Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
yuc1Jwlkh5.exe

Overview

General Information

Sample name:yuc1Jwlkh5.exe
(renamed file extension from none to exe, renamed because original name is a hash value)
Original sample name:5bc4b28288f068f1c11e69b1cc94aacb4b0d2812494c1673471b890f1ce67a9e
Analysis ID:1558324
MD5:53441f2de2d573f3b2e4fb35c248229b
SHA1:afc840f25adfcb5873f5b69e55b2920c370a2285
SHA256:5bc4b28288f068f1c11e69b1cc94aacb4b0d2812494c1673471b890f1ce67a9e
Infos:

Detection

GuLoader
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Sample execution stops while process was sleeping (likely an evasion)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses 32bit PE files

Classification

  • System is w10x64
  • yuc1Jwlkh5.exe (PID: 7440 cmdline: "C:\Users\user\Desktop\yuc1Jwlkh5.exe" MD5: 53441F2DE2D573F3B2E4FB35C248229B)
    • yuc1Jwlkh5.exe (PID: 7792 cmdline: "C:\Users\user\Desktop\yuc1Jwlkh5.exe" MD5: 53441F2DE2D573F3B2E4FB35C248229B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000004.00000002.2945116780.0000000002153000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000000.00000002.2151810684.0000000005313000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: yuc1Jwlkh5.exeAvira: detected
      Source: http://173.249.193.48/VdpAwrpsFeHTHv196.binAvira URL Cloud: Label: malware
      Source: http://173.249.193.48/VdpAwrpsFeHTHv196.bin/Avira URL Cloud: Label: malware
      Source: yuc1Jwlkh5.exeReversingLabs: Detection: 83%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: yuc1Jwlkh5.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: yuc1Jwlkh5.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: yuc1Jwlkh5.exe, 00000004.00000001.2150293695.0000000000649000.00000020.00000001.01000000.00000008.sdmp
      Source: Binary string: mshtml.pdbUGP source: yuc1Jwlkh5.exe, 00000004.00000001.2150293695.0000000000649000.00000020.00000001.01000000.00000008.sdmp
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeCode function: 0_2_0040674C FindFirstFileW,FindClose,0_2_0040674C
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeCode function: 0_2_00405B00 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405B00
      Source: global trafficTCP traffic: 192.168.2.4:49740 -> 173.249.193.48:80
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: yuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmp, yuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004B9F000.00000004.00000020.00020000.00000000.sdmp, yuc1Jwlkh5.exe, 00000004.00000002.2976591705.0000000034160000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bin
      Source: yuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bin&
      Source: yuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004B9F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bin/
      Source: yuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bin2
      Source: yuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binD
      Source: yuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binEn5
      Source: yuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binKnG
      Source: yuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binN
      Source: yuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binV
      Source: yuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binZ
      Source: yuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binb
      Source: yuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binjn
      Source: yuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bino
      Source: yuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bins
      Source: yuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binw
      Source: yuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bin~
      Source: yuc1Jwlkh5.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: yuc1Jwlkh5.exe, 00000004.00000001.2150293695.0000000000649000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.ftp.ftp://ftp.gopher.
      Source: yuc1Jwlkh5.exe, 00000004.00000001.2150293695.00000000005F2000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
      Source: yuc1Jwlkh5.exe, 00000004.00000001.2150293695.00000000005F2000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
      Source: yuc1Jwlkh5.exe, 00000004.00000001.2150293695.0000000000649000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeCode function: 0_2_004034A2 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A2
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeFile created: C:\Windows\resources\0809Jump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeCode function: 0_2_6E441B5F0_2_6E441B5F
      Source: yuc1Jwlkh5.exeStatic PE information: invalid certificate
      Source: yuc1Jwlkh5.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal84.troj.evad.winEXE@3/11@0/1
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeCode function: 0_2_004034A2 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A2
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeFile created: C:\Program Files (x86)\Common Files\kvindagtigt.iniJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeFile created: C:\Users\user\kretekniske.iniJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeFile created: C:\Users\user\AppData\Local\Temp\nsvA377.tmpJump to behavior
      Source: yuc1Jwlkh5.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: yuc1Jwlkh5.exeReversingLabs: Detection: 83%
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeFile read: C:\Users\user\Desktop\yuc1Jwlkh5.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\yuc1Jwlkh5.exe "C:\Users\user\Desktop\yuc1Jwlkh5.exe"
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeProcess created: C:\Users\user\Desktop\yuc1Jwlkh5.exe "C:\Users\user\Desktop\yuc1Jwlkh5.exe"
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeProcess created: C:\Users\user\Desktop\yuc1Jwlkh5.exe "C:\Users\user\Desktop\yuc1Jwlkh5.exe"Jump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeFile written: C:\Program Files (x86)\Common Files\kvindagtigt.iniJump to behavior
      Source: yuc1Jwlkh5.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: yuc1Jwlkh5.exe, 00000004.00000001.2150293695.0000000000649000.00000020.00000001.01000000.00000008.sdmp
      Source: Binary string: mshtml.pdbUGP source: yuc1Jwlkh5.exe, 00000004.00000001.2150293695.0000000000649000.00000020.00000001.01000000.00000008.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000004.00000002.2945116780.0000000002153000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.2151810684.0000000005313000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeCode function: 0_2_6E441B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6E441B5F
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeFile created: C:\Users\user\AppData\Local\Temp\nssA8D7.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeAPI/Special instruction interceptor: Address: 5322FD0
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeAPI/Special instruction interceptor: Address: 2162FD0
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeRDTSC instruction interceptor: First address: 52F96E2 second address: 52F96E2 instructions: 0x00000000 rdtsc 0x00000002 cmp ah, ch 0x00000004 cmp ebx, ecx 0x00000006 jc 00007FC984E1C956h 0x00000008 cmp ah, ch 0x0000000a inc ebp 0x0000000b inc ebx 0x0000000c rdtsc
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeRDTSC instruction interceptor: First address: 21396E2 second address: 21396E2 instructions: 0x00000000 rdtsc 0x00000002 cmp ah, ch 0x00000004 cmp ebx, ecx 0x00000006 jc 00007FC9858DBA36h 0x00000008 cmp ah, ch 0x0000000a inc ebp 0x0000000b inc ebx 0x0000000c rdtsc
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nssA8D7.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exe TID: 7796Thread sleep time: -170000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeCode function: 0_2_0040674C FindFirstFileW,FindClose,0_2_0040674C
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeCode function: 0_2_00405B00 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405B00
      Source: yuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BCE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp^J
      Source: yuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BCE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: yuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004B9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW *
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeAPI call chain: ExitProcess graph end nodegraph_0-2285
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeAPI call chain: ExitProcess graph end nodegraph_0-2498
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeCode function: 0_2_6E441B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6E441B5F
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeProcess created: C:\Users\user\Desktop\yuc1Jwlkh5.exe "C:\Users\user\Desktop\yuc1Jwlkh5.exe"Jump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeCode function: 0_2_004034A2 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A2
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      DLL Side-Loading
      1
      Access Token Manipulation
      12
      Masquerading
      OS Credential Dumping21
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
      Process Injection
      1
      Virtualization/Sandbox Evasion
      LSASS Memory1
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      1
      Access Token Manipulation
      Security Account Manager3
      File and Directory Discovery
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
      Process Injection
      NTDS22
      System Information Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      yuc1Jwlkh5.exe83%ReversingLabsWin32.Trojan.GuLoader
      yuc1Jwlkh5.exe100%AviraHEUR/AGEN.1333748
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nssA8D7.tmp\System.dll0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://173.249.193.48/VdpAwrpsFeHTHv196.binEn50%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.binw0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin~0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.binKnG0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.binZ0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.binjn0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.bins0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin100%Avira URL Cloudmalware
      http://173.249.193.48/VdpAwrpsFeHTHv196.binV0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.binb0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.binD0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin20%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.binN0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin&0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.bino0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin/100%Avira URL Cloudmalware
      NameIPActiveMaliciousAntivirus DetectionReputation
      fp2e7a.wpc.phicdn.net
      192.229.221.95
      truefalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        http://173.249.193.48/VdpAwrpsFeHTHv196.binZyuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://173.249.193.48/VdpAwrpsFeHTHv196.binwyuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://173.249.193.48/VdpAwrpsFeHTHv196.binEn5yuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtdyuc1Jwlkh5.exe, 00000004.00000001.2150293695.00000000005F2000.00000020.00000001.01000000.00000008.sdmpfalse
          high
          http://173.249.193.48/VdpAwrpsFeHTHv196.binVyuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://173.249.193.48/VdpAwrpsFeHTHv196.binsyuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://173.249.193.48/VdpAwrpsFeHTHv196.binyuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmp, yuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004B9F000.00000004.00000020.00020000.00000000.sdmp, yuc1Jwlkh5.exe, 00000004.00000002.2976591705.0000000034160000.00000004.00001000.00020000.00000000.sdmpfalse
          • Avira URL Cloud: malware
          unknown
          http://173.249.193.48/VdpAwrpsFeHTHv196.binbyuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://173.249.193.48/VdpAwrpsFeHTHv196.binjnyuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://173.249.193.48/VdpAwrpsFeHTHv196.binKnGyuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://173.249.193.48/VdpAwrpsFeHTHv196.bin~yuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214yuc1Jwlkh5.exe, 00000004.00000001.2150293695.0000000000649000.00000020.00000001.01000000.00000008.sdmpfalse
            high
            http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtdyuc1Jwlkh5.exe, 00000004.00000001.2150293695.00000000005F2000.00000020.00000001.01000000.00000008.sdmpfalse
              high
              http://www.ftp.ftp://ftp.gopher.yuc1Jwlkh5.exe, 00000004.00000001.2150293695.0000000000649000.00000020.00000001.01000000.00000008.sdmpfalse
                high
                http://173.249.193.48/VdpAwrpsFeHTHv196.bin&yuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://nsis.sf.net/NSIS_ErrorErroryuc1Jwlkh5.exefalse
                  high
                  http://173.249.193.48/VdpAwrpsFeHTHv196.binDyuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://173.249.193.48/VdpAwrpsFeHTHv196.bin2yuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://173.249.193.48/VdpAwrpsFeHTHv196.bin/yuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004B9F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://173.249.193.48/VdpAwrpsFeHTHv196.binoyuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://173.249.193.48/VdpAwrpsFeHTHv196.binNyuc1Jwlkh5.exe, 00000004.00000002.2949341782.0000000004BB7000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  173.249.193.48
                  unknownUnited States
                  11878TZULOUSfalse
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1558324
                  Start date and time:2024-11-19 11:33:47 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 6m 47s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:6
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:yuc1Jwlkh5.exe
                  (renamed file extension from none to exe, renamed because original name is a hash value)
                  Original Sample Name:5bc4b28288f068f1c11e69b1cc94aacb4b0d2812494c1673471b890f1ce67a9e
                  Detection:MAL
                  Classification:mal84.troj.evad.winEXE@3/11@0/1
                  EGA Information:
                  • Successful, ratio: 50%
                  HCA Information:Failed
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, login.live.com, ocsp.edge.digicert.com, ctldl.windowsupdate.com
                  • Not all processes where analyzed, report is missing behavior information
                  • VT rate limit hit for: yuc1Jwlkh5.exe
                  TimeTypeDescription
                  05:35:36API Interceptor17x Sleep call for process: yuc1Jwlkh5.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  173.249.193.48stormskridtets.exeGet hashmaliciousFormBook, GuLoaderBrowse
                  • 173.249.193.48/dlDSZQaZvoFz216.bin
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  fp2e7a.wpc.phicdn.netW2441700053.exeGet hashmaliciousBlackMoonBrowse
                  • 192.229.221.95
                  nowe zam#U00f3wienie.exeGet hashmaliciousSnake KeyloggerBrowse
                  • 192.229.221.95
                  Quote 40240333-REV2.exeGet hashmaliciousAgentTeslaBrowse
                  • 192.229.221.95
                  BOMB-762.msiGet hashmaliciousAteraAgentBrowse
                  • 192.229.221.95
                  file.exeGet hashmaliciousLummaCBrowse
                  • 192.229.221.95
                  https://website-70396.convertflowpages.com/firstmarkinsuranceGet hashmaliciousHTMLPhisherBrowse
                  • 192.229.221.95
                  file.exeGet hashmaliciousCredential FlusherBrowse
                  • 192.229.221.95
                  file.exeGet hashmaliciousCredential FlusherBrowse
                  • 192.229.221.95
                  http://tayakay.comGet hashmaliciousUnknownBrowse
                  • 192.229.221.95
                  ADZP 20 Complex.exeGet hashmaliciousBabadeda, WiperBrowse
                  • 192.229.221.95
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  TZULOUSMagnetnaalene.exeGet hashmaliciousFormBook, GuLoaderBrowse
                  • 173.249.193.108
                  stormskridtets.exeGet hashmaliciousFormBook, GuLoaderBrowse
                  • 173.249.193.48
                  Brneforsorgspdagogers.exeGet hashmaliciousFormBook, GuLoaderBrowse
                  • 173.249.193.66
                  Brneforsorgspdagogers.exeGet hashmaliciousFormBook, GuLoaderBrowse
                  • 173.249.193.66
                  la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                  • 173.249.236.72
                  byte.arm5.elfGet hashmaliciousOkiruBrowse
                  • 173.249.236.51
                  https://tcmedcenter-my.sharepoint.com/:f:/g/personal/jessica_larson_tcmedcenter_org/Ek1X93Tsfp5KoiWqKbJ_ocQBqlE2wGVJqWkJh4H7mn0vuw?e=Yni2o7Get hashmaliciousUnknownBrowse
                  • 173.249.199.16
                  D6wsFZIM58.elfGet hashmaliciousUnknownBrowse
                  • 173.249.236.64
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  C:\Users\user\AppData\Local\Temp\nssA8D7.tmp\System.dllstormskridtets.exeGet hashmaliciousFormBook, GuLoaderBrowse
                    orders_PI 008-01.exeGet hashmaliciousRemcos, GuLoaderBrowse
                      RemotePCViewer.exeGet hashmaliciousUnknownBrowse
                        8737738_19082024.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                          8737738_19082024.vbsGet hashmaliciousGuLoaderBrowse
                            Dhl Delivery(AWB 9849791014).exeGet hashmaliciousGuLoaderBrowse
                              Dhl Delivery(AWB 9849791014).exeGet hashmaliciousGuLoaderBrowse
                                89.htaGet hashmaliciousCobalt Strike, GuLoaderBrowse
                                  Process:C:\Users\user\Desktop\yuc1Jwlkh5.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):52
                                  Entropy (8bit):4.0121618346445365
                                  Encrypted:false
                                  SSDEEP:3:BPi4YDgAmcAKDHMnhv:BPiBkAmc0nhv
                                  MD5:F298228D2D42CED0A00B0C5320000835
                                  SHA1:FB06F02DDCDA4C9EC752A688EE617064DB3A49EB
                                  SHA-256:E399AFE89F97EAE7BCDAE626913DA1618F4F42BA11887217CDBF524720532AB2
                                  SHA-512:464DA89F9E1D5935810443B20C3D19F77585D964DF89F5CB427482A03C8EF6274D06CBC01533D92C691FFD55E1725BA5F427D023A45A5128BCED0EEE11E083FE
                                  Malicious:false
                                  Reputation:low
                                  Preview:[skaaltalerens]..nonsaleability=sammenstuvningerne..
                                  Process:C:\Users\user\Desktop\yuc1Jwlkh5.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):12288
                                  Entropy (8bit):5.737556724687435
                                  Encrypted:false
                                  SSDEEP:192:MenY0qWTlt70IAj/lQ0sEWc/wtYbBH2aDybC7y+XBaIwL:M8+Qlt70Fj/lQRY/9VjjgL
                                  MD5:6E55A6E7C3FDBD244042EB15CB1EC739
                                  SHA1:070EA80E2192ABC42F358D47B276990B5FA285A9
                                  SHA-256:ACF90AB6F4EDC687E94AAF604D05E16E6CFB5E35873783B50C66F307A35C6506
                                  SHA-512:2D504B74DA38EDC967E3859733A2A9CACD885DB82F0CA69BFB66872E882707314C54238344D45945DC98BAE85772ACEEF71A741787922D640627D3C8AE8F1C35
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Joe Sandbox View:
                                  • Filename: stormskridtets.exe, Detection: malicious, Browse
                                  • Filename: orders_PI 008-01.exe, Detection: malicious, Browse
                                  • Filename: RemotePCViewer.exe, Detection: malicious, Browse
                                  • Filename: 8737738_19082024.vbs, Detection: malicious, Browse
                                  • Filename: 8737738_19082024.vbs, Detection: malicious, Browse
                                  • Filename: Dhl Delivery(AWB 9849791014).exe, Detection: malicious, Browse
                                  • Filename: Dhl Delivery(AWB 9849791014).exe, Detection: malicious, Browse
                                  • Filename: 89.hta, Detection: malicious, Browse
                                  Reputation:moderate, very likely benign file
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L...X..`...........!....."...........).......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text...O .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\yuc1Jwlkh5.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):589
                                  Entropy (8bit):4.277818373535095
                                  Encrypted:false
                                  SSDEEP:12:mScXAtJsdW8lLQIVVCTP1t0laiam6mObo/Bpqwnh2yKbdB1j1f:mSrTsdRTVVM9Yz69Hwh2yKb7ff
                                  MD5:E80E34F461528DF8F86C4248C971B2AD
                                  SHA1:A1A74D8F5711DEED35AF2B81BE070CA471C39500
                                  SHA-256:F2552D843F4D62F481743A15B7C95AA322C14EA5DBB999C8C889A42CBB093A8E
                                  SHA-512:46A5D6487131677DAC16C2BE4FC29517C14CB8DB6228B40344D733597462122EF0D1D7DD69B4D5A7A10F9C86635F99D91E91AC2CEBDF923C6B72EF3809637622
                                  Malicious:false
                                  Reputation:low
                                  Preview:pervalvar udvalgsarbejderne illegitime besully.trvarefabrikkers stemmeslugers binomialfordelingernes metropolit.mariolatrous griffy fiskeeksporten valutapuklerne spekulanter infusioners quantifys unconsolidation digitalises forvaltningsret..steticismens advents syde rebaptization returneredes chemosterilants agtvrdige,balklines sludres drengestregers topful koordinatvrdien angorakats tendensromanens blockheadish lidelsesfller eskapismes amiably phenicious nontenurial..overspringe udmntede agnostiker polycarpic stolper lbskes forhandlingsomraader acquires duskly kildnes gaultherase..
                                  Process:C:\Users\user\Desktop\yuc1Jwlkh5.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):276701
                                  Entropy (8bit):1.2570216910370695
                                  Encrypted:false
                                  SSDEEP:768:yFPJSwGwS4JXi8PNDQNMDeMW3SGBqGHw1zwpmPMoaO64g1abi4IZxeMcdN9vfd95:/rFf4EoTti54LkFvI3oDW
                                  MD5:18C3DA2AA022FF0B89999E28E6A2AE9A
                                  SHA1:0659DDE0FD4B39B22825F1645A0BAE7E7202C7F9
                                  SHA-256:05DE1FF63CC38C7C4B3034091A311791BFF578658FF17D156AA4FB41A2E197C6
                                  SHA-512:D3A51D8B29FEF026F94B339087413319E03DA3193D9159A43AD7B4FEE35A67EEEBC3E66A0092B5ED14F57458173D518C618F2EE00F4203F428EBE0FC162F667C
                                  Malicious:false
                                  Reputation:low
                                  Preview:......................................................(.L.................................3........&.................."...........l........................s.....................................-...........................8..........@.........................................................h..................................@.........).........................I.................F..................................................................T..............................................................j..".......#I.............r.............&..................|...............................................................................:.Z......................).............................................................................H.......C...........................................................................................t.........................................................M.............4........'........................................}..+.......................
                                  Process:C:\Users\user\Desktop\yuc1Jwlkh5.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):313672
                                  Entropy (8bit):1.2567166720965932
                                  Encrypted:false
                                  SSDEEP:768:iEGLlMkjkYtwS3MeXM3OpckON5VIbjnI3Oif4NxZSqJbDvz+hE7IkHAYsaW3DQLF:LtWLdp3I3yrt+3SoTMU5oT5
                                  MD5:17B0342D31B6E728E13DF79009833371
                                  SHA1:B9F3354C4E886382D220D5EC4FA91F389585BD40
                                  SHA-256:8CAF84CE635BD92186709E81D12AE352E049C83B53F1C22A6DCB221E8F1C011E
                                  SHA-512:4772F5AE64E0619B23114A41785DDE7DD1A9BACE12A9ABEDEF3400EDB3660D4E780C9B91E23A9FDEC1D97BCF7DC48E201771D7D58EB1740191A05CCFDB433C83
                                  Malicious:false
                                  Preview:....................N............................k....................................................#.................................................................................`........0.............u...................................y................................................................g.........7................E.......&........w..............................................*....................<..................................3................i.......................................................................U...).................................................. ........................................................................................................................A..............................N......c.b.......................................................................................................N........T..............................................h..............................................................................
                                  Process:C:\Users\user\Desktop\yuc1Jwlkh5.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):207881
                                  Entropy (8bit):7.331635651026833
                                  Encrypted:false
                                  SSDEEP:3072:zDyy/gxfmTCBeuVaCzUVI90J8g5sF6963goPdEWduKiKMLUW3tTS4NrQsgT99BwE:zDyR4WDsCgVImsE77KMLUS44NMx
                                  MD5:749F30B7C897431F55057BFE15DF7228
                                  SHA1:2DB933559839DD5F79454546C98CCE8E9C4C8112
                                  SHA-256:1506167C68DEBF892BD0E2EAD9515C1F3F80BCCA9C489E715F2436425B7D8D48
                                  SHA-512:8E6BC090DFE67D411EA2B386538BAF9ADE1C7A47031CD4BFA0E7D491CFEF814923E71BA1DF8A2CB0A41AFADAE896F77BD89170BB560112E2A2B7BAA8DCD60C9D
                                  Malicious:false
                                  Preview:............ ..............EEEEE...............n..............C....F.......mm...........D..............ttt...--........``..:::....S....rrrr............P.O..6....".GG...............#.0.....................E..............22...~~.......aa............,..................................&..gg........77..LLLLLL.......ii.......0..o.ff..}.x... .99.....RR...............~~~~~.....................J......................kkk........E..........C...ee.........................G............J.............YY..~...2.............l........##.........Z.........(...........h.y........000.......yy...........l..lll...........................88...@@@@@.QQ..........^^...........mm...................CCC........KKKK.........2...............++..........V......-................B.........w................ ..............!!!....MM......66................===....................NNN..........S....??.........k........D.................................(............................. .........////....x.ccc.ZZ.w..====......
                                  Process:C:\Users\user\Desktop\yuc1Jwlkh5.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):16857
                                  Entropy (8bit):4.532822901243277
                                  Encrypted:false
                                  SSDEEP:384:+ipfHtyeVOvFfo92BAVO4tKq/vChYFVmuF1WbTeqFb7RfW:dlyttfo9iAVO4tiGmPZW
                                  MD5:143CC97C03735690BA675F029A4A3A16
                                  SHA1:7BBA23E28EDB92B05620AA4EA667D3C04DE93593
                                  SHA-256:EDCF653A613FF7FB1143DF97441A7027D486CA942A333F3EA0B74C7C11F3D88B
                                  SHA-512:01C2C26B31488E036F6C6634636B33A0C06672FF464549D12B653326FA1A90460FAF485C59D8F0B85C6CCF57946AC4D09A70B5A5D3609E93AD3DCDE421CF16A7
                                  Malicious:false
                                  Preview:.........UU..33........Z..nnnnnn....w.[..............EE................T.......................k..8e...r...n...e...l.N.3...2..M:...:.+.C...r..de...a...t...e...F.h.i...l...e...A...(...m... ...r...4... ...,... ...i... .&&0..cx...8...0...0...0...0...0...0...0...,..w ...i..w ...0...,... ...p... ...0...,... ...i... ...4...,... ...i... ..?0...x...8...0...,... .%%i... ...0...)...i.......r...8.......k...e...r...n...e...l._.3.~.2...:...:...S.**e...t..aF...i...l...e...P...o...i...n...t...e...r...(...i... ...r...8...,... ..vi... ...2...3...0...1...2... ...,... ...i... ./.0...,...i... ...0...)...i.......r...4.......k...e...r...n...e...l...3...2.s.:...:...V...i...r...t...u...a...l...A...l...l...o..Nc...(...i..y ...0...,...i... ...5...4..B0...6...7...2..N0...0...,... .ddi..G ...0...x...3...0...0...0...,... ..Bi... ...0...x..v4...0...)...p...../.r...2.......k...e...r.}.n...e...l..B3...2..U:...:...R.+.e...a...d...F...i...l...e...(...i... ...r...8...,... ...i... ...r...2...,... ...i... ..^5...4...0...6
                                  Process:C:\Users\user\Desktop\yuc1Jwlkh5.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):244482
                                  Entropy (8bit):1.2509108197987615
                                  Encrypted:false
                                  SSDEEP:768:ArczTS8oocp0tWLSMkXWg7PKU30gfL4Qf1AUdyM03I3xkjFlu7NDSAZd+6XYIHXd:7Yhp0ckXv78owAC3MhxqI
                                  MD5:E6AC7A31DA2D4322339135AD20EB0F23
                                  SHA1:F76C6D6EE7C9B01DB799642990AA88B140003EC4
                                  SHA-256:00FAD7EC11DB9706955FDF3BE0E6FB037E9F9780F94A502A774B30AB52773A94
                                  SHA-512:C87DABB08D092D546FF80270B052CF1C5D92D25852DBFECC139CE528CCD2A22CCE130A8C90C08117DF542E6D83DE91E92180F853C201F042BED4681D4737E75D
                                  Malicious:false
                                  Preview:............................................w.........................................................................\.............................o.............q......................................]..........................I...............!...............................................m....... ............................................................................................h......K................=............................................................r..................................W....................................................................R......................................p..0...........................................................k.........k........................d........................................................................................................................9....................................#.....A........`...9...............P.......................................................................\...............
                                  Process:C:\Users\user\Desktop\yuc1Jwlkh5.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):430713
                                  Entropy (8bit):1.2530301266200883
                                  Encrypted:false
                                  SSDEEP:1536:vu65sFtuGbUq4CCWG9TcLs9xEEc0MVWFnhMA:2PjbUquWUYs/9x
                                  MD5:8ED0D91C7C65B02A5630D1A012895C3D
                                  SHA1:FA74C3BD3A32123D71AEA67D386B5AC251FEC260
                                  SHA-256:1113E4990BEF55E4CD1D868513B2305C72803FB296D559BFA9C8C93DE2EDC8AB
                                  SHA-512:FBE41906CCABB44E8D71D7664B756F75ABDBF0FB80BFCBBF4BBA9D9370DF4CEDBE437BA9F116B3F9E9D2AE2FB1E2D34D34F152E518A2E5E0096A506093F8DB24
                                  Malicious:false
                                  Preview:..[.Z.....?............#......................................................0.....B..x....................................................Q.......Z......................I....j............{..........................................................................................................................................-.....7..............................M........9.U...........?...............................................................X..................../.....................t...............4................,........`........~..............d............................u............{.....................a.............................5.............{...g....Z.................H................l..........................S.............................................................................................................................J...........................................U............................x.....f.............D..../....o........................QLi...
                                  Process:C:\Users\user\Desktop\yuc1Jwlkh5.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):223405
                                  Entropy (8bit):1.2642457624863013
                                  Encrypted:false
                                  SSDEEP:768:DDh04DrooyUGbNSipoS0yYEt0ihBLBJU06zf8VWZt+il3sVxTD6I6o9+2u5inuB4:rorpFGQVWwj9bQdun2ljrAbUGl
                                  MD5:96E6C0CBBACF232110DF3E7FC4B4D980
                                  SHA1:FC18FDD4E5417AC76F68BF507AC0BA6B9A183CFE
                                  SHA-256:04F64748055424253509A229EE3E6F9BFC86898CBA667DA8312333552987B610
                                  SHA-512:8DD22ABBED1522A08E9AC3559F5CC6871B77C1B76C2A7AA0CD61E52CA7D3A43DCBAF00285BF29C1FF885FC5F424FA411F56F19EB1886DA97CC7010BCA66530A9
                                  Malicious:false
                                  Preview:....................................{............!.............Q.............................................................................:...........z..................................W.......................... ......................................3...........y...............j................!n...............................................................................3........................+.......................a.......................c........................................)............................................................................................................................?.............................................................................................S....../.....................................................6./...t..+.......................H............{..........&................................b............................R.......x....=..................V....]........>...................................m................0.....
                                  Process:C:\Users\user\Desktop\yuc1Jwlkh5.exe
                                  File Type:DIY-Thermocam raw data (Lepton 2.x), scale 175-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 8.000000
                                  Category:dropped
                                  Size (bytes):385914
                                  Entropy (8bit):1.2561626561864936
                                  Encrypted:false
                                  SSDEEP:768:++TtgE2yMxqLKoiyt4CpVdIwu3Uema6LhlEv9cCAXP69rBqGDpx/NEJKTPLqqQJl:bMFgNCAE6oLJS9a/IrOyTWq2uC
                                  MD5:A4946227DE4DC2A79BF473A3D09C4247
                                  SHA1:9FF800E6B4A72B6281D812710D00AD003F757170
                                  SHA-256:1F6BB50C9AC95A61782FCDE006B6E396ACEDA7794FD30FFB7D97020FD7B8059E
                                  SHA-512:2902630584092375E1A2FB4669437C43548BC0D0E00B2B98A3FDAEEDC57F3567B61A3FC545C8157FD410D6E26C9A70E8D989E97983700FFB55D9D1154CEBE1F4
                                  Malicious:false
                                  Preview:..................................................#..................................._............................{.........................P................$.............................................................................................}............&................g.........................................A................................................K................................................Z..............-......5.........................................................e.......d..........................................L...............0......C................).................................................................................r............Q..2........................9................(...............................................t......................................................................>.....b..8.....................n.............]..................F.....................................U...................................S.........
                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                  Entropy (8bit):6.460432078632097
                                  TrID:
                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                  • DOS Executable Generic (2002/1) 0.02%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:yuc1Jwlkh5.exe
                                  File size:915'632 bytes
                                  MD5:53441f2de2d573f3b2e4fb35c248229b
                                  SHA1:afc840f25adfcb5873f5b69e55b2920c370a2285
                                  SHA256:5bc4b28288f068f1c11e69b1cc94aacb4b0d2812494c1673471b890f1ce67a9e
                                  SHA512:021ba2fc3570b82daf0181f229e5e0b80a10f6a74a3f77baa4d608961c38222b03d428f82b7d5abfca6fa55cbfebc7b5e715f33ecf8f67882186b6601bfcbda2
                                  SSDEEP:12288:A3nIRS5/vuI8sOabBdHdWIXjwxipfpQGYAGau5yxX9O9u:A3IRgvuoO0pdZXjUiNuGYpawA9uu
                                  TLSH:59156949A38C50C6DD3A3B32FA1D7613B655AC138550118A3AC8BE583BF57B07B9FA31
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L......`.................f....:....
                                  Icon Hash:d3672eac1a0c662c
                                  Entrypoint:0x4034a2
                                  Entrypoint Section:.text
                                  Digitally signed:true
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x60FC90D1 [Sat Jul 24 22:14:41 2021 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:6e7f9a29f2c85394521a08b9f31f6275
                                  Signature Valid:false
                                  Signature Issuer:CN=Underretternes, O=Underretternes, L=Lannemezan, C=FR
                                  Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                  Error Number:-2146762487
                                  Not Before, Not After
                                  • 25/01/2024 09:16:23 24/01/2027 09:16:23
                                  Subject Chain
                                  • CN=Underretternes, O=Underretternes, L=Lannemezan, C=FR
                                  Version:3
                                  Thumbprint MD5:B7699D9FC11FF2BC8B537A1496DBA607
                                  Thumbprint SHA-1:13E2B15CFFB46BFE6E63F1DDDD5D08B90EC97D8B
                                  Thumbprint SHA-256:B488D28F491B0130739761D68A25298DFD95A7D90A466B370C1D833271156981
                                  Serial:0C38DED2C7C23BE59C80206BBCC81E7BF88A1876
                                  Instruction
                                  sub esp, 000002D4h
                                  push ebx
                                  push esi
                                  push edi
                                  push 00000020h
                                  pop edi
                                  xor ebx, ebx
                                  push 00008001h
                                  mov dword ptr [esp+14h], ebx
                                  mov dword ptr [esp+10h], 0040A2E0h
                                  mov dword ptr [esp+1Ch], ebx
                                  call dword ptr [004080CCh]
                                  call dword ptr [004080D0h]
                                  and eax, BFFFFFFFh
                                  cmp ax, 00000006h
                                  mov dword ptr [007A8A6Ch], eax
                                  je 00007FC984B4D543h
                                  push ebx
                                  call 00007FC984B50831h
                                  cmp eax, ebx
                                  je 00007FC984B4D539h
                                  push 00000C00h
                                  call eax
                                  mov esi, 004082B0h
                                  push esi
                                  call 00007FC984B507ABh
                                  push esi
                                  call dword ptr [00408154h]
                                  lea esi, dword ptr [esi+eax+01h]
                                  cmp byte ptr [esi], 00000000h
                                  jne 00007FC984B4D51Ch
                                  push 0000000Bh
                                  call 00007FC984B50804h
                                  push 00000009h
                                  call 00007FC984B507FDh
                                  push 00000007h
                                  mov dword ptr [007A8A64h], eax
                                  call 00007FC984B507F1h
                                  cmp eax, ebx
                                  je 00007FC984B4D541h
                                  push 0000001Eh
                                  call eax
                                  test eax, eax
                                  je 00007FC984B4D539h
                                  or byte ptr [007A8A6Fh], 00000040h
                                  push ebp
                                  call dword ptr [00408038h]
                                  push ebx
                                  call dword ptr [00408298h]
                                  mov dword ptr [007A8B38h], eax
                                  push ebx
                                  lea eax, dword ptr [esp+34h]
                                  push 000002B4h
                                  push eax
                                  push ebx
                                  push 0079FF08h
                                  call dword ptr [0040818Ch]
                                  push 0040A2C8h
                                  Programming Language:
                                  • [EXP] VC++ 6.0 SP5 build 8804
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x3de0000x56ef8.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0xdef900x920.data
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x656c0x660012117ad2476c7a7912407af0dcfcb8a7False0.6737515318627451data6.47208759712619IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rdata0x80000x13980x1400e3e8d62e1d2308b175349eb9daa266c8False0.4494140625data5.137750894959169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .data0xa0000x39eb780x6002020ca26e010546720fd467c5d087b57unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .ndata0x3a90000x350000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rsrc0x3de0000x56ef80x57000c1896e67b80e50079ebeadcac8c0d8c3False0.13646338451867815data2.5203155069997596IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_ICON0x3de2c80x42028Device independent bitmap graphic, 256 x 512 x 32, image size 0EnglishUnited States0.11415584223451786
                                  RT_ICON0x4202f00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 0EnglishUnited States0.17530758310658937
                                  RT_ICON0x430b180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.27551867219917014
                                  RT_ICON0x4330c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.3295028142589118
                                  RT_ICON0x4341680x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.47074468085106386
                                  RT_DIALOG0x4345d00x100dataEnglishUnited States0.5234375
                                  RT_DIALOG0x4346d00x11cdataEnglishUnited States0.6056338028169014
                                  RT_DIALOG0x4347f00xc4dataEnglishUnited States0.5918367346938775
                                  RT_DIALOG0x4348b80x60dataEnglishUnited States0.7291666666666666
                                  RT_GROUP_ICON0x4349180x4cdataEnglishUnited States0.7894736842105263
                                  RT_VERSION0x4349680x250dataEnglishUnited States0.5287162162162162
                                  RT_MANIFEST0x434bb80x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                  DLLImport
                                  ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                                  SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                                  ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                                  COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                                  USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, SetWindowPos, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                                  GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                                  KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersion, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, ExitProcess, CopyFileW, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                                  Language of compilation systemCountry where language is spokenMap
                                  EnglishUnited States
                                  TimestampSource PortDest PortSource IPDest IP
                                  Nov 19, 2024 11:35:33.560461998 CET4974080192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:35:34.570713997 CET4974080192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:35:36.570774078 CET4974080192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:35:37.683979034 CET4974280192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:35:38.695755959 CET4974280192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:35:40.711380005 CET4974280192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:35:41.837198019 CET4974380192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:35:42.836355925 CET4974380192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:35:44.836337090 CET4974380192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:35:45.967057943 CET4974680192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:35:46.961345911 CET4974680192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:35:48.961483955 CET4974680192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:35:50.088049889 CET4974780192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:35:51.086466074 CET4974780192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:35:53.101972103 CET4974780192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:35:54.213058949 CET4975080192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:35:55.227088928 CET4975080192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:35:57.228054047 CET4975080192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:35:58.339078903 CET4975680192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:35:59.352185965 CET4975680192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:01.367621899 CET4975680192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:02.462800026 CET4975780192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:03.477014065 CET4975780192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:05.492702007 CET4975780192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:06.590177059 CET4975980192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:07.602088928 CET4975980192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:09.617676020 CET4975980192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:10.717036963 CET4976080192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:11.727168083 CET4976080192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:13.742674112 CET4976080192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:14.837878942 CET4976180192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:15.836509943 CET4976180192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:17.836429119 CET4976180192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:18.962790966 CET4976880192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:19.977101088 CET4976880192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:21.992692947 CET4976880192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:23.201885939 CET4976980192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:24.211487055 CET4976980192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:26.227055073 CET4976980192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:27.322359085 CET4977180192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:28.336627960 CET4977180192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:30.352147102 CET4977180192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:31.447516918 CET4977380192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:32.461446047 CET4977380192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:34.477272987 CET4977380192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:35.577452898 CET4977480192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:36.586618900 CET4977480192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:38.586704969 CET4977480192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:39.698688030 CET4977580192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:40.695960045 CET4977580192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:42.711518049 CET4977580192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:43.822468042 CET4977680192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:44.836764097 CET4977680192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:46.836468935 CET4977680192.168.2.4173.249.193.48
                                  Nov 19, 2024 11:36:50.836505890 CET4977680192.168.2.4173.249.193.48
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Nov 19, 2024 11:36:48.382802963 CET1.1.1.1192.168.2.40x95b0No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                  Nov 19, 2024 11:36:48.382802963 CET1.1.1.1192.168.2.40x95b0No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false

                                  Click to jump to process

                                  Click to jump to process

                                  Click to jump to process

                                  Target ID:0
                                  Start time:05:34:40
                                  Start date:19/11/2024
                                  Path:C:\Users\user\Desktop\yuc1Jwlkh5.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\yuc1Jwlkh5.exe"
                                  Imagebase:0x400000
                                  File size:915'632 bytes
                                  MD5 hash:53441F2DE2D573F3B2E4FB35C248229B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2151810684.0000000005313000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:true

                                  Target ID:4
                                  Start time:05:35:26
                                  Start date:19/11/2024
                                  Path:C:\Users\user\Desktop\yuc1Jwlkh5.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\yuc1Jwlkh5.exe"
                                  Imagebase:0x400000
                                  File size:915'632 bytes
                                  MD5 hash:53441F2DE2D573F3B2E4FB35C248229B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000004.00000002.2945116780.0000000002153000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:false

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:27%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:18.5%
                                    Total number of Nodes:704
                                    Total number of Limit Nodes:16
                                    execution_graph 2240 4034a2 SetErrorMode GetVersion 2241 4034e1 2240->2241 2242 4034e7 2240->2242 2243 4067e3 5 API calls 2241->2243 2330 406773 GetSystemDirectoryW 2242->2330 2243->2242 2245 4034fd lstrlenA 2245->2242 2246 40350d 2245->2246 2333 4067e3 GetModuleHandleA 2246->2333 2249 4067e3 5 API calls 2250 40351b 2249->2250 2251 4067e3 5 API calls 2250->2251 2252 403527 #17 OleInitialize SHGetFileInfoW 2251->2252 2339 4063ee lstrcpynW 2252->2339 2255 403573 GetCommandLineW 2340 4063ee lstrcpynW 2255->2340 2257 403585 2341 405cf0 2257->2341 2260 4036d4 GetTempPathW 2345 403471 2260->2345 2262 4036ec 2264 4036f0 GetWindowsDirectoryW lstrcatW 2262->2264 2265 403746 DeleteFileW 2262->2265 2263 4035c3 2266 405cf0 CharNextW 2263->2266 2271 4036bf 2263->2271 2273 4036bd 2263->2273 2268 403471 12 API calls 2264->2268 2355 403015 GetTickCount GetModuleFileNameW 2265->2355 2266->2263 2269 40370c 2268->2269 2269->2265 2270 403710 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 2269->2270 2272 403471 12 API calls 2270->2272 2472 4063ee lstrcpynW 2271->2472 2277 40373e 2272->2277 2273->2260 2274 4037fd 2383 403abd 2274->2383 2275 40375a 2275->2274 2279 405cf0 CharNextW 2275->2279 2282 40380d 2275->2282 2277->2265 2277->2282 2297 403779 2279->2297 2489 4039e3 2282->2489 2283 403947 2285 4039cb ExitProcess 2283->2285 2286 40394f GetCurrentProcess OpenProcessToken 2283->2286 2284 403827 2496 405a54 2284->2496 2291 403967 LookupPrivilegeValueW AdjustTokenPrivileges 2286->2291 2292 40399b 2286->2292 2288 4037d7 2473 405dcb 2288->2473 2289 40383d 2439 4059bf 2289->2439 2291->2292 2296 4067e3 5 API calls 2292->2296 2300 4039a2 2296->2300 2297->2288 2297->2289 2303 4039b7 ExitWindowsEx 2300->2303 2306 4039c4 2300->2306 2301 403853 lstrcatW 2302 40385e lstrcatW lstrcmpiW 2301->2302 2302->2282 2305 40387a 2302->2305 2303->2285 2303->2306 2308 403886 2305->2308 2309 40387f 2305->2309 2504 40140b 2306->2504 2307 4037f2 2488 4063ee lstrcpynW 2307->2488 2500 4059a2 CreateDirectoryW 2308->2500 2442 405925 CreateDirectoryW 2309->2442 2315 40388b SetCurrentDirectoryW 2316 4038a6 2315->2316 2317 40389b 2315->2317 2447 4063ee lstrcpynW 2316->2447 2503 4063ee lstrcpynW 2317->2503 2322 4038f2 CopyFileW 2327 4038b4 2322->2327 2323 40393b 2324 4061b4 36 API calls 2323->2324 2324->2282 2326 40642b 17 API calls 2326->2327 2327->2323 2327->2326 2329 403926 CloseHandle 2327->2329 2448 40642b 2327->2448 2465 4061b4 MoveFileExW 2327->2465 2469 4059d7 CreateProcessW 2327->2469 2329->2327 2331 406795 wsprintfW LoadLibraryExW 2330->2331 2331->2245 2334 406809 GetProcAddress 2333->2334 2335 4067ff 2333->2335 2337 403514 2334->2337 2336 406773 3 API calls 2335->2336 2338 406805 2336->2338 2337->2249 2338->2334 2338->2337 2339->2255 2340->2257 2342 405cf6 2341->2342 2343 4035aa CharNextW 2342->2343 2344 405cfd CharNextW 2342->2344 2343->2260 2343->2263 2344->2342 2507 40669d 2345->2507 2347 40347d 2348 403487 2347->2348 2516 405cc3 lstrlenW CharPrevW 2347->2516 2348->2262 2351 4059a2 2 API calls 2352 403495 2351->2352 2519 405f13 2352->2519 2523 405ee4 GetFileAttributesW CreateFileW 2355->2523 2357 403055 2358 403065 2357->2358 2524 4063ee lstrcpynW 2357->2524 2358->2275 2360 40307b 2525 405d0f lstrlenW 2360->2525 2364 40308c GetFileSize 2379 403186 2364->2379 2382 4030a3 2364->2382 2367 40318f 2367->2358 2368 4031bf GlobalAlloc 2367->2368 2565 40345a SetFilePointer 2367->2565 2541 40345a SetFilePointer 2368->2541 2369 4031f2 2373 402fb1 6 API calls 2369->2373 2372 4031da 2542 40324c 2372->2542 2373->2358 2374 4031a8 2376 403444 ReadFile 2374->2376 2378 4031b3 2376->2378 2377 402fb1 6 API calls 2377->2382 2378->2358 2378->2368 2530 402fb1 2379->2530 2380 4031e6 2380->2358 2380->2380 2381 403223 SetFilePointer 2380->2381 2381->2358 2382->2358 2382->2369 2382->2377 2382->2379 2562 403444 2382->2562 2384 4067e3 5 API calls 2383->2384 2385 403ad1 2384->2385 2386 403ad7 2385->2386 2387 403ae9 2385->2387 2594 406335 wsprintfW 2386->2594 2595 4062bc 2387->2595 2390 403b38 lstrcatW 2392 403ae7 2390->2392 2586 403d93 2392->2586 2393 4062bc 3 API calls 2393->2390 2396 405dcb 18 API calls 2397 403b6a 2396->2397 2398 403bfe 2397->2398 2400 4062bc 3 API calls 2397->2400 2399 405dcb 18 API calls 2398->2399 2402 403c04 2399->2402 2403 403b9c 2400->2403 2401 403c14 LoadImageW 2405 403cba 2401->2405 2406 403c3b RegisterClassW 2401->2406 2402->2401 2404 40642b 17 API calls 2402->2404 2403->2398 2407 403bbd lstrlenW 2403->2407 2410 405cf0 CharNextW 2403->2410 2404->2401 2409 40140b 2 API calls 2405->2409 2408 403c71 SystemParametersInfoW CreateWindowExW 2406->2408 2438 403cc4 2406->2438 2411 403bf1 2407->2411 2412 403bcb lstrcmpiW 2407->2412 2408->2405 2413 403cc0 2409->2413 2414 403bba 2410->2414 2416 405cc3 3 API calls 2411->2416 2412->2411 2415 403bdb GetFileAttributesW 2412->2415 2418 403d93 18 API calls 2413->2418 2413->2438 2414->2407 2417 403be7 2415->2417 2419 403bf7 2416->2419 2417->2411 2420 405d0f 2 API calls 2417->2420 2421 403cd1 2418->2421 2600 4063ee lstrcpynW 2419->2600 2420->2411 2423 403d60 2421->2423 2424 403cdd ShowWindow 2421->2424 2601 405529 OleInitialize 2423->2601 2426 406773 3 API calls 2424->2426 2428 403cf5 2426->2428 2427 403d66 2430 403d82 2427->2430 2431 403d6a 2427->2431 2429 403d03 GetClassInfoW 2428->2429 2432 406773 3 API calls 2428->2432 2434 403d17 GetClassInfoW RegisterClassW 2429->2434 2435 403d2d DialogBoxParamW 2429->2435 2433 40140b 2 API calls 2430->2433 2437 40140b 2 API calls 2431->2437 2431->2438 2432->2429 2433->2438 2434->2435 2436 40140b 2 API calls 2435->2436 2436->2438 2437->2438 2438->2282 2440 4067e3 5 API calls 2439->2440 2441 403842 lstrcatW 2440->2441 2441->2301 2441->2302 2443 405976 GetLastError 2442->2443 2444 403884 2442->2444 2443->2444 2445 405985 SetFileSecurityW 2443->2445 2444->2315 2445->2444 2446 40599b GetLastError 2445->2446 2446->2444 2447->2327 2462 406438 2448->2462 2449 406683 2450 4038e5 DeleteFileW 2449->2450 2625 4063ee lstrcpynW 2449->2625 2450->2322 2450->2327 2452 406651 lstrlenW 2452->2462 2455 40642b 10 API calls 2455->2452 2456 4062bc 3 API calls 2456->2462 2457 406566 GetSystemDirectoryW 2457->2462 2458 406579 GetWindowsDirectoryW 2458->2462 2459 40669d 5 API calls 2459->2462 2460 40642b 10 API calls 2460->2462 2461 4065f4 lstrcatW 2461->2462 2462->2449 2462->2452 2462->2455 2462->2456 2462->2457 2462->2458 2462->2459 2462->2460 2462->2461 2463 4065ad SHGetSpecialFolderLocation 2462->2463 2623 406335 wsprintfW 2462->2623 2624 4063ee lstrcpynW 2462->2624 2463->2462 2464 4065c5 SHGetPathFromIDListW CoTaskMemFree 2463->2464 2464->2462 2466 4061c8 2465->2466 2468 4061d5 2465->2468 2626 40603a 2466->2626 2468->2327 2470 405a16 2469->2470 2471 405a0a CloseHandle 2469->2471 2470->2327 2471->2470 2472->2273 2660 4063ee lstrcpynW 2473->2660 2475 405ddc 2661 405d6e CharNextW CharNextW 2475->2661 2478 4037e3 2478->2282 2487 4063ee lstrcpynW 2478->2487 2479 40669d 5 API calls 2485 405df2 2479->2485 2480 405e23 lstrlenW 2481 405e2e 2480->2481 2480->2485 2482 405cc3 3 API calls 2481->2482 2484 405e33 GetFileAttributesW 2482->2484 2484->2478 2485->2478 2485->2480 2486 405d0f 2 API calls 2485->2486 2667 40674c FindFirstFileW 2485->2667 2486->2480 2487->2307 2488->2274 2490 4039fb 2489->2490 2491 4039ed CloseHandle 2489->2491 2670 403a28 2490->2670 2491->2490 2497 405a69 2496->2497 2498 403835 ExitProcess 2497->2498 2499 405a7d MessageBoxIndirectW 2497->2499 2499->2498 2501 4059b2 2500->2501 2502 4059b6 GetLastError 2500->2502 2501->2315 2502->2501 2503->2316 2505 401389 2 API calls 2504->2505 2506 401420 2505->2506 2506->2285 2514 4066aa 2507->2514 2508 406720 2509 406725 CharPrevW 2508->2509 2512 406746 2508->2512 2509->2508 2510 406713 CharNextW 2510->2508 2510->2514 2511 405cf0 CharNextW 2511->2514 2512->2347 2513 4066ff CharNextW 2513->2514 2514->2508 2514->2510 2514->2511 2514->2513 2515 40670e CharNextW 2514->2515 2515->2510 2517 40348f 2516->2517 2518 405cdf lstrcatW 2516->2518 2517->2351 2518->2517 2520 405f20 GetTickCount GetTempFileNameW 2519->2520 2521 4034a0 2520->2521 2522 405f56 2520->2522 2521->2262 2522->2520 2522->2521 2523->2357 2524->2360 2526 405d1d 2525->2526 2527 405d23 CharPrevW 2526->2527 2528 403081 2526->2528 2527->2526 2527->2528 2529 4063ee lstrcpynW 2528->2529 2529->2364 2531 402fd2 2530->2531 2532 402fba 2530->2532 2535 402fe2 GetTickCount 2531->2535 2536 402fda 2531->2536 2533 402fc3 DestroyWindow 2532->2533 2534 402fca 2532->2534 2533->2534 2534->2367 2538 402ff0 CreateDialogParamW ShowWindow 2535->2538 2539 403013 2535->2539 2566 40681f 2536->2566 2538->2539 2539->2367 2541->2372 2544 403265 2542->2544 2543 403293 2546 403444 ReadFile 2543->2546 2544->2543 2583 40345a SetFilePointer 2544->2583 2547 40329e 2546->2547 2548 4032b0 GetTickCount 2547->2548 2549 4033dd 2547->2549 2551 4033c7 2547->2551 2548->2551 2558 4032dc 2548->2558 2550 40341f 2549->2550 2555 4033e1 2549->2555 2553 403444 ReadFile 2550->2553 2551->2380 2552 403444 ReadFile 2552->2558 2553->2551 2554 403444 ReadFile 2554->2555 2555->2551 2555->2554 2556 405f96 WriteFile 2555->2556 2556->2555 2557 403332 GetTickCount 2557->2558 2558->2551 2558->2552 2558->2557 2559 403357 MulDiv wsprintfW 2558->2559 2581 405f96 WriteFile 2558->2581 2570 405456 2559->2570 2584 405f67 ReadFile 2562->2584 2565->2374 2567 40683c PeekMessageW 2566->2567 2568 406832 DispatchMessageW 2567->2568 2569 402fe0 2567->2569 2568->2567 2569->2367 2571 405471 2570->2571 2579 405513 2570->2579 2572 40548d lstrlenW 2571->2572 2573 40642b 17 API calls 2571->2573 2574 4054b6 2572->2574 2575 40549b lstrlenW 2572->2575 2573->2572 2576 4054c9 2574->2576 2577 4054bc SetWindowTextW 2574->2577 2578 4054ad lstrcatW 2575->2578 2575->2579 2576->2579 2580 4054cf SendMessageW SendMessageW SendMessageW 2576->2580 2577->2576 2578->2574 2579->2558 2580->2579 2582 405fb4 2581->2582 2582->2558 2583->2543 2585 403457 2584->2585 2585->2382 2587 403da7 2586->2587 2608 406335 wsprintfW 2587->2608 2589 403e18 2609 403e4c 2589->2609 2591 403b48 2591->2396 2592 403e1d 2592->2591 2593 40642b 17 API calls 2592->2593 2593->2592 2594->2392 2612 40625b 2595->2612 2598 4062f0 RegQueryValueExW RegCloseKey 2599 403b19 2598->2599 2599->2390 2599->2393 2600->2398 2616 404390 2601->2616 2603 405573 2604 404390 SendMessageW 2603->2604 2605 405585 OleUninitialize 2604->2605 2605->2427 2606 40554c 2606->2603 2619 401389 2606->2619 2608->2589 2610 40642b 17 API calls 2609->2610 2611 403e5a SetWindowTextW 2610->2611 2611->2592 2613 40626a 2612->2613 2614 406273 RegOpenKeyExW 2613->2614 2615 40626e 2613->2615 2614->2615 2615->2598 2615->2599 2617 4043a8 2616->2617 2618 404399 SendMessageW 2616->2618 2617->2606 2618->2617 2621 401390 2619->2621 2620 4013fe 2620->2606 2621->2620 2622 4013cb MulDiv SendMessageW 2621->2622 2622->2621 2623->2462 2624->2462 2625->2450 2627 406090 GetShortPathNameW 2626->2627 2628 40606a 2626->2628 2629 4060a5 2627->2629 2630 4061af 2627->2630 2653 405ee4 GetFileAttributesW CreateFileW 2628->2653 2629->2630 2633 4060ad wsprintfA 2629->2633 2630->2468 2632 406074 CloseHandle GetShortPathNameW 2632->2630 2634 406088 2632->2634 2635 40642b 17 API calls 2633->2635 2634->2627 2634->2630 2636 4060d5 2635->2636 2654 405ee4 GetFileAttributesW CreateFileW 2636->2654 2638 4060e2 2638->2630 2639 4060f1 GetFileSize GlobalAlloc 2638->2639 2640 406113 2639->2640 2641 4061a8 CloseHandle 2639->2641 2642 405f67 ReadFile 2640->2642 2641->2630 2643 40611b 2642->2643 2643->2641 2655 405e49 lstrlenA 2643->2655 2646 406132 lstrcpyA 2649 406154 2646->2649 2647 406146 2648 405e49 4 API calls 2647->2648 2648->2649 2650 40618b SetFilePointer 2649->2650 2651 405f96 WriteFile 2650->2651 2652 4061a1 GlobalFree 2651->2652 2652->2641 2653->2632 2654->2638 2656 405e8a lstrlenA 2655->2656 2657 405e63 lstrcmpiA 2656->2657 2658 405e92 2656->2658 2657->2658 2659 405e81 CharNextA 2657->2659 2658->2646 2658->2647 2659->2656 2660->2475 2662 405d8b 2661->2662 2666 405d9d 2661->2666 2663 405d98 CharNextW 2662->2663 2662->2666 2664 405dc1 2663->2664 2664->2478 2664->2479 2665 405cf0 CharNextW 2665->2666 2666->2664 2666->2665 2668 406762 FindClose 2667->2668 2669 40676d 2667->2669 2668->2669 2669->2485 2671 403a36 2670->2671 2672 403a00 2671->2672 2673 403a3b FreeLibrary GlobalFree 2671->2673 2674 405b00 2672->2674 2673->2672 2673->2673 2675 405dcb 18 API calls 2674->2675 2676 405b20 2675->2676 2677 405b28 DeleteFileW 2676->2677 2678 405b3f 2676->2678 2679 403816 OleUninitialize 2677->2679 2680 405c5f 2678->2680 2713 4063ee lstrcpynW 2678->2713 2679->2283 2679->2284 2680->2679 2687 40674c 2 API calls 2680->2687 2682 405b65 2683 405b78 2682->2683 2684 405b6b lstrcatW 2682->2684 2686 405d0f 2 API calls 2683->2686 2685 405b7e 2684->2685 2689 405b8e lstrcatW 2685->2689 2691 405b99 lstrlenW FindFirstFileW 2685->2691 2686->2685 2688 405c84 2687->2688 2688->2679 2690 405c88 2688->2690 2689->2691 2693 405cc3 3 API calls 2690->2693 2691->2680 2692 405bbb 2691->2692 2695 405c42 FindNextFileW 2692->2695 2705 405b00 60 API calls 2692->2705 2709 405c0c 2692->2709 2714 4063ee lstrcpynW 2692->2714 2694 405c8e 2693->2694 2696 405ab8 5 API calls 2694->2696 2695->2692 2699 405c58 FindClose 2695->2699 2698 405c9a 2696->2698 2700 405cb4 2698->2700 2701 405c9e 2698->2701 2699->2680 2703 405456 24 API calls 2700->2703 2701->2679 2704 405456 24 API calls 2701->2704 2703->2679 2706 405cab 2704->2706 2705->2709 2708 4061b4 36 API calls 2706->2708 2707 405456 24 API calls 2707->2695 2711 405cb2 2708->2711 2709->2695 2709->2707 2710 405456 24 API calls 2709->2710 2712 4061b4 36 API calls 2709->2712 2715 405ab8 2709->2715 2710->2709 2711->2679 2712->2709 2713->2682 2714->2692 2723 405ebf GetFileAttributesW 2715->2723 2718 405ae5 2718->2709 2719 405ad3 RemoveDirectoryW 2721 405ae1 2719->2721 2720 405adb DeleteFileW 2720->2721 2721->2718 2722 405af1 SetFileAttributesW 2721->2722 2722->2718 2724 405ed1 SetFileAttributesW 2723->2724 2725 405ac4 2723->2725 2724->2725 2725->2718 2725->2719 2725->2720 3012 6e441000 3015 6e44101b 3012->3015 3022 6e441516 3015->3022 3017 6e441020 3018 6e441024 3017->3018 3019 6e441027 GlobalAlloc 3017->3019 3020 6e44153d 3 API calls 3018->3020 3019->3018 3021 6e441019 3020->3021 3023 6e44151c 3022->3023 3024 6e441522 3023->3024 3025 6e44152e GlobalFree 3023->3025 3024->3017 3025->3017 3026 6e4410e1 3035 6e441111 3026->3035 3027 6e4411d8 GlobalFree 3028 6e4412ba 2 API calls 3028->3035 3029 6e4411d3 3029->3027 3030 6e441272 2 API calls 3033 6e4411c4 GlobalFree 3030->3033 3031 6e441164 GlobalAlloc 3031->3035 3032 6e4411f8 GlobalFree 3032->3035 3033->3035 3034 6e4412e1 lstrcpyW 3034->3035 3035->3027 3035->3028 3035->3029 3035->3030 3035->3031 3035->3032 3035->3033 3035->3034 3036 6e442ca3 3037 6e442cbb 3036->3037 3038 6e44158f 2 API calls 3037->3038 3039 6e442cd6 3038->3039 3040 6e44166d 3041 6e441516 GlobalFree 3040->3041 3044 6e441685 3041->3044 3042 6e4416cb GlobalFree 3043 6e4416a0 3043->3042 3044->3042 3044->3043 3045 6e4416b7 VirtualFree 3044->3045 3045->3042 2891 403e6b 2892 403e83 2891->2892 2893 403fbe 2891->2893 2892->2893 2894 403e8f 2892->2894 2895 40400f 2893->2895 2896 403fcf GetDlgItem GetDlgItem 2893->2896 2897 403e9a SetWindowPos 2894->2897 2898 403ead 2894->2898 2900 404069 2895->2900 2908 401389 2 API calls 2895->2908 2899 404344 18 API calls 2896->2899 2897->2898 2902 403eb2 ShowWindow 2898->2902 2903 403eca 2898->2903 2904 403ff9 SetClassLongW 2899->2904 2901 404390 SendMessageW 2900->2901 2921 403fb9 2900->2921 2931 40407b 2901->2931 2902->2903 2905 403ed2 DestroyWindow 2903->2905 2906 403eec 2903->2906 2907 40140b 2 API calls 2904->2907 2961 4042cd 2905->2961 2909 403ef1 SetWindowLongW 2906->2909 2910 403f02 2906->2910 2907->2895 2911 404041 2908->2911 2909->2921 2914 403fab 2910->2914 2915 403f0e GetDlgItem 2910->2915 2911->2900 2916 404045 SendMessageW 2911->2916 2912 40140b 2 API calls 2912->2931 2913 4042cf DestroyWindow EndDialog 2913->2961 2971 4043ab 2914->2971 2919 403f21 SendMessageW IsWindowEnabled 2915->2919 2920 403f3e 2915->2920 2916->2921 2918 4042fe ShowWindow 2918->2921 2919->2920 2919->2921 2923 403f4b 2920->2923 2924 403f92 SendMessageW 2920->2924 2925 403f5e 2920->2925 2934 403f43 2920->2934 2922 40642b 17 API calls 2922->2931 2923->2924 2923->2934 2924->2914 2928 403f66 2925->2928 2929 403f7b 2925->2929 2927 404344 18 API calls 2927->2931 2932 40140b 2 API calls 2928->2932 2933 40140b 2 API calls 2929->2933 2930 403f79 2930->2914 2931->2912 2931->2913 2931->2921 2931->2922 2931->2927 2952 40420f DestroyWindow 2931->2952 2962 404344 2931->2962 2932->2934 2935 403f82 2933->2935 2968 40431d 2934->2968 2935->2914 2935->2934 2937 4040f6 GetDlgItem 2938 404113 ShowWindow KiUserCallbackDispatcher 2937->2938 2939 40410b 2937->2939 2965 404366 KiUserCallbackDispatcher 2938->2965 2939->2938 2941 40413d EnableWindow 2944 404151 2941->2944 2942 404156 GetSystemMenu EnableMenuItem SendMessageW 2943 404186 SendMessageW 2942->2943 2942->2944 2943->2944 2944->2942 2946 403e4c 18 API calls 2944->2946 2966 404379 SendMessageW 2944->2966 2967 4063ee lstrcpynW 2944->2967 2946->2944 2948 4041b5 lstrlenW 2949 40642b 17 API calls 2948->2949 2950 4041cb SetWindowTextW 2949->2950 2951 401389 2 API calls 2950->2951 2951->2931 2953 404229 CreateDialogParamW 2952->2953 2952->2961 2954 40425c 2953->2954 2953->2961 2955 404344 18 API calls 2954->2955 2956 404267 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 2955->2956 2957 401389 2 API calls 2956->2957 2958 4042ad 2957->2958 2958->2921 2959 4042b5 ShowWindow 2958->2959 2960 404390 SendMessageW 2959->2960 2960->2961 2961->2918 2961->2921 2963 40642b 17 API calls 2962->2963 2964 40434f SetDlgItemTextW 2963->2964 2964->2937 2965->2941 2966->2944 2967->2948 2969 404324 2968->2969 2970 40432a SendMessageW 2968->2970 2969->2970 2970->2930 2972 40446e 2971->2972 2973 4043c3 GetWindowLongW 2971->2973 2972->2921 2973->2972 2974 4043d8 2973->2974 2974->2972 2975 404405 GetSysColor 2974->2975 2976 404408 2974->2976 2975->2976 2977 404418 SetBkMode 2976->2977 2978 40440e SetTextColor 2976->2978 2979 404430 GetSysColor 2977->2979 2980 404436 2977->2980 2978->2977 2979->2980 2981 404447 2980->2981 2982 40443d SetBkColor 2980->2982 2981->2972 2983 404461 CreateBrushIndirect 2981->2983 2984 40445a DeleteObject 2981->2984 2982->2981 2983->2972 2984->2983 3049 402f2b 3050 402f3d SetTimer 3049->3050 3053 402f56 3049->3053 3050->3053 3051 402fab 3052 402f70 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 3052->3051 3053->3051 3053->3052 3067 6e442349 3068 6e4423b3 3067->3068 3069 6e4423be GlobalAlloc 3068->3069 3070 6e4423dd 3068->3070 3069->3068 2988 6e4416d4 2989 6e441703 2988->2989 2990 6e441b5f 22 API calls 2989->2990 2991 6e44170a 2990->2991 2992 6e441711 2991->2992 2993 6e44171d 2991->2993 2994 6e441272 2 API calls 2992->2994 2995 6e441744 2993->2995 2996 6e441727 2993->2996 3000 6e44171b 2994->3000 2998 6e44176e 2995->2998 2999 6e44174a 2995->2999 2997 6e44153d 3 API calls 2996->2997 3001 6e44172c 2997->3001 3003 6e44153d 3 API calls 2998->3003 3002 6e4415b4 3 API calls 2999->3002 3004 6e4415b4 3 API calls 3001->3004 3005 6e44174f 3002->3005 3003->3000 3006 6e441732 3004->3006 3007 6e441272 2 API calls 3005->3007 3008 6e441272 2 API calls 3006->3008 3009 6e441755 GlobalFree 3007->3009 3010 6e441738 GlobalFree 3008->3010 3009->3000 3011 6e441769 GlobalFree 3009->3011 3010->3000 3011->3000 2726 6e441777 2727 6e4417aa 2726->2727 2768 6e441b5f 2727->2768 2729 6e4417b1 2730 6e4418d6 2729->2730 2731 6e4417c2 2729->2731 2732 6e4417c9 2729->2732 2818 6e44239e 2731->2818 2802 6e4423e0 2732->2802 2737 6e44182d 2743 6e441833 2737->2743 2744 6e44187e 2737->2744 2738 6e44180f 2831 6e4425b5 2738->2831 2739 6e4417df 2742 6e4417e5 2739->2742 2749 6e4417f0 2739->2749 2740 6e4417f8 2754 6e4417ee 2740->2754 2828 6e442d83 2740->2828 2742->2754 2812 6e442af8 2742->2812 2850 6e4415c6 2743->2850 2747 6e4425b5 10 API calls 2744->2747 2752 6e44186f 2747->2752 2748 6e441815 2842 6e4415b4 2748->2842 2822 6e442770 2749->2822 2759 6e4418c5 2752->2759 2856 6e442578 2752->2856 2754->2737 2754->2738 2756 6e4417f6 2756->2754 2757 6e4425b5 10 API calls 2757->2752 2759->2730 2761 6e4418cf GlobalFree 2759->2761 2761->2730 2765 6e4418b1 2765->2759 2860 6e44153d wsprintfW 2765->2860 2767 6e4418aa FreeLibrary 2767->2765 2863 6e44121b GlobalAlloc 2768->2863 2770 6e441b86 2864 6e44121b GlobalAlloc 2770->2864 2772 6e441dcb GlobalFree GlobalFree GlobalFree 2773 6e441de8 2772->2773 2784 6e441e32 2772->2784 2774 6e4421de 2773->2774 2781 6e441dfd 2773->2781 2773->2784 2776 6e442200 GetModuleHandleW 2774->2776 2774->2784 2775 6e441c86 GlobalAlloc 2794 6e441b91 2775->2794 2778 6e442226 2776->2778 2779 6e442211 LoadLibraryW 2776->2779 2777 6e441cef GlobalFree 2777->2794 2871 6e44161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 2778->2871 2779->2778 2779->2784 2780 6e441cd1 lstrcpyW 2783 6e441cdb lstrcpyW 2780->2783 2781->2784 2867 6e44122c 2781->2867 2783->2794 2784->2729 2785 6e442278 2785->2784 2789 6e442285 lstrlenW 2785->2789 2786 6e442086 2870 6e44121b GlobalAlloc 2786->2870 2872 6e44161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 2789->2872 2790 6e441fc7 GlobalFree 2790->2794 2791 6e44210e 2791->2784 2799 6e442176 lstrcpyW 2791->2799 2792 6e442238 2792->2785 2800 6e442262 GetProcAddress 2792->2800 2794->2772 2794->2775 2794->2777 2794->2780 2794->2783 2794->2784 2794->2786 2794->2790 2794->2791 2795 6e441d2d 2794->2795 2797 6e44122c 2 API calls 2794->2797 2795->2794 2865 6e44158f GlobalSize GlobalAlloc 2795->2865 2796 6e44229f 2796->2784 2797->2794 2799->2784 2800->2785 2801 6e44208f 2801->2729 2809 6e4423f8 2802->2809 2803 6e44122c GlobalAlloc lstrcpynW 2803->2809 2805 6e442521 GlobalFree 2806 6e4417cf 2805->2806 2805->2809 2806->2739 2806->2740 2806->2754 2807 6e4424a0 GlobalAlloc WideCharToMultiByte 2807->2805 2808 6e4424cb GlobalAlloc CLSIDFromString 2808->2805 2809->2803 2809->2805 2809->2807 2809->2808 2811 6e4424ea 2809->2811 2874 6e4412ba 2809->2874 2811->2805 2878 6e442704 2811->2878 2813 6e442b0a 2812->2813 2814 6e442baf VirtualAlloc 2813->2814 2817 6e442bcd 2814->2817 2816 6e442c99 2816->2754 2881 6e442aa2 2817->2881 2819 6e4423b3 2818->2819 2820 6e4423be GlobalAlloc 2819->2820 2821 6e4417c8 2819->2821 2820->2819 2821->2732 2826 6e4427a0 2822->2826 2823 6e44284e 2825 6e442854 GlobalSize 2823->2825 2827 6e44285e 2823->2827 2824 6e44283b GlobalAlloc 2824->2827 2825->2827 2826->2823 2826->2824 2827->2756 2829 6e442d8e 2828->2829 2830 6e442dce GlobalFree 2829->2830 2885 6e44121b GlobalAlloc 2831->2885 2833 6e442638 MultiByteToWideChar 2838 6e4425bf 2833->2838 2834 6e44265a StringFromGUID2 2834->2838 2835 6e44266b lstrcpynW 2835->2838 2836 6e4426a2 GlobalFree 2836->2838 2837 6e44267e wsprintfW 2837->2838 2838->2833 2838->2834 2838->2835 2838->2836 2838->2837 2839 6e4426d7 GlobalFree 2838->2839 2840 6e441272 2 API calls 2838->2840 2886 6e4412e1 2838->2886 2839->2748 2840->2838 2890 6e44121b GlobalAlloc 2842->2890 2844 6e4415b9 2845 6e4415c6 2 API calls 2844->2845 2846 6e4415c3 2845->2846 2847 6e441272 2846->2847 2848 6e4412b5 GlobalFree 2847->2848 2849 6e44127b GlobalAlloc lstrcpynW 2847->2849 2848->2752 2849->2848 2851 6e4415d2 wsprintfW 2850->2851 2854 6e4415ff lstrcpyW 2850->2854 2855 6e441618 2851->2855 2854->2855 2855->2757 2857 6e442586 2856->2857 2859 6e441891 2856->2859 2858 6e4425a2 GlobalFree 2857->2858 2857->2859 2858->2857 2859->2765 2859->2767 2861 6e441272 2 API calls 2860->2861 2862 6e44155e 2861->2862 2862->2759 2863->2770 2864->2794 2866 6e4415ad 2865->2866 2866->2795 2873 6e44121b GlobalAlloc 2867->2873 2869 6e44123b lstrcpynW 2869->2784 2870->2801 2871->2792 2872->2796 2873->2869 2875 6e4412c1 2874->2875 2876 6e44122c 2 API calls 2875->2876 2877 6e4412df 2876->2877 2877->2809 2879 6e442712 VirtualAlloc 2878->2879 2880 6e442768 2878->2880 2879->2880 2880->2811 2882 6e442aad 2881->2882 2883 6e442ab2 GetLastError 2882->2883 2884 6e442abd 2882->2884 2883->2884 2884->2816 2885->2838 2887 6e44130c 2886->2887 2888 6e4412ea 2886->2888 2887->2838 2888->2887 2889 6e4412f0 lstrcpyW 2888->2889 2889->2887 2890->2844 3046 6e44103d 3047 6e44101b 5 API calls 3046->3047 3048 6e441056 3047->3048 2985 6e4429df 2986 6e442a2f 2985->2986 2987 6e4429ef VirtualProtect 2985->2987 2987->2986 3054 6e441058 3056 6e441074 3054->3056 3055 6e4410dd 3056->3055 3057 6e441516 GlobalFree 3056->3057 3058 6e441092 3056->3058 3057->3058 3059 6e441516 GlobalFree 3058->3059 3060 6e4410a2 3059->3060 3061 6e4410b2 3060->3061 3062 6e4410a9 GlobalSize 3060->3062 3063 6e4410b6 GlobalAlloc 3061->3063 3064 6e4410c7 3061->3064 3062->3061 3065 6e44153d 3 API calls 3063->3065 3066 6e4410d2 GlobalFree 3064->3066 3065->3064 3066->3055 3071 6e4418d9 3072 6e4418fc 3071->3072 3073 6e441931 GlobalFree 3072->3073 3074 6e441943 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 3072->3074 3073->3074 3075 6e441272 2 API calls 3074->3075 3076 6e441ace GlobalFree GlobalFree 3075->3076

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 4034a2-4034df SetErrorMode GetVersion 1 4034e1-4034e9 call 4067e3 0->1 2 4034f2 0->2 1->2 7 4034eb 1->7 4 4034f7-40350b call 406773 lstrlenA 2->4 9 40350d-403529 call 4067e3 * 3 4->9 7->2 16 40353a-403599 #17 OleInitialize SHGetFileInfoW call 4063ee GetCommandLineW call 4063ee 9->16 17 40352b-403531 9->17 24 4035a3-4035bd call 405cf0 CharNextW 16->24 25 40359b-4035a2 16->25 17->16 21 403533 17->21 21->16 28 4035c3-4035c9 24->28 29 4036d4-4036ee GetTempPathW call 403471 24->29 25->24 30 4035d2-4035d6 28->30 31 4035cb-4035d0 28->31 38 4036f0-40370e GetWindowsDirectoryW lstrcatW call 403471 29->38 39 403746-403760 DeleteFileW call 403015 29->39 33 4035d8-4035dc 30->33 34 4035dd-4035e1 30->34 31->30 31->31 33->34 36 4036a0-4036ad call 405cf0 34->36 37 4035e7-4035ed 34->37 54 4036b1-4036b7 36->54 55 4036af-4036b0 36->55 42 403608-403641 37->42 43 4035ef-4035f7 37->43 38->39 53 403710-403740 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403471 38->53 56 403811-403821 call 4039e3 OleUninitialize 39->56 57 403766-40376c 39->57 49 403643-403648 42->49 50 40365e-403698 42->50 47 4035f9-4035fc 43->47 48 4035fe 43->48 47->42 47->48 48->42 49->50 58 40364a-403652 49->58 50->36 52 40369a-40369e 50->52 52->36 59 4036bf-4036cd call 4063ee 52->59 53->39 53->56 54->28 61 4036bd 54->61 55->54 75 403947-40394d 56->75 76 403827-403837 call 405a54 ExitProcess 56->76 62 403801-403808 call 403abd 57->62 63 403772-40377d call 405cf0 57->63 65 403654-403657 58->65 66 403659 58->66 68 4036d2 59->68 61->68 74 40380d 62->74 79 4037cb-4037d5 63->79 80 40377f-4037b4 63->80 65->50 65->66 66->50 68->29 74->56 77 4039cb-4039d3 75->77 78 40394f-403965 GetCurrentProcess OpenProcessToken 75->78 88 4039d5 77->88 89 4039d9-4039dd ExitProcess 77->89 85 403967-403995 LookupPrivilegeValueW AdjustTokenPrivileges 78->85 86 40399b-4039a9 call 4067e3 78->86 82 4037d7-4037e5 call 405dcb 79->82 83 40383d-403851 call 4059bf lstrcatW 79->83 87 4037b6-4037ba 80->87 82->56 99 4037e7-4037fd call 4063ee * 2 82->99 100 403853-403859 lstrcatW 83->100 101 40385e-403878 lstrcatW lstrcmpiW 83->101 85->86 102 4039b7-4039c2 ExitWindowsEx 86->102 103 4039ab-4039b5 86->103 93 4037c3-4037c7 87->93 94 4037bc-4037c1 87->94 88->89 93->87 98 4037c9 93->98 94->93 94->98 98->79 99->62 100->101 101->56 105 40387a-40387d 101->105 102->77 106 4039c4-4039c6 call 40140b 102->106 103->102 103->106 108 403886 call 4059a2 105->108 109 40387f call 405925 105->109 106->77 117 40388b-403899 SetCurrentDirectoryW 108->117 116 403884 109->116 116->117 118 4038a6-4038cf call 4063ee 117->118 119 40389b-4038a1 call 4063ee 117->119 123 4038d4-4038f0 call 40642b DeleteFileW 118->123 119->118 126 403931-403939 123->126 127 4038f2-403902 CopyFileW 123->127 126->123 129 40393b-403942 call 4061b4 126->129 127->126 128 403904-40391d call 4061b4 call 40642b call 4059d7 127->128 137 403922-403924 128->137 129->56 137->126 138 403926-40392d CloseHandle 137->138 138->126
                                    APIs
                                    • SetErrorMode.KERNELBASE ref: 004034C5
                                    • GetVersion.KERNEL32 ref: 004034CB
                                    • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004034FE
                                    • #17.COMCTL32(?,00000007,00000009,0000000B), ref: 0040353B
                                    • OleInitialize.OLE32(00000000), ref: 00403542
                                    • SHGetFileInfoW.SHELL32(0079FF08,00000000,?,000002B4,00000000), ref: 0040355E
                                    • GetCommandLineW.KERNEL32(007A7A60,NSIS Error,?,00000007,00000009,0000000B), ref: 00403573
                                    • CharNextW.USER32(00000000,"C:\Users\user\Desktop\yuc1Jwlkh5.exe",00000020,"C:\Users\user\Desktop\yuc1Jwlkh5.exe",00000000,?,00000007,00000009,0000000B), ref: 004035AB
                                      • Part of subcall function 004067E3: GetModuleHandleA.KERNEL32(?,00000020,?,00403514,0000000B), ref: 004067F5
                                      • Part of subcall function 004067E3: GetProcAddress.KERNEL32(00000000,?), ref: 00406810
                                    • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 004036E5
                                    • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000007,00000009,0000000B), ref: 004036F6
                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 00403702
                                    • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 00403716
                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040371E
                                    • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040372F
                                    • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 00403737
                                    • DeleteFileW.KERNELBASE(1033,?,00000007,00000009,0000000B), ref: 0040374B
                                      • Part of subcall function 004063EE: lstrcpynW.KERNEL32(?,?,00000400,00403573,007A7A60,NSIS Error,?,00000007,00000009,0000000B), ref: 004063FB
                                    • OleUninitialize.OLE32(00000007,?,00000007,00000009,0000000B), ref: 00403816
                                    • ExitProcess.KERNEL32 ref: 00403837
                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\yuc1Jwlkh5.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 0040384A
                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\yuc1Jwlkh5.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 00403859
                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\yuc1Jwlkh5.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 00403864
                                    • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\yuc1Jwlkh5.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 00403870
                                    • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 0040388C
                                    • DeleteFileW.KERNEL32(0079F708,0079F708,?,007A9000,00000009,?,00000007,00000009,0000000B), ref: 004038E6
                                    • CopyFileW.KERNEL32(C:\Users\user\Desktop\yuc1Jwlkh5.exe,0079F708,00000001,?,00000007,00000009,0000000B), ref: 004038FA
                                    • CloseHandle.KERNEL32(00000000,0079F708,0079F708,?,0079F708,00000000,?,00000007,00000009,0000000B), ref: 00403927
                                    • GetCurrentProcess.KERNEL32(00000028,0000000B,00000007,00000009,0000000B), ref: 00403956
                                    • OpenProcessToken.ADVAPI32(00000000), ref: 0040395D
                                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403972
                                    • AdjustTokenPrivileges.ADVAPI32 ref: 00403995
                                    • ExitWindowsEx.USER32(00000002,80040002), ref: 004039BA
                                    • ExitProcess.KERNEL32 ref: 004039DD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                    • String ID: "C:\Users\user\Desktop\yuc1Jwlkh5.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods\Minkfarms$C:\Users\user\Desktop$C:\Users\user\Desktop\yuc1Jwlkh5.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                    • API String ID: 3441113951-4146372053
                                    • Opcode ID: 548301c1dfa22215a8893450befa883167be07a4132e0a9c717a82b6bd7fd6f7
                                    • Instruction ID: d7b9bf8e5ec5db16f392776339999e6c5d6af7d7718e861a4dfbc7241a8cc938
                                    • Opcode Fuzzy Hash: 548301c1dfa22215a8893450befa883167be07a4132e0a9c717a82b6bd7fd6f7
                                    • Instruction Fuzzy Hash: 65D1F6B1200310AAD7207F659D49B2B3AACEB81749F10843FF581B62D1DB7D8A55C76E

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 385 405b00-405b26 call 405dcb 388 405b28-405b3a DeleteFileW 385->388 389 405b3f-405b46 385->389 390 405cbc-405cc0 388->390 391 405b48-405b4a 389->391 392 405b59-405b69 call 4063ee 389->392 393 405b50-405b53 391->393 394 405c6a-405c6f 391->394 398 405b78-405b79 call 405d0f 392->398 399 405b6b-405b76 lstrcatW 392->399 393->392 393->394 394->390 397 405c71-405c74 394->397 400 405c76-405c7c 397->400 401 405c7e-405c86 call 40674c 397->401 402 405b7e-405b82 398->402 399->402 400->390 401->390 408 405c88-405c9c call 405cc3 call 405ab8 401->408 406 405b84-405b8c 402->406 407 405b8e-405b94 lstrcatW 402->407 406->407 409 405b99-405bb5 lstrlenW FindFirstFileW 406->409 407->409 425 405cb4-405cb7 call 405456 408->425 426 405c9e-405ca1 408->426 410 405bbb-405bc3 409->410 411 405c5f-405c63 409->411 413 405be3-405bf7 call 4063ee 410->413 414 405bc5-405bcd 410->414 411->394 416 405c65 411->416 427 405bf9-405c01 413->427 428 405c0e-405c19 call 405ab8 413->428 417 405c42-405c52 FindNextFileW 414->417 418 405bcf-405bd7 414->418 416->394 417->410 424 405c58-405c59 FindClose 417->424 418->413 421 405bd9-405be1 418->421 421->413 421->417 424->411 425->390 426->400 429 405ca3-405cb2 call 405456 call 4061b4 426->429 427->417 430 405c03-405c07 call 405b00 427->430 438 405c3a-405c3d call 405456 428->438 439 405c1b-405c1e 428->439 429->390 437 405c0c 430->437 437->417 438->417 442 405c20-405c30 call 405456 call 4061b4 439->442 443 405c32-405c38 439->443 442->417 443->417
                                    APIs
                                    • DeleteFileW.KERNELBASE(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B29
                                    • lstrcatW.KERNEL32(007A3F50,\*.*,007A3F50,?), ref: 00405B71
                                    • lstrcatW.KERNEL32(?,0040A014,?,007A3F50,?), ref: 00405B94
                                    • lstrlenW.KERNEL32(?,?,0040A014,?,007A3F50,?), ref: 00405B9A
                                    • FindFirstFileW.KERNELBASE(007A3F50,?,?,?,0040A014,?,007A3F50,?), ref: 00405BAA
                                    • FindNextFileW.KERNEL32(00000000,?,000000F2,?,?,?,?,?), ref: 00405C4A
                                    • FindClose.KERNEL32(00000000), ref: 00405C59
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                    • String ID: "C:\Users\user\Desktop\yuc1Jwlkh5.exe"$C:\Users\user\AppData\Local\Temp\$P?z$\*.*
                                    • API String ID: 2035342205-870465638
                                    • Opcode ID: 2e078cdcde706d48225d83f3244a5f4697d9a3fc09f8fc82c0d1a14fe090b8d5
                                    • Instruction ID: d176cfcb2707c6ba555092c79fa60715814496245c058da0d6595325efdb1864
                                    • Opcode Fuzzy Hash: 2e078cdcde706d48225d83f3244a5f4697d9a3fc09f8fc82c0d1a14fe090b8d5
                                    • Instruction Fuzzy Hash: BE41D530804A15AAEB216B658D89EBF7678EF42715F14813FF801711D2DB7C5E82CE6E
                                    APIs
                                    • FindFirstFileW.KERNELBASE(?,007A4F98,C:\,00405E14,C:\,C:\,00000000,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 00406757
                                    • FindClose.KERNEL32(00000000), ref: 00406763
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: Find$CloseFileFirst
                                    • String ID: C:\
                                    • API String ID: 2295610775-3404278061
                                    • Opcode ID: 93d274fea3e94b44f6f55b1f097fc665565d90e42f153d0ad468ae4ce1295179
                                    • Instruction ID: 5230d556015edc92dacd95909e5542708b333c59f405b635cf09ddc887f28092
                                    • Opcode Fuzzy Hash: 93d274fea3e94b44f6f55b1f097fc665565d90e42f153d0ad468ae4ce1295179
                                    • Instruction Fuzzy Hash: CCD012315192205FC75027386F0C84B7A599F567353264B36F0AAF21E0C6788C3286AC

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 139 403e6b-403e7d 140 403e83-403e89 139->140 141 403fbe-403fcd 139->141 140->141 142 403e8f-403e98 140->142 143 40401c-404031 141->143 144 403fcf-404017 GetDlgItem * 2 call 404344 SetClassLongW call 40140b 141->144 145 403e9a-403ea7 SetWindowPos 142->145 146 403ead-403eb0 142->146 148 404071-404076 call 404390 143->148 149 404033-404036 143->149 144->143 145->146 151 403eb2-403ec4 ShowWindow 146->151 152 403eca-403ed0 146->152 157 40407b-404096 148->157 154 404038-404043 call 401389 149->154 155 404069-40406b 149->155 151->152 158 403ed2-403ee7 DestroyWindow 152->158 159 403eec-403eef 152->159 154->155 176 404045-404064 SendMessageW 154->176 155->148 156 404311 155->156 164 404313-40431a 156->164 162 404098-40409a call 40140b 157->162 163 40409f-4040a5 157->163 165 4042ee-4042f4 158->165 167 403ef1-403efd SetWindowLongW 159->167 168 403f02-403f08 159->168 162->163 172 4040ab-4040b6 163->172 173 4042cf-4042e8 DestroyWindow EndDialog 163->173 165->156 171 4042f6-4042fc 165->171 167->164 174 403fab-403fb9 call 4043ab 168->174 175 403f0e-403f1f GetDlgItem 168->175 171->156 178 4042fe-404307 ShowWindow 171->178 172->173 179 4040bc-404109 call 40642b call 404344 * 3 GetDlgItem 172->179 173->165 174->164 180 403f21-403f38 SendMessageW IsWindowEnabled 175->180 181 403f3e-403f41 175->181 176->164 178->156 209 404113-40414f ShowWindow KiUserCallbackDispatcher call 404366 EnableWindow 179->209 210 40410b-404110 179->210 180->156 180->181 184 403f43-403f44 181->184 185 403f46-403f49 181->185 186 403f74-403f79 call 40431d 184->186 187 403f57-403f5c 185->187 188 403f4b-403f51 185->188 186->174 190 403f92-403fa5 SendMessageW 187->190 192 403f5e-403f64 187->192 188->190 191 403f53-403f55 188->191 190->174 191->186 195 403f66-403f6c call 40140b 192->195 196 403f7b-403f84 call 40140b 192->196 205 403f72 195->205 196->174 206 403f86-403f90 196->206 205->186 206->205 213 404151-404152 209->213 214 404154 209->214 210->209 215 404156-404184 GetSystemMenu EnableMenuItem SendMessageW 213->215 214->215 216 404186-404197 SendMessageW 215->216 217 404199 215->217 218 40419f-4041de call 404379 call 403e4c call 4063ee lstrlenW call 40642b SetWindowTextW call 401389 216->218 217->218 218->157 229 4041e4-4041e6 218->229 229->157 230 4041ec-4041f0 229->230 231 4041f2-4041f8 230->231 232 40420f-404223 DestroyWindow 230->232 231->156 233 4041fe-404204 231->233 232->165 234 404229-404256 CreateDialogParamW 232->234 233->157 235 40420a 233->235 234->165 236 40425c-4042b3 call 404344 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 234->236 235->156 236->156 241 4042b5-4042c8 ShowWindow call 404390 236->241 243 4042cd 241->243 243->165
                                    APIs
                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403EA7
                                    • ShowWindow.USER32(?), ref: 00403EC4
                                    • DestroyWindow.USER32 ref: 00403ED8
                                    • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403EF4
                                    • GetDlgItem.USER32(?,?), ref: 00403F15
                                    • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403F29
                                    • IsWindowEnabled.USER32(00000000), ref: 00403F30
                                    • GetDlgItem.USER32(?,00000001), ref: 00403FDE
                                    • GetDlgItem.USER32(?,00000002), ref: 00403FE8
                                    • SetClassLongW.USER32(?,000000F2,?), ref: 00404002
                                    • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00404053
                                    • GetDlgItem.USER32(?,00000003), ref: 004040F9
                                    • ShowWindow.USER32(00000000,?), ref: 0040411A
                                    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040412C
                                    • EnableWindow.USER32(?,?), ref: 00404147
                                    • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040415D
                                    • EnableMenuItem.USER32(00000000), ref: 00404164
                                    • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040417C
                                    • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040418F
                                    • lstrlenW.KERNEL32(007A1F48,?,007A1F48,00000000), ref: 004041B9
                                    • SetWindowTextW.USER32(?,007A1F48), ref: 004041CD
                                    • ShowWindow.USER32(?,0000000A), ref: 00404301
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                    • String ID:
                                    • API String ID: 3282139019-0
                                    • Opcode ID: f1a328e51306031731dbcce9d1c3737ebdd7014b04a9a2d8d616989602e21706
                                    • Instruction ID: fd8a01c06953bfbcdc6c7a7ca4fde1a241a6ed83f8ebcdeac2000881ab9a06ac
                                    • Opcode Fuzzy Hash: f1a328e51306031731dbcce9d1c3737ebdd7014b04a9a2d8d616989602e21706
                                    • Instruction Fuzzy Hash: 67C1BFB1604604AFDB206F61ED85D2A3B78EBCA705B10853EF651B11F0CB3D9941DB6E

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 244 403abd-403ad5 call 4067e3 247 403ad7-403ae7 call 406335 244->247 248 403ae9-403b20 call 4062bc 244->248 257 403b43-403b6c call 403d93 call 405dcb 247->257 252 403b22-403b33 call 4062bc 248->252 253 403b38-403b3e lstrcatW 248->253 252->253 253->257 262 403b72-403b77 257->262 263 403bfe-403c06 call 405dcb 257->263 262->263 264 403b7d-403ba5 call 4062bc 262->264 268 403c14-403c39 LoadImageW 263->268 269 403c08-403c0f call 40642b 263->269 264->263 271 403ba7-403bab 264->271 273 403cba-403cc2 call 40140b 268->273 274 403c3b-403c6b RegisterClassW 268->274 269->268 275 403bbd-403bc9 lstrlenW 271->275 276 403bad-403bba call 405cf0 271->276 287 403cc4-403cc7 273->287 288 403ccc-403cd7 call 403d93 273->288 277 403c71-403cb5 SystemParametersInfoW CreateWindowExW 274->277 278 403d89 274->278 282 403bf1-403bf9 call 405cc3 call 4063ee 275->282 283 403bcb-403bd9 lstrcmpiW 275->283 276->275 277->273 281 403d8b-403d92 278->281 282->263 283->282 286 403bdb-403be5 GetFileAttributesW 283->286 290 403be7-403be9 286->290 291 403beb-403bec call 405d0f 286->291 287->281 297 403d60-403d68 call 405529 288->297 298 403cdd-403cf7 ShowWindow call 406773 288->298 290->282 290->291 291->282 305 403d82-403d84 call 40140b 297->305 306 403d6a-403d70 297->306 303 403d03-403d15 GetClassInfoW 298->303 304 403cf9-403cfe call 406773 298->304 309 403d17-403d27 GetClassInfoW RegisterClassW 303->309 310 403d2d-403d50 DialogBoxParamW call 40140b 303->310 304->303 305->278 306->287 311 403d76-403d7d call 40140b 306->311 309->310 314 403d55-403d5e call 403a0d 310->314 311->287 314->281
                                    APIs
                                      • Part of subcall function 004067E3: GetModuleHandleA.KERNEL32(?,00000020,?,00403514,0000000B), ref: 004067F5
                                      • Part of subcall function 004067E3: GetProcAddress.KERNEL32(00000000,?), ref: 00406810
                                    • lstrcatW.KERNEL32(1033,007A1F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F48,00000000,00000002,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\yuc1Jwlkh5.exe",00000000), ref: 00403B3E
                                    • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods,1033,007A1F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F48,00000000,00000002,74DF3420), ref: 00403BBE
                                    • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods,1033,007A1F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F48,00000000), ref: 00403BD1
                                    • GetFileAttributesW.KERNEL32(Call), ref: 00403BDC
                                    • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods), ref: 00403C25
                                      • Part of subcall function 00406335: wsprintfW.USER32 ref: 00406342
                                    • RegisterClassW.USER32(007A7A00), ref: 00403C62
                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403C7A
                                    • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403CAF
                                    • ShowWindow.USER32(00000005,00000000), ref: 00403CE5
                                    • GetClassInfoW.USER32(00000000,RichEdit20W,007A7A00), ref: 00403D11
                                    • GetClassInfoW.USER32(00000000,RichEdit,007A7A00), ref: 00403D1E
                                    • RegisterClassW.USER32(007A7A00), ref: 00403D27
                                    • DialogBoxParamW.USER32(?,00000000,00403E6B,00000000), ref: 00403D46
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                    • String ID: "C:\Users\user\Desktop\yuc1Jwlkh5.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                    • API String ID: 1975747703-2043154494
                                    • Opcode ID: ed5882197ad2af45622ab53baadaf8c7f939305731a510e2915a0577b65485f7
                                    • Instruction ID: 7ce8ec14a48fa11d69b3a5e1f0875b7083b8d607cd9ed6182ea3b60f82ca9994
                                    • Opcode Fuzzy Hash: ed5882197ad2af45622ab53baadaf8c7f939305731a510e2915a0577b65485f7
                                    • Instruction Fuzzy Hash: 286193702407007ED320AB669D46F2B3A7CEB85B49F40853FF941B22E2DB7D99018B6D

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 318 403015-403063 GetTickCount GetModuleFileNameW call 405ee4 321 403065-40306a 318->321 322 40306f-40309d call 4063ee call 405d0f call 4063ee GetFileSize 318->322 323 403245-403249 321->323 330 4030a3 322->330 331 403188-403196 call 402fb1 322->331 333 4030a8-4030bf 330->333 337 403198-40319b 331->337 338 4031eb-4031f0 331->338 335 4030c1 333->335 336 4030c3-4030cc call 403444 333->336 335->336 343 4031f2-4031fa call 402fb1 336->343 344 4030d2-4030d9 336->344 341 40319d-4031b5 call 40345a call 403444 337->341 342 4031bf-4031e9 GlobalAlloc call 40345a call 40324c 337->342 338->323 341->338 365 4031b7-4031bd 341->365 342->338 369 4031fc-40320d 342->369 343->338 347 403155-403159 344->347 348 4030db-4030ef call 405e9f 344->348 355 403163-403169 347->355 356 40315b-403162 call 402fb1 347->356 348->355 367 4030f1-4030f8 348->367 360 403178-403180 355->360 361 40316b-403175 call 4068d0 355->361 356->355 360->333 368 403186 360->368 361->360 365->338 365->342 367->355 371 4030fa-403101 367->371 368->331 372 403215-40321a 369->372 373 40320f 369->373 371->355 374 403103-40310a 371->374 375 40321b-403221 372->375 373->372 374->355 376 40310c-403113 374->376 375->375 377 403223-40323e SetFilePointer call 405e9f 375->377 376->355 379 403115-403135 376->379 380 403243 377->380 379->338 381 40313b-40313f 379->381 380->323 382 403141-403145 381->382 383 403147-40314f 381->383 382->368 382->383 383->355 384 403151-403153 383->384 384->355
                                    APIs
                                    • GetTickCount.KERNEL32 ref: 00403026
                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\yuc1Jwlkh5.exe,00000400,?,00000007,00000009,0000000B), ref: 00403042
                                      • Part of subcall function 00405EE4: GetFileAttributesW.KERNELBASE(?,00403055,C:\Users\user\Desktop\yuc1Jwlkh5.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405EE8
                                      • Part of subcall function 00405EE4: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000007,00000009,0000000B), ref: 00405F0A
                                    • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\yuc1Jwlkh5.exe,C:\Users\user\Desktop\yuc1Jwlkh5.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 0040308E
                                    • GlobalAlloc.KERNELBASE(00000040,0000000B,?,00000007,00000009,0000000B), ref: 004031C4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                    • String ID: "C:\Users\user\Desktop\yuc1Jwlkh5.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\yuc1Jwlkh5.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                    • API String ID: 2803837635-2910774511
                                    • Opcode ID: 6219df01605ea60bd4e2c7def21ebe94f666e2151f16e48323876e593585739e
                                    • Instruction ID: b65d07b499067b34cf8ea267e223a71d0fae98adc47698ec1498b1efb03bef53
                                    • Opcode Fuzzy Hash: 6219df01605ea60bd4e2c7def21ebe94f666e2151f16e48323876e593585739e
                                    • Instruction Fuzzy Hash: DD51D171900204ABDB119F64DD85B9E7EACEB45316F20843BE911BA2D1DB7C8F418B5D

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 449 40642b-406436 450 406438-406447 449->450 451 406449-40645f 449->451 450->451 452 406465-406472 451->452 453 406677-40667d 451->453 452->453 454 406478-40647f 452->454 455 406683-40668e 453->455 456 406484-406491 453->456 454->453 458 406690-406694 call 4063ee 455->458 459 406699-40669a 455->459 456->455 457 406497-4064a3 456->457 461 406664 457->461 462 4064a9-4064e7 457->462 458->459 465 406672-406675 461->465 466 406666-406670 461->466 463 406607-40660b 462->463 464 4064ed-4064f8 462->464 469 40660d-406613 463->469 470 40663e-406642 463->470 467 406511 464->467 468 4064fa-4064ff 464->468 465->453 466->453 471 406518-40651f 467->471 468->467 474 406501-406504 468->474 475 406623-40662f call 4063ee 469->475 476 406615-406621 call 406335 469->476 472 406651-406662 lstrlenW 470->472 473 406644-40664c call 40642b 470->473 478 406521-406523 471->478 479 406524-406526 471->479 472->453 473->472 474->467 482 406506-406509 474->482 486 406634-40663a 475->486 476->486 478->479 484 406561-406564 479->484 485 406528-406546 call 4062bc 479->485 482->467 487 40650b-40650f 482->487 490 406574-406577 484->490 491 406566-406572 GetSystemDirectoryW 484->491 492 40654b-40654f 485->492 486->472 489 40663c 486->489 487->471 493 4065ff-406605 call 40669d 489->493 495 4065e2-4065e4 490->495 496 406579-406587 GetWindowsDirectoryW 490->496 494 4065e6-4065ea 491->494 497 406555-40655c call 40642b 492->497 498 4065ef-4065f2 492->498 493->472 494->493 500 4065ec 494->500 495->494 499 406589-406593 495->499 496->495 497->494 498->493 503 4065f4-4065fa lstrcatW 498->503 505 406595-406598 499->505 506 4065ad-4065c3 SHGetSpecialFolderLocation 499->506 500->498 503->493 505->506 510 40659a-4065a1 505->510 507 4065c5-4065dc SHGetPathFromIDListW CoTaskMemFree 506->507 508 4065de 506->508 507->494 507->508 508->495 511 4065a9-4065ab 510->511 511->494 511->506
                                    APIs
                                    • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 0040656C
                                    • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,007A0F28,?,0040548D,007A0F28,00000000), ref: 0040657F
                                    • SHGetSpecialFolderLocation.SHELL32(0040548D,0079A700,00000000,007A0F28,?,0040548D,007A0F28,00000000), ref: 004065BB
                                    • SHGetPathFromIDListW.SHELL32(0079A700,Call), ref: 004065C9
                                    • CoTaskMemFree.OLE32(0079A700), ref: 004065D4
                                    • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004065FA
                                    • lstrlenW.KERNEL32(Call,00000000,007A0F28,?,0040548D,007A0F28,00000000), ref: 00406652
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                    • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                    • API String ID: 717251189-1230650788
                                    • Opcode ID: aaa997f56c542f4584990acf2269000a5d9ad94e2d12eeb77129bcfb95bdb2f4
                                    • Instruction ID: 6a9894c1754425a34e634a53c322024ca71031740d406166b65bc8419ebad360
                                    • Opcode Fuzzy Hash: aaa997f56c542f4584990acf2269000a5d9ad94e2d12eeb77129bcfb95bdb2f4
                                    • Instruction Fuzzy Hash: A261F471600505ABDF249F24DD40ABE37A5AF51318F22813FE543BA2D4DB3D8AA1CB5E

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 512 405456-40546b 513 405471-405482 512->513 514 405522-405526 512->514 515 405484-405488 call 40642b 513->515 516 40548d-405499 lstrlenW 513->516 515->516 518 4054b6-4054ba 516->518 519 40549b-4054ab lstrlenW 516->519 520 4054c9-4054cd 518->520 521 4054bc-4054c3 SetWindowTextW 518->521 519->514 522 4054ad-4054b1 lstrcatW 519->522 523 405513-405515 520->523 524 4054cf-405511 SendMessageW * 3 520->524 521->520 522->518 523->514 525 405517-40551a 523->525 524->523 525->514
                                    APIs
                                    • lstrlenW.KERNEL32(007A0F28,00000000,0079A700,74DF23A0,?,?,?,?,?,?,?,?,?,0040338D,00000000,?), ref: 0040548E
                                    • lstrlenW.KERNEL32(0040338D,007A0F28,00000000,0079A700,74DF23A0,?,?,?,?,?,?,?,?,?,0040338D,00000000), ref: 0040549E
                                    • lstrcatW.KERNEL32(007A0F28,0040338D,0040338D,007A0F28,00000000,0079A700,74DF23A0), ref: 004054B1
                                    • SetWindowTextW.USER32(007A0F28,007A0F28), ref: 004054C3
                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E9
                                    • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405503
                                    • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405511
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                    • String ID:
                                    • API String ID: 2531174081-0
                                    • Opcode ID: 0decb5d3bd7311ee25dcb4cac47719bdc9880b480b93dcede20cbb014160680e
                                    • Instruction ID: 198c43ce2186877ab3aec1728abe16fb3d15ea5683a6b9ae92d40c5f72e5eea1
                                    • Opcode Fuzzy Hash: 0decb5d3bd7311ee25dcb4cac47719bdc9880b480b93dcede20cbb014160680e
                                    • Instruction Fuzzy Hash: EC21AF75900518BACB119F65DD44ACFBFB9EF89354F10802AF904B22A1C3798A81CFA8

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 526 405925-405970 CreateDirectoryW 527 405972-405974 526->527 528 405976-405983 GetLastError 526->528 529 40599d-40599f 527->529 528->529 530 405985-405999 SetFileSecurityW 528->530 530->527 531 40599b GetLastError 530->531 531->529
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405968
                                    • GetLastError.KERNEL32 ref: 0040597C
                                    • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405991
                                    • GetLastError.KERNEL32 ref: 0040599B
                                    Strings
                                    • C:\Users\user\Desktop, xrefs: 00405925
                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 0040594B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: ErrorLast$CreateDirectoryFileSecurity
                                    • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                                    • API String ID: 3449924974-2028306314
                                    • Opcode ID: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                    • Instruction ID: 4c6d3c4ce34384c56ae6b54862a6db5cebbf8231f9905efb0a53c4272bf1951e
                                    • Opcode Fuzzy Hash: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                    • Instruction Fuzzy Hash: E1011AB1C00219EADF009FA5DD44BEFBBB8EF04314F00803AD544B6190E7789648CFA9

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 532 406773-406793 GetSystemDirectoryW 533 406795 532->533 534 406797-406799 532->534 533->534 535 4067aa-4067ac 534->535 536 40679b-4067a4 534->536 538 4067ad-4067e0 wsprintfW LoadLibraryExW 535->538 536->535 537 4067a6-4067a8 536->537 537->538
                                    APIs
                                    • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040678A
                                    • wsprintfW.USER32 ref: 004067C5
                                    • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067D9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: DirectoryLibraryLoadSystemwsprintf
                                    • String ID: %s%S.dll$UXTHEME$\
                                    • API String ID: 2200240437-1946221925
                                    • Opcode ID: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                    • Instruction ID: 038d7fed81a94acb9f8d17f6b302bf2205b26bc145b48260013954e6d266918a
                                    • Opcode Fuzzy Hash: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                    • Instruction Fuzzy Hash: 65F0F670510119A7CF14AB64DD0DF9B376CAB40309F10047AA646F20D0EB7C9A68CBA8

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 539 40324c-403263 540 403265 539->540 541 40326c-403275 539->541 540->541 542 403277 541->542 543 40327e-403283 541->543 542->543 544 403293-4032a0 call 403444 543->544 545 403285-40328e call 40345a 543->545 549 403432 544->549 550 4032a6-4032aa 544->550 545->544 551 403434-403435 549->551 552 4032b0-4032d6 GetTickCount 550->552 553 4033dd-4033df 550->553 556 40343d-403441 551->556 557 40343a 552->557 558 4032dc-4032e4 552->558 554 4033e1-4033e4 553->554 555 40341f-403422 553->555 554->557 563 4033e6 554->563 561 403424 555->561 562 403427-403430 call 403444 555->562 557->556 559 4032e6 558->559 560 4032e9-4032f7 call 403444 558->560 559->560 560->549 572 4032fd-403306 560->572 561->562 562->549 573 403437 562->573 566 4033e9-4033ef 563->566 569 4033f1 566->569 570 4033f3-403401 call 403444 566->570 569->570 570->549 576 403403-40340f call 405f96 570->576 575 40330c-40332c call 40693e 572->575 573->557 581 403332-403345 GetTickCount 575->581 582 4033d5-4033d7 575->582 583 403411-40341b 576->583 584 4033d9-4033db 576->584 585 403390-403392 581->585 586 403347-40334f 581->586 582->551 583->566 587 40341d 583->587 584->551 590 403394-403398 585->590 591 4033c9-4033cd 585->591 588 403351-403355 586->588 589 403357-403388 MulDiv wsprintfW call 405456 586->589 587->557 588->585 588->589 598 40338d 589->598 592 40339a-4033a1 call 405f96 590->592 593 4033af-4033ba 590->593 591->558 594 4033d3 591->594 599 4033a6-4033a8 592->599 597 4033bd-4033c1 593->597 594->557 597->575 600 4033c7 597->600 598->585 599->584 601 4033aa-4033ad 599->601 600->557 601->597
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: CountTick$wsprintf
                                    • String ID: ... %d%%
                                    • API String ID: 551687249-2449383134
                                    • Opcode ID: a56becbd4a8c381964fcf942c118294a751433144615ef02c1157a4186d243db
                                    • Instruction ID: 008436f450556a42ebae23d461066e9f0811e1f15f23a2ec19415b9062137ceb
                                    • Opcode Fuzzy Hash: a56becbd4a8c381964fcf942c118294a751433144615ef02c1157a4186d243db
                                    • Instruction Fuzzy Hash: 86516C71900219DBDB11DF65DA84B9F7FB8AF0076AF14417BE814B72C1C7789A40CBAA

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 602 405f13-405f1f 603 405f20-405f54 GetTickCount GetTempFileNameW 602->603 604 405f63-405f65 603->604 605 405f56-405f58 603->605 607 405f5d-405f60 604->607 605->603 606 405f5a 605->606 606->607
                                    APIs
                                    • GetTickCount.KERNEL32 ref: 00405F31
                                    • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\yuc1Jwlkh5.exe",004034A0,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC), ref: 00405F4C
                                    Strings
                                    • "C:\Users\user\Desktop\yuc1Jwlkh5.exe", xrefs: 00405F13
                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F18
                                    • nsa, xrefs: 00405F20
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: CountFileNameTempTick
                                    • String ID: "C:\Users\user\Desktop\yuc1Jwlkh5.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                    • API String ID: 1716503409-2825432903
                                    • Opcode ID: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                    • Instruction ID: 2ec416300cd5d099b763d3688cd3c506487cb406e2025687db32897a35dea38d
                                    • Opcode Fuzzy Hash: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                    • Instruction Fuzzy Hash: 84F09676B00204BBDB008F55ED05E9FB7ACEB95750F10803AEA04F7140E6B499548B58

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 608 6e441777-6e4417b6 call 6e441b5f 612 6e4418d6-6e4418d8 608->612 613 6e4417bc-6e4417c0 608->613 614 6e4417c2-6e4417c8 call 6e44239e 613->614 615 6e4417c9-6e4417d6 call 6e4423e0 613->615 614->615 620 6e441806-6e44180d 615->620 621 6e4417d8-6e4417dd 615->621 622 6e44182d-6e441831 620->622 623 6e44180f-6e44182b call 6e4425b5 call 6e4415b4 call 6e441272 GlobalFree 620->623 624 6e4417df-6e4417e0 621->624 625 6e4417f8-6e4417fb 621->625 630 6e441833-6e44187c call 6e4415c6 call 6e4425b5 622->630 631 6e44187e-6e441884 call 6e4425b5 622->631 648 6e441885-6e441889 623->648 628 6e4417e2-6e4417e3 624->628 629 6e4417e8-6e4417e9 call 6e442af8 624->629 625->620 626 6e4417fd-6e4417fe call 6e442d83 625->626 640 6e441803 626->640 636 6e4417e5-6e4417e6 628->636 637 6e4417f0-6e4417f6 call 6e442770 628->637 643 6e4417ee 629->643 630->648 631->648 636->620 636->629 647 6e441805 637->647 640->647 643->640 647->620 651 6e4418c6-6e4418cd 648->651 652 6e44188b-6e441899 call 6e442578 648->652 651->612 654 6e4418cf-6e4418d0 GlobalFree 651->654 658 6e4418b1-6e4418b8 652->658 659 6e44189b-6e44189e 652->659 654->612 658->651 661 6e4418ba-6e4418c5 call 6e44153d 658->661 659->658 660 6e4418a0-6e4418a8 659->660 660->658 663 6e4418aa-6e4418ab FreeLibrary 660->663 661->651 663->658
                                    APIs
                                      • Part of subcall function 6E441B5F: GlobalFree.KERNEL32(?), ref: 6E441DD4
                                      • Part of subcall function 6E441B5F: GlobalFree.KERNEL32(?), ref: 6E441DD9
                                      • Part of subcall function 6E441B5F: GlobalFree.KERNEL32(?), ref: 6E441DDE
                                    • GlobalFree.KERNEL32(00000000), ref: 6E441825
                                    • FreeLibrary.KERNEL32(?), ref: 6E4418AB
                                    • GlobalFree.KERNEL32(00000000), ref: 6E4418D0
                                      • Part of subcall function 6E44239E: GlobalAlloc.KERNEL32(00000040,?), ref: 6E4423CF
                                      • Part of subcall function 6E442770: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6E4417F6,00000000), ref: 6E442840
                                      • Part of subcall function 6E4415C6: wsprintfW.USER32 ref: 6E4415F4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2186111808.000000006E441000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E440000, based on PE: true
                                    • Associated: 00000000.00000002.2185161837.000000006E440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.2186129826.000000006E444000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.2186187474.000000006E446000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6e440000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: Global$Free$Alloc$Librarywsprintf
                                    • String ID:
                                    • API String ID: 3962662361-3916222277
                                    • Opcode ID: 3325d1132a5daad3daf00934e2af54169705f7dd457f0df4ed3799a0bd828ccf
                                    • Instruction ID: 3eae87c861d3d3a82f86d90ed4cd9ea98d3feeedc61fefa8d9b7c2e6e2411957
                                    • Opcode Fuzzy Hash: 3325d1132a5daad3daf00934e2af54169705f7dd457f0df4ed3799a0bd828ccf
                                    • Instruction Fuzzy Hash: 2341B471B00245DAFF50AFF49894FC537ACFB05354F0444ABE9159A386DBB881ACC7A0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 665 405dcb-405de6 call 4063ee call 405d6e 670 405de8-405dea 665->670 671 405dec-405df9 call 40669d 665->671 672 405e44-405e46 670->672 675 405e09-405e0d 671->675 676 405dfb-405e01 671->676 678 405e23-405e2c lstrlenW 675->678 676->670 677 405e03-405e07 676->677 677->670 677->675 679 405e2e-405e42 call 405cc3 GetFileAttributesW 678->679 680 405e0f-405e16 call 40674c 678->680 679->672 685 405e18-405e1b 680->685 686 405e1d-405e1e call 405d0f 680->686 685->670 685->686 686->678
                                    APIs
                                      • Part of subcall function 004063EE: lstrcpynW.KERNEL32(?,?,00000400,00403573,007A7A60,NSIS Error,?,00000007,00000009,0000000B), ref: 004063FB
                                      • Part of subcall function 00405D6E: CharNextW.USER32(?,?,C:\,?,00405DE2,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405D7C
                                      • Part of subcall function 00405D6E: CharNextW.USER32(00000000), ref: 00405D81
                                      • Part of subcall function 00405D6E: CharNextW.USER32(00000000), ref: 00405D99
                                    • lstrlenW.KERNEL32(C:\,00000000,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405E24
                                    • GetFileAttributesW.KERNELBASE(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 00405E34
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                    • String ID: C:\$C:\Users\user\AppData\Local\Temp\
                                    • API String ID: 3248276644-3049482934
                                    • Opcode ID: cded0a6966890639b687aa66a4455a295a884498cbe0599bea4925404aa51844
                                    • Instruction ID: 3e737dd218ce82e1fa1fef2ae0b63742eeb13cb079fe623d21add3619189c6ea
                                    • Opcode Fuzzy Hash: cded0a6966890639b687aa66a4455a295a884498cbe0599bea4925404aa51844
                                    • Instruction Fuzzy Hash: B2F0A435104E5115D632333A9D09BEF1558CE86718B19863BF8A2B22D2DB3C8A539DBE

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 688 4062bc-4062ee call 40625b 691 4062f0-40631e RegQueryValueExW RegCloseKey 688->691 692 40632c 688->692 691->692 693 406320-406324 691->693 694 406330-406332 692->694 693->694 695 406326-40632a 693->695 695->692 695->694
                                    APIs
                                    • RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,?,00000800,00000002,007A0F28,00000000,?,?,Call,?,?,0040654B,80000002), ref: 00406302
                                    • RegCloseKey.KERNELBASE(?,?,0040654B,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,00000000,007A0F28), ref: 0040630D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: CloseQueryValue
                                    • String ID: Call
                                    • API String ID: 3356406503-1824292864
                                    • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                    • Instruction ID: 373679b9ec00f947e58de2b720fd419a4882b2706591ab80caa015ae1ce90e84
                                    • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                    • Instruction Fuzzy Hash: 56017C72510209EADF218F65CC09EDB3BA8FF54364F01803AFD5AA2190D778D964DBA4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 696 4059d7-405a08 CreateProcessW 697 405a16-405a17 696->697 698 405a0a-405a13 CloseHandle 696->698 698->697
                                    APIs
                                    • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4F50,Error launching installer), ref: 00405A00
                                    • CloseHandle.KERNEL32(?), ref: 00405A0D
                                    Strings
                                    • Error launching installer, xrefs: 004059EA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: CloseCreateHandleProcess
                                    • String ID: Error launching installer
                                    • API String ID: 3712363035-66219284
                                    • Opcode ID: c4e46f1f673fd3826d078202ae771a3f9877dbb6e8e98e36d3575ddcb335b3d8
                                    • Instruction ID: 2b341ff16c6abf5d503a25303b32c86a9a78efd9c2a610832e0bce27d8c53e5f
                                    • Opcode Fuzzy Hash: c4e46f1f673fd3826d078202ae771a3f9877dbb6e8e98e36d3575ddcb335b3d8
                                    • Instruction Fuzzy Hash: F3E0BFF46002097FEB109F64ED05F7B77ACEB44644F004525BD54F6150D7B999148A7D
                                    APIs
                                    • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                    • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID:
                                    • API String ID: 3850602802-0
                                    • Opcode ID: 450ddb0a52dde23e6c3e7e65707e0a17b99b7c6dada291b67ac9213214883537
                                    • Instruction ID: 3e9f44f44444eb33be3e1f1d809517d1ef13f380758e007b8d3e22890c14ce30
                                    • Opcode Fuzzy Hash: 450ddb0a52dde23e6c3e7e65707e0a17b99b7c6dada291b67ac9213214883537
                                    • Instruction Fuzzy Hash: 0301F432624220ABE7195B389D05B2A3698E751318F10C13FF855F6AF1EA78CC02DB4D
                                    APIs
                                    • GetModuleHandleA.KERNEL32(?,00000020,?,00403514,0000000B), ref: 004067F5
                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00406810
                                      • Part of subcall function 00406773: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040678A
                                      • Part of subcall function 00406773: wsprintfW.USER32 ref: 004067C5
                                      • Part of subcall function 00406773: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067D9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                    • String ID:
                                    • API String ID: 2547128583-0
                                    • Opcode ID: 04b739db586b670126c7119b566f03dd1efc4ec82adb23a6bbf3e60323b3d7ce
                                    • Instruction ID: 99a4bc67a8c43757839ce5658996565e88f4cb2ecc15aeea03f34014f97f3c52
                                    • Opcode Fuzzy Hash: 04b739db586b670126c7119b566f03dd1efc4ec82adb23a6bbf3e60323b3d7ce
                                    • Instruction Fuzzy Hash: F2E0863350521056E611AA719D44C7773AC9F89650307843EF946F2080D738DC31ABBD
                                    APIs
                                    • GetFileAttributesW.KERNELBASE(?,00403055,C:\Users\user\Desktop\yuc1Jwlkh5.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405EE8
                                    • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000007,00000009,0000000B), ref: 00405F0A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: File$AttributesCreate
                                    • String ID:
                                    • API String ID: 415043291-0
                                    • Opcode ID: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                    • Instruction ID: 1030bc0f2bf25390ef9c6131bda9d6cfedcac9e68b753c15eded60bf4a570351
                                    • Opcode Fuzzy Hash: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                    • Instruction Fuzzy Hash: 5ED09E31254201AFEF098F20DE16F2E7BA2EB94B04F11552CB786941E0DAB15C199B15
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000,00403495,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 004059A8
                                    • GetLastError.KERNEL32(?,00000007,00000009,0000000B), ref: 004059B6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: CreateDirectoryErrorLast
                                    • String ID:
                                    • API String ID: 1375471231-0
                                    • Opcode ID: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                    • Instruction ID: 379133542b1e1e7011c0d69b4b2ae41cc98c6aec5a22f3063a42931ced3e53c7
                                    • Opcode Fuzzy Hash: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                    • Instruction Fuzzy Hash: 1EC04C71205502EEF6115B20DF48B1B7A909B50751F16843DA146E01E4DE389455D92D
                                    APIs
                                    • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,00403457,00000000,00000000,0040329E,?,00000004,00000000,00000000,00000000), ref: 00405F7B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: FileRead
                                    • String ID:
                                    • API String ID: 2738559852-0
                                    • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                    • Instruction ID: e146fa180a083be72d256ad1b428d57881e9eb39a1326beaade4420b40277b6a
                                    • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                    • Instruction Fuzzy Hash: E7E0EC3221065BAFDF10AEA59C04EFB7B6CEB05360F004836FD55E6150D635E9219BA8
                                    APIs
                                    • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,0040340D,000000FF,00793700,?,00793700,?,?,00000004,00000000), ref: 00405FAA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: FileWrite
                                    • String ID:
                                    • API String ID: 3934441357-0
                                    • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                    • Instruction ID: df8aade711aef2fea4c6cc03ed90c08959c6261ddae8de931081f7d2433cde5f
                                    • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                    • Instruction Fuzzy Hash: 96E08C3221021AEBDF109E608C00AEB7B6CEB00360F004433FA24E3150D634E8218BA8
                                    APIs
                                    • VirtualProtect.KERNELBASE(6E44505C,00000004,00000040,6E44504C), ref: 6E4429FD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2186111808.000000006E441000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E440000, based on PE: true
                                    • Associated: 00000000.00000002.2185161837.000000006E440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.2186129826.000000006E444000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.2186187474.000000006E446000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6e440000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 9caafae41568cbce574fb0816125166472aabf01ef0388131314a32ab2065653
                                    • Instruction ID: d7d380871f3a895151aac2d73c25483cee2e169d50925c4a872fc551c4db6f18
                                    • Opcode Fuzzy Hash: 9caafae41568cbce574fb0816125166472aabf01ef0388131314a32ab2065653
                                    • Instruction Fuzzy Hash: 03F0AEB8B14A88DEDFA2FF78A445B093BE0F70B304B10492AE188EA241E37C4444CB91
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,007A0F28,?,?,004062E9,007A0F28,00000000,?,?,Call,?), ref: 0040627F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID:
                                    • API String ID: 71445658-0
                                    • Opcode ID: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                                    • Instruction ID: 981b209bfbc59ad728c3152e24748ded8346fc425447e23afb42b8d85bc6dac1
                                    • Opcode Fuzzy Hash: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                                    • Instruction Fuzzy Hash: 35D0123200020DBBDF11AF90ED05FAB372DAB08350F014426FE06A4091D775D530A728
                                    APIs
                                    • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004043A2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID:
                                    • API String ID: 3850602802-0
                                    • Opcode ID: 749224e8f98fb78827d13f0d237c1790e640dc60b1af624d5aad8e7e956e5cea
                                    • Instruction ID: 2ab46fc48b107f7ec410a0490fc1e10939948660fe742cc14426a6f165494095
                                    • Opcode Fuzzy Hash: 749224e8f98fb78827d13f0d237c1790e640dc60b1af624d5aad8e7e956e5cea
                                    • Instruction Fuzzy Hash: 26C04C75784700BADA149B549E45F0677546B90701F158429B641A50D0CA78D410DA2C
                                    APIs
                                    • SetFilePointer.KERNELBASE(?,00000000,00000000,004031DA,?,?,00000007,00000009,0000000B), ref: 00403468
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: FilePointer
                                    • String ID:
                                    • API String ID: 973152223-0
                                    • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                    • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
                                    • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                    • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
                                    APIs
                                    • SendMessageW.USER32(00000028,?,00000001,004041A4), ref: 00404387
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID:
                                    • API String ID: 3850602802-0
                                    • Opcode ID: 33429e90f145919918c0f5a16300b6ae2cb664e9c61a266d81822a9c1fb78e21
                                    • Instruction ID: 9ccc480ae856a8f761d654a46a9a0801f91457f8e33b58f107ae6609e89c6df3
                                    • Opcode Fuzzy Hash: 33429e90f145919918c0f5a16300b6ae2cb664e9c61a266d81822a9c1fb78e21
                                    • Instruction Fuzzy Hash: 51B09235181A00AADE914B00DE09F457A62A7A4701F00C029B241240B4CAB200A4DB0A
                                    APIs
                                    • KiUserCallbackDispatcher.NTDLL(?,0040413D), ref: 00404370
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: CallbackDispatcherUser
                                    • String ID:
                                    • API String ID: 2492992576-0
                                    • Opcode ID: fb2bbd85db119072699d8509dbb0c67ddc0fed6d182cd9e62e167e16add427de
                                    • Instruction ID: f32ebe17383345fd09930a0b12515434b8b37a693fa3d318b2a69664ac7713bd
                                    • Opcode Fuzzy Hash: fb2bbd85db119072699d8509dbb0c67ddc0fed6d182cd9e62e167e16add427de
                                    • Instruction Fuzzy Hash: 97A00176405540AFEE029B61EF09D4ABB72ABA9701B4185B9A286A0034CB364860EB1D
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000), ref: 6E442BB7
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2186111808.000000006E441000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E440000, based on PE: true
                                    • Associated: 00000000.00000002.2185161837.000000006E440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.2186129826.000000006E444000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.2186187474.000000006E446000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6e440000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: dbacca2d1b8d8b8192afc0c7bae2c1deece53aa21d0a023ccfe239d152114526
                                    • Instruction ID: d3ea35636dd91a6aa2bfa3d3dae729016c0fdff29ac36a435c7ab78036f6559b
                                    • Opcode Fuzzy Hash: dbacca2d1b8d8b8192afc0c7bae2c1deece53aa21d0a023ccfe239d152114526
                                    • Instruction Fuzzy Hash: 7C415D75700A04DBEF21EFF4E985F9937A8EB46358F20892BE904D7610CF389581CAD9
                                    APIs
                                    • GlobalAlloc.KERNELBASE(00000040,?,6E44123B,?,6E4412DF,00000019,6E4411BE,-000000A0), ref: 6E441225
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2186111808.000000006E441000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E440000, based on PE: true
                                    • Associated: 00000000.00000002.2185161837.000000006E440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.2186129826.000000006E444000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.2186187474.000000006E446000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6e440000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: AllocGlobal
                                    • String ID:
                                    • API String ID: 3761449716-0
                                    • Opcode ID: 91d7071dbca7c218cafadc93be4730247ae84c528f4ece0eb277c1e7387202bb
                                    • Instruction ID: bdc3e86577e12049802d89555649004e4fffcdc6636c791fdfe5e21547139a86
                                    • Opcode Fuzzy Hash: 91d7071dbca7c218cafadc93be4730247ae84c528f4ece0eb277c1e7387202bb
                                    • Instruction Fuzzy Hash: 98B01274B00400DFEE01BF74DC06F343254F701301F044000F600D0180C1244C10C534
                                    APIs
                                      • Part of subcall function 6E44121B: GlobalAlloc.KERNELBASE(00000040,?,6E44123B,?,6E4412DF,00000019,6E4411BE,-000000A0), ref: 6E441225
                                    • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 6E441C8D
                                    • lstrcpyW.KERNEL32(00000008,?), ref: 6E441CD5
                                    • lstrcpyW.KERNEL32(00000808,?), ref: 6E441CDF
                                    • GlobalFree.KERNEL32(00000000), ref: 6E441CF2
                                    • GlobalFree.KERNEL32(?), ref: 6E441DD4
                                    • GlobalFree.KERNEL32(?), ref: 6E441DD9
                                    • GlobalFree.KERNEL32(?), ref: 6E441DDE
                                    • GlobalFree.KERNEL32(00000000), ref: 6E441FC8
                                    • lstrcpyW.KERNEL32(?,?), ref: 6E442182
                                    • GetModuleHandleW.KERNEL32(00000008), ref: 6E442201
                                    • LoadLibraryW.KERNEL32(00000008), ref: 6E442212
                                    • GetProcAddress.KERNEL32(?,?), ref: 6E44226C
                                    • lstrlenW.KERNEL32(00000808), ref: 6E442286
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2186111808.000000006E441000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E440000, based on PE: true
                                    • Associated: 00000000.00000002.2185161837.000000006E440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.2186129826.000000006E444000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.2186187474.000000006E446000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6e440000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                    • String ID:
                                    • API String ID: 245916457-0
                                    • Opcode ID: bb025a9c9c12350c9d1209dcb2cb554358e4847ad0ed1278f77c22b7087f91a1
                                    • Instruction ID: 1402a2f181fd29c3fd979c8e3182efd257291d19704631bda3ee28d4bb800e05
                                    • Opcode Fuzzy Hash: bb025a9c9c12350c9d1209dcb2cb554358e4847ad0ed1278f77c22b7087f91a1
                                    • Instruction Fuzzy Hash: BC228BB1E14606DEEB509FF9D880AEDB7B4FB09305F10452FD1A5E3340DBB069AA8B54
                                    APIs
                                    • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,004061D5,00000000,00000000), ref: 00406075
                                    • GetShortPathNameW.KERNEL32(?,007A55E8,00000400), ref: 0040607E
                                      • Part of subcall function 00405E49: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E59
                                      • Part of subcall function 00405E49: lstrlenA.KERNEL32(00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E8B
                                    • GetShortPathNameW.KERNEL32(?,007A5DE8,00000400), ref: 0040609B
                                    • wsprintfA.USER32 ref: 004060B9
                                    • GetFileSize.KERNEL32(00000000,00000000,007A5DE8,C0000000,00000004,007A5DE8,?), ref: 004060F4
                                    • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406103
                                    • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 0040613B
                                    • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,007A51E8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 00406191
                                    • GlobalFree.KERNEL32(00000000), ref: 004061A2
                                    • CloseHandle.KERNEL32(00000000), ref: 004061A9
                                      • Part of subcall function 00405EE4: GetFileAttributesW.KERNELBASE(?,00403055,C:\Users\user\Desktop\yuc1Jwlkh5.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405EE8
                                      • Part of subcall function 00405EE4: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000007,00000009,0000000B), ref: 00405F0A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                    • String ID: %ls=%ls$[Rename]$Uz$]z
                                    • API String ID: 2171350718-2939442745
                                    • Opcode ID: 0ed23fd09f20e9f0b0e4ce5e0ebdd9c0c92abb0a06c9999cd82c312b58dee0fa
                                    • Instruction ID: 03fe7b931bffc2b02635af9c10f4e714808f3729e90155368a1b4a6ed52067ca
                                    • Opcode Fuzzy Hash: 0ed23fd09f20e9f0b0e4ce5e0ebdd9c0c92abb0a06c9999cd82c312b58dee0fa
                                    • Instruction Fuzzy Hash: 44312370600B05BFD6206B618D48F6B3A6CDF86744F15013AFD42FA2C3DA3C99218ABD
                                    APIs
                                    • CharNextW.USER32(?,*?|<>/":,00000000,00000000,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\yuc1Jwlkh5.exe",0040347D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00406700
                                    • CharNextW.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 0040670F
                                    • CharNextW.USER32(?,00000000,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\yuc1Jwlkh5.exe",0040347D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00406714
                                    • CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\yuc1Jwlkh5.exe",0040347D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00406727
                                    Strings
                                    • "C:\Users\user\Desktop\yuc1Jwlkh5.exe", xrefs: 0040669D
                                    • *?|<>/":, xrefs: 004066EF
                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 0040669E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: Char$Next$Prev
                                    • String ID: "C:\Users\user\Desktop\yuc1Jwlkh5.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                    • API String ID: 589700163-3906307122
                                    • Opcode ID: 9ddbb9e18cbe24282ce487244f484090ca5dfb24375496ba9be4fccf49263134
                                    • Instruction ID: 12c80e2bf748d1a62cb3884e1ae38c2d534281e125f75e63bd15dfe73c9398b2
                                    • Opcode Fuzzy Hash: 9ddbb9e18cbe24282ce487244f484090ca5dfb24375496ba9be4fccf49263134
                                    • Instruction Fuzzy Hash: E711EB15800A1255DB303B148C84A7763F8EF947A4F56443FED86732C0E77D4C9286BD
                                    APIs
                                    • GetWindowLongW.USER32(?,000000EB), ref: 004043C8
                                    • GetSysColor.USER32(00000000), ref: 00404406
                                    • SetTextColor.GDI32(?,00000000), ref: 00404412
                                    • SetBkMode.GDI32(?,?), ref: 0040441E
                                    • GetSysColor.USER32(?), ref: 00404431
                                    • SetBkColor.GDI32(?,?), ref: 00404441
                                    • DeleteObject.GDI32(?), ref: 0040445B
                                    • CreateBrushIndirect.GDI32(?), ref: 00404465
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                    • String ID:
                                    • API String ID: 2320649405-0
                                    • Opcode ID: 288dbcc7c85f11a55b3e08142a2a7aff64d3670202badf385cb57de10b60d8c1
                                    • Instruction ID: 7fe0b9bd09f79c55d2aa0e3576d5328f94b18663b05207f77db8afc097fd36db
                                    • Opcode Fuzzy Hash: 288dbcc7c85f11a55b3e08142a2a7aff64d3670202badf385cb57de10b60d8c1
                                    • Instruction Fuzzy Hash: F62174B15007049BCB319F78D948F5BBBF8AF80714B048A3EE9D2A26E1C734E905CB58
                                    APIs
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,6E442238,?,00000808), ref: 6E441635
                                    • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,6E442238,?,00000808), ref: 6E44163C
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,6E442238,?,00000808), ref: 6E441650
                                    • GetProcAddress.KERNEL32(8"Dn,00000000), ref: 6E441657
                                    • GlobalFree.KERNEL32(00000000), ref: 6E441660
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2186111808.000000006E441000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E440000, based on PE: true
                                    • Associated: 00000000.00000002.2185161837.000000006E440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.2186129826.000000006E444000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.2186187474.000000006E446000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6e440000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                    • String ID: 8"Dn
                                    • API String ID: 1148316912-286088066
                                    • Opcode ID: 539b16b1be1cb200e4d73ed4a770938542643dbd2bb2eff1c7d62c3385d2d54a
                                    • Instruction ID: 6a1ebb16529e6e4a9f27c99a2de49dd925254d7ea0472614ec60eebe8e449fe6
                                    • Opcode Fuzzy Hash: 539b16b1be1cb200e4d73ed4a770938542643dbd2bb2eff1c7d62c3385d2d54a
                                    • Instruction Fuzzy Hash: 6EF0A272206538BBDA213FB69C4CC9BBE9CDF8B2F6B110215F6189119085625D12D7F1
                                    APIs
                                    • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402F49
                                    • MulDiv.KERNEL32(000DED8A,00000064,000DF8B0), ref: 00402F74
                                    • wsprintfW.USER32 ref: 00402F84
                                    • SetWindowTextW.USER32(?,?), ref: 00402F94
                                    • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402FA6
                                    Strings
                                    • verifying installer: %d%%, xrefs: 00402F7E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: Text$ItemTimerWindowwsprintf
                                    • String ID: verifying installer: %d%%
                                    • API String ID: 1451636040-82062127
                                    • Opcode ID: e04d04eb7b63203ce5fd1c353c1d281d58231c4b0d3ff082bc1608e2171a15b6
                                    • Instruction ID: 448c993359d53400b231c8c55bc41b2c2aaf26e1e6946bd82a433317a94b79bc
                                    • Opcode Fuzzy Hash: e04d04eb7b63203ce5fd1c353c1d281d58231c4b0d3ff082bc1608e2171a15b6
                                    • Instruction Fuzzy Hash: 1101FF70640209BBEF209F60DE4AFAA3B79EB04349F008039FA16A51D1DBB999559F58
                                    APIs
                                      • Part of subcall function 6E44121B: GlobalAlloc.KERNELBASE(00000040,?,6E44123B,?,6E4412DF,00000019,6E4411BE,-000000A0), ref: 6E441225
                                    • GlobalFree.KERNEL32(?), ref: 6E4426A3
                                    • GlobalFree.KERNEL32(00000000), ref: 6E4426D8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2186111808.000000006E441000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E440000, based on PE: true
                                    • Associated: 00000000.00000002.2185161837.000000006E440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.2186129826.000000006E444000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.2186187474.000000006E446000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6e440000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: Global$Free$Alloc
                                    • String ID:
                                    • API String ID: 1780285237-0
                                    • Opcode ID: 39df0e7a5c7468e799263a79ac40fc274805a547754f4cea4abd212ca5c166a7
                                    • Instruction ID: a558ff9468116af9156c943e5cdc0470b12f8a557c4d01c78cdef4d0875c79ff
                                    • Opcode Fuzzy Hash: 39df0e7a5c7468e799263a79ac40fc274805a547754f4cea4abd212ca5c166a7
                                    • Instruction Fuzzy Hash: 7231BC31304902EFEB16AFF5E894C6A77BAFBC6344314452EF100D3210CB309826CBA9
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2186111808.000000006E441000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E440000, based on PE: true
                                    • Associated: 00000000.00000002.2185161837.000000006E440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.2186129826.000000006E444000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.2186187474.000000006E446000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6e440000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: FreeGlobal
                                    • String ID:
                                    • API String ID: 2979337801-0
                                    • Opcode ID: b319b23f64bca4cf6b1ef35fa2029c0b9f3f45d8fae99b35798d7af2dd2c77bf
                                    • Instruction ID: dbec6ee66bebf641a156be0c548280def916dff97e3ae209172c392b713527d2
                                    • Opcode Fuzzy Hash: b319b23f64bca4cf6b1ef35fa2029c0b9f3f45d8fae99b35798d7af2dd2c77bf
                                    • Instruction Fuzzy Hash: DB51D132F1405AEEFB409FF98540DAEBBF9EB45354B00465BD504B3B04D7B09EAA8691
                                    APIs
                                    • GlobalFree.KERNEL32(00000000), ref: 6E442522
                                      • Part of subcall function 6E44122C: lstrcpynW.KERNEL32(00000000,?,6E4412DF,00000019,6E4411BE,-000000A0), ref: 6E44123C
                                    • GlobalAlloc.KERNEL32(00000040), ref: 6E4424A8
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 6E4424C3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2186111808.000000006E441000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E440000, based on PE: true
                                    • Associated: 00000000.00000002.2185161837.000000006E440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.2186129826.000000006E444000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.2186187474.000000006E446000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6e440000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                    • String ID:
                                    • API String ID: 4216380887-0
                                    • Opcode ID: d5e577c01997549c66de49c260445f773b03a2a82eb1e8efc022de577bb19bcf
                                    • Instruction ID: 21e288feddb371a62bd75ea1c1175bab5fcb73d08f9f09222f3e66c0917678b8
                                    • Opcode Fuzzy Hash: d5e577c01997549c66de49c260445f773b03a2a82eb1e8efc022de577bb19bcf
                                    • Instruction Fuzzy Hash: 7941AEB0308709DFEB14EFFA9850E66B7B8FB49314B00481EE455C7281EF70A556CBA9
                                    APIs
                                    • CharNextW.USER32(?,?,C:\,?,00405DE2,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405D7C
                                    • CharNextW.USER32(00000000), ref: 00405D81
                                    • CharNextW.USER32(00000000), ref: 00405D99
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: CharNext
                                    • String ID: C:\
                                    • API String ID: 3213498283-3404278061
                                    • Opcode ID: a494e05d27702b27be76eb2108b1f7c475580a471c546fdda9206c4fb56a95c9
                                    • Instruction ID: 839f6a4cd7818f8bbcc29dd9d6e935739f9a8baf6e4a15472bca77c663bd0c43
                                    • Opcode Fuzzy Hash: a494e05d27702b27be76eb2108b1f7c475580a471c546fdda9206c4fb56a95c9
                                    • Instruction Fuzzy Hash: 1FF09022920F1296DB3177545C4DE7B5BB8EF54760B00C43BE601B72C1E3B84C818EAA
                                    APIs
                                    • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040348F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00405CC9
                                    • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040348F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00405CD3
                                    • lstrcatW.KERNEL32(?,0040A014,?,00000007,00000009,0000000B), ref: 00405CE5
                                    Strings
                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00405CC3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: CharPrevlstrcatlstrlen
                                    • String ID: C:\Users\user\AppData\Local\Temp\
                                    • API String ID: 2659869361-3081826266
                                    • Opcode ID: bed06d4f6a82b163f62297ef23baf12e7c7e8c5859eb2f34a161a285e0ec4316
                                    • Instruction ID: 20018de61182ae54b5e078598b4ece42ca391df12eccfc729252e8f5514d5294
                                    • Opcode Fuzzy Hash: bed06d4f6a82b163f62297ef23baf12e7c7e8c5859eb2f34a161a285e0ec4316
                                    • Instruction Fuzzy Hash: 78D0A731101A30AAD1117B448D04CDF629CFE85304341403BF202B30A2C77C1D5387FD
                                    APIs
                                    • DestroyWindow.USER32(00000000,00000000,0040318F,00000001,?,00000007,00000009,0000000B), ref: 00402FC4
                                    • GetTickCount.KERNEL32 ref: 00402FE2
                                    • CreateDialogParamW.USER32(0000006F,00000000,00402F2B,00000000), ref: 00402FFF
                                    • ShowWindow.USER32(00000000,00000005,?,00000007,00000009,0000000B), ref: 0040300D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: Window$CountCreateDestroyDialogParamShowTick
                                    • String ID:
                                    • API String ID: 2102729457-0
                                    • Opcode ID: 5e41244d60e94df7afa5422e741b36603cd51d1290bb4582c8306ab25b36019d
                                    • Instruction ID: 8c281f3aa7e88f802b7d8bba4993e69035ed424970cff038758a163d63a680ad
                                    • Opcode Fuzzy Hash: 5e41244d60e94df7afa5422e741b36603cd51d1290bb4582c8306ab25b36019d
                                    • Instruction Fuzzy Hash: 3AF0BE30506221ABC2616F60FE0CA8B3B78FB44B51705C83BF101F11E4CB3808819B9D
                                    APIs
                                    • FreeLibrary.KERNEL32(?,74DF3420,00000000,C:\Users\user\AppData\Local\Temp\,00403A00,00403816,00000007,?,00000007,00000009,0000000B), ref: 00403A42
                                    • GlobalFree.KERNEL32(00A18830), ref: 00403A49
                                    Strings
                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00403A28
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: Free$GlobalLibrary
                                    • String ID: C:\Users\user\AppData\Local\Temp\
                                    • API String ID: 1100898210-3081826266
                                    • Opcode ID: 6ef17ecbb981fa3a9d26a37a654407d639bd202e425e8d1c53e2791914a5cf50
                                    • Instruction ID: 10b089f61d7fd26560bcfb3f790e8945b6a0be01d7b58778b04adbc7300f8739
                                    • Opcode Fuzzy Hash: 6ef17ecbb981fa3a9d26a37a654407d639bd202e425e8d1c53e2791914a5cf50
                                    • Instruction Fuzzy Hash: 64E0123360112057C6215F45FE0475ABB7D6F49B26F06803BE9C0BB26087785C838FD8
                                    APIs
                                    • lstrlenW.KERNEL32(?,C:\Users\user\Desktop,00403081,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\yuc1Jwlkh5.exe,C:\Users\user\Desktop\yuc1Jwlkh5.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405D15
                                    • CharPrevW.USER32(?,00000000,?,C:\Users\user\Desktop,00403081,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\yuc1Jwlkh5.exe,C:\Users\user\Desktop\yuc1Jwlkh5.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405D25
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: CharPrevlstrlen
                                    • String ID: C:\Users\user\Desktop
                                    • API String ID: 2709904686-224404859
                                    • Opcode ID: ca28fb495e832aca3bc5bc38fa8d5a1d536c38e2997e226eadf599fe90d3b243
                                    • Instruction ID: 3b4219a6871f3e4e2040e57eeeef2aaac809f1ec38f5d31038b50c09059f2d31
                                    • Opcode Fuzzy Hash: ca28fb495e832aca3bc5bc38fa8d5a1d536c38e2997e226eadf599fe90d3b243
                                    • Instruction Fuzzy Hash: 97D05EB34109209AE3127704DC0599F73E8EF5530074A8467E541A61A5D7785C818AAC
                                    APIs
                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 6E44116A
                                    • GlobalFree.KERNEL32(00000000), ref: 6E4411C7
                                    • GlobalFree.KERNEL32(00000000), ref: 6E4411D9
                                    • GlobalFree.KERNEL32(?), ref: 6E441203
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2186111808.000000006E441000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E440000, based on PE: true
                                    • Associated: 00000000.00000002.2185161837.000000006E440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.2186129826.000000006E444000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.2186187474.000000006E446000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6e440000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: Global$Free$Alloc
                                    • String ID:
                                    • API String ID: 1780285237-0
                                    • Opcode ID: 833c757c3574711faee2c157efa37672e61c82961cc80a739d1b4f059281da60
                                    • Instruction ID: 9a53c8e799abdd2cd1aab5e04bc0e9499c9a1da08c1e6af8b6a717e71b4f294a
                                    • Opcode Fuzzy Hash: 833c757c3574711faee2c157efa37672e61c82961cc80a739d1b4f059281da60
                                    • Instruction Fuzzy Hash: E6315EB6700206DFFB01AFF9E955E6677E8FB4A250B00051BE844E6355E778EC29C7A0
                                    APIs
                                    • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E59
                                    • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405E71
                                    • CharNextA.USER32(00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E82
                                    • lstrlenA.KERNEL32(00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E8B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2150414396.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2150402053.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150430663.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150447954.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2150748600.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                    Similarity
                                    • API ID: lstrlen$CharNextlstrcmpi
                                    • String ID:
                                    • API String ID: 190613189-0
                                    • Opcode ID: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                    • Instruction ID: a1795947179755a411c98c1569971d2b6f4e38ea7894d212e8297337e4f71977
                                    • Opcode Fuzzy Hash: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                    • Instruction Fuzzy Hash: E2F06231504514FFD7129BA5DD409AEBBA8EF06250B2540BAE884FB250D674DF029BE9