Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
yuc1Jwlkh5.exe

Overview

General Information

Sample name:yuc1Jwlkh5.exe
renamed because original name is a hash value
Original sample name:5bc4b28288f068f1c11e69b1cc94aacb4b0d2812494c1673471b890f1ce67a9e
Analysis ID:1558324
MD5:53441f2de2d573f3b2e4fb35c248229b
SHA1:afc840f25adfcb5873f5b69e55b2920c370a2285
SHA256:5bc4b28288f068f1c11e69b1cc94aacb4b0d2812494c1673471b890f1ce67a9e
Infos:

Detection

GuLoader
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Sample execution stops while process was sleeping (likely an evasion)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses 32bit PE files

Classification

  • System is w10x64
  • yuc1Jwlkh5.exe (PID: 7408 cmdline: "C:\Users\user\Desktop\yuc1Jwlkh5.exe" MD5: 53441F2DE2D573F3B2E4FB35C248229B)
    • yuc1Jwlkh5.exe (PID: 7796 cmdline: "C:\Users\user\Desktop\yuc1Jwlkh5.exe" MD5: 53441F2DE2D573F3B2E4FB35C248229B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000004.00000002.3536543731.0000000002153000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000000.00000002.2165427887.0000000005223000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: yuc1Jwlkh5.exeAvira: detected
      Source: http://173.249.193.48/VdpAwrpsFeHTHv196.binAvira URL Cloud: Label: malware
      Source: http://173.249.193.48/VdpAwrpsFeHTHv196.bin#y4Avira URL Cloud: Label: malware
      Source: yuc1Jwlkh5.exeReversingLabs: Detection: 83%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: yuc1Jwlkh5.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: yuc1Jwlkh5.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: yuc1Jwlkh5.exe, 00000004.00000001.2156684580.0000000000649000.00000008.00000001.01000000.00000008.sdmp
      Source: Binary string: mshtml.pdbUGP source: yuc1Jwlkh5.exe, 00000004.00000001.2156684580.0000000000649000.00000008.00000001.01000000.00000008.sdmp
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeCode function: 0_2_0040674C FindFirstFileW,FindClose,0_2_0040674C
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeCode function: 0_2_00405B00 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405B00
      Source: global trafficTCP traffic: 192.168.2.4:49744 -> 173.249.193.48:80
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: yuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004DE7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/
      Source: yuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004E0B000.00000004.00000020.00020000.00000000.sdmp, yuc1Jwlkh5.exe, 00000004.00000002.3562445757.0000000034160000.00000004.00001000.00020000.00000000.sdmp, yuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bin
      Source: yuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004DE7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bin#y4
      Source: yuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004DE7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bin7
      Source: yuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004DCF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binU1w
      Source: yuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004DE7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binW
      Source: yuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bina-7368302a1ad4
      Source: yuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004DE7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binc
      Source: yuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004E0B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binindows
      Source: yuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004DE7000.00000004.00000020.00020000.00000000.sdmp, yuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004E0B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bino
      Source: yuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004DCF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binv1R
      Source: yuc1Jwlkh5.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: yuc1Jwlkh5.exe, 00000004.00000001.2156684580.0000000000649000.00000008.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.ftp.ftp://ftp.gopher.
      Source: yuc1Jwlkh5.exe, 00000004.00000001.2156684580.00000000005F2000.00000008.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
      Source: yuc1Jwlkh5.exe, 00000004.00000001.2156684580.00000000005F2000.00000008.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
      Source: yuc1Jwlkh5.exe, 00000004.00000001.2156684580.0000000000649000.00000008.00000001.01000000.00000008.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeCode function: 0_2_004034A2 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A2
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeFile created: C:\Windows\resources\0809Jump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeCode function: 0_2_6CE71B5F0_2_6CE71B5F
      Source: yuc1Jwlkh5.exeStatic PE information: invalid certificate
      Source: yuc1Jwlkh5.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal84.troj.evad.winEXE@3/11@0/1
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeCode function: 0_2_004034A2 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A2
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeFile created: C:\Program Files (x86)\Common Files\kvindagtigt.iniJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeFile created: C:\Users\user\kretekniske.iniJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeFile created: C:\Users\user\AppData\Local\Temp\nstFD.tmpJump to behavior
      Source: yuc1Jwlkh5.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: yuc1Jwlkh5.exeReversingLabs: Detection: 83%
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeFile read: C:\Users\user\Desktop\yuc1Jwlkh5.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\yuc1Jwlkh5.exe "C:\Users\user\Desktop\yuc1Jwlkh5.exe"
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeProcess created: C:\Users\user\Desktop\yuc1Jwlkh5.exe "C:\Users\user\Desktop\yuc1Jwlkh5.exe"
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeProcess created: C:\Users\user\Desktop\yuc1Jwlkh5.exe "C:\Users\user\Desktop\yuc1Jwlkh5.exe"Jump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeFile written: C:\Program Files (x86)\Common Files\kvindagtigt.iniJump to behavior
      Source: yuc1Jwlkh5.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: yuc1Jwlkh5.exe, 00000004.00000001.2156684580.0000000000649000.00000008.00000001.01000000.00000008.sdmp
      Source: Binary string: mshtml.pdbUGP source: yuc1Jwlkh5.exe, 00000004.00000001.2156684580.0000000000649000.00000008.00000001.01000000.00000008.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000004.00000002.3536543731.0000000002153000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.2165427887.0000000005223000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeCode function: 0_2_6CE71B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6CE71B5F
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeFile created: C:\Users\user\AppData\Local\Temp\nsl63E.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeAPI/Special instruction interceptor: Address: 5232FD0
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeAPI/Special instruction interceptor: Address: 2162FD0
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeRDTSC instruction interceptor: First address: 52096E2 second address: 52096E2 instructions: 0x00000000 rdtsc 0x00000002 cmp ah, ch 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F97C4DBF436h 0x00000008 cmp ah, ch 0x0000000a inc ebp 0x0000000b inc ebx 0x0000000c rdtsc
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeRDTSC instruction interceptor: First address: 21396E2 second address: 21396E2 instructions: 0x00000000 rdtsc 0x00000002 cmp ah, ch 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F97C54CA946h 0x00000008 cmp ah, ch 0x0000000a inc ebp 0x0000000b inc ebx 0x0000000c rdtsc
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsl63E.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exe TID: 7800Thread sleep time: -60000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeCode function: 0_2_0040674C FindFirstFileW,FindClose,0_2_0040674C
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeCode function: 0_2_00405B00 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405B00
      Source: yuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004DCF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWx
      Source: yuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004E10000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWN
      Source: yuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004E10000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeAPI call chain: ExitProcess graph end nodegraph_0-2451
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeAPI call chain: ExitProcess graph end nodegraph_0-2664
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeCode function: 0_2_6CE71B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6CE71B5F
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeProcess created: C:\Users\user\Desktop\yuc1Jwlkh5.exe "C:\Users\user\Desktop\yuc1Jwlkh5.exe"Jump to behavior
      Source: C:\Users\user\Desktop\yuc1Jwlkh5.exeCode function: 0_2_004034A2 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A2
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      DLL Side-Loading
      1
      Access Token Manipulation
      12
      Masquerading
      OS Credential Dumping21
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
      Process Injection
      1
      Virtualization/Sandbox Evasion
      LSASS Memory1
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      1
      Access Token Manipulation
      Security Account Manager3
      File and Directory Discovery
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
      Process Injection
      NTDS22
      System Information Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      yuc1Jwlkh5.exe83%ReversingLabsWin32.Trojan.GuLoader
      yuc1Jwlkh5.exe100%AviraHEUR/AGEN.1333748
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nsl63E.tmp\System.dll0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin70%Avira URL Cloudsafe
      http://173.249.193.48/0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.binindows0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.bina-7368302a1ad40%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.binW0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.binc0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin100%Avira URL Cloudmalware
      http://173.249.193.48/VdpAwrpsFeHTHv196.binU1w0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.binv1R0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin#y4100%Avira URL Cloudmalware
      http://173.249.193.48/VdpAwrpsFeHTHv196.bino0%Avira URL Cloudsafe
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin7yuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004DE7000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://173.249.193.48/VdpAwrpsFeHTHv196.binWyuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004DE7000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://173.249.193.48/VdpAwrpsFeHTHv196.bina-7368302a1ad4yuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004E10000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtdyuc1Jwlkh5.exe, 00000004.00000001.2156684580.00000000005F2000.00000008.00000001.01000000.00000008.sdmpfalse
        high
        http://173.249.193.48/VdpAwrpsFeHTHv196.binyuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004E0B000.00000004.00000020.00020000.00000000.sdmp, yuc1Jwlkh5.exe, 00000004.00000002.3562445757.0000000034160000.00000004.00001000.00020000.00000000.sdmp, yuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004E10000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://173.249.193.48/yuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004DE7000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214yuc1Jwlkh5.exe, 00000004.00000001.2156684580.0000000000649000.00000008.00000001.01000000.00000008.sdmpfalse
          high
          http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtdyuc1Jwlkh5.exe, 00000004.00000001.2156684580.00000000005F2000.00000008.00000001.01000000.00000008.sdmpfalse
            high
            http://173.249.193.48/VdpAwrpsFeHTHv196.binindowsyuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004E0B000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.ftp.ftp://ftp.gopher.yuc1Jwlkh5.exe, 00000004.00000001.2156684580.0000000000649000.00000008.00000001.01000000.00000008.sdmpfalse
              high
              http://173.249.193.48/VdpAwrpsFeHTHv196.binU1wyuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004DCF000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://173.249.193.48/VdpAwrpsFeHTHv196.bincyuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004DE7000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://nsis.sf.net/NSIS_ErrorErroryuc1Jwlkh5.exefalse
                high
                http://173.249.193.48/VdpAwrpsFeHTHv196.bin#y4yuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004DE7000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: malware
                unknown
                http://173.249.193.48/VdpAwrpsFeHTHv196.binv1Ryuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004DCF000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://173.249.193.48/VdpAwrpsFeHTHv196.binoyuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004DE7000.00000004.00000020.00020000.00000000.sdmp, yuc1Jwlkh5.exe, 00000004.00000002.3540670116.0000000004E0B000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                173.249.193.48
                unknownUnited States
                11878TZULOUSfalse
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1558324
                Start date and time:2024-11-19 11:41:13 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 7m 50s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Run name:Run with higher sleep bypass
                Number of analysed new started processes analysed:7
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:yuc1Jwlkh5.exe
                renamed because original name is a hash value
                Original Sample Name:5bc4b28288f068f1c11e69b1cc94aacb4b0d2812494c1673471b890f1ce67a9e
                Detection:MAL
                Classification:mal84.troj.evad.winEXE@3/11@0/1
                EGA Information:
                • Successful, ratio: 50%
                HCA Information:Failed
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, login.live.com, ctldl.windowsupdate.com
                • Not all processes where analyzed, report is missing behavior information
                • VT rate limit hit for: yuc1Jwlkh5.exe
                No simulations
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                173.249.193.48stormskridtets.exeGet hashmaliciousFormBook, GuLoaderBrowse
                • 173.249.193.48/dlDSZQaZvoFz216.bin
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                TZULOUSMagnetnaalene.exeGet hashmaliciousFormBook, GuLoaderBrowse
                • 173.249.193.108
                stormskridtets.exeGet hashmaliciousFormBook, GuLoaderBrowse
                • 173.249.193.48
                Brneforsorgspdagogers.exeGet hashmaliciousFormBook, GuLoaderBrowse
                • 173.249.193.66
                Brneforsorgspdagogers.exeGet hashmaliciousFormBook, GuLoaderBrowse
                • 173.249.193.66
                la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                • 173.249.236.72
                byte.arm5.elfGet hashmaliciousOkiruBrowse
                • 173.249.236.51
                https://tcmedcenter-my.sharepoint.com/:f:/g/personal/jessica_larson_tcmedcenter_org/Ek1X93Tsfp5KoiWqKbJ_ocQBqlE2wGVJqWkJh4H7mn0vuw?e=Yni2o7Get hashmaliciousUnknownBrowse
                • 173.249.199.16
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                C:\Users\user\AppData\Local\Temp\nsl63E.tmp\System.dllstormskridtets.exeGet hashmaliciousFormBook, GuLoaderBrowse
                  orders_PI 008-01.exeGet hashmaliciousRemcos, GuLoaderBrowse
                    RemotePCViewer.exeGet hashmaliciousUnknownBrowse
                      8737738_19082024.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                        8737738_19082024.vbsGet hashmaliciousGuLoaderBrowse
                          Dhl Delivery(AWB 9849791014).exeGet hashmaliciousGuLoaderBrowse
                            Dhl Delivery(AWB 9849791014).exeGet hashmaliciousGuLoaderBrowse
                              Process:C:\Users\user\Desktop\yuc1Jwlkh5.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):52
                              Entropy (8bit):4.0121618346445365
                              Encrypted:false
                              SSDEEP:3:BPi4YDgAmcAKDHMnhv:BPiBkAmc0nhv
                              MD5:F298228D2D42CED0A00B0C5320000835
                              SHA1:FB06F02DDCDA4C9EC752A688EE617064DB3A49EB
                              SHA-256:E399AFE89F97EAE7BCDAE626913DA1618F4F42BA11887217CDBF524720532AB2
                              SHA-512:464DA89F9E1D5935810443B20C3D19F77585D964DF89F5CB427482A03C8EF6274D06CBC01533D92C691FFD55E1725BA5F427D023A45A5128BCED0EEE11E083FE
                              Malicious:false
                              Reputation:low
                              Preview:[skaaltalerens]..nonsaleability=sammenstuvningerne..
                              Process:C:\Users\user\Desktop\yuc1Jwlkh5.exe
                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):12288
                              Entropy (8bit):5.737556724687435
                              Encrypted:false
                              SSDEEP:192:MenY0qWTlt70IAj/lQ0sEWc/wtYbBH2aDybC7y+XBaIwL:M8+Qlt70Fj/lQRY/9VjjgL
                              MD5:6E55A6E7C3FDBD244042EB15CB1EC739
                              SHA1:070EA80E2192ABC42F358D47B276990B5FA285A9
                              SHA-256:ACF90AB6F4EDC687E94AAF604D05E16E6CFB5E35873783B50C66F307A35C6506
                              SHA-512:2D504B74DA38EDC967E3859733A2A9CACD885DB82F0CA69BFB66872E882707314C54238344D45945DC98BAE85772ACEEF71A741787922D640627D3C8AE8F1C35
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Joe Sandbox View:
                              • Filename: stormskridtets.exe, Detection: malicious, Browse
                              • Filename: orders_PI 008-01.exe, Detection: malicious, Browse
                              • Filename: RemotePCViewer.exe, Detection: malicious, Browse
                              • Filename: 8737738_19082024.vbs, Detection: malicious, Browse
                              • Filename: 8737738_19082024.vbs, Detection: malicious, Browse
                              • Filename: Dhl Delivery(AWB 9849791014).exe, Detection: malicious, Browse
                              • Filename: Dhl Delivery(AWB 9849791014).exe, Detection: malicious, Browse
                              Reputation:moderate, very likely benign file
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L...X..`...........!....."...........).......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text...O .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\yuc1Jwlkh5.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):589
                              Entropy (8bit):4.277818373535095
                              Encrypted:false
                              SSDEEP:12:mScXAtJsdW8lLQIVVCTP1t0laiam6mObo/Bpqwnh2yKbdB1j1f:mSrTsdRTVVM9Yz69Hwh2yKb7ff
                              MD5:E80E34F461528DF8F86C4248C971B2AD
                              SHA1:A1A74D8F5711DEED35AF2B81BE070CA471C39500
                              SHA-256:F2552D843F4D62F481743A15B7C95AA322C14EA5DBB999C8C889A42CBB093A8E
                              SHA-512:46A5D6487131677DAC16C2BE4FC29517C14CB8DB6228B40344D733597462122EF0D1D7DD69B4D5A7A10F9C86635F99D91E91AC2CEBDF923C6B72EF3809637622
                              Malicious:false
                              Reputation:low
                              Preview:pervalvar udvalgsarbejderne illegitime besully.trvarefabrikkers stemmeslugers binomialfordelingernes metropolit.mariolatrous griffy fiskeeksporten valutapuklerne spekulanter infusioners quantifys unconsolidation digitalises forvaltningsret..steticismens advents syde rebaptization returneredes chemosterilants agtvrdige,balklines sludres drengestregers topful koordinatvrdien angorakats tendensromanens blockheadish lidelsesfller eskapismes amiably phenicious nontenurial..overspringe udmntede agnostiker polycarpic stolper lbskes forhandlingsomraader acquires duskly kildnes gaultherase..
                              Process:C:\Users\user\Desktop\yuc1Jwlkh5.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):276701
                              Entropy (8bit):1.2570216910370695
                              Encrypted:false
                              SSDEEP:768:yFPJSwGwS4JXi8PNDQNMDeMW3SGBqGHw1zwpmPMoaO64g1abi4IZxeMcdN9vfd95:/rFf4EoTti54LkFvI3oDW
                              MD5:18C3DA2AA022FF0B89999E28E6A2AE9A
                              SHA1:0659DDE0FD4B39B22825F1645A0BAE7E7202C7F9
                              SHA-256:05DE1FF63CC38C7C4B3034091A311791BFF578658FF17D156AA4FB41A2E197C6
                              SHA-512:D3A51D8B29FEF026F94B339087413319E03DA3193D9159A43AD7B4FEE35A67EEEBC3E66A0092B5ED14F57458173D518C618F2EE00F4203F428EBE0FC162F667C
                              Malicious:false
                              Reputation:low
                              Preview:......................................................(.L.................................3........&.................."...........l........................s.....................................-...........................8..........@.........................................................h..................................@.........).........................I.................F..................................................................T..............................................................j..".......#I.............r.............&..................|...............................................................................:.Z......................).............................................................................H.......C...........................................................................................t.........................................................M.............4........'........................................}..+.......................
                              Process:C:\Users\user\Desktop\yuc1Jwlkh5.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):313672
                              Entropy (8bit):1.2567166720965932
                              Encrypted:false
                              SSDEEP:768:iEGLlMkjkYtwS3MeXM3OpckON5VIbjnI3Oif4NxZSqJbDvz+hE7IkHAYsaW3DQLF:LtWLdp3I3yrt+3SoTMU5oT5
                              MD5:17B0342D31B6E728E13DF79009833371
                              SHA1:B9F3354C4E886382D220D5EC4FA91F389585BD40
                              SHA-256:8CAF84CE635BD92186709E81D12AE352E049C83B53F1C22A6DCB221E8F1C011E
                              SHA-512:4772F5AE64E0619B23114A41785DDE7DD1A9BACE12A9ABEDEF3400EDB3660D4E780C9B91E23A9FDEC1D97BCF7DC48E201771D7D58EB1740191A05CCFDB433C83
                              Malicious:false
                              Preview:....................N............................k....................................................#.................................................................................`........0.............u...................................y................................................................g.........7................E.......&........w..............................................*....................<..................................3................i.......................................................................U...).................................................. ........................................................................................................................A..............................N......c.b.......................................................................................................N........T..............................................h..............................................................................
                              Process:C:\Users\user\Desktop\yuc1Jwlkh5.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):207881
                              Entropy (8bit):7.331635651026833
                              Encrypted:false
                              SSDEEP:3072:zDyy/gxfmTCBeuVaCzUVI90J8g5sF6963goPdEWduKiKMLUW3tTS4NrQsgT99BwE:zDyR4WDsCgVImsE77KMLUS44NMx
                              MD5:749F30B7C897431F55057BFE15DF7228
                              SHA1:2DB933559839DD5F79454546C98CCE8E9C4C8112
                              SHA-256:1506167C68DEBF892BD0E2EAD9515C1F3F80BCCA9C489E715F2436425B7D8D48
                              SHA-512:8E6BC090DFE67D411EA2B386538BAF9ADE1C7A47031CD4BFA0E7D491CFEF814923E71BA1DF8A2CB0A41AFADAE896F77BD89170BB560112E2A2B7BAA8DCD60C9D
                              Malicious:false
                              Preview:............ ..............EEEEE...............n..............C....F.......mm...........D..............ttt...--........``..:::....S....rrrr............P.O..6....".GG...............#.0.....................E..............22...~~.......aa............,..................................&..gg........77..LLLLLL.......ii.......0..o.ff..}.x... .99.....RR...............~~~~~.....................J......................kkk........E..........C...ee.........................G............J.............YY..~...2.............l........##.........Z.........(...........h.y........000.......yy...........l..lll...........................88...@@@@@.QQ..........^^...........mm...................CCC........KKKK.........2...............++..........V......-................B.........w................ ..............!!!....MM......66................===....................NNN..........S....??.........k........D.................................(............................. .........////....x.ccc.ZZ.w..====......
                              Process:C:\Users\user\Desktop\yuc1Jwlkh5.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):16857
                              Entropy (8bit):4.532822901243277
                              Encrypted:false
                              SSDEEP:384:+ipfHtyeVOvFfo92BAVO4tKq/vChYFVmuF1WbTeqFb7RfW:dlyttfo9iAVO4tiGmPZW
                              MD5:143CC97C03735690BA675F029A4A3A16
                              SHA1:7BBA23E28EDB92B05620AA4EA667D3C04DE93593
                              SHA-256:EDCF653A613FF7FB1143DF97441A7027D486CA942A333F3EA0B74C7C11F3D88B
                              SHA-512:01C2C26B31488E036F6C6634636B33A0C06672FF464549D12B653326FA1A90460FAF485C59D8F0B85C6CCF57946AC4D09A70B5A5D3609E93AD3DCDE421CF16A7
                              Malicious:false
                              Preview:.........UU..33........Z..nnnnnn....w.[..............EE................T.......................k..8e...r...n...e...l.N.3...2..M:...:.+.C...r..de...a...t...e...F.h.i...l...e...A...(...m... ...r...4... ...,... ...i... .&&0..cx...8...0...0...0...0...0...0...0...,..w ...i..w ...0...,... ...p... ...0...,... ...i... ...4...,... ...i... ..?0...x...8...0...,... .%%i... ...0...)...i.......r...8.......k...e...r...n...e...l._.3.~.2...:...:...S.**e...t..aF...i...l...e...P...o...i...n...t...e...r...(...i... ...r...8...,... ..vi... ...2...3...0...1...2... ...,... ...i... ./.0...,...i... ...0...)...i.......r...4.......k...e...r...n...e...l...3...2.s.:...:...V...i...r...t...u...a...l...A...l...l...o..Nc...(...i..y ...0...,...i... ...5...4..B0...6...7...2..N0...0...,... .ddi..G ...0...x...3...0...0...0...,... ..Bi... ...0...x..v4...0...)...p...../.r...2.......k...e...r.}.n...e...l..B3...2..U:...:...R.+.e...a...d...F...i...l...e...(...i... ...r...8...,... ...i... ...r...2...,... ...i... ..^5...4...0...6
                              Process:C:\Users\user\Desktop\yuc1Jwlkh5.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):244482
                              Entropy (8bit):1.2509108197987615
                              Encrypted:false
                              SSDEEP:768:ArczTS8oocp0tWLSMkXWg7PKU30gfL4Qf1AUdyM03I3xkjFlu7NDSAZd+6XYIHXd:7Yhp0ckXv78owAC3MhxqI
                              MD5:E6AC7A31DA2D4322339135AD20EB0F23
                              SHA1:F76C6D6EE7C9B01DB799642990AA88B140003EC4
                              SHA-256:00FAD7EC11DB9706955FDF3BE0E6FB037E9F9780F94A502A774B30AB52773A94
                              SHA-512:C87DABB08D092D546FF80270B052CF1C5D92D25852DBFECC139CE528CCD2A22CCE130A8C90C08117DF542E6D83DE91E92180F853C201F042BED4681D4737E75D
                              Malicious:false
                              Preview:............................................w.........................................................................\.............................o.............q......................................]..........................I...............!...............................................m....... ............................................................................................h......K................=............................................................r..................................W....................................................................R......................................p..0...........................................................k.........k........................d........................................................................................................................9....................................#.....A........`...9...............P.......................................................................\...............
                              Process:C:\Users\user\Desktop\yuc1Jwlkh5.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):430713
                              Entropy (8bit):1.2530301266200883
                              Encrypted:false
                              SSDEEP:1536:vu65sFtuGbUq4CCWG9TcLs9xEEc0MVWFnhMA:2PjbUquWUYs/9x
                              MD5:8ED0D91C7C65B02A5630D1A012895C3D
                              SHA1:FA74C3BD3A32123D71AEA67D386B5AC251FEC260
                              SHA-256:1113E4990BEF55E4CD1D868513B2305C72803FB296D559BFA9C8C93DE2EDC8AB
                              SHA-512:FBE41906CCABB44E8D71D7664B756F75ABDBF0FB80BFCBBF4BBA9D9370DF4CEDBE437BA9F116B3F9E9D2AE2FB1E2D34D34F152E518A2E5E0096A506093F8DB24
                              Malicious:false
                              Preview:..[.Z.....?............#......................................................0.....B..x....................................................Q.......Z......................I....j............{..........................................................................................................................................-.....7..............................M........9.U...........?...............................................................X..................../.....................t...............4................,........`........~..............d............................u............{.....................a.............................5.............{...g....Z.................H................l..........................S.............................................................................................................................J...........................................U............................x.....f.............D..../....o........................QLi...
                              Process:C:\Users\user\Desktop\yuc1Jwlkh5.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):223405
                              Entropy (8bit):1.2642457624863013
                              Encrypted:false
                              SSDEEP:768:DDh04DrooyUGbNSipoS0yYEt0ihBLBJU06zf8VWZt+il3sVxTD6I6o9+2u5inuB4:rorpFGQVWwj9bQdun2ljrAbUGl
                              MD5:96E6C0CBBACF232110DF3E7FC4B4D980
                              SHA1:FC18FDD4E5417AC76F68BF507AC0BA6B9A183CFE
                              SHA-256:04F64748055424253509A229EE3E6F9BFC86898CBA667DA8312333552987B610
                              SHA-512:8DD22ABBED1522A08E9AC3559F5CC6871B77C1B76C2A7AA0CD61E52CA7D3A43DCBAF00285BF29C1FF885FC5F424FA411F56F19EB1886DA97CC7010BCA66530A9
                              Malicious:false
                              Preview:....................................{............!.............Q.............................................................................:...........z..................................W.......................... ......................................3...........y...............j................!n...............................................................................3........................+.......................a.......................c........................................)............................................................................................................................?.............................................................................................S....../.....................................................6./...t..+.......................H............{..........&................................b............................R.......x....=..................V....]........>...................................m................0.....
                              Process:C:\Users\user\Desktop\yuc1Jwlkh5.exe
                              File Type:DIY-Thermocam raw data (Lepton 2.x), scale 175-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 8.000000
                              Category:dropped
                              Size (bytes):385914
                              Entropy (8bit):1.2561626561864936
                              Encrypted:false
                              SSDEEP:768:++TtgE2yMxqLKoiyt4CpVdIwu3Uema6LhlEv9cCAXP69rBqGDpx/NEJKTPLqqQJl:bMFgNCAE6oLJS9a/IrOyTWq2uC
                              MD5:A4946227DE4DC2A79BF473A3D09C4247
                              SHA1:9FF800E6B4A72B6281D812710D00AD003F757170
                              SHA-256:1F6BB50C9AC95A61782FCDE006B6E396ACEDA7794FD30FFB7D97020FD7B8059E
                              SHA-512:2902630584092375E1A2FB4669437C43548BC0D0E00B2B98A3FDAEEDC57F3567B61A3FC545C8157FD410D6E26C9A70E8D989E97983700FFB55D9D1154CEBE1F4
                              Malicious:false
                              Preview:..................................................#..................................._............................{.........................P................$.............................................................................................}............&................g.........................................A................................................K................................................Z..............-......5.........................................................e.......d..........................................L...............0......C................).................................................................................r............Q..2........................9................(...............................................t......................................................................>.....b..8.....................n.............]..................F.....................................U...................................S.........
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                              Entropy (8bit):6.460432078632097
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:yuc1Jwlkh5.exe
                              File size:915'632 bytes
                              MD5:53441f2de2d573f3b2e4fb35c248229b
                              SHA1:afc840f25adfcb5873f5b69e55b2920c370a2285
                              SHA256:5bc4b28288f068f1c11e69b1cc94aacb4b0d2812494c1673471b890f1ce67a9e
                              SHA512:021ba2fc3570b82daf0181f229e5e0b80a10f6a74a3f77baa4d608961c38222b03d428f82b7d5abfca6fa55cbfebc7b5e715f33ecf8f67882186b6601bfcbda2
                              SSDEEP:12288:A3nIRS5/vuI8sOabBdHdWIXjwxipfpQGYAGau5yxX9O9u:A3IRgvuoO0pdZXjUiNuGYpawA9uu
                              TLSH:59156949A38C50C6DD3A3B32FA1D7613B655AC138550118A3AC8BE583BF57B07B9FA31
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L......`.................f....:....
                              Icon Hash:d3672eac1a0c662c
                              Entrypoint:0x4034a2
                              Entrypoint Section:.text
                              Digitally signed:true
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Time Stamp:0x60FC90D1 [Sat Jul 24 22:14:41 2021 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:6e7f9a29f2c85394521a08b9f31f6275
                              Signature Valid:false
                              Signature Issuer:CN=Underretternes, O=Underretternes, L=Lannemezan, C=FR
                              Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                              Error Number:-2146762487
                              Not Before, Not After
                              • 25/01/2024 09:16:23 24/01/2027 09:16:23
                              Subject Chain
                              • CN=Underretternes, O=Underretternes, L=Lannemezan, C=FR
                              Version:3
                              Thumbprint MD5:B7699D9FC11FF2BC8B537A1496DBA607
                              Thumbprint SHA-1:13E2B15CFFB46BFE6E63F1DDDD5D08B90EC97D8B
                              Thumbprint SHA-256:B488D28F491B0130739761D68A25298DFD95A7D90A466B370C1D833271156981
                              Serial:0C38DED2C7C23BE59C80206BBCC81E7BF88A1876
                              Instruction
                              sub esp, 000002D4h
                              push ebx
                              push esi
                              push edi
                              push 00000020h
                              pop edi
                              xor ebx, ebx
                              push 00008001h
                              mov dword ptr [esp+14h], ebx
                              mov dword ptr [esp+10h], 0040A2E0h
                              mov dword ptr [esp+1Ch], ebx
                              call dword ptr [004080CCh]
                              call dword ptr [004080D0h]
                              and eax, BFFFFFFFh
                              cmp ax, 00000006h
                              mov dword ptr [007A8A6Ch], eax
                              je 00007F97C48D0443h
                              push ebx
                              call 00007F97C48D3731h
                              cmp eax, ebx
                              je 00007F97C48D0439h
                              push 00000C00h
                              call eax
                              mov esi, 004082B0h
                              push esi
                              call 00007F97C48D36ABh
                              push esi
                              call dword ptr [00408154h]
                              lea esi, dword ptr [esi+eax+01h]
                              cmp byte ptr [esi], 00000000h
                              jne 00007F97C48D041Ch
                              push 0000000Bh
                              call 00007F97C48D3704h
                              push 00000009h
                              call 00007F97C48D36FDh
                              push 00000007h
                              mov dword ptr [007A8A64h], eax
                              call 00007F97C48D36F1h
                              cmp eax, ebx
                              je 00007F97C48D0441h
                              push 0000001Eh
                              call eax
                              test eax, eax
                              je 00007F97C48D0439h
                              or byte ptr [007A8A6Fh], 00000040h
                              push ebp
                              call dword ptr [00408038h]
                              push ebx
                              call dword ptr [00408298h]
                              mov dword ptr [007A8B38h], eax
                              push ebx
                              lea eax, dword ptr [esp+34h]
                              push 000002B4h
                              push eax
                              push ebx
                              push 0079FF08h
                              call dword ptr [0040818Ch]
                              push 0040A2C8h
                              Programming Language:
                              • [EXP] VC++ 6.0 SP5 build 8804
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x3de0000x56ef8.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0xdef900x920.data
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x656c0x660012117ad2476c7a7912407af0dcfcb8a7False0.6737515318627451data6.47208759712619IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x80000x13980x1400e3e8d62e1d2308b175349eb9daa266c8False0.4494140625data5.137750894959169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0xa0000x39eb780x6002020ca26e010546720fd467c5d087b57unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .ndata0x3a90000x350000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0x3de0000x56ef80x57000c1896e67b80e50079ebeadcac8c0d8c3False0.13646338451867815data2.5203155069997596IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_ICON0x3de2c80x42028Device independent bitmap graphic, 256 x 512 x 32, image size 0EnglishUnited States0.11415584223451786
                              RT_ICON0x4202f00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 0EnglishUnited States0.17530758310658937
                              RT_ICON0x430b180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.27551867219917014
                              RT_ICON0x4330c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.3295028142589118
                              RT_ICON0x4341680x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.47074468085106386
                              RT_DIALOG0x4345d00x100dataEnglishUnited States0.5234375
                              RT_DIALOG0x4346d00x11cdataEnglishUnited States0.6056338028169014
                              RT_DIALOG0x4347f00xc4dataEnglishUnited States0.5918367346938775
                              RT_DIALOG0x4348b80x60dataEnglishUnited States0.7291666666666666
                              RT_GROUP_ICON0x4349180x4cdataEnglishUnited States0.7894736842105263
                              RT_VERSION0x4349680x250dataEnglishUnited States0.5287162162162162
                              RT_MANIFEST0x434bb80x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                              DLLImport
                              ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                              SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                              ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                              COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                              USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, SetWindowPos, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                              GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                              KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersion, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, ExitProcess, CopyFileW, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              TimestampSource PortDest PortSource IPDest IP
                              Nov 19, 2024 11:43:01.248575926 CET4974480192.168.2.4173.249.193.48
                              Nov 19, 2024 11:43:02.402719975 CET4974480192.168.2.4173.249.193.48
                              Nov 19, 2024 11:43:04.418364048 CET4974480192.168.2.4173.249.193.48
                              Nov 19, 2024 11:43:15.264266014 CET4974780192.168.2.4173.249.193.48
                              Nov 19, 2024 11:43:16.277698040 CET4974780192.168.2.4173.249.193.48
                              Nov 19, 2024 11:43:18.277688980 CET4974780192.168.2.4173.249.193.48
                              Nov 19, 2024 11:43:29.296025991 CET4975380192.168.2.4173.249.193.48
                              Nov 19, 2024 11:43:30.312776089 CET4975380192.168.2.4173.249.193.48
                              Nov 19, 2024 11:43:32.324632883 CET4975380192.168.2.4173.249.193.48
                              Nov 19, 2024 11:43:43.316837072 CET4976080192.168.2.4173.249.193.48
                              Nov 19, 2024 11:43:44.324630976 CET4976080192.168.2.4173.249.193.48
                              Nov 19, 2024 11:43:46.340331078 CET4976080192.168.2.4173.249.193.48
                              Nov 19, 2024 11:43:57.341778040 CET4976280192.168.2.4173.249.193.48
                              Nov 19, 2024 11:43:58.355899096 CET4976280192.168.2.4173.249.193.48
                              Nov 19, 2024 11:44:00.371511936 CET4976280192.168.2.4173.249.193.48
                              Nov 19, 2024 11:44:11.372936010 CET4976380192.168.2.4173.249.193.48
                              Nov 19, 2024 11:44:12.398535013 CET4976380192.168.2.4173.249.193.48
                              Nov 19, 2024 11:44:14.402879953 CET4976380192.168.2.4173.249.193.48
                              Nov 19, 2024 11:44:25.418081999 CET4976980192.168.2.4173.249.193.48
                              Nov 19, 2024 11:44:26.418553114 CET4976980192.168.2.4173.249.193.48
                              Nov 19, 2024 11:44:28.434102058 CET4976980192.168.2.4173.249.193.48
                              Nov 19, 2024 11:44:39.420056105 CET4977180192.168.2.4173.249.193.48
                              Nov 19, 2024 11:44:40.434142113 CET4977180192.168.2.4173.249.193.48
                              Nov 19, 2024 11:44:42.434093952 CET4977180192.168.2.4173.249.193.48
                              Nov 19, 2024 11:44:53.435626984 CET4977380192.168.2.4173.249.193.48
                              Nov 19, 2024 11:44:54.450011969 CET4977380192.168.2.4173.249.193.48
                              Nov 19, 2024 11:44:56.465413094 CET4977380192.168.2.4173.249.193.48
                              Nov 19, 2024 11:45:07.468907118 CET4977680192.168.2.4173.249.193.48
                              Nov 19, 2024 11:45:08.481062889 CET4977680192.168.2.4173.249.193.48
                              Nov 19, 2024 11:45:10.481033087 CET4977680192.168.2.4173.249.193.48

                              Click to jump to process

                              Click to jump to process

                              Click to jump to process

                              Target ID:0
                              Start time:05:42:05
                              Start date:19/11/2024
                              Path:C:\Users\user\Desktop\yuc1Jwlkh5.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\yuc1Jwlkh5.exe"
                              Imagebase:0x400000
                              File size:915'632 bytes
                              MD5 hash:53441F2DE2D573F3B2E4FB35C248229B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2165427887.0000000005223000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low
                              Has exited:true

                              Target ID:4
                              Start time:05:42:53
                              Start date:19/11/2024
                              Path:C:\Users\user\Desktop\yuc1Jwlkh5.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\yuc1Jwlkh5.exe"
                              Imagebase:0x400000
                              File size:915'632 bytes
                              MD5 hash:53441F2DE2D573F3B2E4FB35C248229B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000004.00000002.3536543731.0000000002153000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low
                              Has exited:false

                              Reset < >

                                Execution Graph

                                Execution Coverage:28.3%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:18.5%
                                Total number of Nodes:704
                                Total number of Limit Nodes:16
                                execution_graph 2405 4034a2 SetErrorMode GetVersion 2406 4034e1 2405->2406 2407 4034e7 2405->2407 2408 4067e3 5 API calls 2406->2408 2495 406773 GetSystemDirectoryW 2407->2495 2408->2407 2410 4034fd lstrlenA 2410->2407 2411 40350d 2410->2411 2498 4067e3 GetModuleHandleA 2411->2498 2414 4067e3 5 API calls 2415 40351b 2414->2415 2416 4067e3 5 API calls 2415->2416 2417 403527 #17 OleInitialize SHGetFileInfoW 2416->2417 2504 4063ee lstrcpynW 2417->2504 2420 403573 GetCommandLineW 2505 4063ee lstrcpynW 2420->2505 2422 403585 2506 405cf0 2422->2506 2425 4036d4 GetTempPathW 2510 403471 2425->2510 2427 4036ec 2428 4036f0 GetWindowsDirectoryW lstrcatW 2427->2428 2429 403746 DeleteFileW 2427->2429 2430 403471 12 API calls 2428->2430 2520 403015 GetTickCount GetModuleFileNameW 2429->2520 2434 40370c 2430->2434 2431 405cf0 CharNextW 2433 4035c3 2431->2433 2433->2431 2439 4036bf 2433->2439 2441 4036bd 2433->2441 2434->2429 2436 403710 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 2434->2436 2435 40375a 2437 40380d 2435->2437 2442 4037fd 2435->2442 2447 405cf0 CharNextW 2435->2447 2440 403471 12 API calls 2436->2440 2654 4039e3 2437->2654 2637 4063ee lstrcpynW 2439->2637 2445 40373e 2440->2445 2441->2425 2548 403abd 2442->2548 2445->2429 2445->2437 2459 403779 2447->2459 2448 403947 2451 4039cb ExitProcess 2448->2451 2452 40394f GetCurrentProcess OpenProcessToken 2448->2452 2449 403827 2661 405a54 2449->2661 2457 403967 LookupPrivilegeValueW AdjustTokenPrivileges 2452->2457 2458 40399b 2452->2458 2454 4037d7 2638 405dcb 2454->2638 2455 40383d 2604 4059bf 2455->2604 2457->2458 2462 4067e3 5 API calls 2458->2462 2459->2454 2459->2455 2465 4039a2 2462->2465 2468 4039b7 ExitWindowsEx 2465->2468 2469 4039c4 2465->2469 2466 403853 lstrcatW 2467 40385e lstrcatW lstrcmpiW 2466->2467 2467->2437 2471 40387a 2467->2471 2468->2451 2468->2469 2669 40140b 2469->2669 2474 403886 2471->2474 2475 40387f 2471->2475 2473 4037f2 2653 4063ee lstrcpynW 2473->2653 2665 4059a2 CreateDirectoryW 2474->2665 2607 405925 CreateDirectoryW 2475->2607 2480 40388b SetCurrentDirectoryW 2481 4038a6 2480->2481 2482 40389b 2480->2482 2612 4063ee lstrcpynW 2481->2612 2668 4063ee lstrcpynW 2482->2668 2487 4038f2 CopyFileW 2492 4038b4 2487->2492 2488 40393b 2489 4061b4 36 API calls 2488->2489 2489->2437 2491 40642b 17 API calls 2491->2492 2492->2488 2492->2491 2494 403926 CloseHandle 2492->2494 2613 40642b 2492->2613 2630 4061b4 MoveFileExW 2492->2630 2634 4059d7 CreateProcessW 2492->2634 2494->2492 2497 406795 wsprintfW LoadLibraryExW 2495->2497 2497->2410 2499 406809 GetProcAddress 2498->2499 2500 4067ff 2498->2500 2502 403514 2499->2502 2501 406773 3 API calls 2500->2501 2503 406805 2501->2503 2502->2414 2503->2499 2503->2502 2504->2420 2505->2422 2507 405cf6 2506->2507 2508 4035aa CharNextW 2507->2508 2509 405cfd CharNextW 2507->2509 2508->2425 2508->2433 2509->2507 2672 40669d 2510->2672 2512 403487 2512->2427 2513 40347d 2513->2512 2681 405cc3 lstrlenW CharPrevW 2513->2681 2516 4059a2 2 API calls 2517 403495 2516->2517 2684 405f13 2517->2684 2688 405ee4 GetFileAttributesW CreateFileW 2520->2688 2522 403055 2547 403065 2522->2547 2689 4063ee lstrcpynW 2522->2689 2524 40307b 2690 405d0f lstrlenW 2524->2690 2528 40308c GetFileSize 2529 403186 2528->2529 2542 4030a3 2528->2542 2695 402fb1 2529->2695 2531 40318f 2533 4031bf GlobalAlloc 2531->2533 2531->2547 2730 40345a SetFilePointer 2531->2730 2706 40345a SetFilePointer 2533->2706 2535 4031f2 2537 402fb1 6 API calls 2535->2537 2537->2547 2538 4031a8 2541 403444 ReadFile 2538->2541 2539 4031da 2707 40324c 2539->2707 2543 4031b3 2541->2543 2542->2529 2542->2535 2544 402fb1 6 API calls 2542->2544 2542->2547 2727 403444 2542->2727 2543->2533 2543->2547 2544->2542 2545 4031e6 2545->2545 2546 403223 SetFilePointer 2545->2546 2545->2547 2546->2547 2547->2435 2549 4067e3 5 API calls 2548->2549 2550 403ad1 2549->2550 2551 403ad7 2550->2551 2552 403ae9 2550->2552 2766 406335 wsprintfW 2551->2766 2767 4062bc 2552->2767 2556 403b38 lstrcatW 2557 403ae7 2556->2557 2751 403d93 2557->2751 2558 4062bc 3 API calls 2558->2556 2561 405dcb 18 API calls 2563 403b6a 2561->2563 2562 403bfe 2564 405dcb 18 API calls 2562->2564 2563->2562 2565 4062bc 3 API calls 2563->2565 2566 403c04 2564->2566 2567 403b9c 2565->2567 2568 403c14 LoadImageW 2566->2568 2569 40642b 17 API calls 2566->2569 2567->2562 2572 403bbd lstrlenW 2567->2572 2575 405cf0 CharNextW 2567->2575 2570 403cba 2568->2570 2571 403c3b RegisterClassW 2568->2571 2569->2568 2574 40140b 2 API calls 2570->2574 2573 403c71 SystemParametersInfoW CreateWindowExW 2571->2573 2603 403cc4 2571->2603 2576 403bf1 2572->2576 2577 403bcb lstrcmpiW 2572->2577 2573->2570 2578 403cc0 2574->2578 2580 403bba 2575->2580 2579 405cc3 3 API calls 2576->2579 2577->2576 2581 403bdb GetFileAttributesW 2577->2581 2582 403d93 18 API calls 2578->2582 2578->2603 2583 403bf7 2579->2583 2580->2572 2584 403be7 2581->2584 2585 403cd1 2582->2585 2772 4063ee lstrcpynW 2583->2772 2584->2576 2587 405d0f 2 API calls 2584->2587 2588 403d60 2585->2588 2589 403cdd ShowWindow 2585->2589 2587->2576 2759 405529 OleInitialize 2588->2759 2591 406773 3 API calls 2589->2591 2593 403cf5 2591->2593 2592 403d66 2594 403d82 2592->2594 2595 403d6a 2592->2595 2596 403d03 GetClassInfoW 2593->2596 2598 406773 3 API calls 2593->2598 2597 40140b 2 API calls 2594->2597 2601 40140b 2 API calls 2595->2601 2595->2603 2599 403d17 GetClassInfoW RegisterClassW 2596->2599 2600 403d2d DialogBoxParamW 2596->2600 2597->2603 2598->2596 2599->2600 2602 40140b 2 API calls 2600->2602 2601->2603 2602->2603 2603->2437 2605 4067e3 5 API calls 2604->2605 2606 403842 lstrcatW 2605->2606 2606->2466 2606->2467 2608 403884 2607->2608 2609 405976 GetLastError 2607->2609 2608->2480 2609->2608 2610 405985 SetFileSecurityW 2609->2610 2610->2608 2611 40599b GetLastError 2610->2611 2611->2608 2612->2492 2624 406438 2613->2624 2614 406683 2615 4038e5 DeleteFileW 2614->2615 2790 4063ee lstrcpynW 2614->2790 2615->2487 2615->2492 2617 406651 lstrlenW 2617->2624 2619 40642b 10 API calls 2619->2617 2621 4062bc 3 API calls 2621->2624 2622 406566 GetSystemDirectoryW 2622->2624 2623 406579 GetWindowsDirectoryW 2623->2624 2624->2614 2624->2617 2624->2619 2624->2621 2624->2622 2624->2623 2625 40669d 5 API calls 2624->2625 2626 40642b 10 API calls 2624->2626 2627 4065f4 lstrcatW 2624->2627 2628 4065ad SHGetSpecialFolderLocation 2624->2628 2788 406335 wsprintfW 2624->2788 2789 4063ee lstrcpynW 2624->2789 2625->2624 2626->2624 2627->2624 2628->2624 2629 4065c5 SHGetPathFromIDListW CoTaskMemFree 2628->2629 2629->2624 2631 4061c8 2630->2631 2633 4061d5 2630->2633 2791 40603a 2631->2791 2633->2492 2635 405a16 2634->2635 2636 405a0a CloseHandle 2634->2636 2635->2492 2636->2635 2637->2441 2825 4063ee lstrcpynW 2638->2825 2640 405ddc 2826 405d6e CharNextW CharNextW 2640->2826 2643 4037e3 2643->2437 2652 4063ee lstrcpynW 2643->2652 2644 40669d 5 API calls 2650 405df2 2644->2650 2645 405e23 lstrlenW 2646 405e2e 2645->2646 2645->2650 2647 405cc3 3 API calls 2646->2647 2649 405e33 GetFileAttributesW 2647->2649 2649->2643 2650->2643 2650->2645 2651 405d0f 2 API calls 2650->2651 2832 40674c FindFirstFileW 2650->2832 2651->2645 2652->2473 2653->2442 2655 4039fb 2654->2655 2656 4039ed CloseHandle 2654->2656 2835 403a28 2655->2835 2656->2655 2662 405a69 2661->2662 2663 405a7d MessageBoxIndirectW 2662->2663 2664 403835 ExitProcess 2662->2664 2663->2664 2666 4059b2 2665->2666 2667 4059b6 GetLastError 2665->2667 2666->2480 2667->2666 2668->2481 2670 401389 2 API calls 2669->2670 2671 401420 2670->2671 2671->2451 2678 4066aa 2672->2678 2673 406720 2674 406725 CharPrevW 2673->2674 2676 406746 2673->2676 2674->2673 2675 406713 CharNextW 2675->2673 2675->2678 2676->2513 2677 405cf0 CharNextW 2677->2678 2678->2673 2678->2675 2678->2677 2679 4066ff CharNextW 2678->2679 2680 40670e CharNextW 2678->2680 2679->2678 2680->2675 2682 40348f 2681->2682 2683 405cdf lstrcatW 2681->2683 2682->2516 2683->2682 2685 405f20 GetTickCount GetTempFileNameW 2684->2685 2686 405f56 2685->2686 2687 4034a0 2685->2687 2686->2685 2686->2687 2687->2427 2688->2522 2689->2524 2691 405d1d 2690->2691 2692 405d23 CharPrevW 2691->2692 2693 403081 2691->2693 2692->2691 2692->2693 2694 4063ee lstrcpynW 2693->2694 2694->2528 2696 402fd2 2695->2696 2697 402fba 2695->2697 2700 402fe2 GetTickCount 2696->2700 2701 402fda 2696->2701 2698 402fc3 DestroyWindow 2697->2698 2699 402fca 2697->2699 2698->2699 2699->2531 2703 402ff0 CreateDialogParamW ShowWindow 2700->2703 2704 403013 2700->2704 2731 40681f 2701->2731 2703->2704 2704->2531 2706->2539 2709 403265 2707->2709 2708 403293 2711 403444 ReadFile 2708->2711 2709->2708 2748 40345a SetFilePointer 2709->2748 2712 40329e 2711->2712 2713 4032b0 GetTickCount 2712->2713 2714 4033dd 2712->2714 2715 4033c7 2712->2715 2713->2715 2723 4032dc 2713->2723 2716 40341f 2714->2716 2719 4033e1 2714->2719 2715->2545 2718 403444 ReadFile 2716->2718 2717 403444 ReadFile 2717->2723 2718->2715 2719->2715 2720 403444 ReadFile 2719->2720 2721 405f96 WriteFile 2719->2721 2720->2719 2721->2719 2722 403332 GetTickCount 2722->2723 2723->2715 2723->2717 2723->2722 2724 403357 MulDiv wsprintfW 2723->2724 2746 405f96 WriteFile 2723->2746 2735 405456 2724->2735 2749 405f67 ReadFile 2727->2749 2730->2538 2732 40683c PeekMessageW 2731->2732 2733 406832 DispatchMessageW 2732->2733 2734 402fe0 2732->2734 2733->2732 2734->2531 2736 405471 2735->2736 2745 405513 2735->2745 2737 40548d lstrlenW 2736->2737 2738 40642b 17 API calls 2736->2738 2739 4054b6 2737->2739 2740 40549b lstrlenW 2737->2740 2738->2737 2742 4054c9 2739->2742 2743 4054bc SetWindowTextW 2739->2743 2741 4054ad lstrcatW 2740->2741 2740->2745 2741->2739 2744 4054cf SendMessageW SendMessageW SendMessageW 2742->2744 2742->2745 2743->2742 2744->2745 2745->2723 2747 405fb4 2746->2747 2747->2723 2748->2708 2750 403457 2749->2750 2750->2542 2752 403da7 2751->2752 2773 406335 wsprintfW 2752->2773 2754 403e18 2774 403e4c 2754->2774 2756 403b48 2756->2561 2757 403e1d 2757->2756 2758 40642b 17 API calls 2757->2758 2758->2757 2777 404390 2759->2777 2761 405573 2763 404390 SendMessageW 2761->2763 2762 40554c 2762->2761 2780 401389 2762->2780 2764 405585 OleUninitialize 2763->2764 2764->2592 2766->2557 2784 40625b 2767->2784 2770 4062f0 RegQueryValueExW RegCloseKey 2771 403b19 2770->2771 2771->2556 2771->2558 2772->2562 2773->2754 2775 40642b 17 API calls 2774->2775 2776 403e5a SetWindowTextW 2775->2776 2776->2757 2778 4043a8 2777->2778 2779 404399 SendMessageW 2777->2779 2778->2762 2779->2778 2782 401390 2780->2782 2781 4013fe 2781->2762 2782->2781 2783 4013cb MulDiv SendMessageW 2782->2783 2783->2782 2785 40626a 2784->2785 2786 406273 RegOpenKeyExW 2785->2786 2787 40626e 2785->2787 2786->2787 2787->2770 2787->2771 2788->2624 2789->2624 2790->2615 2792 406090 GetShortPathNameW 2791->2792 2793 40606a 2791->2793 2795 4060a5 2792->2795 2796 4061af 2792->2796 2818 405ee4 GetFileAttributesW CreateFileW 2793->2818 2795->2796 2798 4060ad wsprintfA 2795->2798 2796->2633 2797 406074 CloseHandle GetShortPathNameW 2797->2796 2799 406088 2797->2799 2800 40642b 17 API calls 2798->2800 2799->2792 2799->2796 2801 4060d5 2800->2801 2819 405ee4 GetFileAttributesW CreateFileW 2801->2819 2803 4060e2 2803->2796 2804 4060f1 GetFileSize GlobalAlloc 2803->2804 2805 406113 2804->2805 2806 4061a8 CloseHandle 2804->2806 2807 405f67 ReadFile 2805->2807 2806->2796 2808 40611b 2807->2808 2808->2806 2820 405e49 lstrlenA 2808->2820 2811 406132 lstrcpyA 2814 406154 2811->2814 2812 406146 2813 405e49 4 API calls 2812->2813 2813->2814 2815 40618b SetFilePointer 2814->2815 2816 405f96 WriteFile 2815->2816 2817 4061a1 GlobalFree 2816->2817 2817->2806 2818->2797 2819->2803 2821 405e8a lstrlenA 2820->2821 2822 405e92 2821->2822 2823 405e63 lstrcmpiA 2821->2823 2822->2811 2822->2812 2823->2822 2824 405e81 CharNextA 2823->2824 2824->2821 2825->2640 2827 405d8b 2826->2827 2828 405d9d 2826->2828 2827->2828 2829 405d98 CharNextW 2827->2829 2830 405cf0 CharNextW 2828->2830 2831 405dc1 2828->2831 2829->2831 2830->2828 2831->2643 2831->2644 2833 406762 FindClose 2832->2833 2834 40676d 2832->2834 2833->2834 2834->2650 2836 403a36 2835->2836 2837 403a00 2836->2837 2838 403a3b FreeLibrary GlobalFree 2836->2838 2839 405b00 2837->2839 2838->2837 2838->2838 2840 405dcb 18 API calls 2839->2840 2841 405b20 2840->2841 2842 405b28 DeleteFileW 2841->2842 2843 405b3f 2841->2843 2844 403816 OleUninitialize 2842->2844 2845 405c5f 2843->2845 2878 4063ee lstrcpynW 2843->2878 2844->2448 2844->2449 2845->2844 2850 40674c 2 API calls 2845->2850 2847 405b65 2848 405b78 2847->2848 2849 405b6b lstrcatW 2847->2849 2852 405d0f 2 API calls 2848->2852 2851 405b7e 2849->2851 2854 405c84 2850->2854 2853 405b8e lstrcatW 2851->2853 2855 405b99 lstrlenW FindFirstFileW 2851->2855 2852->2851 2853->2855 2854->2844 2856 405c88 2854->2856 2855->2845 2863 405bbb 2855->2863 2857 405cc3 3 API calls 2856->2857 2858 405c8e 2857->2858 2860 405ab8 5 API calls 2858->2860 2859 405c42 FindNextFileW 2859->2863 2864 405c58 FindClose 2859->2864 2862 405c9a 2860->2862 2865 405cb4 2862->2865 2866 405c9e 2862->2866 2863->2859 2867 405c0c 2863->2867 2871 405b00 60 API calls 2863->2871 2879 4063ee lstrcpynW 2863->2879 2864->2845 2868 405456 24 API calls 2865->2868 2866->2844 2870 405456 24 API calls 2866->2870 2867->2859 2873 405456 24 API calls 2867->2873 2875 405456 24 API calls 2867->2875 2877 4061b4 36 API calls 2867->2877 2880 405ab8 2867->2880 2868->2844 2872 405cab 2870->2872 2871->2867 2874 4061b4 36 API calls 2872->2874 2873->2859 2876 405cb2 2874->2876 2875->2867 2876->2844 2877->2867 2878->2847 2879->2863 2888 405ebf GetFileAttributesW 2880->2888 2883 405ae5 2883->2867 2884 405ad3 RemoveDirectoryW 2886 405ae1 2884->2886 2885 405adb DeleteFileW 2885->2886 2886->2883 2887 405af1 SetFileAttributesW 2886->2887 2887->2883 2889 405ed1 SetFileAttributesW 2888->2889 2890 405ac4 2888->2890 2889->2890 2890->2883 2890->2884 2890->2885 3012 6ce72ca3 3013 6ce72cbb 3012->3013 3014 6ce7158f 2 API calls 3013->3014 3015 6ce72cd6 3014->3015 3016 6ce710e1 3025 6ce71111 3016->3025 3017 6ce711d8 GlobalFree 3018 6ce712ba 2 API calls 3018->3025 3019 6ce711d3 3019->3017 3020 6ce71164 GlobalAlloc 3020->3025 3021 6ce711f8 GlobalFree 3021->3025 3022 6ce71272 2 API calls 3024 6ce711c4 GlobalFree 3022->3024 3023 6ce712e1 lstrcpyW 3023->3025 3024->3025 3025->3017 3025->3018 3025->3019 3025->3020 3025->3021 3025->3022 3025->3023 3025->3024 3026 6ce71000 3029 6ce7101b 3026->3029 3036 6ce71516 3029->3036 3031 6ce71020 3032 6ce71027 GlobalAlloc 3031->3032 3033 6ce71024 3031->3033 3032->3033 3034 6ce7153d 3 API calls 3033->3034 3035 6ce71019 3034->3035 3037 6ce7151c 3036->3037 3038 6ce71522 3037->3038 3039 6ce7152e GlobalFree 3037->3039 3038->3031 3039->3031 3040 6ce7166d 3041 6ce71516 GlobalFree 3040->3041 3044 6ce71685 3041->3044 3042 6ce716cb GlobalFree 3043 6ce716a0 3043->3042 3044->3042 3044->3043 3045 6ce716b7 VirtualFree 3044->3045 3045->3042 2894 403e6b 2895 403e83 2894->2895 2896 403fbe 2894->2896 2895->2896 2897 403e8f 2895->2897 2898 40400f 2896->2898 2899 403fcf GetDlgItem GetDlgItem 2896->2899 2901 403e9a SetWindowPos 2897->2901 2902 403ead 2897->2902 2900 404069 2898->2900 2908 401389 2 API calls 2898->2908 2903 404344 18 API calls 2899->2903 2904 404390 SendMessageW 2900->2904 2927 403fb9 2900->2927 2901->2902 2905 403eb2 ShowWindow 2902->2905 2906 403eca 2902->2906 2907 403ff9 SetClassLongW 2903->2907 2924 40407b 2904->2924 2905->2906 2909 403ed2 DestroyWindow 2906->2909 2910 403eec 2906->2910 2911 40140b 2 API calls 2907->2911 2914 404041 2908->2914 2964 4042cd 2909->2964 2912 403ef1 SetWindowLongW 2910->2912 2913 403f02 2910->2913 2911->2898 2912->2927 2915 403fab 2913->2915 2916 403f0e GetDlgItem 2913->2916 2914->2900 2917 404045 SendMessageW 2914->2917 2974 4043ab 2915->2974 2920 403f21 SendMessageW IsWindowEnabled 2916->2920 2921 403f3e 2916->2921 2917->2927 2918 40140b 2 API calls 2918->2924 2919 4042cf DestroyWindow EndDialog 2919->2964 2920->2921 2920->2927 2926 403f43 2921->2926 2928 403f4b 2921->2928 2930 403f92 SendMessageW 2921->2930 2931 403f5e 2921->2931 2923 4042fe ShowWindow 2923->2927 2924->2918 2924->2919 2925 40642b 17 API calls 2924->2925 2924->2927 2935 404344 18 API calls 2924->2935 2955 40420f DestroyWindow 2924->2955 2965 404344 2924->2965 2925->2924 2971 40431d 2926->2971 2928->2926 2928->2930 2930->2915 2933 403f66 2931->2933 2934 403f7b 2931->2934 2932 403f79 2932->2915 2937 40140b 2 API calls 2933->2937 2936 40140b 2 API calls 2934->2936 2935->2924 2938 403f82 2936->2938 2937->2926 2938->2915 2938->2926 2940 4040f6 GetDlgItem 2941 404113 ShowWindow KiUserCallbackDispatcher 2940->2941 2942 40410b 2940->2942 2968 404366 KiUserCallbackDispatcher 2941->2968 2942->2941 2944 40413d EnableWindow 2949 404151 2944->2949 2945 404156 GetSystemMenu EnableMenuItem SendMessageW 2946 404186 SendMessageW 2945->2946 2945->2949 2946->2949 2948 403e4c 18 API calls 2948->2949 2949->2945 2949->2948 2969 404379 SendMessageW 2949->2969 2970 4063ee lstrcpynW 2949->2970 2951 4041b5 lstrlenW 2952 40642b 17 API calls 2951->2952 2953 4041cb SetWindowTextW 2952->2953 2954 401389 2 API calls 2953->2954 2954->2924 2956 404229 CreateDialogParamW 2955->2956 2955->2964 2957 40425c 2956->2957 2956->2964 2958 404344 18 API calls 2957->2958 2959 404267 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 2958->2959 2960 401389 2 API calls 2959->2960 2961 4042ad 2960->2961 2961->2927 2962 4042b5 ShowWindow 2961->2962 2963 404390 SendMessageW 2962->2963 2963->2964 2964->2923 2964->2927 2966 40642b 17 API calls 2965->2966 2967 40434f SetDlgItemTextW 2966->2967 2967->2940 2968->2944 2969->2949 2970->2951 2972 404324 2971->2972 2973 40432a SendMessageW 2971->2973 2972->2973 2973->2932 2975 40446e 2974->2975 2976 4043c3 GetWindowLongW 2974->2976 2975->2927 2976->2975 2977 4043d8 2976->2977 2977->2975 2978 404405 GetSysColor 2977->2978 2979 404408 2977->2979 2978->2979 2980 404418 SetBkMode 2979->2980 2981 40440e SetTextColor 2979->2981 2982 404430 GetSysColor 2980->2982 2983 404436 2980->2983 2981->2980 2982->2983 2984 404447 2983->2984 2985 40443d SetBkColor 2983->2985 2984->2975 2986 404461 CreateBrushIndirect 2984->2986 2987 40445a DeleteObject 2984->2987 2985->2984 2986->2975 2987->2986 3049 402f2b 3050 402f56 3049->3050 3051 402f3d SetTimer 3049->3051 3052 402fab 3050->3052 3053 402f70 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 3050->3053 3051->3050 3053->3052 3054 6ce72349 3055 6ce723b3 3054->3055 3056 6ce723be GlobalAlloc 3055->3056 3057 6ce723dd 3055->3057 3056->3055 2240 6ce71777 2241 6ce717aa 2240->2241 2282 6ce71b5f 2241->2282 2243 6ce717b1 2244 6ce718d6 2243->2244 2245 6ce717c2 2243->2245 2246 6ce717c9 2243->2246 2332 6ce7239e 2245->2332 2316 6ce723e0 2246->2316 2251 6ce7180f 2345 6ce725b5 2251->2345 2252 6ce7182d 2257 6ce71833 2252->2257 2258 6ce7187e 2252->2258 2253 6ce717df 2256 6ce717e5 2253->2256 2262 6ce717f0 2253->2262 2254 6ce717f8 2267 6ce717ee 2254->2267 2342 6ce72d83 2254->2342 2256->2267 2326 6ce72af8 2256->2326 2364 6ce715c6 2257->2364 2260 6ce725b5 10 API calls 2258->2260 2265 6ce7186f 2260->2265 2261 6ce71815 2356 6ce715b4 2261->2356 2336 6ce72770 2262->2336 2273 6ce718c5 2265->2273 2370 6ce72578 2265->2370 2267->2251 2267->2252 2270 6ce725b5 10 API calls 2270->2265 2272 6ce717f6 2272->2267 2273->2244 2275 6ce718cf GlobalFree 2273->2275 2275->2244 2279 6ce718b1 2279->2273 2374 6ce7153d wsprintfW 2279->2374 2280 6ce718aa FreeLibrary 2280->2279 2377 6ce7121b GlobalAlloc 2282->2377 2284 6ce71b86 2378 6ce7121b GlobalAlloc 2284->2378 2286 6ce71dcb GlobalFree GlobalFree GlobalFree 2287 6ce71de8 2286->2287 2303 6ce71e32 2286->2303 2289 6ce721de 2287->2289 2297 6ce71dfd 2287->2297 2287->2303 2288 6ce71c86 GlobalAlloc 2306 6ce71b91 2288->2306 2290 6ce72200 GetModuleHandleW 2289->2290 2289->2303 2291 6ce72226 2290->2291 2292 6ce72211 LoadLibraryW 2290->2292 2385 6ce7161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 2291->2385 2292->2291 2292->2303 2293 6ce71cd1 lstrcpyW 2296 6ce71cdb lstrcpyW 2293->2296 2294 6ce71cef GlobalFree 2294->2306 2296->2306 2297->2303 2381 6ce7122c 2297->2381 2298 6ce72278 2302 6ce72285 lstrlenW 2298->2302 2298->2303 2299 6ce72086 2384 6ce7121b GlobalAlloc 2299->2384 2386 6ce7161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 2302->2386 2303->2243 2304 6ce72238 2304->2298 2314 6ce72262 GetProcAddress 2304->2314 2306->2286 2306->2288 2306->2293 2306->2294 2306->2296 2306->2299 2306->2303 2307 6ce71fc7 GlobalFree 2306->2307 2308 6ce7210e 2306->2308 2309 6ce71d2d 2306->2309 2311 6ce7122c 2 API calls 2306->2311 2307->2306 2308->2303 2313 6ce72176 lstrcpyW 2308->2313 2309->2306 2379 6ce7158f GlobalSize GlobalAlloc 2309->2379 2310 6ce7229f 2310->2303 2311->2306 2313->2303 2314->2298 2315 6ce7208f 2315->2243 2322 6ce723f8 2316->2322 2318 6ce72521 GlobalFree 2321 6ce717cf 2318->2321 2318->2322 2319 6ce724a0 GlobalAlloc WideCharToMultiByte 2319->2318 2320 6ce724cb GlobalAlloc CLSIDFromString 2320->2318 2321->2253 2321->2254 2321->2267 2322->2318 2322->2319 2322->2320 2323 6ce7122c GlobalAlloc lstrcpynW 2322->2323 2325 6ce724ea 2322->2325 2388 6ce712ba 2322->2388 2323->2322 2325->2318 2392 6ce72704 2325->2392 2328 6ce72b0a 2326->2328 2327 6ce72baf VirtualAlloc 2331 6ce72bcd 2327->2331 2328->2327 2330 6ce72c99 2330->2267 2395 6ce72aa2 2331->2395 2333 6ce723b3 2332->2333 2334 6ce723be GlobalAlloc 2333->2334 2335 6ce717c8 2333->2335 2334->2333 2335->2246 2340 6ce727a0 2336->2340 2337 6ce7284e 2339 6ce72854 GlobalSize 2337->2339 2341 6ce7285e 2337->2341 2338 6ce7283b GlobalAlloc 2338->2341 2339->2341 2340->2337 2340->2338 2341->2272 2343 6ce72d8e 2342->2343 2344 6ce72dce GlobalFree 2343->2344 2399 6ce7121b GlobalAlloc 2345->2399 2347 6ce7266b lstrcpynW 2352 6ce725bf 2347->2352 2348 6ce7265a StringFromGUID2 2348->2352 2349 6ce72638 MultiByteToWideChar 2349->2352 2350 6ce7267e wsprintfW 2350->2352 2351 6ce726a2 GlobalFree 2351->2352 2352->2347 2352->2348 2352->2349 2352->2350 2352->2351 2353 6ce726d7 GlobalFree 2352->2353 2354 6ce71272 2 API calls 2352->2354 2400 6ce712e1 2352->2400 2353->2261 2354->2352 2404 6ce7121b GlobalAlloc 2356->2404 2358 6ce715b9 2359 6ce715c6 2 API calls 2358->2359 2360 6ce715c3 2359->2360 2361 6ce71272 2360->2361 2362 6ce712b5 GlobalFree 2361->2362 2363 6ce7127b GlobalAlloc lstrcpynW 2361->2363 2362->2265 2363->2362 2365 6ce715d2 wsprintfW 2364->2365 2366 6ce715ff lstrcpyW 2364->2366 2369 6ce71618 2365->2369 2366->2369 2369->2270 2371 6ce72586 2370->2371 2372 6ce71891 2370->2372 2371->2372 2373 6ce725a2 GlobalFree 2371->2373 2372->2279 2372->2280 2373->2371 2375 6ce71272 2 API calls 2374->2375 2376 6ce7155e 2375->2376 2376->2273 2377->2284 2378->2306 2380 6ce715ad 2379->2380 2380->2309 2387 6ce7121b GlobalAlloc 2381->2387 2383 6ce7123b lstrcpynW 2383->2303 2384->2315 2385->2304 2386->2310 2387->2383 2389 6ce712c1 2388->2389 2390 6ce7122c 2 API calls 2389->2390 2391 6ce712df 2390->2391 2391->2322 2393 6ce72712 VirtualAlloc 2392->2393 2394 6ce72768 2392->2394 2393->2394 2394->2325 2396 6ce72aad 2395->2396 2397 6ce72ab2 GetLastError 2396->2397 2398 6ce72abd 2396->2398 2397->2398 2398->2330 2399->2352 2401 6ce7130c 2400->2401 2402 6ce712ea 2400->2402 2401->2352 2402->2401 2403 6ce712f0 lstrcpyW 2402->2403 2403->2401 2404->2358 2988 6ce716d4 2989 6ce71703 2988->2989 2990 6ce71b5f 22 API calls 2989->2990 2991 6ce7170a 2990->2991 2992 6ce71711 2991->2992 2993 6ce7171d 2991->2993 2994 6ce71272 2 API calls 2992->2994 2995 6ce71727 2993->2995 2996 6ce71744 2993->2996 3004 6ce7171b 2994->3004 2999 6ce7153d 3 API calls 2995->2999 2997 6ce7176e 2996->2997 2998 6ce7174a 2996->2998 3001 6ce7153d 3 API calls 2997->3001 3000 6ce715b4 3 API calls 2998->3000 3002 6ce7172c 2999->3002 3003 6ce7174f 3000->3003 3001->3004 3005 6ce715b4 3 API calls 3002->3005 3006 6ce71272 2 API calls 3003->3006 3007 6ce71732 3005->3007 3008 6ce71755 GlobalFree 3006->3008 3009 6ce71272 2 API calls 3007->3009 3008->3004 3010 6ce71769 GlobalFree 3008->3010 3011 6ce71738 GlobalFree 3009->3011 3010->3004 3011->3004 2891 6ce729df 2892 6ce72a2f 2891->2892 2893 6ce729ef VirtualProtect 2891->2893 2893->2892 3046 6ce7103d 3047 6ce7101b 5 API calls 3046->3047 3048 6ce71056 3047->3048 3058 6ce718d9 3059 6ce718fc 3058->3059 3060 6ce71931 GlobalFree 3059->3060 3061 6ce71943 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 3059->3061 3060->3061 3062 6ce71272 2 API calls 3061->3062 3063 6ce71ace GlobalFree GlobalFree 3062->3063 3064 6ce71058 3066 6ce71074 3064->3066 3065 6ce710dd 3066->3065 3067 6ce71092 3066->3067 3068 6ce71516 GlobalFree 3066->3068 3069 6ce71516 GlobalFree 3067->3069 3068->3067 3070 6ce710a2 3069->3070 3071 6ce710b2 3070->3071 3072 6ce710a9 GlobalSize 3070->3072 3073 6ce710b6 GlobalAlloc 3071->3073 3074 6ce710c7 3071->3074 3072->3071 3075 6ce7153d 3 API calls 3073->3075 3076 6ce710d2 GlobalFree 3074->3076 3075->3074 3076->3065

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 0 4034a2-4034df SetErrorMode GetVersion 1 4034e1-4034e9 call 4067e3 0->1 2 4034f2 0->2 1->2 8 4034eb 1->8 3 4034f7-40350b call 406773 lstrlenA 2->3 9 40350d-403529 call 4067e3 * 3 3->9 8->2 16 40353a-403599 #17 OleInitialize SHGetFileInfoW call 4063ee GetCommandLineW call 4063ee 9->16 17 40352b-403531 9->17 24 4035a3-4035bd call 405cf0 CharNextW 16->24 25 40359b-4035a2 16->25 17->16 22 403533 17->22 22->16 28 4035c3-4035c9 24->28 29 4036d4-4036ee GetTempPathW call 403471 24->29 25->24 31 4035d2-4035d6 28->31 32 4035cb-4035d0 28->32 36 4036f0-40370e GetWindowsDirectoryW lstrcatW call 403471 29->36 37 403746-403760 DeleteFileW call 403015 29->37 34 4035d8-4035dc 31->34 35 4035dd-4035e1 31->35 32->31 32->32 34->35 38 4036a0-4036ad call 405cf0 35->38 39 4035e7-4035ed 35->39 36->37 54 403710-403740 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403471 36->54 57 403811-403821 call 4039e3 OleUninitialize 37->57 58 403766-40376c 37->58 55 4036b1-4036b7 38->55 56 4036af-4036b0 38->56 43 403608-403641 39->43 44 4035ef-4035f7 39->44 45 403643-403648 43->45 46 40365e-403698 43->46 50 4035f9-4035fc 44->50 51 4035fe 44->51 45->46 52 40364a-403652 45->52 46->38 53 40369a-40369e 46->53 50->43 50->51 51->43 60 403654-403657 52->60 61 403659 52->61 53->38 62 4036bf-4036cd call 4063ee 53->62 54->37 54->57 55->28 64 4036bd 55->64 56->55 75 403947-40394d 57->75 76 403827-403837 call 405a54 ExitProcess 57->76 65 403801-403808 call 403abd 58->65 66 403772-40377d call 405cf0 58->66 60->46 60->61 61->46 70 4036d2 62->70 64->70 74 40380d 65->74 77 4037cb-4037d5 66->77 78 40377f-4037b4 66->78 70->29 74->57 80 4039cb-4039d3 75->80 81 40394f-403965 GetCurrentProcess OpenProcessToken 75->81 85 4037d7-4037e5 call 405dcb 77->85 86 40383d-403851 call 4059bf lstrcatW 77->86 82 4037b6-4037ba 78->82 83 4039d5 80->83 84 4039d9-4039dd ExitProcess 80->84 88 403967-403995 LookupPrivilegeValueW AdjustTokenPrivileges 81->88 89 40399b-4039a9 call 4067e3 81->89 90 4037c3-4037c7 82->90 91 4037bc-4037c1 82->91 83->84 85->57 99 4037e7-4037fd call 4063ee * 2 85->99 100 403853-403859 lstrcatW 86->100 101 40385e-403878 lstrcatW lstrcmpiW 86->101 88->89 102 4039b7-4039c2 ExitWindowsEx 89->102 103 4039ab-4039b5 89->103 90->82 95 4037c9 90->95 91->90 91->95 95->77 99->65 100->101 101->57 106 40387a-40387d 101->106 102->80 104 4039c4-4039c6 call 40140b 102->104 103->102 103->104 104->80 110 403886 call 4059a2 106->110 111 40387f call 405925 106->111 116 40388b-403899 SetCurrentDirectoryW 110->116 115 403884 111->115 115->116 118 4038a6-4038cf call 4063ee 116->118 119 40389b-4038a1 call 4063ee 116->119 123 4038d4-4038f0 call 40642b DeleteFileW 118->123 119->118 126 403931-403939 123->126 127 4038f2-403902 CopyFileW 123->127 126->123 128 40393b-403942 call 4061b4 126->128 127->126 129 403904-40391d call 4061b4 call 40642b call 4059d7 127->129 128->57 137 403922-403924 129->137 137->126 138 403926-40392d CloseHandle 137->138 138->126
                                APIs
                                • SetErrorMode.KERNELBASE ref: 004034C5
                                • GetVersion.KERNEL32 ref: 004034CB
                                • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004034FE
                                • #17.COMCTL32(?,00000007,00000009,0000000B), ref: 0040353B
                                • OleInitialize.OLE32(00000000), ref: 00403542
                                • SHGetFileInfoW.SHELL32(0079FF08,00000000,?,000002B4,00000000), ref: 0040355E
                                • GetCommandLineW.KERNEL32(007A7A60,NSIS Error,?,00000007,00000009,0000000B), ref: 00403573
                                • CharNextW.USER32(00000000,"C:\Users\user\Desktop\yuc1Jwlkh5.exe",00000020,"C:\Users\user\Desktop\yuc1Jwlkh5.exe",00000000,?,00000007,00000009,0000000B), ref: 004035AB
                                  • Part of subcall function 004067E3: GetModuleHandleA.KERNEL32(?,00000020,?,00403514,0000000B), ref: 004067F5
                                  • Part of subcall function 004067E3: GetProcAddress.KERNEL32(00000000,?), ref: 00406810
                                • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 004036E5
                                • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000007,00000009,0000000B), ref: 004036F6
                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 00403702
                                • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 00403716
                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040371E
                                • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040372F
                                • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 00403737
                                • DeleteFileW.KERNELBASE(1033,?,00000007,00000009,0000000B), ref: 0040374B
                                  • Part of subcall function 004063EE: lstrcpynW.KERNEL32(?,?,00000400,00403573,007A7A60,NSIS Error,?,00000007,00000009,0000000B), ref: 004063FB
                                • OleUninitialize.OLE32(00000007,?,00000007,00000009,0000000B), ref: 00403816
                                • ExitProcess.KERNEL32 ref: 00403837
                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\yuc1Jwlkh5.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 0040384A
                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\yuc1Jwlkh5.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 00403859
                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\yuc1Jwlkh5.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 00403864
                                • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\yuc1Jwlkh5.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 00403870
                                • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 0040388C
                                • DeleteFileW.KERNEL32(0079F708,0079F708,?,007A9000,00000009,?,00000007,00000009,0000000B), ref: 004038E6
                                • CopyFileW.KERNEL32(C:\Users\user\Desktop\yuc1Jwlkh5.exe,0079F708,00000001,?,00000007,00000009,0000000B), ref: 004038FA
                                • CloseHandle.KERNEL32(00000000,0079F708,0079F708,?,0079F708,00000000,?,00000007,00000009,0000000B), ref: 00403927
                                • GetCurrentProcess.KERNEL32(00000028,0000000B,00000007,00000009,0000000B), ref: 00403956
                                • OpenProcessToken.ADVAPI32(00000000), ref: 0040395D
                                • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403972
                                • AdjustTokenPrivileges.ADVAPI32 ref: 00403995
                                • ExitWindowsEx.USER32(00000002,80040002), ref: 004039BA
                                • ExitProcess.KERNEL32 ref: 004039DD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                • String ID: "C:\Users\user\Desktop\yuc1Jwlkh5.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods\Minkfarms$C:\Users\user\Desktop$C:\Users\user\Desktop\yuc1Jwlkh5.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                • API String ID: 3441113951-4146372053
                                • Opcode ID: 548301c1dfa22215a8893450befa883167be07a4132e0a9c717a82b6bd7fd6f7
                                • Instruction ID: d7b9bf8e5ec5db16f392776339999e6c5d6af7d7718e861a4dfbc7241a8cc938
                                • Opcode Fuzzy Hash: 548301c1dfa22215a8893450befa883167be07a4132e0a9c717a82b6bd7fd6f7
                                • Instruction Fuzzy Hash: 65D1F6B1200310AAD7207F659D49B2B3AACEB81749F10843FF581B62D1DB7D8A55C76E
                                APIs
                                  • Part of subcall function 6CE7121B: GlobalAlloc.KERNEL32(00000040,?,6CE7123B,?,6CE712DF,00000019,6CE711BE,-000000A0), ref: 6CE71225
                                • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 6CE71C8D
                                • lstrcpyW.KERNEL32(00000008,?), ref: 6CE71CD5
                                • lstrcpyW.KERNEL32(00000808,?), ref: 6CE71CDF
                                • GlobalFree.KERNEL32(00000000), ref: 6CE71CF2
                                • GlobalFree.KERNEL32(?), ref: 6CE71DD4
                                • GlobalFree.KERNEL32(?), ref: 6CE71DD9
                                • GlobalFree.KERNEL32(?), ref: 6CE71DDE
                                • GlobalFree.KERNEL32(00000000), ref: 6CE71FC8
                                • lstrcpyW.KERNEL32(?,?), ref: 6CE72182
                                • GetModuleHandleW.KERNEL32(00000008), ref: 6CE72201
                                • LoadLibraryW.KERNEL32(00000008), ref: 6CE72212
                                • GetProcAddress.KERNEL32(?,?), ref: 6CE7226C
                                • lstrlenW.KERNEL32(00000808), ref: 6CE72286
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200930121.000000006CE71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE70000, based on PE: true
                                • Associated: 00000000.00000002.2200719452.000000006CE70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.2201043872.000000006CE74000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.2201083821.000000006CE76000.00000002.00000001.01000000.00000006.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6ce70000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                • String ID:
                                • API String ID: 245916457-0
                                • Opcode ID: 13c34eabbf551de4dac16c6f66c10f6fd0a94f24d0f5906a5c933274b941edad
                                • Instruction ID: 66273ebb82d4e804591a40fb5f1eadf3f3c6c2bab6b2897476d9e9c5cfa4b9bb
                                • Opcode Fuzzy Hash: 13c34eabbf551de4dac16c6f66c10f6fd0a94f24d0f5906a5c933274b941edad
                                • Instruction Fuzzy Hash: FF229A71D04306DADB34CFE9C5942EDB7B4FB0630DF30462ED1A9A6A80D7709A86CB61

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 606 405b00-405b26 call 405dcb 609 405b28-405b3a DeleteFileW 606->609 610 405b3f-405b46 606->610 611 405cbc-405cc0 609->611 612 405b48-405b4a 610->612 613 405b59-405b69 call 4063ee 610->613 614 405b50-405b53 612->614 615 405c6a-405c6f 612->615 621 405b78-405b79 call 405d0f 613->621 622 405b6b-405b76 lstrcatW 613->622 614->613 614->615 615->611 618 405c71-405c74 615->618 619 405c76-405c7c 618->619 620 405c7e-405c86 call 40674c 618->620 619->611 620->611 630 405c88-405c9c call 405cc3 call 405ab8 620->630 624 405b7e-405b82 621->624 622->624 626 405b84-405b8c 624->626 627 405b8e-405b94 lstrcatW 624->627 626->627 629 405b99-405bb5 lstrlenW FindFirstFileW 626->629 627->629 631 405bbb-405bc3 629->631 632 405c5f-405c63 629->632 646 405cb4-405cb7 call 405456 630->646 647 405c9e-405ca1 630->647 634 405be3-405bf7 call 4063ee 631->634 635 405bc5-405bcd 631->635 632->615 637 405c65 632->637 648 405bf9-405c01 634->648 649 405c0e-405c19 call 405ab8 634->649 638 405c42-405c52 FindNextFileW 635->638 639 405bcf-405bd7 635->639 637->615 638->631 645 405c58-405c59 FindClose 638->645 639->634 642 405bd9-405be1 639->642 642->634 642->638 645->632 646->611 647->619 651 405ca3-405cb2 call 405456 call 4061b4 647->651 648->638 652 405c03-405c07 call 405b00 648->652 657 405c3a-405c3d call 405456 649->657 658 405c1b-405c1e 649->658 651->611 660 405c0c 652->660 657->638 661 405c20-405c30 call 405456 call 4061b4 658->661 662 405c32-405c38 658->662 660->638 661->638 662->638
                                APIs
                                • DeleteFileW.KERNELBASE(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B29
                                • lstrcatW.KERNEL32(007A3F50,\*.*,007A3F50,?), ref: 00405B71
                                • lstrcatW.KERNEL32(?,0040A014,?,007A3F50,?), ref: 00405B94
                                • lstrlenW.KERNEL32(?,?,0040A014,?,007A3F50,?), ref: 00405B9A
                                • FindFirstFileW.KERNELBASE(007A3F50,?,?,?,0040A014,?,007A3F50,?), ref: 00405BAA
                                • FindNextFileW.KERNEL32(00000000,?,000000F2,?,?,?,?,?), ref: 00405C4A
                                • FindClose.KERNEL32(00000000), ref: 00405C59
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                • String ID: "C:\Users\user\Desktop\yuc1Jwlkh5.exe"$C:\Users\user\AppData\Local\Temp\$P?z$\*.*
                                • API String ID: 2035342205-870465638
                                • Opcode ID: 2e078cdcde706d48225d83f3244a5f4697d9a3fc09f8fc82c0d1a14fe090b8d5
                                • Instruction ID: d176cfcb2707c6ba555092c79fa60715814496245c058da0d6595325efdb1864
                                • Opcode Fuzzy Hash: 2e078cdcde706d48225d83f3244a5f4697d9a3fc09f8fc82c0d1a14fe090b8d5
                                • Instruction Fuzzy Hash: BE41D530804A15AAEB216B658D89EBF7678EF42715F14813FF801711D2DB7C5E82CE6E
                                APIs
                                • FindFirstFileW.KERNELBASE(?,007A4F98,C:\,00405E14,C:\,C:\,00000000,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 00406757
                                • FindClose.KERNEL32(00000000), ref: 00406763
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: Find$CloseFileFirst
                                • String ID: C:\
                                • API String ID: 2295610775-3404278061
                                • Opcode ID: 93d274fea3e94b44f6f55b1f097fc665565d90e42f153d0ad468ae4ce1295179
                                • Instruction ID: 5230d556015edc92dacd95909e5542708b333c59f405b635cf09ddc887f28092
                                • Opcode Fuzzy Hash: 93d274fea3e94b44f6f55b1f097fc665565d90e42f153d0ad468ae4ce1295179
                                • Instruction Fuzzy Hash: CCD012315192205FC75027386F0C84B7A599F567353264B36F0AAF21E0C6788C3286AC

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 139 403e6b-403e7d 140 403e83-403e89 139->140 141 403fbe-403fcd 139->141 140->141 142 403e8f-403e98 140->142 143 40401c-404031 141->143 144 403fcf-404017 GetDlgItem * 2 call 404344 SetClassLongW call 40140b 141->144 147 403e9a-403ea7 SetWindowPos 142->147 148 403ead-403eb0 142->148 145 404071-404076 call 404390 143->145 146 404033-404036 143->146 144->143 158 40407b-404096 145->158 150 404038-404043 call 401389 146->150 151 404069-40406b 146->151 147->148 153 403eb2-403ec4 ShowWindow 148->153 154 403eca-403ed0 148->154 150->151 172 404045-404064 SendMessageW 150->172 151->145 157 404311 151->157 153->154 159 403ed2-403ee7 DestroyWindow 154->159 160 403eec-403eef 154->160 162 404313-40431a 157->162 168 404098-40409a call 40140b 158->168 169 40409f-4040a5 158->169 163 4042ee-4042f4 159->163 165 403ef1-403efd SetWindowLongW 160->165 166 403f02-403f08 160->166 163->157 174 4042f6-4042fc 163->174 165->162 170 403fab-403fb9 call 4043ab 166->170 171 403f0e-403f1f GetDlgItem 166->171 168->169 175 4040ab-4040b6 169->175 176 4042cf-4042e8 DestroyWindow EndDialog 169->176 170->162 177 403f21-403f38 SendMessageW IsWindowEnabled 171->177 178 403f3e-403f41 171->178 172->162 174->157 180 4042fe-404307 ShowWindow 174->180 175->176 181 4040bc-404109 call 40642b call 404344 * 3 GetDlgItem 175->181 176->163 177->157 177->178 183 403f43-403f44 178->183 184 403f46-403f49 178->184 180->157 209 404113-40414f ShowWindow KiUserCallbackDispatcher call 404366 EnableWindow 181->209 210 40410b-404110 181->210 187 403f74-403f79 call 40431d 183->187 188 403f57-403f5c 184->188 189 403f4b-403f51 184->189 187->170 192 403f92-403fa5 SendMessageW 188->192 194 403f5e-403f64 188->194 189->192 193 403f53-403f55 189->193 192->170 193->187 197 403f66-403f6c call 40140b 194->197 198 403f7b-403f84 call 40140b 194->198 207 403f72 197->207 198->170 206 403f86-403f90 198->206 206->207 207->187 213 404151-404152 209->213 214 404154 209->214 210->209 215 404156-404184 GetSystemMenu EnableMenuItem SendMessageW 213->215 214->215 216 404186-404197 SendMessageW 215->216 217 404199 215->217 218 40419f-4041de call 404379 call 403e4c call 4063ee lstrlenW call 40642b SetWindowTextW call 401389 216->218 217->218 218->158 229 4041e4-4041e6 218->229 229->158 230 4041ec-4041f0 229->230 231 4041f2-4041f8 230->231 232 40420f-404223 DestroyWindow 230->232 231->157 234 4041fe-404204 231->234 232->163 233 404229-404256 CreateDialogParamW 232->233 233->163 236 40425c-4042b3 call 404344 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 233->236 234->158 235 40420a 234->235 235->157 236->157 241 4042b5-4042c8 ShowWindow call 404390 236->241 243 4042cd 241->243 243->163
                                APIs
                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403EA7
                                • ShowWindow.USER32(?), ref: 00403EC4
                                • DestroyWindow.USER32 ref: 00403ED8
                                • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403EF4
                                • GetDlgItem.USER32(?,?), ref: 00403F15
                                • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403F29
                                • IsWindowEnabled.USER32(00000000), ref: 00403F30
                                • GetDlgItem.USER32(?,00000001), ref: 00403FDE
                                • GetDlgItem.USER32(?,00000002), ref: 00403FE8
                                • SetClassLongW.USER32(?,000000F2,?), ref: 00404002
                                • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00404053
                                • GetDlgItem.USER32(?,00000003), ref: 004040F9
                                • ShowWindow.USER32(00000000,?), ref: 0040411A
                                • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040412C
                                • EnableWindow.USER32(?,?), ref: 00404147
                                • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040415D
                                • EnableMenuItem.USER32(00000000), ref: 00404164
                                • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040417C
                                • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040418F
                                • lstrlenW.KERNEL32(007A1F48,?,007A1F48,00000000), ref: 004041B9
                                • SetWindowTextW.USER32(?,007A1F48), ref: 004041CD
                                • ShowWindow.USER32(?,0000000A), ref: 00404301
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                • String ID:
                                • API String ID: 3282139019-0
                                • Opcode ID: f1a328e51306031731dbcce9d1c3737ebdd7014b04a9a2d8d616989602e21706
                                • Instruction ID: fd8a01c06953bfbcdc6c7a7ca4fde1a241a6ed83f8ebcdeac2000881ab9a06ac
                                • Opcode Fuzzy Hash: f1a328e51306031731dbcce9d1c3737ebdd7014b04a9a2d8d616989602e21706
                                • Instruction Fuzzy Hash: 67C1BFB1604604AFDB206F61ED85D2A3B78EBCA705B10853EF651B11F0CB3D9941DB6E

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 244 403abd-403ad5 call 4067e3 247 403ad7-403ae7 call 406335 244->247 248 403ae9-403b20 call 4062bc 244->248 257 403b43-403b6c call 403d93 call 405dcb 247->257 253 403b22-403b33 call 4062bc 248->253 254 403b38-403b3e lstrcatW 248->254 253->254 254->257 262 403b72-403b77 257->262 263 403bfe-403c06 call 405dcb 257->263 262->263 264 403b7d-403ba5 call 4062bc 262->264 269 403c14-403c39 LoadImageW 263->269 270 403c08-403c0f call 40642b 263->270 264->263 271 403ba7-403bab 264->271 273 403cba-403cc2 call 40140b 269->273 274 403c3b-403c6b RegisterClassW 269->274 270->269 275 403bbd-403bc9 lstrlenW 271->275 276 403bad-403bba call 405cf0 271->276 288 403cc4-403cc7 273->288 289 403ccc-403cd7 call 403d93 273->289 277 403c71-403cb5 SystemParametersInfoW CreateWindowExW 274->277 278 403d89 274->278 282 403bf1-403bf9 call 405cc3 call 4063ee 275->282 283 403bcb-403bd9 lstrcmpiW 275->283 276->275 277->273 281 403d8b-403d92 278->281 282->263 283->282 287 403bdb-403be5 GetFileAttributesW 283->287 292 403be7-403be9 287->292 293 403beb-403bec call 405d0f 287->293 288->281 297 403d60-403d61 call 405529 289->297 298 403cdd-403cf7 ShowWindow call 406773 289->298 292->282 292->293 293->282 301 403d66-403d68 297->301 305 403d03-403d15 GetClassInfoW 298->305 306 403cf9-403cfe call 406773 298->306 303 403d82-403d84 call 40140b 301->303 304 403d6a-403d70 301->304 303->278 304->288 307 403d76-403d7d call 40140b 304->307 310 403d17-403d27 GetClassInfoW RegisterClassW 305->310 311 403d2d-403d50 DialogBoxParamW call 40140b 305->311 306->305 307->288 310->311 315 403d55-403d5e call 403a0d 311->315 315->281
                                APIs
                                  • Part of subcall function 004067E3: GetModuleHandleA.KERNEL32(?,00000020,?,00403514,0000000B), ref: 004067F5
                                  • Part of subcall function 004067E3: GetProcAddress.KERNEL32(00000000,?), ref: 00406810
                                • lstrcatW.KERNEL32(1033,007A1F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F48,00000000,00000002,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\yuc1Jwlkh5.exe",00000000), ref: 00403B3E
                                • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods,1033,007A1F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F48,00000000,00000002,74DF3420), ref: 00403BBE
                                • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods,1033,007A1F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F48,00000000), ref: 00403BD1
                                • GetFileAttributesW.KERNEL32(Call), ref: 00403BDC
                                • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods), ref: 00403C25
                                  • Part of subcall function 00406335: wsprintfW.USER32 ref: 00406342
                                • RegisterClassW.USER32(007A7A00), ref: 00403C62
                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403C7A
                                • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403CAF
                                • ShowWindow.USER32(00000005,00000000), ref: 00403CE5
                                • GetClassInfoW.USER32(00000000,RichEdit20W,007A7A00), ref: 00403D11
                                • GetClassInfoW.USER32(00000000,RichEdit,007A7A00), ref: 00403D1E
                                • RegisterClassW.USER32(007A7A00), ref: 00403D27
                                • DialogBoxParamW.USER32(?,00000000,00403E6B,00000000), ref: 00403D46
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                • String ID: "C:\Users\user\Desktop\yuc1Jwlkh5.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                • API String ID: 1975747703-2043154494
                                • Opcode ID: ed5882197ad2af45622ab53baadaf8c7f939305731a510e2915a0577b65485f7
                                • Instruction ID: 7ce8ec14a48fa11d69b3a5e1f0875b7083b8d607cd9ed6182ea3b60f82ca9994
                                • Opcode Fuzzy Hash: ed5882197ad2af45622ab53baadaf8c7f939305731a510e2915a0577b65485f7
                                • Instruction Fuzzy Hash: 286193702407007ED320AB669D46F2B3A7CEB85B49F40853FF941B22E2DB7D99018B6D

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 318 403015-403063 GetTickCount GetModuleFileNameW call 405ee4 321 403065-40306a 318->321 322 40306f-40309d call 4063ee call 405d0f call 4063ee GetFileSize 318->322 324 403245-403249 321->324 330 4030a3 322->330 331 403188-403196 call 402fb1 322->331 333 4030a8-4030bf 330->333 337 403198-40319b 331->337 338 4031eb-4031f0 331->338 335 4030c1 333->335 336 4030c3-4030cc call 403444 333->336 335->336 344 4031f2-4031fa call 402fb1 336->344 345 4030d2-4030d9 336->345 340 40319d-4031b5 call 40345a call 403444 337->340 341 4031bf-4031e9 GlobalAlloc call 40345a call 40324c 337->341 338->324 340->338 367 4031b7-4031bd 340->367 341->338 365 4031fc-40320d 341->365 344->338 349 403155-403159 345->349 350 4030db-4030ef call 405e9f 345->350 355 403163-403169 349->355 356 40315b-403162 call 402fb1 349->356 350->355 364 4030f1-4030f8 350->364 361 403178-403180 355->361 362 40316b-403175 call 4068d0 355->362 356->355 361->333 366 403186 361->366 362->361 364->355 371 4030fa-403101 364->371 372 403215-40321a 365->372 373 40320f 365->373 366->331 367->338 367->341 371->355 374 403103-40310a 371->374 375 40321b-403221 372->375 373->372 374->355 376 40310c-403113 374->376 375->375 377 403223-40323e SetFilePointer call 405e9f 375->377 376->355 378 403115-403135 376->378 381 403243 377->381 378->338 380 40313b-40313f 378->380 382 403141-403145 380->382 383 403147-40314f 380->383 381->324 382->366 382->383 383->355 384 403151-403153 383->384 384->355
                                APIs
                                • GetTickCount.KERNEL32 ref: 00403026
                                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\yuc1Jwlkh5.exe,00000400,?,00000007,00000009,0000000B), ref: 00403042
                                  • Part of subcall function 00405EE4: GetFileAttributesW.KERNELBASE(?,00403055,C:\Users\user\Desktop\yuc1Jwlkh5.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405EE8
                                  • Part of subcall function 00405EE4: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000007,00000009,0000000B), ref: 00405F0A
                                • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\yuc1Jwlkh5.exe,C:\Users\user\Desktop\yuc1Jwlkh5.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 0040308E
                                • GlobalAlloc.KERNELBASE(00000040,0000000B,?,00000007,00000009,0000000B), ref: 004031C4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                • String ID: "C:\Users\user\Desktop\yuc1Jwlkh5.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\yuc1Jwlkh5.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                • API String ID: 2803837635-2910774511
                                • Opcode ID: 08ca265c2c11c7ade98783a519f9a0a5c073a42a03571b96a4881a179354b053
                                • Instruction ID: b65d07b499067b34cf8ea267e223a71d0fae98adc47698ec1498b1efb03bef53
                                • Opcode Fuzzy Hash: 08ca265c2c11c7ade98783a519f9a0a5c073a42a03571b96a4881a179354b053
                                • Instruction Fuzzy Hash: DD51D171900204ABDB119F64DD85B9E7EACEB45316F20843BE911BA2D1DB7C8F418B5D

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 670 40642b-406436 671 406438-406447 670->671 672 406449-40645f 670->672 671->672 673 406465-406472 672->673 674 406677-40667d 672->674 673->674 675 406478-40647f 673->675 676 406683-40668e 674->676 677 406484-406491 674->677 675->674 679 406690-406694 call 4063ee 676->679 680 406699-40669a 676->680 677->676 678 406497-4064a3 677->678 681 406664 678->681 682 4064a9-4064e7 678->682 679->680 686 406672-406675 681->686 687 406666-406670 681->687 684 406607-40660b 682->684 685 4064ed-4064f8 682->685 690 40660d-406613 684->690 691 40663e-406642 684->691 688 406511 685->688 689 4064fa-4064ff 685->689 686->674 687->674 697 406518-40651f 688->697 689->688 694 406501-406504 689->694 695 406623-40662f call 4063ee 690->695 696 406615-406621 call 406335 690->696 692 406651-406662 lstrlenW 691->692 693 406644-40664c call 40642b 691->693 692->674 693->692 694->688 700 406506-406509 694->700 706 406634-40663a 695->706 696->706 702 406521-406523 697->702 703 406524-406526 697->703 700->688 707 40650b-40650f 700->707 702->703 704 406561-406564 703->704 705 406528-406546 call 4062bc 703->705 711 406574-406577 704->711 712 406566-406572 GetSystemDirectoryW 704->712 713 40654b-40654f 705->713 706->692 710 40663c 706->710 707->697 714 4065ff-406605 call 40669d 710->714 716 4065e2-4065e4 711->716 717 406579-406587 GetWindowsDirectoryW 711->717 715 4065e6-4065ea 712->715 718 406555-40655c call 40642b 713->718 719 4065ef-4065f2 713->719 714->692 715->714 721 4065ec 715->721 716->715 720 406589-406593 716->720 717->716 718->715 719->714 724 4065f4-4065fa lstrcatW 719->724 726 406595-406598 720->726 727 4065ad-4065c3 SHGetSpecialFolderLocation 720->727 721->719 724->714 726->727 731 40659a-4065a1 726->731 728 4065c5-4065dc SHGetPathFromIDListW CoTaskMemFree 727->728 729 4065de 727->729 728->715 728->729 729->716 732 4065a9-4065ab 731->732 732->715 732->727
                                APIs
                                • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 0040656C
                                • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,007A0F28,?,0040548D,007A0F28,00000000), ref: 0040657F
                                • SHGetSpecialFolderLocation.SHELL32(0040548D,0079A700,00000000,007A0F28,?,0040548D,007A0F28,00000000), ref: 004065BB
                                • SHGetPathFromIDListW.SHELL32(0079A700,Call), ref: 004065C9
                                • CoTaskMemFree.OLE32(0079A700), ref: 004065D4
                                • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004065FA
                                • lstrlenW.KERNEL32(Call,00000000,007A0F28,?,0040548D,007A0F28,00000000), ref: 00406652
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                • API String ID: 717251189-1230650788
                                • Opcode ID: aaa997f56c542f4584990acf2269000a5d9ad94e2d12eeb77129bcfb95bdb2f4
                                • Instruction ID: 6a9894c1754425a34e634a53c322024ca71031740d406166b65bc8419ebad360
                                • Opcode Fuzzy Hash: aaa997f56c542f4584990acf2269000a5d9ad94e2d12eeb77129bcfb95bdb2f4
                                • Instruction Fuzzy Hash: A261F471600505ABDF249F24DD40ABE37A5AF51318F22813FE543BA2D4DB3D8AA1CB5E

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 733 405456-40546b 734 405471-405482 733->734 735 405522-405526 733->735 736 405484-405488 call 40642b 734->736 737 40548d-405499 lstrlenW 734->737 736->737 739 4054b6-4054ba 737->739 740 40549b-4054ab lstrlenW 737->740 742 4054c9-4054cd 739->742 743 4054bc-4054c3 SetWindowTextW 739->743 740->735 741 4054ad-4054b1 lstrcatW 740->741 741->739 744 405513-405515 742->744 745 4054cf-405511 SendMessageW * 3 742->745 743->742 744->735 746 405517-40551a 744->746 745->744 746->735
                                APIs
                                • lstrlenW.KERNEL32(007A0F28,00000000,0079A700,74DF23A0,?,?,?,?,?,?,?,?,?,0040338D,00000000,?), ref: 0040548E
                                • lstrlenW.KERNEL32(0040338D,007A0F28,00000000,0079A700,74DF23A0,?,?,?,?,?,?,?,?,?,0040338D,00000000), ref: 0040549E
                                • lstrcatW.KERNEL32(007A0F28,0040338D,0040338D,007A0F28,00000000,0079A700,74DF23A0), ref: 004054B1
                                • SetWindowTextW.USER32(007A0F28,007A0F28), ref: 004054C3
                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E9
                                • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405503
                                • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405511
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                • String ID:
                                • API String ID: 2531174081-0
                                • Opcode ID: 0decb5d3bd7311ee25dcb4cac47719bdc9880b480b93dcede20cbb014160680e
                                • Instruction ID: 198c43ce2186877ab3aec1728abe16fb3d15ea5683a6b9ae92d40c5f72e5eea1
                                • Opcode Fuzzy Hash: 0decb5d3bd7311ee25dcb4cac47719bdc9880b480b93dcede20cbb014160680e
                                • Instruction Fuzzy Hash: EC21AF75900518BACB119F65DD44ACFBFB9EF89354F10802AF904B22A1C3798A81CFA8

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 747 405925-405970 CreateDirectoryW 748 405972-405974 747->748 749 405976-405983 GetLastError 747->749 750 40599d-40599f 748->750 749->750 751 405985-405999 SetFileSecurityW 749->751 751->748 752 40599b GetLastError 751->752 752->750
                                APIs
                                • CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405968
                                • GetLastError.KERNEL32 ref: 0040597C
                                • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405991
                                • GetLastError.KERNEL32 ref: 0040599B
                                Strings
                                • C:\Users\user\Desktop, xrefs: 00405925
                                • C:\Users\user\AppData\Local\Temp\, xrefs: 0040594B
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: ErrorLast$CreateDirectoryFileSecurity
                                • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                                • API String ID: 3449924974-2028306314
                                • Opcode ID: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                • Instruction ID: 4c6d3c4ce34384c56ae6b54862a6db5cebbf8231f9905efb0a53c4272bf1951e
                                • Opcode Fuzzy Hash: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                • Instruction Fuzzy Hash: E1011AB1C00219EADF009FA5DD44BEFBBB8EF04314F00803AD544B6190E7789648CFA9

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 753 406773-406793 GetSystemDirectoryW 754 406795 753->754 755 406797-406799 753->755 754->755 756 4067aa-4067ac 755->756 757 40679b-4067a4 755->757 758 4067ad-4067e0 wsprintfW LoadLibraryExW 756->758 757->756 759 4067a6-4067a8 757->759 759->758
                                APIs
                                • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040678A
                                • wsprintfW.USER32 ref: 004067C5
                                • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067D9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: DirectoryLibraryLoadSystemwsprintf
                                • String ID: %s%S.dll$UXTHEME$\
                                • API String ID: 2200240437-1946221925
                                • Opcode ID: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                • Instruction ID: 038d7fed81a94acb9f8d17f6b302bf2205b26bc145b48260013954e6d266918a
                                • Opcode Fuzzy Hash: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                • Instruction Fuzzy Hash: 65F0F670510119A7CF14AB64DD0DF9B376CAB40309F10047AA646F20D0EB7C9A68CBA8

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 760 40324c-403263 761 403265 760->761 762 40326c-403275 760->762 761->762 763 403277 762->763 764 40327e-403283 762->764 763->764 765 403293-4032a0 call 403444 764->765 766 403285-40328e call 40345a 764->766 770 403432 765->770 771 4032a6-4032aa 765->771 766->765 772 403434-403435 770->772 773 4032b0-4032d6 GetTickCount 771->773 774 4033dd-4033df 771->774 775 40343d-403441 772->775 776 40343a 773->776 777 4032dc-4032e4 773->777 778 4033e1-4033e4 774->778 779 40341f-403422 774->779 776->775 781 4032e6 777->781 782 4032e9-4032f7 call 403444 777->782 778->776 780 4033e6 778->780 783 403424 779->783 784 403427-403430 call 403444 779->784 785 4033e9-4033ef 780->785 781->782 782->770 794 4032fd-403306 782->794 783->784 784->770 792 403437 784->792 788 4033f1 785->788 789 4033f3-403401 call 403444 785->789 788->789 789->770 797 403403-40340f call 405f96 789->797 792->776 796 40330c-40332c call 40693e 794->796 802 403332-403345 GetTickCount 796->802 803 4033d5-4033d7 796->803 804 403411-40341b 797->804 805 4033d9-4033db 797->805 806 403390-403392 802->806 807 403347-40334f 802->807 803->772 804->785 810 40341d 804->810 805->772 808 403394-403398 806->808 809 4033c9-4033cd 806->809 811 403351-403355 807->811 812 403357-403388 MulDiv wsprintfW call 405456 807->812 813 40339a-4033a1 call 405f96 808->813 814 4033af-4033ba 808->814 809->777 815 4033d3 809->815 810->776 811->806 811->812 817 40338d 812->817 820 4033a6-4033a8 813->820 819 4033bd-4033c1 814->819 815->776 817->806 819->796 821 4033c7 819->821 820->805 822 4033aa-4033ad 820->822 821->776 822->819
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: CountTick$wsprintf
                                • String ID: ... %d%%
                                • API String ID: 551687249-2449383134
                                • Opcode ID: a56becbd4a8c381964fcf942c118294a751433144615ef02c1157a4186d243db
                                • Instruction ID: 008436f450556a42ebae23d461066e9f0811e1f15f23a2ec19415b9062137ceb
                                • Opcode Fuzzy Hash: a56becbd4a8c381964fcf942c118294a751433144615ef02c1157a4186d243db
                                • Instruction Fuzzy Hash: 86516C71900219DBDB11DF65DA84B9F7FB8AF0076AF14417BE814B72C1C7789A40CBAA

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 823 405f13-405f1f 824 405f20-405f54 GetTickCount GetTempFileNameW 823->824 825 405f63-405f65 824->825 826 405f56-405f58 824->826 828 405f5d-405f60 825->828 826->824 827 405f5a 826->827 827->828
                                APIs
                                • GetTickCount.KERNEL32 ref: 00405F31
                                • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\yuc1Jwlkh5.exe",004034A0,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC), ref: 00405F4C
                                Strings
                                • nsa, xrefs: 00405F20
                                • "C:\Users\user\Desktop\yuc1Jwlkh5.exe", xrefs: 00405F13
                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F18
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: CountFileNameTempTick
                                • String ID: "C:\Users\user\Desktop\yuc1Jwlkh5.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                • API String ID: 1716503409-2825432903
                                • Opcode ID: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                • Instruction ID: 2ec416300cd5d099b763d3688cd3c506487cb406e2025687db32897a35dea38d
                                • Opcode Fuzzy Hash: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                • Instruction Fuzzy Hash: 84F09676B00204BBDB008F55ED05E9FB7ACEB95750F10803AEA04F7140E6B499548B58

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 829 6ce71777-6ce717b6 call 6ce71b5f 833 6ce718d6-6ce718d8 829->833 834 6ce717bc-6ce717c0 829->834 835 6ce717c2-6ce717c8 call 6ce7239e 834->835 836 6ce717c9-6ce717d6 call 6ce723e0 834->836 835->836 841 6ce71806-6ce7180d 836->841 842 6ce717d8-6ce717dd 836->842 843 6ce7180f-6ce7182b call 6ce725b5 call 6ce715b4 call 6ce71272 GlobalFree 841->843 844 6ce7182d-6ce71831 841->844 845 6ce717df-6ce717e0 842->845 846 6ce717f8-6ce717fb 842->846 868 6ce71885-6ce71889 843->868 851 6ce71833-6ce7187c call 6ce715c6 call 6ce725b5 844->851 852 6ce7187e-6ce71884 call 6ce725b5 844->852 849 6ce717e2-6ce717e3 845->849 850 6ce717e8-6ce717e9 call 6ce72af8 845->850 846->841 847 6ce717fd-6ce717fe call 6ce72d83 846->847 860 6ce71803 847->860 856 6ce717e5-6ce717e6 849->856 857 6ce717f0-6ce717f6 call 6ce72770 849->857 863 6ce717ee 850->863 851->868 852->868 856->841 856->850 867 6ce71805 857->867 860->867 863->860 867->841 872 6ce718c6-6ce718cd 868->872 873 6ce7188b-6ce71899 call 6ce72578 868->873 872->833 875 6ce718cf-6ce718d0 GlobalFree 872->875 879 6ce718b1-6ce718b8 873->879 880 6ce7189b-6ce7189e 873->880 875->833 879->872 882 6ce718ba-6ce718c5 call 6ce7153d 879->882 880->879 881 6ce718a0-6ce718a8 880->881 881->879 883 6ce718aa-6ce718ab FreeLibrary 881->883 882->872 883->879
                                APIs
                                  • Part of subcall function 6CE71B5F: GlobalFree.KERNEL32(?), ref: 6CE71DD4
                                  • Part of subcall function 6CE71B5F: GlobalFree.KERNEL32(?), ref: 6CE71DD9
                                  • Part of subcall function 6CE71B5F: GlobalFree.KERNEL32(?), ref: 6CE71DDE
                                • GlobalFree.KERNEL32(00000000), ref: 6CE71825
                                • FreeLibrary.KERNEL32(?), ref: 6CE718AB
                                • GlobalFree.KERNEL32(00000000), ref: 6CE718D0
                                  • Part of subcall function 6CE7239E: GlobalAlloc.KERNEL32(00000040,?), ref: 6CE723CF
                                  • Part of subcall function 6CE72770: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6CE717F6,00000000), ref: 6CE72840
                                  • Part of subcall function 6CE715C6: wsprintfW.USER32 ref: 6CE715F4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200930121.000000006CE71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE70000, based on PE: true
                                • Associated: 00000000.00000002.2200719452.000000006CE70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.2201043872.000000006CE74000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.2201083821.000000006CE76000.00000002.00000001.01000000.00000006.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6ce70000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: Global$Free$Alloc$Librarywsprintf
                                • String ID:
                                • API String ID: 3962662361-3916222277
                                • Opcode ID: 46098dd2f392cd58a9a190885752acdb9292081fcfab47288e54cdd2538b5b2f
                                • Instruction ID: faffeab897ef9f910f52000cfa9c9a5276f9d7e2d67bad9ed64875ab190d4ce4
                                • Opcode Fuzzy Hash: 46098dd2f392cd58a9a190885752acdb9292081fcfab47288e54cdd2538b5b2f
                                • Instruction Fuzzy Hash: 3D41D271500345DAEF359FB498A8BC537B8BB0631CF340569E91D9AB86DB78C088C771

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 886 405dcb-405de6 call 4063ee call 405d6e 891 405de8-405dea 886->891 892 405dec-405df9 call 40669d 886->892 893 405e44-405e46 891->893 896 405e09-405e0d 892->896 897 405dfb-405e01 892->897 899 405e23-405e2c lstrlenW 896->899 897->891 898 405e03-405e07 897->898 898->891 898->896 900 405e2e-405e42 call 405cc3 GetFileAttributesW 899->900 901 405e0f-405e16 call 40674c 899->901 900->893 906 405e18-405e1b 901->906 907 405e1d-405e1e call 405d0f 901->907 906->891 906->907 907->899
                                APIs
                                  • Part of subcall function 004063EE: lstrcpynW.KERNEL32(?,?,00000400,00403573,007A7A60,NSIS Error,?,00000007,00000009,0000000B), ref: 004063FB
                                  • Part of subcall function 00405D6E: CharNextW.USER32(?,?,C:\,?,00405DE2,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405D7C
                                  • Part of subcall function 00405D6E: CharNextW.USER32(00000000), ref: 00405D81
                                  • Part of subcall function 00405D6E: CharNextW.USER32(00000000), ref: 00405D99
                                • lstrlenW.KERNEL32(C:\,00000000,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405E24
                                • GetFileAttributesW.KERNELBASE(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 00405E34
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                • String ID: C:\$C:\Users\user\AppData\Local\Temp\
                                • API String ID: 3248276644-3049482934
                                • Opcode ID: cded0a6966890639b687aa66a4455a295a884498cbe0599bea4925404aa51844
                                • Instruction ID: 3e737dd218ce82e1fa1fef2ae0b63742eeb13cb079fe623d21add3619189c6ea
                                • Opcode Fuzzy Hash: cded0a6966890639b687aa66a4455a295a884498cbe0599bea4925404aa51844
                                • Instruction Fuzzy Hash: B2F0A435104E5115D632333A9D09BEF1558CE86718B19863BF8A2B22D2DB3C8A539DBE

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 909 4062bc-4062ee call 40625b 912 4062f0-40631e RegQueryValueExW RegCloseKey 909->912 913 40632c 909->913 912->913 914 406320-406324 912->914 915 406330-406332 913->915 914->915 916 406326-40632a 914->916 916->913 916->915
                                APIs
                                • RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,?,00000800,00000002,007A0F28,00000000,?,?,Call,?,?,0040654B,80000002), ref: 00406302
                                • RegCloseKey.KERNELBASE(?,?,0040654B,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,00000000,007A0F28), ref: 0040630D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: CloseQueryValue
                                • String ID: Call
                                • API String ID: 3356406503-1824292864
                                • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                • Instruction ID: 373679b9ec00f947e58de2b720fd419a4882b2706591ab80caa015ae1ce90e84
                                • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                • Instruction Fuzzy Hash: 56017C72510209EADF218F65CC09EDB3BA8FF54364F01803AFD5AA2190D778D964DBA4

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 917 4059d7-405a08 CreateProcessW 918 405a16-405a17 917->918 919 405a0a-405a13 CloseHandle 917->919 919->918
                                APIs
                                • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4F50,Error launching installer), ref: 00405A00
                                • CloseHandle.KERNEL32(?), ref: 00405A0D
                                Strings
                                • Error launching installer, xrefs: 004059EA
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: CloseCreateHandleProcess
                                • String ID: Error launching installer
                                • API String ID: 3712363035-66219284
                                • Opcode ID: c4e46f1f673fd3826d078202ae771a3f9877dbb6e8e98e36d3575ddcb335b3d8
                                • Instruction ID: 2b341ff16c6abf5d503a25303b32c86a9a78efd9c2a610832e0bce27d8c53e5f
                                • Opcode Fuzzy Hash: c4e46f1f673fd3826d078202ae771a3f9877dbb6e8e98e36d3575ddcb335b3d8
                                • Instruction Fuzzy Hash: F3E0BFF46002097FEB109F64ED05F7B77ACEB44644F004525BD54F6150D7B999148A7D
                                APIs
                                • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID:
                                • API String ID: 3850602802-0
                                • Opcode ID: 450ddb0a52dde23e6c3e7e65707e0a17b99b7c6dada291b67ac9213214883537
                                • Instruction ID: 3e9f44f44444eb33be3e1f1d809517d1ef13f380758e007b8d3e22890c14ce30
                                • Opcode Fuzzy Hash: 450ddb0a52dde23e6c3e7e65707e0a17b99b7c6dada291b67ac9213214883537
                                • Instruction Fuzzy Hash: 0301F432624220ABE7195B389D05B2A3698E751318F10C13FF855F6AF1EA78CC02DB4D
                                APIs
                                • OleInitialize.OLE32(00000000), ref: 00405539
                                  • Part of subcall function 00404390: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004043A2
                                • OleUninitialize.OLE32(00000404,00000000), ref: 00405585
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: InitializeMessageSendUninitialize
                                • String ID:
                                • API String ID: 2896919175-0
                                • Opcode ID: b24dbad8591dbcff640029893fb3992765d84d02a771cb6487f675f1a58ba012
                                • Instruction ID: c3927fed0e1f83e34f848fcc0c4a50f65b2ddd7f3aa3936e0d60c095b3f3b225
                                • Opcode Fuzzy Hash: b24dbad8591dbcff640029893fb3992765d84d02a771cb6487f675f1a58ba012
                                • Instruction Fuzzy Hash: 48F090BB900500BAE7415754AD01B56B371EBD1354F05C43BEE88626E4DB794C418B6E
                                APIs
                                • GetModuleHandleA.KERNEL32(?,00000020,?,00403514,0000000B), ref: 004067F5
                                • GetProcAddress.KERNEL32(00000000,?), ref: 00406810
                                  • Part of subcall function 00406773: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040678A
                                  • Part of subcall function 00406773: wsprintfW.USER32 ref: 004067C5
                                  • Part of subcall function 00406773: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067D9
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                • String ID:
                                • API String ID: 2547128583-0
                                • Opcode ID: 04b739db586b670126c7119b566f03dd1efc4ec82adb23a6bbf3e60323b3d7ce
                                • Instruction ID: 99a4bc67a8c43757839ce5658996565e88f4cb2ecc15aeea03f34014f97f3c52
                                • Opcode Fuzzy Hash: 04b739db586b670126c7119b566f03dd1efc4ec82adb23a6bbf3e60323b3d7ce
                                • Instruction Fuzzy Hash: F2E0863350521056E611AA719D44C7773AC9F89650307843EF946F2080D738DC31ABBD
                                APIs
                                • GetFileAttributesW.KERNELBASE(?,00403055,C:\Users\user\Desktop\yuc1Jwlkh5.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405EE8
                                • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000007,00000009,0000000B), ref: 00405F0A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: File$AttributesCreate
                                • String ID:
                                • API String ID: 415043291-0
                                • Opcode ID: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                • Instruction ID: 1030bc0f2bf25390ef9c6131bda9d6cfedcac9e68b753c15eded60bf4a570351
                                • Opcode Fuzzy Hash: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                • Instruction Fuzzy Hash: 5ED09E31254201AFEF098F20DE16F2E7BA2EB94B04F11552CB786941E0DAB15C199B15
                                APIs
                                • CreateDirectoryW.KERNELBASE(?,00000000,00403495,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 004059A8
                                • GetLastError.KERNEL32(?,00000007,00000009,0000000B), ref: 004059B6
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: CreateDirectoryErrorLast
                                • String ID:
                                • API String ID: 1375471231-0
                                • Opcode ID: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                • Instruction ID: 379133542b1e1e7011c0d69b4b2ae41cc98c6aec5a22f3063a42931ced3e53c7
                                • Opcode Fuzzy Hash: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                • Instruction Fuzzy Hash: 1EC04C71205502EEF6115B20DF48B1B7A909B50751F16843DA146E01E4DE389455D92D
                                APIs
                                • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,00403457,00000000,00000000,0040329E,?,00000004,00000000,00000000,00000000), ref: 00405F7B
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: FileRead
                                • String ID:
                                • API String ID: 2738559852-0
                                • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                • Instruction ID: e146fa180a083be72d256ad1b428d57881e9eb39a1326beaade4420b40277b6a
                                • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                • Instruction Fuzzy Hash: E7E0EC3221065BAFDF10AEA59C04EFB7B6CEB05360F004836FD55E6150D635E9219BA8
                                APIs
                                • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,0040340D,000000FF,00793700,?,00793700,?,?,00000004,00000000), ref: 00405FAA
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: FileWrite
                                • String ID:
                                • API String ID: 3934441357-0
                                • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                • Instruction ID: df8aade711aef2fea4c6cc03ed90c08959c6261ddae8de931081f7d2433cde5f
                                • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                • Instruction Fuzzy Hash: 96E08C3221021AEBDF109E608C00AEB7B6CEB00360F004433FA24E3150D634E8218BA8
                                APIs
                                • VirtualProtect.KERNELBASE(6CE7505C,00000004,00000040,6CE7504C), ref: 6CE729FD
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200930121.000000006CE71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE70000, based on PE: true
                                • Associated: 00000000.00000002.2200719452.000000006CE70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.2201043872.000000006CE74000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.2201083821.000000006CE76000.00000002.00000001.01000000.00000006.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6ce70000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: ProtectVirtual
                                • String ID:
                                • API String ID: 544645111-0
                                • Opcode ID: ae40928927f67efe5ed5083ea40cc5fd042660fb4c64c9a2bc21793c78041d82
                                • Instruction ID: 17afb5c550bb55e340bc5ac6b8e2321d15212bcb83544bdb93015ab24a2d38b9
                                • Opcode Fuzzy Hash: ae40928927f67efe5ed5083ea40cc5fd042660fb4c64c9a2bc21793c78041d82
                                • Instruction Fuzzy Hash: 68F0AEB0B062A0DEDB62CF28844CB093BF0B71B304B25492AE18AD6644E3344445EBB1
                                APIs
                                • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,007A0F28,?,?,004062E9,007A0F28,00000000,?,?,Call,?), ref: 0040627F
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: Open
                                • String ID:
                                • API String ID: 71445658-0
                                • Opcode ID: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                                • Instruction ID: 981b209bfbc59ad728c3152e24748ded8346fc425447e23afb42b8d85bc6dac1
                                • Opcode Fuzzy Hash: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                                • Instruction Fuzzy Hash: 35D0123200020DBBDF11AF90ED05FAB372DAB08350F014426FE06A4091D775D530A728
                                APIs
                                • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004043A2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID:
                                • API String ID: 3850602802-0
                                • Opcode ID: 749224e8f98fb78827d13f0d237c1790e640dc60b1af624d5aad8e7e956e5cea
                                • Instruction ID: 2ab46fc48b107f7ec410a0490fc1e10939948660fe742cc14426a6f165494095
                                • Opcode Fuzzy Hash: 749224e8f98fb78827d13f0d237c1790e640dc60b1af624d5aad8e7e956e5cea
                                • Instruction Fuzzy Hash: 26C04C75784700BADA149B549E45F0677546B90701F158429B641A50D0CA78D410DA2C
                                APIs
                                • SetFilePointer.KERNELBASE(?,00000000,00000000,004031DA,?,?,00000007,00000009,0000000B), ref: 00403468
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: FilePointer
                                • String ID:
                                • API String ID: 973152223-0
                                • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
                                • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
                                APIs
                                • SendMessageW.USER32(00000028,?,00000001,004041A4), ref: 00404387
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID:
                                • API String ID: 3850602802-0
                                • Opcode ID: 33429e90f145919918c0f5a16300b6ae2cb664e9c61a266d81822a9c1fb78e21
                                • Instruction ID: 9ccc480ae856a8f761d654a46a9a0801f91457f8e33b58f107ae6609e89c6df3
                                • Opcode Fuzzy Hash: 33429e90f145919918c0f5a16300b6ae2cb664e9c61a266d81822a9c1fb78e21
                                • Instruction Fuzzy Hash: 51B09235181A00AADE914B00DE09F457A62A7A4701F00C029B241240B4CAB200A4DB0A
                                APIs
                                • KiUserCallbackDispatcher.NTDLL(?,0040413D), ref: 00404370
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: CallbackDispatcherUser
                                • String ID:
                                • API String ID: 2492992576-0
                                • Opcode ID: fb2bbd85db119072699d8509dbb0c67ddc0fed6d182cd9e62e167e16add427de
                                • Instruction ID: f32ebe17383345fd09930a0b12515434b8b37a693fa3d318b2a69664ac7713bd
                                • Opcode Fuzzy Hash: fb2bbd85db119072699d8509dbb0c67ddc0fed6d182cd9e62e167e16add427de
                                • Instruction Fuzzy Hash: 97A00176405540AFEE029B61EF09D4ABB72ABA9701B4185B9A286A0034CB364860EB1D
                                APIs
                                • VirtualAlloc.KERNELBASE(00000000), ref: 6CE72BB7
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200930121.000000006CE71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE70000, based on PE: true
                                • Associated: 00000000.00000002.2200719452.000000006CE70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.2201043872.000000006CE74000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.2201083821.000000006CE76000.00000002.00000001.01000000.00000006.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6ce70000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: d4a5a010ea9acd80c354d497357fe4060d32341e7a0c24fe1158b1adb4479994
                                • Instruction ID: ccc1426c1759b263d3d43998efb49a2e40ddd3df4103e86591b3a659bc524b00
                                • Opcode Fuzzy Hash: d4a5a010ea9acd80c354d497357fe4060d32341e7a0c24fe1158b1adb4479994
                                • Instruction Fuzzy Hash: E0419A71A01215EBDF31DFA4D98CB9937B4EB6631CF308529E406C6B10D738998ADBB1
                                APIs
                                • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,004061D5,00000000,00000000), ref: 00406075
                                • GetShortPathNameW.KERNEL32(?,007A55E8,00000400), ref: 0040607E
                                  • Part of subcall function 00405E49: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E59
                                  • Part of subcall function 00405E49: lstrlenA.KERNEL32(00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E8B
                                • GetShortPathNameW.KERNEL32(?,007A5DE8,00000400), ref: 0040609B
                                • wsprintfA.USER32 ref: 004060B9
                                • GetFileSize.KERNEL32(00000000,00000000,007A5DE8,C0000000,00000004,007A5DE8,?), ref: 004060F4
                                • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406103
                                • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 0040613B
                                • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,007A51E8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 00406191
                                • GlobalFree.KERNEL32(00000000), ref: 004061A2
                                • CloseHandle.KERNEL32(00000000), ref: 004061A9
                                  • Part of subcall function 00405EE4: GetFileAttributesW.KERNELBASE(?,00403055,C:\Users\user\Desktop\yuc1Jwlkh5.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405EE8
                                  • Part of subcall function 00405EE4: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000007,00000009,0000000B), ref: 00405F0A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                • String ID: %ls=%ls$[Rename]$Uz$]z
                                • API String ID: 2171350718-2939442745
                                • Opcode ID: 0ed23fd09f20e9f0b0e4ce5e0ebdd9c0c92abb0a06c9999cd82c312b58dee0fa
                                • Instruction ID: 03fe7b931bffc2b02635af9c10f4e714808f3729e90155368a1b4a6ed52067ca
                                • Opcode Fuzzy Hash: 0ed23fd09f20e9f0b0e4ce5e0ebdd9c0c92abb0a06c9999cd82c312b58dee0fa
                                • Instruction Fuzzy Hash: 44312370600B05BFD6206B618D48F6B3A6CDF86744F15013AFD42FA2C3DA3C99218ABD
                                APIs
                                • CharNextW.USER32(?,*?|<>/":,00000000,00000000,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\yuc1Jwlkh5.exe",0040347D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00406700
                                • CharNextW.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 0040670F
                                • CharNextW.USER32(?,00000000,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\yuc1Jwlkh5.exe",0040347D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00406714
                                • CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\yuc1Jwlkh5.exe",0040347D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00406727
                                Strings
                                • "C:\Users\user\Desktop\yuc1Jwlkh5.exe", xrefs: 0040669D
                                • *?|<>/":, xrefs: 004066EF
                                • C:\Users\user\AppData\Local\Temp\, xrefs: 0040669E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: Char$Next$Prev
                                • String ID: "C:\Users\user\Desktop\yuc1Jwlkh5.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                • API String ID: 589700163-3906307122
                                • Opcode ID: 9ddbb9e18cbe24282ce487244f484090ca5dfb24375496ba9be4fccf49263134
                                • Instruction ID: 12c80e2bf748d1a62cb3884e1ae38c2d534281e125f75e63bd15dfe73c9398b2
                                • Opcode Fuzzy Hash: 9ddbb9e18cbe24282ce487244f484090ca5dfb24375496ba9be4fccf49263134
                                • Instruction Fuzzy Hash: E711EB15800A1255DB303B148C84A7763F8EF947A4F56443FED86732C0E77D4C9286BD
                                APIs
                                • GetWindowLongW.USER32(?,000000EB), ref: 004043C8
                                • GetSysColor.USER32(00000000), ref: 00404406
                                • SetTextColor.GDI32(?,00000000), ref: 00404412
                                • SetBkMode.GDI32(?,?), ref: 0040441E
                                • GetSysColor.USER32(?), ref: 00404431
                                • SetBkColor.GDI32(?,?), ref: 00404441
                                • DeleteObject.GDI32(?), ref: 0040445B
                                • CreateBrushIndirect.GDI32(?), ref: 00404465
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                • String ID:
                                • API String ID: 2320649405-0
                                • Opcode ID: 288dbcc7c85f11a55b3e08142a2a7aff64d3670202badf385cb57de10b60d8c1
                                • Instruction ID: 7fe0b9bd09f79c55d2aa0e3576d5328f94b18663b05207f77db8afc097fd36db
                                • Opcode Fuzzy Hash: 288dbcc7c85f11a55b3e08142a2a7aff64d3670202badf385cb57de10b60d8c1
                                • Instruction Fuzzy Hash: F62174B15007049BCB319F78D948F5BBBF8AF80714B048A3EE9D2A26E1C734E905CB58
                                APIs
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,6CE72238,?,00000808), ref: 6CE71635
                                • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,6CE72238,?,00000808), ref: 6CE7163C
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,6CE72238,?,00000808), ref: 6CE71650
                                • GetProcAddress.KERNEL32(8"l,00000000), ref: 6CE71657
                                • GlobalFree.KERNEL32(00000000), ref: 6CE71660
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200930121.000000006CE71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE70000, based on PE: true
                                • Associated: 00000000.00000002.2200719452.000000006CE70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.2201043872.000000006CE74000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.2201083821.000000006CE76000.00000002.00000001.01000000.00000006.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6ce70000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                • String ID: 8"l
                                • API String ID: 1148316912-3080408514
                                • Opcode ID: 6bde8419968cb8e6a64fc13081c0a6d6f4662f092d3c867eda97e10cfda189b5
                                • Instruction ID: 2b6ef377eb0320a89d2922a4a088e8bc24b6c3e14894e06f6cddc441125d4754
                                • Opcode Fuzzy Hash: 6bde8419968cb8e6a64fc13081c0a6d6f4662f092d3c867eda97e10cfda189b5
                                • Instruction Fuzzy Hash: CCF0AC722061387BDA2256A69C4CC9BBEBDDF8B2F5B110216F628921A096615D01DBF2
                                APIs
                                • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402F49
                                • MulDiv.KERNEL32(000DED8A,00000064,000DF8B0), ref: 00402F74
                                • wsprintfW.USER32 ref: 00402F84
                                • SetWindowTextW.USER32(?,?), ref: 00402F94
                                • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402FA6
                                Strings
                                • verifying installer: %d%%, xrefs: 00402F7E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: Text$ItemTimerWindowwsprintf
                                • String ID: verifying installer: %d%%
                                • API String ID: 1451636040-82062127
                                • Opcode ID: e04d04eb7b63203ce5fd1c353c1d281d58231c4b0d3ff082bc1608e2171a15b6
                                • Instruction ID: 448c993359d53400b231c8c55bc41b2c2aaf26e1e6946bd82a433317a94b79bc
                                • Opcode Fuzzy Hash: e04d04eb7b63203ce5fd1c353c1d281d58231c4b0d3ff082bc1608e2171a15b6
                                • Instruction Fuzzy Hash: 1101FF70640209BBEF209F60DE4AFAA3B79EB04349F008039FA16A51D1DBB999559F58
                                APIs
                                  • Part of subcall function 6CE7121B: GlobalAlloc.KERNEL32(00000040,?,6CE7123B,?,6CE712DF,00000019,6CE711BE,-000000A0), ref: 6CE71225
                                • GlobalFree.KERNEL32(?), ref: 6CE726A3
                                • GlobalFree.KERNEL32(00000000), ref: 6CE726D8
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200930121.000000006CE71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE70000, based on PE: true
                                • Associated: 00000000.00000002.2200719452.000000006CE70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.2201043872.000000006CE74000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.2201083821.000000006CE76000.00000002.00000001.01000000.00000006.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6ce70000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: Global$Free$Alloc
                                • String ID:
                                • API String ID: 1780285237-0
                                • Opcode ID: f4e60dbe9c0ab20f454d1e073a05212ce0985c17abcd308909204bedd41153c5
                                • Instruction ID: e841f72a4e3ce1cc6f0f1006300f740c3f1eaf4cbcbf3b44121b6560f749d074
                                • Opcode Fuzzy Hash: f4e60dbe9c0ab20f454d1e073a05212ce0985c17abcd308909204bedd41153c5
                                • Instruction Fuzzy Hash: 6A316E31605152EBCB26CFA4DC9CC6A77B6FB97308724452EE20187A61D7319846DB72
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200930121.000000006CE71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE70000, based on PE: true
                                • Associated: 00000000.00000002.2200719452.000000006CE70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.2201043872.000000006CE74000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.2201083821.000000006CE76000.00000002.00000001.01000000.00000006.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6ce70000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: FreeGlobal
                                • String ID:
                                • API String ID: 2979337801-0
                                • Opcode ID: 1d42ca73102306e7aff892b67a7798facd5db5d35a08e47e6f5ab64071c21934
                                • Instruction ID: 82a1bf79f8091f3d86b9ea96f5114964124c2dc8b0ba48f12dc64681058b4be6
                                • Opcode Fuzzy Hash: 1d42ca73102306e7aff892b67a7798facd5db5d35a08e47e6f5ab64071c21934
                                • Instruction Fuzzy Hash: B351D533D043599A8F329FE984645AEB6B6EB4639CB34425AD41CA3F00D770DE82C7B1
                                APIs
                                • GlobalFree.KERNEL32(00000000), ref: 6CE72522
                                  • Part of subcall function 6CE7122C: lstrcpynW.KERNEL32(00000000,?,6CE712DF,00000019,6CE711BE,-000000A0), ref: 6CE7123C
                                • GlobalAlloc.KERNEL32(00000040), ref: 6CE724A8
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 6CE724C3
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200930121.000000006CE71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE70000, based on PE: true
                                • Associated: 00000000.00000002.2200719452.000000006CE70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.2201043872.000000006CE74000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.2201083821.000000006CE76000.00000002.00000001.01000000.00000006.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6ce70000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                • String ID:
                                • API String ID: 4216380887-0
                                • Opcode ID: f86fccbb41400c02d0183063e2422eb307f50e5fec0e5dd5edaa63208faafc1d
                                • Instruction ID: 9c4c522f5fcefa0bf6542b5b05251069bc11f9f9625b766bc284b45807b92fc6
                                • Opcode Fuzzy Hash: f86fccbb41400c02d0183063e2422eb307f50e5fec0e5dd5edaa63208faafc1d
                                • Instruction Fuzzy Hash: F841E3F0508345EFC734DFA4D858A6677F8FB66308F20891DE44A87A81E7309546CB72
                                APIs
                                • CharNextW.USER32(?,?,C:\,?,00405DE2,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405D7C
                                • CharNextW.USER32(00000000), ref: 00405D81
                                • CharNextW.USER32(00000000), ref: 00405D99
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: CharNext
                                • String ID: C:\
                                • API String ID: 3213498283-3404278061
                                • Opcode ID: a494e05d27702b27be76eb2108b1f7c475580a471c546fdda9206c4fb56a95c9
                                • Instruction ID: 839f6a4cd7818f8bbcc29dd9d6e935739f9a8baf6e4a15472bca77c663bd0c43
                                • Opcode Fuzzy Hash: a494e05d27702b27be76eb2108b1f7c475580a471c546fdda9206c4fb56a95c9
                                • Instruction Fuzzy Hash: 1FF09022920F1296DB3177545C4DE7B5BB8EF54760B00C43BE601B72C1E3B84C818EAA
                                APIs
                                • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040348F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00405CC9
                                • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040348F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00405CD3
                                • lstrcatW.KERNEL32(?,0040A014,?,00000007,00000009,0000000B), ref: 00405CE5
                                Strings
                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00405CC3
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: CharPrevlstrcatlstrlen
                                • String ID: C:\Users\user\AppData\Local\Temp\
                                • API String ID: 2659869361-3081826266
                                • Opcode ID: bed06d4f6a82b163f62297ef23baf12e7c7e8c5859eb2f34a161a285e0ec4316
                                • Instruction ID: 20018de61182ae54b5e078598b4ece42ca391df12eccfc729252e8f5514d5294
                                • Opcode Fuzzy Hash: bed06d4f6a82b163f62297ef23baf12e7c7e8c5859eb2f34a161a285e0ec4316
                                • Instruction Fuzzy Hash: 78D0A731101A30AAD1117B448D04CDF629CFE85304341403BF202B30A2C77C1D5387FD
                                APIs
                                • DestroyWindow.USER32(00000000,00000000,0040318F,00000001,?,00000007,00000009,0000000B), ref: 00402FC4
                                • GetTickCount.KERNEL32 ref: 00402FE2
                                • CreateDialogParamW.USER32(0000006F,00000000,00402F2B,00000000), ref: 00402FFF
                                • ShowWindow.USER32(00000000,00000005,?,00000007,00000009,0000000B), ref: 0040300D
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: Window$CountCreateDestroyDialogParamShowTick
                                • String ID:
                                • API String ID: 2102729457-0
                                • Opcode ID: 5e41244d60e94df7afa5422e741b36603cd51d1290bb4582c8306ab25b36019d
                                • Instruction ID: 8c281f3aa7e88f802b7d8bba4993e69035ed424970cff038758a163d63a680ad
                                • Opcode Fuzzy Hash: 5e41244d60e94df7afa5422e741b36603cd51d1290bb4582c8306ab25b36019d
                                • Instruction Fuzzy Hash: 3AF0BE30506221ABC2616F60FE0CA8B3B78FB44B51705C83BF101F11E4CB3808819B9D
                                APIs
                                • FreeLibrary.KERNEL32(?,74DF3420,00000000,C:\Users\user\AppData\Local\Temp\,00403A00,00403816,00000007,?,00000007,00000009,0000000B), ref: 00403A42
                                • GlobalFree.KERNEL32(00C017C0), ref: 00403A49
                                Strings
                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00403A28
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: Free$GlobalLibrary
                                • String ID: C:\Users\user\AppData\Local\Temp\
                                • API String ID: 1100898210-3081826266
                                • Opcode ID: 6ef17ecbb981fa3a9d26a37a654407d639bd202e425e8d1c53e2791914a5cf50
                                • Instruction ID: 10b089f61d7fd26560bcfb3f790e8945b6a0be01d7b58778b04adbc7300f8739
                                • Opcode Fuzzy Hash: 6ef17ecbb981fa3a9d26a37a654407d639bd202e425e8d1c53e2791914a5cf50
                                • Instruction Fuzzy Hash: 64E0123360112057C6215F45FE0475ABB7D6F49B26F06803BE9C0BB26087785C838FD8
                                APIs
                                • lstrlenW.KERNEL32(?,C:\Users\user\Desktop,00403081,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\yuc1Jwlkh5.exe,C:\Users\user\Desktop\yuc1Jwlkh5.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405D15
                                • CharPrevW.USER32(?,00000000,?,C:\Users\user\Desktop,00403081,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\yuc1Jwlkh5.exe,C:\Users\user\Desktop\yuc1Jwlkh5.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405D25
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: CharPrevlstrlen
                                • String ID: C:\Users\user\Desktop
                                • API String ID: 2709904686-224404859
                                • Opcode ID: ca28fb495e832aca3bc5bc38fa8d5a1d536c38e2997e226eadf599fe90d3b243
                                • Instruction ID: 3b4219a6871f3e4e2040e57eeeef2aaac809f1ec38f5d31038b50c09059f2d31
                                • Opcode Fuzzy Hash: ca28fb495e832aca3bc5bc38fa8d5a1d536c38e2997e226eadf599fe90d3b243
                                • Instruction Fuzzy Hash: 97D05EB34109209AE3127704DC0599F73E8EF5530074A8467E541A61A5D7785C818AAC
                                APIs
                                • GlobalAlloc.KERNEL32(00000040,?), ref: 6CE7116A
                                • GlobalFree.KERNEL32(00000000), ref: 6CE711C7
                                • GlobalFree.KERNEL32(00000000), ref: 6CE711D9
                                • GlobalFree.KERNEL32(?), ref: 6CE71203
                                Memory Dump Source
                                • Source File: 00000000.00000002.2200930121.000000006CE71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE70000, based on PE: true
                                • Associated: 00000000.00000002.2200719452.000000006CE70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.2201043872.000000006CE74000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.2201083821.000000006CE76000.00000002.00000001.01000000.00000006.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6ce70000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: Global$Free$Alloc
                                • String ID:
                                • API String ID: 1780285237-0
                                • Opcode ID: 15d5446ba50acac2ff0b55406aa4b8b88fe4284c73dbd142dd967de93b2141fb
                                • Instruction ID: c990025c8641ce1be0d5e8e21faad9896afe78f1f7e1f4da79150f926b3e6319
                                • Opcode Fuzzy Hash: 15d5446ba50acac2ff0b55406aa4b8b88fe4284c73dbd142dd967de93b2141fb
                                • Instruction Fuzzy Hash: 0031A3B26063219BDB21CFE8C86996577F8FB06318720051AE849DBB14E734D805C770
                                APIs
                                • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E59
                                • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405E71
                                • CharNextA.USER32(00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E82
                                • lstrlenA.KERNEL32(00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E8B
                                Memory Dump Source
                                • Source File: 00000000.00000002.2157421983.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2156975332.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157515895.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2157534374.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2163442993.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_yuc1Jwlkh5.jbxd
                                Similarity
                                • API ID: lstrlen$CharNextlstrcmpi
                                • String ID:
                                • API String ID: 190613189-0
                                • Opcode ID: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                • Instruction ID: a1795947179755a411c98c1569971d2b6f4e38ea7894d212e8297337e4f71977
                                • Opcode Fuzzy Hash: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                • Instruction Fuzzy Hash: E2F06231504514FFD7129BA5DD409AEBBA8EF06250B2540BAE884FB250D674DF029BE9