->3063 3066->3063 3067->3063 3068 70342d43 3069 70342d5b 3068->3069 3070 7034162f 2 API calls 3069->3070 3071 70342d76 3070->3071 3072 402fb8 3073 402fe3 3072->3073 3074 402fca SetTimer 3072->3074 3075 403038 3073->3075 3076 402ffd MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 3073->3076 3074->3073 3076->3075 3080 7034170d 3081 703415b6 GlobalFree 3080->3081 3083 70341725 3081->3083 3082 7034176b GlobalFree 3083->3082 3084 70341740 3083->3084 3085 70341757 VirtualFree 3083->3085 3084->3082 3085->3082 3105 703423e9 3106 70342453 3105->3106 3107 7034245e GlobalAlloc 3106->3107 3108 7034247d 3106->3108 3107->3106

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 40352f-403581 SetErrorMode GetVersionExW 1 403583-4035b3 GetVersionExW 0->1 2 4035bb-4035c0 0->2 1->2 3 4035c2 2->3 4 4035c8-40360a 2->4 3->4 5 40360c-403614 call 406948 4->5 6 40361d 4->6 5->6 11 403616 5->11 8 403622-403636 call 4068d8 lstrlenA 6->8 13 403638-403654 call 406948 * 3 8->13 11->6 20 403665-4036c9 #17 OleInitialize SHGetFileInfoW call 406554 GetCommandLineW call 406554 13->20 21 403656-40365c 13->21 28 4036d2-4036e6 call 405e50 CharNextW 20->28 29 4036cb-4036cd 20->29 21->20 25 40365e 21->25 25->20 32 4037e1-4037e7 28->32 29->28 33 4036eb-4036f1 32->33 34 4037ed 32->34 35 4036f3-4036f8 33->35 36 4036fa-403701 33->36 37 403801-40381b GetTempPathW call 4034fe 34->37 35->35 35->36 38 403703-403708 36->38 39 403709-40370d 36->39 47 403873-40388d DeleteFileW call 4030a2 37->47 48 40381d-40383b GetWindowsDirectoryW lstrcatW call 4034fe 37->48 38->39 41 403713-403719 39->41 42 4037ce-4037dd call 405e50 39->42 45 403733-40376c 41->45 46 40371b-403722 41->46 42->32 59 4037df-4037e0 42->59 54 403789-4037c3 45->54 55 40376e-403773 45->55 52 403724-403727 46->52 53 403729 46->53 64 403893-403899 47->64 65 403a7a-403a8a call 403b4c OleUninitialize 47->65 48->47 62 40383d-40386d GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4034fe 48->62 52->45 52->53 53->45 57 4037c5-4037c9 54->57 58 4037cb-4037cd 54->58 55->54 61 403775-40377d 55->61 57->58 63 4037ef-4037fc call 406554 57->63 58->42 59->32 66 403784 61->66 67 40377f-403782 61->67 62->47 62->65 63->37 70 403932-403939 call 403c26 64->70 71 40389f-4038aa call 405e50 64->71 77 403ab0-403ab6 65->77 78 403a8c-403a9c call 405bb4 ExitProcess 65->78 66->54 67->54 67->66 80 40393e-403942 70->80 82 4038f8-403902 71->82 83 4038ac-4038e1 71->83 84 403b34-403b3c 77->84 85 403ab8-403ace GetCurrentProcess OpenProcessToken 77->85 80->65 86 403904-403912 call 405f2b 82->86 87 403947-40396d call 405b1f lstrlenW call 406554 82->87 91 4038e3-4038e7 83->91 88 403b42-403b46 ExitProcess 84->88 89 403b3e 84->89 92 403ad0-403afe LookupPrivilegeValueW AdjustTokenPrivileges 85->92 93 403b04-403b12 call 406948 85->93 86->65 106 403918-40392e call 406554 * 2 86->106 110 40397e-403996 87->110 111 40396f-403979 call 406554 87->111 89->88 97 4038f0-4038f4 91->97 98 4038e9-4038ee 91->98 92->93 104 403b20-403b2b ExitWindowsEx 93->104 105 403b14-403b1e 93->105 97->91 99 4038f6 97->99 98->97 98->99 99->82 104->84 108 403b2d-403b2f call 40140b 104->108 105->104 105->108 106->70 108->84 116 40399b-40399f 110->116 111->110 118 4039a4-4039ce wsprintfW call 406591 116->118 122 4039d0 call 405aa8 118->122 123 4039d7 call 405b02 118->123 126 4039d5 122->126 127 4039dc-4039de 123->127 126->127 128 4039e0-4039ea GetFileAttributesW 127->128 129 403a1a-403a39 SetCurrentDirectoryW call 406314 CopyFileW 127->129 130 403a0b-403a16 128->130 131 4039ec-4039f5 DeleteFileW 128->131 137 403a78 129->137 138 403a3b-403a55 call 406314 call 406591 call 405b37 129->138 130->116 134 403a18 130->134 131->130 133 4039f7-403a09 call 405c60 131->133 133->118 133->130 134->65 137->65 145 403a5a-403a5c 138->145 146 403aa2-403aae CloseHandle 145->146 147 403a5e-403a68 145->147 146->137 147->137 148 403a6a-403a72 call 4068b1 147->148 148->118 148->137
                                              APIs
                                              • SetErrorMode.KERNELBASE(00008001), ref: 00403552
                                              • GetVersionExW.KERNEL32(?), ref: 0040357D
                                              • GetVersionExW.KERNEL32(?), ref: 00403590
                                              • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403629
                                              • #17.COMCTL32(?,00000008,0000000A,0000000C), ref: 00403666
                                              • OleInitialize.OLE32(00000000), ref: 0040366D
                                              • SHGetFileInfoW.SHELL32(0079F708,00000000,?,000002B4,00000000), ref: 0040368C
                                              • GetCommandLineW.KERNEL32(007A7260,NSIS Error,?,00000008,0000000A,0000000C), ref: 004036A1
                                              • CharNextW.USER32(00000000,"C:\Users\user\Desktop\HHn9tNeZd8.exe",00000020,"C:\Users\user\Desktop\HHn9tNeZd8.exe",00000000,?,00000008,0000000A,0000000C), ref: 004036DA
                                              • GetTempPathW.KERNEL32(00000400,C:\Users\user~1\AppData\Local\Temp\,00000000,0000000C,?,00000008,0000000A,0000000C), ref: 00403812
                                              • GetWindowsDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C), ref: 00403823
                                              • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C), ref: 0040382F
                                              • GetTempPathW.KERNEL32(000003FC,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C), ref: 00403843
                                              • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C), ref: 0040384B
                                              • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C), ref: 0040385C
                                              • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user~1\AppData\Local\Temp\,?,00000008,0000000A,0000000C), ref: 00403864
                                              • DeleteFileW.KERNELBASE(1033,?,00000008,0000000A,0000000C), ref: 00403878
                                              • lstrlenW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\HHn9tNeZd8.exe",00000000,0000000A), ref: 00403951
                                                • Part of subcall function 00406554: lstrcpynW.KERNEL32(?,?,00000400,004036A1,007A7260,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406561
                                              • wsprintfW.USER32 ref: 004039AE
                                              • GetFileAttributesW.KERNEL32(007AB800,C:\Users\user~1\AppData\Local\Temp\,007AB800,?), ref: 004039E1
                                              • DeleteFileW.KERNEL32(007AB800), ref: 004039ED
                                              • SetCurrentDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,007AB800,?), ref: 00403A1B
                                                • Part of subcall function 00406314: MoveFileExW.KERNEL32(?,?,00000005,00405E12,?,00000000,000000F1,?,?,?,?,?), ref: 0040631E
                                              • CopyFileW.KERNEL32(C:\Users\user\Desktop\HHn9tNeZd8.exe,007AB800,00000001,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00403A31
                                                • Part of subcall function 00405B37: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4750,?), ref: 00405B60
                                                • Part of subcall function 00405B37: CloseHandle.KERNEL32(?), ref: 00405B6D
                                                • Part of subcall function 004068B1: FindFirstFileW.KERNELBASE(?,007A4798,007A3F50,00405F74,007A3F50,007A3F50,00000000,007A3F50,007A3F50,?,?,C:\Users\user~1\AppData\Local\Temp\,00405C80,?,771B3420,C:\Users\user~1\AppData\Local\Temp\), ref: 004068BC
                                                • Part of subcall function 004068B1: FindClose.KERNELBASE(00000000), ref: 004068C8
                                              • OleUninitialize.OLE32(0000000A,?,00000008,0000000A,0000000C), ref: 00403A7F
                                              • ExitProcess.KERNEL32 ref: 00403A9C
                                              • CloseHandle.KERNEL32(00000000,007AC000,007AC000,?,007AB800,00000000), ref: 00403AA3
                                              • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C), ref: 00403ABF
                                              • OpenProcessToken.ADVAPI32(00000000), ref: 00403AC6
                                              • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403ADB
                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403AFE
                                              • ExitWindowsEx.USER32(00000002,80040002), ref: 00403B23
                                              • ExitProcess.KERNEL32 ref: 00403B46
                                                • Part of subcall function 00405B02: CreateDirectoryW.KERNELBASE(?,00000000,00403522,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00405B08
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: File$Process$CloseDirectoryExit$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                                              • String ID: "C:\Users\user\Desktop\HHn9tNeZd8.exe"$1033$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\HHn9tNeZd8.exe$C:\Users\user\imaums\outadmiral\nedrunde$C:\Users\user\imaums\outadmiral\nedrunde\Pigeonwood$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu%X.tmp
                                              • API String ID: 1813718867-3220802862
                                              • Opcode ID: 4539d7b49e661c335d86d711c7dc70c0ceacb82e8b10bfdaa1b9f15d78561598
                                              • Instruction ID: 93f5a648143c5b163d48a65c291177ce643c8a453b959a17227cb1525d46e2db
                                              • Opcode Fuzzy Hash: 4539d7b49e661c335d86d711c7dc70c0ceacb82e8b10bfdaa1b9f15d78561598
                                              • Instruction Fuzzy Hash: 2CF10370604301AAD720AF659D05B2B7EE8EF85706F00483EF581B62D2DB7DDA45CB6E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 399 405c60-405c86 call 405f2b 402 405c88-405c9a DeleteFileW 399->402 403 405c9f-405ca6 399->403 406 405e1c-405e20 402->406 404 405ca8-405caa 403->404 405 405cb9-405cc9 call 406554 403->405 407 405cb0-405cb3 404->407 408 405dca-405dcf 404->408 412 405cd8-405cd9 call 405e6f 405->412 413 405ccb-405cd6 lstrcatW 405->413 407->405 407->408 408->406 411 405dd1-405dd4 408->411 414 405dd6-405ddc 411->414 415 405dde-405de6 call 4068b1 411->415 416 405cde-405ce2 412->416 413->416 414->406 415->406 423 405de8-405dfc call 405e23 call 405c18 415->423 419 405ce4-405cec 416->419 420 405cee-405cf4 lstrcatW 416->420 419->420 422 405cf9-405d15 lstrlenW FindFirstFileW 419->422 420->422 424 405d1b-405d23 422->424 425 405dbf-405dc3 422->425 439 405e14-405e17 call 4055d9 423->439 440 405dfe-405e01 423->440 428 405d43-405d57 call 406554 424->428 429 405d25-405d2d 424->429 425->408 427 405dc5 425->427 427->408 441 405d59-405d61 428->441 442 405d6e-405d79 call 405c18 428->442 433 405da2-405db2 FindNextFileW 429->433 434 405d2f-405d37 429->434 433->424 437 405db8-405db9 FindClose 433->437 434->428 438 405d39-405d41 434->438 437->425 438->428 438->433 439->406 440->414 443 405e03-405e12 call 4055d9 call 406314 440->443 441->433 444 405d63-405d6c call 405c60 441->444 452 405d9a-405d9d call 4055d9 442->452 453 405d7b-405d7e 442->453 443->406 444->433 452->433 456 405d80-405d90 call 4055d9 call 406314 453->456 457 405d92-405d98 453->457 456->433 457->433
                                              APIs
                                              • DeleteFileW.KERNELBASE(?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\HHn9tNeZd8.exe"), ref: 00405C89
                                              • lstrcatW.KERNEL32(frihedens\statsraaden.ond,\*.*,frihedens\statsraaden.ond,?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\HHn9tNeZd8.exe"), ref: 00405CD1
                                              • lstrcatW.KERNEL32(?,0040A014,?,frihedens\statsraaden.ond,?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\HHn9tNeZd8.exe"), ref: 00405CF4
                                              • lstrlenW.KERNEL32(?,?,0040A014,?,frihedens\statsraaden.ond,?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\HHn9tNeZd8.exe"), ref: 00405CFA
                                              • FindFirstFileW.KERNELBASE(frihedens\statsraaden.ond,?,?,?,0040A014,?,frihedens\statsraaden.ond,?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\HHn9tNeZd8.exe"), ref: 00405D0A
                                              • FindNextFileW.KERNEL32(00000000,?,000000F2,?,?,?,?,?), ref: 00405DAA
                                              • FindClose.KERNEL32(00000000), ref: 00405DB9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                              • String ID: "C:\Users\user\Desktop\HHn9tNeZd8.exe"$C:\Users\user~1\AppData\Local\Temp\$\*.*$frihedens\statsraaden.ond
                                              • API String ID: 2035342205-2197627227
                                              • Opcode ID: 504f622c36c52388dc620547c7079f2cd4c31ca565287661d2c47a2285e6f56d
                                              • Instruction ID: f748e5475402f1fc91d3f7fbe8cbfa38c73e6686c0f945f98d649a4eb698cdfa
                                              • Opcode Fuzzy Hash: 504f622c36c52388dc620547c7079f2cd4c31ca565287661d2c47a2285e6f56d
                                              • Instruction Fuzzy Hash: EB41B231800A14B6DB216B26CC49BAF7678EF81714F20813BF441B11D1DB7C4A829EAE
                                              APIs
                                              • FindFirstFileW.KERNELBASE(?,007A4798,007A3F50,00405F74,007A3F50,007A3F50,00000000,007A3F50,007A3F50,?,?,C:\Users\user~1\AppData\Local\Temp\,00405C80,?,771B3420,C:\Users\user~1\AppData\Local\Temp\), ref: 004068BC
                                              • FindClose.KERNELBASE(00000000), ref: 004068C8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: Find$CloseFileFirst
                                              • String ID:
                                              • API String ID: 2295610775-0
                                              • Opcode ID: 66bf9994b2f5814cd2018ee22faa20966fcafcce3cd9b2dc1ade219dc7786d58
                                              • Instruction ID: c1f58c6a55c378a7321320ff0386b713db4abc0e26cca29c2297fdfd4174c4a1
                                              • Opcode Fuzzy Hash: 66bf9994b2f5814cd2018ee22faa20966fcafcce3cd9b2dc1ade219dc7786d58
                                              • Instruction Fuzzy Hash: CFD0123251A1305BC28027386D0C84B7B98AF56331712CB36F16AF21E0C7748C6287A8

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 151 403fd4-403fe6 152 403fec-403ff2 151->152 153 40414d-40415c 151->153 152->153 154 403ff8-404001 152->154 155 4041ab-4041c0 153->155 156 40415e-4041a6 GetDlgItem * 2 call 4044d3 SetClassLongW call 40140b 153->156 157 404003-404010 SetWindowPos 154->157 158 404016-40401d 154->158 160 404200-404205 call 40451f 155->160 161 4041c2-4041c5 155->161 156->155 157->158 163 404061-404067 158->163 164 40401f-404039 ShowWindow 158->164 169 40420a-404225 160->169 166 4041c7-4041d2 call 401389 161->166 167 4041f8-4041fa 161->167 172 404080-404083 163->172 173 404069-40407b DestroyWindow 163->173 170 40413a-404148 call 40453a 164->170 171 40403f-404052 GetWindowLongW 164->171 166->167 192 4041d4-4041f3 SendMessageW 166->192 167->160 168 4044a0 167->168 180 4044a2-4044a9 168->180 177 404227-404229 call 40140b 169->177 178 40422e-404234 169->178 170->180 171->170 179 404058-40405b ShowWindow 171->179 183 404085-404091 SetWindowLongW 172->183 184 404096-40409c 172->184 181 40447d-404483 173->181 177->178 189 40423a-404245 178->189 190 40445e-404477 DestroyWindow EndDialog 178->190 179->163 181->168 188 404485-40448b 181->188 183->180 184->170 191 4040a2-4040b1 GetDlgItem 184->191 188->168 193 40448d-404496 ShowWindow 188->193 189->190 194 40424b-404298 call 406591 call 4044d3 * 3 GetDlgItem 189->194 190->181 195 4040d0-4040d3 191->195 196 4040b3-4040ca SendMessageW IsWindowEnabled 191->196 192->180 193->168 223 4042a2-4042de ShowWindow KiUserCallbackDispatcher call 4044f5 EnableWindow 194->223 224 40429a-40429f 194->224 198 4040d5-4040d6 195->198 199 4040d8-4040db 195->199 196->168 196->195 200 404106-40410b call 4044ac 198->200 201 4040e9-4040ee 199->201 202 4040dd-4040e3 199->202 200->170 204 404124-404134 SendMessageW 201->204 206 4040f0-4040f6 201->206 202->204 205 4040e5-4040e7 202->205 204->170 205->200 209 4040f8-4040fe call 40140b 206->209 210 40410d-404116 call 40140b 206->210 219 404104 209->219 210->170 220 404118-404122 210->220 219->200 220->219 227 4042e0-4042e1 223->227 228 4042e3 223->228 224->223 229 4042e5-404313 GetSystemMenu EnableMenuItem SendMessageW 227->229 228->229 230 404315-404326 SendMessageW 229->230 231 404328 229->231 232 40432e-40436d call 404508 call 403fb5 call 406554 lstrlenW call 406591 SetWindowTextW call 401389 230->232 231->232 232->169 243 404373-404375 232->243 243->169 244 40437b-40437f 243->244 245 404381-404387 244->245 246 40439e-4043b2 DestroyWindow 244->246 245->168 247 40438d-404393 245->247 246->181 248 4043b8-4043e5 CreateDialogParamW 246->248 247->169 249 404399 247->249 248->181 250 4043eb-404442 call 4044d3 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 248->250 249->168 250->168 255 404444-40445c ShowWindow call 40451f 250->255 255->181
                                              APIs
                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00404010
                                              • ShowWindow.USER32(?), ref: 00404030
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00404042
                                              • ShowWindow.USER32(?,00000004), ref: 0040405B
                                              • DestroyWindow.USER32 ref: 0040406F
                                              • SetWindowLongW.USER32(?,00000000,00000000), ref: 00404088
                                              • GetDlgItem.USER32(?,?), ref: 004040A7
                                              • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004040BB
                                              • IsWindowEnabled.USER32(00000000), ref: 004040C2
                                              • GetDlgItem.USER32(?,00000001), ref: 0040416D
                                              • GetDlgItem.USER32(?,00000002), ref: 00404177
                                              • SetClassLongW.USER32(?,000000F2,?), ref: 00404191
                                              • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004041E2
                                              • GetDlgItem.USER32(?,00000003), ref: 00404288
                                              • ShowWindow.USER32(00000000,?), ref: 004042A9
                                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004042BB
                                              • EnableWindow.USER32(?,?), ref: 004042D6
                                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004042EC
                                              • EnableMenuItem.USER32(00000000), ref: 004042F3
                                              • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040430B
                                              • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040431E
                                              • lstrlenW.KERNEL32(007A1748,?,007A1748,00000000), ref: 00404348
                                              • SetWindowTextW.USER32(?,007A1748), ref: 0040435C
                                              • ShowWindow.USER32(?,0000000A), ref: 00404490
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                              • String ID:
                                              • API String ID: 121052019-0
                                              • Opcode ID: bc3e7111866138a7d9fc3d457d106daad5acaba352cfb8b9f49eaf3ae0b18d54
                                              • Instruction ID: 556acdb9000d186b886cde9212830cd241fbea6c4840fceff67d75b478af1997
                                              • Opcode Fuzzy Hash: bc3e7111866138a7d9fc3d457d106daad5acaba352cfb8b9f49eaf3ae0b18d54
                                              • Instruction Fuzzy Hash: 13C1C0B1500604ABDB206F61ED85B2A3A68FBD6359F00453EF791B51F0CB3D5891DB2E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 258 403c26-403c3e call 406948 261 403c40-403c50 call 40649b 258->261 262 403c52-403c89 call 406422 258->262 271 403cac-403cd5 call 403efc call 405f2b 261->271 267 403ca1-403ca7 lstrcatW 262->267 268 403c8b-403c9c call 406422 262->268 267->271 268->267 276 403d67-403d6f call 405f2b 271->276 277 403cdb-403ce0 271->277 283 403d71-403d78 call 406591 276->283 284 403d7d-403da2 LoadImageW 276->284 277->276 278 403ce6-403d0e call 406422 277->278 278->276 285 403d10-403d14 278->285 283->284 287 403e23-403e2b call 40140b 284->287 288 403da4-403dd4 RegisterClassW 284->288 289 403d26-403d32 lstrlenW 285->289 290 403d16-403d23 call 405e50 285->290 299 403e35-403e40 call 403efc 287->299 300 403e2d-403e30 287->300 291 403ef2 288->291 292 403dda-403e1e SystemParametersInfoW CreateWindowExW 288->292 297 403d34-403d42 lstrcmpiW 289->297 298 403d5a-403d62 call 405e23 call 406554 289->298 290->289 296 403ef4-403efb 291->296 292->287 297->298 303 403d44-403d4e GetFileAttributesW 297->303 298->276 311 403e46-403e60 ShowWindow call 4068d8 299->311 312 403ec9-403ed1 call 4056ac 299->312 300->296 306 403d50-403d52 303->306 307 403d54-403d55 call 405e6f 303->307 306->298 306->307 307->298 319 403e62-403e67 call 4068d8 311->319 320 403e6c-403e7e GetClassInfoW 311->320 317 403ed3-403ed9 312->317 318 403eeb-403eed call 40140b 312->318 317->300 321 403edf-403ee6 call 40140b 317->321 318->291 319->320 324 403e80-403e90 GetClassInfoW RegisterClassW 320->324 325 403e96-403eb9 DialogBoxParamW call 40140b 320->325 321->300 324->325 329 403ebe-403ec7 call 403b76 325->329 329->296
                                              APIs
                                                • Part of subcall function 00406948: GetModuleHandleA.KERNEL32(?,00000020,?,0040363F,0000000C), ref: 0040695A
                                                • Part of subcall function 00406948: GetProcAddress.KERNEL32(00000000,?), ref: 00406975
                                              • lstrcatW.KERNEL32(1033,007A1748,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1748,00000000,00000002,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\HHn9tNeZd8.exe"), ref: 00403CA7
                                              • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\imaums\outadmiral\nedrunde,1033,007A1748,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1748,00000000,00000002,771B3420), ref: 00403D27
                                              • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\imaums\outadmiral\nedrunde,1033,007A1748,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1748,00000000), ref: 00403D3A
                                              • GetFileAttributesW.KERNEL32(Call), ref: 00403D45
                                              • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\imaums\outadmiral\nedrunde), ref: 00403D8E
                                                • Part of subcall function 0040649B: wsprintfW.USER32 ref: 004064A8
                                              • RegisterClassW.USER32(007A7200), ref: 00403DCB
                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403DE3
                                              • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403E18
                                              • ShowWindow.USER32(00000005,00000000), ref: 00403E4E
                                              • GetClassInfoW.USER32(00000000,RichEdit20W,007A7200), ref: 00403E7A
                                              • GetClassInfoW.USER32(00000000,RichEdit,007A7200), ref: 00403E87
                                              • RegisterClassW.USER32(007A7200), ref: 00403E90
                                              • DialogBoxParamW.USER32(?,00000000,00403FD4,00000000), ref: 00403EAF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                              • String ID: "C:\Users\user\Desktop\HHn9tNeZd8.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\imaums\outadmiral\nedrunde$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                              • API String ID: 1975747703-2491559041
                                              • Opcode ID: 889c8ef34167dee75fdbefa7f7ea3591ee246ed7a83750caaaa5a9fc269d37bc
                                              • Instruction ID: 87c0a3a17ad5e1939fcd37e1134105fdbaf016035d588be57f40016c0fe971d1
                                              • Opcode Fuzzy Hash: 889c8ef34167dee75fdbefa7f7ea3591ee246ed7a83750caaaa5a9fc269d37bc
                                              • Instruction Fuzzy Hash: CA61D370100605AED720BF269D45F2B3AACFB85B49F40453EF951B62E2DB7C9901CB6D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 332 4030a2-4030f0 GetTickCount GetModuleFileNameW call 406044 335 4030f2-4030f7 332->335 336 4030fc-40312a call 406554 call 405e6f call 406554 GetFileSize 332->336 337 4032d2-4032d6 335->337 344 403130 336->344 345 403215-403223 call 40303e 336->345 346 403135-40314c 344->346 352 403225-403228 345->352 353 403278-40327d 345->353 348 403150-403159 call 4034d1 346->348 349 40314e 346->349 358 40327f-403287 call 40303e 348->358 359 40315f-403166 348->359 349->348 354 40322a-403242 call 4034e7 call 4034d1 352->354 355 40324c-403276 GlobalAlloc call 4034e7 call 4032d9 352->355 353->337 354->353 378 403244-40324a 354->378 355->353 383 403289-40329a 355->383 358->353 362 4031e2-4031e6 359->362 363 403168-40317c call 405fff 359->363 367 4031f0-4031f6 362->367 368 4031e8-4031ef call 40303e 362->368 363->367 381 40317e-403185 363->381 374 403205-40320d 367->374 375 4031f8-403202 call 406a35 367->375 368->367 374->346 382 403213 374->382 375->374 378->353 378->355 381->367 387 403187-40318e 381->387 382->345 384 4032a2-4032a7 383->384 385 40329c 383->385 388 4032a8-4032ae 384->388 385->384 387->367 389 403190-403197 387->389 388->388 390 4032b0-4032cb SetFilePointer call 405fff 388->390 389->367 391 403199-4031a0 389->391 394 4032d0 390->394 391->367 393 4031a2-4031c2 391->393 393->353 395 4031c8-4031cc 393->395 394->337 396 4031d4-4031dc 395->396 397 4031ce-4031d2 395->397 396->367 398 4031de-4031e0 396->398 397->382 397->396 398->367
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 004030B3
                                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\HHn9tNeZd8.exe,00000400), ref: 004030CF
                                                • Part of subcall function 00406044: GetFileAttributesW.KERNELBASE(?,004030E2,C:\Users\user\Desktop\HHn9tNeZd8.exe,80000000,00000003), ref: 00406048
                                                • Part of subcall function 00406044: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606A
                                              • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\HHn9tNeZd8.exe,C:\Users\user\Desktop\HHn9tNeZd8.exe,80000000,00000003), ref: 0040311B
                                              • GlobalAlloc.KERNELBASE(00000040,?), ref: 00403251
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                              • String ID: "C:\Users\user\Desktop\HHn9tNeZd8.exe"$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\HHn9tNeZd8.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                              • API String ID: 2803837635-4024303840
                                              • Opcode ID: a0dd9f8ef326ba969c16cb1fd88c965c76ed405712e773b35a873600aa04ef71
                                              • Instruction ID: 049f7c6d5ff3921a21710fe3aab5a9d19a74ce2d4ccd47fede02a431b1dffc51
                                              • Opcode Fuzzy Hash: a0dd9f8ef326ba969c16cb1fd88c965c76ed405712e773b35a873600aa04ef71
                                              • Instruction Fuzzy Hash: A4519F71901204AFDF209FA5DD86BAE7EACAB45356F20817BF500B62D1CA7C9E408B5D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 463 406591-40659a 464 40659c-4065ab 463->464 465 4065ad-4065c7 463->465 464->465 466 4067d7-4067dd 465->466 467 4065cd-4065d9 465->467 469 4067e3-4067f0 466->469 470 4065eb-4065f8 466->470 467->466 468 4065df-4065e6 467->468 468->466 472 4067f2-4067f7 call 406554 469->472 473 4067fc-4067ff 469->473 470->469 471 4065fe-406607 470->471 474 4067c4 471->474 475 40660d-406650 471->475 472->473 477 4067d2-4067d5 474->477 478 4067c6-4067d0 474->478 479 406656-406662 475->479 480 406768-40676c 475->480 477->466 478->466 481 406664 479->481 482 40666c-40666e 479->482 483 4067a0-4067a4 480->483 484 40676e-406775 480->484 481->482 489 406670-40668e call 406422 482->489 490 4066a8-4066ab 482->490 485 4067b4-4067c2 lstrlenW 483->485 486 4067a6-4067af call 406591 483->486 487 406785-406791 call 406554 484->487 488 406777-406783 call 40649b 484->488 485->466 486->485 498 406796-40679c 487->498 488->498 497 406693-406696 489->497 492 4066ad-4066b9 GetSystemDirectoryW 490->492 493 4066be-4066c1 490->493 499 40674b-40674e 492->499 500 4066d3-4066d7 493->500 501 4066c3-4066cf GetWindowsDirectoryW 493->501 503 406750-406753 497->503 504 40669c-4066a3 call 406591 497->504 498->485 505 40679e 498->505 499->503 506 406760-406766 call 406802 499->506 500->499 507 4066d9-4066f7 500->507 501->500 503->506 509 406755-40675b lstrcatW 503->509 504->499 505->506 506->485 511 4066f9-4066ff 507->511 512 40670b-406723 call 406948 507->512 509->506 516 406707-406709 511->516 520 406725-406738 SHGetPathFromIDListW CoTaskMemFree 512->520 521 40673a-406743 512->521 516->512 518 406745-406749 516->518 518->499 520->518 520->521 521->507 521->518
                                              APIs
                                              • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004066B3
                                              • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,007A0728,?,?), ref: 004066C9
                                              • SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 00406727
                                              • CoTaskMemFree.OLE32(00000000,?,?,00000007,00000000,007A0728,?,?), ref: 00406730
                                              • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,00000000,007A0728,?,?), ref: 0040675B
                                              • lstrlenW.KERNEL32(Call,00000000,007A0728,?,?), ref: 004067B5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                              • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                              • API String ID: 4024019347-1230650788
                                              • Opcode ID: fb78c655de7e04e2c0873077e29524e20483bf8d3f5bca8374ab451ad378ea15
                                              • Instruction ID: 996034b20cbe1ccfc182dbfd15fdcef075a6e82f48079f00531b92f4adf5a68d
                                              • Opcode Fuzzy Hash: fb78c655de7e04e2c0873077e29524e20483bf8d3f5bca8374ab451ad378ea15
                                              • Instruction Fuzzy Hash: D56135716046119BD720AF24DD84B7B77E4AB85318F25063FF687B32D0DA3C8961865E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 522 4032d9-4032f0 523 4032f2 522->523 524 4032f9-403302 522->524 523->524 525 403304 524->525 526 40330b-403310 524->526 525->526 527 403320-40332d call 4034d1 526->527 528 403312-40331b call 4034e7 526->528 532 403333-403337 527->532 533 4034bf 527->533 528->527 534 40346a-40346c 532->534 535 40333d-403363 GetTickCount 532->535 536 4034c1-4034c2 533->536 537 4034ac-4034af 534->537 538 40346e-403471 534->538 539 4034c7 535->539 540 403369-403371 535->540 541 4034ca-4034ce 536->541 542 4034b1 537->542 543 4034b4-4034bd call 4034d1 537->543 538->539 544 403473 538->544 539->541 545 403373 540->545 546 403376-403384 call 4034d1 540->546 542->543 543->533 555 4034c4 543->555 549 403476-40347c 544->549 545->546 546->533 554 40338a-403393 546->554 552 403480-40348e call 4034d1 549->552 553 40347e 549->553 552->533 559 403490-40349c call 4060f6 552->559 553->552 558 403399-4033b9 call 406aa3 554->558 555->539 564 403462-403464 558->564 565 4033bf-4033d2 GetTickCount 558->565 566 403466-403468 559->566 567 40349e-4034a8 559->567 564->536 568 4033d4-4033dc 565->568 569 40341d-40341f 565->569 566->536 567->549 570 4034aa 567->570 571 4033e4-40341a MulDiv wsprintfW call 4055d9 568->571 572 4033de-4033e2 568->572 573 403421-403425 569->573 574 403456-40345a 569->574 570->539 571->569 572->569 572->571 577 403427-40342e call 4060f6 573->577 578 40343c-403447 573->578 574->540 575 403460 574->575 575->539 582 403433-403435 577->582 579 40344a-40344e 578->579 579->558 583 403454 579->583 582->566 584 403437-40343a 582->584 583->539 584->579
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: CountTick$wsprintf
                                              • String ID: ... %d%%$STy
                                              • API String ID: 551687249-2882605797
                                              • Opcode ID: 35df2eeb44d66dae63b1d0c24c026509dc1c2a142cef09f029ae2f44a6fc0423
                                              • Instruction ID: eb1ee041d621481d77111d3da967b5f6536357fdff7ba477760ccc35d22143eb
                                              • Opcode Fuzzy Hash: 35df2eeb44d66dae63b1d0c24c026509dc1c2a142cef09f029ae2f44a6fc0423
                                              • Instruction Fuzzy Hash: FD515F71910219EBCF11CF65DA8469E7FA8AB00756F14417BE804BA2C1C7789B41CBAA

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 585 4068d8-4068f8 GetSystemDirectoryW 586 4068fa 585->586 587 4068fc-4068fe 585->587 586->587 588 406900-406909 587->588 589 40690f-406911 587->589 588->589 591 40690b-40690d 588->591 590 406912-406945 wsprintfW LoadLibraryExW 589->590 591->590
                                              APIs
                                              • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068EF
                                              • wsprintfW.USER32 ref: 0040692A
                                              • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0040693E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: DirectoryLibraryLoadSystemwsprintf
                                              • String ID: %s%S.dll$UXTHEME
                                              • API String ID: 2200240437-1106614640
                                              • Opcode ID: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                                              • Instruction ID: 3d91c3bba12f32b4d8e24f08bfb099957206232b6387f0edcfac50a9fed73821
                                              • Opcode Fuzzy Hash: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                                              • Instruction Fuzzy Hash: 80F0F671501219ABDB20BB68DD0EF9B376CAB00304F10447AA546F10E0EB789B69CB98

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 592 70341817-70341856 call 70341bff 596 70341976-70341978 592->596 597 7034185c-70341860 592->597 598 70341862-70341868 call 7034243e 597->598 599 70341869-70341876 call 70342480 597->599 598->599 604 703418a6-703418ad 599->604 605 70341878-7034187d 599->605 606 703418cd-703418d1 604->606 607 703418af-703418cb call 70342655 call 70341654 call 70341312 GlobalFree 604->607 608 7034187f-70341880 605->608 609 70341898-7034189b 605->609 614 703418d3-7034191c call 70341666 call 70342655 606->614 615 7034191e-70341924 call 70342655 606->615 632 70341925-70341929 607->632 612 70341882-70341883 608->612 613 70341888-70341889 call 70342b98 608->613 609->604 610 7034189d-7034189e call 70342e23 609->610 624 703418a3 610->624 620 70341885-70341886 612->620 621 70341890-70341896 call 70342810 612->621 627 7034188e 613->627 614->632 615->632 620->604 620->613 631 703418a5 621->631 624->631 627->624 631->604 635 70341966-7034196d 632->635 636 7034192b-70341939 call 70342618 632->636 635->596 638 7034196f-70341970 GlobalFree 635->638 642 70341951-70341958 636->642 643 7034193b-7034193e 636->643 638->596 642->635 645 7034195a-70341965 call 703415dd 642->645 643->642 644 70341940-70341948 643->644 644->642 647 7034194a-7034194b FreeLibrary 644->647 645->635 647->642
                                              APIs
                                                • Part of subcall function 70341BFF: GlobalFree.KERNEL32(?), ref: 70341E74
                                                • Part of subcall function 70341BFF: GlobalFree.KERNEL32(?), ref: 70341E79
                                                • Part of subcall function 70341BFF: GlobalFree.KERNEL32(?), ref: 70341E7E
                                              • GlobalFree.KERNEL32(00000000), ref: 703418C5
                                              • FreeLibrary.KERNEL32(?), ref: 7034194B
                                              • GlobalFree.KERNEL32(00000000), ref: 70341970
                                                • Part of subcall function 7034243E: GlobalAlloc.KERNEL32(00000040,?), ref: 7034246F
                                                • Part of subcall function 70342810: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,70341896,00000000), ref: 703428E0
                                                • Part of subcall function 70341666: wsprintfW.USER32 ref: 70341694
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2300141129.0000000070341000.00000020.00000001.01000000.00000006.sdmp, Offset: 70340000, based on PE: true
                                              • Associated: 00000000.00000002.2298275400.0000000070340000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2300937494.0000000070344000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2304859414.0000000070346000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_70340000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: Global$Free$Alloc$Librarywsprintf
                                              • String ID:
                                              • API String ID: 3962662361-3916222277
                                              • Opcode ID: 3ddca2174fc674e5b0d3a90c44d0cdedca403c49a9239bf2a2d46199782150bf
                                              • Instruction ID: 5de9bc2756fec38813fe75241b4a2c6b0c6f3e09499e3e4340f838b2a1d6dce4
                                              • Opcode Fuzzy Hash: 3ddca2174fc674e5b0d3a90c44d0cdedca403c49a9239bf2a2d46199782150bf
                                              • Instruction Fuzzy Hash: 5541D0728006059FDB009F20DC85FBD37ECAF05354F256469FD4AAE29ADBB8D485CBA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 649 405f2b-405f46 call 406554 call 405ece 654 405f48-405f4a 649->654 655 405f4c-405f59 call 406802 649->655 656 405fa4-405fa6 654->656 659 405f69-405f6d 655->659 660 405f5b-405f61 655->660 662 405f83-405f8c lstrlenW 659->662 660->654 661 405f63-405f67 660->661 661->654 661->659 663 405f8e-405fa2 call 405e23 GetFileAttributesW 662->663 664 405f6f-405f76 call 4068b1 662->664 663->656 669 405f78-405f7b 664->669 670 405f7d-405f7e call 405e6f 664->670 669->654 669->670 670->662
                                              APIs
                                                • Part of subcall function 00406554: lstrcpynW.KERNEL32(?,?,00000400,004036A1,007A7260,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406561
                                                • Part of subcall function 00405ECE: CharNextW.USER32(?,?,007A3F50,?,00405F42,007A3F50,007A3F50,?,?,C:\Users\user~1\AppData\Local\Temp\,00405C80,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\HHn9tNeZd8.exe"), ref: 00405EDC
                                                • Part of subcall function 00405ECE: CharNextW.USER32(00000000), ref: 00405EE1
                                                • Part of subcall function 00405ECE: CharNextW.USER32(00000000), ref: 00405EF9
                                              • lstrlenW.KERNEL32(007A3F50,00000000,007A3F50,007A3F50,?,?,C:\Users\user~1\AppData\Local\Temp\,00405C80,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\HHn9tNeZd8.exe"), ref: 00405F84
                                              • GetFileAttributesW.KERNELBASE(007A3F50,007A3F50,007A3F50,007A3F50,007A3F50,007A3F50,00000000,007A3F50,007A3F50,?,?,C:\Users\user~1\AppData\Local\Temp\,00405C80,?,771B3420,C:\Users\user~1\AppData\Local\Temp\), ref: 00405F94
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                              • String ID: C:\Users\user~1\AppData\Local\Temp\$P?z
                                              • API String ID: 3248276644-1335133112
                                              • Opcode ID: bcbf200ecc0ebcd9a110e0aedcb8263399075ff3aca88ce7f3d60eb64f48f27a
                                              • Instruction ID: f4f6e0775867387827aab8404002f3e8856b431f62ec50d584846b16db6dccac
                                              • Opcode Fuzzy Hash: bcbf200ecc0ebcd9a110e0aedcb8263399075ff3aca88ce7f3d60eb64f48f27a
                                              • Instruction Fuzzy Hash: 9BF02D36105E5319D62273365C09AAF1544CF86358709057BF852B12D5CF3C8A53CC7E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 672 406073-40607f 673 406080-4060b4 GetTickCount GetTempFileNameW 672->673 674 4060c3-4060c5 673->674 675 4060b6-4060b8 673->675 677 4060bd-4060c0 674->677 675->673 676 4060ba 675->676 676->677
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 00406091
                                              • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,0040352D,1033,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403819), ref: 004060AC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: CountFileNameTempTick
                                              • String ID: C:\Users\user~1\AppData\Local\Temp\$nsa
                                              • API String ID: 1716503409-3083371207
                                              • Opcode ID: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                                              • Instruction ID: 3a9c7f2d553a521e2ba94e631897efa79da28a954d47360b9b57a106d7dab247
                                              • Opcode Fuzzy Hash: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                                              • Instruction Fuzzy Hash: 83F09076B40204BFEB00CF69ED05F9EB7ACEB95750F11803AED05F7180E6B099548768

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 678 406422-406454 call 4063c1 681 406492 678->681 682 406456-406484 RegQueryValueExW RegCloseKey 678->682 684 406496-406498 681->684 682->681 683 406486-40648a 682->683 683->684 685 40648c-406490 683->685 685->681 685->684
                                              APIs
                                              • RegQueryValueExW.KERNELBASE(?,?,00000000,?,?,?,00000000,?,?,?,?,Call,?,00000000,00406693,80000002), ref: 00406468
                                              • RegCloseKey.KERNELBASE(?,?,?), ref: 00406473
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: CloseQueryValue
                                              • String ID: Call
                                              • API String ID: 3356406503-1824292864
                                              • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                              • Instruction ID: 8bbbfa9f798598a3d1dedb2a9c281e33174829b5b93865dedadbfc74a219c892
                                              • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                              • Instruction Fuzzy Hash: 9F01B132110209BADF21CF51CD05EDB3BA8EB44360F018039FD1692150D738DA64DBA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 686 401389-40138e 687 4013fa-4013fc 686->687 688 401390-4013a0 687->688 689 4013fe 687->689 688->689 690 4013a2-4013a3 call 401434 688->690 691 401400-401401 689->691 693 4013a8-4013ad 690->693 694 401404-401409 693->694 695 4013af-4013b7 call 40136d 693->695 694->691 698 4013b9-4013bb 695->698 699 4013bd-4013c2 695->699 700 4013c4-4013c9 698->700 699->700 700->687 701 4013cb-4013f4 MulDiv SendMessageW 700->701 701->687
                                              APIs
                                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                              • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: 2a9df91d450fb50793c14fb38bc67898e6fb514a90870fda1bdd56b9451edd81
                                              • Instruction ID: cd791cecd07b1aef7d4b508d0a52a2ac0ec5e235a68ccce80931b69816989e44
                                              • Opcode Fuzzy Hash: 2a9df91d450fb50793c14fb38bc67898e6fb514a90870fda1bdd56b9451edd81
                                              • Instruction Fuzzy Hash: 6301F4326242109BE7195B389D05B6B36A8F791314F10863FF955F62F1DA78CC42DB4D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 702 405aa8-405af2 CreateDirectoryW 703 405af4-405af6 702->703 704 405af8 GetLastError 702->704 705 405afe-405aff 703->705 704->705
                                              APIs
                                              • CreateDirectoryW.KERNELBASE(?,?), ref: 00405AEA
                                              • GetLastError.KERNEL32 ref: 00405AF8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: CreateDirectoryErrorLast
                                              • String ID:
                                              • API String ID: 1375471231-0
                                              • Opcode ID: 93d1f65b513afb97053b6d969de6af344d99c991354c8e43ed6bd2c6eb9068ab
                                              • Instruction ID: 13352011552d0ddc4b0c1568d720dcd5f2ba617a9a750a7f60e40e4c0ab4bb23
                                              • Opcode Fuzzy Hash: 93d1f65b513afb97053b6d969de6af344d99c991354c8e43ed6bd2c6eb9068ab
                                              • Instruction Fuzzy Hash: 52F0F4B0D0060EDADB00CFA4C6487EFBBB4AB04309F10812AD941B6281D7B882488FA9

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 706 405b37-405b68 CreateProcessW 707 405b76-405b77 706->707 708 405b6a-405b73 CloseHandle 706->708 708->707
                                              APIs
                                              • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4750,?), ref: 00405B60
                                              • CloseHandle.KERNEL32(?), ref: 00405B6D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: CloseCreateHandleProcess
                                              • String ID:
                                              • API String ID: 3712363035-0
                                              • Opcode ID: 1cf2fe051d34b4090bca479d50b9d9e6ed2e29e2a91626cbf83b173b154ad348
                                              • Instruction ID: e42c3092a0fd4a031c4fd4b3b8927d6f3122727aa63034fdce6a98e2e8d9435a
                                              • Opcode Fuzzy Hash: 1cf2fe051d34b4090bca479d50b9d9e6ed2e29e2a91626cbf83b173b154ad348
                                              • Instruction Fuzzy Hash: ECE09AB4900249BFEB109F64AD05E7B776CE745644F008525BD10F6151D775A8148A79
                                              APIs
                                              • GetModuleHandleA.KERNEL32(?,00000020,?,0040363F,0000000C), ref: 0040695A
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00406975
                                                • Part of subcall function 004068D8: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068EF
                                                • Part of subcall function 004068D8: wsprintfW.USER32 ref: 0040692A
                                                • Part of subcall function 004068D8: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0040693E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                              • String ID:
                                              • API String ID: 2547128583-0
                                              • Opcode ID: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
                                              • Instruction ID: 551f93d59f6a57a7cc32b559d7ebc8a6d8da67cd5dc02587d5b4d2bd1ffdf244
                                              • Opcode Fuzzy Hash: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
                                              • Instruction Fuzzy Hash: 95E08673504310AAD2105A705E04C2B73B89F85740302443EF942F2140D734DC32E769
                                              APIs
                                              • GetFileAttributesW.KERNELBASE(?,004030E2,C:\Users\user\Desktop\HHn9tNeZd8.exe,80000000,00000003), ref: 00406048
                                              • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: File$AttributesCreate
                                              • String ID:
                                              • API String ID: 415043291-0
                                              • Opcode ID: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                                              • Instruction ID: 9d50a09f5748d4f60ef03139cc16a9656d1073ae209d3065c053d14625e31d4c
                                              • Opcode Fuzzy Hash: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                                              • Instruction Fuzzy Hash: 87D09E31654301AFEF098F20DE16F2EBAA2EB84B00F11552CB682941E0DA715819DB15
                                              APIs
                                              • CreateDirectoryW.KERNELBASE(?,00000000,00403522,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00405B08
                                              • GetLastError.KERNEL32(?,00000008,0000000A,0000000C), ref: 00405B16
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: CreateDirectoryErrorLast
                                              • String ID:
                                              • API String ID: 1375471231-0
                                              • Opcode ID: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                              • Instruction ID: 7bb2d1eb449126eed485e4eb4fbdbafbf981390ed288ef949080c13de55397a1
                                              • Opcode Fuzzy Hash: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                              • Instruction Fuzzy Hash: 7CC08C30314902DADA802B209F0870B3A60AB80340F154439A582E00E4CA30A445C92D
                                              APIs
                                              • CreateFileA.KERNELBASE(00000000), ref: 70342C57
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2300141129.0000000070341000.00000020.00000001.01000000.00000006.sdmp, Offset: 70340000, based on PE: true
                                              • Associated: 00000000.00000002.2298275400.0000000070340000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2300937494.0000000070344000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2304859414.0000000070346000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_70340000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: CreateFile
                                              • String ID:
                                              • API String ID: 823142352-0
                                              • Opcode ID: 61133b6fc363c163c056ee662f609f12a4670afd93dc545d18b1f969629646c7
                                              • Instruction ID: fc84c27321931b21958d2fc1475f82854d57d75a63378078e930c52b45834c67
                                              • Opcode Fuzzy Hash: 61133b6fc363c163c056ee662f609f12a4670afd93dc545d18b1f969629646c7
                                              • Instruction Fuzzy Hash: 4F417F76D002049FDB21DF65DC86F7D37F9EB46354FB0982AF805AE121DE38A8818B90
                                              APIs
                                              • ReadFile.KERNELBASE(?,?,?,?,00000000,?,?,004034E4,?,?,0040332B,?,00000004,00000000,00000000,00000000), ref: 004060DB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: FileRead
                                              • String ID:
                                              • API String ID: 2738559852-0
                                              • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                              • Instruction ID: 1a6ac9c2f17c3bf7024e7b579d6ce6ab3b84958f313ea5b4b1ce89539a84cc3a
                                              • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                              • Instruction Fuzzy Hash: 55E0EC3225026AABDF10DE55DC00EEB7BACEB053A0F018437F956E7150DA31E93197A8
                                              APIs
                                              • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,0040349A,?,00793700,?,00793700,?,?,00000004,00000000), ref: 0040610A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: FileWrite
                                              • String ID:
                                              • API String ID: 3934441357-0
                                              • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                              • Instruction ID: 280cd4c212b49affc14266408846aa3a30e7e9a640caac8a44b81d30c287abca
                                              • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                              • Instruction Fuzzy Hash: E1E08C3221025AABCF109E908C01EEB7B6CEB043A0F014433FD16EB051D230E8319BA8
                                              APIs
                                              • VirtualProtect.KERNELBASE(7034505C,00000004,00000040,7034504C), ref: 70342A9D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2300141129.0000000070341000.00000020.00000001.01000000.00000006.sdmp, Offset: 70340000, based on PE: true
                                              • Associated: 00000000.00000002.2298275400.0000000070340000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2300937494.0000000070344000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2304859414.0000000070346000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_70340000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: ProtectVirtual
                                              • String ID:
                                              • API String ID: 544645111-0
                                              • Opcode ID: 44430f3ac54292b067cd3f765a3bae0174c70da6cbde5e323d150b50e4c4fbab
                                              • Instruction ID: 494e0813a272560b1d12d2a35a93fe8759d0027297e0c21cef8f023f5844a89b
                                              • Opcode Fuzzy Hash: 44430f3ac54292b067cd3f765a3bae0174c70da6cbde5e323d150b50e4c4fbab
                                              • Instruction Fuzzy Hash: 7AF0A5FAD01284DEC3A0CF2A8C447293BE8B70B305B65462BFD88DE262EB744444CB91
                                              APIs
                                              • RegOpenKeyExW.KERNELBASE(00000000,?,00000000,?,?,?,?,?,0040644F,?,?,?,?,Call,?,00000000), ref: 004063E5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: Open
                                              • String ID:
                                              • API String ID: 71445658-0
                                              • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                              • Instruction ID: e359b3f9d4e5954a9af9fcfc08987e0780d6658b6568ce36bf776d9a1ed3ba47
                                              • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                              • Instruction Fuzzy Hash: 5AD0123210020DBBDF115F90AD01FAB771DAB08310F014826FE17E40D0D775D530A7A4
                                              APIs
                                              • SetFilePointer.KERNELBASE(?,00000000,00000000,00403267,?), ref: 004034F5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: FilePointer
                                              • String ID:
                                              • API String ID: 973152223-0
                                              • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                              • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                              • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                              • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                              APIs
                                              • SendMessageW.USER32(00000028,?,00000001,00404333), ref: 00404516
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: d8acea26a230a6f6dce64032923e754adb325d86aa568b2d6d5b5dd5df397682
                                              • Instruction ID: c6ab7f6cffe81da1172822363f1dd48ca364d348eecf8336b79a6db78a7c4a26
                                              • Opcode Fuzzy Hash: d8acea26a230a6f6dce64032923e754adb325d86aa568b2d6d5b5dd5df397682
                                              • Instruction Fuzzy Hash: 18B09235184A00ABDA515B00DE09F467B62E7A4701F008538B240640F0CBB200A0DB0A
                                              APIs
                                              • GlobalAlloc.KERNELBASE(00000040,?,703412DB,?,7034137F,00000019,703411CA,-000000A0), ref: 703412C5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2300141129.0000000070341000.00000020.00000001.01000000.00000006.sdmp, Offset: 70340000, based on PE: true
                                              • Associated: 00000000.00000002.2298275400.0000000070340000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2300937494.0000000070344000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2304859414.0000000070346000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_70340000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: AllocGlobal
                                              • String ID:
                                              • API String ID: 3761449716-0
                                              • Opcode ID: 8ef7524d7897f5a66962587d42862f534fc956395ce45105da712b90d68d25e6
                                              • Instruction ID: 8243b1f726fa1d140fe2bb30a3007c9567d3f68dddf75a619abc8756cf84e1d0
                                              • Opcode Fuzzy Hash: 8ef7524d7897f5a66962587d42862f534fc956395ce45105da712b90d68d25e6
                                              • Instruction Fuzzy Hash: A5B01272A000009FFE008B15EC0AF34325CF701304F240010BB00C9061C96048108524
                                              APIs
                                                • Part of subcall function 703412BB: GlobalAlloc.KERNELBASE(00000040,?,703412DB,?,7034137F,00000019,703411CA,-000000A0), ref: 703412C5
                                              • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 70341D2D
                                              • lstrcpyW.KERNEL32(00000008,?), ref: 70341D75
                                              • lstrcpyW.KERNEL32(00000808,?), ref: 70341D7F
                                              • GlobalFree.KERNEL32(00000000), ref: 70341D92
                                              • GlobalFree.KERNEL32(?), ref: 70341E74
                                              • GlobalFree.KERNEL32(?), ref: 70341E79
                                              • GlobalFree.KERNEL32(?), ref: 70341E7E
                                              • GlobalFree.KERNEL32(00000000), ref: 70342068
                                              • lstrcpyW.KERNEL32(?,?), ref: 70342222
                                              • GetModuleHandleW.KERNEL32(00000008), ref: 703422A1
                                              • LoadLibraryW.KERNEL32(00000008), ref: 703422B2
                                              • GetProcAddress.KERNEL32(?,?), ref: 7034230C
                                              • lstrlenW.KERNEL32(00000808), ref: 70342326
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2300141129.0000000070341000.00000020.00000001.01000000.00000006.sdmp, Offset: 70340000, based on PE: true
                                              • Associated: 00000000.00000002.2298275400.0000000070340000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2300937494.0000000070344000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2304859414.0000000070346000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_70340000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                              • String ID:
                                              • API String ID: 245916457-0
                                              • Opcode ID: 68f9c7ad68ec3e9768fe3589b7d67718b8dce720c6f93481c107632d55212872
                                              • Instruction ID: 0671c65ecd1f7ad83eb7dc959f0d45e914ad67f287bd08159d15cb65ecb5167d
                                              • Opcode Fuzzy Hash: 68f9c7ad68ec3e9768fe3589b7d67718b8dce720c6f93481c107632d55212872
                                              • Instruction Fuzzy Hash: 3C22AC75D00A09DECB118FA4C980ABEB7F8FB05305F71652EF166EA284D7B49A81DB50
                                              APIs
                                              • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406335,?,?), ref: 004061D5
                                              • GetShortPathNameW.KERNEL32(?,007A4DE8,00000400), ref: 004061DE
                                                • Part of subcall function 00405FA9: lstrlenA.KERNEL32(?,00000000,00000000,00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000), ref: 00405FB9
                                                • Part of subcall function 00405FA9: lstrlenA.KERNEL32(?,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000), ref: 00405FEB
                                              • GetShortPathNameW.KERNEL32(?,007A55E8,00000400), ref: 004061FB
                                              • wsprintfA.USER32 ref: 00406219
                                              • GetFileSize.KERNEL32(00000000,00000000,007A55E8,C0000000,00000004,007A55E8,?), ref: 00406254
                                              • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406263
                                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 0040629B
                                              • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,007A49E8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062F1
                                              • GlobalFree.KERNEL32(00000000), ref: 00406302
                                              • CloseHandle.KERNEL32(00000000), ref: 00406309
                                                • Part of subcall function 00406044: GetFileAttributesW.KERNELBASE(?,004030E2,C:\Users\user\Desktop\HHn9tNeZd8.exe,80000000,00000003), ref: 00406048
                                                • Part of subcall function 00406044: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                              • String ID: %ls=%ls$[Rename]$Mz$Uz
                                              • API String ID: 2171350718-3367237295
                                              • Opcode ID: a33c05bce7c125d61af8aa6c61577077044d65e406db0fd5498825754e73940b
                                              • Instruction ID: b6cadbeacbe634b6bd87c882f2c351c0ea44a21df7cd689b804f2f2a1cba60a5
                                              • Opcode Fuzzy Hash: a33c05bce7c125d61af8aa6c61577077044d65e406db0fd5498825754e73940b
                                              • Instruction Fuzzy Hash: 2F313770600715BBD2206B658D49F6B3A5CDF82714F16003EFE02F72D2DA7D982486BD
                                              APIs
                                              • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\HHn9tNeZd8.exe",771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,0040350A,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00406865
                                              • CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C), ref: 00406874
                                              • CharNextW.USER32(?,"C:\Users\user\Desktop\HHn9tNeZd8.exe",771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,0040350A,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00406879
                                              • CharPrevW.USER32(?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,0040350A,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 0040688C
                                              Strings
                                              • *?|<>/":, xrefs: 00406854
                                              • "C:\Users\user\Desktop\HHn9tNeZd8.exe", xrefs: 00406846
                                              • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00406803
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: Char$Next$Prev
                                              • String ID: "C:\Users\user\Desktop\HHn9tNeZd8.exe"$*?|<>/":$C:\Users\user~1\AppData\Local\Temp\
                                              • API String ID: 589700163-2506215659
                                              • Opcode ID: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                                              • Instruction ID: 8a5b279eb1c6e0cea376d4f623a12da6f674b8daf8575b9a92ef11e753d0d18b
                                              • Opcode Fuzzy Hash: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                                              • Instruction Fuzzy Hash: D111B66780121299DB303B158C44AB766E8EF54794F52C03FED8A732C0E77C4C9286AD
                                              APIs
                                              • GetWindowLongW.USER32(?,000000EB), ref: 00404557
                                              • GetSysColor.USER32(00000000), ref: 00404595
                                              • SetTextColor.GDI32(?,00000000), ref: 004045A1
                                              • SetBkMode.GDI32(?,?), ref: 004045AD
                                              • GetSysColor.USER32(?), ref: 004045C0
                                              • SetBkColor.GDI32(?,?), ref: 004045D0
                                              • DeleteObject.GDI32(?), ref: 004045EA
                                              • CreateBrushIndirect.GDI32(?), ref: 004045F4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                              • String ID:
                                              • API String ID: 2320649405-0
                                              • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                              • Instruction ID: 9e725ab64d6b149d2d2f876944178e70108deb967c5ff43b0f72f150d1bef9aa
                                              • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                              • Instruction Fuzzy Hash: DA2177B1500704AFCB309F78DD18B5BBBF4BF41710B04892EEA96A22E0D739E944CB54
                                              APIs
                                              • GlobalFree.KERNEL32(00000000), ref: 703425C2
                                                • Part of subcall function 703412CC: lstrcpynW.KERNEL32(00000000,?,7034137F,00000019,703411CA,-000000A0), ref: 703412DC
                                              • GlobalAlloc.KERNEL32(00000040), ref: 70342548
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 70342563
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2300141129.0000000070341000.00000020.00000001.01000000.00000006.sdmp, Offset: 70340000, based on PE: true
                                              • Associated: 00000000.00000002.2298275400.0000000070340000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2300937494.0000000070344000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2304859414.0000000070346000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_70340000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                              • String ID: @H3w
                                              • API String ID: 4216380887-4275297014
                                              • Opcode ID: 57a8c46e1ebd0730c1bb8c7d8519734121388bec289827516422afba46cadca8
                                              • Instruction ID: 0d5c75496ce6cb4c39f1f2a4096ef77ad333a90a3846b402c35aa5dc4b20d134
                                              • Opcode Fuzzy Hash: 57a8c46e1ebd0730c1bb8c7d8519734121388bec289827516422afba46cadca8
                                              • Instruction Fuzzy Hash: EA41B9B10082059FD314AF26E840E3EB7FCFB45310B61596EF946AF291EB70A845CB61
                                              APIs
                                              • lstrlenW.KERNEL32(007A0728,00000000,0079A700,771B23A0), ref: 00405611
                                              • lstrlenW.KERNEL32(?,007A0728,00000000,0079A700,771B23A0), ref: 00405621
                                              • lstrcatW.KERNEL32(007A0728,?,?,007A0728,00000000,0079A700,771B23A0), ref: 00405634
                                              • SetWindowTextW.USER32(007A0728,007A0728), ref: 00405646
                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566C
                                              • SendMessageW.USER32(?,0000104D,00000000,?), ref: 00405686
                                              • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405694
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                              • String ID:
                                              • API String ID: 2531174081-0
                                              • Opcode ID: da048427165e3fda7d212e1d25adb62017d163fe0601bf1cc7e6f9066e197b12
                                              • Instruction ID: 329114e2e26f34c588cdeed9baab55c5e37b8eaf8a8cec26a94c2fb3a39dc2c1
                                              • Opcode Fuzzy Hash: da048427165e3fda7d212e1d25adb62017d163fe0601bf1cc7e6f9066e197b12
                                              • Instruction Fuzzy Hash: F921B371900618BACF119F65DD449CFBFB8EF95364F10843AF908B22A0C77A4A50CFA8
                                              APIs
                                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FD6
                                              • MulDiv.KERNEL32(000C79BD,00000064,000C9E90), ref: 00403001
                                              • wsprintfW.USER32 ref: 00403011
                                              • SetWindowTextW.USER32(?,?), ref: 00403021
                                              • SetDlgItemTextW.USER32(?,00000406,?), ref: 00403033
                                              Strings
                                              • verifying installer: %d%%, xrefs: 0040300B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: Text$ItemTimerWindowwsprintf
                                              • String ID: verifying installer: %d%%
                                              • API String ID: 1451636040-82062127
                                              • Opcode ID: c24f39b73ea1f3b51e5f33cc7d94247a9242632f843dd5f1d8eee7270cd10b93
                                              • Instruction ID: 52c7d57b2d50c4e26d0c42f1be749ca1a93388b8845742b28701603c77c86054
                                              • Opcode Fuzzy Hash: c24f39b73ea1f3b51e5f33cc7d94247a9242632f843dd5f1d8eee7270cd10b93
                                              • Instruction Fuzzy Hash: 89016270640209BBEF209F60DD4AFEE3B79EB04344F10803AFA02B51D0DBB99A559F58
                                              APIs
                                                • Part of subcall function 703412BB: GlobalAlloc.KERNELBASE(00000040,?,703412DB,?,7034137F,00000019,703411CA,-000000A0), ref: 703412C5
                                              • GlobalFree.KERNEL32(?), ref: 70342743
                                              • GlobalFree.KERNEL32(00000000), ref: 70342778
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2300141129.0000000070341000.00000020.00000001.01000000.00000006.sdmp, Offset: 70340000, based on PE: true
                                              • Associated: 00000000.00000002.2298275400.0000000070340000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2300937494.0000000070344000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2304859414.0000000070346000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_70340000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: Global$Free$Alloc
                                              • String ID:
                                              • API String ID: 1780285237-0
                                              • Opcode ID: 671b0fffc4423b76d6dcae0819da9d8849aba8940ff47c45b4d675139df855ae
                                              • Instruction ID: c9fd335e67eabe7b1ce9208b26ffbbe903ccc1e37a66453e03ebc848cbd0b1e0
                                              • Opcode Fuzzy Hash: 671b0fffc4423b76d6dcae0819da9d8849aba8940ff47c45b4d675139df855ae
                                              • Instruction Fuzzy Hash: 5731DC32604101EFD7168F65DD84D3EBBFEEB863003A1652DF642AF262CB70A8159B61
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2300141129.0000000070341000.00000020.00000001.01000000.00000006.sdmp, Offset: 70340000, based on PE: true
                                              • Associated: 00000000.00000002.2298275400.0000000070340000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2300937494.0000000070344000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2304859414.0000000070346000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_70340000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: FreeGlobal
                                              • String ID:
                                              • API String ID: 2979337801-0
                                              • Opcode ID: e76b770bd54619bec50829201efb9bd042e2ae511a3e38024ed972086fda06ad
                                              • Instruction ID: 7f7edece7334529ad8267f7c7e26aaec0d4d80b3b6b72ca8e42c9f5a69e7cf76
                                              • Opcode Fuzzy Hash: e76b770bd54619bec50829201efb9bd042e2ae511a3e38024ed972086fda06ad
                                              • Instruction Fuzzy Hash: 7D51F432D01908AACB529FA4C5445BEB7FEEB44348F72A15EF406AF318E770AD468791
                                              APIs
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,703422D8,?,00000808), ref: 703416D5
                                              • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,703422D8,?,00000808), ref: 703416DC
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,703422D8,?,00000808), ref: 703416F0
                                              • GetProcAddress.KERNEL32(703422D8,00000000), ref: 703416F7
                                              • GlobalFree.KERNEL32(00000000), ref: 70341700
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2300141129.0000000070341000.00000020.00000001.01000000.00000006.sdmp, Offset: 70340000, based on PE: true
                                              • Associated: 00000000.00000002.2298275400.0000000070340000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2300937494.0000000070344000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2304859414.0000000070346000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_70340000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                              • String ID:
                                              • API String ID: 1148316912-0
                                              • Opcode ID: 66198c7686bc7a70229c5d3a5ca347e08dd13d99735286c267a05ad8a1a191ad
                                              • Instruction ID: 75127b031e000ba79e3c26058510f2320795bad8ce08d32f60898c7d58348675
                                              • Opcode Fuzzy Hash: 66198c7686bc7a70229c5d3a5ca347e08dd13d99735286c267a05ad8a1a191ad
                                              • Instruction Fuzzy Hash: A9F0A2731061387BD62117A79C4CDABBE9CDF8B2F5B110225F718951A089625D11D7F1
                                              APIs
                                              • lstrlenW.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\,0040351C,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00405E29
                                              • CharPrevW.USER32(?,00000000,?,C:\Users\user~1\AppData\Local\Temp\,0040351C,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00405E33
                                              • lstrcatW.KERNEL32(?,0040A014,?,00000008,0000000A,0000000C), ref: 00405E45
                                              Strings
                                              • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405E23
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: CharPrevlstrcatlstrlen
                                              • String ID: C:\Users\user~1\AppData\Local\Temp\
                                              • API String ID: 2659869361-2382934351
                                              • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                              • Instruction ID: d63f260b1a4b66e3edf6d37d75e222a08c60d96d58f132ba82df153afabc7d48
                                              • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                              • Instruction Fuzzy Hash: EDD0A771101534BAC212AB54AC04CDF73ACAF46344342403BF541B30A5C77C5D5187FD
                                              APIs
                                              • GlobalAlloc.KERNEL32(00000040,?), ref: 70341171
                                              • GlobalAlloc.KERNEL32(00000040,?), ref: 703411E3
                                              • GlobalFree.KERNEL32 ref: 7034124A
                                              • GlobalFree.KERNEL32(?), ref: 7034129B
                                              • GlobalFree.KERNEL32(00000000), ref: 703412B1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2300141129.0000000070341000.00000020.00000001.01000000.00000006.sdmp, Offset: 70340000, based on PE: true
                                              • Associated: 00000000.00000002.2298275400.0000000070340000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2300937494.0000000070344000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2304859414.0000000070346000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_70340000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: Global$Free$Alloc
                                              • String ID:
                                              • API String ID: 1780285237-0
                                              • Opcode ID: 8a963e601b7171cd10800946936d7d8e29e45601764714d2fd54c74044f19b64
                                              • Instruction ID: c39f0405ce60b4c978e0b1f290433190b9509fc37e9913fdc3594b831d496176
                                              • Opcode Fuzzy Hash: 8a963e601b7171cd10800946936d7d8e29e45601764714d2fd54c74044f19b64
                                              • Instruction Fuzzy Hash: 2C515ABA9006019FD700CF69D945A3A77FCEB0A315B21552AFA46DF321EB74E9018B50
                                              APIs
                                              • DestroyWindow.USER32(00000000,00000000,0040321C,00000001), ref: 00403051
                                              • GetTickCount.KERNEL32 ref: 0040306F
                                              • CreateDialogParamW.USER32(0000006F,00000000,00402FB8,00000000), ref: 0040308C
                                              • ShowWindow.USER32(00000000,00000005), ref: 0040309A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: Window$CountCreateDestroyDialogParamShowTick
                                              • String ID:
                                              • API String ID: 2102729457-0
                                              • Opcode ID: 69c8c07bcb791fb785738829cd10c29190a6685c9026359a959baa5e0d41d55b
                                              • Instruction ID: 04dff40eaa5975d4421a2039d3eb5be5080597dcfa90b8d0ab21d67e5ec7c10f
                                              • Opcode Fuzzy Hash: 69c8c07bcb791fb785738829cd10c29190a6685c9026359a959baa5e0d41d55b
                                              • Instruction Fuzzy Hash: BFF05430406621AFC6616F50FD08A9B7B69FB45B12B45843BF145F11E8C73C48818B9D
                                              APIs
                                              • FreeLibrary.KERNEL32(?,771B3420,00000000,C:\Users\user~1\AppData\Local\Temp\,00403B69,00403A7F,0000000A,?,00000008,0000000A,0000000C), ref: 00403BAB
                                              • GlobalFree.KERNEL32(00983A18), ref: 00403BB2
                                              Strings
                                              • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00403B91
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: Free$GlobalLibrary
                                              • String ID: C:\Users\user~1\AppData\Local\Temp\
                                              • API String ID: 1100898210-2382934351
                                              • Opcode ID: 00efa9c9f1272b7cc7d931f24958e2d47b6ee42ce3838b547fcba19599468942
                                              • Instruction ID: b7081a2a86391088548fef66407111aafa244a1a89fd4905b066b82f00895e7d
                                              • Opcode Fuzzy Hash: 00efa9c9f1272b7cc7d931f24958e2d47b6ee42ce3838b547fcba19599468942
                                              • Instruction Fuzzy Hash: 59E0C23340053057CB211F45ED04B1AB778AF95B26F09807BE940BB2618BBC2C438FC8
                                              APIs
                                              • lstrlenW.KERNEL32(?,C:\Users\user\Desktop,0040310E,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\HHn9tNeZd8.exe,C:\Users\user\Desktop\HHn9tNeZd8.exe,80000000,00000003), ref: 00405E75
                                              • CharPrevW.USER32(?,00000000,?,C:\Users\user\Desktop,0040310E,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\HHn9tNeZd8.exe,C:\Users\user\Desktop\HHn9tNeZd8.exe,80000000,00000003), ref: 00405E85
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: CharPrevlstrlen
                                              • String ID: C:\Users\user\Desktop
                                              • API String ID: 2709904686-3976562730
                                              • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                              • Instruction ID: e625fb8110be14d05545ed3956eb9dcd351d24123ebbdb87cfc6543e98ba95a5
                                              • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                              • Instruction Fuzzy Hash: 27D05EB3400920AAC312A704DD00DAF73A8EF523447464466F881A71A5D7785D8186EC
                                              APIs
                                              • lstrlenA.KERNEL32(?,00000000,00000000,00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000), ref: 00405FB9
                                              • lstrcmpiA.KERNEL32(?,?), ref: 00405FD1
                                              • CharNextA.USER32(?,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000), ref: 00405FE2
                                              • lstrlenA.KERNEL32(?,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000), ref: 00405FEB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2254012378.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2253995556.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254032030.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254049763.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2254448566.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_HHn9tNeZd8.jbxd
                                              Similarity
                                              • API ID: lstrlen$CharNextlstrcmpi
                                              • String ID:
                                              • API String ID: 190613189-0
                                              • Opcode ID: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                                              • Instruction ID: 0ddac3552a90187c63c7b8d1f8650bd486a880c4da7af56fddea67c471c8745b
                                              • Opcode Fuzzy Hash: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                                              • Instruction Fuzzy Hash: 5AF09631104515FFCB029FA5DE04D9FBBA8EF05350B2540B9F880F7250D678DE01ABA9