Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Calyciform.exe

Overview

General Information

Sample name:Calyciform.exe
Analysis ID:1554165
MD5:0b813c3349387a69277d7f8a0d20fe3d
SHA1:d0c4aa5fffba33d1f7c9c184cd3acb90f6a75650
SHA256:d2473f318c1386699bdd8442cfe5455d44e18ec23d4b2482ffc82c7c227ab9ad
Infos:

Detection

GuLoader
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
Switches to a custom stack to bypass stack traces
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Contains capabilities to detect virtual machines
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops certificate files (DER)
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Sample execution stops while process was sleeping (likely an evasion)
Stores files to the Windows start menu directory
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64native
  • Calyciform.exe (PID: 1676 cmdline: "C:\Users\user\Desktop\Calyciform.exe" MD5: 0B813C3349387A69277D7F8A0D20FE3D)
    • Calyciform.exe (PID: 6632 cmdline: "C:\Users\user\Desktop\Calyciform.exe" MD5: 0B813C3349387A69277D7F8A0D20FE3D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.130225753929.0000000002FAF000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000002.00000002.134606321221.000000000174F000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: Calyciform.exeReversingLabs: Detection: 45%
      Source: Calyciform.exeVirustotal: Detection: 37%Perma Link
      Source: Calyciform.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: Calyciform.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: Calyciform.exe, 00000002.00000001.129567935037.0000000000649000.00000020.00000001.01000000.00000005.sdmp
      Source: Binary string: mshtml.pdbUGP source: Calyciform.exe, 00000002.00000001.129567935037.0000000000649000.00000020.00000001.01000000.00000005.sdmp
      Source: C:\Users\user\Desktop\Calyciform.exeCode function: 0_2_00405745 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405745
      Source: C:\Users\user\Desktop\Calyciform.exeCode function: 0_2_00406280 FindFirstFileA,FindClose,0_2_00406280
      Source: C:\Users\user\Desktop\Calyciform.exeCode function: 0_2_004026FE FindFirstFileA,0_2_004026FE
      Source: global trafficTCP traffic: 192.168.11.20:49771 -> 45.137.22.248:80
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.248
      Source: Calyciform.exe, 00000002.00000002.134609519488.00000000028C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.bin
      Source: Calyciform.exe, 00000002.00000002.134609519488.00000000028C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.bin#?_v
      Source: Calyciform.exe, 00000002.00000002.134609519488.00000000028C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.bin/?Kv
      Source: Calyciform.exe, 00000002.00000002.134609519488.00000000028C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.bin7?Sv
      Source: Calyciform.exe, 00000002.00000002.134609519488.0000000002897000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.binJ
      Source: Calyciform.exe, 00000002.00000002.134609519488.00000000028C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.binK?
      Source: Calyciform.exe, 00000002.00000002.134609519488.00000000028C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.binM
      Source: Calyciform.exe, 00000002.00000002.134609519488.00000000028C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.binS?
      Source: Calyciform.exe, 00000002.00000002.134609519488.0000000002897000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.bin_
      Source: Calyciform.exe, 00000002.00000002.134609519488.00000000028C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.bin_?
      Source: Calyciform.exe, 00000002.00000002.134609519488.00000000028C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.binedvmbusRFCOMM
      Source: Calyciform.exe, 00000002.00000002.134609519488.00000000028C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.binh
      Source: Calyciform.exe, 00000002.00000002.134609519488.0000000002897000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.binl
      Source: Calyciform.exe, 00000002.00000001.129567935037.0000000000649000.00000020.00000001.01000000.00000005.sdmpString found in binary or memory: http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.
      Source: Calyciform.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
      Source: Calyciform.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: Calyciform.exeString found in binary or memory: http://s.symcb.com/universal-root.crl0
      Source: Calyciform.exeString found in binary or memory: http://s.symcd.com06
      Source: Calyciform.exeString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
      Source: Calyciform.exeString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
      Source: Calyciform.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
      Source: Calyciform.exe, 00000002.00000001.129567935037.0000000000649000.00000020.00000001.01000000.00000005.sdmpString found in binary or memory: http://www.gopher.ftp://ftp.
      Source: Calyciform.exe, 00000002.00000001.129567935037.0000000000626000.00000020.00000001.01000000.00000005.sdmpString found in binary or memory: http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD
      Source: Calyciform.exe, 00000002.00000001.129567935037.00000000005F2000.00000020.00000001.01000000.00000005.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
      Source: Calyciform.exe, 00000002.00000001.129567935037.00000000005F2000.00000020.00000001.01000000.00000005.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
      Source: Calyciform.exeString found in binary or memory: https://d.symcb.com/cps0%
      Source: Calyciform.exeString found in binary or memory: https://d.symcb.com/rpa0
      Source: Calyciform.exeString found in binary or memory: https://d.symcb.com/rpa0.
      Source: Calyciform.exe, 00000002.00000001.129567935037.0000000000649000.00000020.00000001.01000000.00000005.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
      Source: C:\Users\user\Desktop\Calyciform.exeCode function: 0_2_004051E2 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004051E2
      Source: C:\Users\user\Desktop\Calyciform.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Puerperant\vmmouse.catJump to dropped file
      Source: C:\Users\user\Desktop\Calyciform.exeCode function: 0_2_004031E9 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004031E9
      Source: C:\Users\user\Desktop\Calyciform.exeCode function: 0_2_00404A210_2_00404A21
      Source: C:\Users\user\Desktop\Calyciform.exeCode function: 0_2_6D6A1A9C0_2_6D6A1A9C
      Source: Calyciform.exeStatic PE information: invalid certificate
      Source: Calyciform.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal68.troj.evad.winEXE@3/8@0/1
      Source: C:\Users\user\Desktop\Calyciform.exeCode function: 0_2_004031E9 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004031E9
      Source: C:\Users\user\Desktop\Calyciform.exeCode function: 0_2_004044AE GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_004044AE
      Source: C:\Users\user\Desktop\Calyciform.exeCode function: 0_2_004020D1 CoCreateInstance,MultiByteToWideChar,0_2_004020D1
      Source: C:\Users\user\Desktop\Calyciform.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\PuerperantJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeFile created: C:\Users\user\AppData\Local\Temp\nse9AF4.tmpJump to behavior
      Source: Calyciform.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\Calyciform.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: Calyciform.exeReversingLabs: Detection: 45%
      Source: Calyciform.exeVirustotal: Detection: 37%
      Source: C:\Users\user\Desktop\Calyciform.exeFile read: C:\Users\user\Desktop\Calyciform.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\Calyciform.exe "C:\Users\user\Desktop\Calyciform.exe"
      Source: C:\Users\user\Desktop\Calyciform.exeProcess created: C:\Users\user\Desktop\Calyciform.exe "C:\Users\user\Desktop\Calyciform.exe"
      Source: C:\Users\user\Desktop\Calyciform.exeProcess created: C:\Users\user\Desktop\Calyciform.exe "C:\Users\user\Desktop\Calyciform.exe"Jump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: msi.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: msi.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: Calyciform.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: Calyciform.exe, 00000002.00000001.129567935037.0000000000649000.00000020.00000001.01000000.00000005.sdmp
      Source: Binary string: mshtml.pdbUGP source: Calyciform.exe, 00000002.00000001.129567935037.0000000000649000.00000020.00000001.01000000.00000005.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000000.00000002.130225753929.0000000002FAF000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.134606321221.000000000174F000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\Calyciform.exeCode function: 0_2_6D6A1A9C GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_6D6A1A9C
      Source: C:\Users\user\Desktop\Calyciform.exeCode function: 0_2_6D6A2F20 push eax; ret 0_2_6D6A2F4E
      Source: C:\Users\user\Desktop\Calyciform.exeFile created: C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\Calyciform.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\PuerperantJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Puerperant\Scrivano.SekJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Puerperant\Bluetooth Suite help_HUN.chmJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Puerperant\Grundkoncept.FehJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Puerperant\anycollseq.cJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Puerperant\list-drag-handle-symbolic.svgJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Puerperant\user-idle.pngJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Puerperant\vmmouse.catJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\Calyciform.exeAPI/Special instruction interceptor: Address: 37DE4BA
      Source: C:\Users\user\Desktop\Calyciform.exeAPI/Special instruction interceptor: Address: 1F7E4BA
      Source: C:\Users\user\Desktop\Calyciform.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exeJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeFile opened: C:\Program Files\qga\qga.exeJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exeJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeFile opened: C:\Program Files\qga\qga.exeJump to behavior
      Source: Calyciform.exe, 00000000.00000002.130224651433.0000000000A38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE0
      Source: C:\Users\user\Desktop\Calyciform.exeFile opened / queried: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Puerperant\vmmouse.catJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\Calyciform.exe TID: 5572Thread sleep count: 106 > 30Jump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exe TID: 5572Thread sleep time: -106000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\Calyciform.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\Calyciform.exeCode function: 0_2_00405745 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405745
      Source: C:\Users\user\Desktop\Calyciform.exeCode function: 0_2_00406280 FindFirstFileA,FindClose,0_2_00406280
      Source: C:\Users\user\Desktop\Calyciform.exeCode function: 0_2_004026FE FindFirstFileA,0_2_004026FE
      Source: Calyciform.exe, 00000000.00000002.130229388804.0000000003E19000.00000004.00000800.00020000.00000000.sdmp, Calyciform.exe, 00000002.00000002.134610018366.00000000042C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
      Source: Calyciform.exe, 00000002.00000002.134609519488.0000000002897000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWx
      Source: Calyciform.exe, 00000000.00000002.130229388804.0000000003E19000.00000004.00000800.00020000.00000000.sdmp, Calyciform.exe, 00000002.00000002.134610018366.00000000042C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
      Source: Calyciform.exe, 00000002.00000002.134610018366.00000000042C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
      Source: Calyciform.exe, 00000000.00000002.130224651433.0000000000A38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmmouse.cat
      Source: vmmouse.cat.0.drBinary or memory string: VMware, Inc.
      Source: Calyciform.exe, 00000000.00000002.130229388804.0000000003E19000.00000004.00000800.00020000.00000000.sdmp, Calyciform.exe, 00000002.00000002.134610018366.00000000042C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
      Source: vmmouse.cat.0.drBinary or memory string: vmmouse.inf0E
      Source: Calyciform.exe, 00000000.00000002.130229388804.0000000003E19000.00000004.00000800.00020000.00000000.sdmp, Calyciform.exe, 00000002.00000002.134610018366.00000000042C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
      Source: Calyciform.exe, 00000000.00000002.130224651433.0000000000A38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \Scrivano.SekBluetooth Suite help_HUN.chmGrundkoncept.Fehanycollseq.clist-drag-handle-symbolic.svguser-idle.pngvmmouse.cat%Omkomne52%\TheologicallySoftware\Energizingfireetageshusets
      Source: Calyciform.exe, 00000000.00000002.130229388804.0000000003E19000.00000004.00000800.00020000.00000000.sdmp, Calyciform.exe, 00000002.00000002.134610018366.00000000042C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
      Source: Calyciform.exe, 00000002.00000002.134610018366.00000000042C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
      Source: Calyciform.exe, 00000002.00000002.134609519488.00000000028D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: Calyciform.exe, 00000000.00000002.130224651433.0000000000A38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Puerperant\vmmouse.catK$9
      Source: Calyciform.exe, 00000000.00000002.130229388804.0000000003E19000.00000004.00000800.00020000.00000000.sdmp, Calyciform.exe, 00000002.00000002.134610018366.00000000042C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
      Source: Calyciform.exe, 00000000.00000002.130224651433.0000000000A38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe0
      Source: vmmouse.cat.0.drBinary or memory string: vmmouse.sys0M
      Source: Calyciform.exe, 00000000.00000002.130229388804.0000000003E19000.00000004.00000800.00020000.00000000.sdmp, Calyciform.exe, 00000002.00000002.134610018366.00000000042C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
      Source: Calyciform.exe, 00000000.00000002.130229388804.0000000003E19000.00000004.00000800.00020000.00000000.sdmp, Calyciform.exe, 00000002.00000002.134610018366.00000000042C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
      Source: Calyciform.exe, 00000002.00000002.134610018366.00000000042C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
      Source: Calyciform.exe, 00000002.00000002.134609519488.00000000028D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWc
      Source: C:\Users\user\Desktop\Calyciform.exeAPI call chain: ExitProcess graph end nodegraph_0-4450
      Source: C:\Users\user\Desktop\Calyciform.exeAPI call chain: ExitProcess graph end nodegraph_0-4616
      Source: C:\Users\user\Desktop\Calyciform.exeSystem information queried: ModuleInformationJump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeCode function: 0_2_0040643A LdrInitializeThunk,0_2_0040643A
      Source: C:\Users\user\Desktop\Calyciform.exeCode function: 0_2_6D6A1A9C GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_6D6A1A9C
      Source: C:\Users\user\Desktop\Calyciform.exeProcess created: C:\Users\user\Desktop\Calyciform.exe "C:\Users\user\Desktop\Calyciform.exe"Jump to behavior
      Source: C:\Users\user\Desktop\Calyciform.exeCode function: 0_2_004031E9 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004031E9
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      Registry Run Keys / Startup Folder
      1
      Access Token Manipulation
      1
      Masquerading
      OS Credential Dumping311
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault AccountsScheduled Task/Job1
      DLL Side-Loading
      11
      Process Injection
      12
      Virtualization/Sandbox Evasion
      LSASS Memory12
      Virtualization/Sandbox Evasion
      Remote Desktop Protocol1
      Clipboard Data
      Junk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      Registry Run Keys / Startup Folder
      1
      Access Token Manipulation
      Security Account Manager2
      File and Directory Discovery
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
      DLL Side-Loading
      11
      Process Injection
      NTDS14
      System Information Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Obfuscated Files or Information
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      DLL Side-Loading
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      Calyciform.exe46%ReversingLabsWin32.Trojan.Generic
      Calyciform.exe37%VirustotalBrowse
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp\System.dll0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://nsis.sf.net/NSIS_Error0%Avira URL Cloudsafe
      http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.binS?0%Avira URL Cloudsafe
      http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.binl0%Avira URL Cloudsafe
      http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.binJ0%Avira URL Cloudsafe
      http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.binM0%Avira URL Cloudsafe
      http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.binh0%Avira URL Cloudsafe
      http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.bin_?0%Avira URL Cloudsafe
      http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.bin/?Kv0%Avira URL Cloudsafe
      http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.0%Avira URL Cloudsafe
      http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.bin#?_v0%Avira URL Cloudsafe
      http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.binedvmbusRFCOMM0%Avira URL Cloudsafe
      http://nsis.sf.net/NSIS_ErrorError0%Avira URL Cloudsafe
      http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.bin_0%Avira URL Cloudsafe
      http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.bin0%Avira URL Cloudsafe
      http://www.gopher.ftp://ftp.0%Avira URL Cloudsafe
      http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.bin7?Sv0%Avira URL Cloudsafe
      http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.binK?0%Avira URL Cloudsafe
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.binJCalyciform.exe, 00000002.00000002.134609519488.0000000002897000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.binlCalyciform.exe, 00000002.00000002.134609519488.0000000002897000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtdCalyciform.exe, 00000002.00000001.129567935037.00000000005F2000.00000020.00000001.01000000.00000005.sdmpfalse
        high
        http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.binMCalyciform.exe, 00000002.00000002.134609519488.00000000028C1000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.binS?Calyciform.exe, 00000002.00000002.134609519488.00000000028C1000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://nsis.sf.net/NSIS_ErrorCalyciform.exefalse
        • Avira URL Cloud: safe
        unknown
        http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.bin_?Calyciform.exe, 00000002.00000002.134609519488.00000000028C1000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.binhCalyciform.exe, 00000002.00000002.134609519488.00000000028C1000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214Calyciform.exe, 00000002.00000001.129567935037.0000000000649000.00000020.00000001.01000000.00000005.sdmpfalse
          high
          http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.bin/?KvCalyciform.exe, 00000002.00000002.134609519488.00000000028C1000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.Calyciform.exe, 00000002.00000001.129567935037.0000000000649000.00000020.00000001.01000000.00000005.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtdCalyciform.exe, 00000002.00000001.129567935037.00000000005F2000.00000020.00000001.01000000.00000005.sdmpfalse
            high
            http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.bin#?_vCalyciform.exe, 00000002.00000002.134609519488.00000000028C1000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.binedvmbusRFCOMMCalyciform.exe, 00000002.00000002.134609519488.00000000028C1000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://nsis.sf.net/NSIS_ErrorErrorCalyciform.exefalse
            • Avira URL Cloud: safe
            unknown
            http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.bin_Calyciform.exe, 00000002.00000002.134609519488.0000000002897000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTDCalyciform.exe, 00000002.00000001.129567935037.0000000000626000.00000020.00000001.01000000.00000005.sdmpfalse
              high
              http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.binCalyciform.exe, 00000002.00000002.134609519488.00000000028C1000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.gopher.ftp://ftp.Calyciform.exe, 00000002.00000001.129567935037.0000000000649000.00000020.00000001.01000000.00000005.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.bin7?SvCalyciform.exe, 00000002.00000002.134609519488.00000000028C1000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://45.137.22.248/nSTbXfnKEyKbZuJcrDaW99.binK?Calyciform.exe, 00000002.00000002.134609519488.00000000028C1000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              45.137.22.248
              unknownNetherlands
              51447ROOTLAYERNETNLfalse
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1554165
              Start date and time:2024-11-12 07:44:17 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 12m 58s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
              Run name:Suspected Instruction Hammering
              Number of analysed new started processes analysed:3
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:Calyciform.exe
              Detection:MAL
              Classification:mal68.troj.evad.winEXE@3/8@0/1
              EGA Information:
              • Successful, ratio: 50%
              HCA Information:
              • Successful, ratio: 82%
              • Number of executed functions: 43
              • Number of non-executed functions: 30
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
              • Exclude process from analysis (whitelisted): dllhost.exe
              TimeTypeDescription
              01:49:15API Interceptor77x Sleep call for process: Calyciform.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              45.137.22.248I5pvP0CU6M.exeGet hashmaliciousRedLineBrowse
              • 45.137.22.248:55615/
              New_Order_-_PSFK23TT002.exeGet hashmaliciousGuLoaderBrowse
              • 45.137.22.248/eQobTNPQQm56.bin
              BOQ.00987578.exeGet hashmaliciousRemcos, GuLoaderBrowse
              • 45.137.22.248/ZIWRb187.bin
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              ROOTLAYERNETNLI5pvP0CU6M.exeGet hashmaliciousRedLineBrowse
              • 45.137.22.248
              gLsenXDHxP.exeGet hashmaliciousRedLineBrowse
              • 185.222.58.240
              DEVIS + FACTURE.exeGet hashmaliciousRemcos, GuLoaderBrowse
              • 45.137.22.126
              PZNfhfaj9O.exeGet hashmaliciousRedLineBrowse
              • 185.222.58.80
              ZxS8mP8uE6.exeGet hashmaliciousRedLineBrowse
              • 45.137.22.123
              nu28HwzQwC.exeGet hashmaliciousRedLineBrowse
              • 185.222.58.52
              DKO6uy1Tia.exeGet hashmaliciousRedLineBrowse
              • 45.137.22.70
              3BOCQ22aUs.ps1Get hashmaliciousUnknownBrowse
              • 45.137.20.45
              Order Proposal.exeGet hashmaliciousRedLineBrowse
              • 45.137.22.121
              l2rMtmFkD6.exeGet hashmaliciousRedLineBrowse
              • 185.222.58.233
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp\System.dllZOj46Y8Mb1.exeGet hashmaliciousUnknownBrowse
                TouchEn_nxKey_32bit.exeGet hashmaliciousUnknownBrowse
                  Qz.exeGet hashmaliciousUnknownBrowse
                    Qz.exeGet hashmaliciousUnknownBrowse
                      scan_doc20240628154931011588.com.exeGet hashmaliciousGuLoaderBrowse
                        scan_doc20240628154931011588.com.exeGet hashmaliciousGuLoaderBrowse
                          Order 0002939399440.bat.exeGet hashmaliciousGuLoaderBrowse
                            Order 0002939399440.bat.exeGet hashmaliciousGuLoaderBrowse
                              New Order 000299944885.bat.exeGet hashmaliciousGuLoaderBrowse
                                Process:C:\Users\user\Desktop\Calyciform.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):11776
                                Entropy (8bit):5.832316471889005
                                Encrypted:false
                                SSDEEP:192:4PtkiQJr7jHYT87RfwXQ6YSYtOuVDi7IsFW14Ll8CO:H78TQIgGCDp14LGC
                                MD5:B0C77267F13B2F87C084FD86EF51CCFC
                                SHA1:F7543F9E9B4F04386DFBF33C38CBED1BF205AFB3
                                SHA-256:A0CAC4CF4852895619BC7743EBEB89F9E4927CCDB9E66B1BCD92A4136D0F9C77
                                SHA-512:F2B57A2EEA00F52A3C7080F4B5F2BB85A7A9B9F16D12DA8F8FF673824556C62A0F742B72BE0FD82A2612A4B6DBD7E0FDC27065212DA703C2F7E28D199696F66E
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Joe Sandbox View:
                                • Filename: ZOj46Y8Mb1.exe, Detection: malicious, Browse
                                • Filename: TouchEn_nxKey_32bit.exe, Detection: malicious, Browse
                                • Filename: Qz.exe, Detection: malicious, Browse
                                • Filename: Qz.exe, Detection: malicious, Browse
                                • Filename: scan_doc20240628154931011588.com.exe, Detection: malicious, Browse
                                • Filename: scan_doc20240628154931011588.com.exe, Detection: malicious, Browse
                                • Filename: Order 0002939399440.bat.exe, Detection: malicious, Browse
                                • Filename: Order 0002939399440.bat.exe, Detection: malicious, Browse
                                • Filename: New Order 000299944885.bat.exe, Detection: malicious, Browse
                                Reputation:moderate, very likely benign file
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L.....oZ...........!..... ...........(.......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text...O........ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\Calyciform.exe
                                File Type:MS Windows HtmlHelp Data
                                Category:dropped
                                Size (bytes):64610
                                Entropy (8bit):7.729778927024819
                                Encrypted:false
                                SSDEEP:1536:2eV+HBqsKGpvyYsR86GHN2G2LA/He8GayXqH1w6oq3Yo:jgHVIr86uNh22He8GRXS1w6oaYo
                                MD5:3051A739BB5569A4740B65AA4FA59F9E
                                SHA1:4F89DEE584612E3CDBBB9D766CBDDECA65708058
                                SHA-256:098FCE4F92A83A100B0B9B65D2D44D17D2C81AC688BFC5F650E2FDFC61C73D8C
                                SHA-512:7C7D5218D0CACF01DEFAC68C9E66177305533AB269C0AA7A78B561FF1CD81B40F0A2AD91018F6E0B7EAFFA7F289CED53EE34A14A8842EC79CB3D9C6501013BB1
                                Malicious:false
                                Reputation:low
                                Preview:ITSF....`........\.........|.{.......".....|.{......."..`...............x.......T.......................b...............ITSP....T...........................................j..].!......."..T...............PMGL................./..../#IDXHDR......./#ITBITS..../#STRINGS...z.Q./#SYSTEM....T./#TOPICS.....@./#URLSTR...E.5./#URLTBL...U.p./#WINDOWS.....L./$FIftiMain......../$OBJINST...y.../$WWAssociativeLinks/..../$WWAssociativeLinks/Property...u../$WWKeywordLinks/..../$WWKeywordLinks/BTree...K.L./$WWKeywordLinks/Data....4./$WWKeywordLinks/Map...K../$WWKeywordLinks/Property...U ./Advanced_Phone_Operations.htm..s...!/Advanced_Phone_Operations_files/...7/Advanced_Phone_Operations_files/colorschememapping.xml...j.:-/Advanced_Phone_Operations_files/filelist.xml...g.c//Advanced_Phone_Operations_files/themedata.thmx...J. ./Audio_Services.htm......../Audio_Services_files/...,/Audio_Services_files/colorschememapping.xml.....:"/Audio_Services_files/filelist.xml...$.X$/Audio_Services_files/themedata.thmx
                                Process:C:\Users\user\Desktop\Calyciform.exe
                                File Type:ASCII text, with very long lines (17548), with no line terminators
                                Category:dropped
                                Size (bytes):17548
                                Entropy (8bit):2.7230154883953777
                                Encrypted:false
                                SSDEEP:192:TJmMN0EdObgQeHFYcLgoEWqaTw82h7V0GFykrWb+Oks/x:FHN1OFgFRgoEzaehC6ykrqf/x
                                MD5:036A72115A57C72A5AD5C9CF97109E55
                                SHA1:BB35C9BD70872C0EB0019BEE8F4239FBEB68E4F7
                                SHA-256:4050850254D585D19A617B4B988739238045E86385B32CDED6455CFF5EDFD734
                                SHA-512:2B6DB62B5850B5888B221B9FA0BCDAE5E68E7677B33A41B1FC662C78926697D5F4F8240299C67368A5A8AA5C993F3D4DFC254BBF62A86A64D3740A5BE566C7A1
                                Malicious:false
                                Reputation:low
                                Preview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
                                Process:C:\Users\user\Desktop\Calyciform.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):149620
                                Entropy (8bit):7.813525702369115
                                Encrypted:false
                                SSDEEP:3072:YFJwcsY59U+kwk0Mrme1qHMSeX7+rPRi0ejfoeU44Oq3KDt/WJGBN9HUS:YFJwxY5rkw5otADerG9ejf044j2BDUS
                                MD5:D8EF7410766DF405AFB2A2FE100D48C5
                                SHA1:85F5A6A476370227F1CCEDF345B4ACA6C844592F
                                SHA-256:9BAA5CEDC1143C1ABEC661F760C793C32448D682BACC9239FEC7BC85B51DB0BF
                                SHA-512:F2CF4A0262DE9EE593119B72D5C17E9E1DFA538DE2A5CAFFC67155A7CC9ABD2ECDF7B3A74C7C10A5A7ABFAB65CB4228CF2D1BD5FFDC8DE7DE6E09B9FBBD2BF98
                                Malicious:false
                                Reputation:low
                                Preview:.........f!..!r..f.......q..f....ow..f.........K...f.....t. ..._..1...*Q.............. ....k...f...<WXf.......A......f............f......v<.........=.&.f........ .....f......?JWf........\.6.!.!.f...........f........f..1.f..Xp ........f.........f...f!....]..|.............^.......H..Qf..........p....................R7.f.....pDv..,...2........f...f..........f...............B.........J..u....,.148f...f.......f......J..u.f.............f..............":.0...:....vNbs...Tbi.....8L.+..P~FkT]/.w.J_\;...JE.N...F.".7.X.f.#...".K-ZN...r.TWrw.(.kn.Q[w'<..s2.>hD..'<...................?......&0.Pt&f....~.,..&.)J.......]..L^.Nk..8H....\...P}w.aF..T]aL.ka..#.....P.@I...v=......!.PmD.."34...."e..y.'.......L^..4H.+h=......Pn..Or....`.../..^..........YzF..f...QH...a....kw'...v.?..*....Dz....'...{.I"...|.4..4.Td...cN|.o.:Fh.R.......e~......1O78Su...QK.r./B...7:;V.TWA..vNO..].TOh.Ts.5.9\]TU....Ne...<TemO.\F...m...d.c...^+...'/..B..-..$Al./J....l..0.'>..J..<
                                Process:C:\Users\user\Desktop\Calyciform.exe
                                File Type:C source, ASCII text
                                Category:dropped
                                Size (bytes):1478
                                Entropy (8bit):4.983443441486854
                                Encrypted:false
                                SSDEEP:24:RSTUJDC+pa/IBgQZpHNNOJ3n4oKYOTRv2C3pHv/G0pXXykdy4mJaN+:RSTUJD2/0FLE3nlKp3lpHf7my+
                                MD5:833073D62A8DC48D769CF78DE7F5F459
                                SHA1:4FC185A31C5137FB86AE334BCB6891A8BB205BD8
                                SHA-256:B2830A264282BA361DB7DE8F8DA797F8D5EAF38B47006F9F85B3BA887A043FD0
                                SHA-512:3664B5B5001F18CF1DA9EAF5F7D6222B16ABF92C2F6539DC3E149F961C487D72FCBB6A1391E962AA3A2D7EAA74167B81534CF90A97895F339C3A04970AAE4A89
                                Malicious:false
                                Preview:/*.** 2017-04-16.**.** The author disclaims copyright to this source code. In place of.** a legal notice, here is a blessing:.**.** May you do good and not evil..** May you find forgiveness for yourself and forgive others..** May you share freely, never taking more than you give..**.*************************************************************************.**.** This file implements a run-time loadable extension to SQLite that.** registers a sqlite3_collation_needed() callback to register a fake.** collating function for any unknown collating sequence. The fake.** collating function works like BINARY..**.** This extension can be used to load schemas that contain one or more.** unknown collating sequences..*/.#include "sqlite3ext.h".SQLITE_EXTENSION_INIT1.#include <string.h>..static int anyCollFunc(. void *NotUsed,. int nKey1, const void *pKey1,. int nKey2, const void *pKey2.){. int rc, n;. n = nKey1<nKey2 ? nKey1 : nKey2;. rc = memcmp(pKey1, pKey2, n);. if( rc==0 ) rc
                                Process:C:\Users\user\Desktop\Calyciform.exe
                                File Type:SVG Scalable Vector Graphics image
                                Category:dropped
                                Size (bytes):624
                                Entropy (8bit):3.5629799376743088
                                Encrypted:false
                                SSDEEP:12:t4CDqKIUMUMfUMUMK5UM4IIUMUMfUMUMK5UM4JIUMUMfUMUMK5UM4IIUMUMfUMUo:t4CVI55f55U5rI55f55U5sI55f55U5rs
                                MD5:1BA333F3E126D8A83CA3C6FCFB71FBC8
                                SHA1:D54F87C1937D6A08455C903B4E60F6B390A9C583
                                SHA-256:7DEC55F99B6FA48395B801EDE687C47330E79C4045F48B7AF673FB259F29FF32
                                SHA-512:AA2E2E617E28925B3C69C25E9CD87073D7346544CFDA1B106D4A2198818F82895355B4F8FA6EF98242730565153C1EF3BDBDAF63864A3F186171AB81E3DE342A
                                Malicious:false
                                Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16"><path d="M4.494 0a1.5 1.5 0 00-1.5 1.5 1.5 1.5 0 001.5 1.5 1.5 1.5 0 001.5-1.5 1.5 1.5 0 00-1.5-1.5zm6 0a1.5 1.5 0 00-1.5 1.5 1.5 1.5 0 001.5 1.5 1.5 1.5 0 001.5-1.5 1.5 1.5 0 00-1.5-1.5zm-6 6a1.5 1.5 0 00-1.5 1.5 1.5 1.5 0 001.5 1.5 1.5 1.5 0 001.5-1.5 1.5 1.5 0 00-1.5-1.5zm6 0a1.5 1.5 0 00-1.5 1.5 1.5 1.5 0 001.5 1.5 1.5 1.5 0 001.5-1.5 1.5 1.5 0 00-1.5-1.5zm-6 6a1.5 1.5 0 00-1.5 1.5 1.5 1.5 0 001.5 1.5 1.5 1.5 0 001.5-1.5 1.5 1.5 0 00-1.5-1.5zm6 0a1.5 1.5 0 00-1.5 1.5 1.5 1.5 0 001.5 1.5 1.5 1.5 0 001.5-1.5 1.5 1.5 0 00-1.5-1.5z" fill="#2e3436"/></svg>
                                Process:C:\Users\user\Desktop\Calyciform.exe
                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                Category:dropped
                                Size (bytes):592
                                Entropy (8bit):7.514679114244337
                                Encrypted:false
                                SSDEEP:12:6v/7p+kQhKPewCkTzCyIgCldhcj5MebL0n0UW31PcF0hJu:ObZnCOzCyIgYda9X/l80hg
                                MD5:901308031B5624C2779848AF45F0FE38
                                SHA1:726AA6FD0430499D0051A39FF7722C89DCB4E001
                                SHA-256:4E7F9241A3D4F1E41855B264424B6CB72E0B2C8B3ED4C4384D55136556858446
                                SHA-512:026436FB0F5645A602140514505D687B0ACE7460A0C65A8F925072D99BD124C8D4AE7FB5C3852DD64B6B1C67BA974D6FB12BE064993721143EC8B76CD3A740B9
                                Malicious:false
                                Preview:.PNG........IHDR................a....IDATx..Q...M.=w....m....i...........m.6.s{gwj....9.K./a....}..Pw.t....fz~.t..xr.r.. .L....US@f.w...p.Z.W.2g.E......N. H.6n..H..H.....x....w.%..Zgv.P.v..ju.....G..u..0....,B..D...\.5..o.... .'.@......A.....b&D.}...%...8.?X-...k.$j..M...F.v.P.....L....4~oc...<...-o^l...C&...R....K.i.>....R..*`..$D...Q.....l.Ib2../x..`#[...{.S.f...=......$.J.....{.j?..sf..... ..u.r...|...d}...%xk......Y..}...FO.Yi.y..~..G.<M...4...u.\....[..;0.....>.E.6/K....hg".1........`W.v..x...>.:........(...O.}`........`.a..a.........GFH..|......IEND.B`.
                                Process:C:\Users\user\Desktop\Calyciform.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):10347
                                Entropy (8bit):7.079665238975951
                                Encrypted:false
                                SSDEEP:192:uaPD2IJC+EjmwBYyKaWFWQF8DU+YVqnajTgd:FLoPCFR6D+Vl3gd
                                MD5:8945C78F744916BC7EB6A7A57051327E
                                SHA1:2BA36E895E143C92DB593220C9EAFE36D1084F64
                                SHA-256:01619BAF4E68B2BB949557F7EC871E7E6A1AD3DEDE6230FB83372FF0AE0A68CE
                                SHA-512:443F392FE06DE1A0990D7D987871B5DF1FBFD0CA7DB7560D69AAB6EEFF3B0240BC1B4FAA78E45C3BAD0D1DF329AC91E1715ECABCF9B9575A26F24A4DC4B7E6E7
                                Malicious:false
                                Preview:0.(g..*.H........(X0.(T...1.0...`.H.e......0..B..+.....7.....30../0...+.....7......B>[..XI.)..0.....200624070838Z0...+.....7.....0..B0....R6.D.1.3.1.6.8.2.C.1.B.4.8.B.C.1.C.3.D.C.C.4.C.3.7.2.9.1.3.6.C.5.2.E.E.4.8.C.B.F...1..A0:..+.....7...1,0*...F.i.l.e........v.m.m.o.u.s.e...i.n.f...0E..+.....7...17050...+.....7.......0!0...+........m...........r.6...0X..+.....7...1J0H...O.S.A.t.t.r.......22.:.6...0.,.2.:.6...2.,.2.:.6...3.,.2.:.1.0...0...0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....RA.C.8.1.A.F.F.0.B.A.C.E.5.2.E.C.7.8.8.2.8.9.C.6.A.8.F.8.F.3.4.7.4.F.D.9.0.9.B.5...1..I0:..+.....7...1,0*...F.i.l.e........v.m.m.o.u.s.e...s.y.s...0M..+.....7...1?0=0...+.....7...0...........0!0...+.............R.x.....GO...0X..+.....7...1J0H...O.S.A.t.t.r.......22.:.6...0.,.2.:.6...2.,.2.:.6...3.,.2.:.1.0...0...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}........0...0J..+.....7....<0:.&.Q.u.
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                Entropy (8bit):7.13957822235099
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:Calyciform.exe
                                File size:428'464 bytes
                                MD5:0b813c3349387a69277d7f8a0d20fe3d
                                SHA1:d0c4aa5fffba33d1f7c9c184cd3acb90f6a75650
                                SHA256:d2473f318c1386699bdd8442cfe5455d44e18ec23d4b2482ffc82c7c227ab9ad
                                SHA512:d3b46abc8583f2a12c4e202392e97679147c5d1a691e1525bcf771f89902902740e503f5856574c5e7b8ad1303036485193f48f989201cf25a1ca08c79dc8c34
                                SSDEEP:12288:F4FAe+jtbt1JcAfGWpfnuayZzCeFPEG6w//j:YAe+jtbt1JcAlnnGC+R/j
                                TLSH:0C94F1413690B06FD82605329197BE269B536CF46F604BF77B977B1FA831281E63C22D
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........@............/...........s.../...............+.......Rich............................PE..L.....oZ.................b....9....
                                Icon Hash:253c2c2d0d212199
                                Entrypoint:0x4031e9
                                Entrypoint Section:.text
                                Digitally signed:true
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Time Stamp:0x5A6FED1A [Tue Jan 30 03:57:14 2018 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:3abe302b6d9a1256e6a915429af4ffd2
                                Signature Valid:false
                                Signature Issuer:E=Logikprogrammeringsaspektet@Trvarefabrikken.Res, OU="Addiment Achillea ", O=Parat, L=Waldachtal, S=Baden-W\xfcrttemberg, C=DE
                                Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                Error Number:-2146762487
                                Not Before, Not After
                                • 21/02/2023 07:54:51 20/02/2026 07:54:51
                                Subject Chain
                                • E=Logikprogrammeringsaspektet@Trvarefabrikken.Res, OU="Addiment Achillea ", O=Parat, L=Waldachtal, S=Baden-W\xfcrttemberg, C=DE
                                Version:3
                                Thumbprint MD5:ED46C5437A947D935DDFD89103D75D07
                                Thumbprint SHA-1:659D97B2F5DBD1E76E13986AE80CE1A563D8D20F
                                Thumbprint SHA-256:6FCDFF81CCD8D73E3117F22F8AD8CF0DF5BC8EC5EDE926706565EA2ABF5EEB19
                                Serial:565869FF3236E7A0D7D3D761C2B8177DF293331A
                                Instruction
                                sub esp, 00000184h
                                push ebx
                                push esi
                                push edi
                                xor ebx, ebx
                                push 00008001h
                                mov dword ptr [esp+18h], ebx
                                mov dword ptr [esp+10h], 0040A198h
                                mov dword ptr [esp+20h], ebx
                                mov byte ptr [esp+14h], 00000020h
                                call dword ptr [004080A0h]
                                call dword ptr [0040809Ch]
                                and eax, BFFFFFFFh
                                cmp ax, 00000006h
                                mov dword ptr [007A2F4Ch], eax
                                je 00007F984500B533h
                                push ebx
                                call 00007F984500E60Ah
                                cmp eax, ebx
                                je 00007F984500B529h
                                push 00000C00h
                                call eax
                                mov esi, 00408298h
                                push esi
                                call 00007F984500E586h
                                push esi
                                call dword ptr [00408098h]
                                lea esi, dword ptr [esi+eax+01h]
                                cmp byte ptr [esi], bl
                                jne 00007F984500B50Dh
                                push 0000000Ah
                                call 00007F984500E5DEh
                                push 00000008h
                                call 00007F984500E5D7h
                                push 00000006h
                                mov dword ptr [007A2F44h], eax
                                call 00007F984500E5CBh
                                cmp eax, ebx
                                je 00007F984500B531h
                                push 0000001Eh
                                call eax
                                test eax, eax
                                je 00007F984500B529h
                                or byte ptr [007A2F4Fh], 00000040h
                                push ebp
                                call dword ptr [00408044h]
                                push ebx
                                call dword ptr [00408288h]
                                mov dword ptr [007A3018h], eax
                                push ebx
                                lea eax, dword ptr [esp+38h]
                                push 00000160h
                                push eax
                                push ebx
                                push 0079E500h
                                call dword ptr [00408178h]
                                push 0040A188h
                                Programming Language:
                                • [EXP] VC++ 6.0 SP5 build 8804
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x84280xa0.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x3ba0000x28ba0.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x667180x2298.data
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x80000x298.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x60680x6200d8abde42f5dea44b041d044ac6658045False0.6719547193877551data6.450720011496026IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rdata0x80000x12480x140034765c826af6bd742ec098b21c19a239False0.4287109375data5.0453837222906515IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0xa0000x3990580x400f95027c0eac5eb0bf708aa96757ff20dunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .ndata0x3a40000x160000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0x3ba0000x28ba00x28c0027041a317e8d97b32ebc682da7a7ddddFalse0.48665763995398775data5.215384005059982IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_BITMAP0x3ba4000x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States0.23623853211009174
                                RT_ICON0x3ba7680x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.46483496983319533
                                RT_ICON0x3caf900x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States0.49466575572840027
                                RT_ICON0x3d44380x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736EnglishUnited States0.5185767097966728
                                RT_ICON0x3d98c00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.5306447803495512
                                RT_ICON0x3ddae80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.5595435684647303
                                RT_ICON0x3e00900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.6123358348968105
                                RT_ICON0x3e11380x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States0.6635245901639344
                                RT_ICON0x3e1ac00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.7322695035460993
                                RT_DIALOG0x3e1f280x144dataEnglishUnited States0.5216049382716049
                                RT_DIALOG0x3e20700x13cdataEnglishUnited States0.5506329113924051
                                RT_DIALOG0x3e21b00x100dataEnglishUnited States0.5234375
                                RT_DIALOG0x3e22b00x11cdataEnglishUnited States0.6056338028169014
                                RT_DIALOG0x3e23d00xc4dataEnglishUnited States0.5918367346938775
                                RT_DIALOG0x3e24980x60dataEnglishUnited States0.7291666666666666
                                RT_GROUP_ICON0x3e24f80x76dataEnglishUnited States0.7542372881355932
                                RT_VERSION0x3e25700x2ecdataEnglishUnited States0.49064171122994654
                                RT_MANIFEST0x3e28600x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                DLLImport
                                KERNEL32.dllGetTempPathA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, Sleep, GetTickCount, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GetWindowsDirectoryA, SetCurrentDirectoryA, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, CompareFileTime, SetFileAttributesA, GetFileAttributesA, GetShortPathNameA, MoveFileA, GetFullPathNameA, SetFileTime, SearchPathA, CloseHandle, lstrcmpiA, CreateThread, GlobalLock, lstrcmpA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GlobalAlloc, GlobalFree, ExpandEnvironmentStringsA
                                USER32.dllScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA
                                GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA
                                ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExA, RegOpenKeyExA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, RegEnumValueA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                                COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States
                                TimestampSource PortDest PortSource IPDest IP
                                Nov 12, 2024 07:46:31.813884974 CET4977180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:46:32.825601101 CET4977180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:46:34.840802908 CET4977180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:46:36.841752052 CET4977280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:46:37.855684996 CET4977280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:46:39.870889902 CET4977280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:46:41.871551037 CET4977380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:46:42.886004925 CET4977380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:46:44.901088953 CET4977380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:46:46.903424978 CET4977480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:46:47.915951014 CET4977480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:46:49.931159019 CET4977480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:46:51.931796074 CET4977580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:46:52.946177959 CET4977580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:46:54.961329937 CET4977580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:46:56.962045908 CET4977680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:46:57.976381063 CET4977680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:46:59.991518974 CET4977680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:01.993138075 CET4977780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:03.006520987 CET4977780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:05.021667957 CET4977780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:07.022161961 CET4977880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:08.036545038 CET4977880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:10.036361933 CET4977880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:12.052727938 CET4977980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:13.066706896 CET4977980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:15.081945896 CET4977980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:17.083412886 CET4978080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:18.097228050 CET4978080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:20.112085104 CET4978080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:22.112588882 CET4978180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:23.127031088 CET4978180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:25.142388105 CET4978180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:27.142704010 CET4978280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:28.157274961 CET4978280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:30.172401905 CET4978280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:32.173990011 CET4978380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:33.187381983 CET4978380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:35.202568054 CET4978380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:37.203046083 CET4978480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:38.217606068 CET4978480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:40.232743025 CET4978480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:42.233136892 CET4978580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:43.247757912 CET4978580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:45.262877941 CET4978580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:47.264314890 CET4978680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:48.277853966 CET4978680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:50.293070078 CET4978680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:52.293634892 CET4978780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:53.308001995 CET4978780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:55.323138952 CET4978780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:57.323601007 CET4978880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:47:58.338033915 CET4978880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:00.353275061 CET4978880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:02.354697943 CET4978980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:03.368213892 CET4978980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:05.383574963 CET4978980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:07.383991957 CET4979080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:08.403860092 CET4979080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:10.418471098 CET4979080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:12.416068077 CET4979180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:13.428548098 CET4979180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:15.443753004 CET4979180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:17.445575953 CET4979280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:18.458686113 CET4979280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:20.458298922 CET4979280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:22.474482059 CET4979380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:23.488806963 CET4979380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:25.504061937 CET4979380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:27.504486084 CET4979480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:28.519069910 CET4979480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:30.534225941 CET4979480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:32.535689116 CET4979580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:33.549237967 CET4979580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:35.564373016 CET4979580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:37.564846039 CET4979680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:38.579277992 CET4979680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:40.594527960 CET4979680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:42.595015049 CET4979780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:43.609409094 CET4979780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:45.624686003 CET4979780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:47.626418114 CET4979880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:48.639559984 CET4979880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:50.654794931 CET4979880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:52.655217886 CET4979980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:53.669747114 CET4979980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:55.684981108 CET4979980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:57.685513973 CET4980080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:48:58.699908972 CET4980080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:00.715109110 CET4980080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:02.717036963 CET4980180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:03.730062008 CET4980180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:05.745191097 CET4980180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:07.745795012 CET4980280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:08.760166883 CET4980280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:10.775471926 CET4980280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:12.775911093 CET4980380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:13.790355921 CET4980380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:15.805610895 CET4980380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:17.760344982 CET4980480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:18.773627996 CET4980480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:20.788916111 CET4980480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:22.711931944 CET4980580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:23.725682974 CET4980580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:25.740845919 CET4980580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:27.631923914 CET4980680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:28.646513939 CET4980680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:30.661662102 CET4980680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:32.523431063 CET4980780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:33.536063910 CET4980780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:35.551233053 CET4980780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:37.395610094 CET4980880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:38.409970045 CET4980880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:40.425184011 CET4980880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:42.238349915 CET4980980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:43.252640963 CET4980980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:45.267813921 CET4980980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:47.050571918 CET4981080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:48.064050913 CET4981080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:50.079262018 CET4981080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:51.829849005 CET4981180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:52.844289064 CET4981180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:54.859471083 CET4981180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:56.594556093 CET4981280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:57.608891010 CET4981280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:49:59.624139071 CET4981280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:01.328999996 CET4981380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:02.342195034 CET4981380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:04.357429981 CET4981380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:06.045536041 CET4981480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:07.060017109 CET4981480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:09.075078964 CET4981480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:10.732023001 CET4981580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:11.746419907 CET4981580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:13.761620045 CET4981580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:15.404117107 CET4981680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:16.417306900 CET4981680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:18.432429075 CET4981680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:20.042335987 CET4981780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:21.056941986 CET4981780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:23.072073936 CET4981780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:24.666501045 CET4981880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:25.680828094 CET4981880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:27.696014881 CET4981880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:29.276241064 CET4981980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:30.289223909 CET4981980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:32.304375887 CET4981980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:33.867738008 CET4982080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:34.882189035 CET4982080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:36.897226095 CET4982080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:38.429079056 CET4982180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:39.443531036 CET4982180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:41.458759069 CET4982180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:42.975991011 CET4982280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:43.989343882 CET4982280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:46.004614115 CET4982280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:47.505135059 CET4982380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:48.519680977 CET4982380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:50.534825087 CET4982380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:52.020091057 CET4982480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:53.034288883 CET4982480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:55.049427986 CET4982480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:56.520312071 CET4982580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:57.533292055 CET4982580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:50:59.548443079 CET4982580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:01.002593040 CET4982680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:02.016733885 CET4982680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:04.031877995 CET4982680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:05.470443010 CET4982780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:06.484462023 CET4982780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:08.499631882 CET4982780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:09.923949003 CET4982880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:10.936580896 CET4982880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:12.936178923 CET4982880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:14.358625889 CET4982980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:15.373136997 CET4982980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:17.388298988 CET4982980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:18.779735088 CET4983080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:19.794085979 CET4983080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:21.809180021 CET4983080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:23.186446905 CET4983180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:24.199369907 CET4983180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:26.214534044 CET4983180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:27.574533939 CET4983280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:28.588974953 CET4983280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:30.604151011 CET4983280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:31.964572906 CET4983380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:32.978627920 CET4983380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:34.993856907 CET4983380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:36.339900017 CET4983480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:37.352801085 CET4983480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:39.367860079 CET4983480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:40.696667910 CET4983580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:41.711119890 CET4983580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:43.726279020 CET4983580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:45.039436102 CET4983680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:46.053900003 CET4983680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:48.069133997 CET4983680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:49.383955002 CET4983780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:50.396701097 CET4983780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:52.411854982 CET4983780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:53.709378004 CET4983880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:54.723903894 CET4983880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:56.739130974 CET4983880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:58.021920919 CET4983980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:51:59.035470963 CET4983980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:01.050661087 CET4983980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:02.334306002 CET4984080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:03.346963882 CET4984080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:05.362121105 CET4984080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:06.646524906 CET4984180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:07.658581018 CET4984180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:09.673831940 CET4984180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:10.940017939 CET4984280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:11.954483032 CET4984280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:13.969707966 CET4984280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:15.221719027 CET4984380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:16.234884977 CET4984380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:18.250047922 CET4984380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:19.485116959 CET4984480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:20.499525070 CET4984480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:22.514688015 CET4984480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:23.749953985 CET4984580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:24.764235020 CET4984580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:26.779424906 CET4984580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:27.999754906 CET4984680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:29.013286114 CET4984680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:31.028503895 CET4984680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:32.247812986 CET4984780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:33.262316942 CET4984780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:35.277527094 CET4984780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:36.481446981 CET4984880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:37.495835066 CET4984880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:39.510921001 CET4984880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:40.715790033 CET4984980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:41.729195118 CET4984980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:43.744431019 CET4984980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:44.948153973 CET4985080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:45.962697983 CET4985080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:47.977920055 CET4985080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:49.165956020 CET4985180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:50.180588961 CET4985180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:52.195705891 CET4985180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:53.385152102 CET4985280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:54.398382902 CET4985280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:56.413538933 CET4985280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:57.586050987 CET4985380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:52:58.600548029 CET4985380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:00.615925074 CET4985380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:01.788361073 CET4985480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:02.802771091 CET4985480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:04.817948103 CET4985480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:05.975848913 CET4985580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:06.989294052 CET4985580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:08.988886118 CET4985580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:10.161475897 CET4985680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:11.175926924 CET4985680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:13.191108942 CET4985680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:14.348170042 CET4985780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:15.362596989 CET4985780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:17.377780914 CET4985780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:18.519992113 CET4985880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:19.533493996 CET4985880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:21.548666000 CET4985880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:22.690397024 CET4985980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:23.704449892 CET4985980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:25.719672918 CET4985980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:26.860938072 CET4986080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:27.875457048 CET4986080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:29.890554905 CET4986080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:31.017956018 CET4986180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:32.030814886 CET4986180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:34.045912981 CET4986180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:35.171555042 CET4986280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:36.186096907 CET4986280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:38.201267958 CET4986280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:39.327049017 CET4986380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:40.341432095 CET4986380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:42.356635094 CET4986380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:43.483894110 CET4986480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:44.496742964 CET4986480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:46.512027025 CET4986480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:47.622112036 CET4986580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:48.636523008 CET4986580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:50.651702881 CET4986580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:51.762130022 CET4986680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:52.776166916 CET4986680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:54.775780916 CET4986680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:55.902782917 CET4986780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:56.915921926 CET4986780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:53:58.931099892 CET4986780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:00.041445017 CET4986880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:01.055666924 CET4986880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:03.070822954 CET4986880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:04.165292025 CET4986980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:05.179734945 CET4986980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:07.194916010 CET4986980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:08.290481091 CET4987080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:09.303853035 CET4987080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:11.319004059 CET4987080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:12.414053917 CET4987180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:13.427906990 CET4987180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:15.443169117 CET4987180192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:16.537637949 CET4987280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:17.552087069 CET4987280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:19.567183971 CET4987280192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:20.647027969 CET4987380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:21.660491943 CET4987380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:23.675729990 CET4987380192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:24.754468918 CET4987480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:25.769006968 CET4987480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:27.784204006 CET4987480192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:28.862899065 CET4987580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:29.877490044 CET4987580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:31.892751932 CET4987580192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:32.972428083 CET4987680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:33.985996962 CET4987680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:36.001092911 CET4987680192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:37.079864979 CET4987780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:38.094419003 CET4987780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:40.109582901 CET4987780192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:41.188379049 CET4987880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:42.202927113 CET4987880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:44.218085051 CET4987880192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:45.282188892 CET4987980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:46.295767069 CET4987980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:48.310964108 CET4987980192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:49.374147892 CET4988080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:50.388585091 CET4988080192.168.11.2045.137.22.248
                                Nov 12, 2024 07:54:52.403764963 CET4988080192.168.11.2045.137.22.248

                                Click to jump to process

                                Click to jump to process

                                Click to jump to process

                                Target ID:0
                                Start time:01:46:22
                                Start date:12/11/2024
                                Path:C:\Users\user\Desktop\Calyciform.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\Calyciform.exe"
                                Imagebase:0x400000
                                File size:428'464 bytes
                                MD5 hash:0B813C3349387A69277D7F8A0D20FE3D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.130225753929.0000000002FAF000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:true

                                Target ID:2
                                Start time:01:46:26
                                Start date:12/11/2024
                                Path:C:\Users\user\Desktop\Calyciform.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\Calyciform.exe"
                                Imagebase:0x400000
                                File size:428'464 bytes
                                MD5 hash:0B813C3349387A69277D7F8A0D20FE3D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.134606321221.000000000174F000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:false

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:20.9%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:20.2%
                                  Total number of Nodes:1510
                                  Total number of Limit Nodes:50
                                  execution_graph 4972 402340 4973 402acb 17 API calls 4972->4973 4974 402351 4973->4974 4975 402acb 17 API calls 4974->4975 4976 40235a 4975->4976 4977 402acb 17 API calls 4976->4977 4978 402364 GetPrivateProfileStringA 4977->4978 4979 401d41 GetDlgItem GetClientRect 4980 402acb 17 API calls 4979->4980 4981 401d71 LoadImageA SendMessageA 4980->4981 4982 402957 4981->4982 4983 401d8f DeleteObject 4981->4983 4983->4982 4301 401746 4302 402acb 17 API calls 4301->4302 4303 40174d 4302->4303 4307 405b45 4303->4307 4305 401754 4306 405b45 2 API calls 4305->4306 4306->4305 4308 405b50 GetTickCount GetTempFileNameA 4307->4308 4309 405b81 4308->4309 4310 405b7d 4308->4310 4309->4305 4310->4308 4310->4309 4984 401947 4985 402acb 17 API calls 4984->4985 4986 40194e lstrlenA 4985->4986 4987 40257d 4986->4987 4311 403b48 4312 403b60 4311->4312 4313 403c9b 4311->4313 4312->4313 4314 403b6c 4312->4314 4315 403cec 4313->4315 4316 403cac GetDlgItem GetDlgItem 4313->4316 4319 403b77 SetWindowPos 4314->4319 4320 403b8a 4314->4320 4318 403d46 4315->4318 4328 401389 2 API calls 4315->4328 4317 40401c 18 API calls 4316->4317 4323 403cd6 SetClassLongA 4317->4323 4343 403c96 4318->4343 4383 404068 4318->4383 4319->4320 4321 403ba7 4320->4321 4322 403b8f ShowWindow 4320->4322 4325 403bc9 4321->4325 4326 403baf DestroyWindow 4321->4326 4322->4321 4327 40140b 2 API calls 4323->4327 4330 403bce SetWindowLongA 4325->4330 4331 403bdf 4325->4331 4329 403fc6 4326->4329 4327->4315 4332 403d1e 4328->4332 4338 403fd6 ShowWindow 4329->4338 4329->4343 4330->4343 4334 403c88 4331->4334 4335 403beb GetDlgItem 4331->4335 4332->4318 4336 403d22 SendMessageA 4332->4336 4333 403fa7 DestroyWindow EndDialog 4333->4329 4341 404083 8 API calls 4334->4341 4339 403c1b 4335->4339 4340 403bfe SendMessageA IsWindowEnabled 4335->4340 4336->4343 4337 40140b 2 API calls 4350 403d58 4337->4350 4338->4343 4344 403c28 4339->4344 4347 403c6f SendMessageA 4339->4347 4348 403c3b 4339->4348 4355 403c20 4339->4355 4340->4339 4340->4343 4341->4343 4342 405f9f 17 API calls 4342->4350 4344->4347 4344->4355 4346 40401c 18 API calls 4346->4350 4347->4334 4351 403c43 4348->4351 4352 403c58 4348->4352 4349 403c56 4349->4334 4350->4333 4350->4337 4350->4342 4350->4343 4350->4346 4357 40401c 18 API calls 4350->4357 4373 403ee7 DestroyWindow 4350->4373 4353 40140b 2 API calls 4351->4353 4354 40140b 2 API calls 4352->4354 4353->4355 4356 403c5f 4354->4356 4392 403ff5 4355->4392 4356->4334 4356->4355 4358 403dd3 GetDlgItem 4357->4358 4359 403df0 ShowWindow KiUserCallbackDispatcher 4358->4359 4360 403de8 4358->4360 4386 40403e EnableWindow 4359->4386 4360->4359 4362 403e1a EnableWindow 4363 403e2e 4362->4363 4364 403e33 GetSystemMenu EnableMenuItem SendMessageA 4363->4364 4387 404051 SendMessageA 4363->4387 4388 403b29 4363->4388 4391 405f7d lstrcpynA 4363->4391 4364->4363 4365 403e63 SendMessageA 4364->4365 4365->4363 4369 403e92 lstrlenA 4370 405f9f 17 API calls 4369->4370 4371 403ea3 SetWindowTextA 4370->4371 4372 401389 2 API calls 4371->4372 4372->4350 4373->4329 4374 403f01 CreateDialogParamA 4373->4374 4374->4329 4375 403f34 4374->4375 4376 40401c 18 API calls 4375->4376 4377 403f3f GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4376->4377 4378 401389 2 API calls 4377->4378 4379 403f85 4378->4379 4379->4343 4380 403f8d ShowWindow 4379->4380 4381 404068 SendMessageA 4380->4381 4382 403fa5 4381->4382 4382->4329 4384 404080 4383->4384 4385 404071 SendMessageA 4383->4385 4384->4350 4385->4384 4386->4362 4387->4363 4389 405f9f 17 API calls 4388->4389 4390 403b37 SetWindowTextA 4389->4390 4390->4363 4391->4369 4393 404002 SendMessageA 4392->4393 4394 403ffc 4392->4394 4393->4349 4394->4393 4813 4025ca 4814 402aa9 17 API calls 4813->4814 4820 4025d4 4814->4820 4815 402642 4816 405b8e ReadFile 4816->4820 4817 402644 4822 405edb wsprintfA 4817->4822 4819 402654 4819->4815 4821 40266a SetFilePointer 4819->4821 4820->4815 4820->4816 4820->4817 4820->4819 4821->4815 4822->4815 4991 6d6a10e0 5000 6d6a110e 4991->5000 4992 6d6a11c4 GlobalFree 4993 6d6a12ad 2 API calls 4993->5000 4994 6d6a11c3 4994->4992 4995 6d6a1266 2 API calls 4998 6d6a11b1 GlobalFree 4995->4998 4996 6d6a1155 GlobalAlloc 4996->5000 4997 6d6a11ea GlobalFree 4997->5000 4998->5000 4999 6d6a12d1 lstrcpyA 4999->5000 5000->4992 5000->4993 5000->4994 5000->4995 5000->4996 5000->4997 5000->4998 5000->4999 5001 40224b 5002 402acb 17 API calls 5001->5002 5003 402251 5002->5003 5004 402acb 17 API calls 5003->5004 5005 40225a 5004->5005 5006 402acb 17 API calls 5005->5006 5007 402263 5006->5007 5008 406280 2 API calls 5007->5008 5009 40226c 5008->5009 5010 402270 5009->5010 5011 40227d lstrlenA lstrlenA 5009->5011 5012 4050a4 24 API calls 5010->5012 5013 4050a4 24 API calls 5011->5013 5015 402278 5012->5015 5014 4022b9 SHFileOperationA 5013->5014 5014->5010 5014->5015 5016 4028cb 5017 402aa9 17 API calls 5016->5017 5018 4028d1 5017->5018 5019 402906 5018->5019 5020 40271c 5018->5020 5022 4028e3 5018->5022 5019->5020 5021 405f9f 17 API calls 5019->5021 5021->5020 5022->5020 5024 405edb wsprintfA 5022->5024 5024->5020 5025 4022cd 5026 4022d4 5025->5026 5029 4022e7 5025->5029 5027 405f9f 17 API calls 5026->5027 5028 4022e1 5027->5028 5030 405699 MessageBoxIndirectA 5028->5030 5030->5029 4831 6d6a28e5 4832 6d6a2935 4831->4832 4833 6d6a28f5 VirtualProtect 4831->4833 4833->4832 5031 4020d1 5032 402acb 17 API calls 5031->5032 5033 4020d8 5032->5033 5034 402acb 17 API calls 5033->5034 5035 4020e2 5034->5035 5036 402acb 17 API calls 5035->5036 5037 4020ec 5036->5037 5038 402acb 17 API calls 5037->5038 5039 4020f6 5038->5039 5040 402acb 17 API calls 5039->5040 5042 402100 5040->5042 5041 402142 CoCreateInstance 5046 402161 5041->5046 5048 40220c 5041->5048 5042->5041 5043 402acb 17 API calls 5042->5043 5043->5041 5044 401423 24 API calls 5045 402242 5044->5045 5047 4021ec MultiByteToWideChar 5046->5047 5046->5048 5047->5048 5048->5044 5048->5045 5049 404152 lstrcpynA lstrlenA 5050 4026d4 5051 4026da 5050->5051 5052 4026de FindNextFileA 5051->5052 5054 4026f0 5051->5054 5053 40272f 5052->5053 5052->5054 5056 405f7d lstrcpynA 5053->5056 5056->5054 4852 4023d6 4853 402acb 17 API calls 4852->4853 4854 4023e8 4853->4854 4855 402acb 17 API calls 4854->4855 4856 4023f2 4855->4856 4869 402b5b 4856->4869 4859 40271c 4860 402427 4861 402433 4860->4861 4863 402aa9 17 API calls 4860->4863 4864 402452 RegSetValueExA 4861->4864 4866 402f9c 31 API calls 4861->4866 4862 402acb 17 API calls 4865 402420 lstrlenA 4862->4865 4863->4861 4867 402468 RegCloseKey 4864->4867 4865->4860 4866->4864 4867->4859 4870 402b76 4869->4870 4873 405e31 4870->4873 4874 405e40 4873->4874 4875 402402 4874->4875 4876 405e4b RegCreateKeyExA 4874->4876 4875->4859 4875->4860 4875->4862 4876->4875 5057 4014d6 5058 402aa9 17 API calls 5057->5058 5059 4014dc Sleep 5058->5059 5061 402957 5059->5061 4891 401759 4892 402acb 17 API calls 4891->4892 4893 401760 4892->4893 4894 401786 4893->4894 4895 40177e 4893->4895 4931 405f7d lstrcpynA 4894->4931 4930 405f7d lstrcpynA 4895->4930 4898 401784 4902 4061e7 5 API calls 4898->4902 4899 401791 4900 405915 3 API calls 4899->4900 4901 401797 lstrcatA 4900->4901 4901->4898 4917 4017a3 4902->4917 4903 406280 2 API calls 4903->4917 4904 405af1 2 API calls 4904->4917 4906 4017ba CompareFileTime 4906->4917 4907 40187e 4908 4050a4 24 API calls 4907->4908 4911 401888 4908->4911 4909 4050a4 24 API calls 4919 40186a 4909->4919 4910 405f7d lstrcpynA 4910->4917 4912 402f9c 31 API calls 4911->4912 4913 40189b 4912->4913 4914 4018af SetFileTime 4913->4914 4915 4018c1 CloseHandle 4913->4915 4914->4915 4918 4018d2 4915->4918 4915->4919 4916 405f9f 17 API calls 4916->4917 4917->4903 4917->4904 4917->4906 4917->4907 4917->4910 4917->4916 4924 405699 MessageBoxIndirectA 4917->4924 4928 401855 4917->4928 4929 405b16 GetFileAttributesA CreateFileA 4917->4929 4920 4018d7 4918->4920 4921 4018ea 4918->4921 4922 405f9f 17 API calls 4920->4922 4923 405f9f 17 API calls 4921->4923 4925 4018df lstrcatA 4922->4925 4926 4018f2 4923->4926 4924->4917 4925->4926 4927 405699 MessageBoxIndirectA 4926->4927 4927->4919 4928->4909 4928->4919 4929->4917 4930->4898 4931->4899 5062 401659 5063 402acb 17 API calls 5062->5063 5064 40165f 5063->5064 5065 406280 2 API calls 5064->5065 5066 401665 5065->5066 5067 401959 5068 402aa9 17 API calls 5067->5068 5069 401960 5068->5069 5070 402aa9 17 API calls 5069->5070 5071 40196d 5070->5071 5072 402acb 17 API calls 5071->5072 5073 401984 lstrlenA 5072->5073 5075 401994 5073->5075 5074 4019d4 5075->5074 5079 405f7d lstrcpynA 5075->5079 5077 4019c4 5077->5074 5078 4019c9 lstrlenA 5077->5078 5078->5074 5079->5077 5080 401cda 5081 402aa9 17 API calls 5080->5081 5082 401ce0 IsWindow 5081->5082 5083 401a0e 5082->5083 5084 401a5e 5085 402aa9 17 API calls 5084->5085 5086 401a67 5085->5086 5087 402aa9 17 API calls 5086->5087 5088 401a0e 5087->5088 5089 401f61 5090 402acb 17 API calls 5089->5090 5091 401f68 5090->5091 5092 406315 5 API calls 5091->5092 5093 401f77 5092->5093 5094 401f8f GlobalAlloc 5093->5094 5096 401ff7 5093->5096 5095 401fa3 5094->5095 5094->5096 5097 406315 5 API calls 5095->5097 5098 401faa 5097->5098 5099 406315 5 API calls 5098->5099 5100 401fb4 5099->5100 5100->5096 5104 405edb wsprintfA 5100->5104 5102 401feb 5105 405edb wsprintfA 5102->5105 5104->5102 5105->5096 5106 402561 5107 402acb 17 API calls 5106->5107 5108 402568 5107->5108 5111 405b16 GetFileAttributesA CreateFileA 5108->5111 5110 402574 5111->5110 5112 4051e2 5113 405204 GetDlgItem GetDlgItem GetDlgItem 5112->5113 5114 40538d 5112->5114 5157 404051 SendMessageA 5113->5157 5116 405395 GetDlgItem CreateThread CloseHandle 5114->5116 5117 4053bd 5114->5117 5116->5117 5119 4053eb 5117->5119 5120 4053d3 ShowWindow ShowWindow 5117->5120 5121 40540c 5117->5121 5118 405274 5124 40527b GetClientRect GetSystemMetrics SendMessageA SendMessageA 5118->5124 5122 405446 5119->5122 5126 4053fb 5119->5126 5127 40541f ShowWindow 5119->5127 5159 404051 SendMessageA 5120->5159 5123 404083 8 API calls 5121->5123 5122->5121 5133 405453 SendMessageA 5122->5133 5128 405418 5123->5128 5131 4052e9 5124->5131 5132 4052cd SendMessageA SendMessageA 5124->5132 5134 403ff5 SendMessageA 5126->5134 5129 405431 5127->5129 5130 40543f 5127->5130 5135 4050a4 24 API calls 5129->5135 5136 403ff5 SendMessageA 5130->5136 5137 4052fc 5131->5137 5138 4052ee SendMessageA 5131->5138 5132->5131 5133->5128 5139 40546c CreatePopupMenu 5133->5139 5134->5121 5135->5130 5136->5122 5141 40401c 18 API calls 5137->5141 5138->5137 5140 405f9f 17 API calls 5139->5140 5142 40547c AppendMenuA 5140->5142 5143 40530c 5141->5143 5144 40549a GetWindowRect 5142->5144 5145 4054ad TrackPopupMenu 5142->5145 5146 405315 ShowWindow 5143->5146 5147 405349 GetDlgItem SendMessageA 5143->5147 5144->5145 5145->5128 5148 4054c9 5145->5148 5149 405338 5146->5149 5150 40532b ShowWindow 5146->5150 5147->5128 5151 405370 SendMessageA SendMessageA 5147->5151 5152 4054e8 SendMessageA 5148->5152 5158 404051 SendMessageA 5149->5158 5150->5149 5151->5128 5152->5152 5153 405505 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5152->5153 5155 405527 SendMessageA 5153->5155 5155->5155 5156 405549 GlobalUnlock SetClipboardData CloseClipboard 5155->5156 5156->5128 5157->5118 5158->5147 5159->5119 5160 401563 5161 401596 ShowWindow 5160->5161 5162 401567 5160->5162 5161->5162 5163 402904 5161->5163 5165 405edb wsprintfA 5162->5165 5165->5163 5166 401b63 5167 401bb4 5166->5167 5171 401b70 5166->5171 5168 401bb8 5167->5168 5169 401bdd GlobalAlloc 5167->5169 5181 4022e7 5168->5181 5187 405f7d lstrcpynA 5168->5187 5170 405f9f 17 API calls 5169->5170 5174 401bf8 5170->5174 5171->5174 5175 401b87 5171->5175 5172 405f9f 17 API calls 5173 4022e1 5172->5173 5179 405699 MessageBoxIndirectA 5173->5179 5174->5172 5174->5181 5185 405f7d lstrcpynA 5175->5185 5178 401bca GlobalFree 5178->5181 5179->5181 5180 401b96 5186 405f7d lstrcpynA 5180->5186 5183 401ba5 5188 405f7d lstrcpynA 5183->5188 5185->5180 5186->5183 5187->5178 5188->5181 4287 4024e5 4288 402b0b 17 API calls 4287->4288 4289 4024ef 4288->4289 4298 402aa9 4289->4298 4291 4024f8 4292 40271c 4291->4292 4293 402513 RegEnumKeyA 4291->4293 4294 40251f RegEnumValueA 4291->4294 4295 40253b RegCloseKey 4293->4295 4294->4295 4296 402534 4294->4296 4295->4292 4296->4295 4299 405f9f 17 API calls 4298->4299 4300 402abe 4299->4300 4300->4291 5189 404467 5190 404477 5189->5190 5191 40449d 5189->5191 5192 40401c 18 API calls 5190->5192 5193 404083 8 API calls 5191->5193 5194 404484 SetDlgItemTextA 5192->5194 5195 4044a9 5193->5195 5194->5191 4404 4031e9 SetErrorMode GetVersion 4405 40322a 4404->4405 4406 403230 4404->4406 4407 406315 5 API calls 4405->4407 4408 4062a7 3 API calls 4406->4408 4407->4406 4409 403246 lstrlenA 4408->4409 4409->4406 4410 403255 4409->4410 4411 406315 5 API calls 4410->4411 4412 40325c 4411->4412 4413 406315 5 API calls 4412->4413 4414 403263 4413->4414 4415 406315 5 API calls 4414->4415 4416 40326f #17 OleInitialize SHGetFileInfoA 4415->4416 4494 405f7d lstrcpynA 4416->4494 4419 4032bb GetCommandLineA 4495 405f7d lstrcpynA 4419->4495 4421 4032cd 4422 405940 CharNextA 4421->4422 4423 4032f6 CharNextA 4422->4423 4432 403306 4423->4432 4424 4033d0 4425 4033e3 GetTempPathA 4424->4425 4496 4031b8 4425->4496 4427 4033fb 4429 403455 DeleteFileA 4427->4429 4430 4033ff GetWindowsDirectoryA lstrcatA 4427->4430 4428 405940 CharNextA 4428->4432 4506 402d63 GetTickCount GetModuleFileNameA 4429->4506 4433 4031b8 12 API calls 4430->4433 4432->4424 4432->4428 4434 4033d2 4432->4434 4436 40341b 4433->4436 4590 405f7d lstrcpynA 4434->4590 4435 403469 4439 4034ef 4435->4439 4444 405940 CharNextA 4435->4444 4489 4034ff 4435->4489 4436->4429 4438 40341f GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4436->4438 4441 4031b8 12 API calls 4438->4441 4534 4037ab 4439->4534 4442 40344d 4441->4442 4442->4429 4442->4489 4446 403484 4444->4446 4455 4034ca 4446->4455 4456 40352f 4446->4456 4447 403637 4450 4036b9 ExitProcess 4447->4450 4451 40363f GetCurrentProcess OpenProcessToken 4447->4451 4448 403519 4614 405699 4448->4614 4452 40368a 4451->4452 4453 40365a LookupPrivilegeValueA AdjustTokenPrivileges 4451->4453 4458 406315 5 API calls 4452->4458 4453->4452 4591 405a03 4455->4591 4618 405604 4456->4618 4461 403691 4458->4461 4466 4036a6 ExitWindowsEx 4461->4466 4469 4036b2 4461->4469 4464 403550 lstrcatA lstrcmpiA 4468 40356c 4464->4468 4464->4489 4465 403545 lstrcatA 4465->4464 4466->4450 4466->4469 4471 403571 4468->4471 4472 403578 4468->4472 4473 40140b 2 API calls 4469->4473 4470 4034e4 4606 405f7d lstrcpynA 4470->4606 4621 40556a CreateDirectoryA 4471->4621 4626 4055e7 CreateDirectoryA 4472->4626 4473->4450 4478 40357d SetCurrentDirectoryA 4479 403597 4478->4479 4480 40358c 4478->4480 4630 405f7d lstrcpynA 4479->4630 4629 405f7d lstrcpynA 4480->4629 4483 405f9f 17 API calls 4484 4035d6 DeleteFileA 4483->4484 4485 4035e3 CopyFileA 4484->4485 4491 4035a5 4484->4491 4485->4491 4486 40362b 4488 405d5c 36 API calls 4486->4488 4488->4489 4607 4036d1 4489->4607 4490 405f9f 17 API calls 4490->4491 4491->4483 4491->4486 4491->4490 4493 403617 CloseHandle 4491->4493 4631 405d5c MoveFileExA 4491->4631 4635 40561c CreateProcessA 4491->4635 4493->4491 4494->4419 4495->4421 4497 4061e7 5 API calls 4496->4497 4498 4031c4 4497->4498 4499 4031ce 4498->4499 4638 405915 lstrlenA CharPrevA 4498->4638 4499->4427 4502 4055e7 2 API calls 4503 4031dc 4502->4503 4504 405b45 2 API calls 4503->4504 4505 4031e7 4504->4505 4505->4427 4641 405b16 GetFileAttributesA CreateFileA 4506->4641 4508 402da3 4526 402db3 4508->4526 4642 405f7d lstrcpynA 4508->4642 4510 402dc9 4643 40595c lstrlenA 4510->4643 4514 402dda GetFileSize 4515 402ed6 4514->4515 4528 402df1 4514->4528 4648 402cff 4515->4648 4517 402edf 4519 402f0f GlobalAlloc 4517->4519 4517->4526 4683 4031a1 SetFilePointer 4517->4683 4659 4031a1 SetFilePointer 4519->4659 4521 402f42 4523 402cff 6 API calls 4521->4523 4523->4526 4524 402ef8 4527 40318b ReadFile 4524->4527 4525 402f2a 4660 402f9c 4525->4660 4526->4435 4530 402f03 4527->4530 4528->4515 4528->4521 4528->4526 4531 402cff 6 API calls 4528->4531 4680 40318b 4528->4680 4530->4519 4530->4526 4531->4528 4532 402f36 4532->4526 4532->4532 4533 402f73 SetFilePointer 4532->4533 4533->4526 4535 406315 5 API calls 4534->4535 4536 4037bf 4535->4536 4537 4037c5 4536->4537 4538 4037d7 4536->4538 4701 405edb wsprintfA 4537->4701 4539 405e64 3 API calls 4538->4539 4540 403802 4539->4540 4541 403820 lstrcatA 4540->4541 4544 405e64 3 API calls 4540->4544 4543 4037d5 4541->4543 4693 403a70 4543->4693 4544->4541 4547 405a03 18 API calls 4548 403852 4547->4548 4549 4038db 4548->4549 4552 405e64 3 API calls 4548->4552 4550 405a03 18 API calls 4549->4550 4551 4038e1 4550->4551 4553 4038f1 LoadImageA 4551->4553 4554 405f9f 17 API calls 4551->4554 4558 40387e 4552->4558 4555 403997 4553->4555 4556 403918 RegisterClassA 4553->4556 4554->4553 4560 40140b 2 API calls 4555->4560 4559 40394e SystemParametersInfoA CreateWindowExA 4556->4559 4589 4039a1 4556->4589 4557 40389a lstrlenA 4562 4038a8 lstrcmpiA 4557->4562 4563 4038ce 4557->4563 4558->4549 4558->4557 4561 405940 CharNextA 4558->4561 4559->4555 4564 40399d 4560->4564 4565 403898 4561->4565 4562->4563 4566 4038b8 GetFileAttributesA 4562->4566 4567 405915 3 API calls 4563->4567 4569 403a70 18 API calls 4564->4569 4564->4589 4565->4557 4568 4038c4 4566->4568 4570 4038d4 4567->4570 4568->4563 4571 40595c 2 API calls 4568->4571 4572 4039ae 4569->4572 4702 405f7d lstrcpynA 4570->4702 4571->4563 4574 4039ba ShowWindow 4572->4574 4575 403a3d 4572->4575 4577 4062a7 3 API calls 4574->4577 4703 405176 OleInitialize 4575->4703 4579 4039d2 4577->4579 4578 403a43 4581 403a47 4578->4581 4582 403a5f 4578->4582 4580 4039e0 GetClassInfoA 4579->4580 4583 4062a7 3 API calls 4579->4583 4585 4039f4 GetClassInfoA RegisterClassA 4580->4585 4586 403a0a DialogBoxParamA 4580->4586 4588 40140b 2 API calls 4581->4588 4581->4589 4584 40140b 2 API calls 4582->4584 4583->4580 4584->4589 4585->4586 4587 40140b 2 API calls 4586->4587 4587->4589 4588->4589 4589->4489 4590->4425 4711 405f7d lstrcpynA 4591->4711 4593 405a14 4712 4059ae CharNextA CharNextA 4593->4712 4595 4034d5 4595->4489 4605 405f7d lstrcpynA 4595->4605 4597 4061e7 5 API calls 4603 405a2a 4597->4603 4598 405a55 lstrlenA 4599 405a60 4598->4599 4598->4603 4600 405915 3 API calls 4599->4600 4602 405a65 GetFileAttributesA 4600->4602 4602->4595 4603->4595 4603->4598 4604 40595c 2 API calls 4603->4604 4718 406280 FindFirstFileA 4603->4718 4604->4598 4605->4470 4606->4439 4608 4036e9 4607->4608 4609 4036db CloseHandle 4607->4609 4721 403716 4608->4721 4609->4608 4615 4056ae 4614->4615 4616 403527 ExitProcess 4615->4616 4617 4056c2 MessageBoxIndirectA 4615->4617 4617->4616 4619 406315 5 API calls 4618->4619 4620 403534 lstrcatA 4619->4620 4620->4464 4620->4465 4622 403576 4621->4622 4623 4055bb GetLastError 4621->4623 4622->4478 4623->4622 4624 4055ca SetFileSecurityA 4623->4624 4624->4622 4625 4055e0 GetLastError 4624->4625 4625->4622 4627 4055f7 4626->4627 4628 4055fb GetLastError 4626->4628 4627->4478 4628->4627 4629->4479 4630->4491 4632 405d70 4631->4632 4633 405d7d 4631->4633 4779 405bec 4632->4779 4633->4491 4636 40565b 4635->4636 4637 40564f CloseHandle 4635->4637 4636->4491 4637->4636 4639 4031d6 4638->4639 4640 40592f lstrcatA 4638->4640 4639->4502 4640->4639 4641->4508 4642->4510 4644 405969 4643->4644 4645 402dcf 4644->4645 4646 40596e CharPrevA 4644->4646 4647 405f7d lstrcpynA 4645->4647 4646->4644 4646->4645 4647->4514 4649 402d20 4648->4649 4650 402d08 4648->4650 4653 402d30 GetTickCount 4649->4653 4654 402d28 4649->4654 4651 402d11 DestroyWindow 4650->4651 4652 402d18 4650->4652 4651->4652 4652->4517 4656 402d61 4653->4656 4657 402d3e CreateDialogParamA ShowWindow 4653->4657 4684 406351 4654->4684 4656->4517 4657->4656 4659->4525 4662 402fb2 4660->4662 4661 402fe0 4664 40318b ReadFile 4661->4664 4662->4661 4690 4031a1 SetFilePointer 4662->4690 4665 402feb 4664->4665 4666 403124 4665->4666 4667 402ffd GetTickCount 4665->4667 4674 40310e 4665->4674 4668 403166 4666->4668 4673 403128 4666->4673 4667->4674 4677 403029 4667->4677 4670 40318b ReadFile 4668->4670 4669 40318b ReadFile 4669->4677 4670->4674 4671 40318b ReadFile 4671->4673 4672 405bbd WriteFile 4672->4673 4673->4671 4673->4672 4673->4674 4674->4532 4675 40307f GetTickCount 4675->4677 4676 4030a4 MulDiv wsprintfA 4678 4050a4 24 API calls 4676->4678 4677->4669 4677->4674 4677->4675 4677->4676 4688 405bbd WriteFile 4677->4688 4678->4677 4691 405b8e ReadFile 4680->4691 4683->4524 4685 40636e PeekMessageA 4684->4685 4686 406364 DispatchMessageA 4685->4686 4687 402d2e 4685->4687 4686->4685 4687->4517 4689 405bdb 4688->4689 4689->4677 4690->4661 4692 40319e 4691->4692 4692->4528 4694 403a84 4693->4694 4710 405edb wsprintfA 4694->4710 4696 403af5 4697 403b29 18 API calls 4696->4697 4699 403afa 4697->4699 4698 403830 4698->4547 4699->4698 4700 405f9f 17 API calls 4699->4700 4700->4699 4701->4543 4702->4549 4704 404068 SendMessageA 4703->4704 4705 405199 4704->4705 4708 401389 2 API calls 4705->4708 4709 4051c0 4705->4709 4706 404068 SendMessageA 4707 4051d2 OleUninitialize 4706->4707 4707->4578 4708->4705 4709->4706 4710->4696 4711->4593 4713 4059c9 4712->4713 4717 4059d9 4712->4717 4715 4059d4 CharNextA 4713->4715 4713->4717 4714 4059f9 4714->4595 4714->4597 4715->4714 4716 405940 CharNextA 4716->4717 4717->4714 4717->4716 4719 4062a1 4718->4719 4720 406296 FindClose 4718->4720 4719->4603 4720->4719 4722 403724 4721->4722 4723 4036ee 4722->4723 4724 403729 FreeLibrary GlobalFree 4722->4724 4725 405745 4723->4725 4724->4723 4724->4724 4726 405a03 18 API calls 4725->4726 4727 405765 4726->4727 4728 405784 4727->4728 4729 40576d DeleteFileA 4727->4729 4731 4058bc 4728->4731 4766 405f7d lstrcpynA 4728->4766 4730 403508 OleUninitialize 4729->4730 4730->4447 4730->4448 4731->4730 4736 406280 2 API calls 4731->4736 4733 4057aa 4734 4057b0 lstrcatA 4733->4734 4735 4057bd 4733->4735 4737 4057c3 4734->4737 4738 40595c 2 API calls 4735->4738 4741 4058d6 4736->4741 4739 4057d1 lstrcatA 4737->4739 4740 4057c8 4737->4740 4738->4737 4742 4057dc lstrlenA FindFirstFileA 4739->4742 4740->4739 4740->4742 4741->4730 4743 4058da 4741->4743 4744 4058b2 4742->4744 4748 405800 4742->4748 4745 405915 3 API calls 4743->4745 4744->4731 4747 4058e0 4745->4747 4746 405940 CharNextA 4746->4748 4749 4056fd 5 API calls 4747->4749 4748->4746 4754 405891 FindNextFileA 4748->4754 4761 405745 60 API calls 4748->4761 4763 4050a4 24 API calls 4748->4763 4764 4050a4 24 API calls 4748->4764 4765 405d5c 36 API calls 4748->4765 4767 405f7d lstrcpynA 4748->4767 4768 4056fd 4748->4768 4750 4058ec 4749->4750 4751 4058f0 4750->4751 4752 405906 4750->4752 4751->4730 4756 4050a4 24 API calls 4751->4756 4753 4050a4 24 API calls 4752->4753 4753->4730 4754->4748 4757 4058a9 FindClose 4754->4757 4758 4058fd 4756->4758 4757->4744 4759 405d5c 36 API calls 4758->4759 4762 405904 4759->4762 4761->4748 4762->4730 4763->4754 4764->4748 4765->4748 4766->4733 4767->4748 4776 405af1 GetFileAttributesA 4768->4776 4771 40572a 4771->4748 4772 405720 DeleteFileA 4774 405726 4772->4774 4773 405718 RemoveDirectoryA 4773->4774 4774->4771 4775 405736 SetFileAttributesA 4774->4775 4775->4771 4777 405709 4776->4777 4778 405b03 SetFileAttributesA 4776->4778 4777->4771 4777->4772 4777->4773 4778->4777 4780 405c12 4779->4780 4781 405c38 GetShortPathNameA 4779->4781 4806 405b16 GetFileAttributesA CreateFileA 4780->4806 4782 405d57 4781->4782 4783 405c4d 4781->4783 4782->4633 4783->4782 4786 405c55 wsprintfA 4783->4786 4785 405c1c CloseHandle GetShortPathNameA 4785->4782 4787 405c30 4785->4787 4788 405f9f 17 API calls 4786->4788 4787->4781 4787->4782 4789 405c7d 4788->4789 4807 405b16 GetFileAttributesA CreateFileA 4789->4807 4791 405c8a 4791->4782 4792 405c99 GetFileSize GlobalAlloc 4791->4792 4793 405d50 CloseHandle 4792->4793 4794 405cbb 4792->4794 4793->4782 4795 405b8e ReadFile 4794->4795 4796 405cc3 4795->4796 4796->4793 4808 405a7b lstrlenA 4796->4808 4799 405cda lstrcpyA 4802 405cfc 4799->4802 4800 405cee 4801 405a7b 4 API calls 4800->4801 4801->4802 4803 405d33 SetFilePointer 4802->4803 4804 405bbd WriteFile 4803->4804 4805 405d49 GlobalFree 4804->4805 4805->4793 4806->4785 4807->4791 4809 405abc lstrlenA 4808->4809 4810 405ac4 4809->4810 4811 405a95 lstrcmpiA 4809->4811 4810->4799 4810->4800 4811->4810 4812 405ab3 CharNextA 4811->4812 4812->4809 5196 403769 5197 403774 5196->5197 5198 40377b GlobalAlloc 5197->5198 5199 403778 5197->5199 5198->5199 5200 40166a 5201 402acb 17 API calls 5200->5201 5202 401671 5201->5202 5203 402acb 17 API calls 5202->5203 5204 40167a 5203->5204 5205 402acb 17 API calls 5204->5205 5206 401683 MoveFileA 5205->5206 5207 401696 5206->5207 5213 40168f 5206->5213 5208 406280 2 API calls 5207->5208 5211 402242 5207->5211 5210 4016a5 5208->5210 5209 401423 24 API calls 5209->5211 5210->5211 5212 405d5c 36 API calls 5210->5212 5212->5213 5213->5209 5214 4019ed 5215 402acb 17 API calls 5214->5215 5216 4019f4 5215->5216 5217 402acb 17 API calls 5216->5217 5218 4019fd 5217->5218 5219 401a04 lstrcmpiA 5218->5219 5220 401a16 lstrcmpA 5218->5220 5221 401a0a 5219->5221 5220->5221 5222 40156f 5223 401586 5222->5223 5224 40157f ShowWindow 5222->5224 5225 401596 ShowWindow 5223->5225 5226 402904 5223->5226 5224->5223 5225->5226 5227 4028ff 5225->5227 5229 405edb wsprintfA 5227->5229 5229->5226 5230 6d6a1058 5231 6d6a1074 5230->5231 5232 6d6a10dc 5231->5232 5234 6d6a1091 5231->5234 5243 6d6a14bb 5231->5243 5235 6d6a14bb GlobalFree 5234->5235 5236 6d6a10a1 5235->5236 5237 6d6a10a8 GlobalSize 5236->5237 5238 6d6a10b1 5236->5238 5237->5238 5239 6d6a10c6 5238->5239 5240 6d6a10b5 GlobalAlloc 5238->5240 5242 6d6a10d1 GlobalFree 5239->5242 5241 6d6a14e2 3 API calls 5240->5241 5241->5239 5242->5232 5245 6d6a14c1 5243->5245 5244 6d6a14c7 5244->5234 5245->5244 5246 6d6a14d3 GlobalFree 5245->5246 5246->5234 4840 402473 4841 402b0b 17 API calls 4840->4841 4842 40247d 4841->4842 4843 402acb 17 API calls 4842->4843 4844 402486 4843->4844 4845 402490 RegQueryValueExA 4844->4845 4850 40271c 4844->4850 4846 4024b0 4845->4846 4847 4024b6 RegCloseKey 4845->4847 4846->4847 4851 405edb wsprintfA 4846->4851 4847->4850 4851->4847 5247 4014f4 SetForegroundWindow 5248 402957 5247->5248 5249 401cfb 5250 402aa9 17 API calls 5249->5250 5251 401d02 5250->5251 5252 402aa9 17 API calls 5251->5252 5253 401d0e GetDlgItem 5252->5253 5254 40257d 5253->5254 4952 4022fc 4953 402304 4952->4953 4954 40230a 4952->4954 4955 402acb 17 API calls 4953->4955 4956 402acb 17 API calls 4954->4956 4957 40231a 4954->4957 4955->4954 4956->4957 4958 402328 4957->4958 4959 402acb 17 API calls 4957->4959 4960 402acb 17 API calls 4958->4960 4959->4958 4961 402331 WritePrivateProfileStringA 4960->4961 5255 402c7c 5256 402ca4 5255->5256 5257 402c8b SetTimer 5255->5257 5258 402cf9 5256->5258 5259 402cbe MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 5256->5259 5257->5256 5259->5258 5260 4018fd 5261 401934 5260->5261 5262 402acb 17 API calls 5261->5262 5263 401939 5262->5263 5264 405745 67 API calls 5263->5264 5265 401942 5264->5265 5266 4026fe 5267 402acb 17 API calls 5266->5267 5268 402705 FindFirstFileA 5267->5268 5269 402728 5268->5269 5272 402718 5268->5272 5270 40272f 5269->5270 5274 405edb wsprintfA 5269->5274 5275 405f7d lstrcpynA 5270->5275 5274->5270 5275->5272 5276 6d6a15d5 5277 6d6a14bb GlobalFree 5276->5277 5279 6d6a15ed 5277->5279 5278 6d6a1633 GlobalFree 5279->5278 5280 6d6a1608 5279->5280 5281 6d6a161f VirtualFree 5279->5281 5280->5278 5281->5278 5282 4047ff 5283 40482b 5282->5283 5284 40480f 5282->5284 5285 404831 SHGetPathFromIDListA 5283->5285 5286 40485e 5283->5286 5293 40567d GetDlgItemTextA 5284->5293 5289 404841 5285->5289 5290 404848 SendMessageA 5285->5290 5288 40481c SendMessageA 5288->5283 5291 40140b 2 API calls 5289->5291 5290->5286 5291->5290 5293->5288 5294 401000 5295 401037 BeginPaint GetClientRect 5294->5295 5296 40100c DefWindowProcA 5294->5296 5298 4010f3 5295->5298 5299 401179 5296->5299 5300 401073 CreateBrushIndirect FillRect DeleteObject 5298->5300 5301 4010fc 5298->5301 5300->5298 5302 401102 CreateFontIndirectA 5301->5302 5303 401167 EndPaint 5301->5303 5302->5303 5304 401112 6 API calls 5302->5304 5303->5299 5304->5303 5305 401900 5306 402acb 17 API calls 5305->5306 5307 401907 5306->5307 5308 405699 MessageBoxIndirectA 5307->5308 5309 401910 5308->5309 3890 402381 3891 4023b3 3890->3891 3892 402388 3890->3892 3907 402acb 3891->3907 3902 402b0b 3892->3902 3898 402399 3899 402acb 17 API calls 3898->3899 3900 4023a0 RegDeleteValueA RegCloseKey 3899->3900 3901 4023c7 3900->3901 3903 402acb 17 API calls 3902->3903 3904 402b22 3903->3904 3917 405e03 3904->3917 3908 402ad7 3907->3908 3921 405f9f 3908->3921 3911 4023ba 3913 402b89 3911->3913 3914 402b95 3913->3914 3915 402b9c 3913->3915 3914->3901 3915->3914 3959 402bcd 3915->3959 3918 405e12 3917->3918 3919 40238f 3918->3919 3920 405e1b RegOpenKeyExA 3918->3920 3919->3898 3919->3901 3920->3919 3922 405fac 3921->3922 3923 4061ce 3922->3923 3926 4061a8 lstrlenA 3922->3926 3929 405f9f 10 API calls 3922->3929 3930 4060c4 GetSystemDirectoryA 3922->3930 3932 4060d7 GetWindowsDirectoryA 3922->3932 3933 4061e7 5 API calls 3922->3933 3934 40610b SHGetSpecialFolderLocation 3922->3934 3935 405f9f 10 API calls 3922->3935 3936 406151 lstrcatA 3922->3936 3947 405e64 3922->3947 3952 405edb wsprintfA 3922->3952 3953 405f7d lstrcpynA 3922->3953 3924 402af8 3923->3924 3954 405f7d lstrcpynA 3923->3954 3924->3911 3938 4061e7 3924->3938 3926->3922 3929->3926 3930->3922 3932->3922 3933->3922 3934->3922 3937 406123 SHGetPathFromIDListA CoTaskMemFree 3934->3937 3935->3922 3936->3922 3937->3922 3945 4061f3 3938->3945 3939 40625f CharPrevA 3943 40625b 3939->3943 3940 406250 CharNextA 3940->3943 3940->3945 3941 40627a 3941->3911 3943->3939 3943->3941 3944 40623e CharNextA 3944->3945 3945->3940 3945->3943 3945->3944 3946 40624b CharNextA 3945->3946 3955 405940 3945->3955 3946->3940 3948 405e03 RegOpenKeyExA 3947->3948 3949 405e91 3948->3949 3950 405e98 RegQueryValueExA RegCloseKey 3949->3950 3951 405ec7 3949->3951 3950->3951 3951->3922 3952->3922 3953->3922 3954->3924 3956 405946 3955->3956 3957 405959 3956->3957 3958 40594c CharNextA 3956->3958 3957->3945 3958->3956 3960 405e03 RegOpenKeyExA 3959->3960 3961 402bfb 3960->3961 3962 402c75 3961->3962 3971 402bff 3961->3971 3962->3914 3963 402c21 RegEnumKeyA 3964 402c38 RegCloseKey 3963->3964 3963->3971 3972 406315 GetModuleHandleA 3964->3972 3965 402c59 RegCloseKey 3965->3962 3968 402bcd 6 API calls 3968->3971 3969 402c69 RegDeleteKeyA 3969->3962 3970 402c4c 3970->3962 3971->3963 3971->3964 3971->3965 3971->3968 3973 406331 3972->3973 3974 40633b GetProcAddress 3972->3974 3978 4062a7 GetSystemDirectoryA 3973->3978 3976 402c48 3974->3976 3976->3969 3976->3970 3977 406337 3977->3974 3977->3976 3980 4062c9 wsprintfA LoadLibraryExA 3978->3980 3980->3977 5310 401502 5311 40150a 5310->5311 5313 40151d 5310->5313 5312 402aa9 17 API calls 5311->5312 5312->5313 4090 402003 4091 402015 4090->4091 4100 4020c3 4090->4100 4092 402acb 17 API calls 4091->4092 4093 40201c 4092->4093 4095 402acb 17 API calls 4093->4095 4094 401423 24 API calls 4101 402242 4094->4101 4096 402025 4095->4096 4097 40203a LoadLibraryExA 4096->4097 4098 40202d GetModuleHandleA 4096->4098 4099 40204a GetProcAddress 4097->4099 4097->4100 4098->4097 4098->4099 4102 402096 4099->4102 4103 402059 4099->4103 4100->4094 4156 4050a4 4102->4156 4105 402061 4103->4105 4106 402078 4103->4106 4153 401423 4105->4153 4111 6d6a16df 4106->4111 4107 402069 4107->4101 4109 4020b7 FreeLibrary 4107->4109 4109->4101 4112 6d6a170f 4111->4112 4167 6d6a1a9c 4112->4167 4114 6d6a1716 4115 6d6a1838 4114->4115 4116 6d6a172e 4114->4116 4117 6d6a1727 4114->4117 4115->4107 4201 6d6a22b5 4116->4201 4217 6d6a2273 4117->4217 4122 6d6a1792 4128 6d6a1798 4122->4128 4129 6d6a17e0 4122->4129 4123 6d6a1774 4230 6d6a249c 4123->4230 4124 6d6a175d 4136 6d6a1753 4124->4136 4227 6d6a2c7b 4124->4227 4125 6d6a1744 4127 6d6a174a 4125->4127 4132 6d6a1755 4125->4132 4127->4136 4211 6d6a29c0 4127->4211 4249 6d6a156b 4128->4249 4130 6d6a249c 11 API calls 4129->4130 4137 6d6a17d1 4130->4137 4131 6d6a177a 4241 6d6a1559 4131->4241 4221 6d6a2676 4132->4221 4136->4122 4136->4123 4144 6d6a1827 4137->4144 4256 6d6a2462 4137->4256 4142 6d6a175b 4142->4136 4143 6d6a249c 11 API calls 4143->4137 4144->4115 4148 6d6a1831 GlobalFree 4144->4148 4148->4115 4150 6d6a1813 4150->4144 4260 6d6a14e2 wsprintfA 4150->4260 4151 6d6a180c FreeLibrary 4151->4150 4154 4050a4 24 API calls 4153->4154 4155 401431 4154->4155 4155->4107 4157 4050bf 4156->4157 4165 405162 4156->4165 4158 4050dc lstrlenA 4157->4158 4159 405f9f 17 API calls 4157->4159 4160 405105 4158->4160 4161 4050ea lstrlenA 4158->4161 4159->4158 4163 405118 4160->4163 4164 40510b SetWindowTextA 4160->4164 4162 4050fc lstrcatA 4161->4162 4161->4165 4162->4160 4163->4165 4166 40511e SendMessageA SendMessageA SendMessageA 4163->4166 4164->4163 4165->4107 4166->4165 4263 6d6a1215 GlobalAlloc 4167->4263 4169 6d6a1ac0 4264 6d6a1215 GlobalAlloc 4169->4264 4171 6d6a1ce2 GlobalFree GlobalFree GlobalFree 4172 6d6a1cff 4171->4172 4188 6d6a1d49 4171->4188 4173 6d6a20b5 4172->4173 4181 6d6a1d14 4172->4181 4172->4188 4175 6d6a20d7 GetModuleHandleA 4173->4175 4173->4188 4174 6d6a1b9f GlobalAlloc 4196 6d6a1acb 4174->4196 4178 6d6a20e8 LoadLibraryA 4175->4178 4179 6d6a20fd 4175->4179 4176 6d6a1bea lstrcpyA 4180 6d6a1bf4 lstrcpyA 4176->4180 4177 6d6a1c08 GlobalFree 4177->4196 4178->4179 4178->4188 4271 6d6a15c6 GetProcAddress 4179->4271 4180->4196 4181->4188 4267 6d6a1224 4181->4267 4183 6d6a214e 4187 6d6a215b lstrlenA 4183->4187 4183->4188 4184 6d6a2015 4184->4188 4192 6d6a2059 lstrcpyA 4184->4192 4186 6d6a1f99 4270 6d6a1215 GlobalAlloc 4186->4270 4272 6d6a15c6 GetProcAddress 4187->4272 4188->4114 4189 6d6a210f 4189->4183 4199 6d6a2138 GetProcAddress 4189->4199 4192->4188 4193 6d6a1c46 4193->4196 4265 6d6a1534 GlobalSize GlobalAlloc 4193->4265 4194 6d6a1edb GlobalFree 4194->4196 4195 6d6a2174 4195->4188 4196->4171 4196->4174 4196->4176 4196->4177 4196->4180 4196->4184 4196->4186 4196->4188 4196->4193 4196->4194 4197 6d6a1224 2 API calls 4196->4197 4197->4196 4199->4183 4200 6d6a1fa1 4200->4114 4202 6d6a22ce 4201->4202 4204 6d6a240a GlobalFree 4202->4204 4206 6d6a237c GlobalAlloc MultiByteToWideChar 4202->4206 4207 6d6a1224 GlobalAlloc lstrcpynA 4202->4207 4209 6d6a23c9 4202->4209 4274 6d6a12ad 4202->4274 4204->4202 4205 6d6a1734 4204->4205 4205->4124 4205->4125 4205->4136 4208 6d6a23a8 GlobalAlloc CLSIDFromString GlobalFree 4206->4208 4206->4209 4207->4202 4208->4204 4209->4204 4278 6d6a260a 4209->4278 4213 6d6a29d2 4211->4213 4212 6d6a2a77 VirtualAlloc 4214 6d6a2a95 4212->4214 4213->4212 4215 6d6a2b91 4214->4215 4216 6d6a2b86 GetLastError 4214->4216 4215->4136 4216->4215 4218 6d6a2288 4217->4218 4219 6d6a2293 GlobalAlloc 4218->4219 4220 6d6a172d 4218->4220 4219->4218 4220->4116 4225 6d6a26a6 4221->4225 4222 6d6a2741 GlobalAlloc 4226 6d6a2764 4222->4226 4223 6d6a2754 4224 6d6a275a GlobalSize 4223->4224 4223->4226 4224->4226 4225->4222 4225->4223 4226->4142 4229 6d6a2c86 4227->4229 4228 6d6a2cc6 GlobalFree 4229->4228 4281 6d6a1215 GlobalAlloc 4230->4281 4232 6d6a2538 StringFromGUID2 WideCharToMultiByte 4238 6d6a24a8 4232->4238 4233 6d6a255c WideCharToMultiByte 4233->4238 4234 6d6a2527 lstrcpynA 4234->4238 4235 6d6a25a1 GlobalFree 4235->4238 4236 6d6a257d wsprintfA 4236->4238 4237 6d6a25db GlobalFree 4237->4131 4238->4232 4238->4233 4238->4234 4238->4235 4238->4236 4238->4237 4239 6d6a1266 2 API calls 4238->4239 4282 6d6a12d1 4238->4282 4239->4238 4286 6d6a1215 GlobalAlloc 4241->4286 4243 6d6a155e 4244 6d6a156b 2 API calls 4243->4244 4245 6d6a1568 4244->4245 4246 6d6a1266 4245->4246 4247 6d6a12a8 GlobalFree 4246->4247 4248 6d6a126f GlobalAlloc lstrcpynA 4246->4248 4247->4137 4248->4247 4250 6d6a157b lstrcpyA 4249->4250 4251 6d6a1589 4249->4251 4254 6d6a15c2 4250->4254 4251->4250 4253 6d6a1595 4251->4253 4253->4254 4255 6d6a15b2 wsprintfA 4253->4255 4254->4143 4255->4254 4257 6d6a2470 4256->4257 4259 6d6a17f3 4256->4259 4258 6d6a2489 GlobalFree 4257->4258 4257->4259 4258->4257 4259->4150 4259->4151 4261 6d6a1266 2 API calls 4260->4261 4262 6d6a1503 4261->4262 4262->4144 4263->4169 4264->4196 4266 6d6a1552 4265->4266 4266->4193 4273 6d6a1215 GlobalAlloc 4267->4273 4269 6d6a1233 lstrcpynA 4269->4188 4270->4200 4271->4189 4272->4195 4273->4269 4275 6d6a12b4 4274->4275 4276 6d6a1224 2 API calls 4275->4276 4277 6d6a12cf 4276->4277 4277->4202 4279 6d6a2618 VirtualAlloc 4278->4279 4280 6d6a266e 4278->4280 4279->4280 4280->4209 4281->4238 4283 6d6a12da 4282->4283 4284 6d6a12f9 4282->4284 4283->4284 4285 6d6a12e0 lstrcpyA 4283->4285 4284->4238 4285->4284 4286->4243 5314 402583 5315 402588 5314->5315 5316 40259c 5314->5316 5317 402aa9 17 API calls 5315->5317 5318 402acb 17 API calls 5316->5318 5320 402591 5317->5320 5319 4025a3 lstrlenA 5318->5319 5319->5320 5321 4025c5 5320->5321 5322 405bbd WriteFile 5320->5322 5322->5321 5323 404187 5324 40419d 5323->5324 5329 4042a9 5323->5329 5327 40401c 18 API calls 5324->5327 5325 404318 5326 4043e2 5325->5326 5328 404322 GetDlgItem 5325->5328 5335 404083 8 API calls 5326->5335 5330 4041f3 5327->5330 5331 4043a0 5328->5331 5332 404338 5328->5332 5329->5325 5329->5326 5333 4042ed GetDlgItem SendMessageA 5329->5333 5334 40401c 18 API calls 5330->5334 5331->5326 5336 4043b2 5331->5336 5332->5331 5340 40435e SendMessageA LoadCursorA SetCursor 5332->5340 5356 40403e EnableWindow 5333->5356 5338 404200 CheckDlgButton 5334->5338 5339 4043dd 5335->5339 5341 4043b8 SendMessageA 5336->5341 5342 4043c9 5336->5342 5354 40403e EnableWindow 5338->5354 5360 40442b 5340->5360 5341->5342 5342->5339 5347 4043cf SendMessageA 5342->5347 5343 404313 5357 404407 5343->5357 5347->5339 5349 40421e GetDlgItem 5355 404051 SendMessageA 5349->5355 5351 404234 SendMessageA 5352 404252 GetSysColor 5351->5352 5353 40425b SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5351->5353 5352->5353 5353->5339 5354->5349 5355->5351 5356->5343 5358 404415 5357->5358 5359 40441a SendMessageA 5357->5359 5358->5359 5359->5325 5363 40565f ShellExecuteExA 5360->5363 5362 404391 LoadCursorA SetCursor 5362->5331 5363->5362 4395 402688 4396 40268f 4395->4396 4398 402904 4395->4398 4397 402aa9 17 API calls 4396->4397 4399 402696 4397->4399 4400 4026a5 SetFilePointer 4399->4400 4400->4398 4401 4026b5 4400->4401 4403 405edb wsprintfA 4401->4403 4403->4398 5364 401c0a 5365 402aa9 17 API calls 5364->5365 5366 401c11 5365->5366 5367 402aa9 17 API calls 5366->5367 5368 401c1e 5367->5368 5369 401c33 5368->5369 5370 402acb 17 API calls 5368->5370 5371 401c43 5369->5371 5372 402acb 17 API calls 5369->5372 5370->5369 5373 401c9a 5371->5373 5374 401c4e 5371->5374 5372->5371 5376 402acb 17 API calls 5373->5376 5375 402aa9 17 API calls 5374->5375 5377 401c53 5375->5377 5378 401c9f 5376->5378 5379 402aa9 17 API calls 5377->5379 5380 402acb 17 API calls 5378->5380 5381 401c5f 5379->5381 5382 401ca8 FindWindowExA 5380->5382 5383 401c8a SendMessageA 5381->5383 5384 401c6c SendMessageTimeoutA 5381->5384 5385 401cc6 5382->5385 5383->5385 5384->5385 5386 40638a WaitForSingleObject 5387 4063a4 5386->5387 5388 4063b6 GetExitCodeProcess 5387->5388 5389 406351 2 API calls 5387->5389 5390 4063ab WaitForSingleObject 5389->5390 5390->5387 5391 401490 5392 4050a4 24 API calls 5391->5392 5393 401497 5392->5393 5394 6d6a183b 5395 6d6a185e 5394->5395 5396 6d6a188e GlobalFree 5395->5396 5397 6d6a18a0 5395->5397 5396->5397 5398 6d6a1266 2 API calls 5397->5398 5399 6d6a1a22 GlobalFree GlobalFree 5398->5399 5400 6d6a163c 5401 6d6a166b 5400->5401 5402 6d6a1a9c 18 API calls 5401->5402 5403 6d6a1672 5402->5403 5404 6d6a1679 5403->5404 5405 6d6a1685 5403->5405 5406 6d6a1266 2 API calls 5404->5406 5407 6d6a168f 5405->5407 5408 6d6a16ac 5405->5408 5409 6d6a1683 5406->5409 5410 6d6a14e2 3 API calls 5407->5410 5411 6d6a16b2 5408->5411 5412 6d6a16d6 5408->5412 5414 6d6a1694 5410->5414 5415 6d6a1559 3 API calls 5411->5415 5413 6d6a14e2 3 API calls 5412->5413 5413->5409 5416 6d6a1559 3 API calls 5414->5416 5417 6d6a16b7 5415->5417 5418 6d6a169a 5416->5418 5419 6d6a1266 2 API calls 5417->5419 5421 6d6a1266 2 API calls 5418->5421 5420 6d6a16bd GlobalFree 5419->5420 5420->5409 5422 6d6a16d1 GlobalFree 5420->5422 5423 6d6a16a0 GlobalFree 5421->5423 5422->5409 5423->5409 5424 6d6a103d 5427 6d6a101b 5424->5427 5428 6d6a14bb GlobalFree 5427->5428 5429 6d6a1020 5428->5429 5430 6d6a1027 GlobalAlloc 5429->5430 5431 6d6a1024 5429->5431 5430->5431 5432 6d6a14e2 3 API calls 5431->5432 5433 6d6a103b 5432->5433 4877 405018 4878 405028 4877->4878 4879 40503c 4877->4879 4880 405085 4878->4880 4881 40502e 4878->4881 4882 405044 IsWindowVisible 4879->4882 4888 405064 4879->4888 4883 40508a CallWindowProcA 4880->4883 4884 404068 SendMessageA 4881->4884 4882->4880 4885 405051 4882->4885 4886 405038 4883->4886 4884->4886 4887 40496f 5 API calls 4885->4887 4889 40505b 4887->4889 4888->4883 4890 4049ef 4 API calls 4888->4890 4889->4888 4890->4880 5434 401d9b GetDC 5435 402aa9 17 API calls 5434->5435 5436 401dad GetDeviceCaps MulDiv ReleaseDC 5435->5436 5437 402aa9 17 API calls 5436->5437 5438 401dde 5437->5438 5439 405f9f 17 API calls 5438->5439 5440 401e1b CreateFontIndirectA 5439->5440 5441 40257d 5440->5441 4962 40159d 4963 402acb 17 API calls 4962->4963 4964 4015a4 SetFileAttributesA 4963->4964 4965 4015b6 4964->4965 5442 40149d 5443 4022e7 5442->5443 5444 4014ab PostQuitMessage 5442->5444 5444->5443 4966 401a1e 4967 402acb 17 API calls 4966->4967 4968 401a27 ExpandEnvironmentStringsA 4967->4968 4969 401a3b 4968->4969 4971 401a4e 4968->4971 4970 401a40 lstrcmpA 4969->4970 4969->4971 4970->4971 5450 40171f 5451 402acb 17 API calls 5450->5451 5452 401726 SearchPathA 5451->5452 5453 401741 5452->5453 5454 401d20 5455 402aa9 17 API calls 5454->5455 5456 401d2e SetWindowLongA 5455->5456 5457 402957 5456->5457 3981 404a21 GetDlgItem GetDlgItem 3982 404a73 7 API calls 3981->3982 3985 404c8b 3981->3985 3983 404b16 DeleteObject 3982->3983 3984 404b09 SendMessageA 3982->3984 3986 404b1f 3983->3986 3984->3983 3991 404ceb 3985->3991 3994 404d50 3985->3994 4003 404d6f 3985->4003 3987 404b56 3986->3987 3990 405f9f 17 API calls 3986->3990 4036 40401c 3987->4036 3989 404e1b 3995 404e25 SendMessageA 3989->3995 3996 404e2d 3989->3996 3997 404b38 SendMessageA SendMessageA 3990->3997 4041 40496f SendMessageA 3991->4041 3992 404b6a 3999 40401c 18 API calls 3992->3999 3993 405003 4058 404083 3993->4058 4002 404d61 SendMessageA 3994->4002 3994->4003 3995->3996 4004 404e46 3996->4004 4005 404e3f ImageList_Destroy 3996->4005 4013 404e56 3996->4013 3997->3986 4018 404b78 3999->4018 4000 404dc8 SendMessageA 4000->3993 4007 404ddd SendMessageA 4000->4007 4002->4003 4003->3989 4003->3993 4003->4000 4009 404e4f GlobalFree 4004->4009 4004->4013 4005->4004 4006 404fc5 4006->3993 4014 404fd7 ShowWindow GetDlgItem ShowWindow 4006->4014 4011 404df0 4007->4011 4009->4013 4010 404c4c GetWindowLongA SetWindowLongA 4012 404c65 4010->4012 4022 404e01 SendMessageA 4011->4022 4015 404c83 4012->4015 4016 404c6b ShowWindow 4012->4016 4013->4006 4030 404e91 4013->4030 4046 4049ef 4013->4046 4014->3993 4040 404051 SendMessageA 4015->4040 4039 404051 SendMessageA 4016->4039 4017 404cfc 4017->3994 4018->4010 4021 404bc7 SendMessageA 4018->4021 4023 404c46 4018->4023 4024 404c03 SendMessageA 4018->4024 4025 404c14 SendMessageA 4018->4025 4021->4018 4022->3989 4023->4010 4023->4012 4024->4018 4025->4018 4027 404c7e 4027->3993 4028 404f9b InvalidateRect 4028->4006 4029 404fb1 4028->4029 4055 40492a 4029->4055 4031 404ebf SendMessageA 4030->4031 4032 404ed5 4030->4032 4031->4032 4032->4028 4033 404f36 4032->4033 4035 404f49 SendMessageA SendMessageA 4032->4035 4033->4035 4035->4032 4037 405f9f 17 API calls 4036->4037 4038 404027 SetDlgItemTextA 4037->4038 4038->3992 4039->4027 4040->3985 4042 404992 GetMessagePos ScreenToClient SendMessageA 4041->4042 4043 4049ce SendMessageA 4041->4043 4044 4049c6 4042->4044 4045 4049cb 4042->4045 4043->4044 4044->4017 4045->4043 4072 405f7d lstrcpynA 4046->4072 4048 404a02 4073 405edb wsprintfA 4048->4073 4050 404a0c 4074 40140b 4050->4074 4054 404a1c 4054->4030 4082 404865 4055->4082 4057 40493f 4057->4006 4059 404146 4058->4059 4060 40409b GetWindowLongA 4058->4060 4060->4059 4061 4040b0 4060->4061 4061->4059 4062 4040e0 4061->4062 4063 4040dd GetSysColor 4061->4063 4064 4040f0 SetBkMode 4062->4064 4065 4040e6 SetTextColor 4062->4065 4063->4062 4066 404108 GetSysColor 4064->4066 4067 40410e 4064->4067 4065->4064 4066->4067 4068 404115 SetBkColor 4067->4068 4069 40411f 4067->4069 4068->4069 4069->4059 4070 404132 DeleteObject 4069->4070 4071 404139 CreateBrushIndirect 4069->4071 4070->4071 4071->4059 4072->4048 4073->4050 4078 401389 4074->4078 4077 405f7d lstrcpynA 4077->4054 4079 401390 4078->4079 4080 4013fe 4079->4080 4081 4013cb MulDiv SendMessageA 4079->4081 4080->4077 4081->4079 4083 40487b 4082->4083 4084 405f9f 17 API calls 4083->4084 4085 4048df 4084->4085 4086 405f9f 17 API calls 4085->4086 4087 4048ea 4086->4087 4088 405f9f 17 API calls 4087->4088 4089 404900 lstrlenA wsprintfA SetDlgItemTextA 4088->4089 4089->4057 5458 6d6a1000 5459 6d6a101b 5 API calls 5458->5459 5460 6d6a1019 5459->5460 4823 401e2b 4824 402aa9 17 API calls 4823->4824 4825 401e31 4824->4825 4826 402aa9 17 API calls 4825->4826 4827 401e3d 4826->4827 4828 401e54 EnableWindow 4827->4828 4829 401e49 ShowWindow 4827->4829 4830 402957 4828->4830 4829->4830 5461 4044ae 5462 4044da 5461->5462 5463 4044eb 5461->5463 5522 40567d GetDlgItemTextA 5462->5522 5464 4044f7 GetDlgItem 5463->5464 5472 404556 5463->5472 5467 40450b 5464->5467 5466 4044e5 5469 4061e7 5 API calls 5466->5469 5470 40451f SetWindowTextA 5467->5470 5475 4059ae 4 API calls 5467->5475 5468 40463a 5471 4047e4 5468->5471 5524 40567d GetDlgItemTextA 5468->5524 5469->5463 5476 40401c 18 API calls 5470->5476 5474 404083 8 API calls 5471->5474 5472->5468 5472->5471 5477 405f9f 17 API calls 5472->5477 5479 4047f8 5474->5479 5480 404515 5475->5480 5481 40453b 5476->5481 5482 4045ca SHBrowseForFolderA 5477->5482 5478 40466a 5483 405a03 18 API calls 5478->5483 5480->5470 5487 405915 3 API calls 5480->5487 5484 40401c 18 API calls 5481->5484 5482->5468 5485 4045e2 CoTaskMemFree 5482->5485 5486 404670 5483->5486 5488 404549 5484->5488 5489 405915 3 API calls 5485->5489 5525 405f7d lstrcpynA 5486->5525 5487->5470 5523 404051 SendMessageA 5488->5523 5491 4045ef 5489->5491 5494 404626 SetDlgItemTextA 5491->5494 5498 405f9f 17 API calls 5491->5498 5493 40454f 5496 406315 5 API calls 5493->5496 5494->5468 5495 404687 5497 406315 5 API calls 5495->5497 5496->5472 5505 40468e 5497->5505 5499 40460e lstrcmpiA 5498->5499 5499->5494 5501 40461f lstrcatA 5499->5501 5500 4046ca 5526 405f7d lstrcpynA 5500->5526 5501->5494 5503 4046d1 5504 4059ae 4 API calls 5503->5504 5506 4046d7 GetDiskFreeSpaceA 5504->5506 5505->5500 5509 40595c 2 API calls 5505->5509 5511 404722 5505->5511 5508 4046fb MulDiv 5506->5508 5506->5511 5508->5511 5509->5505 5510 404793 5513 4047b6 5510->5513 5515 40140b 2 API calls 5510->5515 5511->5510 5512 40492a 20 API calls 5511->5512 5514 404780 5512->5514 5527 40403e EnableWindow 5513->5527 5516 404795 SetDlgItemTextA 5514->5516 5517 404785 5514->5517 5515->5513 5516->5510 5519 404865 20 API calls 5517->5519 5519->5510 5520 4047d2 5520->5471 5521 404407 SendMessageA 5520->5521 5521->5471 5522->5466 5523->5493 5524->5478 5525->5495 5526->5503 5527->5520 5528 6d6a2b9b 5529 6d6a2bb3 5528->5529 5530 6d6a1534 2 API calls 5529->5530 5531 6d6a2bce 5530->5531 5532 401f31 5533 402acb 17 API calls 5532->5533 5534 401f38 5533->5534 5535 406280 2 API calls 5534->5535 5536 401f3e 5535->5536 5537 401f50 5536->5537 5539 405edb wsprintfA 5536->5539 5539->5537 5540 402932 SendMessageA 5541 402957 5540->5541 5542 40294c InvalidateRect 5540->5542 5542->5541 5543 6d6a221e 5544 6d6a2288 5543->5544 5545 6d6a2293 GlobalAlloc 5544->5545 5546 6d6a22b2 5544->5546 5545->5544 5547 4014b7 5548 4014bd 5547->5548 5549 401389 2 API calls 5548->5549 5550 4014c5 5549->5550 5551 4026ba 5552 4026c0 5551->5552 5553 4026c8 FindClose 5552->5553 5554 402957 5552->5554 5553->5554 4932 4015bb 4933 402acb 17 API calls 4932->4933 4934 4015c2 4933->4934 4935 4059ae 4 API calls 4934->4935 4947 4015ca 4935->4947 4936 401624 4938 401652 4936->4938 4939 401629 4936->4939 4937 405940 CharNextA 4937->4947 4942 401423 24 API calls 4938->4942 4940 401423 24 API calls 4939->4940 4941 401630 4940->4941 4951 405f7d lstrcpynA 4941->4951 4949 40164a 4942->4949 4944 4055e7 2 API calls 4944->4947 4945 405604 5 API calls 4945->4947 4946 40163b SetCurrentDirectoryA 4946->4949 4947->4936 4947->4937 4947->4944 4947->4945 4948 40160c GetFileAttributesA 4947->4948 4950 40556a 4 API calls 4947->4950 4948->4947 4950->4947 4951->4946 5555 4016bb 5556 402acb 17 API calls 5555->5556 5557 4016c1 GetFullPathNameA 5556->5557 5558 4016d8 5557->5558 5564 4016f9 5557->5564 5561 406280 2 API calls 5558->5561 5558->5564 5559 402957 5560 40170d GetShortPathNameA 5560->5559 5562 4016e9 5561->5562 5562->5564 5565 405f7d lstrcpynA 5562->5565 5564->5559 5564->5560 5565->5564 5566 40273c 5567 402acb 17 API calls 5566->5567 5569 40274a 5567->5569 5568 402760 5571 405af1 2 API calls 5568->5571 5569->5568 5570 402acb 17 API calls 5569->5570 5570->5568 5572 402766 5571->5572 5594 405b16 GetFileAttributesA CreateFileA 5572->5594 5574 402773 5575 40281c 5574->5575 5576 40277f GlobalAlloc 5574->5576 5579 402824 DeleteFileA 5575->5579 5580 402837 5575->5580 5577 402813 CloseHandle 5576->5577 5578 402798 5576->5578 5577->5575 5595 4031a1 SetFilePointer 5578->5595 5579->5580 5582 40279e 5583 40318b ReadFile 5582->5583 5584 4027a7 GlobalAlloc 5583->5584 5585 4027f1 5584->5585 5586 4027b7 5584->5586 5587 405bbd WriteFile 5585->5587 5588 402f9c 31 API calls 5586->5588 5589 4027fd GlobalFree 5587->5589 5593 4027c4 5588->5593 5590 402f9c 31 API calls 5589->5590 5592 402810 5590->5592 5591 4027e8 GlobalFree 5591->5585 5592->5577 5593->5591 5594->5574 5595->5582 5596 40283d 5597 402aa9 17 API calls 5596->5597 5598 402843 5597->5598 5599 402882 5598->5599 5600 40286b 5598->5600 5607 40271c 5598->5607 5601 40289c 5599->5601 5602 40288c 5599->5602 5603 402870 5600->5603 5604 40287f 5600->5604 5606 405f9f 17 API calls 5601->5606 5605 402aa9 17 API calls 5602->5605 5610 405f7d lstrcpynA 5603->5610 5611 405edb wsprintfA 5604->5611 5605->5607 5606->5607 5610->5607 5611->5607 5612 401b3f 5613 402acb 17 API calls 5612->5613 5614 401b46 5613->5614 5615 402aa9 17 API calls 5614->5615 5616 401b4f wsprintfA 5615->5616 5617 402957 5616->5617

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 4031e9-403228 SetErrorMode GetVersion 1 40322a-403232 call 406315 0->1 2 40323b 0->2 1->2 7 403234 1->7 4 403240-403253 call 4062a7 lstrlenA 2->4 9 403255-403271 call 406315 * 3 4->9 7->2 16 403282-4032e0 #17 OleInitialize SHGetFileInfoA call 405f7d GetCommandLineA call 405f7d 9->16 17 403273-403279 9->17 24 4032e2-4032e7 16->24 25 4032ec-403301 call 405940 CharNextA 16->25 17->16 21 40327b 17->21 21->16 24->25 28 4033c6-4033ca 25->28 29 4033d0 28->29 30 403306-403309 28->30 33 4033e3-4033fd GetTempPathA call 4031b8 29->33 31 403311-403319 30->31 32 40330b-40330f 30->32 34 403321-403324 31->34 35 40331b-40331c 31->35 32->31 32->32 43 403455-40346f DeleteFileA call 402d63 33->43 44 4033ff-40341d GetWindowsDirectoryA lstrcatA call 4031b8 33->44 37 4033b6-4033c3 call 405940 34->37 38 40332a-40332e 34->38 35->34 37->28 53 4033c5 37->53 41 403330-403336 38->41 42 403346-403373 38->42 47 403338-40333a 41->47 48 40333c 41->48 49 403375-40337b 42->49 50 403386-4033b4 42->50 58 403503-403513 call 4036d1 OleUninitialize 43->58 59 403475-40347b 43->59 44->43 61 40341f-40344f GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4031b8 44->61 47->42 47->48 48->42 55 403381 49->55 56 40337d-40337f 49->56 50->37 52 4033d2-4033de call 405f7d 50->52 52->33 53->28 55->50 56->50 56->55 72 403637-40363d 58->72 73 403519-403529 call 405699 ExitProcess 58->73 62 4034f3-4034fa call 4037ab 59->62 63 40347d-403488 call 405940 59->63 61->43 61->58 70 4034ff 62->70 74 40348a-4034b3 63->74 75 4034be-4034c8 63->75 70->58 77 4036b9-4036c1 72->77 78 40363f-403658 GetCurrentProcess OpenProcessToken 72->78 81 4034b5-4034b7 74->81 84 4034ca-4034d7 call 405a03 75->84 85 40352f-403543 call 405604 lstrcatA 75->85 82 4036c3 77->82 83 4036c7-4036cb ExitProcess 77->83 79 40368a-403698 call 406315 78->79 80 40365a-403684 LookupPrivilegeValueA AdjustTokenPrivileges 78->80 96 4036a6-4036b0 ExitWindowsEx 79->96 97 40369a-4036a4 79->97 80->79 81->75 88 4034b9-4034bc 81->88 82->83 84->58 98 4034d9-4034ef call 405f7d * 2 84->98 94 403550-40356a lstrcatA lstrcmpiA 85->94 95 403545-40354b lstrcatA 85->95 88->75 88->81 94->58 100 40356c-40356f 94->100 95->94 96->77 101 4036b2-4036b4 call 40140b 96->101 97->96 97->101 98->62 103 403571-403576 call 40556a 100->103 104 403578 call 4055e7 100->104 101->77 112 40357d-40358a SetCurrentDirectoryA 103->112 104->112 113 403597-4035bf call 405f7d 112->113 114 40358c-403592 call 405f7d 112->114 118 4035c5-4035e1 call 405f9f DeleteFileA 113->118 114->113 121 403622-403629 118->121 122 4035e3-4035f3 CopyFileA 118->122 121->118 124 40362b-403632 call 405d5c 121->124 122->121 123 4035f5-403615 call 405d5c call 405f9f call 40561c 122->123 123->121 133 403617-40361e CloseHandle 123->133 124->58 133->121
                                  APIs
                                  • SetErrorMode.KERNELBASE ref: 0040320E
                                  • GetVersion.KERNEL32 ref: 00403214
                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403247
                                  • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 00403283
                                  • OleInitialize.OLE32(00000000), ref: 0040328A
                                  • SHGetFileInfoA.SHELL32(0079E500,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 004032A6
                                  • GetCommandLineA.KERNEL32(Burseraceae Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 004032BB
                                  • CharNextA.USER32(00000000,"C:\Users\user\Desktop\Calyciform.exe",00000020,"C:\Users\user\Desktop\Calyciform.exe",00000000,?,00000006,00000008,0000000A), ref: 004032F7
                                  • GetTempPathA.KERNELBASE(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000006,00000008,0000000A), ref: 004033F4
                                  • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 00403405
                                  • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403411
                                  • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403425
                                  • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 0040342D
                                  • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 0040343E
                                  • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403446
                                  • DeleteFileA.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 0040345A
                                    • Part of subcall function 00406315: GetModuleHandleA.KERNEL32(?,?,?,0040325C,0000000A), ref: 00406327
                                    • Part of subcall function 00406315: GetProcAddress.KERNEL32(00000000,?), ref: 00406342
                                    • Part of subcall function 004037AB: lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Puerperant,1033,0079F540,80000001,Control Panel\Desktop\ResourceLocale,00000000,0079F540,00000000,00000002,759B3410), ref: 0040389B
                                    • Part of subcall function 004037AB: lstrcmpiA.KERNEL32(?,.exe), ref: 004038AE
                                    • Part of subcall function 004037AB: GetFileAttributesA.KERNEL32(Call), ref: 004038B9
                                    • Part of subcall function 004037AB: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Puerperant), ref: 00403902
                                    • Part of subcall function 004037AB: RegisterClassA.USER32(007A26E0), ref: 0040393F
                                    • Part of subcall function 004036D1: CloseHandle.KERNEL32(000002C8,00403508,?,?,00000006,00000008,0000000A), ref: 004036DC
                                  • OleUninitialize.OLE32(?,?,00000006,00000008,0000000A), ref: 00403508
                                  • ExitProcess.KERNEL32 ref: 00403529
                                  • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 00403646
                                  • OpenProcessToken.ADVAPI32(00000000), ref: 0040364D
                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403665
                                  • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 00403684
                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 004036A8
                                  • ExitProcess.KERNEL32 ref: 004036CB
                                    • Part of subcall function 00405699: MessageBoxIndirectA.USER32(0040A218), ref: 004056F4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: Process$ExitFile$EnvironmentHandlePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCloseCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                                  • String ID: "$"C:\Users\user\Desktop\Calyciform.exe"$.tmp$1033$Burseraceae Setup$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Puerperant$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Puerperant$C:\Users\user\Desktop$C:\Users\user\Desktop\Calyciform.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$user32::CallWindowProcW(ir1 ,i 0,i 0, i 0, i 0)$~nsu
                                  • API String ID: 3776617018-1313069087
                                  • Opcode ID: 29ce849f0f4732ea37b80819e9f88e43c01e51bf7f43e0917613217fdba7c993
                                  • Instruction ID: 7bf8744e0b649f959f8498b36092dc0538a6711c388ee02d62fe24b7258f1436
                                  • Opcode Fuzzy Hash: 29ce849f0f4732ea37b80819e9f88e43c01e51bf7f43e0917613217fdba7c993
                                  • Instruction Fuzzy Hash: 42C1E670104741AAD7216F759D89A2F3EACAF86706F04447FF582B51E2DB7C8A058B2F

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 134 404a21-404a6d GetDlgItem * 2 135 404a73-404b07 GlobalAlloc LoadBitmapA SetWindowLongA ImageList_Create ImageList_AddMasked SendMessageA * 2 134->135 136 404c8d-404c94 134->136 137 404b16-404b1d DeleteObject 135->137 138 404b09-404b14 SendMessageA 135->138 139 404c96-404ca6 136->139 140 404ca8 136->140 142 404b1f-404b27 137->142 138->137 141 404cab-404cb4 139->141 140->141 143 404cb6-404cb9 141->143 144 404cbf-404cc5 141->144 145 404b50-404b54 142->145 146 404b29-404b2c 142->146 143->144 148 404da3-404daa 143->148 151 404cd4-404cdb 144->151 152 404cc7-404cce 144->152 145->142 147 404b56-404b82 call 40401c * 2 145->147 149 404b31-404b4e call 405f9f SendMessageA * 2 146->149 150 404b2e 146->150 190 404b88-404b8e 147->190 191 404c4c-404c5f GetWindowLongA SetWindowLongA 147->191 154 404e1b-404e23 148->154 155 404dac-404db2 148->155 149->145 150->149 157 404d50-404d53 151->157 158 404cdd-404ce0 151->158 152->148 152->151 165 404e25-404e2b SendMessageA 154->165 166 404e2d-404e34 154->166 162 405003-405015 call 404083 155->162 163 404db8-404dc2 155->163 157->148 164 404d55-404d5f 157->164 159 404ce2-404ce9 158->159 160 404ceb-404d00 call 40496f 158->160 159->157 159->160 160->157 189 404d02-404d13 160->189 163->162 172 404dc8-404dd7 SendMessageA 163->172 174 404d61-404d6d SendMessageA 164->174 175 404d6f-404d79 164->175 165->166 168 404e36-404e3d 166->168 169 404e68-404e6f 166->169 177 404e46-404e4d 168->177 178 404e3f-404e40 ImageList_Destroy 168->178 181 404fc5-404fcc 169->181 182 404e75-404e81 call 4011ef 169->182 172->162 183 404ddd-404dee SendMessageA 172->183 174->175 175->148 176 404d7b-404d85 175->176 185 404d96-404da0 176->185 186 404d87-404d94 176->186 187 404e56-404e62 177->187 188 404e4f-404e50 GlobalFree 177->188 178->177 181->162 195 404fce-404fd5 181->195 208 404e91-404e94 182->208 209 404e83-404e86 182->209 193 404df0-404df6 183->193 194 404df8-404dfa 183->194 185->148 186->148 187->169 188->187 189->157 197 404d15-404d17 189->197 198 404b91-404b97 190->198 196 404c65-404c69 191->196 193->194 200 404dfb-404e14 call 401299 SendMessageA 193->200 194->200 195->162 201 404fd7-405001 ShowWindow GetDlgItem ShowWindow 195->201 202 404c83-404c8b call 404051 196->202 203 404c6b-404c7e ShowWindow call 404051 196->203 204 404d19-404d20 197->204 205 404d2a 197->205 206 404c2d-404c40 198->206 207 404b9d-404bc5 198->207 200->154 201->162 202->136 203->162 213 404d22-404d24 204->213 214 404d26-404d28 204->214 217 404d2d-404d49 call 40117d 205->217 206->198 221 404c46-404c4a 206->221 215 404bc7-404bfd SendMessageA 207->215 216 404bff-404c01 207->216 222 404ed5-404ef9 call 4011ef 208->222 223 404e96-404eaf call 4012e2 call 401299 208->223 218 404e88 209->218 219 404e89-404e8c call 4049ef 209->219 213->217 214->217 215->206 224 404c03-404c12 SendMessageA 216->224 225 404c14-404c2a SendMessageA 216->225 217->157 218->219 219->208 221->191 221->196 236 404f9b-404faf InvalidateRect 222->236 237 404eff 222->237 242 404eb1-404eb7 223->242 243 404ebf-404ece SendMessageA 223->243 224->206 225->206 236->181 239 404fb1-404fc0 call 404942 call 40492a 236->239 240 404f02-404f0d 237->240 239->181 244 404f83-404f95 240->244 245 404f0f-404f1e 240->245 246 404eb9 242->246 247 404eba-404ebd 242->247 243->222 244->236 244->240 249 404f20-404f2d 245->249 250 404f31-404f34 245->250 246->247 247->242 247->243 249->250 251 404f36-404f39 250->251 252 404f3b-404f44 250->252 254 404f49-404f81 SendMessageA * 2 251->254 252->254 255 404f46 252->255 254->244 255->254
                                  APIs
                                  • GetDlgItem.USER32(?,000003F9), ref: 00404A39
                                  • GetDlgItem.USER32(?,00000408), ref: 00404A44
                                  • GlobalAlloc.KERNEL32(00000040,00000001), ref: 00404A8E
                                  • LoadBitmapA.USER32(0000006E), ref: 00404AA1
                                  • SetWindowLongA.USER32(?,000000FC,00405018), ref: 00404ABA
                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404ACE
                                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404AE0
                                  • SendMessageA.USER32(?,00001109,00000002), ref: 00404AF6
                                  • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404B02
                                  • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404B14
                                  • DeleteObject.GDI32(00000000), ref: 00404B17
                                  • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404B42
                                  • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404B4E
                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404BE3
                                  • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404C0E
                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C22
                                  • GetWindowLongA.USER32(?,000000F0), ref: 00404C51
                                  • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404C5F
                                  • ShowWindow.USER32(?,00000005), ref: 00404C70
                                  • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404D6D
                                  • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404DD2
                                  • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404DE7
                                  • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404E0B
                                  • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404E2B
                                  • ImageList_Destroy.COMCTL32(?), ref: 00404E40
                                  • GlobalFree.KERNEL32(?), ref: 00404E50
                                  • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404EC9
                                  • SendMessageA.USER32(?,00001102,?,?), ref: 00404F72
                                  • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404F81
                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00404FA1
                                  • ShowWindow.USER32(?,00000000), ref: 00404FEF
                                  • GetDlgItem.USER32(?,000003FE), ref: 00404FFA
                                  • ShowWindow.USER32(00000000), ref: 00405001
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                  • String ID: $M$N
                                  • API String ID: 1638840714-813528018
                                  • Opcode ID: 172e59c7ba931a394c3fba9a3879f403beeb7489b9f7cd5918fdae017d576325
                                  • Instruction ID: 95fc731ee8c2f60e707b2e347886eca1b13b95ad12058a055eb87ebce7bf2e6a
                                  • Opcode Fuzzy Hash: 172e59c7ba931a394c3fba9a3879f403beeb7489b9f7cd5918fdae017d576325
                                  • Instruction Fuzzy Hash: 720270B0900209EFEB149F58DD85AAE7BB5FB84315F10813AF610BA2E1D7789D52CF58
                                  APIs
                                    • Part of subcall function 6D6A1215: GlobalAlloc.KERNELBASE(00000040,6D6A1233,?,6D6A12CF,-6D6A404B,6D6A11AB,-000000A0), ref: 6D6A121D
                                  • GlobalAlloc.KERNELBASE(00000040,000014A4), ref: 6D6A1BA6
                                  • lstrcpyA.KERNEL32(00000008,?), ref: 6D6A1BEE
                                  • lstrcpyA.KERNEL32(00000408,?), ref: 6D6A1BF8
                                  • GlobalFree.KERNEL32(00000000), ref: 6D6A1C0B
                                  • GlobalFree.KERNEL32(?), ref: 6D6A1CEB
                                  • GlobalFree.KERNEL32(?), ref: 6D6A1CF0
                                  • GlobalFree.KERNEL32(?), ref: 6D6A1CF5
                                  • GlobalFree.KERNEL32(00000000), ref: 6D6A1EDC
                                  • lstrcpyA.KERNEL32(?,?), ref: 6D6A2065
                                  • GetModuleHandleA.KERNEL32(00000008), ref: 6D6A20D8
                                  • LoadLibraryA.KERNEL32(00000008), ref: 6D6A20E9
                                  • GetProcAddress.KERNEL32(?,?), ref: 6D6A2142
                                  • lstrlenA.KERNEL32(00000408), ref: 6D6A215C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130238628964.000000006D6A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D6A0000, based on PE: true
                                  • Associated: 00000000.00000002.130238558041.000000006D6A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.130238696820.000000006D6A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.130238759011.000000006D6A5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d6a0000_Calyciform.jbxd
                                  Similarity
                                  • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                  • String ID:
                                  • API String ID: 245916457-0
                                  • Opcode ID: f9d3db591a4a56c82ed4ed0722d9afad7e2e42839c77d404d7b7377cf874189e
                                  • Instruction ID: 22c6c09e95797c679ba64c26f605c050ff2fbcea28c8fde924bb367a58004e1d
                                  • Opcode Fuzzy Hash: f9d3db591a4a56c82ed4ed0722d9afad7e2e42839c77d404d7b7377cf874189e
                                  • Instruction Fuzzy Hash: 33229D71D5820ADEDB11CFA9C8807EDBBF4BB0D344F19852AD2E6E2280D7789D41CB50

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 777 405745-40576b call 405a03 780 405784-40578b 777->780 781 40576d-40577f DeleteFileA 777->781 783 40578d-40578f 780->783 784 40579e-4057ae call 405f7d 780->784 782 40590e-405912 781->782 785 405795-405798 783->785 786 4058bc-4058c1 783->786 792 4057b0-4057bb lstrcatA 784->792 793 4057bd-4057be call 40595c 784->793 785->784 785->786 786->782 788 4058c3-4058c6 786->788 790 4058d0-4058d8 call 406280 788->790 791 4058c8-4058ce 788->791 790->782 801 4058da-4058ee call 405915 call 4056fd 790->801 791->782 795 4057c3-4057c6 792->795 793->795 797 4057d1-4057d7 lstrcatA 795->797 798 4057c8-4057cf 795->798 800 4057dc-4057fa lstrlenA FindFirstFileA 797->800 798->797 798->800 802 405800-405817 call 405940 800->802 803 4058b2-4058b6 800->803 816 4058f0-4058f3 801->816 817 405906-405909 call 4050a4 801->817 810 405822-405825 802->810 811 405819-40581d 802->811 803->786 805 4058b8 803->805 805->786 814 405827-40582c 810->814 815 405838-405846 call 405f7d 810->815 811->810 813 40581f 811->813 813->810 820 405891-4058a3 FindNextFileA 814->820 821 40582e-405830 814->821 827 405848-405850 815->827 828 40585d-405868 call 4056fd 815->828 816->791 818 4058f5-405904 call 4050a4 call 405d5c 816->818 817->782 818->782 820->802 824 4058a9-4058ac FindClose 820->824 821->815 825 405832-405836 821->825 824->803 825->815 825->820 827->820 830 405852-40585b call 405745 827->830 837 405889-40588c call 4050a4 828->837 838 40586a-40586d 828->838 830->820 837->820 839 405881-405887 838->839 840 40586f-40587f call 4050a4 call 405d5c 838->840 839->820 840->820
                                  APIs
                                  • DeleteFileA.KERNELBASE(?,?,759B3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040576E
                                  • lstrcatA.KERNEL32(007A0548,\*.*,007A0548,?,?,759B3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057B6
                                  • lstrcatA.KERNEL32(?,0040A014,?,007A0548,?,?,759B3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057D7
                                  • lstrlenA.KERNEL32(?,?,0040A014,?,007A0548,?,?,759B3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057DD
                                  • FindFirstFileA.KERNEL32(007A0548,?,?,?,0040A014,?,007A0548,?,?,759B3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057EE
                                  • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 0040589B
                                  • FindClose.KERNEL32(00000000), ref: 004058AC
                                  Strings
                                  • "C:\Users\user\Desktop\Calyciform.exe", xrefs: 00405745
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405752
                                  • \*.*, xrefs: 004057B0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                  • String ID: "C:\Users\user\Desktop\Calyciform.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                  • API String ID: 2035342205-3983645626
                                  • Opcode ID: 7c997698bd92b054754dbd9e87a557b423d2768d503f37e0b7d96f013d030dcb
                                  • Instruction ID: 8fe5727fece67214ca9e537269006626f4bb6c92c430407bbf8d6e8d58a7b1f2
                                  • Opcode Fuzzy Hash: 7c997698bd92b054754dbd9e87a557b423d2768d503f37e0b7d96f013d030dcb
                                  • Instruction Fuzzy Hash: 6A51C131800A09AADF217B218C85BBF7A78DF42714F14817FF855B51D2D73C8952DE69
                                  APIs
                                  • FindFirstFileA.KERNELBASE(759B3410,007A0D90,C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,00405A46,C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,759B3410,?,C:\Users\user\AppData\Local\Temp\,00405765,?,759B3410,C:\Users\user\AppData\Local\Temp\), ref: 0040628B
                                  • FindClose.KERNEL32(00000000), ref: 00406297
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp, xrefs: 00406280
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: Find$CloseFileFirst
                                  • String ID: C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp
                                  • API String ID: 2295610775-3793470382
                                  • Opcode ID: c24f07e19fd736ab640c4fa4be5052e5aaef0f0ac654c0d60e62e1f7b242b1f9
                                  • Instruction ID: 649fadc54739959b3e8e38c8a8f4dd54304d89d7bf2914afa8982a1acff588dd
                                  • Opcode Fuzzy Hash: c24f07e19fd736ab640c4fa4be5052e5aaef0f0ac654c0d60e62e1f7b242b1f9
                                  • Instruction Fuzzy Hash: E0D012729051205FCA006778AE0C84B7A589F46370B114B7AB4AAF15E0CA788C7286D8

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 256 403b48-403b5a 257 403b60-403b66 256->257 258 403c9b-403caa 256->258 257->258 259 403b6c-403b75 257->259 260 403cf9-403d0e 258->260 261 403cac-403cf4 GetDlgItem * 2 call 40401c SetClassLongA call 40140b 258->261 265 403b77-403b84 SetWindowPos 259->265 266 403b8a-403b8d 259->266 263 403d10-403d13 260->263 264 403d4e-403d53 call 404068 260->264 261->260 270 403d15-403d20 call 401389 263->270 271 403d46-403d48 263->271 278 403d58-403d73 264->278 265->266 267 403ba7-403bad 266->267 268 403b8f-403ba1 ShowWindow 266->268 273 403bc9-403bcc 267->273 274 403baf-403bc4 DestroyWindow 267->274 268->267 270->271 292 403d22-403d41 SendMessageA 270->292 271->264 277 403fe9 271->277 282 403bce-403bda SetWindowLongA 273->282 283 403bdf-403be5 273->283 279 403fc6-403fcc 274->279 281 403feb-403ff2 277->281 285 403d75-403d77 call 40140b 278->285 286 403d7c-403d82 278->286 279->277 287 403fce-403fd4 279->287 282->281 290 403c88-403c96 call 404083 283->290 291 403beb-403bfc GetDlgItem 283->291 285->286 288 403fa7-403fc0 DestroyWindow EndDialog 286->288 289 403d88-403d93 286->289 287->277 294 403fd6-403fdf ShowWindow 287->294 288->279 289->288 295 403d99-403de6 call 405f9f call 40401c * 3 GetDlgItem 289->295 290->281 296 403c1b-403c1e 291->296 297 403bfe-403c15 SendMessageA IsWindowEnabled 291->297 292->281 294->277 326 403df0-403e2c ShowWindow KiUserCallbackDispatcher call 40403e EnableWindow 295->326 327 403de8-403ded 295->327 300 403c20-403c21 296->300 301 403c23-403c26 296->301 297->277 297->296 304 403c51-403c56 call 403ff5 300->304 305 403c34-403c39 301->305 306 403c28-403c2e 301->306 304->290 310 403c6f-403c82 SendMessageA 305->310 311 403c3b-403c41 305->311 309 403c30-403c32 306->309 306->310 309->304 310->290 314 403c43-403c49 call 40140b 311->314 315 403c58-403c61 call 40140b 311->315 322 403c4f 314->322 315->290 324 403c63-403c6d 315->324 322->304 324->322 330 403e31 326->330 331 403e2e-403e2f 326->331 327->326 332 403e33-403e61 GetSystemMenu EnableMenuItem SendMessageA 330->332 331->332 333 403e63-403e74 SendMessageA 332->333 334 403e76 332->334 335 403e7c-403eb6 call 404051 call 403b29 call 405f7d lstrlenA call 405f9f SetWindowTextA call 401389 333->335 334->335 335->278 346 403ebc-403ebe 335->346 346->278 347 403ec4-403ec8 346->347 348 403ee7-403efb DestroyWindow 347->348 349 403eca-403ed0 347->349 348->279 351 403f01-403f2e CreateDialogParamA 348->351 349->277 350 403ed6-403edc 349->350 350->278 352 403ee2 350->352 351->279 353 403f34-403f8b call 40401c GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 351->353 352->277 353->277 358 403f8d-403fa5 ShowWindow call 404068 353->358 358->279
                                  APIs
                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403B84
                                  • ShowWindow.USER32(?), ref: 00403BA1
                                  • DestroyWindow.USER32 ref: 00403BB5
                                  • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403BD1
                                  • GetDlgItem.USER32(?,?), ref: 00403BF2
                                  • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403C06
                                  • IsWindowEnabled.USER32(00000000), ref: 00403C0D
                                  • GetDlgItem.USER32(?,00000001), ref: 00403CBB
                                  • GetDlgItem.USER32(?,00000002), ref: 00403CC5
                                  • SetClassLongA.USER32(?,000000F2,?), ref: 00403CDF
                                  • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403D30
                                  • GetDlgItem.USER32(?,00000003), ref: 00403DD6
                                  • ShowWindow.USER32(00000000,?), ref: 00403DF7
                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403E09
                                  • EnableWindow.USER32(?,?), ref: 00403E24
                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403E3A
                                  • EnableMenuItem.USER32(00000000), ref: 00403E41
                                  • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403E59
                                  • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403E6C
                                  • lstrlenA.KERNEL32(0079F540,?,0079F540,00000000), ref: 00403E96
                                  • SetWindowTextA.USER32(?,0079F540), ref: 00403EA5
                                  • ShowWindow.USER32(?,0000000A), ref: 00403FD9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                  • String ID:
                                  • API String ID: 3282139019-0
                                  • Opcode ID: 15b6375a1e693d3e2cd3c5fe237b60442a4c361cd33fb8cff5c4eaa7748e9161
                                  • Instruction ID: be3397b8ddd8732ae82b8f0fff634cab03aa6bc43632f84706db7e79d14484ee
                                  • Opcode Fuzzy Hash: 15b6375a1e693d3e2cd3c5fe237b60442a4c361cd33fb8cff5c4eaa7748e9161
                                  • Instruction Fuzzy Hash: CEC1C271504600AFEB216F65ED85E2B3ABCEB85706F00453EF641B11F2CB3D9A429B6D

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 361 4037ab-4037c3 call 406315 364 4037c5-4037d5 call 405edb 361->364 365 4037d7-403808 call 405e64 361->365 374 40382b-403854 call 403a70 call 405a03 364->374 369 403820-403826 lstrcatA 365->369 370 40380a-40381b call 405e64 365->370 369->374 370->369 379 40385a-40385f 374->379 380 4038db-4038e3 call 405a03 374->380 379->380 381 403861-403885 call 405e64 379->381 385 4038f1-403916 LoadImageA 380->385 386 4038e5-4038ec call 405f9f 380->386 381->380 388 403887-403889 381->388 390 403997-40399f call 40140b 385->390 391 403918-403948 RegisterClassA 385->391 386->385 392 40389a-4038a6 lstrlenA 388->392 393 40388b-403898 call 405940 388->393 404 4039a1-4039a4 390->404 405 4039a9-4039b4 call 403a70 390->405 394 403a66 391->394 395 40394e-403992 SystemParametersInfoA CreateWindowExA 391->395 399 4038a8-4038b6 lstrcmpiA 392->399 400 4038ce-4038d6 call 405915 call 405f7d 392->400 393->392 398 403a68-403a6f 394->398 395->390 399->400 403 4038b8-4038c2 GetFileAttributesA 399->403 400->380 407 4038c4-4038c6 403->407 408 4038c8-4038c9 call 40595c 403->408 404->398 414 4039ba-4039d4 ShowWindow call 4062a7 405->414 415 403a3d-403a45 call 405176 405->415 407->400 407->408 408->400 420 4039e0-4039f2 GetClassInfoA 414->420 421 4039d6-4039db call 4062a7 414->421 422 403a47-403a4d 415->422 423 403a5f-403a61 call 40140b 415->423 426 4039f4-403a04 GetClassInfoA RegisterClassA 420->426 427 403a0a-403a2d DialogBoxParamA call 40140b 420->427 421->420 422->404 428 403a53-403a5a call 40140b 422->428 423->394 426->427 431 403a32-403a3b call 4036fb 427->431 428->404 431->398
                                  APIs
                                    • Part of subcall function 00406315: GetModuleHandleA.KERNEL32(?,?,?,0040325C,0000000A), ref: 00406327
                                    • Part of subcall function 00406315: GetProcAddress.KERNEL32(00000000,?), ref: 00406342
                                  • lstrcatA.KERNEL32(1033,0079F540,80000001,Control Panel\Desktop\ResourceLocale,00000000,0079F540,00000000,00000002,759B3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Calyciform.exe",00000000), ref: 00403826
                                  • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Puerperant,1033,0079F540,80000001,Control Panel\Desktop\ResourceLocale,00000000,0079F540,00000000,00000002,759B3410), ref: 0040389B
                                  • lstrcmpiA.KERNEL32(?,.exe), ref: 004038AE
                                  • GetFileAttributesA.KERNEL32(Call), ref: 004038B9
                                  • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Puerperant), ref: 00403902
                                    • Part of subcall function 00405EDB: wsprintfA.USER32 ref: 00405EE8
                                  • RegisterClassA.USER32(007A26E0), ref: 0040393F
                                  • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403957
                                  • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 0040398C
                                  • ShowWindow.USER32(00000005,00000000), ref: 004039C2
                                  • GetClassInfoA.USER32(00000000,RichEdit20A,007A26E0), ref: 004039EE
                                  • GetClassInfoA.USER32(00000000,RichEdit,007A26E0), ref: 004039FB
                                  • RegisterClassA.USER32(007A26E0), ref: 00403A04
                                  • DialogBoxParamA.USER32(?,00000000,00403B48,00000000), ref: 00403A23
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                  • String ID: "C:\Users\user\Desktop\Calyciform.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Puerperant$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$&z
                                  • API String ID: 1975747703-213470910
                                  • Opcode ID: 1cb86479f1a3a0086ce9388ac0fb28c5fcde83020396cc1e7e21ed7e12b3b041
                                  • Instruction ID: e7770fced47558190ba49eb26abf7833ec0de161341021374fa99cdfb8efac44
                                  • Opcode Fuzzy Hash: 1cb86479f1a3a0086ce9388ac0fb28c5fcde83020396cc1e7e21ed7e12b3b041
                                  • Instruction Fuzzy Hash: 6D61B471240600BED610AF659D46F3B3AACDB85749F00857FF981B62E2DB7D9D028B2D

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 435 402d63-402db1 GetTickCount GetModuleFileNameA call 405b16 438 402db3-402db8 435->438 439 402dbd-402deb call 405f7d call 40595c call 405f7d GetFileSize 435->439 440 402f95-402f99 438->440 447 402df1 439->447 448 402ed8-402ee6 call 402cff 439->448 450 402df6-402e0d 447->450 454 402ee8-402eeb 448->454 455 402f3b-402f40 448->455 452 402e11-402e1a call 40318b 450->452 453 402e0f 450->453 461 402e20-402e27 452->461 462 402f42-402f4a call 402cff 452->462 453->452 457 402eed-402f05 call 4031a1 call 40318b 454->457 458 402f0f-402f39 GlobalAlloc call 4031a1 call 402f9c 454->458 455->440 457->455 483 402f07-402f0d 457->483 458->455 481 402f4c-402f5d 458->481 466 402ea3-402ea7 461->466 467 402e29-402e3d call 405ad1 461->467 462->455 471 402eb1-402eb7 466->471 472 402ea9-402eb0 call 402cff 466->472 467->471 486 402e3f-402e46 467->486 478 402ec6-402ed0 471->478 479 402eb9-402ec3 call 4063cc 471->479 472->471 478->450 482 402ed6 478->482 479->478 488 402f65-402f6a 481->488 489 402f5f 481->489 482->448 483->455 483->458 486->471 487 402e48-402e4f 486->487 487->471 491 402e51-402e58 487->491 492 402f6b-402f71 488->492 489->488 491->471 493 402e5a-402e61 491->493 492->492 494 402f73-402f8e SetFilePointer call 405ad1 492->494 493->471 495 402e63-402e83 493->495 498 402f93 494->498 495->455 497 402e89-402e8d 495->497 499 402e95-402e9d 497->499 500 402e8f-402e93 497->500 498->440 499->471 501 402e9f-402ea1 499->501 500->482 500->499 501->471
                                  APIs
                                  • GetTickCount.KERNEL32 ref: 00402D74
                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\Calyciform.exe,00000400), ref: 00402D90
                                    • Part of subcall function 00405B16: GetFileAttributesA.KERNELBASE(00000003,00402DA3,C:\Users\user\Desktop\Calyciform.exe,80000000,00000003), ref: 00405B1A
                                    • Part of subcall function 00405B16: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B3C
                                  • GetFileSize.KERNEL32(00000000,00000000,007AB000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Calyciform.exe,C:\Users\user\Desktop\Calyciform.exe,80000000,00000003), ref: 00402DDC
                                  Strings
                                  • Error launching installer, xrefs: 00402DB3
                                  • C:\Users\user\Desktop\Calyciform.exe, xrefs: 00402D7A, 00402D89, 00402D9D, 00402DBD
                                  • Null, xrefs: 00402E5A
                                  • "C:\Users\user\Desktop\Calyciform.exe", xrefs: 00402D63
                                  • C:\Users\user\Desktop, xrefs: 00402DBE, 00402DC3, 00402DC9
                                  • soft, xrefs: 00402E51
                                  • Inst, xrefs: 00402E48
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00402D6A
                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402F3B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: File$AttributesCountCreateModuleNameSizeTick
                                  • String ID: "C:\Users\user\Desktop\Calyciform.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Calyciform.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                  • API String ID: 4283519449-3135735621
                                  • Opcode ID: 8e9a191421aba4a3439459f77b6fce6800917911843336c3de020814a67cc7e1
                                  • Instruction ID: e7e10bf14dd6c84c423c7e0fea7576ec82b222124ef8da9379000f3ec2b80706
                                  • Opcode Fuzzy Hash: 8e9a191421aba4a3439459f77b6fce6800917911843336c3de020814a67cc7e1
                                  • Instruction Fuzzy Hash: 7151D371940215AFDB119F64DE89A5F7BB8EB04368F10413BF904B62D1D7BC8E818B9D

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 715 405f9f-405faa 716 405fac-405fbb 715->716 717 405fbd-405fd3 715->717 716->717 718 4061c4-4061c8 717->718 719 405fd9-405fe4 717->719 720 405ff6-406000 718->720 721 4061ce-4061d8 718->721 719->718 722 405fea-405ff1 719->722 720->721 725 406006-40600d 720->725 723 4061e3-4061e4 721->723 724 4061da-4061de call 405f7d 721->724 722->718 724->723 726 406013-406047 725->726 727 4061b7 725->727 729 406164-406167 726->729 730 40604d-406057 726->730 731 4061c1-4061c3 727->731 732 4061b9-4061bf 727->732 735 406197-40619a 729->735 736 406169-40616c 729->736 733 406071 730->733 734 406059-40605d 730->734 731->718 732->718 740 406078-40607f 733->740 734->733 737 40605f-406063 734->737 741 4061a8-4061b5 lstrlenA 735->741 742 40619c-4061a3 call 405f9f 735->742 738 40617c-406188 call 405f7d 736->738 739 40616e-40617a call 405edb 736->739 737->733 743 406065-406069 737->743 753 40618d-406193 738->753 739->753 745 406081-406083 740->745 746 406084-406086 740->746 741->718 742->741 743->733 749 40606b-40606f 743->749 745->746 751 406088-4060ab call 405e64 746->751 752 4060bf-4060c2 746->752 749->740 765 4060b1-4060ba call 405f9f 751->765 766 40614b-40614f 751->766 754 4060d2-4060d5 752->754 755 4060c4-4060d0 GetSystemDirectoryA 752->755 753->741 757 406195 753->757 759 406142-406144 754->759 760 4060d7-4060e5 GetWindowsDirectoryA 754->760 758 406146-406149 755->758 762 40615c-406162 call 4061e7 757->762 758->762 758->766 759->758 764 4060e7-4060f1 759->764 760->759 762->741 768 4060f3-4060f6 764->768 769 40610b-406121 SHGetSpecialFolderLocation 764->769 765->758 766->762 771 406151-406157 lstrcatA 766->771 768->769 772 4060f8-4060ff 768->772 773 406123-40613d SHGetPathFromIDListA CoTaskMemFree 769->773 774 40613f 769->774 771->762 776 406107-406109 772->776 773->758 773->774 774->759 776->758 776->769
                                  APIs
                                  • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 004060CA
                                  • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,0079ED20,00000000,004050DC,0079ED20,00000000), ref: 004060DD
                                  • SHGetSpecialFolderLocation.SHELL32(004050DC,759B23A0,?,0079ED20,00000000,004050DC,0079ED20,00000000), ref: 00406119
                                  • SHGetPathFromIDListA.SHELL32(759B23A0,Call), ref: 00406127
                                  • CoTaskMemFree.OLE32(759B23A0), ref: 00406133
                                  • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00406157
                                  • lstrlenA.KERNEL32(Call,?,0079ED20,00000000,004050DC,0079ED20,00000000,00000000,00790EF8,759B23A0), ref: 004061A9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                  • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$user32::CallWindowProcW(ir1 ,i 0,i 0, i 0, i 0)
                                  • API String ID: 717251189-3408574989
                                  • Opcode ID: 11b5917a9e638ace321be4f5325a6bdc22aaa804cea597cb4274c203d9df8917
                                  • Instruction ID: 0b63f41bbf951af37742be8a6cb34bbd05ef536143463fead8fbb104fcb9049a
                                  • Opcode Fuzzy Hash: 11b5917a9e638ace321be4f5325a6bdc22aaa804cea597cb4274c203d9df8917
                                  • Instruction Fuzzy Hash: C861E371904105AEEF119F24CC84BBE7BB59B46314F16813FE903BA2D2D67D49A2CB4A

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 846 401759-40177c call 402acb call 405982 851 401786-401798 call 405f7d call 405915 lstrcatA 846->851 852 40177e-401784 call 405f7d 846->852 857 40179d-4017a3 call 4061e7 851->857 852->857 862 4017a8-4017ac 857->862 863 4017ae-4017b8 call 406280 862->863 864 4017df-4017e2 862->864 871 4017ca-4017dc 863->871 872 4017ba-4017c8 CompareFileTime 863->872 865 4017e4-4017e5 call 405af1 864->865 866 4017ea-401806 call 405b16 864->866 865->866 874 401808-40180b 866->874 875 40187e-4018a7 call 4050a4 call 402f9c 866->875 871->864 872->871 876 401860-40186a call 4050a4 874->876 877 40180d-40184f call 405f7d * 2 call 405f9f call 405f7d call 405699 874->877 887 4018a9-4018ad 875->887 888 4018af-4018bb SetFileTime 875->888 889 401873-401879 876->889 877->862 910 401855-401856 877->910 887->888 891 4018c1-4018cc CloseHandle 887->891 888->891 892 402960 889->892 895 4018d2-4018d5 891->895 896 402957-40295a 891->896 897 402962-402966 892->897 899 4018d7-4018e8 call 405f9f lstrcatA 895->899 900 4018ea-4018ed call 405f9f 895->900 896->892 906 4018f2-4022ec call 405699 899->906 900->906 906->897 910->889 912 401858-401859 910->912 912->876
                                  APIs
                                  • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Puerperant,00000000,00000000,00000031), ref: 00401798
                                  • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Puerperant,00000000,00000000,00000031), ref: 004017C2
                                    • Part of subcall function 00405F7D: lstrcpynA.KERNEL32(?,?,00000400,004032BB,Burseraceae Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 00405F8A
                                    • Part of subcall function 004050A4: lstrlenA.KERNEL32(0079ED20,00000000,00790EF8,759B23A0,?,?,?,?,?,?,?,?,?,004030D4,00000000,?), ref: 004050DD
                                    • Part of subcall function 004050A4: lstrlenA.KERNEL32(004030D4,0079ED20,00000000,00790EF8,759B23A0,?,?,?,?,?,?,?,?,?,004030D4,00000000), ref: 004050ED
                                    • Part of subcall function 004050A4: lstrcatA.KERNEL32(0079ED20,004030D4,004030D4,0079ED20,00000000,00790EF8,759B23A0), ref: 00405100
                                    • Part of subcall function 004050A4: SetWindowTextA.USER32(0079ED20,0079ED20), ref: 00405112
                                    • Part of subcall function 004050A4: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405138
                                    • Part of subcall function 004050A4: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405152
                                    • Part of subcall function 004050A4: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405160
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                  • String ID: C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp$C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp\System.dll$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Puerperant$Call$user32::CallWindowProcW(ir1 ,i 0,i 0, i 0, i 0)
                                  • API String ID: 1941528284-2300961305
                                  • Opcode ID: 695578334c0ee4be37e012e58be7f92549580ca5109cbc41cb3716ec475ee65c
                                  • Instruction ID: 3f5d23f0505a0c405a30723695d383d48bc8799a0a07943a114376d49cde1fe8
                                  • Opcode Fuzzy Hash: 695578334c0ee4be37e012e58be7f92549580ca5109cbc41cb3716ec475ee65c
                                  • Instruction Fuzzy Hash: B841B471900519BACF10BBB5CC46DAF76B9DF41368B20823BF522F11E1D67C8A419A6E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 913 402003-40200f 914 402015-40202b call 402acb * 2 913->914 915 4020ca-4020cc 913->915 925 40203a-402048 LoadLibraryExA 914->925 926 40202d-402038 GetModuleHandleA 914->926 917 40223d-402242 call 401423 915->917 923 402957-402966 917->923 924 40271c-402723 917->924 924->923 928 40204a-402057 GetProcAddress 925->928 929 4020c3-4020c5 925->929 926->925 926->928 931 402096-40209b call 4050a4 928->931 932 402059-40205f 928->932 929->917 936 4020a0-4020a3 931->936 934 402061-40206d call 401423 932->934 935 402078-40208f call 6d6a16df 932->935 934->936 944 40206f-402076 934->944 938 402091-402094 935->938 936->923 939 4020a9-4020b1 call 40374b 936->939 938->936 939->923 945 4020b7-4020be FreeLibrary 939->945 944->936 945->923
                                  APIs
                                  • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 0040202E
                                    • Part of subcall function 004050A4: lstrlenA.KERNEL32(0079ED20,00000000,00790EF8,759B23A0,?,?,?,?,?,?,?,?,?,004030D4,00000000,?), ref: 004050DD
                                    • Part of subcall function 004050A4: lstrlenA.KERNEL32(004030D4,0079ED20,00000000,00790EF8,759B23A0,?,?,?,?,?,?,?,?,?,004030D4,00000000), ref: 004050ED
                                    • Part of subcall function 004050A4: lstrcatA.KERNEL32(0079ED20,004030D4,004030D4,0079ED20,00000000,00790EF8,759B23A0), ref: 00405100
                                    • Part of subcall function 004050A4: SetWindowTextA.USER32(0079ED20,0079ED20), ref: 00405112
                                    • Part of subcall function 004050A4: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405138
                                    • Part of subcall function 004050A4: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405152
                                    • Part of subcall function 004050A4: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405160
                                  • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 0040203E
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 0040204E
                                  • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 004020B8
                                  Strings
                                  • user32::CallWindowProcW(ir1 ,i 0,i 0, i 0, i 0), xrefs: 00402082
                                  • /z, xrefs: 00402078
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                  • String ID: user32::CallWindowProcW(ir1 ,i 0,i 0, i 0, i 0)$/z
                                  • API String ID: 2987980305-1879690062
                                  • Opcode ID: 239d6c2453c16f58a6829d86e1aa364e9ad80bd048853c2d37ac0b8ed1dd3d16
                                  • Instruction ID: d65959635370e5528591cca9a5c3cbe7578547ab5d5b00e4bd8bf8e39d7723e8
                                  • Opcode Fuzzy Hash: 239d6c2453c16f58a6829d86e1aa364e9ad80bd048853c2d37ac0b8ed1dd3d16
                                  • Instruction Fuzzy Hash: 8121D871A00215BBCF207FA48E4DBAE76A0AF55318F20413BF611B21D0CBBD4A42D66E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 947 40556a-4055b5 CreateDirectoryA 948 4055b7-4055b9 947->948 949 4055bb-4055c8 GetLastError 947->949 950 4055e2-4055e4 948->950 949->950 951 4055ca-4055de SetFileSecurityA 949->951 951->948 952 4055e0 GetLastError 951->952 952->950
                                  APIs
                                  • CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004055AD
                                  • GetLastError.KERNEL32 ref: 004055C1
                                  • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 004055D6
                                  • GetLastError.KERNEL32 ref: 004055E0
                                  Strings
                                  • C:\Users\user\Desktop, xrefs: 0040556A
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405590
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CreateDirectoryFileSecurity
                                  • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                                  • API String ID: 3449924974-26219170
                                  • Opcode ID: 5ed0d1f38f2075833211856a8ebf7d2689aced5b3dcb66e6179e3f4d9a7ce916
                                  • Instruction ID: d60ac603840848199a7fa56c8eddcf59aef149659cba7d951691f3973700b38f
                                  • Opcode Fuzzy Hash: 5ed0d1f38f2075833211856a8ebf7d2689aced5b3dcb66e6179e3f4d9a7ce916
                                  • Instruction Fuzzy Hash: 48010871C00219EAEF019BA1CD087EFBBB9EF14354F10813AD545B6290D7789648CFA9

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 953 4062a7-4062c7 GetSystemDirectoryA 954 4062c9 953->954 955 4062cb-4062cd 953->955 954->955 956 4062dd-4062df 955->956 957 4062cf-4062d7 955->957 958 4062e0-406312 wsprintfA LoadLibraryExA 956->958 957->956 959 4062d9-4062db 957->959 959->958
                                  APIs
                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004062BE
                                  • wsprintfA.USER32 ref: 004062F7
                                  • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 0040630B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                  • String ID: %s%s.dll$UXTHEME$\
                                  • API String ID: 2200240437-4240819195
                                  • Opcode ID: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                                  • Instruction ID: 791f79d561c984125f31c7fb7d360261de965b4457e35f8f8c4567f5ddaa11b7
                                  • Opcode Fuzzy Hash: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                                  • Instruction Fuzzy Hash: F0F0F630500619ABEB14AB64DD0EFEB375CAB08305F1405BEA686E10C1EAB8D8358B6C

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 960 402f9c-402fb0 961 402fb2 960->961 962 402fb9-402fc2 960->962 961->962 963 402fc4 962->963 964 402fcb-402fd0 962->964 963->964 965 402fe0-402fed call 40318b 964->965 966 402fd2-402fdb call 4031a1 964->966 970 402ff3-402ff7 965->970 971 403179 965->971 966->965 972 403124-403126 970->972 973 402ffd-403023 GetTickCount 970->973 974 40317b-40317c 971->974 978 403166-403169 972->978 979 403128-40312b 972->979 975 403181 973->975 976 403029-403031 973->976 977 403184-403188 974->977 975->977 980 403033 976->980 981 403036-403044 call 40318b 976->981 982 40316b 978->982 983 40316e-403177 call 40318b 978->983 979->975 984 40312d 979->984 980->981 981->971 993 40304a-403053 981->993 982->983 983->971 994 40317e 983->994 985 403130-403136 984->985 988 403138 985->988 989 40313a-403148 call 40318b 985->989 988->989 989->971 997 40314a-40314f call 405bbd 989->997 996 403059-403079 call 40643a 993->996 994->975 1002 40311c-40311e 996->1002 1003 40307f-403092 GetTickCount 996->1003 1001 403154-403156 997->1001 1004 403120-403122 1001->1004 1005 403158-403162 1001->1005 1002->974 1006 403094-40309c 1003->1006 1007 4030d7-4030d9 1003->1007 1004->974 1005->985 1010 403164 1005->1010 1011 4030a4-4030d4 MulDiv wsprintfA call 4050a4 1006->1011 1012 40309e-4030a2 1006->1012 1008 403110-403114 1007->1008 1009 4030db-4030df 1007->1009 1008->976 1015 40311a 1008->1015 1013 4030e1-4030e8 call 405bbd 1009->1013 1014 4030f6-403101 1009->1014 1010->975 1011->1007 1012->1007 1012->1011 1020 4030ed-4030ef 1013->1020 1018 403104-403108 1014->1018 1015->975 1018->996 1021 40310e 1018->1021 1020->1004 1022 4030f1-4030f4 1020->1022 1021->975 1022->1018
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: CountTick$wsprintf
                                  • String ID: ... %d%%
                                  • API String ID: 551687249-2449383134
                                  • Opcode ID: 13a642c4274617a414d88f58a4bd63043f719dcf11f9aa526733c2ab21188e3c
                                  • Instruction ID: a5b3666d5e6f2648317cea794876ab8fd5a8a7e10cba6e045702c7ef747b340d
                                  • Opcode Fuzzy Hash: 13a642c4274617a414d88f58a4bd63043f719dcf11f9aa526733c2ab21188e3c
                                  • Instruction Fuzzy Hash: A6518E72901219ABCF10DF65DA44A9F7BB8EF08756F14413BE900BB2D0C7789E51CBA9

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1023 405b45-405b4f 1024 405b50-405b7b GetTickCount GetTempFileNameA 1023->1024 1025 405b8a-405b8c 1024->1025 1026 405b7d-405b7f 1024->1026 1028 405b84-405b87 1025->1028 1026->1024 1027 405b81 1026->1027 1027->1028
                                  APIs
                                  • GetTickCount.KERNEL32 ref: 00405B59
                                  • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405B73
                                  Strings
                                  • nsa, xrefs: 00405B50
                                  • "C:\Users\user\Desktop\Calyciform.exe", xrefs: 00405B45
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B48
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: CountFileNameTempTick
                                  • String ID: "C:\Users\user\Desktop\Calyciform.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                  • API String ID: 1716503409-1820811630
                                  • Opcode ID: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                                  • Instruction ID: e9fbc8f02783c34a78cbc278a62deb557e4d22a3c76f63b2365399c79cbf5e20
                                  • Opcode Fuzzy Hash: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                                  • Instruction Fuzzy Hash: A0F082363042086BDB109F56ED04BAB7BA9DFA1760F14803BFA489B280D6B4A9548B58

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1029 6d6a16df-6d6a171b call 6d6a1a9c 1033 6d6a1838-6d6a183a 1029->1033 1034 6d6a1721-6d6a1725 1029->1034 1035 6d6a172e-6d6a173b call 6d6a22b5 1034->1035 1036 6d6a1727-6d6a172d call 6d6a2273 1034->1036 1041 6d6a176b-6d6a1772 1035->1041 1042 6d6a173d-6d6a1742 1035->1042 1036->1035 1043 6d6a1792-6d6a1796 1041->1043 1044 6d6a1774-6d6a1790 call 6d6a249c call 6d6a1559 call 6d6a1266 GlobalFree 1041->1044 1045 6d6a175d-6d6a1760 1042->1045 1046 6d6a1744-6d6a1745 1042->1046 1050 6d6a1798-6d6a17de call 6d6a156b call 6d6a249c 1043->1050 1051 6d6a17e0-6d6a17e6 call 6d6a249c 1043->1051 1067 6d6a17e7-6d6a17eb 1044->1067 1045->1041 1052 6d6a1762-6d6a1763 call 6d6a2c7b 1045->1052 1048 6d6a174d-6d6a174e call 6d6a29c0 1046->1048 1049 6d6a1747-6d6a1748 1046->1049 1063 6d6a1753 1048->1063 1055 6d6a174a-6d6a174b 1049->1055 1056 6d6a1755-6d6a175b call 6d6a2676 1049->1056 1050->1067 1051->1067 1060 6d6a1768 1052->1060 1055->1041 1055->1048 1066 6d6a176a 1056->1066 1060->1066 1063->1060 1066->1041 1071 6d6a1828-6d6a182f 1067->1071 1072 6d6a17ed-6d6a17fb call 6d6a2462 1067->1072 1071->1033 1077 6d6a1831-6d6a1832 GlobalFree 1071->1077 1079 6d6a17fd-6d6a1800 1072->1079 1080 6d6a1813-6d6a181a 1072->1080 1077->1033 1079->1080 1081 6d6a1802-6d6a180a 1079->1081 1080->1071 1082 6d6a181c-6d6a1827 call 6d6a14e2 1080->1082 1081->1080 1083 6d6a180c-6d6a180d FreeLibrary 1081->1083 1082->1071 1083->1080
                                  APIs
                                    • Part of subcall function 6D6A1A9C: GlobalFree.KERNEL32(?), ref: 6D6A1CEB
                                    • Part of subcall function 6D6A1A9C: GlobalFree.KERNEL32(?), ref: 6D6A1CF0
                                    • Part of subcall function 6D6A1A9C: GlobalFree.KERNEL32(?), ref: 6D6A1CF5
                                  • GlobalFree.KERNEL32(00000000), ref: 6D6A178A
                                  • FreeLibrary.KERNEL32(?), ref: 6D6A180D
                                  • GlobalFree.KERNEL32(00000000), ref: 6D6A1832
                                    • Part of subcall function 6D6A2273: GlobalAlloc.KERNEL32(00000040,?), ref: 6D6A22A4
                                    • Part of subcall function 6D6A2676: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6D6A175B,00000000), ref: 6D6A2746
                                    • Part of subcall function 6D6A156B: lstrcpyA.KERNEL32(?,?,00000000,6D6A1568,?,00000000,6D6A16B7,00000000), ref: 6D6A1581
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130238628964.000000006D6A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D6A0000, based on PE: true
                                  • Associated: 00000000.00000002.130238558041.000000006D6A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.130238696820.000000006D6A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.130238759011.000000006D6A5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d6a0000_Calyciform.jbxd
                                  Similarity
                                  • API ID: Global$Free$Alloc$Librarylstrcpy
                                  • String ID:
                                  • API String ID: 1791698881-3916222277
                                  • Opcode ID: 30ce2b34f13363b85b1ce4e83d54112399f7ed2dc1f2bcde612701a9280c6b14
                                  • Instruction ID: df3d9b21aebb92067daf5f773105a3a819b12fa3a33b66ba1c86831472827bf5
                                  • Opcode Fuzzy Hash: 30ce2b34f13363b85b1ce4e83d54112399f7ed2dc1f2bcde612701a9280c6b14
                                  • Instruction Fuzzy Hash: 7841B1711442069BCB01DF65CDC4BAA37E8FF1E314F0C9424EAE99E082DB78E845C7A4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1086 4023d6-402407 call 402acb * 2 call 402b5b 1093 402957-402966 1086->1093 1094 40240d-402417 1086->1094 1096 402427-40242a 1094->1096 1097 402419-402426 call 402acb lstrlenA 1094->1097 1098 40242c-40243d call 402aa9 1096->1098 1099 40243e-402441 1096->1099 1097->1096 1098->1099 1103 402452-402466 RegSetValueExA 1099->1103 1104 402443-40244d call 402f9c 1099->1104 1108 402468 1103->1108 1109 40246b-402548 RegCloseKey 1103->1109 1104->1103 1108->1109 1109->1093 1111 40271c-402723 1109->1111 1111->1093
                                  APIs
                                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,00000023,?,00000000,00000002,00000011,00000002), ref: 00402421
                                  • RegSetValueExA.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,00000000,?,00000000,00000002,00000011,00000002), ref: 0040245E
                                  • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,00000000,?,00000000,00000002,00000011,00000002), ref: 00402542
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: CloseValuelstrlen
                                  • String ID: C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp
                                  • API String ID: 2655323295-3793470382
                                  • Opcode ID: 5c5f997e17c276601e0a937601899c64a6f9f236e5cda533efe2a351a50a9f63
                                  • Instruction ID: b9f9fe5e010ce9562f7769f0650a0fc1c691aa098229d6fee64222e6c9067592
                                  • Opcode Fuzzy Hash: 5c5f997e17c276601e0a937601899c64a6f9f236e5cda533efe2a351a50a9f63
                                  • Instruction Fuzzy Hash: 29119371E00215BEDB10EFA5DE49EAEBA74EB54318F20843BF504F71D1C6B94D419B28
                                  APIs
                                  • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C32
                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C3B
                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C5C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: Close$Enum
                                  • String ID:
                                  • API String ID: 464197530-0
                                  • Opcode ID: e80e024fca40de8deb0b9c297206eede72932d1e756bb36d88eb62ad8731df9a
                                  • Instruction ID: c4db57b0a2e4c89af525aedefa8ad358439d5fabd543c2a0248dd752bef9be78
                                  • Opcode Fuzzy Hash: e80e024fca40de8deb0b9c297206eede72932d1e756bb36d88eb62ad8731df9a
                                  • Instruction Fuzzy Hash: 16115832504109FBEF129F90CF09F9E7B69AB48390F104032BD45B51E0EBB59E11AAA8
                                  APIs
                                    • Part of subcall function 004059AE: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,?,00405A1A,C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,759B3410,?,C:\Users\user\AppData\Local\Temp\,00405765,?,759B3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004059BC
                                    • Part of subcall function 004059AE: CharNextA.USER32(00000000), ref: 004059C1
                                    • Part of subcall function 004059AE: CharNextA.USER32(00000000), ref: 004059D5
                                  • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                                    • Part of subcall function 0040556A: CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004055AD
                                  • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Puerperant,00000000,00000000,000000F0), ref: 0040163C
                                  Strings
                                  • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Puerperant, xrefs: 00401631
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                  • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Puerperant
                                  • API String ID: 1892508949-1972144218
                                  • Opcode ID: f944addbffdc5359a2d4be80e18e3c112ce2152a72db2dd5999d42c8552c2502
                                  • Instruction ID: e2f0057a106d67730eaa6cdd0667b4b20a1f2aaf6f6dd3ced09863daba4193e1
                                  • Opcode Fuzzy Hash: f944addbffdc5359a2d4be80e18e3c112ce2152a72db2dd5999d42c8552c2502
                                  • Instruction Fuzzy Hash: 5C112B31104151EBCF217BB54D418BF66B09E92324B28053FE5D1B22E3D63D4D42963F
                                  APIs
                                  • IsWindowVisible.USER32(?), ref: 00405047
                                  • CallWindowProcA.USER32(?,?,?,?), ref: 00405098
                                    • Part of subcall function 00404068: SendMessageA.USER32(00000000,00000000,00000000,00000000), ref: 0040407A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: Window$CallMessageProcSendVisible
                                  • String ID:
                                  • API String ID: 3748168415-3916222277
                                  • Opcode ID: d6227ddab35ba9883f4bf3de8d352398880cea24f9ab2b0966d31f7a69b3ea3c
                                  • Instruction ID: fa8f59a087aa50fe202e55d5174182462002e51d1c5a0d53021f2a5da998cc86
                                  • Opcode Fuzzy Hash: d6227ddab35ba9883f4bf3de8d352398880cea24f9ab2b0966d31f7a69b3ea3c
                                  • Instruction Fuzzy Hash: 99012171100608AFDF215F21DD85EAF3625EB84764F244137FA41B61D1C77A8C52DEAD
                                  APIs
                                  • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402517
                                  • RegEnumValueA.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00020019), ref: 0040252A
                                  • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,00000000,?,00000000,00000002,00000011,00000002), ref: 00402542
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: Enum$CloseValue
                                  • String ID:
                                  • API String ID: 397863658-0
                                  • Opcode ID: 4ce795806b6c34a08036df2528e62c51d3c7848a772003a22270b57cbfd3e389
                                  • Instruction ID: 518d0c9c0f1d18e9ba130a50ca70a4c0b748d884a109ef79be1f353746569a5a
                                  • Opcode Fuzzy Hash: 4ce795806b6c34a08036df2528e62c51d3c7848a772003a22270b57cbfd3e389
                                  • Instruction Fuzzy Hash: 000171B1A04205FFEB159FA99E9CEBF7A7CDF40348F10443EF145A61C0DAB84A459729
                                  APIs
                                  • RegQueryValueExA.KERNELBASE(00000000,00000000,?,?,?,?), ref: 004024A3
                                  • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,00000000,?,00000000,00000002,00000011,00000002), ref: 00402542
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: CloseQueryValue
                                  • String ID:
                                  • API String ID: 3356406503-0
                                  • Opcode ID: 62a405257dbccccdf4459e09d2506fbeb6a6094d3e10b40de752ac69d2ee2f48
                                  • Instruction ID: 16843ebe9de4b10a0f02fc33a3446f9eb73abb2b3234f807e7777e2680f676dd
                                  • Opcode Fuzzy Hash: 62a405257dbccccdf4459e09d2506fbeb6a6094d3e10b40de752ac69d2ee2f48
                                  • Instruction Fuzzy Hash: BF11E371A01205FEDF15CF64DA989AEBBB49F00348F20843FE445B72C0D6B84A81DB69
                                  APIs
                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                  • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID:
                                  • API String ID: 3850602802-0
                                  • Opcode ID: f1e14ae547b8f36b78d572cd64f3e527c113299c5085ae7931b2eb67e5d22d6e
                                  • Instruction ID: b093ac6dabfd3bf5cd98619b9c3e878c543c382afaa1261ab96434968757bf0e
                                  • Opcode Fuzzy Hash: f1e14ae547b8f36b78d572cd64f3e527c113299c5085ae7931b2eb67e5d22d6e
                                  • Instruction Fuzzy Hash: C601F4316202209FE7094B389D04B6A36A8E751354F10813FF955F65F2D678CC028B4C
                                  APIs
                                  • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033,00000002), ref: 004023A2
                                  • RegCloseKey.ADVAPI32(00000000), ref: 004023AB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: CloseDeleteValue
                                  • String ID:
                                  • API String ID: 2831762973-0
                                  • Opcode ID: ed07491808814ac3c7d265f21d5c8819d026f427cdbf96fc029232a67ca02252
                                  • Instruction ID: 8aec8fe7cd38f654026d76d8600474ef4a57e980fe65a380d0022aaa37355860
                                  • Opcode Fuzzy Hash: ed07491808814ac3c7d265f21d5c8819d026f427cdbf96fc029232a67ca02252
                                  • Instruction Fuzzy Hash: 27F09C32A00511ABD711BBE89B8EABE76A49B40314F25443FE602B71C1DAFC4D02876D
                                  APIs
                                  • ExpandEnvironmentStringsA.KERNELBASE(00000000,?,00000400,00000001), ref: 00401A31
                                  • lstrcmpA.KERNEL32(?,?,?,00000400,00000001), ref: 00401A44
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: EnvironmentExpandStringslstrcmp
                                  • String ID:
                                  • API String ID: 1938659011-0
                                  • Opcode ID: 72ef6e96795b29577b9889454cd472796f3eff7e8774e8bc8714fe491a506ca6
                                  • Instruction ID: ebe663b7bc3ba7a189a06dab4aa1d5f3cbe4965007ea0afe01e1c09fb46068e6
                                  • Opcode Fuzzy Hash: 72ef6e96795b29577b9889454cd472796f3eff7e8774e8bc8714fe491a506ca6
                                  • Instruction Fuzzy Hash: 4EF08231705241EBCB21DF659D08A9BBEE8EF91354B10843BE185F61A0D6388512CA2C
                                  APIs
                                  • ShowWindow.USER32(00000000,00000000), ref: 00401E49
                                  • EnableWindow.USER32(00000000,00000000), ref: 00401E54
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: Window$EnableShow
                                  • String ID:
                                  • API String ID: 1136574915-0
                                  • Opcode ID: ce05e9415eb1c43b57a64d345dc0c3369d7b2077b414a09edc794f77630778db
                                  • Instruction ID: d2bea1c1c0aacda3dd255fed30ad1f680590af6f3d359f9745203f9ff1fc1010
                                  • Opcode Fuzzy Hash: ce05e9415eb1c43b57a64d345dc0c3369d7b2077b414a09edc794f77630778db
                                  • Instruction Fuzzy Hash: 02E01272B04212AFDB14EBE5EA499EEB7B4DF40319B10443FE411F11D1DA7849419F5D
                                  APIs
                                  • GetModuleHandleA.KERNEL32(?,?,?,0040325C,0000000A), ref: 00406327
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00406342
                                    • Part of subcall function 004062A7: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004062BE
                                    • Part of subcall function 004062A7: wsprintfA.USER32 ref: 004062F7
                                    • Part of subcall function 004062A7: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 0040630B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                  • String ID:
                                  • API String ID: 2547128583-0
                                  • Opcode ID: 8b993a8f6eb8e905ca30c67f896f6c6ad868427c201d07e664c6abec48b1d465
                                  • Instruction ID: cd2a927f582b596fa2e162cbd064daf7ca6e898847132114174d0915a8f4e586
                                  • Opcode Fuzzy Hash: 8b993a8f6eb8e905ca30c67f896f6c6ad868427c201d07e664c6abec48b1d465
                                  • Instruction Fuzzy Hash: BCE0863260421057D61066745E0493BA3A89F94700302083EFD47F2140D73C9C3196AD
                                  APIs
                                  • GetFileAttributesA.KERNELBASE(00000003,00402DA3,C:\Users\user\Desktop\Calyciform.exe,80000000,00000003), ref: 00405B1A
                                  • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B3C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: File$AttributesCreate
                                  • String ID:
                                  • API String ID: 415043291-0
                                  • Opcode ID: 80243517f436f95d2d00e5b5224d95f101b34955670c918b0becce4e09b30ec3
                                  • Instruction ID: 6905ba7dec075751c4c8bdaf1e97cd52a4ed4154a0977e2bcfee25d1bc4df630
                                  • Opcode Fuzzy Hash: 80243517f436f95d2d00e5b5224d95f101b34955670c918b0becce4e09b30ec3
                                  • Instruction Fuzzy Hash: F5D09E31254201EFEF098F20DE16F2EBBA2EB94B00F11952CB682944E1DA715819AB19
                                  APIs
                                  • GetFileAttributesA.KERNELBASE(?,?,00405709,?,?,00000000,004058EC,?,?,?,?), ref: 00405AF6
                                  • SetFileAttributesA.KERNEL32(?,00000000), ref: 00405B0A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: AttributesFile
                                  • String ID:
                                  • API String ID: 3188754299-0
                                  • Opcode ID: d21186c4df97c8b90cedd4d9d2ae0fe59d501b3437fd2b8c2b63dc03c6f7d79a
                                  • Instruction ID: 414a467aaabbe507cf471caeb43fbb4459db83339ab651609fa67d9973c7acb5
                                  • Opcode Fuzzy Hash: d21186c4df97c8b90cedd4d9d2ae0fe59d501b3437fd2b8c2b63dc03c6f7d79a
                                  • Instruction Fuzzy Hash: 60D0C972504125AFC2103728AE0C89BBB65DB54271702CE35F8A9A26B2DB304C969A98
                                  APIs
                                  • CreateDirectoryA.KERNELBASE(?,00000000,004031DC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033FB,?,00000006,00000008,0000000A), ref: 004055ED
                                  • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 004055FB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: CreateDirectoryErrorLast
                                  • String ID:
                                  • API String ID: 1375471231-0
                                  • Opcode ID: f012ed4f2e447eb03a7c1a9074efbf4aa4d4dcf66ab1e3e2b7403bfb804529af
                                  • Instruction ID: 4c9d675ee46a87f1ce13dde1798736571a6da7ffae6fc201d3902fb2775d8c1a
                                  • Opcode Fuzzy Hash: f012ed4f2e447eb03a7c1a9074efbf4aa4d4dcf66ab1e3e2b7403bfb804529af
                                  • Instruction Fuzzy Hash: 2AC04C30204501EBD7515B31DE08B177A56AB91781F11883D618AE41B4DA358455DE2E
                                  APIs
                                  • VirtualAlloc.KERNELBASE(00000000), ref: 6D6A2A7F
                                  • GetLastError.KERNEL32 ref: 6D6A2B86
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130238628964.000000006D6A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D6A0000, based on PE: true
                                  • Associated: 00000000.00000002.130238558041.000000006D6A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.130238696820.000000006D6A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.130238759011.000000006D6A5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d6a0000_Calyciform.jbxd
                                  Similarity
                                  • API ID: AllocErrorLastVirtual
                                  • String ID:
                                  • API String ID: 497505419-0
                                  • Opcode ID: 3108a2b753b230abfe1fa6b54b29032b31683c2dec05dc748442997b5393bbb3
                                  • Instruction ID: d03fffc7f364959282952c14d148d3034d23cf52058cd17001157417100a590a
                                  • Opcode Fuzzy Hash: 3108a2b753b230abfe1fa6b54b29032b31683c2dec05dc748442997b5393bbb3
                                  • Instruction Fuzzy Hash: 4D51AE72888215EFCB309F67D850B5D77B4EB2E758F2DA42AD68CC6210DB34BC409B64
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: wsprintf
                                  • String ID:
                                  • API String ID: 2111968516-0
                                  • Opcode ID: 255e133b5fdcbc2f7a9ca64d0d55690020652cb371cb3a25a4775619f9253d8f
                                  • Instruction ID: c2a1b850aa9b93e4cbc4820df7219add1c6eba77a771e25ce3fc61ee94bd300f
                                  • Opcode Fuzzy Hash: 255e133b5fdcbc2f7a9ca64d0d55690020652cb371cb3a25a4775619f9253d8f
                                  • Instruction Fuzzy Hash: C121E770C04299BADF218BA99548AAEBF749F11314F1448BFE490B62D1C6BD8A81CF19
                                  APIs
                                  • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 004026A6
                                    • Part of subcall function 00405EDB: wsprintfA.USER32 ref: 00405EE8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: FilePointerwsprintf
                                  • String ID:
                                  • API String ID: 327478801-0
                                  • Opcode ID: 8303a16c8324cd1585bb4d8f8fd59fc2d4d610d9dc2ffc373cffb4fce9594ffb
                                  • Instruction ID: 110f2c4880f6573f93162833435315c6132d41cf51db6092c043686707d14882
                                  • Opcode Fuzzy Hash: 8303a16c8324cd1585bb4d8f8fd59fc2d4d610d9dc2ffc373cffb4fce9594ffb
                                  • Instruction Fuzzy Hash: 39E0EDB2B00116AADB01EBD5AA49CBFB768DF40318B10403BF141B50D1CA7D4A029B2D
                                  APIs
                                  • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 00402335
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: PrivateProfileStringWrite
                                  • String ID:
                                  • API String ID: 390214022-0
                                  • Opcode ID: a35f8e91713f0605e290066fe2cc807c403f3e4948e2e514c4de22b42c68f79f
                                  • Instruction ID: fc3d639ee2ba9d49225374e904560d05d066977e3d8f4235cfc91afb5433c7ac
                                  • Opcode Fuzzy Hash: a35f8e91713f0605e290066fe2cc807c403f3e4948e2e514c4de22b42c68f79f
                                  • Instruction Fuzzy Hash: 2FE012317005146BD72076B10FCE96F10989BC4308B284D3AF502761C6DDBD4D4245B9
                                  APIs
                                  • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402B7C,00000000,?,?), ref: 00405E5A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                  • Instruction ID: 33ca04e46434342caff68362b3d2cda83283301915701ba1f7808c3e8cd8b3f6
                                  • Opcode Fuzzy Hash: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                  • Instruction Fuzzy Hash: F9E0ECB211050DBEEF195F90DD0ADBB3B1DEB04344F50492EFA46E4090E6B5EA20AE78
                                  APIs
                                  • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040319E,00000000,00000000,00402FEB,000000FF,00000004,00000000,00000000,00000000), ref: 00405BA2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: FileRead
                                  • String ID:
                                  • API String ID: 2738559852-0
                                  • Opcode ID: c828ac78080eafadef002e80ceae40fa9d69551b6ff84e56452d6cc727993955
                                  • Instruction ID: a6de1eac7d35dbb408d2fa80093daaad73b751b804ef2b379125a3e319db5d80
                                  • Opcode Fuzzy Hash: c828ac78080eafadef002e80ceae40fa9d69551b6ff84e56452d6cc727993955
                                  • Instruction Fuzzy Hash: 46E0EC3221565AABEF119E559C00AEB7B6CEB05360F004476FD15E3190D6B1FA219BA4
                                  APIs
                                  • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403154,00000000,0078A0F8,000000FF,0078A0F8,000000FF,000000FF,00000004,00000000), ref: 00405BD1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                                  • Instruction ID: b26364db078b9021274dcd752d930f9f8b31cc58193ee345d62fa94dbd0509c3
                                  • Opcode Fuzzy Hash: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                                  • Instruction Fuzzy Hash: 2EE0EC3221865AABDF609E559C00AEB7B7CEB05364F044437F925EA190D631F821DBA8
                                  APIs
                                  • VirtualProtect.KERNELBASE(6D6A404C,00000004,00000040,6D6A403C), ref: 6D6A2903
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130238628964.000000006D6A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D6A0000, based on PE: true
                                  • Associated: 00000000.00000002.130238558041.000000006D6A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.130238696820.000000006D6A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.130238759011.000000006D6A5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d6a0000_Calyciform.jbxd
                                  Similarity
                                  • API ID: ProtectVirtual
                                  • String ID:
                                  • API String ID: 544645111-0
                                  • Opcode ID: 3310208b1ce33fe530ac9b938639dfa83ed19459687793c96509a7afdfe553f4
                                  • Instruction ID: bd45d40a66963d104366350c1c07b23602351b684da38597e6de719f00b2fdc8
                                  • Opcode Fuzzy Hash: 3310208b1ce33fe530ac9b938639dfa83ed19459687793c96509a7afdfe553f4
                                  • Instruction Fuzzy Hash: C7F098B1504261DFCB60CF6ACC64B0A7EF0A32E394B1A452AE1DCD7241EBB47444AB11
                                  APIs
                                  • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,0079ED20,?,?,00405E91,0079ED20,?,?,?,00000002,Call), ref: 00405E27
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: Open
                                  • String ID:
                                  • API String ID: 71445658-0
                                  • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                  • Instruction ID: 2a8135548ed97db7cee66e6f72713ae5fed4585321cbc755a00175e49ece29d7
                                  • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                  • Instruction Fuzzy Hash: B7D0EC32000209BADF115F90ED05FAB371DEB08350F004C26BE45A4091D6759530AA58
                                  APIs
                                  • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015A8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: AttributesFile
                                  • String ID:
                                  • API String ID: 3188754299-0
                                  • Opcode ID: ae5eb4e70040e39fd4e8cee9a21dba8a6012123299c742fcadf8cd6264d7fe54
                                  • Instruction ID: 6c3c7c81edca22ef1082c61e7c8c2dbb2dad1037c78d96895750c72c7df92d73
                                  • Opcode Fuzzy Hash: ae5eb4e70040e39fd4e8cee9a21dba8a6012123299c742fcadf8cd6264d7fe54
                                  • Instruction Fuzzy Hash: 81D01272704111DBCB01EBE89B489DDB7A49B40328B308537D111F21D1D6B98A45A72D
                                  APIs
                                  • SendMessageA.USER32(00000028,?,00000001,00403E81), ref: 0040405F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID:
                                  • API String ID: 3850602802-0
                                  • Opcode ID: 346968a0720bb3734bf3dae4b81c014f7857494700bdb546aecc84c256ab8e1e
                                  • Instruction ID: f42b45c65ed6a3ee6e87ec929b41dfaaf359f69b17cd9f6c2b1881eba3545dd7
                                  • Opcode Fuzzy Hash: 346968a0720bb3734bf3dae4b81c014f7857494700bdb546aecc84c256ab8e1e
                                  • Instruction Fuzzy Hash: 64B09235180A00AAEA114B00DE09F457A62A7A4701F008068B250240F1CAB200A1DB08
                                  APIs
                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402F2A,000309E4), ref: 004031AF
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                  • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                  • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                  • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                  APIs
                                  • GlobalAlloc.KERNELBASE(00000040,6D6A1233,?,6D6A12CF,-6D6A404B,6D6A11AB,-000000A0), ref: 6D6A121D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130238628964.000000006D6A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D6A0000, based on PE: true
                                  • Associated: 00000000.00000002.130238558041.000000006D6A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.130238696820.000000006D6A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.130238759011.000000006D6A5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d6a0000_Calyciform.jbxd
                                  Similarity
                                  • API ID: AllocGlobal
                                  • String ID:
                                  • API String ID: 3761449716-0
                                  • Opcode ID: cacb47391f0058fb2ec7786e60204e82fdcd19f79bafb7d9837a3a5791711cd2
                                  • Instruction ID: e4ba902bdc1968fac0dcb4fd1b8bd9cbba5eb848a8650f6b02d60bfb381ea045
                                  • Opcode Fuzzy Hash: cacb47391f0058fb2ec7786e60204e82fdcd19f79bafb7d9837a3a5791711cd2
                                  • Instruction Fuzzy Hash: A4A00271944120DBDF419BE2CE2AF1C3B31E74E701F0AC080E39954194CBB57010EB36
                                  APIs
                                  • GetDlgItem.USER32(?,00000403), ref: 00405241
                                  • GetDlgItem.USER32(?,000003EE), ref: 00405250
                                  • GetClientRect.USER32(?,?), ref: 0040528D
                                  • GetSystemMetrics.USER32(00000002), ref: 00405294
                                  • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004052B5
                                  • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004052C6
                                  • SendMessageA.USER32(?,00001001,00000000,?), ref: 004052D9
                                  • SendMessageA.USER32(?,00001026,00000000,?), ref: 004052E7
                                  • SendMessageA.USER32(?,00001024,00000000,?), ref: 004052FA
                                  • ShowWindow.USER32(00000000,?,0000001B,?), ref: 0040531C
                                  • ShowWindow.USER32(?,00000008), ref: 00405330
                                  • GetDlgItem.USER32(?,000003EC), ref: 00405351
                                  • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405361
                                  • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 0040537A
                                  • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 00405386
                                  • GetDlgItem.USER32(?,000003F8), ref: 0040525F
                                    • Part of subcall function 00404051: SendMessageA.USER32(00000028,?,00000001,00403E81), ref: 0040405F
                                  • GetDlgItem.USER32(?,000003EC), ref: 004053A2
                                  • CreateThread.KERNEL32(00000000,00000000,Function_00005176,00000000), ref: 004053B0
                                  • CloseHandle.KERNEL32(00000000), ref: 004053B7
                                  • ShowWindow.USER32(00000000), ref: 004053DA
                                  • ShowWindow.USER32(?,00000008), ref: 004053E1
                                  • ShowWindow.USER32(00000008), ref: 00405427
                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040545B
                                  • CreatePopupMenu.USER32 ref: 0040546C
                                  • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 00405481
                                  • GetWindowRect.USER32(?,000000FF), ref: 004054A1
                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004054BA
                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004054F6
                                  • OpenClipboard.USER32(00000000), ref: 00405506
                                  • EmptyClipboard.USER32 ref: 0040550C
                                  • GlobalAlloc.KERNEL32(00000042,?), ref: 00405515
                                  • GlobalLock.KERNEL32(00000000), ref: 0040551F
                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405533
                                  • GlobalUnlock.KERNEL32(00000000), ref: 0040554C
                                  • SetClipboardData.USER32(00000001,00000000), ref: 00405557
                                  • CloseClipboard.USER32 ref: 0040555D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                  • String ID:
                                  • API String ID: 590372296-0
                                  • Opcode ID: 50861b10ebe7a14382441023bc4f9bef1f96d390183c4be7e20a120c4e5e890c
                                  • Instruction ID: cba8cb344929e6fa6818a5c25344ad4bfa6cf128d012b59fb2cbbdf576d19343
                                  • Opcode Fuzzy Hash: 50861b10ebe7a14382441023bc4f9bef1f96d390183c4be7e20a120c4e5e890c
                                  • Instruction Fuzzy Hash: C2A16B70900608BFDF119F64DE89EAE7B79FF48354F00402AFA45B61A1C7794E529F68
                                  APIs
                                  • GetDlgItem.USER32(?,000003FB), ref: 004044FD
                                  • SetWindowTextA.USER32(00000000,?), ref: 00404527
                                  • SHBrowseForFolderA.SHELL32(?,0079E918,?), ref: 004045D8
                                  • CoTaskMemFree.OLE32(00000000), ref: 004045E3
                                  • lstrcmpiA.KERNEL32(Call,0079F540), ref: 00404615
                                  • lstrcatA.KERNEL32(?,Call), ref: 00404621
                                  • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404633
                                    • Part of subcall function 0040567D: GetDlgItemTextA.USER32(?,?,00000400,0040466A), ref: 00405690
                                    • Part of subcall function 004061E7: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Calyciform.exe",759B3410,C:\Users\user\AppData\Local\Temp\,00000000,004031C4,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033FB,?,00000006,00000008,0000000A), ref: 0040623F
                                    • Part of subcall function 004061E7: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 0040624C
                                    • Part of subcall function 004061E7: CharNextA.USER32(?,"C:\Users\user\Desktop\Calyciform.exe",759B3410,C:\Users\user\AppData\Local\Temp\,00000000,004031C4,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033FB,?,00000006,00000008,0000000A), ref: 00406251
                                    • Part of subcall function 004061E7: CharPrevA.USER32(?,?,759B3410,C:\Users\user\AppData\Local\Temp\,00000000,004031C4,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033FB,?,00000006,00000008,0000000A), ref: 00406261
                                  • GetDiskFreeSpaceA.KERNEL32(0079E510,?,?,0000040F,?,0079E510,0079E510,?,00000001,0079E510,?,?,000003FB,?), ref: 004046F1
                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040470C
                                    • Part of subcall function 00404865: lstrlenA.KERNEL32(0079F540,0079F540,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404780,000000DF,00000000,00000400,?), ref: 00404903
                                    • Part of subcall function 00404865: wsprintfA.USER32 ref: 0040490B
                                    • Part of subcall function 00404865: SetDlgItemTextA.USER32(?,0079F540), ref: 0040491E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                  • String ID: A$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Puerperant$Call$user32::CallWindowProcW(ir1 ,i 0,i 0, i 0, i 0)
                                  • API String ID: 2624150263-1265869078
                                  • Opcode ID: 835ebef96d9a185249aca47752db4aea3ea54f97fa15e05f5d6c04df71dbffb3
                                  • Instruction ID: c3220bc8085252b6637529823acfaab3e79984cbb1e105c0cbc22f2c5a0eab13
                                  • Opcode Fuzzy Hash: 835ebef96d9a185249aca47752db4aea3ea54f97fa15e05f5d6c04df71dbffb3
                                  • Instruction Fuzzy Hash: 61A171B1900209ABDB11EFA6CD45AAFB7B8EF85314F10443BF601B72D1D77C8A418B69
                                  APIs
                                  • CoCreateInstance.OLE32(00408408,?,00000001,004083F8,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402153
                                  • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,004083F8,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402202
                                  Strings
                                  • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Puerperant, xrefs: 00402193
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: ByteCharCreateInstanceMultiWide
                                  • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Puerperant
                                  • API String ID: 123533781-1972144218
                                  • Opcode ID: de3331bcb14db5fb4a40cac8f259df6afe6a407762841a132ab945fc632ec83d
                                  • Instruction ID: 4e8ff9b20089176bdb9f75031619ec66fd88291c4b8ac445023bd740ba84d334
                                  • Opcode Fuzzy Hash: de3331bcb14db5fb4a40cac8f259df6afe6a407762841a132ab945fc632ec83d
                                  • Instruction Fuzzy Hash: 4B511871A00208BFCB10DFE4C989A9D7BB5EF48318F2085AAF515EB2D1DA799941CF54
                                  APIs
                                  • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 0040270D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: FileFindFirst
                                  • String ID:
                                  • API String ID: 1974802433-0
                                  • Opcode ID: 44ebcace5f7d2fa9e21198272cfdc3a284c030ee536b71b2141a6cefce344cf4
                                  • Instruction ID: d02168588d0434b50479f8c5d7bfa648a046adbf5aa12c789179644532e0cc19
                                  • Opcode Fuzzy Hash: 44ebcace5f7d2fa9e21198272cfdc3a284c030ee536b71b2141a6cefce344cf4
                                  • Instruction Fuzzy Hash: 19F0A072604111EBD701E7A49949DEEB7688F15328FA0457BE281F20C1D6B88A459B3A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4eb106f398ba1a0e21959c13ec1d6d11c240689beb3471cc1bcfdbe3de21b473
                                  • Instruction ID: e60838e0b176701c88e9c062d98c60c8667d50fbcac6fb941192698cb1fad19d
                                  • Opcode Fuzzy Hash: 4eb106f398ba1a0e21959c13ec1d6d11c240689beb3471cc1bcfdbe3de21b473
                                  • Instruction Fuzzy Hash: F7F054208047505DD7319A38441476B7AE05B11318F160F3FE5EBB22D1C77C99AAC69F
                                  APIs
                                  • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00404212
                                  • GetDlgItem.USER32(00000000,000003E8), ref: 00404226
                                  • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00404244
                                  • GetSysColor.USER32(?), ref: 00404255
                                  • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404264
                                  • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404273
                                  • lstrlenA.KERNEL32(?), ref: 00404276
                                  • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404285
                                  • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 0040429A
                                  • GetDlgItem.USER32(?,0000040A), ref: 004042FC
                                  • SendMessageA.USER32(00000000), ref: 004042FF
                                  • GetDlgItem.USER32(?,000003E8), ref: 0040432A
                                  • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040436A
                                  • LoadCursorA.USER32(00000000,00007F02), ref: 00404379
                                  • SetCursor.USER32(00000000), ref: 00404382
                                  • LoadCursorA.USER32(00000000,00007F00), ref: 00404398
                                  • SetCursor.USER32(00000000), ref: 0040439B
                                  • SendMessageA.USER32(00000111,00000001,00000000), ref: 004043C7
                                  • SendMessageA.USER32(00000010,00000000,00000000), ref: 004043DB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                  • String ID: Call$N$RA@
                                  • API String ID: 3103080414-2992999996
                                  • Opcode ID: 937b42b3135c4e1aa36ae5a1725e39aac0471f252f69529ff53d1d3c1c1a1b80
                                  • Instruction ID: 9d4f5b614004455fa0fc48963a53335b2d61895e96ab3f79d0888a2017683c32
                                  • Opcode Fuzzy Hash: 937b42b3135c4e1aa36ae5a1725e39aac0471f252f69529ff53d1d3c1c1a1b80
                                  • Instruction Fuzzy Hash: E761C5B1A40205BFEB109F61DD45F6A3B69FB84704F10802AFB05BA2D1C7BCA951CF98
                                  APIs
                                  • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                  • BeginPaint.USER32(?,?), ref: 00401047
                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                  • DeleteObject.GDI32(?), ref: 004010ED
                                  • CreateFontIndirectA.GDI32(?), ref: 00401105
                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                  • SetTextColor.GDI32(00000000,?), ref: 00401130
                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                  • DrawTextA.USER32(00000000,Burseraceae Setup,000000FF,00000010,00000820), ref: 00401156
                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                  • DeleteObject.GDI32(?), ref: 00401165
                                  • EndPaint.USER32(?,?), ref: 0040116E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                  • String ID: Burseraceae Setup$F
                                  • API String ID: 941294808-2921618269
                                  • Opcode ID: 5d259313e85fbaf708a0b03883ff4ad94c3fd8dcebbcebd210a7d21844077b3d
                                  • Instruction ID: 38fadef1db352f82975619da7fddedca022a80716c75150ab5a709db8b4f24fa
                                  • Opcode Fuzzy Hash: 5d259313e85fbaf708a0b03883ff4ad94c3fd8dcebbcebd210a7d21844077b3d
                                  • Instruction Fuzzy Hash: CB416C71800249AFCB058F95DE459AFBBB9FF45314F00802EF9A1AA1A0C778DA55DFA4
                                  APIs
                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00405D7D,?,?), ref: 00405C1D
                                  • GetShortPathNameA.KERNEL32(?,007A12D0,00000400), ref: 00405C26
                                    • Part of subcall function 00405A7B: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CD6,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405A8B
                                    • Part of subcall function 00405A7B: lstrlenA.KERNEL32(00000000,?,00000000,00405CD6,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405ABD
                                  • GetShortPathNameA.KERNEL32(?,007A16D0,00000400), ref: 00405C43
                                  • wsprintfA.USER32 ref: 00405C61
                                  • GetFileSize.KERNEL32(00000000,00000000,007A16D0,C0000000,00000004,007A16D0,?,?,?,?,?), ref: 00405C9C
                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405CAB
                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405CE3
                                  • SetFilePointer.KERNEL32(0040A3B8,00000000,00000000,00000000,00000000,007A0ED0,00000000,-0000000A,0040A3B8,00000000,[Rename],00000000,00000000,00000000), ref: 00405D39
                                  • GlobalFree.KERNEL32(00000000), ref: 00405D4A
                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405D51
                                    • Part of subcall function 00405B16: GetFileAttributesA.KERNELBASE(00000003,00402DA3,C:\Users\user\Desktop\Calyciform.exe,80000000,00000003), ref: 00405B1A
                                    • Part of subcall function 00405B16: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B3C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                  • String ID: %s=%s$[Rename]
                                  • API String ID: 2171350718-1727408572
                                  • Opcode ID: 45160d7d980c9177ced87b727a44c84efcd25dff5150337c1955e55c924b3a17
                                  • Instruction ID: 022478914a54526cde4d083c9269fc90008e130feab77c5089d91aa4570e4fa5
                                  • Opcode Fuzzy Hash: 45160d7d980c9177ced87b727a44c84efcd25dff5150337c1955e55c924b3a17
                                  • Instruction Fuzzy Hash: 6131DF31201B196BD2207B659D4CF6B3A5CDF85794F24053BBA01F62D2EA7CA8058EAD
                                  APIs
                                  • lstrlenA.KERNEL32(0079ED20,00000000,00790EF8,759B23A0,?,?,?,?,?,?,?,?,?,004030D4,00000000,?), ref: 004050DD
                                  • lstrlenA.KERNEL32(004030D4,0079ED20,00000000,00790EF8,759B23A0,?,?,?,?,?,?,?,?,?,004030D4,00000000), ref: 004050ED
                                  • lstrcatA.KERNEL32(0079ED20,004030D4,004030D4,0079ED20,00000000,00790EF8,759B23A0), ref: 00405100
                                  • SetWindowTextA.USER32(0079ED20,0079ED20), ref: 00405112
                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405138
                                  • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405152
                                  • SendMessageA.USER32(?,00001013,?,00000000), ref: 00405160
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                  • String ID: y
                                  • API String ID: 2531174081-1062152503
                                  • Opcode ID: 0e5bc111e7764b859d703c7cd38c1a52b54818a96c636b509d6d72182c6d6877
                                  • Instruction ID: 0aa0aab3041eb49126eaccb75638caacaba84434fae24d46564a95eb40ba5f91
                                  • Opcode Fuzzy Hash: 0e5bc111e7764b859d703c7cd38c1a52b54818a96c636b509d6d72182c6d6877
                                  • Instruction Fuzzy Hash: 85219D71D00518BEDF119FA5DD81ADFBFA9EB45354F14807AF504BA291C7388E418FA8
                                  APIs
                                  • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Calyciform.exe",759B3410,C:\Users\user\AppData\Local\Temp\,00000000,004031C4,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033FB,?,00000006,00000008,0000000A), ref: 0040623F
                                  • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 0040624C
                                  • CharNextA.USER32(?,"C:\Users\user\Desktop\Calyciform.exe",759B3410,C:\Users\user\AppData\Local\Temp\,00000000,004031C4,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033FB,?,00000006,00000008,0000000A), ref: 00406251
                                  • CharPrevA.USER32(?,?,759B3410,C:\Users\user\AppData\Local\Temp\,00000000,004031C4,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033FB,?,00000006,00000008,0000000A), ref: 00406261
                                  Strings
                                  • "C:\Users\user\Desktop\Calyciform.exe", xrefs: 00406223
                                  • *?|<>/":, xrefs: 0040622F
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 004061E8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: Char$Next$Prev
                                  • String ID: "C:\Users\user\Desktop\Calyciform.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                  • API String ID: 589700163-275678242
                                  • Opcode ID: baaf8be525beb263cd2d66daa4244c7e43047c81ac15102dd5c23876bc89bcef
                                  • Instruction ID: 21773b32b681db819c24220f05ced2ff1897e85ed8b94fc5b560f7e9dc9cebfa
                                  • Opcode Fuzzy Hash: baaf8be525beb263cd2d66daa4244c7e43047c81ac15102dd5c23876bc89bcef
                                  • Instruction Fuzzy Hash: D511BF6180479129FB3236240C44BB7AF998F977A0F1A00BFE5D6722C2D67C5CA2966D
                                  APIs
                                  • GetWindowLongA.USER32(?,000000EB), ref: 004040A0
                                  • GetSysColor.USER32(00000000), ref: 004040DE
                                  • SetTextColor.GDI32(?,00000000), ref: 004040EA
                                  • SetBkMode.GDI32(?,?), ref: 004040F6
                                  • GetSysColor.USER32(?), ref: 00404109
                                  • SetBkColor.GDI32(?,?), ref: 00404119
                                  • DeleteObject.GDI32(?), ref: 00404133
                                  • CreateBrushIndirect.GDI32(?), ref: 0040413D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                  • String ID:
                                  • API String ID: 2320649405-0
                                  • Opcode ID: 49e3bf83d30a7d96e63afb16dabbed360c02e673e0f4069f8acd1b63125549d3
                                  • Instruction ID: 14bb72118498863180d434f19a0418890adeb1616dfc149a02695bee4dee3a88
                                  • Opcode Fuzzy Hash: 49e3bf83d30a7d96e63afb16dabbed360c02e673e0f4069f8acd1b63125549d3
                                  • Instruction Fuzzy Hash: 422162715007049BCB309F68DD4CB5BBBF8AF91714B04893EEA96A62E0D734E984CB54
                                  APIs
                                    • Part of subcall function 6D6A1215: GlobalAlloc.KERNELBASE(00000040,6D6A1233,?,6D6A12CF,-6D6A404B,6D6A11AB,-000000A0), ref: 6D6A121D
                                  • GlobalFree.KERNEL32(?), ref: 6D6A25A2
                                  • GlobalFree.KERNEL32(00000000), ref: 6D6A25DC
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130238628964.000000006D6A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D6A0000, based on PE: true
                                  • Associated: 00000000.00000002.130238558041.000000006D6A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.130238696820.000000006D6A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.130238759011.000000006D6A5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d6a0000_Calyciform.jbxd
                                  Similarity
                                  • API ID: Global$Free$Alloc
                                  • String ID:
                                  • API String ID: 1780285237-0
                                  • Opcode ID: 954ac476da94ab9b2f3d0ffb3aebb4d8cb530d5cec387bc993150d7e1e9d8f23
                                  • Instruction ID: 7bf97345dd375339e31dcb47c73984a66e616741da3122e8041fb16322dd4f04
                                  • Opcode Fuzzy Hash: 954ac476da94ab9b2f3d0ffb3aebb4d8cb530d5cec387bc993150d7e1e9d8f23
                                  • Instruction Fuzzy Hash: 1C41AE72588212EFC7258F96CCA4D6E7BB9FB8F749B098529F5C583100CB71AC04DB62
                                  APIs
                                  • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 0040498A
                                  • GetMessagePos.USER32 ref: 00404992
                                  • ScreenToClient.USER32(?,?), ref: 004049AC
                                  • SendMessageA.USER32(?,00001111,00000000,?), ref: 004049BE
                                  • SendMessageA.USER32(?,0000110C,00000000,?), ref: 004049E4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: Message$Send$ClientScreen
                                  • String ID: f
                                  • API String ID: 41195575-1993550816
                                  • Opcode ID: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                                  • Instruction ID: a28b31c987ffe71ebed06cd45d35d2090213a5ff436324a44693cf4fbc71b07e
                                  • Opcode Fuzzy Hash: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                                  • Instruction Fuzzy Hash: F7015EB5900219BAEB00DBA5DD85BFFBBBCAF55711F10412BBB51B61C0C7B49901CBA4
                                  APIs
                                  • GetDC.USER32(?), ref: 00401D9E
                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DB8
                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00401DC0
                                  • ReleaseDC.USER32(?,00000000), ref: 00401DD1
                                  • CreateFontIndirectA.GDI32(0040B7E8), ref: 00401E20
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                  • String ID: Times New Roman
                                  • API String ID: 3808545654-927190056
                                  • Opcode ID: 91bb750de4b5d44c6d39cdf1c1eabfd736e9a6544dc134e4c91b233d15554033
                                  • Instruction ID: 2ad56a654efc6cf1735b667c3c7d9d5e2d080a44a70240ddf1560951203afcdd
                                  • Opcode Fuzzy Hash: 91bb750de4b5d44c6d39cdf1c1eabfd736e9a6544dc134e4c91b233d15554033
                                  • Instruction Fuzzy Hash: BE01B171944242AFE7015BB1AE4AB9A7FB4DB95305F10443AF251BB2E2CB7800459F6D
                                  APIs
                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C97
                                  • MulDiv.KERNEL32(0006670E,00000064,000689B0), ref: 00402CC2
                                  • wsprintfA.USER32 ref: 00402CD2
                                  • SetWindowTextA.USER32(?,?), ref: 00402CE2
                                  • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402CF4
                                  Strings
                                  • verifying installer: %d%%, xrefs: 00402CCC
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: Text$ItemTimerWindowwsprintf
                                  • String ID: verifying installer: %d%%
                                  • API String ID: 1451636040-82062127
                                  • Opcode ID: 5bc376e969e12caa47fa3f233e97b7e9205a4f9680dc87fa7bda5c810414eec7
                                  • Instruction ID: de2615d2472e4fc16c898f89e06f4c65c316d83b10e4b0077f24645c8aa4783b
                                  • Opcode Fuzzy Hash: 5bc376e969e12caa47fa3f233e97b7e9205a4f9680dc87fa7bda5c810414eec7
                                  • Instruction Fuzzy Hash: E8014F70540209FBEF249F61DE4AEEE3769EB04304F00803AFA16B92D0DBB989518F59
                                  APIs
                                  • GlobalFree.KERNEL32(00000000), ref: 6D6A240B
                                    • Part of subcall function 6D6A1224: lstrcpynA.KERNEL32(00000000,?,6D6A12CF,-6D6A404B,6D6A11AB,-000000A0), ref: 6D6A1234
                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 6D6A2386
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 6D6A239B
                                  • GlobalAlloc.KERNEL32(00000040,00000010), ref: 6D6A23AC
                                  • CLSIDFromString.OLE32(00000000,00000000), ref: 6D6A23BA
                                  • GlobalFree.KERNEL32(00000000), ref: 6D6A23C1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130238628964.000000006D6A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D6A0000, based on PE: true
                                  • Associated: 00000000.00000002.130238558041.000000006D6A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.130238696820.000000006D6A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.130238759011.000000006D6A5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d6a0000_Calyciform.jbxd
                                  Similarity
                                  • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                                  • String ID:
                                  • API String ID: 3730416702-0
                                  • Opcode ID: 9f7f4ea8c0ddf2caaeb460024657992f0588c9f480d96571657e75d29c284b90
                                  • Instruction ID: 205435b77d6fc1df19d3a9fa947501bbc212af34ee6d5fcacbb606b4485d25ac
                                  • Opcode Fuzzy Hash: 9f7f4ea8c0ddf2caaeb460024657992f0588c9f480d96571657e75d29c284b90
                                  • Instruction Fuzzy Hash: 45419F71588312DFD724CF66C840B6AB7F8FB4E311F089819E6DACA140D774AC858B61
                                  APIs
                                  • GlobalAlloc.KERNEL32(00000040,00030A00,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402790
                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 004027AC
                                  • GlobalFree.KERNEL32(?), ref: 004027EB
                                  • GlobalFree.KERNEL32(00000000), ref: 004027FE
                                  • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402816
                                  • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040282A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                                  • String ID:
                                  • API String ID: 2667972263-0
                                  • Opcode ID: b6e2ce3a99fffcf8e0e79c283e33d87fe4325d14b43d938f50b183fbca7180bc
                                  • Instruction ID: a3aa65fdc26674a25697bbf1b98d1dc7df5c11bc78c453e7b8258ed70cc26f26
                                  • Opcode Fuzzy Hash: b6e2ce3a99fffcf8e0e79c283e33d87fe4325d14b43d938f50b183fbca7180bc
                                  • Instruction Fuzzy Hash: 41219F71800124BBDF207FA5CE89DAE7B79AF49364F14823AF510762E0CB794D419F68
                                  APIs
                                  • GetDlgItem.USER32(?), ref: 00401D45
                                  • GetClientRect.USER32(00000000,?), ref: 00401D52
                                  • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D73
                                  • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D81
                                  • DeleteObject.GDI32(00000000), ref: 00401D90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                  • String ID:
                                  • API String ID: 1849352358-0
                                  • Opcode ID: a4e1bb267f21d13dce46d980b0e60fea8a676a260fcdc139885163ed62c0b7c3
                                  • Instruction ID: 86ae4d2b40e720423d53cfa3fe8a52c583987269cec1c9f3ad3a23d9d9d7ea30
                                  • Opcode Fuzzy Hash: a4e1bb267f21d13dce46d980b0e60fea8a676a260fcdc139885163ed62c0b7c3
                                  • Instruction Fuzzy Hash: F6F0AFB2600515BFDB01EBE4DE89DEFB7BCEB44345B14446AF641F6191CA749D018B38
                                  APIs
                                  • lstrlenA.KERNEL32(0079F540,0079F540,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404780,000000DF,00000000,00000400,?), ref: 00404903
                                  • wsprintfA.USER32 ref: 0040490B
                                  • SetDlgItemTextA.USER32(?,0079F540), ref: 0040491E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: ItemTextlstrlenwsprintf
                                  • String ID: %u.%u%s%s
                                  • API String ID: 3540041739-3551169577
                                  • Opcode ID: 5f074f6faf701013ce45bc378f4b03b5d4ee46098f1275575472d42f1ef86f4b
                                  • Instruction ID: 24807b9fc88fe5fbc2e72c1c6e729af153b5b07cedbd852725a961613b6e70ef
                                  • Opcode Fuzzy Hash: 5f074f6faf701013ce45bc378f4b03b5d4ee46098f1275575472d42f1ef86f4b
                                  • Instruction Fuzzy Hash: 99110A776045282BEB01657D9C41EAF3288DB81378F254637FA26F72D1E978CC1246E8
                                  APIs
                                  • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C7A
                                  • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C92
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: MessageSend$Timeout
                                  • String ID: !
                                  • API String ID: 1777923405-2657877971
                                  • Opcode ID: 923bedeed5d7b8d7984d68c2ba9ede72919c9759eaf6e2c39352329f0efb5f52
                                  • Instruction ID: 435bc4df3b74c2d8df546d11ce2c7183e26475550abba04b2436001ae32cf151
                                  • Opcode Fuzzy Hash: 923bedeed5d7b8d7984d68c2ba9ede72919c9759eaf6e2c39352329f0efb5f52
                                  • Instruction Fuzzy Hash: 4B21A271E44209BEEF15DFA5D986AAD7BB4EF84304F24843EF501B61E0CB7885418F28
                                  APIs
                                    • Part of subcall function 00405F7D: lstrcpynA.KERNEL32(?,?,00000400,004032BB,Burseraceae Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 00405F8A
                                    • Part of subcall function 004059AE: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,?,00405A1A,C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,759B3410,?,C:\Users\user\AppData\Local\Temp\,00405765,?,759B3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004059BC
                                    • Part of subcall function 004059AE: CharNextA.USER32(00000000), ref: 004059C1
                                    • Part of subcall function 004059AE: CharNextA.USER32(00000000), ref: 004059D5
                                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,759B3410,?,C:\Users\user\AppData\Local\Temp\,00405765,?,759B3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A56
                                  • GetFileAttributesA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,759B3410,?,C:\Users\user\AppData\Local\Temp\,00405765,?,759B3410,C:\Users\user\AppData\Local\Temp\), ref: 00405A66
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                  • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp
                                  • API String ID: 3248276644-3650254894
                                  • Opcode ID: 59c4d439f8e780665a95aab8c0f078ab1494ed1c34d0f7562e7ab92a144acefd
                                  • Instruction ID: 99d34a1d2256cfbc911754f26576654ac704e19cee30922b90174233901e1ae6
                                  • Opcode Fuzzy Hash: 59c4d439f8e780665a95aab8c0f078ab1494ed1c34d0f7562e7ab92a144acefd
                                  • Instruction Fuzzy Hash: 48F0A431315D5156C622323A1C4AAAF0A48CEC7364749463BF861B12D3DA3C89439D6E
                                  APIs
                                  • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004031D6,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033FB,?,00000006,00000008,0000000A), ref: 0040591B
                                  • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004031D6,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033FB,?,00000006,00000008,0000000A), ref: 00405924
                                  • lstrcatA.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 00405935
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405915
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: CharPrevlstrcatlstrlen
                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                  • API String ID: 2659869361-3355392842
                                  • Opcode ID: 00f54151576635bf1518ba316310c1363eddf8ffcac7d82473bc198909657139
                                  • Instruction ID: da490e60620d11e3c07f2fcccd6c796fdaa9f48d202f5171465a07f32f6e55b9
                                  • Opcode Fuzzy Hash: 00f54151576635bf1518ba316310c1363eddf8ffcac7d82473bc198909657139
                                  • Instruction Fuzzy Hash: B5D0A9A2201E30BED20227169C09ECB2A08CF2231AB05043BF240B61A1CA7C4D428BFE
                                  APIs
                                  • CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,?,00405A1A,C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp,759B3410,?,C:\Users\user\AppData\Local\Temp\,00405765,?,759B3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004059BC
                                  • CharNextA.USER32(00000000), ref: 004059C1
                                  • CharNextA.USER32(00000000), ref: 004059D5
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp, xrefs: 004059AF
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: CharNext
                                  • String ID: C:\Users\user\AppData\Local\Temp\nsf9BE0.tmp
                                  • API String ID: 3213498283-3793470382
                                  • Opcode ID: 6ae5a98c75981dc822015e60cfe3a73e92d8e62117e7577616a1c134a98ac786
                                  • Instruction ID: 53b5fd27e09cdb27f7d5e0d280f650891fab3cf45ffc187ddecf7516587659fd
                                  • Opcode Fuzzy Hash: 6ae5a98c75981dc822015e60cfe3a73e92d8e62117e7577616a1c134a98ac786
                                  • Instruction Fuzzy Hash: D4F0F6D1908F50EAFB32A6244C54B776B89CB55370F14457BD680772C1C27C4C409FAA
                                  APIs
                                  • DestroyWindow.USER32(00000000,00000000,00402EDF,00000001), ref: 00402D12
                                  • GetTickCount.KERNEL32 ref: 00402D30
                                  • CreateDialogParamA.USER32(0000006F,00000000,00402C7C,00000000), ref: 00402D4D
                                  • ShowWindow.USER32(00000000,00000005), ref: 00402D5B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: Window$CountCreateDestroyDialogParamShowTick
                                  • String ID:
                                  • API String ID: 2102729457-0
                                  • Opcode ID: 87f9a02f322897d0e4f948bf7da259dfca77796329a29cb391b18909f99ca198
                                  • Instruction ID: b66414e99a5f690dcfe7c27c209bc19b2a06c79591cef1c7d36985daa8eb92e7
                                  • Opcode Fuzzy Hash: 87f9a02f322897d0e4f948bf7da259dfca77796329a29cb391b18909f99ca198
                                  • Instruction Fuzzy Hash: D6F05E30401621EBC6116B68FFCEE8F7B74AB45B02712457BF158B11E4DA7C48868B9C
                                  APIs
                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,00000400,Call,0079ED20,?,?,?,00000002,Call,?,004060A8,80000002), ref: 00405EAA
                                  • RegCloseKey.ADVAPI32(?,?,004060A8,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,?,0079ED20), ref: 00405EB5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: CloseQueryValue
                                  • String ID: Call
                                  • API String ID: 3356406503-1824292864
                                  • Opcode ID: 2ae01f244120d487d9f351ea12627f7621f1ac4d10347c017b688b21594c6fc7
                                  • Instruction ID: be592471178a3b34147732ee01c8456e78db25e2de640fde20402d2d05791b9a
                                  • Opcode Fuzzy Hash: 2ae01f244120d487d9f351ea12627f7621f1ac4d10347c017b688b21594c6fc7
                                  • Instruction Fuzzy Hash: 88015A76500609AADF228F61CD09FDB3BA8EF59364F10442AF955A2190D378DA54CBA4
                                  APIs
                                  • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A0D48,Error launching installer), ref: 00405645
                                  • CloseHandle.KERNEL32(?), ref: 00405652
                                  Strings
                                  • Error launching installer, xrefs: 0040562F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: CloseCreateHandleProcess
                                  • String ID: Error launching installer
                                  • API String ID: 3712363035-66219284
                                  • Opcode ID: 70af5941f3bc690bdcd9881a93690d3303993229d12fc254cd5844f1ea8daab6
                                  • Instruction ID: bdfa79d73584ee4add39219e15a001359f74b35d93969b7cce68af7ca5274bde
                                  • Opcode Fuzzy Hash: 70af5941f3bc690bdcd9881a93690d3303993229d12fc254cd5844f1ea8daab6
                                  • Instruction Fuzzy Hash: 7AE04FF1600209BFEB009FA0DD05F7F77ACEB50744F004821BD14F6150D675A8008A78
                                  APIs
                                  • FreeLibrary.KERNEL32(?,759B3410,00000000,C:\Users\user\AppData\Local\Temp\,004036EE,00403508,?,?,00000006,00000008,0000000A), ref: 00403730
                                  • GlobalFree.KERNEL32(00A71F10), ref: 00403737
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00403716
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: Free$GlobalLibrary
                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                  • API String ID: 1100898210-3355392842
                                  • Opcode ID: 4d9750b91f9c818690002108793fa6d5ed1a6d42b958517d28de6e516f48fa46
                                  • Instruction ID: e3cd8cf2938ee13ec1fefa9c4a9681649e8a36576cb89bbd23f75385d37883fe
                                  • Opcode Fuzzy Hash: 4d9750b91f9c818690002108793fa6d5ed1a6d42b958517d28de6e516f48fa46
                                  • Instruction Fuzzy Hash: AEE0C2334011209FC6219F04FE0872A7778AF49B23F06842BF8807B36087781C534BC8
                                  APIs
                                  • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402DCF,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Calyciform.exe,C:\Users\user\Desktop\Calyciform.exe,80000000,00000003), ref: 00405962
                                  • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402DCF,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Calyciform.exe,C:\Users\user\Desktop\Calyciform.exe,80000000,00000003), ref: 00405970
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: CharPrevlstrlen
                                  • String ID: C:\Users\user\Desktop
                                  • API String ID: 2709904686-3370423016
                                  • Opcode ID: a2cb5c10c54eab45be364f275a3e0fd7f40b7dc80b72c69925d8ec85e0f8a492
                                  • Instruction ID: 1bd18926039b2b13e1a5e2b6749e0a20dca9854900914240940d95a6582504e3
                                  • Opcode Fuzzy Hash: a2cb5c10c54eab45be364f275a3e0fd7f40b7dc80b72c69925d8ec85e0f8a492
                                  • Instruction Fuzzy Hash: BAD0C9A2409DB0AEE71363249C04B9F6A88DF26715F0904B7E181F61A1C6BC4D828BAD
                                  APIs
                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 6D6A115B
                                  • GlobalFree.KERNEL32(00000000), ref: 6D6A11B4
                                  • GlobalFree.KERNEL32(?), ref: 6D6A11C7
                                  • GlobalFree.KERNEL32(?), ref: 6D6A11F5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130238628964.000000006D6A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D6A0000, based on PE: true
                                  • Associated: 00000000.00000002.130238558041.000000006D6A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.130238696820.000000006D6A3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.130238759011.000000006D6A5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d6a0000_Calyciform.jbxd
                                  Similarity
                                  • API ID: Global$Free$Alloc
                                  • String ID:
                                  • API String ID: 1780285237-0
                                  • Opcode ID: c3e0d6fadc0aab94dddcdbe9728cce5ab3b235d488689e587340bc607802f3b7
                                  • Instruction ID: 5b09798495110811b98628e4d7798bd8a65257c98f0a48e595088580c820077d
                                  • Opcode Fuzzy Hash: c3e0d6fadc0aab94dddcdbe9728cce5ab3b235d488689e587340bc607802f3b7
                                  • Instruction Fuzzy Hash: B0318DB1508255AFEB018FAAD959B2ABFF8EB0E254B1D4515E9D8C2250DB78FC40CB24
                                  APIs
                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CD6,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405A8B
                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405AA3
                                  • CharNextA.USER32(00000000,?,00000000,00405CD6,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AB4
                                  • lstrlenA.KERNEL32(00000000,?,00000000,00405CD6,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405ABD
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.130223558263.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.130223504527.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223615136.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.000000000077B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000785000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130223671522.00000000007B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.130224420782.00000000007BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Calyciform.jbxd
                                  Similarity
                                  • API ID: lstrlen$CharNextlstrcmpi
                                  • String ID:
                                  • API String ID: 190613189-0
                                  • Opcode ID: 63752835767028d7570d3bd2c367202728d3e51619cdcd0ff30af86384407b43
                                  • Instruction ID: bbf0fe82adfec40a5435aad4fbaff8462ffeb4f6e62521b4b159965ff53dba99
                                  • Opcode Fuzzy Hash: 63752835767028d7570d3bd2c367202728d3e51619cdcd0ff30af86384407b43
                                  • Instruction Fuzzy Hash: 9BF0C232215914BFC702DBA8CD40D9EBBA8EF46350B2540B9E840F7211D634DE019FA9