Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Setup.exe

Overview

General Information

Sample name:Setup.exe
Analysis ID:1558587
MD5:716a34c1339da740605493398067b147
SHA1:bd1637bb6c98fa7134e322c283b72269340a79c5
SHA256:7de8aa46aeb2240ba3a17691fbbd06c1ea72600b36fceb8bdd9c950dd867a69b
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Machine Learning detection for sample
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
PE file contains an invalid checksum
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Setup.exe (PID: 7032 cmdline: "C:\Users\user\Desktop\Setup.exe" MD5: 716A34C1339DA740605493398067B147)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Setup.exeJoe Sandbox ML: detected
Source: Setup.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: Setup.exeStatic PE information: certificate valid
Source: Setup.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\zak\Downloads\Inetc\Unicode\Plugins\inetc.pdb source: Setup.exe, 00000000.00000002.2706824623.000000006FD77000.00000002.00000001.01000000.0000000A.sdmp, inetc.dll.0.dr
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C49
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,0_2_00406873
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B
Source: Joe Sandbox ViewIP Address: 207.246.91.177 207.246.91.177
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_6D25332C lstrcmpiW,lstrcmpiW,InternetOpenW,GlobalAlloc,lstrcmpiW,GetLastError,lstrlenW,lstrlenW,GlobalAlloc,GlobalAlloc,InternetCrackUrlW,InternetConnectW,lstrcpyW,lstrcpyW,InternetSetOptionW,lstrlenW,InternetSetOptionW,lstrlenW,InternetSetOptionW,InternetSetOptionW,lstrlenW,InternetSetOptionW,lstrlenW,InternetSetOptionW,InternetSetOptionW,InternetSetOptionW,InternetSetOptionW,HttpOpenRequestW,HttpAddRequestHeadersW,HttpAddRequestHeadersW,lstrcmpiW,HttpAddRequestHeadersW,lstrlenW,lstrlenW,GlobalAlloc,lstrcpyW,lstrcatW,lstrcatW,lstrcatW,HttpAddRequestHeadersW,GlobalFree,GetLastError,lstrcmpiW,lstrlenW,HttpSendRequestW,GetLastError,lstrlenW,HttpSendRequestW,GetLastError,GlobalFree,GlobalFree,HttpSendRequestW,GetLastError,InternetQueryDataAvailable,GlobalAlloc,InternetReadFile,GetLastError,GlobalFree,GetLastError,HttpQueryInfoW,GetLastError,GlobalAlloc,HttpQueryInfoW,GlobalFree,InternetCloseHandle,GetLastError,InternetCloseHandle,GetLastError,GetLastError,GlobalFree,GlobalFree,GlobalFree,GlobalFree,InternetCloseHandle,GetLastError,0_2_6D25332C
Source: global trafficDNS traffic detected: DNS query: pcapp.store
Source: Setup.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: Setup.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: Setup.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: Setup.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: Setup.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: Setup.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: Setup.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: Setup.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: Setup.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: Setup.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: Setup.exeString found in binary or memory: http://ocsp.digicert.com0
Source: Setup.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: Setup.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: Setup.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: Setup.exeString found in binary or memory: http://www.digicert.com/CPS0
Source: Setup.exe, 00000000.00000002.2705548133.0000000000514000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://delivery.pcapp.store/download.php?&src=mini_installer&file=1&mini_ver=&evt_src=fa_mini_insta
Source: Setup.exe, 00000000.00000002.2706325838.0000000002BA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/
Source: Setup.exe, 00000000.00000002.2706325838.0000000002BA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/3
Source: Setup.exe, 00000000.00000002.2706325838.0000000002BA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/32
Source: Setup.exe, 00000000.00000002.2706325838.0000000002BA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/:
Source: Setup.exe, 00000000.00000002.2706325838.0000000002BA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/inst_cpg.php?guid=9AC52742-8547-84D6-5349-ECEC87A66D67&_fcid=1731963210091936&ve
Source: Setup.exe, 00000000.00000002.2705548133.0000000000514000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/installing.php?guid=&winver=
Source: Setup.exe, 00000000.00000002.2706325838.0000000002BA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/m
Source: Setup.exe, 00000000.00000002.2706325838.0000000002BA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/ows
Source: Setup.exeString found in binary or memory: https://pcapp.store/pixel.gif?guid=
Source: Setup.exe, 00000000.00000002.2706325838.0000000002BA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/pixel.gif?guid=9AC52742-8547-84D6-5349-ECEC87A66D67&version=fa.1092c&evt_src=fa_
Source: Setup.exe, 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://pcapp.store/pixel.gif?guid=ility
Source: Setup.exe, 00000000.00000002.2705548133.0000000000514000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/privacy.html?guid=welhttps://pcapp.store/pixel.gif?guid=&version=&evt_src=fa_min
Source: Setup.exe, 00000000.00000002.2705548133.0000000000514000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/tos.html?guid=
Source: Setup.exe, 00000000.00000002.2706325838.0000000002BA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pcapp.store/u
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_004056DE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004056DE
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352D
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0040755C0_2_0040755C
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00406D850_2_00406D85
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_6D25332C0_2_6D25332C
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_6D261BFF0_2_6D261BFF
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_6FD710C80_2_6FD710C8
Source: Setup.exeBinary or memory string: OriginalFilename vs Setup.exe
Source: Setup.exe, 00000000.00000002.2706980410.000000006FD7F000.00000002.00000001.01000000.0000000A.sdmpBinary or memory string: OriginalFilenameinetc.dllF vs Setup.exe
Source: Setup.exe, 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpBinary or memory string: OriginalFilenamensJSON.dllH vs Setup.exe
Source: Setup.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal48.evad.winEXE@1/7@1/1
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352D
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0040498A GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_0040498A
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_004021AA CoCreateInstance,0_2_004021AA
Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Users\user\AppData\Local\Temp\nsdA4EF.tmpJump to behavior
Source: Setup.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Name from Win32_Processor
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select MaxClockSpeed from Win32_Processor
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select NumberOfCores from Win32_Processor
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select NumberOfLogicalProcessors from Win32_Processor
Source: C:\Users\user\Desktop\Setup.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\Setup.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\Setup.exeFile read: C:\Users\user\Desktop\Setup.exeJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: acgenral.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Setup.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: Setup.exeStatic PE information: certificate valid
Source: Setup.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\zak\Downloads\Inetc\Unicode\Plugins\inetc.pdb source: Setup.exe, 00000000.00000002.2706824623.000000006FD77000.00000002.00000001.01000000.0000000A.sdmp, inetc.dll.0.dr
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_6D261BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6D261BFF
Source: Setup.exeStatic PE information: real checksum: 0x3937f should be: 0x33d16
Source: System.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x3d68
Source: nsJSON.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x6718
Source: inetc.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x13c41
Source: NSISFastLib.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x30512
Source: nsDialogs.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x2f9b
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_6D2630C0 push eax; ret 0_2_6D2630EE
Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Users\user\AppData\Local\Temp\nsiA50F.tmp\NSISFastLib.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Users\user\AppData\Local\Temp\nsiA50F.tmp\nsJSON.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Users\user\AppData\Local\Temp\nsiA50F.tmp\inetc.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Users\user\AppData\Local\Temp\nsiA50F.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Users\user\AppData\Local\Temp\nsiA50F.tmp\nsDialogs.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Caption from Win32_DiskDrive
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Size from Win32_DiskDrive
Source: C:\Users\user\Desktop\Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsiA50F.tmp\NSISFastLib.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsiA50F.tmp\nsJSON.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsiA50F.tmp\inetc.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsiA50F.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsiA50F.tmp\nsDialogs.dllJump to dropped file
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select ReleaseDate from Win32_BIOS
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select UUID from Win32_ComputerSystemProduct
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Vendor from Win32_ComputerSystemProduct
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Version from Win32_ComputerSystemProduct
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select Name from Win32_Processor
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select MaxClockSpeed from Win32_Processor
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select NumberOfCores from Win32_Processor
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : Select NumberOfLogicalProcessors from Win32_Processor
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C49
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,0_2_00406873
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B
Source: Setup.exe, 00000000.00000003.1464842884.00000000005BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: {"system_stats":{"os_name":"Microsoft+Windows+10+Pro","os_installdate":"20231003105718%2E000000%2B120","os_processes":"104","os_architecture":"64-bit","os_virtmem":"8387636","os_mem":"4193332","cpu_name":"Intel%28R%29+Core%28TM%292+CPU+6600+%40+2%2E40+GHz","cpu_maxclock":"2000","cpu_cores":"4","cpu_logicalproc":"1","pc_vendor":"VMware%2C+Inc%2E","pc_version":"None","gpu_name":"BW_RP","gpu_ram":"0","gpu_bitsperpixel":"32","gpu_x":"1280","gpu_y":"1024","disk_name":"PE9ZC_7M+SCSI+Disk+Device","disk_size":"412300001200","sec_as":"","sec_av":"Windows+Defender","sec_fw":"","bios_releasedate":"20221121000000%2E000000%2B000"},"pcapps":{"0":"7-Zip+23%2E01+%28x64%29","1":"Mozilla+Firefox+%28x64+en-US%29","2":"Mozilla+Maintenance+Service","3":"Microsoft+Office+Professional+Plus+2019+-+en-us","4":"Microsoft+Visual+C%2B%2B+2022+X64+Additional+Runtime+-+14%2E36%2E32532","5":"Office+16+Click-to-Run+Licensing+Component","6":"Office+16+Click-to-Run+Extensibility+Component+64-bit+Registration","7":"Adobe+Acrobat+%2864-bit%29","8":"Microsoft+Visual+C%2B%2B+2022+X64+Minimum+Runtime+-+14%2E36%2E32532","9":"Google+Chrome","10":"Microsoft+Edge","11":"Microsoft+Edge+Update","12":"Microsoft+Edge+WebView2+Runtime","13":"Java+Auto+Updater","14":"Java+8+Update+381","15":"Microsoft+Visual+C%2B%2B+2015-2022+Redistributable+%28x64%29+-+14%2E36%2E32532","16":"Office+16+Click-to-Run+Extensibility+Component"},"processes":{"0":"ApplicationFrameHost%2Eexe","1":"BkRNtHSWRJfXnioexJQIP%2Eexe","2":"Memory+Compression","3":"OfficeClickToRun%2Eexe","4":"Registry","5":"RuntimeBroker%2Eexe","6":"SearchApp%2Eexe","7":"Setup%2Eexe","8":"SgrmBroker%2Eexe","9":"StartMenuExperienceHost%2Eexe","10":"System","11":"SystemSettings%2Eexe","12":"TextInputHost%2Eexe","13":"WinStore%2EApp%2Eexe","14":"WmiPrvSE%2Eexe","15":"%5BSystem+Process%5D","16":"backgroundTaskHost%2Eexe","17":"conhost%2Eexe","18":"csrss%2Eexe","19":"ctfmon%2Eexe","20":"dasHost%2Eexe","21":"dllhost%2Eexe","22":"dwm%2Eexe","23":"explorer%2Eexe","24":"fontdrvhost%2Eexe","25":"lsass%2Eexe","26":"services%2Eexe","27":"sihost%2Eexe","28":"smartscreen%2Eexe","29":"smss%2Eexe","30":"spoolsv%2Eexe","31":"sppsvc%2Eexe","32":"svchost%2Eexe","33":"upfc%2Eexe","34":"wininit%2Eexe","35":"winlogon%2Eexe"},"sys_lang":"en-GB","parent_proc":"explorer%2Eexe"}
Source: Setup.exe, 00000000.00000003.1793222723.0000000000580000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000002.2705548133.000000000057F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW8
Source: Setup.exe, 00000000.00000002.2705548133.0000000000549000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware, Inc.
Source: Setup.exe, 00000000.00000003.1463871336.00000000005BD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: {"system_stats":{"os_name":"Microsoft+Windows+10+Pro","os_installdate":"20231003105718%2E000000%2B120","os_processes":"104","os_architecture":"64-bit","os_virtmem":"8387636","os_mem":"4193332","cpu_name":"Intel%28R%29+Core%28TM%292+CPU+6600+%40+2%2E40+GHz","cpu_maxclock":"2000","cpu_cores":"4","cpu_logicalproc":"1","pc_vendor":"VMware%2C+Inc%2E","pc_version":"None","gpu_name":"BW_RP","gpu_ram":"0","gpu_bitsperpixel":"32","gpu_x":"1280","gpu_y":"1024","disk_name":"PE9ZC_7M+SCSI+Disk+Device","disk_size":"412300001200","sec_as":"","sec_av":"Windows+Defender","sec_fw":"","bios_releasedate":"20221121000000%2E000000%2B000"},"pcapps":{"0":"7-Zip+23%2E01+%28x64%29","1":"Mozilla+Firefox+%28x64+en-US%29","2":"Mozilla+Maintenance+Service","3":"Microsoft+Office+Professional+Plus+2019+-+en-us","4":"Microsoft+Visual+C%2B%2B+2022+X64+Additional+Runtime+-+14%2E36%2E32532","5":"Office+16+Click-to-Run+Licensing+Component","6":"Office+16+Click-to-Run+Extensibility+Component+64-bit+Registration","7":"Adobe+Acrobat+%2864-bit%29","8":"Microsoft+Visual+C%2B%2B+2022+X64+Minimum+Runtime+-+14%2E36%2E32532","9":"Google+Chrome","10":"Microsoft+Edge","11":"Microsoft+Edge+Update","12":"Microsoft+Edge+WebView2+Runtime","13":"Java+Auto+Updater","14":"Java+8+Update+381","15":"Microsoft+Visual+C%2B%2B+2015-2022+Redistributable+%28x64%29+-+14%2E36%2E32532","16":"Office+16+Click-to-Run+Extensibility+Component"},"processes":{"0":"ApplicationFrameHost%2Eexe","1":"BkRNtHSWRJfXnioexJQIP%2Eexe","2":"Memory+Compression","3":"OfficeClickToRun%2Eexe","4":"Registry","5":"RuntimeBroker%2Eexe","6":"SearchApp%2Eexe","7":"Setup%2Eexe","8":"SgrmBroker%2Eexe","9":"StartMenuExperienceHost%2Eexe","10":"System","11":"SystemSettings%2Eexe","12":"TextInputHost%2Eexe",
Source: Setup.exe, 00000000.00000003.1463871336.00000000005AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: {"system_stats":{"os_name":"Microsoft+Windows+10+Pro","os_installdate":"20231003105718%2E000000%2B120","os_processes":"104","os_architecture":"64-bit","os_virtmem":"8387636","os_mem":"4193332","cpu_name":"Intel%28R%29+Core%28TM%292+CPU+6600+%40+2%2E40+GHz","cpu_maxclock":"2000","cpu_cores":"4","cpu_logicalproc":"1","pc_vendor":"VMware%2C+Inc%2E","pc_version":"None","gpu_name":"BW_RP","gpu_ram":"0","gpu_bitsperpixel":"32","gpu_x":"1280","gpu_y":"1024","disk_name":"PE9ZC_7M+SCSI+Disk+Device","disk_size":"412300001200","sec_as":"","sec_av":"Windows+Defender","sec_fw":"","bios_releasedate":"20221121000000%2E000000%2B000"},"pcapps":{"0":"7-Zip+23%2E01+%28x64%29","1":"Mozilla+Firefox+%28x64+en-US%29","2":"Mozilla+Maintenance+Service","3":"Microsoft+Office+Professional+Plus+2019+-+en-us","4":"Microsoft+Visual+C%2B%2B+2022+X64+Additional+Runtime+-+14%2E36%2E32532","5":"Office+16+Click-to-Run+Licensing+Component","6":"Office+16+Click-to-Run+Extensibility+Component+64-bit+Registration","7":"Adobe+Acrobat+%2864-bit%29","8":"Microsoft+Visual+C%2B%2B+2022+X64+Minimum+Runtime+-+14%2E36%2E32532","9":"Google+Chrome","10":"Microsoft+Edge","11":"Microsoft+Edge+Update","12":"Microsoft+Edge+WebView2+Runtime","13":"Java+Auto+Updater","14":"Java+8+Update+381","15":"Microsoft+Visual+C%2B%2B+2015-2022+Redistributable+%28x64%29+-+14%2E36%2E32532","16":"Office+16+Click-to-Run+Extensibility+Component"},"processes":{"0":"ApplicationFrameHost%2Eexe","1":"BkRNtHSWRJfXnioexJQIP%2Eexe","2":"Memory+Compression","3":"OfficeClickToRun%2Eexe",
Source: Setup.exe, 00000000.00000003.1463871336.00000000005AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: {"system_stats":{"os_name":"Microsoft+Windows+10+Pro","os_installdate":"20231003105718%2E000000%2B120","os_processes":"104","os_architecture":"64-bit","os_virtmem":"8387636","os_mem":"4193332","cpu_name":"Intel%28R%29+Core%28TM%292+CPU+6600+%40+2%2E40+GHz","cpu_maxclock":"2000","cpu_cores":"4","cpu_logicalproc":"1","pc_vendor":"VMware%2C+Inc%2E","pc_version":"None","gpu_name":"BW_RP","gpu_ram":"0","gpu_bitsperpixel":"32","gpu_x":"1280","gpu_y":"1024","disk_name":"PE9ZC_7M+SCSI+Disk+Device","disk_size":"412300001200","sec_as":"","sec_av":"Windows+Defender","sec_fw":"","bios_releasedate":"20221121000000%2E000000%2B000"},"pcapps":{"0":"7-Zip+23%2E01+%28x64%29","1":"Mozilla+Firefox+%28x64+en-US%29","2":"Mozilla+Maintenance+Service","3":"Microsoft+Office+Professional+Plus+2019+-+en-us","4":"Microsoft+Visual+C%2B%2B+2022+X64+Additional+Runtime+-+14%2E36%2E32532","5":"Office+16+Click-to-Run+Licensing+Component","6":"Office+16+Click-to-Run+Extensibility+Component+64-bit+Registration","7":"Adobe+Acrobat+%2864-bit%29",
Source: Setup.exe, 00000000.00000003.1793167477.0000000002BA8000.00000004.00000020.00020000.00000000.sdmp, Setup.exe, 00000000.00000002.2706325838.0000000002BA0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Setup.exe, 00000000.00000003.1463703178.000000000059C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: s":"4","cpu_logicalproc":"1","pc_vendor":"VMware%2C+Inc%2E","pc_version":"None","gpu_name":"BW_RP","gpu_ram":"0","gpu_bitsperpixel":"32","gpu_x":"1280","gpu_y":"1024","disk_name":"PE9ZC_7M+SCSI+Disk+Device",
Source: Setup.exe, 00000000.00000002.2705548133.0000000000549000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware%2C+Inc%2E
Source: Setup.exe, 00000000.00000003.1463703178.00000000005AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: {"system_stats":{"os_name":"Microsoft+Windows+10+Pro","os_installdate":"20231003105718%2E000000%2B120","os_processes":"104","os_architecture":"64-bit","os_virtmem":"8387636","os_mem":"4193332","cpu_name":"Intel%28R%29+Core%28TM%292+CPU+6600+%40+2%2E40+GHz","cpu_maxclock":"2000","cpu_cores":"4","cpu_logicalproc":"1","pc_vendor":"VMware%2C+Inc%2E","pc_version":"None","gpu_name":"BW_RP","gpu_ram":"0","gpu_bitsperpixel":"32","gpu_x":"1280","gpu_y":"1024","disk_name":"PE9ZC_7M+SCSI+Disk+Device","disk_size":"412300001200","sec_as":"","sec_av":"Windows+Defender","sec_fw":"","bios_releasedate":"20221121000000%2E000000%2B000"},"pcapps":{
Source: Setup.exe, 00000000.00000003.1464842884.00000000005BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: {"system_stats":{"os_name":"Microsoft+Windows+10+Pro","os_installdate":"20231003105718%2E000000%2B120","os_processes":"104","os_architecture":"64-bit","os_virtmem":"8387636","os_mem":"4193332","cpu_name":"Intel%28R%29+Core%28TM%292+CPU+6600+%40+2%2E40+GHz","cpu_maxclock":"2000","cpu_cores":"4","cpu_logicalproc":"1","pc_vendor":"VMware%2C+Inc%2E","pc_version":"None","gpu_name":"BW_RP","gpu_ram":"0","gpu_bitsperpixel":"32","gpu_x":"1280","gpu_y":"1024","disk_name":"PE9ZC_7M+SCSI+Disk+Device","disk_size":"412300001200","sec_as":"","sec_av":"Windows+Defender","sec_fw":"","bios_releasedate":"20221121000000%2E000000%2B000"},"pcapps":{"0":"7-Zip+23%2E01+%28x64%29","1":"Mozilla+Firefox+%28x64+en-US%29","2":"Mozilla+Maintenance+Service","3":"Microsoft+Office+Professional+Plus+2019+-+en-us","4":"Microsoft+Visual+C%2B%2B+2022+X64+Additional+Runtime+-+14%2E36%2E32532","5":"Office+16+Click-to-Run+Licensing+Component","6":"Office+16+Click-to-Run+Extensibility+Component+64-bit+Registration","7":"Adobe+Acrobat+%2864-bit%29","8":"Microsoft+Visual+C%2B%2B+2022+X64+Minimum+Runtime+-+14%2E36%2E32532","9":"Google+Chrome","10":"Microsoft+Edge","11":"Microsoft+Edge+Update","12":"Microsoft+Edge+WebView2+Runtime","13":"Java+Auto+Updater","14":"Java+8+Update+381","15":"Microsoft+Visual+C%2B%2B+2015-2022+Redistributable+%28x64%29+-+14%2E36%2E32532","16":"Office+16+Click-to-Run+Extensibility+Component"},"processes":{"0":"ApplicationFrameHost%2Eexe","1":"BkRNtHSWRJfXnioexJQIP%2Eexe","2":"Memory+Compression","3":"OfficeClickToRun%2Eexe","4":"Registry","5":"RuntimeBroker%2Eexe","6":"SearchApp%2Eexe","7":"Setup%2Eexe","8":"SgrmBroker%2Eexe","9":"StartMenuExperienceHost%2Eexe","10":"System","11":"SystemSettings%2Eexe","12":"TextInputHost%2Eexe","13":"WinStore%2EApp%2Eexe","14":"WmiPrvSE%2Eexe","15":"%5BSystem+Process%5D","16":"backgroundTaskHost%2Eexe","17":"conhost%2Eexe","18":"csrss%2Eexe","19":"ctfmon%2Eexe","20":"dasHost%2Eexe","21":"dllhost%2Eexe","22":"dwm%2Eexe","23":"explorer%2Eexe","24":"fontdrvhost%2Eexe","25":"lsass%2Eexe",
Source: C:\Users\user\Desktop\Setup.exeAPI call chain: ExitProcess graph end nodegraph_0-7947
Source: C:\Users\user\Desktop\Setup.exeAPI call chain: ExitProcess graph end nodegraph_0-7951
Source: C:\Users\user\Desktop\Setup.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_6D261BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6D261BFF
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_6FD918C9 CreateControl,GetProcessHeap,GetProcessHeap,HeapAlloc,GetProcessHeap,GetProcessHeap,HeapReAlloc,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,CreateWindowExW,SetPropW,SendMessageW,SendMessageW,SendMessageW,SetWindowLongW,GetProcessHeap,HeapFree,0_2_6FD918C9
Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352D
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : Select displayName from AntiSpywareProduct
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : Select displayName from AntiVirusProduct
Source: C:\Users\user\Desktop\Setup.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : Select displayName from FirewallProduct
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts141
Windows Management Instrumentation
1
DLL Side-Loading
1
Access Token Manipulation
12
Virtualization/Sandbox Evasion
OS Credential Dumping141
Security Software Discovery
Remote Services1
Archive Collected Data
12
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization Scripts1
DLL Side-Loading
1
Access Token Manipulation
LSASS Memory12
Virtualization/Sandbox Evasion
Remote Desktop Protocol1
Clipboard Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS2
File and Directory Discovery
Distributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets124
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Setup.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\nsiA50F.tmp\NSISFastLib.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsiA50F.tmp\System.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsiA50F.tmp\inetc.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsiA50F.tmp\nsDialogs.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsiA50F.tmp\nsJSON.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
pcapp.store
207.246.91.177
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    https://pcapp.store/inst_cpg.php?guid=9AC52742-8547-84D6-5349-ECEC87A66D67&_fcid=1731963210091936&veSetup.exe, 00000000.00000002.2706325838.0000000002BA0000.00000004.00000020.00020000.00000000.sdmpfalse
      high
      https://pcapp.store/pixel.gif?guid=ilitySetup.exe, 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpfalse
        high
        https://pcapp.store/pixel.gif?guid=Setup.exefalse
          high
          https://pcapp.store/32Setup.exe, 00000000.00000002.2706325838.0000000002BA0000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            https://pcapp.store/mSetup.exe, 00000000.00000002.2706325838.0000000002BA0000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              http://nsis.sf.net/NSIS_ErrorErrorSetup.exefalse
                high
                https://pcapp.store/3Setup.exe, 00000000.00000002.2706325838.0000000002BA0000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://delivery.pcapp.store/download.php?&src=mini_installer&file=1&mini_ver=&evt_src=fa_mini_instaSetup.exe, 00000000.00000002.2705548133.0000000000514000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://pcapp.store/pixel.gif?guid=9AC52742-8547-84D6-5349-ECEC87A66D67&version=fa.1092c&evt_src=fa_Setup.exe, 00000000.00000002.2706325838.0000000002BA0000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://pcapp.store/privacy.html?guid=welhttps://pcapp.store/pixel.gif?guid=&version=&evt_src=fa_minSetup.exe, 00000000.00000002.2705548133.0000000000514000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://pcapp.store/uSetup.exe, 00000000.00000002.2706325838.0000000002BA0000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://pcapp.store/owsSetup.exe, 00000000.00000002.2706325838.0000000002BA0000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://pcapp.store/Setup.exe, 00000000.00000002.2706325838.0000000002BA0000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://pcapp.store/tos.html?guid=Setup.exe, 00000000.00000002.2705548133.0000000000514000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://pcapp.store/:Setup.exe, 00000000.00000002.2706325838.0000000002BA0000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://pcapp.store/installing.php?guid=&winver=Setup.exe, 00000000.00000002.2705548133.0000000000514000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    207.246.91.177
                                    pcapp.storeUnited States
                                    20473AS-CHOOPAUSfalse
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1558587
                                    Start date and time:2024-11-19 15:58:15 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 4m 57s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:7
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:Setup.exe
                                    Detection:MAL
                                    Classification:mal48.evad.winEXE@1/7@1/1
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 100%
                                    • Number of executed functions: 53
                                    • Number of non-executed functions: 74
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                    • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • VT rate limit hit for: Setup.exe
                                    No simulations
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    207.246.91.177Setup.exeGet hashmaliciousUnknownBrowse
                                      Setup.exeGet hashmaliciousUnknownBrowse
                                        Setup.exeGet hashmaliciousUnknownBrowse
                                          Setup.exeGet hashmaliciousUnknownBrowse
                                            Setup.exeGet hashmaliciousUnknownBrowse
                                              Setup.exeGet hashmaliciousUnknownBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                pcapp.storehttps://pivotanimator.net/Download.phpGet hashmaliciousUnknownBrowse
                                                • 45.32.1.23
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                AS-CHOOPAUSowari.arm7.elfGet hashmaliciousMiraiBrowse
                                                • 45.32.45.196
                                                owari.ppc.elfGet hashmaliciousUnknownBrowse
                                                • 104.238.167.204
                                                0kToM9fVGQ.exeGet hashmaliciousXmrigBrowse
                                                • 95.179.241.203
                                                x86.elfGet hashmaliciousUnknownBrowse
                                                • 192.248.174.148
                                                Xa04iTOvv5.exeGet hashmaliciousUnknownBrowse
                                                • 199.247.4.86
                                                https://stopify.co/BOAZ81Get hashmaliciousUnknownBrowse
                                                • 45.77.159.83
                                                botx.mpsl.elfGet hashmaliciousMiraiBrowse
                                                • 204.80.154.20
                                                botx.sh4.elfGet hashmaliciousMiraiBrowse
                                                • 108.61.212.81
                                                x86.elfGet hashmaliciousUnknownBrowse
                                                • 44.174.151.192
                                                PO-341999-PDF.exeGet hashmaliciousAsyncRATBrowse
                                                • 95.179.135.209
                                                No context
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                C:\Users\user\AppData\Local\Temp\nsiA50F.tmp\NSISFastLib.dllSetup.exeGet hashmaliciousUnknownBrowse
                                                  Setup.exeGet hashmaliciousUnknownBrowse
                                                    Setup.exeGet hashmaliciousUnknownBrowse
                                                      Setup.exeGet hashmaliciousUnknownBrowse
                                                        Setup.exeGet hashmaliciousUnknownBrowse
                                                          Setup.exeGet hashmaliciousUnknownBrowse
                                                            Setup.exeGet hashmaliciousUnknownBrowse
                                                              Setup.exeGet hashmaliciousUnknownBrowse
                                                                Setup.exeGet hashmaliciousUnknownBrowse
                                                                  Setup.exeGet hashmaliciousUnknownBrowse
                                                                    Process:C:\Users\user\Desktop\Setup.exe
                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):140288
                                                                    Entropy (8bit):6.334087823000165
                                                                    Encrypted:false
                                                                    SSDEEP:3072:H5dnvmOEATceozVDkRasOCdUFZrR7beB2SK0XCC+W/ST+BeXZQUC5:ZdnvmsTceZUtCdUFZr9b4KznC5
                                                                    MD5:9C7A4D75F08D40AD6F5250DF6739C1B8
                                                                    SHA1:793749511C61B00A793D0AEA487E366256DD1B95
                                                                    SHA-256:6EB17C527C9E7F7FEA1FDB2EA152E957B50A56796E53CE1E5946B165B82DEAEF
                                                                    SHA-512:E85235307B85FFD3AAB76FF6290BEE0B3B9FD74C61A812B5355FE7B854D4C6B77BD521E52638D28E249A43D9EC7AA6F2670AF2B1C671091492C7FE19D6F9A4E6
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Joe Sandbox View:
                                                                    • Filename: Setup.exe, Detection: malicious, Browse
                                                                    • Filename: Setup.exe, Detection: malicious, Browse
                                                                    • Filename: Setup.exe, Detection: malicious, Browse
                                                                    • Filename: Setup.exe, Detection: malicious, Browse
                                                                    • Filename: Setup.exe, Detection: malicious, Browse
                                                                    • Filename: Setup.exe, Detection: malicious, Browse
                                                                    • Filename: Setup.exe, Detection: malicious, Browse
                                                                    • Filename: Setup.exe, Detection: malicious, Browse
                                                                    • Filename: Setup.exe, Detection: malicious, Browse
                                                                    • Filename: Setup.exe, Detection: malicious, Browse
                                                                    Reputation:moderate, very likely benign file
                                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$......../.iTN.:TN.:TN.:.6.;^N.:.6.;.N.:.6.;@N.:.6.;UN.:...;AN.:...;DN.:...;{N.:.6.;_N.:TN.:'N.:B..;QN.:B..;UN.:B.%:UN.:TNM:UN.:B..;UN.:RichTN.:........................PE..L...z..f...........!...(.x...................................................`..............................................x...x....0..X....................@......0...............................p...@............................................text...0v.......x.................. ..`.rdata..\~...........|..............@..@.data...............................@....rsrc...X....0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Setup.exe
                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):12288
                                                                    Entropy (8bit):5.814115788739565
                                                                    Encrypted:false
                                                                    SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
                                                                    MD5:CFF85C549D536F651D4FB8387F1976F2
                                                                    SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
                                                                    SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
                                                                    SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Reputation:high, very likely benign file
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Setup.exe
                                                                    File Type:GIF image data, version 89a, 16 x 16
                                                                    Category:dropped
                                                                    Size (bytes):997
                                                                    Entropy (8bit):4.188896534234179
                                                                    Encrypted:false
                                                                    SSDEEP:12:2E5KZbHOjOruFw6MLxENScRVar7FC53tK1Oqd3Aa0n:tAlHOjOX60ENvRVZKbEn
                                                                    MD5:1636218C14C357455B5C872982E2A047
                                                                    SHA1:21FBD1308AF7AD25352667583A8DC340B0847DBC
                                                                    SHA-256:9B8B6285BF65F086E08701EEE04E57F2586E973A49C5A38660C9C6502A807045
                                                                    SHA-512:837FA6BCBE69A3728F5CB4C25C35C1D13E84B11232FC5279A91F21341892AD0E36003D86962C8AB1A056D3BEEB2652C754D51D6EC7EEE0E0EBFE19CD93FB5CB0
                                                                    Malicious:false
                                                                    Reputation:moderate, very likely benign file
                                                                    Preview:GIF89a............P..........4q...5j...O..F.].......................o..._.....5y.t........\....K>}...g..t....X...B..ET....t~....go..Jx...........|..U!f.|....>u.M.........w>..+r...|...A{.....t...E...b.8}....d....A.....R..y..l...w....G5u...{....t.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................!..NETSCAPE2.0.....!.......,...............H..A....`pp....~.xR......d.......,...D...)2 .1.....N` R......(@......,8RDA../..XB....P.F .....#...b`F...#8p......<\.`.........A....n|.CH...........+... .E.....d`.@......;
                                                                    Process:C:\Users\user\Desktop\Setup.exe
                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):39424
                                                                    Entropy (8bit):4.684597989866362
                                                                    Encrypted:false
                                                                    SSDEEP:384:njt65uI9oYzcCaHjl9Cb4I1f0AGhrHXoREnRxtIpH/u0abJ2v2DW9O9tk8ZwkpwD:noHtNQoRSIwTJB6Q/kPyBp6
                                                                    MD5:A35CDC9CF1D17216C0AB8C5282488EAD
                                                                    SHA1:ED8E8091A924343AD8791D85E2733C14839F0D36
                                                                    SHA-256:A793929232AFB78B1C5B2F45D82094098BCF01523159FAD1032147D8D5F9C4DF
                                                                    SHA-512:0F15B00D0BF2AABD194302E599D69962147B4B3EF99E5A5F8D5797A7A56FD75DD9DB0A667CFBA9C758E6F0DAB9CED126A9B43948935FE37FC31D96278A842BDF
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Reputation:moderate, very likely benign file
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........&.[.H.[.H.[.H.O.I.R.H.[.I...H...M.Y.H...L.Z.H...H.Z.H.....Z.H...J.Z.H.Rich[.H.................PE..L...n..c...........!.....T.........._........p............................... ............@..........................x......D...d...............................t....w..8...............................................D............................text....S.......T.................. ..`.rdata.......p.......X..............@..@.data....i...........d..............@....idata..A............v..............@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Setup.exe
                                                                    File Type:PC bitmap, Windows 3.x format, 164 x 314 x 4, image size 26376, resolution 2834 x 2834 px/m, cbSize 26494, bits offset 118
                                                                    Category:dropped
                                                                    Size (bytes):26494
                                                                    Entropy (8bit):1.9568109962493656
                                                                    Encrypted:false
                                                                    SSDEEP:24:Qwika6aSaaDaVYoG6abuJsnZs5GhI11BayNXPcDrSsUWcSphsWwlEWqCl6aHAX2x:Qoi47a5G8SddzKFIcsOz3Xz
                                                                    MD5:CBE40FD2B1EC96DAEDC65DA172D90022
                                                                    SHA1:366C216220AA4329DFF6C485FD0E9B0F4F0A7944
                                                                    SHA-256:3AD2DC318056D0A2024AF1804EA741146CFC18CC404649A44610CBF8B2056CF2
                                                                    SHA-512:62990CB16E37B6B4EFF6AB03571C3A82DCAA21A1D393C3CB01D81F62287777FB0B4B27F8852B5FA71BC975FEAB5BAA486D33F2C58660210E115DE7E2BD34EA63
                                                                    Malicious:false
                                                                    Preview:BM~g......v...(.......:............g..................................................................................DDD@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDD@@@@@@..DDD....DDDDDD........................................DDDDDDDDDD....DDDDDDDDD........DD@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDD@@@@DDDDDDDDDD@@@@@@D..DD....DDDDDDD......................................DDDDDDDDDD....DDDDDDDDDD......D..D@@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDDD@@@@@DDD..D.....DDDDDD......................................DDDDDDDDD.....DDDDDDDDD......DDD..@@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDDD@@@@@@DDDD.......DDDDDD.....................................DDDDDDDDDD....DDDDDDDDDD.....DDDDD..@@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDD@@@@@@DDDDDD.......DDDDDD....................................DDDDDDDDD....DDDDDDDDDD......DDDDDD..@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
                                                                    Process:C:\Users\user\Desktop\Setup.exe
                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                    Category:modified
                                                                    Size (bytes):9728
                                                                    Entropy (8bit):5.158136237602734
                                                                    Encrypted:false
                                                                    SSDEEP:96:o0svUu3Uy+sytcS8176b+XR8pCHFcMcxSgB5PKtAtgt+Nt+rnt3DVEB3YcNqkzfS:o0svWyNO81b8pCHFcM0PuAgkOyuIFc
                                                                    MD5:6C3F8C94D0727894D706940A8A980543
                                                                    SHA1:0D1BCAD901BE377F38D579AAFC0C41C0EF8DCEFD
                                                                    SHA-256:56B96ADD1978B1ABBA286F7F8982B0EFBE007D4A48B3DED6A4D408E01D753FE2
                                                                    SHA-512:2094F0E4BB7C806A5FF27F83A1D572A5512D979EEFDA3345BAFF27D2C89E828F68466D08C3CA250DA11B01FC0407A21743037C25E94FBE688566DD7DEAEBD355
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......|..c8O`08O`08O`08Oa0.O`0.@=05O`0llP0=O`0.If09O`0.od09O`0Rich8O`0........PE..L.....Oa...........!.........0......g........0............................................@..........................6..k....0.......p...............................................................................0...............................text............................... ..`.rdata..{....0......................@..@.data...h!...@......................@....rsrc........p....... ..............@..@.reloc..~............"..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\Setup.exe
                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):24064
                                                                    Entropy (8bit):5.819708895488079
                                                                    Encrypted:false
                                                                    SSDEEP:384:n7U5CiIZ1ZC2RvhrTfldNuwQ5pk+BISivMyyOgqCoRUj+OvHxOuofnykhVQJrTU:YoZ1ZnhrTfldqk7Yyy94RxOcVQJrT
                                                                    MD5:F4D89D9A2A3E2F164AEA3E93864905C9
                                                                    SHA1:4D4E05EE5E4E77A0631A3DD064C171BA2E227D4A
                                                                    SHA-256:64B3EFDF3DE54E338D4DB96B549A7BDB7237BB88A82A0A63AEF570327A78A6FB
                                                                    SHA-512:DBDA3FE7CA22C23D2D0F2A5D9D415A96112E2965081582C7A42C139A55C5D861A27F0BD919504DE4F82C59CF7D1B97F95ED5A55E87D574635AFDB7EB2D8CADF2
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U.'..fI_.fI_.fI_3.H^.fI_.fH_?fI_.8M^.fI_.8I^.fI_.8._.fI_.8K^.fI_Rich.fI_........PE..L...`..Z...........!.....>..........E........P............................................@..........................X......@Z..P....p..........................H....X...............................................P...............................text...W<.......>.................. ..`.rdata.......P.......B..............@..@.data...@....`.......R..............@....rsrc........p.......T..............@..@.reloc..H............X..............@..B........................................................................................................................................................................................................................................................................................................................................................
                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                    Entropy (8bit):7.612743851840157
                                                                    TrID:
                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                    File name:Setup.exe
                                                                    File size:190'056 bytes
                                                                    MD5:716a34c1339da740605493398067b147
                                                                    SHA1:bd1637bb6c98fa7134e322c283b72269340a79c5
                                                                    SHA256:7de8aa46aeb2240ba3a17691fbbd06c1ea72600b36fceb8bdd9c950dd867a69b
                                                                    SHA512:26fd528583d6f2c3ceeaa4882548dac3a44a228e96f2e78c88a9bc5c6fb62cb477d084212f00e4ba1951c85c7b19b46e24bbe488845ca189036c4150b5d05b96
                                                                    SSDEEP:3072:UbG7N2kDTHUpouL4Ynd86Pzy5n+/mGCK8izuG2okB2h4l591BBgkXmUT:UbE/HUzRe6ry5nmQiiGz4z9TJXrT
                                                                    TLSH:3804F15056E0C862D8A28B71B5797F7B8AB5DC2192B45F8313107B187E7DE819F0E3A3
                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L...Z.Oa.................j.........
                                                                    Icon Hash:45d44c7192498005
                                                                    Entrypoint:0x40352d
                                                                    Entrypoint Section:.text
                                                                    Digitally signed:true
                                                                    Imagebase:0x400000
                                                                    Subsystem:windows gui
                                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                    Time Stamp:0x614F9B5A [Sat Sep 25 21:57:46 2021 UTC]
                                                                    TLS Callbacks:
                                                                    CLR (.Net) Version:
                                                                    OS Version Major:4
                                                                    OS Version Minor:0
                                                                    File Version Major:4
                                                                    File Version Minor:0
                                                                    Subsystem Version Major:4
                                                                    Subsystem Version Minor:0
                                                                    Import Hash:56a78d55f3f7af51443e58e0ce2fb5f6
                                                                    Signature Valid:true
                                                                    Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                                    Signature Validation Error:The operation completed successfully
                                                                    Error Number:0
                                                                    Not Before, Not After
                                                                    • 08/05/2024 02:00:00 14/02/2025 00:59:59
                                                                    Subject Chain
                                                                    • CN=FAST CORPORATION LTD, O=FAST CORPORATION LTD, L=Ra'anana, C=IL, SERIALNUMBER=515636181, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=IL
                                                                    Version:3
                                                                    Thumbprint MD5:04786BD703B906E22AECB2AD38CE4D94
                                                                    Thumbprint SHA-1:07BE42727905BE32C822A638502C1B8FAAE6540A
                                                                    Thumbprint SHA-256:FDB017BB88E5D453E22A73810690C72534F58EFB109EA0D4494EC393F2307DBC
                                                                    Serial:0E5C655E1CBE9A8879372F58A5BC0302
                                                                    Instruction
                                                                    push ebp
                                                                    mov ebp, esp
                                                                    sub esp, 000003F4h
                                                                    push ebx
                                                                    push esi
                                                                    push edi
                                                                    push 00000020h
                                                                    pop edi
                                                                    xor ebx, ebx
                                                                    push 00008001h
                                                                    mov dword ptr [ebp-14h], ebx
                                                                    mov dword ptr [ebp-04h], 0040A2E0h
                                                                    mov dword ptr [ebp-10h], ebx
                                                                    call dword ptr [004080CCh]
                                                                    mov esi, dword ptr [004080D0h]
                                                                    lea eax, dword ptr [ebp-00000140h]
                                                                    push eax
                                                                    mov dword ptr [ebp-0000012Ch], ebx
                                                                    mov dword ptr [ebp-2Ch], ebx
                                                                    mov dword ptr [ebp-28h], ebx
                                                                    mov dword ptr [ebp-00000140h], 0000011Ch
                                                                    call esi
                                                                    test eax, eax
                                                                    jne 00007F37E940B4BAh
                                                                    lea eax, dword ptr [ebp-00000140h]
                                                                    mov dword ptr [ebp-00000140h], 00000114h
                                                                    push eax
                                                                    call esi
                                                                    mov ax, word ptr [ebp-0000012Ch]
                                                                    mov ecx, dword ptr [ebp-00000112h]
                                                                    sub ax, 00000053h
                                                                    add ecx, FFFFFFD0h
                                                                    neg ax
                                                                    sbb eax, eax
                                                                    mov byte ptr [ebp-26h], 00000004h
                                                                    not eax
                                                                    and eax, ecx
                                                                    mov word ptr [ebp-2Ch], ax
                                                                    cmp dword ptr [ebp-0000013Ch], 0Ah
                                                                    jnc 00007F37E940B48Ah
                                                                    and word ptr [ebp-00000132h], 0000h
                                                                    mov eax, dword ptr [ebp-00000134h]
                                                                    movzx ecx, byte ptr [ebp-00000138h]
                                                                    mov dword ptr [00434FB8h], eax
                                                                    xor eax, eax
                                                                    mov ah, byte ptr [ebp-0000013Ch]
                                                                    movzx eax, ax
                                                                    or eax, ecx
                                                                    xor ecx, ecx
                                                                    mov ch, byte ptr [ebp-2Ch]
                                                                    movzx ecx, cx
                                                                    shl eax, 10h
                                                                    or eax, ecx
                                                                    Programming Language:
                                                                    • [EXP] VC++ 6.0 SP5 build 8804
                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x86100xa0.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x6c0000x4f40.rsrc
                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x2bd000x2968.data
                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                    .text0x10000x68970x6a00ce9df19df15aa7bfbc0a8d0af0b841d0False0.6661261792452831data6.458398214928006IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                    .rdata0x80000x14a60x1600a118375c929d970903c1204233b7583dFalse0.4392755681818182data5.024109281264143IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .data0xa0000x2b0180x60082a10c59a8679bb952fc8316070b8a6cFalse0.521484375data4.15458210408643IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                    .ndata0x360000x360000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                    .rsrc0x6c0000x4f400x50006147c56de0951034d77b52b0075b790fFalse0.1015625data2.760740823683962IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                    RT_ICON0x6c2080x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2834 x 2834 px/mEnglishUnited States0.036372224846480866
                                                                    RT_DIALOG0x704300x202dataEnglishUnited States0.4085603112840467
                                                                    RT_DIALOG0x706380xf8dataEnglishUnited States0.6290322580645161
                                                                    RT_DIALOG0x707300xa0dataEnglishUnited States0.60625
                                                                    RT_DIALOG0x707d00xeedataEnglishUnited States0.6302521008403361
                                                                    RT_GROUP_ICON0x708c00x14dataEnglishUnited States1.1
                                                                    RT_VERSION0x708d80x240dataEnglishUnited States0.4895833333333333
                                                                    RT_MANIFEST0x70b180x423XML 1.0 document, ASCII text, with very long lines (1059), with no line terminatorsEnglishUnited States0.5127478753541076
                                                                    DLLImport
                                                                    ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                                                                    SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                                                                    ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                                                                    COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                                                                    USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                                                                    GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                                                                    KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                                                                    Language of compilation systemCountry where language is spokenMap
                                                                    EnglishUnited States
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Nov 19, 2024 15:59:20.203303099 CET49705443192.168.2.8207.246.91.177
                                                                    Nov 19, 2024 15:59:20.203360081 CET44349705207.246.91.177192.168.2.8
                                                                    Nov 19, 2024 15:59:20.203444958 CET49705443192.168.2.8207.246.91.177
                                                                    Nov 19, 2024 15:59:20.321541071 CET49705443192.168.2.8207.246.91.177
                                                                    Nov 19, 2024 15:59:20.321583986 CET44349705207.246.91.177192.168.2.8
                                                                    Nov 19, 2024 15:59:52.402255058 CET49705443192.168.2.8207.246.91.177
                                                                    Nov 19, 2024 15:59:52.498023033 CET49707443192.168.2.8207.246.91.177
                                                                    Nov 19, 2024 15:59:52.498071909 CET44349707207.246.91.177192.168.2.8
                                                                    Nov 19, 2024 15:59:52.498142004 CET49707443192.168.2.8207.246.91.177
                                                                    Nov 19, 2024 15:59:52.498920918 CET49707443192.168.2.8207.246.91.177
                                                                    Nov 19, 2024 15:59:52.498939991 CET44349707207.246.91.177192.168.2.8
                                                                    Nov 19, 2024 16:00:24.568833113 CET49707443192.168.2.8207.246.91.177
                                                                    Nov 19, 2024 16:00:24.569796085 CET49708443192.168.2.8207.246.91.177
                                                                    Nov 19, 2024 16:00:24.569854021 CET44349708207.246.91.177192.168.2.8
                                                                    Nov 19, 2024 16:00:24.569919109 CET49708443192.168.2.8207.246.91.177
                                                                    Nov 19, 2024 16:00:24.570183039 CET49708443192.168.2.8207.246.91.177
                                                                    Nov 19, 2024 16:00:24.570194006 CET44349708207.246.91.177192.168.2.8
                                                                    Nov 19, 2024 16:00:56.616211891 CET49708443192.168.2.8207.246.91.177
                                                                    Nov 19, 2024 16:00:56.785145044 CET49715443192.168.2.8207.246.91.177
                                                                    Nov 19, 2024 16:00:56.785191059 CET44349715207.246.91.177192.168.2.8
                                                                    Nov 19, 2024 16:00:56.785351992 CET49715443192.168.2.8207.246.91.177
                                                                    Nov 19, 2024 16:00:56.785583973 CET49715443192.168.2.8207.246.91.177
                                                                    Nov 19, 2024 16:00:56.785594940 CET44349715207.246.91.177192.168.2.8
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Nov 19, 2024 15:59:20.191205978 CET5174953192.168.2.81.1.1.1
                                                                    Nov 19, 2024 15:59:20.198558092 CET53517491.1.1.1192.168.2.8
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                    Nov 19, 2024 15:59:20.191205978 CET192.168.2.81.1.1.10x563aStandard query (0)pcapp.storeA (IP address)IN (0x0001)false
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                    Nov 19, 2024 15:59:20.198558092 CET1.1.1.1192.168.2.80x563aNo error (0)pcapp.store207.246.91.177A (IP address)IN (0x0001)false
                                                                    Nov 19, 2024 15:59:20.198558092 CET1.1.1.1192.168.2.80x563aNo error (0)pcapp.store167.99.235.203A (IP address)IN (0x0001)false
                                                                    Nov 19, 2024 15:59:20.198558092 CET1.1.1.1192.168.2.80x563aNo error (0)pcapp.store45.32.1.23A (IP address)IN (0x0001)false
                                                                    Nov 19, 2024 15:59:20.198558092 CET1.1.1.1192.168.2.80x563aNo error (0)pcapp.store209.222.21.115A (IP address)IN (0x0001)false
                                                                    Nov 19, 2024 15:59:20.198558092 CET1.1.1.1192.168.2.80x563aNo error (0)pcapp.store159.223.126.41A (IP address)IN (0x0001)false
                                                                    Nov 19, 2024 15:59:20.198558092 CET1.1.1.1192.168.2.80x563aNo error (0)pcapp.store104.248.126.225A (IP address)IN (0x0001)false
                                                                    Nov 19, 2024 15:59:20.198558092 CET1.1.1.1192.168.2.80x563aNo error (0)pcapp.store64.176.203.93A (IP address)IN (0x0001)false

                                                                    Click to jump to process

                                                                    Click to jump to process

                                                                    Click to dive into process behavior distribution

                                                                    Target ID:0
                                                                    Start time:09:59:17
                                                                    Start date:19/11/2024
                                                                    Path:C:\Users\user\Desktop\Setup.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\Desktop\Setup.exe"
                                                                    Imagebase:0x400000
                                                                    File size:190'056 bytes
                                                                    MD5 hash:716A34C1339DA740605493398067B147
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:low
                                                                    Has exited:false

                                                                    Reset < >

                                                                      Execution Graph

                                                                      Execution Coverage:14.9%
                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                      Signature Coverage:17.2%
                                                                      Total number of Nodes:1282
                                                                      Total number of Limit Nodes:60
                                                                      execution_graph 7002 401941 7003 401943 7002->7003 7008 402da6 7003->7008 7009 402db2 7008->7009 7054 40657a 7009->7054 7012 401948 7014 405c49 7012->7014 7096 405f14 7014->7096 7017 405c71 DeleteFileW 7024 401951 7017->7024 7019 405db3 7019->7024 7139 406873 FindFirstFileW 7019->7139 7020 405c88 7020->7019 7110 40653d lstrcpynW 7020->7110 7021 405cae 7022 405cc1 7021->7022 7023 405cb4 lstrcatW 7021->7023 7111 405e58 lstrlenW 7022->7111 7025 405cc7 7023->7025 7028 405cd7 lstrcatW 7025->7028 7029 405ccd 7025->7029 7031 405ce2 lstrlenW FindFirstFileW 7028->7031 7029->7028 7029->7031 7033 405da8 7031->7033 7052 405d04 7031->7052 7032 405dd1 7142 405e0c lstrlenW CharPrevW 7032->7142 7033->7019 7036 405d8b FindNextFileW 7039 405da1 FindClose 7036->7039 7036->7052 7037 405c01 5 API calls 7040 405de3 7037->7040 7039->7033 7041 405de7 7040->7041 7042 405dfd 7040->7042 7041->7024 7045 40559f 24 API calls 7041->7045 7044 40559f 24 API calls 7042->7044 7044->7024 7047 405df4 7045->7047 7046 405c49 60 API calls 7046->7052 7049 4062fd 36 API calls 7047->7049 7048 40559f 24 API calls 7048->7036 7050 405dfb 7049->7050 7050->7024 7052->7036 7052->7046 7052->7048 7115 40653d lstrcpynW 7052->7115 7116 405c01 7052->7116 7124 40559f 7052->7124 7135 4062fd MoveFileExW 7052->7135 7058 406587 7054->7058 7055 4067aa 7056 402dd3 7055->7056 7087 40653d lstrcpynW 7055->7087 7056->7012 7071 4067c4 7056->7071 7058->7055 7059 406778 lstrlenW 7058->7059 7063 40657a 10 API calls 7058->7063 7064 40668f GetSystemDirectoryW 7058->7064 7065 4066a2 GetWindowsDirectoryW 7058->7065 7066 4066d1 SHGetSpecialFolderLocation 7058->7066 7067 406719 lstrcatW 7058->7067 7068 40657a 10 API calls 7058->7068 7069 4067c4 5 API calls 7058->7069 7080 40640b 7058->7080 7085 406484 wsprintfW 7058->7085 7086 40653d lstrcpynW 7058->7086 7059->7058 7063->7059 7064->7058 7065->7058 7066->7058 7070 4066e9 SHGetPathFromIDListW CoTaskMemFree 7066->7070 7067->7058 7068->7058 7069->7058 7070->7058 7077 4067d1 7071->7077 7072 40684c CharPrevW 7074 406847 7072->7074 7073 40683a CharNextW 7073->7074 7073->7077 7074->7072 7076 40686d 7074->7076 7076->7012 7077->7073 7077->7074 7078 406826 CharNextW 7077->7078 7079 406835 CharNextW 7077->7079 7092 405e39 7077->7092 7078->7077 7079->7073 7088 4063aa 7080->7088 7083 40643f RegQueryValueExW RegCloseKey 7084 40646f 7083->7084 7084->7058 7085->7058 7086->7058 7087->7056 7089 4063b9 7088->7089 7090 4063c2 RegOpenKeyExW 7089->7090 7091 4063bd 7089->7091 7090->7091 7091->7083 7091->7084 7094 405e3f 7092->7094 7093 405e55 7093->7077 7094->7093 7095 405e46 CharNextW 7094->7095 7095->7094 7145 40653d lstrcpynW 7096->7145 7098 405f25 7146 405eb7 CharNextW CharNextW 7098->7146 7101 405c69 7101->7017 7101->7020 7102 4067c4 5 API calls 7107 405f3b 7102->7107 7103 405f6c lstrlenW 7104 405f77 7103->7104 7103->7107 7106 405e0c 3 API calls 7104->7106 7105 406873 2 API calls 7105->7107 7108 405f7c GetFileAttributesW 7106->7108 7107->7101 7107->7103 7107->7105 7109 405e58 2 API calls 7107->7109 7108->7101 7109->7103 7110->7021 7112 405e66 7111->7112 7113 405e78 7112->7113 7114 405e6c CharPrevW 7112->7114 7113->7025 7114->7112 7114->7113 7115->7052 7152 406008 GetFileAttributesW 7116->7152 7119 405c24 DeleteFileW 7122 405c2a 7119->7122 7120 405c1c RemoveDirectoryW 7120->7122 7121 405c2e 7121->7052 7122->7121 7123 405c3a SetFileAttributesW 7122->7123 7123->7121 7125 4055ba 7124->7125 7134 40565c 7124->7134 7126 4055d6 lstrlenW 7125->7126 7127 40657a 17 API calls 7125->7127 7128 4055e4 lstrlenW 7126->7128 7129 4055ff 7126->7129 7127->7126 7130 4055f6 lstrcatW 7128->7130 7128->7134 7131 405612 7129->7131 7132 405605 SetWindowTextW 7129->7132 7130->7129 7133 405618 SendMessageW SendMessageW SendMessageW 7131->7133 7131->7134 7132->7131 7133->7134 7134->7052 7136 40631e 7135->7136 7137 406311 7135->7137 7136->7052 7155 406183 7137->7155 7140 405dcd 7139->7140 7141 406889 FindClose 7139->7141 7140->7024 7140->7032 7141->7140 7143 405dd7 7142->7143 7144 405e28 lstrcatW 7142->7144 7143->7037 7144->7143 7145->7098 7147 405ed4 7146->7147 7148 405ee6 7146->7148 7147->7148 7149 405ee1 CharNextW 7147->7149 7150 405e39 CharNextW 7148->7150 7151 405f0a 7148->7151 7149->7151 7150->7148 7151->7101 7151->7102 7153 405c0d 7152->7153 7154 40601a SetFileAttributesW 7152->7154 7153->7119 7153->7120 7153->7121 7154->7153 7156 4061b3 7155->7156 7157 4061d9 GetShortPathNameW 7155->7157 7182 40602d GetFileAttributesW CreateFileW 7156->7182 7159 4062f8 7157->7159 7160 4061ee 7157->7160 7159->7136 7160->7159 7162 4061f6 wsprintfA 7160->7162 7161 4061bd CloseHandle GetShortPathNameW 7161->7159 7163 4061d1 7161->7163 7164 40657a 17 API calls 7162->7164 7163->7157 7163->7159 7165 40621e 7164->7165 7183 40602d GetFileAttributesW CreateFileW 7165->7183 7167 40622b 7167->7159 7168 40623a GetFileSize GlobalAlloc 7167->7168 7169 4062f1 CloseHandle 7168->7169 7170 40625c 7168->7170 7169->7159 7184 4060b0 ReadFile 7170->7184 7175 40627b lstrcpyA 7178 40629d 7175->7178 7176 40628f 7177 405f92 4 API calls 7176->7177 7177->7178 7179 4062d4 SetFilePointer 7178->7179 7191 4060df WriteFile 7179->7191 7182->7161 7183->7167 7185 4060ce 7184->7185 7185->7169 7186 405f92 lstrlenA 7185->7186 7187 405fd3 lstrlenA 7186->7187 7188 405fdb 7187->7188 7189 405fac lstrcmpiA 7187->7189 7188->7175 7188->7176 7189->7188 7190 405fca CharNextA 7189->7190 7190->7187 7192 4060fd GlobalFree 7191->7192 7192->7169 7250 401c43 7251 402d84 17 API calls 7250->7251 7252 401c4a 7251->7252 7253 402d84 17 API calls 7252->7253 7254 401c57 7253->7254 7255 401c6c 7254->7255 7256 402da6 17 API calls 7254->7256 7257 401c7c 7255->7257 7258 402da6 17 API calls 7255->7258 7256->7255 7259 401cd3 7257->7259 7260 401c87 7257->7260 7258->7257 7261 402da6 17 API calls 7259->7261 7262 402d84 17 API calls 7260->7262 7264 401cd8 7261->7264 7263 401c8c 7262->7263 7265 402d84 17 API calls 7263->7265 7266 402da6 17 API calls 7264->7266 7267 401c98 7265->7267 7268 401ce1 FindWindowExW 7266->7268 7269 401cc3 SendMessageW 7267->7269 7270 401ca5 SendMessageTimeoutW 7267->7270 7271 401d03 7268->7271 7269->7271 7270->7271 7317 6fd918c9 GetProcessHeap 7318 6fd918ec 7317->7318 7319 6fd9190f 7318->7319 7320 6fd91900 7318->7320 7354 6fd91e4e 7319->7354 7379 6fd91e9c 7320->7379 7325 6fd91b93 7326 6fd9194c 7327 6fd91e9c 2 API calls 7326->7327 7329 6fd91956 GetProcessHeap 7327->7329 7331 6fd91b8c HeapFree 7329->7331 7330 6fd91920 7332 6fd92083 2 API calls 7330->7332 7331->7325 7333 6fd91928 7332->7333 7362 6fd9125b GetClientRect 7333->7362 7335 6fd91940 7336 6fd91e4e 2 API calls 7335->7336 7337 6fd91948 7336->7337 7337->7326 7338 6fd91960 GetProcessHeap HeapReAlloc lstrcmpiW 7337->7338 7339 6fd919bb lstrcmpiW 7338->7339 7340 6fd919a0 7338->7340 7339->7340 7341 6fd919e2 lstrcmpiW 7339->7341 7343 6fd91adb lstrcmpiW 7340->7343 7341->7340 7342 6fd91a09 lstrcmpiW 7341->7342 7342->7340 7344 6fd91a30 lstrcmpiW 7342->7344 7345 6fd91aec CreateWindowExW SetPropW SendMessageW SendMessageW 7343->7345 7346 6fd91ae7 7343->7346 7344->7340 7347 6fd91a54 lstrcmpiW 7344->7347 7349 6fd91b7b 7345->7349 7350 6fd91b60 SetWindowLongW 7345->7350 7346->7345 7347->7340 7348 6fd91a78 lstrcmpiW 7347->7348 7348->7340 7351 6fd91a9c lstrcmpiW 7348->7351 7382 6fd920b3 wsprintfW 7349->7382 7350->7349 7351->7340 7355 6fd91e58 7354->7355 7356 6fd91917 7354->7356 7355->7356 7357 6fd91e86 GlobalFree 7355->7357 7358 6fd91e72 lstrcpynW 7355->7358 7356->7326 7359 6fd92083 7356->7359 7357->7356 7358->7357 7360 6fd91e4e 2 API calls 7359->7360 7361 6fd9209d 7360->7361 7361->7330 7363 6fd91e4e 2 API calls 7362->7363 7364 6fd91292 7363->7364 7365 6fd91303 7364->7365 7385 6fd91332 lstrlenW CharPrevW 7364->7385 7365->7335 7368 6fd91e4e 2 API calls 7369 6fd912b6 7368->7369 7369->7365 7370 6fd91332 4 API calls 7369->7370 7371 6fd912c9 7370->7371 7372 6fd91e4e 2 API calls 7371->7372 7373 6fd912db 7372->7373 7373->7365 7374 6fd91332 4 API calls 7373->7374 7375 6fd912ed 7374->7375 7376 6fd91e4e 2 API calls 7375->7376 7377 6fd912ff 7376->7377 7377->7365 7378 6fd91332 4 API calls 7377->7378 7378->7365 7380 6fd9190a 7379->7380 7381 6fd91ea5 GlobalAlloc lstrcpynW 7379->7381 7380->7325 7381->7380 7383 6fd91e9c 2 API calls 7382->7383 7384 6fd91b81 GetProcessHeap 7383->7384 7384->7331 7386 6fd91358 7385->7386 7387 6fd91360 MulDiv 7386->7387 7388 6fd91375 7386->7388 7391 6fd912a4 7387->7391 7390 6fd9137b MapDialogRect 7388->7390 7388->7391 7390->7391 7391->7368 8664 402b59 8665 402b60 8664->8665 8666 402bab 8664->8666 8669 402d84 17 API calls 8665->8669 8670 402ba9 8665->8670 8667 40690a 5 API calls 8666->8667 8668 402bb2 8667->8668 8671 402da6 17 API calls 8668->8671 8672 402b6e 8669->8672 8673 402bbb 8671->8673 8674 402d84 17 API calls 8672->8674 8673->8670 8675 402bbf IIDFromString 8673->8675 8677 402b7a 8674->8677 8675->8670 8676 402bce 8675->8676 8676->8670 8682 40653d lstrcpynW 8676->8682 8681 406484 wsprintfW 8677->8681 8679 402beb CoTaskMemFree 8679->8670 8681->8670 8682->8679 7725 40175c 7726 402da6 17 API calls 7725->7726 7727 401763 7726->7727 7731 40605c 7727->7731 7729 40176a 7730 40605c 2 API calls 7729->7730 7730->7729 7732 406069 GetTickCount GetTempFileNameW 7731->7732 7733 4060a3 7732->7733 7734 40609f 7732->7734 7733->7729 7734->7732 7734->7733 8707 401563 8708 402ba4 8707->8708 8711 406484 wsprintfW 8708->8711 8710 402ba9 8711->8710 8715 401968 8716 402d84 17 API calls 8715->8716 8717 40196f 8716->8717 8718 402d84 17 API calls 8717->8718 8719 40197c 8718->8719 8720 402da6 17 API calls 8719->8720 8721 401993 lstrlenW 8720->8721 8723 4019a4 8721->8723 8722 4019e5 8723->8722 8727 40653d lstrcpynW 8723->8727 8725 4019d5 8725->8722 8726 4019da lstrlenW 8725->8726 8726->8722 8727->8725 8159 40176f 8160 402da6 17 API calls 8159->8160 8161 401776 8160->8161 8162 401796 8161->8162 8163 40179e 8161->8163 8198 40653d lstrcpynW 8162->8198 8199 40653d lstrcpynW 8163->8199 8166 40179c 8170 4067c4 5 API calls 8166->8170 8167 4017a9 8168 405e0c 3 API calls 8167->8168 8169 4017af lstrcatW 8168->8169 8169->8166 8187 4017bb 8170->8187 8171 406873 2 API calls 8171->8187 8172 406008 2 API calls 8172->8187 8174 4017cd CompareFileTime 8174->8187 8175 40188d 8176 40559f 24 API calls 8175->8176 8178 401897 8176->8178 8177 401864 8179 40559f 24 API calls 8177->8179 8186 401879 8177->8186 8181 4032b4 31 API calls 8178->8181 8179->8186 8180 40653d lstrcpynW 8180->8187 8182 4018aa 8181->8182 8183 4018be SetFileTime 8182->8183 8185 4018d0 CloseHandle 8182->8185 8183->8185 8184 40657a 17 API calls 8184->8187 8185->8186 8188 4018e1 8185->8188 8187->8171 8187->8172 8187->8174 8187->8175 8187->8177 8187->8180 8187->8184 8193 405b9d MessageBoxIndirectW 8187->8193 8197 40602d GetFileAttributesW CreateFileW 8187->8197 8189 4018e6 8188->8189 8190 4018f9 8188->8190 8191 40657a 17 API calls 8189->8191 8192 40657a 17 API calls 8190->8192 8194 4018ee lstrcatW 8191->8194 8195 401901 8192->8195 8193->8187 8194->8195 8195->8186 8196 405b9d MessageBoxIndirectW 8195->8196 8196->8186 8197->8187 8198->8166 8199->8167 8200 6d261817 8201 6d26184a 8200->8201 8242 6d261bff 8201->8242 8203 6d261976 8204 6d261851 8204->8203 8205 6d261862 8204->8205 8206 6d261869 8204->8206 8292 6d26243e 8205->8292 8276 6d262480 8206->8276 8211 6d2618af 8305 6d262655 8211->8305 8212 6d2618cd 8215 6d2618d3 8212->8215 8216 6d26191e 8212->8216 8213 6d26187f 8218 6d261885 8213->8218 8219 6d261890 8213->8219 8214 6d261898 8226 6d26188e 8214->8226 8302 6d262e23 8214->8302 8322 6d261666 8215->8322 8223 6d262655 10 API calls 8216->8223 8218->8226 8286 6d262b98 8218->8286 8296 6d262810 8219->8296 8229 6d26190f 8223->8229 8224 6d2618b5 8317 6d261654 8224->8317 8226->8211 8226->8212 8234 6d261965 8229->8234 8328 6d262618 8229->8328 8231 6d261896 8231->8226 8232 6d262655 10 API calls 8232->8229 8233 6d261312 2 API calls 8235 6d2618c1 GlobalFree 8233->8235 8234->8203 8236 6d26196f GlobalFree 8234->8236 8235->8229 8236->8203 8239 6d261951 8239->8234 8332 6d2615dd wsprintfW 8239->8332 8240 6d26194a FreeLibrary 8240->8239 8335 6d2612bb GlobalAlloc 8242->8335 8244 6d261c26 8336 6d2612bb GlobalAlloc 8244->8336 8246 6d261e6b GlobalFree GlobalFree GlobalFree 8248 6d261e88 8246->8248 8263 6d261ed2 8246->8263 8247 6d261c31 8247->8246 8251 6d261d26 GlobalAlloc 8247->8251 8252 6d2621ae 8247->8252 8254 6d261d71 lstrcpyW 8247->8254 8255 6d261d8f GlobalFree 8247->8255 8258 6d261d7b lstrcpyW 8247->8258 8262 6d262126 8247->8262 8247->8263 8268 6d262067 GlobalFree 8247->8268 8269 6d2612cc 2 API calls 8247->8269 8270 6d261dcd 8247->8270 8249 6d26227e 8248->8249 8250 6d261e9d 8248->8250 8248->8263 8253 6d2622a0 GetModuleHandleW 8249->8253 8249->8263 8250->8263 8264 6d2612cc 2 API calls 8250->8264 8251->8247 8252->8263 8273 6d262216 lstrcpyW 8252->8273 8256 6d2622c6 8253->8256 8257 6d2622b1 LoadLibraryW 8253->8257 8254->8258 8255->8247 8340 6d2616bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 8256->8340 8257->8256 8257->8263 8258->8247 8260 6d2622d8 8261 6d262318 8260->8261 8274 6d262302 GetProcAddress 8260->8274 8261->8263 8266 6d262325 lstrlenW 8261->8266 8339 6d2612bb GlobalAlloc 8262->8339 8263->8204 8264->8263 8341 6d2616bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 8266->8341 8268->8247 8269->8247 8270->8247 8337 6d26162f GlobalSize GlobalAlloc 8270->8337 8271 6d26233f 8271->8263 8273->8263 8274->8261 8275 6d26212f 8275->8204 8282 6d262498 8276->8282 8277 6d26135a 2 API calls 8277->8282 8278 6d2625c1 GlobalFree 8281 6d26186f 8278->8281 8278->8282 8279 6d262540 GlobalAlloc WideCharToMultiByte 8279->8278 8280 6d26256b GlobalAlloc CLSIDFromString 8280->8278 8281->8213 8281->8214 8281->8226 8282->8277 8282->8278 8282->8279 8282->8280 8283 6d2612cc GlobalAlloc lstrcpynW 8282->8283 8285 6d26258a 8282->8285 8283->8282 8285->8278 8342 6d2627a4 8285->8342 8289 6d262baa 8286->8289 8287 6d262c4f GlobalAlloc 8288 6d262c6d 8287->8288 8345 6d262b42 8288->8345 8289->8287 8291 6d262d39 8291->8226 8293 6d262453 8292->8293 8294 6d26245e GlobalAlloc 8293->8294 8295 6d261868 8293->8295 8294->8293 8295->8206 8300 6d262840 8296->8300 8297 6d2628ee 8299 6d2628f4 GlobalSize 8297->8299 8301 6d2628fe 8297->8301 8298 6d2628db GlobalAlloc 8298->8301 8299->8301 8300->8297 8300->8298 8301->8231 8303 6d262e2e 8302->8303 8304 6d262e6e GlobalFree 8303->8304 8349 6d2612bb GlobalAlloc 8305->8349 8307 6d2626fa StringFromGUID2 8311 6d26265f 8307->8311 8308 6d26270b lstrcpynW 8308->8311 8309 6d2626d8 MultiByteToWideChar 8309->8311 8310 6d262742 GlobalFree 8310->8311 8311->8307 8311->8308 8311->8309 8311->8310 8312 6d26271e wsprintfW 8311->8312 8313 6d262777 GlobalFree 8311->8313 8314 6d262755 8311->8314 8316 6d261381 lstrcpyW 8311->8316 8312->8311 8313->8224 8314->8311 8315 6d261312 2 API calls 8314->8315 8315->8314 8316->8311 8350 6d2612bb GlobalAlloc 8317->8350 8319 6d261659 8320 6d261666 2 API calls 8319->8320 8321 6d261663 8320->8321 8321->8233 8323 6d261672 wsprintfW 8322->8323 8324 6d26169f lstrcpyW 8322->8324 8327 6d2616b8 8323->8327 8324->8327 8327->8232 8329 6d262626 8328->8329 8330 6d261931 8328->8330 8329->8330 8331 6d262642 GlobalFree 8329->8331 8330->8239 8330->8240 8331->8329 8333 6d261312 2 API calls 8332->8333 8334 6d2615fe 8333->8334 8334->8234 8335->8244 8336->8247 8338 6d26164d 8337->8338 8338->8270 8339->8275 8340->8260 8341->8271 8343 6d2627b2 VirtualAlloc 8342->8343 8344 6d262808 8342->8344 8343->8344 8344->8285 8346 6d262b4d 8345->8346 8347 6d262b52 GetLastError 8346->8347 8348 6d262b5d 8346->8348 8347->8348 8348->8291 8349->8311 8350->8319 7272 6fd71494 7273 6fd714a6 7272->7273 7274 6fd71608 9 API calls 7272->7274 7275 6fd714ba 7273->7275 7276 6fd7155c 7273->7276 7279 6fd71564 7273->7279 7274->7276 7275->7276 7278 6fd714d0 IsWindow 7275->7278 7277 6fd715b9 7277->7276 7281 6fd715de KillTimer DestroyWindow 7277->7281 7278->7276 7280 6fd714dd 7278->7280 7279->7276 7279->7277 7282 6fd7158e MessageBoxW 7279->7282 7283 6fd714e6 GetTickCount 7280->7283 7285 6fd71505 7280->7285 7281->7276 7282->7276 7282->7277 7284 6fd714fd 7283->7284 7283->7285 7284->7285 7286 6fd7151e 6 API calls 7285->7286 7286->7276 7287 402c05 SendMessageW 7288 402c2a 7287->7288 7289 402c1f InvalidateRect 7287->7289 7289->7288 9219 40190c 9220 401943 9219->9220 9221 402da6 17 API calls 9220->9221 9222 401948 9221->9222 9223 405c49 67 API calls 9222->9223 9224 401951 9223->9224 7585 6d262a7f 7586 6d262acf 7585->7586 7587 6d262a8f VirtualProtect 7585->7587 7587->7586 7735 6fd7308b 7736 6fd730ab 7735->7736 7737 6fd730c4 HttpOpenRequestW 7736->7737 7743 6fd732c1 7736->7743 7738 6fd732b5 7737->7738 7739 6fd730f8 7737->7739 7738->7743 7740 6fd73102 wsprintfW HttpAddRequestHeadersW 7739->7740 7741 6fd7312c 7739->7741 7740->7741 7744 6fd73136 wsprintfW HttpAddRequestHeadersW 7741->7744 7745 6fd73160 HttpSendRequestW 7741->7745 7742 6fd732ef HttpOpenRequestW 7746 6fd73363 7742->7746 7776 6fd7352e 7742->7776 7743->7742 7743->7776 7744->7745 7747 6fd73175 7745->7747 7768 6fd7329a 7745->7768 7748 6fd73397 7746->7748 7749 6fd7336d wsprintfW HttpAddRequestHeadersW 7746->7749 7747->7745 7753 6fd7317c InternetReadFile 7747->7753 7758 6fd731e4 7747->7758 7761 6fd731b5 InternetErrorDlg 7747->7761 7751 6fd733a0 HttpAddRequestHeadersW 7748->7751 7752 6fd733ae 7748->7752 7749->7748 7750 6fd732a0 InternetCloseHandle 7750->7743 7751->7752 7754 6fd733b7 HttpAddRequestHeadersA 7752->7754 7755 6fd733c9 7752->7755 7753->7747 7754->7755 7756 6fd733d2 HttpAddRequestHeadersW 7755->7756 7757 6fd733dc 7755->7757 7756->7757 7759 6fd733e6 wsprintfW HttpAddRequestHeadersW 7757->7759 7760 6fd73410 7757->7760 7758->7750 7763 6fd7320c HttpQueryInfoW 7758->7763 7759->7760 7762 6fd73419 wsprintfW HttpAddRequestHeadersW 7760->7762 7772 6fd73444 7760->7772 7761->7747 7761->7758 7762->7772 7764 6fd73256 HttpQueryInfoW 7763->7764 7765 6fd7323b 7763->7765 7767 6fd7327f 7764->7767 7764->7768 7765->7764 7766 6fd73245 lstrcpynW 7765->7766 7766->7764 7767->7768 7770 6fd73289 lstrcpynW 7767->7770 7768->7750 7769 6fd73457 InternetQueryOptionW InternetSetOptionW 7769->7772 7770->7768 7771 6fd734f8 7774 6fd73544 InternetSetFilePointer 7771->7774 7775 6fd7350f HttpQueryInfoW 7771->7775 7771->7776 7772->7769 7772->7771 7773 6fd734ca InternetErrorDlg 7772->7773 7772->7776 7773->7771 7773->7772 7774->7776 7775->7776 9511 40261c 9512 402da6 17 API calls 9511->9512 9513 402623 9512->9513 9516 40602d GetFileAttributesW CreateFileW 9513->9516 9515 40262f 9516->9515 7827 6fd724b2 7828 6fd724fc HttpSendRequestW 7827->7828 7829 6fd724d8 HttpSendRequestExW 7827->7829 7830 6fd917be 7831 6fd917f1 7830->7831 7841 6fd92053 7831->7841 7833 6fd91811 GetDlgItem GetWindowRect MapWindowPoints CreateDialogParamW 7834 6fd9185e SetWindowPos SetWindowLongW GetProcessHeap 7833->7834 7835 6fd91852 7833->7835 7838 6fd918ab 7834->7838 7836 6fd91e9c 2 API calls 7835->7836 7837 6fd9185c 7836->7837 7839 6fd918c1 7837->7839 7840 6fd920b3 3 API calls 7838->7840 7840->7839 7842 6fd91e4e 2 API calls 7841->7842 7843 6fd9206d 7842->7843 7843->7833 7862 40252a 7863 402de6 17 API calls 7862->7863 7864 402534 7863->7864 7865 402da6 17 API calls 7864->7865 7866 40253d 7865->7866 7867 402548 RegQueryValueExW 7866->7867 7869 40292e 7866->7869 7868 402568 7867->7868 7872 40256e RegCloseKey 7867->7872 7868->7872 7873 406484 wsprintfW 7868->7873 7872->7869 7873->7872 7898 40352d SetErrorMode GetVersionExW 7899 4035b7 7898->7899 7900 40357f GetVersionExW 7898->7900 7901 403610 7899->7901 7902 40690a 5 API calls 7899->7902 7900->7899 7903 40689a 3 API calls 7901->7903 7902->7901 7904 403626 lstrlenA 7903->7904 7904->7901 7905 403636 7904->7905 7906 40690a 5 API calls 7905->7906 7907 40363d 7906->7907 7908 40690a 5 API calls 7907->7908 7909 403644 7908->7909 7910 40690a 5 API calls 7909->7910 7911 403650 #17 OleInitialize SHGetFileInfoW 7910->7911 7989 40653d lstrcpynW 7911->7989 7914 40369d GetCommandLineW 7990 40653d lstrcpynW 7914->7990 7916 4036af 7917 405e39 CharNextW 7916->7917 7918 4036d5 CharNextW 7917->7918 7929 4036e6 7918->7929 7919 4037e4 7920 4037f8 GetTempPathW 7919->7920 7991 4034fc 7920->7991 7922 403810 7923 403814 GetWindowsDirectoryW lstrcatW 7922->7923 7924 40386a DeleteFileW 7922->7924 7927 4034fc 12 API calls 7923->7927 8001 40307d GetTickCount GetModuleFileNameW 7924->8001 7925 405e39 CharNextW 7925->7929 7930 403830 7927->7930 7928 40387d 7936 405e39 CharNextW 7928->7936 7963 403941 7928->7963 7973 403932 7928->7973 7929->7919 7929->7925 7932 4037e6 7929->7932 7930->7924 7931 403834 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 7930->7931 7935 4034fc 12 API calls 7931->7935 8085 40653d lstrcpynW 7932->8085 7939 403862 7935->7939 7942 40389f 7936->7942 7939->7924 7939->7963 7940 403a69 7943 405b9d MessageBoxIndirectW 7940->7943 7941 403a7e 7944 403a86 GetCurrentProcess OpenProcessToken 7941->7944 7947 403afc ExitProcess 7941->7947 7949 403908 7942->7949 7950 403949 7942->7950 7951 403a76 ExitProcess 7943->7951 7945 403acc 7944->7945 7946 403a9d LookupPrivilegeValueW AdjustTokenPrivileges 7944->7946 7952 40690a 5 API calls 7945->7952 7946->7945 7954 405f14 18 API calls 7949->7954 7953 405b08 5 API calls 7950->7953 7955 403ad3 7952->7955 7956 40394e lstrcatW 7953->7956 7957 403914 7954->7957 7958 403ae8 ExitWindowsEx 7955->7958 7962 403af5 7955->7962 7959 40396a lstrcatW lstrcmpiW 7956->7959 7960 40395f lstrcatW 7956->7960 7957->7963 8086 40653d lstrcpynW 7957->8086 7958->7947 7958->7962 7959->7963 7964 40398a 7959->7964 7960->7959 7966 40140b 2 API calls 7962->7966 8090 403b12 7963->8090 7967 403996 7964->7967 7968 40398f 7964->7968 7965 403927 8087 40653d lstrcpynW 7965->8087 7966->7947 7969 405aeb 2 API calls 7967->7969 7971 405a6e 4 API calls 7968->7971 7972 40399b SetCurrentDirectoryW 7969->7972 7974 403994 7971->7974 7975 4039b8 7972->7975 7976 4039ad 7972->7976 8029 403bec 7973->8029 7974->7972 8089 40653d lstrcpynW 7975->8089 8088 40653d lstrcpynW 7976->8088 7979 40657a 17 API calls 7980 4039fa DeleteFileW 7979->7980 7981 403a06 CopyFileW 7980->7981 7986 4039c5 7980->7986 7981->7986 7982 403a50 7983 4062fd 36 API calls 7982->7983 7983->7963 7984 4062fd 36 API calls 7984->7986 7985 40657a 17 API calls 7985->7986 7986->7979 7986->7982 7986->7984 7986->7985 7987 405b20 2 API calls 7986->7987 7988 403a3a CloseHandle 7986->7988 7987->7986 7988->7986 7989->7914 7990->7916 7992 4067c4 5 API calls 7991->7992 7994 403508 7992->7994 7993 403512 7993->7922 7994->7993 7995 405e0c 3 API calls 7994->7995 7996 40351a 7995->7996 7997 405aeb 2 API calls 7996->7997 7998 403520 7997->7998 7999 40605c 2 API calls 7998->7999 8000 40352b 7999->8000 8000->7922 8097 40602d GetFileAttributesW CreateFileW 8001->8097 8003 4030bd 8021 4030cd 8003->8021 8098 40653d lstrcpynW 8003->8098 8005 4030e3 8006 405e58 2 API calls 8005->8006 8007 4030e9 8006->8007 8099 40653d lstrcpynW 8007->8099 8009 4030f4 GetFileSize 8010 4031ee 8009->8010 8028 40310b 8009->8028 8100 403019 8010->8100 8012 4031f7 8014 403227 GlobalAlloc 8012->8014 8012->8021 8135 4034e5 SetFilePointer 8012->8135 8111 4034e5 SetFilePointer 8014->8111 8016 40325a 8018 403019 6 API calls 8016->8018 8018->8021 8019 403210 8022 4034cf ReadFile 8019->8022 8020 403242 8112 4032b4 8020->8112 8021->7928 8024 40321b 8022->8024 8024->8014 8024->8021 8025 403019 6 API calls 8025->8028 8026 40324e 8026->8021 8026->8026 8027 40328b SetFilePointer 8026->8027 8027->8021 8028->8010 8028->8016 8028->8021 8028->8025 8132 4034cf 8028->8132 8030 40690a 5 API calls 8029->8030 8031 403c00 8030->8031 8032 403c06 8031->8032 8033 403c18 8031->8033 8145 406484 wsprintfW 8032->8145 8034 40640b 3 API calls 8033->8034 8035 403c48 8034->8035 8037 403c67 lstrcatW 8035->8037 8039 40640b 3 API calls 8035->8039 8038 403c16 8037->8038 8137 403ec2 8038->8137 8039->8037 8042 405f14 18 API calls 8043 403c99 8042->8043 8044 403d2d 8043->8044 8046 40640b 3 API calls 8043->8046 8045 405f14 18 API calls 8044->8045 8047 403d33 8045->8047 8048 403ccb 8046->8048 8049 403d43 LoadImageW 8047->8049 8050 40657a 17 API calls 8047->8050 8048->8044 8053 403cec lstrlenW 8048->8053 8056 405e39 CharNextW 8048->8056 8051 403de9 8049->8051 8052 403d6a RegisterClassW 8049->8052 8050->8049 8055 40140b 2 API calls 8051->8055 8054 403da0 SystemParametersInfoW CreateWindowExW 8052->8054 8084 403df3 8052->8084 8057 403d20 8053->8057 8058 403cfa lstrcmpiW 8053->8058 8054->8051 8062 403def 8055->8062 8060 403ce9 8056->8060 8059 405e0c 3 API calls 8057->8059 8058->8057 8061 403d0a GetFileAttributesW 8058->8061 8064 403d26 8059->8064 8060->8053 8065 403d16 8061->8065 8063 403ec2 18 API calls 8062->8063 8062->8084 8066 403e00 8063->8066 8146 40653d lstrcpynW 8064->8146 8065->8057 8068 405e58 2 API calls 8065->8068 8069 403e0c ShowWindow 8066->8069 8070 403e8f 8066->8070 8068->8057 8071 40689a 3 API calls 8069->8071 8147 405672 OleInitialize 8070->8147 8074 403e24 8071->8074 8073 403e95 8075 403eb1 8073->8075 8076 403e99 8073->8076 8077 403e32 GetClassInfoW 8074->8077 8079 40689a 3 API calls 8074->8079 8078 40140b 2 API calls 8075->8078 8082 40140b 2 API calls 8076->8082 8076->8084 8080 403e46 GetClassInfoW RegisterClassW 8077->8080 8081 403e5c DialogBoxParamW 8077->8081 8078->8084 8079->8077 8080->8081 8083 40140b 2 API calls 8081->8083 8082->8084 8083->8084 8084->7963 8085->7920 8086->7965 8087->7973 8088->7975 8089->7986 8091 403b2a 8090->8091 8092 403b1c CloseHandle 8090->8092 8155 403b57 8091->8155 8092->8091 8095 405c49 67 API calls 8096 403a5e OleUninitialize 8095->8096 8096->7940 8096->7941 8097->8003 8098->8005 8099->8009 8101 403022 8100->8101 8102 40303a 8100->8102 8103 403032 8101->8103 8104 40302b DestroyWindow 8101->8104 8105 403042 8102->8105 8106 40304a GetTickCount 8102->8106 8103->8012 8104->8103 8107 406946 2 API calls 8105->8107 8108 403058 CreateDialogParamW ShowWindow 8106->8108 8109 40307b 8106->8109 8110 403048 8107->8110 8108->8109 8109->8012 8110->8012 8111->8020 8113 4032cd 8112->8113 8114 4032fb 8113->8114 8136 4034e5 SetFilePointer 8113->8136 8116 4034cf ReadFile 8114->8116 8117 403306 8116->8117 8118 403468 8117->8118 8119 403318 GetTickCount 8117->8119 8120 403452 8117->8120 8121 4034aa 8118->8121 8124 40346c 8118->8124 8119->8120 8128 403367 8119->8128 8120->8026 8123 4034cf ReadFile 8121->8123 8122 4034cf ReadFile 8122->8128 8123->8120 8124->8120 8125 4034cf ReadFile 8124->8125 8126 4060df WriteFile 8124->8126 8125->8124 8126->8124 8127 4033bd GetTickCount 8127->8128 8128->8120 8128->8122 8128->8127 8129 4033e2 MulDiv wsprintfW 8128->8129 8131 4060df WriteFile 8128->8131 8130 40559f 24 API calls 8129->8130 8130->8128 8131->8128 8133 4060b0 ReadFile 8132->8133 8134 4034e2 8133->8134 8134->8028 8135->8019 8136->8114 8138 403ed6 8137->8138 8154 406484 wsprintfW 8138->8154 8140 403f47 8141 403f7b 18 API calls 8140->8141 8143 403f4c 8141->8143 8142 403c77 8142->8042 8143->8142 8144 40657a 17 API calls 8143->8144 8144->8143 8145->8038 8146->8044 8148 4044e5 SendMessageW 8147->8148 8149 405695 8148->8149 8152 401389 2 API calls 8149->8152 8153 4056bc 8149->8153 8150 4044e5 SendMessageW 8151 4056ce OleUninitialize 8150->8151 8151->8073 8152->8149 8153->8150 8154->8140 8156 403b65 8155->8156 8157 403b2f 8156->8157 8158 403b6a FreeLibrary GlobalFree 8156->8158 8157->8095 8158->8157 8158->8158 9709 40263e 9710 402652 9709->9710 9711 40266d 9709->9711 9712 402d84 17 API calls 9710->9712 9713 402672 9711->9713 9714 40269d 9711->9714 9723 402659 9712->9723 9716 402da6 17 API calls 9713->9716 9715 402da6 17 API calls 9714->9715 9717 4026a4 lstrlenW 9715->9717 9718 402679 9716->9718 9717->9723 9726 40655f WideCharToMultiByte 9718->9726 9720 40268d lstrlenA 9720->9723 9721 4026e7 9722 4026d1 9722->9721 9724 4060df WriteFile 9722->9724 9723->9721 9723->9722 9725 40610e 5 API calls 9723->9725 9724->9721 9725->9722 9726->9720 7193 4015c1 7194 402da6 17 API calls 7193->7194 7195 4015c8 7194->7195 7196 405eb7 4 API calls 7195->7196 7209 4015d1 7196->7209 7197 401631 7199 401663 7197->7199 7200 401636 7197->7200 7198 405e39 CharNextW 7198->7209 7202 401423 24 API calls 7199->7202 7223 401423 7200->7223 7208 40165b 7202->7208 7207 40164a SetCurrentDirectoryW 7207->7208 7209->7197 7209->7198 7210 401617 GetFileAttributesW 7209->7210 7212 405b08 7209->7212 7215 405a6e CreateDirectoryW 7209->7215 7220 405aeb CreateDirectoryW 7209->7220 7210->7209 7227 40690a GetModuleHandleA 7212->7227 7216 405abb 7215->7216 7217 405abf GetLastError 7215->7217 7216->7209 7217->7216 7218 405ace SetFileSecurityW 7217->7218 7218->7216 7219 405ae4 GetLastError 7218->7219 7219->7216 7221 405afb 7220->7221 7222 405aff GetLastError 7220->7222 7221->7209 7222->7221 7224 40559f 24 API calls 7223->7224 7225 401431 7224->7225 7226 40653d lstrcpynW 7225->7226 7226->7207 7228 406930 GetProcAddress 7227->7228 7229 406926 7227->7229 7231 405b0f 7228->7231 7233 40689a GetSystemDirectoryW 7229->7233 7231->7209 7232 40692c 7232->7228 7232->7231 7234 4068bc wsprintfW LoadLibraryExW 7233->7234 7234->7232 9786 4016cc 9787 402da6 17 API calls 9786->9787 9788 4016d2 GetFullPathNameW 9787->9788 9789 40170e 9788->9789 9790 4016ec 9788->9790 9791 401723 GetShortPathNameW 9789->9791 9792 402c2a 9789->9792 9790->9789 9793 406873 2 API calls 9790->9793 9791->9792 9794 4016fe 9793->9794 9794->9789 9796 40653d lstrcpynW 9794->9796 9796->9789 7557 4020d8 7558 4020ea 7557->7558 7559 40219c 7557->7559 7560 402da6 17 API calls 7558->7560 7561 401423 24 API calls 7559->7561 7562 4020f1 7560->7562 7567 4022f6 7561->7567 7563 402da6 17 API calls 7562->7563 7564 4020fa 7563->7564 7565 402110 LoadLibraryExW 7564->7565 7566 402102 GetModuleHandleW 7564->7566 7565->7559 7568 402121 7565->7568 7566->7565 7566->7568 7579 406979 7568->7579 7571 402132 7573 402151 KiUserCallbackDispatcher 7571->7573 7574 40213a 7571->7574 7572 40216b 7575 40559f 24 API calls 7572->7575 7577 402142 7573->7577 7576 401423 24 API calls 7574->7576 7575->7577 7576->7577 7577->7567 7578 40218e FreeLibrary 7577->7578 7578->7567 7584 40655f WideCharToMultiByte 7579->7584 7581 406996 7582 40699d GetProcAddress 7581->7582 7583 40212c 7581->7583 7582->7583 7583->7571 7583->7572 7584->7581 7777 401ede 7778 402d84 17 API calls 7777->7778 7779 401ee4 7778->7779 7780 402d84 17 API calls 7779->7780 7781 401ef0 7780->7781 7782 401f07 EnableWindow 7781->7782 7783 401efc ShowWindow 7781->7783 7784 402c2a 7782->7784 7783->7784 7874 4026ec 7875 402d84 17 API calls 7874->7875 7884 4026fb 7875->7884 7876 402838 7877 402745 ReadFile 7877->7876 7877->7884 7878 4027de 7878->7876 7878->7884 7888 40610e SetFilePointer 7878->7888 7879 4060b0 ReadFile 7879->7884 7881 402785 MultiByteToWideChar 7881->7884 7882 40283a 7897 406484 wsprintfW 7882->7897 7884->7876 7884->7877 7884->7878 7884->7879 7884->7881 7884->7882 7885 4027ab SetFilePointer MultiByteToWideChar 7884->7885 7886 40284b 7884->7886 7885->7884 7886->7876 7887 40286c SetFilePointer 7886->7887 7887->7876 7889 40612a 7888->7889 7892 406142 7888->7892 7890 4060b0 ReadFile 7889->7890 7891 406136 7890->7891 7891->7892 7893 406173 SetFilePointer 7891->7893 7894 40614b SetFilePointer 7891->7894 7892->7878 7893->7892 7894->7893 7895 406156 7894->7895 7896 4060df WriteFile 7895->7896 7896->7892 7897->7876 9960 401ff6 9961 402da6 17 API calls 9960->9961 9962 401ffd 9961->9962 9963 406873 2 API calls 9962->9963 9964 402003 9963->9964 9966 402014 9964->9966 9967 406484 wsprintfW 9964->9967 9967->9966 7236 401d81 7237 401d94 GetDlgItem 7236->7237 7238 401d87 7236->7238 7239 401d8e 7237->7239 7247 402d84 7238->7247 7241 401dd5 GetClientRect LoadImageW SendMessageW 7239->7241 7242 402da6 17 API calls 7239->7242 7244 401e33 7241->7244 7246 401e3f 7241->7246 7242->7241 7245 401e38 DeleteObject 7244->7245 7244->7246 7245->7246 7248 40657a 17 API calls 7247->7248 7249 402d99 7248->7249 7249->7239 7290 6d2610e1 7292 6d261111 7290->7292 7291 6d2612b0 GlobalFree 7292->7291 7293 6d261240 GlobalFree 7292->7293 7294 6d2611d7 GlobalAlloc 7292->7294 7295 6d2611b8 7292->7295 7296 6d2612ab 7292->7296 7298 6d26129a GlobalFree 7292->7298 7300 6d26116b GlobalAlloc 7292->7300 7302 6d261381 7292->7302 7293->7292 7294->7295 7295->7292 7306 6d26135a 7295->7306 7310 6d261312 7295->7310 7296->7291 7298->7292 7300->7292 7303 6d2613ac 7302->7303 7304 6d26138a 7302->7304 7303->7292 7304->7303 7305 6d261390 lstrcpyW 7304->7305 7305->7303 7307 6d261361 7306->7307 7313 6d2612cc 7307->7313 7309 6d26137f 7309->7295 7311 6d261355 7310->7311 7312 6d26131b GlobalAlloc lstrcpynW 7310->7312 7311->7292 7312->7311 7316 6d2612bb GlobalAlloc 7313->7316 7315 6d2612db lstrcpynW 7315->7309 7316->7315 10027 40248a 10028 402da6 17 API calls 10027->10028 10029 40249c 10028->10029 10030 402da6 17 API calls 10029->10030 10031 4024a6 10030->10031 10044 402e36 10031->10044 10034 402c2a 10035 4024de 10037 4024ea 10035->10037 10039 402d84 17 API calls 10035->10039 10036 402da6 17 API calls 10038 4024d4 lstrlenW 10036->10038 10040 402509 RegSetValueExW 10037->10040 10042 4032b4 31 API calls 10037->10042 10038->10035 10039->10037 10041 40251f RegCloseKey 10040->10041 10041->10034 10042->10040 10045 402e51 10044->10045 10048 4063d8 10045->10048 10049 4063e7 10048->10049 10050 4063f2 RegCreateKeyExW 10049->10050 10051 4024b6 10049->10051 10050->10051 10051->10034 10051->10035 10051->10036 7392 6fd73c06 7393 6fd73c27 7392->7393 7394 6fd73c35 LocalAlloc 7393->7394 7395 6fd73cd1 7394->7395 7488 6fd73d07 7394->7488 7396 6fd73cd7 WideCharToMultiByte lstrlenA 7395->7396 7396->7488 7397 6fd73d47 lstrcmpiW 7398 6fd73d5e lstrcmpiW 7397->7398 7397->7488 7400 6fd73d7a lstrcmpiW 7398->7400 7398->7488 7399 6fd74209 7401 6fd7422e 7399->7401 7402 6fd7421e lstrcpyW 7399->7402 7403 6fd73d91 lstrcmpiW 7400->7403 7400->7488 7404 6fd74280 7401->7404 7407 6fd7424e wsprintfW lstrlenW 7401->7407 7402->7401 7405 6fd73dad lstrcmpiW 7403->7405 7403->7488 7408 6fd742f5 #17 7404->7408 7409 6fd7428a FindWindowExW 7404->7409 7406 6fd73dc9 lstrcmpiW 7405->7406 7405->7488 7410 6fd73de5 lstrcmpiW 7406->7410 7406->7488 7407->7404 7415 6fd742fb 7408->7415 7409->7408 7411 6fd742a3 7409->7411 7412 6fd73e01 lstrcmpiW 7410->7412 7410->7488 7411->7408 7413 6fd742ac SetDlgItemTextW 7411->7413 7414 6fd73e1d lstrcmpiW 7412->7414 7412->7488 7413->7415 7416 6fd73e47 lstrcmpiW 7414->7416 7417 6fd73e2e LocalAlloc 7414->7417 7418 6fd7433c GetWindowLongW SetWindowLongW 7415->7418 7419 6fd74359 GetTickCount CreateDialogParamW 7415->7419 7420 6fd73e88 lstrcmpiW 7416->7420 7416->7488 7417->7488 7418->7419 7422 6fd743ad CreateThread 7419->7422 7423 6fd74568 GetLastError lstrlenW wsprintfW 7419->7423 7421 6fd73f48 lstrcmpiW 7420->7421 7420->7488 7424 6fd73f72 lstrcmpiW 7421->7424 7425 6fd73f59 LocalAlloc 7421->7425 7426 6fd74550 DestroyWindow 7422->7426 7427 6fd743cf GetDlgItem GetDlgItem 7422->7427 7499 6fd710c8 7422->7499 7440 6fd745a6 7423->7440 7430 6fd73f8d lstrcmpiW 7424->7430 7424->7488 7425->7488 7426->7440 7428 6fd74455 IsWindow 7427->7428 7429 6fd74403 ShowWindow 7427->7429 7434 6fd74465 7428->7434 7435 6fd744c8 WaitForSingleObject 7428->7435 7429->7428 7436 6fd7441a 7429->7436 7432 6fd73f9e LocalAlloc 7430->7432 7433 6fd73fcd lstrcmpiW 7430->7433 7431 6fd73e6f lstrcpyW 7431->7488 7437 6fd73fb2 7432->7437 7438 6fd73fe8 lstrcmpiW 7433->7438 7433->7488 7439 6fd74467 GetMessageW 7434->7439 7441 6fd744f0 CloseHandle 7435->7441 7442 6fd744db TerminateThread 7435->7442 7436->7428 7443 6fd74427 GetWindowLongW EnableWindow 7436->7443 7444 6fd7443d 7436->7444 7463 6fd74107 lstrcpyW 7437->7463 7437->7488 7447 6fd7401c lstrcmpiW 7438->7447 7448 6fd73ff9 LocalAlloc 7438->7448 7445 6fd744c5 7439->7445 7446 6fd74478 IsDialogMessageW 7439->7446 7449 6fd745cc LocalFree 7440->7449 7450 6fd745bb lstrcmpiW 7440->7450 7441->7440 7451 6fd74504 7441->7451 7442->7441 7443->7444 7444->7428 7453 6fd74441 IsWindowVisible ShowWindow 7444->7453 7445->7435 7454 6fd744b5 IsWindow 7446->7454 7455 6fd7448c IsDialogMessageW 7446->7455 7456 6fd74053 lstrcmpiW 7447->7456 7447->7488 7448->7437 7457 6fd745e1 LocalFree 7449->7457 7458 6fd745ed 7449->7458 7450->7440 7450->7449 7451->7440 7452 6fd74511 SetDlgItemTextW 7451->7452 7452->7440 7461 6fd7452b 7452->7461 7453->7428 7454->7439 7454->7445 7455->7454 7465 6fd7449d TranslateMessage 7455->7465 7462 6fd7408a lstrcmpiW 7456->7462 7456->7488 7457->7458 7459 6fd745f6 LocalFree 7458->7459 7460 6fd745fd 7458->7460 7459->7460 7466 6fd74606 LocalFree 7460->7466 7467 6fd7460d 7460->7467 7468 6fd7452f SetWindowLongW 7461->7468 7469 6fd7453b 7461->7469 7470 6fd7409b LocalAlloc 7462->7470 7462->7488 7463->7488 7464 6fd73ec4 lstrcpyW 7464->7488 7465->7454 7471 6fd744ab DispatchMessageW 7465->7471 7466->7467 7472 6fd74616 LocalFree 7467->7472 7473 6fd7461d 7467->7473 7468->7469 7469->7440 7477 6fd74545 ShowWindow 7469->7477 7470->7488 7471->7454 7472->7473 7478 6fd74626 LocalFree 7473->7478 7479 6fd7462d 7473->7479 7474 6fd74112 lstrcmpiW 7476 6fd74127 CreateFileA 7474->7476 7474->7488 7475 6fd740bd lstrcmpiW 7480 6fd740d7 lstrcmpiW 7475->7480 7481 6fd740e8 LocalAlloc 7475->7481 7482 6fd742e6 7476->7482 7483 6fd7414a GetFileSize 7476->7483 7477->7440 7478->7479 7484 6fd74636 LocalFree 7479->7484 7493 6fd7463d 7479->7493 7480->7474 7480->7481 7481->7463 7482->7440 7485 6fd742d0 CloseHandle 7483->7485 7489 6fd74161 7483->7489 7484->7493 7485->7440 7486 6fd7472e 7487 6fd74715 7491 6fd7471b LocalFree 7487->7491 7488->7397 7488->7399 7488->7431 7488->7464 7488->7474 7488->7475 7489->7485 7490 6fd7418b wsprintfA LocalFree LocalAlloc ReadFile 7489->7490 7495 6fd741ea CloseHandle 7489->7495 7490->7485 7490->7489 7491->7486 7492 6fd746c3 MultiByteToWideChar 7492->7491 7494 6fd746d7 LocalAlloc 7492->7494 7493->7486 7493->7487 7493->7492 7494->7491 7496 6fd746ed MultiByteToWideChar 7494->7496 7495->7488 7497 6fd74706 7496->7497 7498 6fd7470c LocalFree 7496->7498 7497->7498 7498->7491 7500 6fd71ad9 6 API calls 7499->7500 7501 6fd71ba7 InternetQueryOptionW 7500->7501 7515 6fd72259 7500->7515 7502 6fd71bcf 7501->7502 7503 6fd71be8 7501->7503 7502->7503 7505 6fd71bd5 InternetSetOptionW 7502->7505 7506 6fd71bf1 InternetSetOptionW 7503->7506 7507 6fd71c00 7503->7507 7504 6fd72270 6 API calls 7508 6fd722ae 7504->7508 7509 6fd7229a PostMessageW 7504->7509 7505->7503 7506->7507 7510 6fd71c15 LoadLibraryA GetProcAddress 7507->7510 7511 6fd71c09 InternetSetOptionW 7507->7511 7509->7508 7531 6fd71c4f 7510->7531 7511->7510 7512 6fd71c36 lstrcmpiW 7514 6fd7223d InternetCloseHandle lstrcmpiW 7512->7514 7512->7531 7513 6fd7222d 7513->7514 7514->7504 7514->7515 7515->7504 7516 6fd71c61 lstrcmpiW 7516->7514 7517 6fd71c7a PostMessageW 7516->7517 7518 6fd71cc8 CreateFileW 7517->7518 7517->7531 7519 6fd71d05 7518->7519 7518->7531 7523 6fd721f6 CloseHandle 7519->7523 7525 6fd7222f DeleteFileW 7519->7525 7519->7531 7543 6fd72172 ShowWindow 7519->7543 7520 6fd71d34 GetFileSize 7521 6fd71d43 InternetCrackUrlW 7520->7521 7521->7519 7521->7531 7522 6fd71da9 lstrcatW GetTickCount 7522->7531 7523->7519 7523->7531 7524 6fd71d71 wsprintfW lstrlenW 7524->7531 7525->7514 7526 6fd71dd8 SetFilePointer 7527 6fd71dee lstrlenW lstrlenW InternetConnectW 7526->7527 7527->7531 7528 6fd720c6 GetLastError 7528->7531 7529 6fd72069 InternetGetLastResponseInfoW 7529->7528 7529->7531 7530 6fd72045 InternetCloseHandle 7530->7531 7531->7512 7531->7513 7531->7514 7531->7516 7531->7519 7531->7520 7531->7521 7531->7522 7531->7524 7531->7526 7531->7527 7531->7528 7531->7529 7531->7530 7532 6fd71e95 InternetCloseHandle 7531->7532 7533 6fd72115 SleepEx 7531->7533 7535 6fd720ab lstrcpynW 7531->7535 7536 6fd71f42 6 API calls 7531->7536 7537 6fd71eae HttpQueryInfoW 7531->7537 7540 6fd7203b InternetCloseHandle 7531->7540 7542 6fd71f19 WriteFile 7531->7542 7547 6fd72025 HttpEndRequestW 7531->7547 7532->7530 7533->7531 7534 6fd72129 SleepEx 7533->7534 7534->7531 7535->7531 7538 6fd71fc7 GetWindowLongW 7536->7538 7539 6fd71fd2 GetWindowLongW 7536->7539 7537->7531 7541 6fd71fdb SetWindowLongW SendDlgItemMessageW 7538->7541 7539->7541 7540->7530 7541->7531 7542->7531 7543->7519 7544 6fd72183 GetParent MessageBoxW 7543->7544 7544->7519 7545 6fd721b3 ShowWindow 7544->7545 7545->7519 7546 6fd721ce SleepEx 7545->7546 7546->7519 7546->7531 7547->7531 7548 402891 7549 402898 7548->7549 7551 402ba9 7548->7551 7550 402d84 17 API calls 7549->7550 7552 40289f 7550->7552 7553 4028ae SetFilePointer 7552->7553 7553->7551 7554 4028be 7553->7554 7556 406484 wsprintfW 7554->7556 7556->7551 7588 403f9a 7589 403fb2 7588->7589 7590 404113 7588->7590 7589->7590 7591 403fbe 7589->7591 7592 404124 GetDlgItem GetDlgItem 7590->7592 7595 404164 7590->7595 7596 403fc9 SetWindowPos 7591->7596 7597 403fdc 7591->7597 7593 404499 18 API calls 7592->7593 7598 40414e SetClassLongW 7593->7598 7594 4041be 7606 40410e 7594->7606 7662 4044e5 7594->7662 7595->7594 7605 401389 2 API calls 7595->7605 7596->7597 7600 403fe5 ShowWindow 7597->7600 7601 404027 7597->7601 7602 40140b 2 API calls 7598->7602 7607 404100 7600->7607 7608 404005 GetWindowLongW 7600->7608 7603 404046 7601->7603 7604 40402f DestroyWindow 7601->7604 7602->7595 7611 40404b SetWindowLongW 7603->7611 7612 40405c 7603->7612 7610 404443 7604->7610 7613 404196 7605->7613 7684 404500 7607->7684 7608->7607 7609 40401e ShowWindow 7608->7609 7609->7601 7610->7606 7619 404453 ShowWindow 7610->7619 7611->7606 7612->7607 7616 404068 GetDlgItem 7612->7616 7613->7594 7617 40419a SendMessageW 7613->7617 7615 404424 DestroyWindow EndDialog 7615->7610 7620 404096 7616->7620 7621 404079 SendMessageW IsWindowEnabled 7616->7621 7617->7606 7618 40140b 2 API calls 7629 4041d0 7618->7629 7619->7606 7623 4040a3 7620->7623 7626 4040ea SendMessageW 7620->7626 7627 4040b6 7620->7627 7634 40409b 7620->7634 7621->7606 7621->7620 7622 40657a 17 API calls 7622->7629 7623->7626 7623->7634 7625 404499 18 API calls 7625->7629 7626->7607 7630 4040d3 7627->7630 7631 4040be 7627->7631 7628 4040d1 7628->7607 7629->7606 7629->7615 7629->7618 7629->7622 7629->7625 7652 404364 DestroyWindow 7629->7652 7665 404499 7629->7665 7633 40140b 2 API calls 7630->7633 7678 40140b 7631->7678 7635 4040da 7633->7635 7681 404472 7634->7681 7635->7607 7635->7634 7637 40424b GetDlgItem 7638 404260 7637->7638 7639 404268 ShowWindow KiUserCallbackDispatcher 7637->7639 7638->7639 7668 4044bb EnableWindow 7639->7668 7641 404292 EnableWindow 7646 4042a6 7641->7646 7642 4042ab GetSystemMenu EnableMenuItem SendMessageW 7643 4042db SendMessageW 7642->7643 7642->7646 7643->7646 7646->7642 7669 4044ce SendMessageW 7646->7669 7670 403f7b 7646->7670 7673 40653d lstrcpynW 7646->7673 7648 40430a lstrlenW 7649 40657a 17 API calls 7648->7649 7650 404320 SetWindowTextW 7649->7650 7674 401389 7650->7674 7652->7610 7653 40437e CreateDialogParamW 7652->7653 7653->7610 7654 4043b1 7653->7654 7655 404499 18 API calls 7654->7655 7656 4043bc GetDlgItem GetWindowRect ScreenToClient SetWindowPos 7655->7656 7657 401389 2 API calls 7656->7657 7658 404402 7657->7658 7658->7606 7659 40440a ShowWindow 7658->7659 7660 4044e5 SendMessageW 7659->7660 7661 404422 7660->7661 7661->7610 7663 4044fd 7662->7663 7664 4044ee SendMessageW 7662->7664 7663->7629 7664->7663 7666 40657a 17 API calls 7665->7666 7667 4044a4 SetDlgItemTextW 7666->7667 7667->7637 7668->7641 7669->7646 7671 40657a 17 API calls 7670->7671 7672 403f89 SetWindowTextW 7671->7672 7672->7646 7673->7648 7676 401390 7674->7676 7675 4013fe 7675->7629 7676->7675 7677 4013cb MulDiv SendMessageW 7676->7677 7677->7676 7679 401389 2 API calls 7678->7679 7680 401420 7679->7680 7680->7634 7682 404479 7681->7682 7683 40447f SendMessageW 7681->7683 7682->7683 7683->7628 7685 4045c3 7684->7685 7686 404518 GetWindowLongW 7684->7686 7685->7606 7686->7685 7687 40452d 7686->7687 7687->7685 7688 40455a GetSysColor 7687->7688 7689 40455d 7687->7689 7688->7689 7690 404563 SetTextColor 7689->7690 7691 40456d SetBkMode 7689->7691 7690->7691 7692 404585 GetSysColor 7691->7692 7693 40458b 7691->7693 7692->7693 7694 404592 SetBkColor 7693->7694 7695 40459c 7693->7695 7694->7695 7695->7685 7696 4045b6 CreateBrushIndirect 7695->7696 7697 4045af DeleteObject 7695->7697 7696->7685 7697->7696 7698 401b9b 7699 401ba8 7698->7699 7700 401bec 7698->7700 7701 401c31 7699->7701 7708 401bbf 7699->7708 7702 401bf1 7700->7702 7703 401c16 GlobalAlloc 7700->7703 7705 40657a 17 API calls 7701->7705 7711 40239d 7701->7711 7702->7711 7717 40653d lstrcpynW 7702->7717 7704 40657a 17 API calls 7703->7704 7704->7701 7707 402397 7705->7707 7707->7711 7720 405b9d 7707->7720 7718 40653d lstrcpynW 7708->7718 7709 401c03 GlobalFree 7709->7711 7713 401bce 7719 40653d lstrcpynW 7713->7719 7715 401bdd 7724 40653d lstrcpynW 7715->7724 7717->7709 7718->7713 7719->7715 7721 405bb2 7720->7721 7722 405bfe 7721->7722 7723 405bc6 MessageBoxIndirectW 7721->7723 7722->7711 7723->7722 7724->7711 7785 40259e 7796 402de6 7785->7796 7788 402d84 17 API calls 7789 4025b1 7788->7789 7790 4025d9 RegEnumValueW 7789->7790 7791 4025cd RegEnumKeyW 7789->7791 7793 40292e 7789->7793 7792 4025ee 7790->7792 7794 4025f5 RegCloseKey 7790->7794 7791->7794 7792->7794 7794->7793 7797 402da6 17 API calls 7796->7797 7798 402dfd 7797->7798 7799 4063aa RegOpenKeyExW 7798->7799 7800 4025a8 7799->7800 7800->7788 7801 401fa4 7802 402da6 17 API calls 7801->7802 7803 401faa 7802->7803 7804 40559f 24 API calls 7803->7804 7805 401fb4 7804->7805 7814 405b20 CreateProcessW 7805->7814 7808 401fdd CloseHandle 7811 40292e 7808->7811 7812 401fcf 7812->7808 7822 406484 wsprintfW 7812->7822 7815 405b53 CloseHandle 7814->7815 7816 401fba 7814->7816 7815->7816 7816->7808 7816->7811 7817 4069b5 WaitForSingleObject 7816->7817 7818 4069cf 7817->7818 7819 4069e1 GetExitCodeProcess 7818->7819 7823 406946 7818->7823 7819->7812 7822->7808 7824 406963 PeekMessageW 7823->7824 7825 406973 WaitForSingleObject 7824->7825 7826 406959 DispatchMessageW 7824->7826 7825->7818 7826->7824 7844 6fd72530 GetDlgItem 7845 6fd72559 GetDlgItem GetDlgItem 7844->7845 7846 6fd7262b 7844->7846 7848 6fd72584 GetWindowLongW 7845->7848 7849 6fd72592 SetWindowLongW 7845->7849 7847 6fd72662 SendDlgItemMessageW 7846->7847 7850 6fd72641 7846->7850 7851 6fd72638 ShowWindow 7846->7851 7852 6fd72685 GetModuleHandleW LoadIconW SendDlgItemMessageW SetDlgItemTextW SetWindowTextW 7847->7852 7853 6fd726d1 SetTimer 7847->7853 7848->7849 7849->7846 7854 6fd725ab SendMessageW 7849->7854 7850->7847 7855 6fd7264a GetWindowLongW SetWindowLongW 7850->7855 7851->7850 7852->7853 7856 6fd726eb 6 API calls 7853->7856 7857 6fd72739 7853->7857 7858 6fd725c4 SendDlgItemMessageW SendDlgItemMessageW 7854->7858 7859 6fd725dd 7854->7859 7855->7847 7856->7857 7858->7859 7860 6fd725e7 GetParent GetDlgItem GetWindowTextW 7859->7860 7861 6fd7260d SetWindowTextW SetWindowPos 7859->7861 7860->7861 7861->7846

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 211 6fd710c8-6fd71ba1 LocalAlloc * 5 InternetOpenW 213 6fd71ba7-6fd71bcd InternetQueryOptionW 211->213 214 6fd72266 211->214 215 6fd71bcf-6fd71bd3 213->215 216 6fd71be8-6fd71bef 213->216 217 6fd72270-6fd72298 LocalFree * 5 IsWindow 214->217 215->216 218 6fd71bd5-6fd71be6 InternetSetOptionW 215->218 219 6fd71bf1-6fd71bfd InternetSetOptionW 216->219 220 6fd71c00-6fd71c07 216->220 221 6fd722ae-6fd722b7 217->221 222 6fd7229a-6fd722a8 PostMessageW 217->222 218->216 219->220 223 6fd71c15-6fd71c31 LoadLibraryA GetProcAddress 220->223 224 6fd71c09-6fd71c13 InternetSetOptionW 220->224 222->221 225 6fd7221a-6fd72227 call 6fd71023 223->225 224->223 228 6fd71c36-6fd71c49 lstrcmpiW 225->228 229 6fd7222d 225->229 230 6fd7223d-6fd72257 InternetCloseHandle lstrcmpiW 228->230 231 6fd71c4f-6fd71c5b call 6fd71023 228->231 229->230 230->217 232 6fd72259-6fd72264 call 6fd71005 230->232 231->230 237 6fd71c61-6fd71c74 lstrcmpiW 231->237 232->217 237->230 238 6fd71c7a-6fd71cc6 PostMessageW 237->238 239 6fd71d14 238->239 240 6fd71cc8-6fd71d03 CreateFileW 238->240 241 6fd71d17-6fd71d32 239->241 240->241 242 6fd71d05-6fd71d0f 240->242 243 6fd71d34-6fd71d3e GetFileSize 241->243 244 6fd71d43-6fd71d59 InternetCrackUrlW 241->244 242->225 243->244 245 6fd721e7-6fd721f1 244->245 246 6fd71d5f-6fd71d67 244->246 249 6fd721f6-6fd72206 CloseHandle 245->249 247 6fd71da9-6fd71db9 lstrcatW GetTickCount 246->247 248 6fd71d69-6fd71d6f 246->248 251 6fd71dbe-6fd71dc8 247->251 248->247 250 6fd71d71-6fd71da3 wsprintfW lstrlenW call 6fd710d2 248->250 249->225 252 6fd72208-6fd7220f 249->252 250->247 254 6fd71dcf-6fd71dd6 251->254 255 6fd71dca-6fd71dcd 251->255 252->225 256 6fd72211-6fd72218 252->256 259 6fd71dd8-6fd71deb SetFilePointer 254->259 260 6fd71dee-6fd71e53 lstrlenW * 2 InternetConnectW 254->260 255->254 255->259 256->225 257 6fd7222f-6fd7223a DeleteFileW 256->257 257->230 259->260 261 6fd72057-6fd72067 260->261 262 6fd71e59-6fd71e6a 260->262 263 6fd720c6-6fd720d4 GetLastError 261->263 264 6fd72069-6fd72085 InternetGetLastResponseInfoW 261->264 265 6fd71e76-6fd71e7a call 6fd7100a 262->265 266 6fd71e6c-6fd71e74 call 6fd71019 262->266 270 6fd720d6-6fd720db 263->270 271 6fd720dd-6fd720ee 263->271 264->263 267 6fd72087-6fd7209a call 6fd7108c 264->267 274 6fd71e7f 265->274 277 6fd71e82-6fd71e86 266->277 267->263 280 6fd7209c-6fd720c4 call 6fd7108c lstrcpynW 267->280 270->271 275 6fd720f3-6fd720fa 270->275 271->275 274->277 278 6fd72101-6fd72109 275->278 279 6fd720fc-6fd720ff 275->279 281 6fd72045-6fd72052 InternetCloseHandle 277->281 282 6fd71e8c-6fd71e93 277->282 283 6fd72146 278->283 284 6fd7210b-6fd72113 278->284 279->278 279->283 280->275 281->275 287 6fd71e95-6fd71e9c InternetCloseHandle 282->287 288 6fd71ea1-6fd71ea8 282->288 285 6fd7214b-6fd72152 283->285 284->285 289 6fd72115-6fd72127 SleepEx 284->289 291 6fd721f3 285->291 292 6fd72158-6fd7215a 285->292 287->281 294 6fd71f42-6fd71fc5 GetDlgItem SendDlgItemMessageW GetDlgItem SetWindowTextW GetDlgItem SetWindowTextW 288->294 295 6fd71eae-6fd71ece HttpQueryInfoW 288->295 289->283 290 6fd72129-6fd72140 SleepEx 289->290 290->251 290->283 291->249 292->291 296 6fd72160-6fd72163 292->296 297 6fd71fc7-6fd71fd0 GetWindowLongW 294->297 298 6fd71fd2-6fd71fd8 GetWindowLongW 294->298 299 6fd71f36-6fd71f3d 295->299 300 6fd71ed0-6fd71ed8 295->300 296->291 302 6fd72169-6fd7216c 296->302 303 6fd71fdb-6fd7201b SetWindowLongW SendDlgItemMessageW call 6fd7102d 297->303 298->303 301 6fd7203b-6fd72042 InternetCloseHandle 299->301 304 6fd71eda-6fd71ee8 300->304 305 6fd71f19-6fd71f31 WriteFile 300->305 301->281 302->291 307 6fd72172-6fd72181 ShowWindow 302->307 303->301 315 6fd7201d-6fd72023 303->315 306 6fd71f33 304->306 309 6fd71eea-6fd71eed 304->309 305->306 306->299 307->291 310 6fd72183-6fd721b1 GetParent MessageBoxW 307->310 309->306 312 6fd71eef-6fd71f0f 309->312 310->291 314 6fd721b3-6fd721cc ShowWindow 310->314 312->306 313 6fd71f11-6fd71f17 312->313 313->309 314->291 316 6fd721ce-6fd721df SleepEx 314->316 315->301 317 6fd72025-6fd7203a HttpEndRequestW call 6fd71069 315->317 316->251 318 6fd721e5 316->318 317->301 318->249
                                                                      APIs
                                                                      • LocalAlloc.KERNEL32(00000040,?), ref: 6FD71AF9
                                                                      • LocalAlloc.KERNEL32(00000040,?), ref: 6FD71B07
                                                                      • LocalAlloc.KERNEL32(00000040,?), ref: 6FD71B17
                                                                      • LocalAlloc.KERNEL32(00000040,?), ref: 6FD71B25
                                                                      • LocalAlloc.KERNEL32(00000040,?), ref: 6FD71B36
                                                                      • InternetOpenW.WININET(6FD794E0,00000000,00000000), ref: 6FD71B91
                                                                      • InternetQueryOptionW.WININET(00000000,00000032,?,?), ref: 6FD71BBC
                                                                      • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 6FD71BE6
                                                                      • InternetSetOptionW.WININET(00000000,00000002,6FD79800,00000004), ref: 6FD71BFB
                                                                      • InternetSetOptionW.WININET(00000000,00000006,6FD79804,00000004), ref: 6FD71C13
                                                                      • LoadLibraryA.KERNEL32(WININET,FtpCommandW), ref: 6FD71C1F
                                                                      • GetProcAddress.KERNEL32(00000000), ref: 6FD71C26
                                                                      • lstrcmpiW.KERNEL32(/end), ref: 6FD71C41
                                                                      • lstrcmpiW.KERNEL32(/end,6FD79140), ref: 6FD71C6C
                                                                      • PostMessageW.USER32(?,00000113,00000001,00000000), ref: 6FD71CB9
                                                                      • CreateFileW.KERNEL32(6FD79140,40000000,00000001,00000000,-00000002,00000000,00000000), ref: 6FD71CF5
                                                                      • GetFileSize.KERNEL32(?,00000000), ref: 6FD71D38
                                                                      • InternetCrackUrlW.WININET(00000000,00000000,0000003C), ref: 6FD71D51
                                                                      • wsprintfW.USER32 ref: 6FD71D7D
                                                                      • lstrlenW.KERNEL32(6FD7C2F8,6FD7C2F8,6FD798A8), ref: 6FD71D92
                                                                      • lstrcatW.KERNEL32(?,?), ref: 6FD71DAD
                                                                      • GetTickCount.KERNEL32 ref: 6FD71DB3
                                                                      • SetFilePointer.KERNEL32(?,00000000,00000000,00000000), ref: 6FD71DE5
                                                                      • lstrlenW.KERNEL32(?,00000003,00000000,00000000), ref: 6FD71E1E
                                                                      • lstrlenW.KERNEL32(?,?), ref: 6FD71E30
                                                                      • InternetConnectW.WININET(00000000,?,?,?), ref: 6FD71E46
                                                                      • InternetCloseHandle.WININET(00000000), ref: 6FD71E96
                                                                      • HttpQueryInfoW.WININET(00000000,00000016,6FD7C2F8,00000800,00000000), ref: 6FD71EC6
                                                                      • WriteFile.KERNEL32(?,6FD7C2F8,00000800,00000004,00000000), ref: 6FD71F2B
                                                                      • InternetCloseHandle.WININET(00000000), ref: 6FD7203C
                                                                      • InternetCloseHandle.WININET(00000000), ref: 6FD72046
                                                                      • InternetGetLastResponseInfoW.WININET(?,6FD7C2F8,?), ref: 6FD7207D
                                                                      • lstrcpynW.KERNEL32(?,00000000,00000020), ref: 6FD720BE
                                                                      • GetLastError.KERNEL32 ref: 6FD720C6
                                                                      • SleepEx.KERNEL32(000007D0,00000000), ref: 6FD72123
                                                                      • SleepEx.KERNEL32(00000BB8,00000000), ref: 6FD72139
                                                                      • ShowWindow.USER32(?,00000000), ref: 6FD7217C
                                                                      • GetParent.USER32(?), ref: 6FD721A1
                                                                      • MessageBoxW.USER32(00000000), ref: 6FD721A8
                                                                      • ShowWindow.USER32(?,00000005), ref: 6FD721C8
                                                                      • SleepEx.KERNEL32(000003E8,00000000), ref: 6FD721D4
                                                                      • CloseHandle.KERNEL32(?), ref: 6FD721F9
                                                                      • DeleteFileW.KERNEL32(6FD79140), ref: 6FD72234
                                                                      • InternetCloseHandle.WININET(00000000), ref: 6FD7223E
                                                                      • lstrcmpiW.KERNEL32(/end), ref: 6FD7224F
                                                                      • LocalFree.KERNEL32(?), ref: 6FD72279
                                                                      • LocalFree.KERNEL32(?), ref: 6FD7227E
                                                                      • LocalFree.KERNEL32(?), ref: 6FD72283
                                                                      • LocalFree.KERNEL32(?), ref: 6FD72288
                                                                      • LocalFree.KERNEL32(?), ref: 6FD7228D
                                                                      • IsWindow.USER32(?), ref: 6FD72290
                                                                      • PostMessageW.USER32(?,00000111,FFEE0001,00000000), ref: 6FD722A8
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706805863.000000006FD71000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD70000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706784915.000000006FD70000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706824623.000000006FD77000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706839008.000000006FD78000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706980410.000000006FD7F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fd70000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Internet$Local$AllocCloseFileFreeHandle$Option$MessageSleepWindowlstrcmpilstrlen$InfoLastPostQueryShow$AddressConnectCountCrackCreateDeleteErrorHttpLibraryLoadOpenParentPointerProcResponseSizeTickWritelstrcatlstrcpynwsprintf
                                                                      • String ID: %s:%s$/end$530$<$FtpCommandW$Inetc plug-in$Not Available$Unknown$WININET$Your internet connection seems to be not permitted or dropped out!Please reconnect and click Retry to resume installation.
                                                                      • API String ID: 666050937-1780337547
                                                                      • Opcode ID: 45b767de46b8305d7e3a6ebc480d9987f8db4df155bd54e1c17fc1094a7811d4
                                                                      • Instruction ID: 332f252de228935bf0c913aa2e734fc20a1f7c5a54d69b56487308502bfa623e
                                                                      • Opcode Fuzzy Hash: 45b767de46b8305d7e3a6ebc480d9987f8db4df155bd54e1c17fc1094a7811d4
                                                                      • Instruction Fuzzy Hash: 34228172900665EFFF608F64CC44BAA7BF9FB0A325F184129E911EE294DB307911DB61

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 321 40352d-40357d SetErrorMode GetVersionExW 322 4035b7-4035be 321->322 323 40357f-4035b3 GetVersionExW 321->323 324 4035c0 322->324 325 4035c8-403608 322->325 323->322 324->325 326 40360a-403612 call 40690a 325->326 327 40361b 325->327 326->327 332 403614 326->332 329 403620-403634 call 40689a lstrlenA 327->329 334 403636-403652 call 40690a * 3 329->334 332->327 341 403663-4036c5 #17 OleInitialize SHGetFileInfoW call 40653d GetCommandLineW call 40653d 334->341 342 403654-40365a 334->342 349 4036c7-4036c9 341->349 350 4036ce-4036e1 call 405e39 CharNextW 341->350 342->341 346 40365c 342->346 346->341 349->350 353 4037d8-4037de 350->353 354 4037e4 353->354 355 4036e6-4036ec 353->355 356 4037f8-403812 GetTempPathW call 4034fc 354->356 357 4036f5-4036fb 355->357 358 4036ee-4036f3 355->358 367 403814-403832 GetWindowsDirectoryW lstrcatW call 4034fc 356->367 368 40386a-403882 DeleteFileW call 40307d 356->368 359 403702-403706 357->359 360 4036fd-403701 357->360 358->357 358->358 362 4037c6-4037d4 call 405e39 359->362 363 40370c-403712 359->363 360->359 362->353 378 4037d6-4037d7 362->378 365 403714-40371b 363->365 366 40372c-403765 363->366 372 403722 365->372 373 40371d-403720 365->373 374 403781-4037bb 366->374 375 403767-40376c 366->375 367->368 387 403834-403864 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4034fc 367->387 383 403888-40388e 368->383 384 403a59-403a67 call 403b12 OleUninitialize 368->384 372->366 373->366 373->372 381 4037c3-4037c5 374->381 382 4037bd-4037c1 374->382 375->374 379 40376e-403776 375->379 378->353 385 403778-40377b 379->385 386 40377d 379->386 381->362 382->381 388 4037e6-4037f3 call 40653d 382->388 389 403894-4038a7 call 405e39 383->389 390 403935-40393c call 403bec 383->390 400 403a69-403a78 call 405b9d ExitProcess 384->400 401 403a7e-403a84 384->401 385->374 385->386 386->374 387->368 387->384 388->356 402 4038f9-403906 389->402 403 4038a9-4038de 389->403 399 403941-403944 390->399 399->384 405 403a86-403a9b GetCurrentProcess OpenProcessToken 401->405 406 403afc-403b04 401->406 412 403908-403916 call 405f14 402->412 413 403949-40395d call 405b08 lstrcatW 402->413 409 4038e0-4038e4 403->409 407 403acc-403ada call 40690a 405->407 408 403a9d-403ac6 LookupPrivilegeValueW AdjustTokenPrivileges 405->408 410 403b06 406->410 411 403b09-403b0c ExitProcess 406->411 424 403ae8-403af3 ExitWindowsEx 407->424 425 403adc-403ae6 407->425 408->407 416 4038e6-4038eb 409->416 417 4038ed-4038f5 409->417 410->411 412->384 428 40391c-403932 call 40653d * 2 412->428 426 40396a-403984 lstrcatW lstrcmpiW 413->426 427 40395f-403965 lstrcatW 413->427 416->417 421 4038f7 416->421 417->409 417->421 421->402 424->406 430 403af5-403af7 call 40140b 424->430 425->424 425->430 431 403a57 426->431 432 40398a-40398d 426->432 427->426 428->390 430->406 431->384 436 403996 call 405aeb 432->436 437 40398f-403994 call 405a6e 432->437 441 40399b-4039ab SetCurrentDirectoryW 436->441 437->441 444 4039b8-4039e4 call 40653d 441->444 445 4039ad-4039b3 call 40653d 441->445 449 4039e9-403a04 call 40657a DeleteFileW 444->449 445->444 452 403a44-403a4e 449->452 453 403a06-403a16 CopyFileW 449->453 452->449 454 403a50-403a52 call 4062fd 452->454 453->452 455 403a18-403a38 call 4062fd call 40657a call 405b20 453->455 454->431 455->452 463 403a3a-403a41 CloseHandle 455->463 463->452
                                                                      APIs
                                                                      • SetErrorMode.KERNEL32(00008001), ref: 00403550
                                                                      • GetVersionExW.KERNEL32(?), ref: 00403579
                                                                      • GetVersionExW.KERNEL32(0000011C), ref: 00403590
                                                                      • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403627
                                                                      • #17.COMCTL32(00000007,00000009,0000000B), ref: 00403663
                                                                      • OleInitialize.OLE32(00000000), ref: 0040366A
                                                                      • SHGetFileInfoW.SHELL32(0042B228,00000000,?,000002B4,00000000), ref: 00403688
                                                                      • GetCommandLineW.KERNEL32(00433F00,NSIS Error), ref: 0040369D
                                                                      • CharNextW.USER32(00000000,00440000,00000020,00440000,00000000), ref: 004036D6
                                                                      • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,?), ref: 00403809
                                                                      • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040381A
                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403826
                                                                      • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040383A
                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403842
                                                                      • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403853
                                                                      • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 0040385B
                                                                      • DeleteFileW.KERNEL32(1033), ref: 0040386F
                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,00440000,00000000,?), ref: 00403956
                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C,C:\Users\user\AppData\Local\Temp\,~nsu,00440000,00000000,?), ref: 00403965
                                                                        • Part of subcall function 00405AEB: CreateDirectoryW.KERNEL32(?,00000000,00403520,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00405AF1
                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,00440000,00000000,?), ref: 00403970
                                                                      • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,00441800,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,00440000,00000000,?), ref: 0040397C
                                                                      • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 0040399C
                                                                      • DeleteFileW.KERNEL32(0042AA28,0042AA28,?,https://pcapp.store/pixel.gif?guid=,?), ref: 004039FB
                                                                      • CopyFileW.KERNEL32(C:\Users\user\Desktop\Setup.exe,0042AA28,00000001), ref: 00403A0E
                                                                      • CloseHandle.KERNEL32(00000000,0042AA28,0042AA28,?,0042AA28,00000000), ref: 00403A3B
                                                                      • OleUninitialize.OLE32(?), ref: 00403A5E
                                                                      • ExitProcess.KERNEL32 ref: 00403A78
                                                                      • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403A8C
                                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 00403A93
                                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403AA7
                                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403AC6
                                                                      • ExitWindowsEx.USER32(00000002,80040002), ref: 00403AEB
                                                                      • ExitProcess.KERNEL32 ref: 00403B0C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: lstrcat$FileProcess$DirectoryExit$CurrentDeleteEnvironmentPathTempTokenVariableVersionWindows$AdjustCharCloseCommandCopyCreateErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrlen
                                                                      • String ID: .tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop\Setup.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$https://pcapp.store/pixel.gif?guid=$~nsu
                                                                      • API String ID: 3859024572-1041456349
                                                                      • Opcode ID: 59563f10b518abe82f4e46869e687cc46109865bf66e8378302a61db0c445f8a
                                                                      • Instruction ID: 4d4dc0a58e4858e72561def8a0259f0227da8af974c10a5ea2b310ef4b80d7a5
                                                                      • Opcode Fuzzy Hash: 59563f10b518abe82f4e46869e687cc46109865bf66e8378302a61db0c445f8a
                                                                      • Instruction Fuzzy Hash: 66E10670A00214AADB10AFB59D45BAF3AB8EF4470AF14847FF545B22D1DB7C8A41CB6D

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetProcessHeap.KERNEL32(00000008,?), ref: 6FD918E3
                                                                      • HeapAlloc.KERNEL32(00000000), ref: 6FD918E6
                                                                      • GetProcessHeap.KERNEL32(00000000,00000000,error,00000000,00000000), ref: 6FD91959
                                                                      • HeapFree.KERNEL32(00000000), ref: 6FD91B8D
                                                                        • Part of subcall function 6FD91E9C: GlobalAlloc.KERNEL32(00000040,?,?,6FD910BE,error,?,00000104), ref: 6FD91EB2
                                                                        • Part of subcall function 6FD91E9C: lstrcpynW.KERNEL32(00000004,?,?,6FD910BE,error,?,00000104), ref: 6FD91EC8
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2707158755.000000006FD91000.00000020.00000001.01000000.0000000B.sdmp, Offset: 6FD90000, based on PE: true
                                                                      • Associated: 00000000.00000002.2707011598.000000006FD90000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2707198671.000000006FD93000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2707227440.000000006FD94000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2707243260.000000006FD98000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fd90000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$AllocProcess$FreeGloballstrcpyn
                                                                      • String ID: BUTTON$COMBOBOX$EDIT$LINK$LISTBOX$NSIS: nsControl pointer property$RICHEDIT_CLASS$RichEdit$STATIC$error$p^Cw
                                                                      • API String ID: 1913068523-2259555814
                                                                      • Opcode ID: 04a2fc85a2e4d2a660a09ad2e4a2037a20b8d3484ffc5bf5e5c72525895d94b0
                                                                      • Instruction ID: f33c6785a0212041dc11d861bc6122cd2e0da0e4ebf1ab0dc80387bda65354ee
                                                                      • Opcode Fuzzy Hash: 04a2fc85a2e4d2a660a09ad2e4a2037a20b8d3484ffc5bf5e5c72525895d94b0
                                                                      • Instruction Fuzzy Hash: 43819072904618EBEB90DBE4CD45F9EBBFCBB06314F058112E909B7281D735BD159BA0
                                                                      APIs
                                                                        • Part of subcall function 6D2612BB: GlobalAlloc.KERNEL32(00000040,?,6D2612DB,?,6D26137F,00000019,6D2611CA,-000000A0), ref: 6D2612C5
                                                                      • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 6D261D2D
                                                                      • lstrcpyW.KERNEL32(00000008,?), ref: 6D261D75
                                                                      • lstrcpyW.KERNEL32(00000808,?), ref: 6D261D7F
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D261D92
                                                                      • GlobalFree.KERNEL32(?), ref: 6D261E74
                                                                      • GlobalFree.KERNEL32(?), ref: 6D261E79
                                                                      • GlobalFree.KERNELBASE(?), ref: 6D261E7E
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D262068
                                                                      • lstrcpyW.KERNEL32(?,?), ref: 6D262222
                                                                      • GetModuleHandleW.KERNEL32(00000008), ref: 6D2622A1
                                                                      • LoadLibraryW.KERNEL32(00000008), ref: 6D2622B2
                                                                      • GetProcAddress.KERNEL32(?,?), ref: 6D26230C
                                                                      • lstrlenW.KERNEL32(00000808), ref: 6D262326
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706727938.000000006D261000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D260000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706709486.000000006D260000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706745853.000000006D264000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706765225.000000006D266000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d260000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                                      • String ID:
                                                                      • API String ID: 245916457-0
                                                                      • Opcode ID: 81699939716c51c0e2f2ffa9978eebf48ebc98d134616d45c22b86b9a4c43b8f
                                                                      • Instruction ID: e9a92f4e0bc481aacc43d5136d3e0f04dea8ced87f076dbcc8557f9de777cd40
                                                                      • Opcode Fuzzy Hash: 81699939716c51c0e2f2ffa9978eebf48ebc98d134616d45c22b86b9a4c43b8f
                                                                      • Instruction Fuzzy Hash: AA228EB1DA838FDBDB22CFA8C4846AEB7B4FF05316F10852AD1A5A6140D774A5C1CB70

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1178 405c49-405c6f call 405f14 1181 405c71-405c83 DeleteFileW 1178->1181 1182 405c88-405c8f 1178->1182 1183 405e05-405e09 1181->1183 1184 405c91-405c93 1182->1184 1185 405ca2-405cb2 call 40653d 1182->1185 1187 405db3-405db8 1184->1187 1188 405c99-405c9c 1184->1188 1191 405cc1-405cc2 call 405e58 1185->1191 1192 405cb4-405cbf lstrcatW 1185->1192 1187->1183 1190 405dba-405dbd 1187->1190 1188->1185 1188->1187 1193 405dc7-405dcf call 406873 1190->1193 1194 405dbf-405dc5 1190->1194 1195 405cc7-405ccb 1191->1195 1192->1195 1193->1183 1202 405dd1-405de5 call 405e0c call 405c01 1193->1202 1194->1183 1198 405cd7-405cdd lstrcatW 1195->1198 1199 405ccd-405cd5 1195->1199 1201 405ce2-405cfe lstrlenW FindFirstFileW 1198->1201 1199->1198 1199->1201 1203 405d04-405d0c 1201->1203 1204 405da8-405dac 1201->1204 1218 405de7-405dea 1202->1218 1219 405dfd-405e00 call 40559f 1202->1219 1207 405d2c-405d40 call 40653d 1203->1207 1208 405d0e-405d16 1203->1208 1204->1187 1206 405dae 1204->1206 1206->1187 1220 405d42-405d4a 1207->1220 1221 405d57-405d62 call 405c01 1207->1221 1210 405d18-405d20 1208->1210 1211 405d8b-405d9b FindNextFileW 1208->1211 1210->1207 1216 405d22-405d2a 1210->1216 1211->1203 1215 405da1-405da2 FindClose 1211->1215 1215->1204 1216->1207 1216->1211 1218->1194 1222 405dec-405dfb call 40559f call 4062fd 1218->1222 1219->1183 1220->1211 1223 405d4c-405d55 call 405c49 1220->1223 1231 405d83-405d86 call 40559f 1221->1231 1232 405d64-405d67 1221->1232 1222->1183 1223->1211 1231->1211 1235 405d69-405d79 call 40559f call 4062fd 1232->1235 1236 405d7b-405d81 1232->1236 1235->1211 1236->1211
                                                                      APIs
                                                                      • DeleteFileW.KERNEL32(?,?,75573420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405C72
                                                                      • lstrcatW.KERNEL32(0042F270,\*.*,0042F270,?,?,75573420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405CBA
                                                                      • lstrcatW.KERNEL32(?,0040A014,?,0042F270,?,?,75573420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405CDD
                                                                      • lstrlenW.KERNEL32(?,?,0040A014,?,0042F270,?,?,75573420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405CE3
                                                                      • FindFirstFileW.KERNEL32(0042F270,?,?,?,0040A014,?,0042F270,?,?,75573420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405CF3
                                                                      • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405D93
                                                                      • FindClose.KERNEL32(00000000), ref: 00405DA2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                      • String ID: .$.$C:\Users\user\AppData\Local\Temp\$\*.*
                                                                      • API String ID: 2035342205-1333152261
                                                                      • Opcode ID: 91e5555b9508150fcf6e55f7c9d4dc2ae8152fc7335161658e002f7252bbf59f
                                                                      • Instruction ID: 8b2ee76931e9ba666d6dc67a471f1b560bbb00ea1adf29c264b32972d7114dcf
                                                                      • Opcode Fuzzy Hash: 91e5555b9508150fcf6e55f7c9d4dc2ae8152fc7335161658e002f7252bbf59f
                                                                      • Instruction Fuzzy Hash: 3D41A130900A14BADB216B65CC8DABF7678DF81714F14817FF841B21D1D77C4A819EAE
                                                                      APIs
                                                                      • FindFirstFileW.KERNEL32(?,004302B8,0042FA70,00405F5D,0042FA70,0042FA70,00000000,0042FA70,0042FA70, 4Wu,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,75573420,C:\Users\user\AppData\Local\Temp\), ref: 0040687E
                                                                      • FindClose.KERNEL32(00000000), ref: 0040688A
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Find$CloseFileFirst
                                                                      • String ID:
                                                                      • API String ID: 2295610775-0
                                                                      • Opcode ID: 86d0f84efe5cb21a5e65899ed37e92679b9de560e532c409a12d624e9ae3e839
                                                                      • Instruction ID: 67599a3b69382adcf67454a25bfea179debcebd0a6e2e92eb77ede12202c023a
                                                                      • Opcode Fuzzy Hash: 86d0f84efe5cb21a5e65899ed37e92679b9de560e532c409a12d624e9ae3e839
                                                                      • Instruction Fuzzy Hash: C3D012325192205FC3402B386E0C84B7A989F16331726CB76B4AAF51E0D7388C7387BD
                                                                      APIs
                                                                      • LocalAlloc.KERNEL32(00000040), ref: 6FD73CBB
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,000000FF,?,00000000,00000000,00000000), ref: 6FD73CEA
                                                                      • lstrlenA.KERNEL32 ref: 6FD73CF6
                                                                      • lstrcmpiW.KERNEL32(?,/silent,00000000), ref: 6FD73D4D
                                                                      • lstrcmpiW.KERNEL32(/weaksecurity), ref: 6FD73D69
                                                                      • lstrcpyW.KERNEL32(6FD794E0,NSIS_Inetc (Mozilla),?,00000000), ref: 6FD74228
                                                                      • wsprintfW.USER32 ref: 6FD74267
                                                                      • lstrlenW.KERNEL32(?,?,6FD799A8), ref: 6FD74278
                                                                      • FindWindowExW.USER32(?,00000000,#32770,00000000), ref: 6FD74294
                                                                      • SetDlgItemTextW.USER32(00000000,000003EE,6FD793E0), ref: 6FD742C8
                                                                      • CloseHandle.KERNEL32(00000000), ref: 6FD742D1
                                                                      • #17.COMCTL32(?,00000000), ref: 6FD742F5
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 6FD7433F
                                                                      • SetWindowLongW.USER32(000000F0,00000000), ref: 6FD74353
                                                                      • GetTickCount.KERNEL32 ref: 6FD74359
                                                                      • CreateDialogParamW.USER32(0000006E,?,6FD71028,00000000), ref: 6FD7439A
                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_000010C8,00000000,00000000,?), ref: 6FD743BC
                                                                      • GetDlgItem.USER32(00000403), ref: 6FD743E0
                                                                      • GetDlgItem.USER32(000003F8), ref: 6FD743EF
                                                                      • ShowWindow.USER32(00000001), ref: 6FD7440B
                                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 6FD7442A
                                                                      • EnableWindow.USER32(00000000,00000000), ref: 6FD74437
                                                                      • IsWindowVisible.USER32(00000000), ref: 6FD74442
                                                                      • ShowWindow.USER32(00000000,00000000), ref: 6FD7444F
                                                                      • IsWindow.USER32 ref: 6FD7445B
                                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 6FD7446E
                                                                      • IsDialogMessageW.USER32(?), ref: 6FD74482
                                                                      • IsDialogMessageW.USER32(?,?), ref: 6FD74493
                                                                      • TranslateMessage.USER32(?), ref: 6FD744A1
                                                                      • DispatchMessageW.USER32(?), ref: 6FD744AF
                                                                      • IsWindow.USER32 ref: 6FD744BB
                                                                      • WaitForSingleObject.KERNEL32(00000000,00000BB8), ref: 6FD744CE
                                                                      • TerminateThread.KERNEL32(00000000,00000001), ref: 6FD744E0
                                                                      • CloseHandle.KERNEL32(00000000), ref: 6FD744F1
                                                                      • SetDlgItemTextW.USER32(?,000003EE,6FD7700C), ref: 6FD7451C
                                                                      • SetWindowLongW.USER32(00000000,000000F0,?), ref: 6FD74535
                                                                      • ShowWindow.USER32(00000000,00000005), ref: 6FD74548
                                                                      • DestroyWindow.USER32 ref: 6FD74560
                                                                      • GetLastError.KERNEL32 ref: 6FD74572
                                                                      • lstrlenW.KERNEL32(?, (Err=%d),00000000), ref: 6FD7458C
                                                                      • wsprintfW.USER32 ref: 6FD745A1
                                                                      • lstrcmpiW.KERNEL32(/end), ref: 6FD745C6
                                                                      • LocalFree.KERNEL32 ref: 6FD745D2
                                                                      • LocalFree.KERNEL32(?), ref: 6FD745E2
                                                                      • LocalFree.KERNEL32(?), ref: 6FD745F7
                                                                      • LocalFree.KERNEL32(?), ref: 6FD74607
                                                                      • LocalFree.KERNEL32(?), ref: 6FD74617
                                                                      • LocalFree.KERNEL32(?), ref: 6FD74627
                                                                      • LocalFree.KERNEL32(?), ref: 6FD74637
                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 6FD746CB
                                                                      • LocalAlloc.KERNEL32(00000040), ref: 6FD746E1
                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000), ref: 6FD746FC
                                                                      • LocalFree.KERNEL32(00000000), ref: 6FD7470D
                                                                      • LocalFree.KERNEL32(?), ref: 6FD74721
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706805863.000000006FD71000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD70000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706784915.000000006FD70000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706824623.000000006FD77000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706839008.000000006FD78000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706980410.000000006FD7F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fd70000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Local$Free$Message$ItemLong$ByteCharDialogMultiShowWidelstrcmpilstrlen$AllocCloseCreateHandleTextThreadwsprintf$CountDestroyDispatchEnableErrorFindLastObjectParamSingleTerminateTickTranslateVisibleWaitlstrcpy
                                                                      • String ID: (%d %s%s remaining)$ (Err=%d)$#32770$%dkB (%d%%) of %dkB @ %d.%01dkB/s$%s:%s$/banner$/canceltext$/caption$/connecttimeout$/end$/file$/header$/nocancel$/nocookies$/noproxy$/password$/popup$/proxy$/question$/receivetimeout$/resume$/silent$/tostack$/tostackconv$/translate$/useragent$/username$/weaksecurity$Are you sure that you want to stop download?$Connecting$Connecting$Connecting ...$Downloading$Downloading %s$Filename: %s$Inetc plug-in$NSIS_Inetc (Mozilla)$Your internet connection seems to be not permitted or dropped out!Please reconnect and click Retry to resume installation.$file$hour$minute$second
                                                                      • API String ID: 4223430742-3456146329
                                                                      • Opcode ID: 4ce1f8899079dd374e0c3491996c53dbd064cbf82eeff2bb769755f4e4833785
                                                                      • Instruction ID: 0c316ec372e3f7583286af9c5d99a982351ede3550522b5969905f9fa221177c
                                                                      • Opcode Fuzzy Hash: 4ce1f8899079dd374e0c3491996c53dbd064cbf82eeff2bb769755f4e4833785
                                                                      • Instruction Fuzzy Hash: CD524272504B61EFFFA1AF74CC44A663BF8FB07365B084129E4109E294DB31B865DB62

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 464 6fd7308b-6fd730be call 6fd71046 467 6fd730c4-6fd730f2 HttpOpenRequestW 464->467 468 6fd732c1 464->468 469 6fd732b5-6fd732bf 467->469 470 6fd730f8-6fd73100 467->470 471 6fd732c4-6fd732cb 468->471 469->471 472 6fd73102-6fd7312a wsprintfW HttpAddRequestHeadersW 470->472 473 6fd7312c-6fd73134 470->473 474 6fd732d1-6fd732eb 471->474 475 6fd7357f-6fd73585 471->475 472->473 478 6fd73136-6fd7315e wsprintfW HttpAddRequestHeadersW 473->478 479 6fd73160-6fd7316f HttpSendRequestW 473->479 476 6fd732ef-6fd7335d HttpOpenRequestW 474->476 477 6fd732ed 474->477 480 6fd73575 476->480 481 6fd73363-6fd7336b 476->481 477->476 478->479 482 6fd73175-6fd7317b call 6fd71069 479->482 483 6fd732a9-6fd732b3 479->483 480->475 484 6fd73397-6fd7339e 481->484 485 6fd7336d-6fd73395 wsprintfW HttpAddRequestHeadersW 481->485 491 6fd7317c-6fd73195 InternetReadFile 482->491 487 6fd732a0-6fd732a7 InternetCloseHandle 483->487 488 6fd733a0-6fd733ac HttpAddRequestHeadersW 484->488 489 6fd733ae-6fd733b5 484->489 485->484 487->471 488->489 492 6fd733b7-6fd733c3 HttpAddRequestHeadersA 489->492 493 6fd733c9-6fd733d0 489->493 494 6fd73197-6fd7319b 491->494 495 6fd7319d-6fd731a9 491->495 492->493 496 6fd733d2-6fd733da HttpAddRequestHeadersW 493->496 497 6fd733dc-6fd733e4 493->497 494->491 494->495 498 6fd731ec-6fd731ef 495->498 499 6fd731ab-6fd731ae 495->499 496->497 500 6fd733e6-6fd7340e wsprintfW HttpAddRequestHeadersW 497->500 501 6fd73410-6fd73417 497->501 506 6fd731f1-6fd731f4 498->506 507 6fd731fb-6fd731fe 498->507 502 6fd731b5-6fd731d3 InternetErrorDlg 499->502 503 6fd731b0-6fd731b3 499->503 500->501 504 6fd73444 501->504 505 6fd73419-6fd73442 wsprintfW HttpAddRequestHeadersW 501->505 509 6fd731d5-6fd731df 502->509 510 6fd731e4-6fd731e7 502->510 503->498 503->502 511 6fd73446-6fd7344a 504->511 505->504 506->507 512 6fd731f6-6fd731f9 506->512 508 6fd73203-6fd73206 507->508 508->487 513 6fd7320c-6fd73239 HttpQueryInfoW 508->513 509->479 510->498 514 6fd73491-6fd7349a call 6fd710c3 511->514 515 6fd7344c-6fd7344d call 6fd710c3 511->515 512->507 512->508 516 6fd73256-6fd7327d HttpQueryInfoW 513->516 517 6fd7323b-6fd73243 513->517 526 6fd734a0-6fd734a6 514->526 527 6fd7355e-6fd73567 call 6fd71069 514->527 520 6fd73452-6fd73455 515->520 523 6fd7327f-6fd73287 516->523 524 6fd7329a 516->524 517->516 521 6fd73245-6fd73254 lstrcpynW 517->521 525 6fd73457-6fd7348b InternetQueryOptionW InternetSetOptionW 520->525 520->526 521->516 523->524 528 6fd73289-6fd73298 lstrcpynW 523->528 524->487 525->514 526->475 529 6fd734ac-6fd734be call 6fd71069 526->529 527->475 534 6fd73569-6fd73573 527->534 528->524 535 6fd73500-6fd73503 529->535 536 6fd734c0-6fd734c3 529->536 534->475 535->475 539 6fd73505-6fd7350d 535->539 537 6fd734c5-6fd734c8 536->537 538 6fd734ca-6fd734e7 InternetErrorDlg 536->538 537->535 537->538 542 6fd734e9-6fd734f3 538->542 543 6fd734f8-6fd734fb 538->543 540 6fd73544-6fd73550 InternetSetFilePointer 539->540 541 6fd7350f-6fd7352c HttpQueryInfoW 539->541 540->475 546 6fd73552-6fd7355c 540->546 544 6fd7352e-6fd7353a call 6fd7106e 541->544 545 6fd7353c-6fd73542 541->545 542->511 543->535 544->545 545->475 546->475
                                                                      APIs
                                                                      • HttpOpenRequestW.WININET(?,HEAD,?,00000000,00000000,00000000,80400000,00000000), ref: 6FD730E8
                                                                      • wsprintfW.USER32 ref: 6FD73113
                                                                      • HttpAddRequestHeadersW.WININET(00000000,?,?,A0000000), ref: 6FD7312A
                                                                      • wsprintfW.USER32 ref: 6FD73147
                                                                      • HttpAddRequestHeadersW.WININET(00000000,?,?,A0000000), ref: 6FD7315E
                                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 6FD73167
                                                                      • InternetReadFile.WININET(00000000,?,00000200,?), ref: 6FD7318D
                                                                      • InternetErrorDlg.WININET(00000000,00002EEE,00000007,00000000), ref: 6FD731C5
                                                                      • HttpQueryInfoW.WININET(00000000,0000001C,?,00000200,00000000), ref: 6FD7322B
                                                                      • lstrcpynW.KERNEL32(6FD798A8,00000000,00000200), ref: 6FD73254
                                                                      • HttpQueryInfoW.WININET(00000000,0000003D,?,00000200,00000000), ref: 6FD73275
                                                                      • lstrcpynW.KERNEL32(6FD799A8,00000000,00000200), ref: 6FD73298
                                                                      • InternetCloseHandle.WININET(00000000), ref: 6FD732A1
                                                                      • HttpOpenRequestW.WININET(?,PUT,?,00000000,00000000,00000000,00400000,00000000), ref: 6FD73353
                                                                      • wsprintfW.USER32 ref: 6FD7337E
                                                                      • HttpAddRequestHeadersW.WININET(00000000,?,?,A0000000), ref: 6FD73395
                                                                      • HttpAddRequestHeadersW.WININET(00000000,Content-Type: application/x-www-form-urlencoded,?,A0000000), ref: 6FD733AC
                                                                      • HttpAddRequestHeadersA.WININET(00000000,6FD796E8,?,A0000000), ref: 6FD733C3
                                                                      • HttpAddRequestHeadersW.WININET(00000000,?,?,A0000000), ref: 6FD733DA
                                                                      • wsprintfW.USER32 ref: 6FD733F7
                                                                      • HttpAddRequestHeadersW.WININET(00000000,?,?,A0000000), ref: 6FD7340E
                                                                      • wsprintfW.USER32 ref: 6FD7342B
                                                                      • HttpAddRequestHeadersW.WININET(00000000,?,?,A0000000), ref: 6FD73442
                                                                      • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 6FD73469
                                                                      • InternetSetOptionW.WININET(00000000,0000001F,?,00000004), ref: 6FD7348B
                                                                      • InternetErrorDlg.WININET(00000000,00002EEE,00000007,00000000), ref: 6FD734D9
                                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 6FD73524
                                                                      • InternetSetFilePointer.WININET(00000000,?,00000000,00000000,00000000), ref: 6FD73548
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706805863.000000006FD71000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD70000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706784915.000000006FD70000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706824623.000000006FD77000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706839008.000000006FD78000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706980410.000000006FD7F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fd70000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Http$Request$Headers$Internet$wsprintf$Query$Info$ErrorFileOpenOptionlstrcpyn$CloseHandlePointerReadSend
                                                                      • String ID: Authorization: basic %s$Content-Type: application/x-www-form-urlencoded$Content-Type: octet-streamContent-Length: %d$HEAD$POST$PUT$Proxy-authorization: basic %s
                                                                      • API String ID: 2926174240-387942550
                                                                      • Opcode ID: 09a0fdb852c90f0eedb93e245818be656dde5b7e01165fa68e0ac6cb4342b600
                                                                      • Instruction ID: cd5c3e3e5f1fe40d7c1c1d29ad35a39e7e6346fe84400414ed0f55af336e572a
                                                                      • Opcode Fuzzy Hash: 09a0fdb852c90f0eedb93e245818be656dde5b7e01165fa68e0ac6cb4342b600
                                                                      • Instruction Fuzzy Hash: A8D19272900624BAFB719B20CC49FDA77F8EB06314F040166E914EE185DF74BA94CBA5

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetDlgItem.USER32(?,00000002), ref: 6FD7253E
                                                                      • GetDlgItem.USER32(?,000003ED), ref: 6FD7255F
                                                                      • GetDlgItem.USER32(000003EC), ref: 6FD72573
                                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 6FD72587
                                                                      • SetWindowLongW.USER32(?,000000F0,56000000), ref: 6FD72598
                                                                      • SendMessageW.USER32(00000031,00000000,00000000), ref: 6FD725B7
                                                                      • SendDlgItemMessageW.USER32(?,000003E9,00000030,00000000,00000000), ref: 6FD725CF
                                                                      • SendDlgItemMessageW.USER32(?,00000002,00000030,?,00000000), ref: 6FD725DB
                                                                      • GetParent.USER32(00000002), ref: 6FD725F9
                                                                      • GetDlgItem.USER32(00000000), ref: 6FD72600
                                                                      • GetWindowTextW.USER32(00000000), ref: 6FD72607
                                                                      • SetWindowTextW.USER32(00000000,6FD79360), ref: 6FD72613
                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000003), ref: 6FD72625
                                                                      • ShowWindow.USER32(00000000,00000000), ref: 6FD7263B
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 6FD7264D
                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 6FD7265C
                                                                      • SendDlgItemMessageW.USER32(?,000003ED,00000401,00000000,01900000), ref: 6FD72674
                                                                      • GetModuleHandleW.KERNEL32(00000000,00000067,00000000), ref: 6FD7268B
                                                                      • LoadIconW.USER32(00000000), ref: 6FD72692
                                                                      • SendDlgItemMessageW.USER32(?,000003F1,00000170,00000000), ref: 6FD726A4
                                                                      • SetDlgItemTextW.USER32(?,000003F0), ref: 6FD726B2
                                                                      • SetWindowTextW.USER32(?,6FD793E0), ref: 6FD726CB
                                                                      • SetTimer.USER32(?,00000001,000003E8,00000000), ref: 6FD726DB
                                                                      • SetDlgItemTextW.USER32(?,000003F1,6FD79828), ref: 6FD726F6
                                                                      • SetDlgItemTextW.USER32(?,000003F2,Downloading %s), ref: 6FD72703
                                                                      • SetDlgItemTextW.USER32(?,000003F3,Connecting ...), ref: 6FD72710
                                                                      • SetDlgItemTextW.USER32(?,000003F4,%dkB (%d%%) of %dkB @ %d.%01dkB/s), ref: 6FD7271D
                                                                      • SetDlgItemTextW.USER32(?,000003F5,second), ref: 6FD7272A
                                                                      • SetDlgItemTextW.USER32(?,000003F6, (%d %s%s remaining)), ref: 6FD72737
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706805863.000000006FD71000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD70000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706784915.000000006FD70000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706824623.000000006FD77000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706839008.000000006FD78000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706980410.000000006FD7F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fd70000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Item$Text$Window$MessageSend$Long$HandleIconLoadModuleParentShowTimer
                                                                      • String ID: (%d %s%s remaining)$%dkB (%d%%) of %dkB @ %d.%01dkB/s$Connecting ...$Downloading %s$Inetc plug-in$second
                                                                      • API String ID: 3891978239-2469666409
                                                                      • Opcode ID: 786f53b6ab7fb67841ed5e0007b3edc541350ea7151d94cf15df2d849b7bc21b
                                                                      • Instruction ID: 611853934739af73f9a420a1f7756d1781e9972ebbcf2f6110c62586aadf6110
                                                                      • Opcode Fuzzy Hash: 786f53b6ab7fb67841ed5e0007b3edc541350ea7151d94cf15df2d849b7bc21b
                                                                      • Instruction Fuzzy Hash: B6415232685B60BBFF622760CC4AFAE37E8EB46725F144115F601AD0C0CFB47A51CA99

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 616 403f9a-403fac 617 403fb2-403fb8 616->617 618 404113-404122 616->618 617->618 619 403fbe-403fc7 617->619 620 404171-404186 618->620 621 404124-40416c GetDlgItem * 2 call 404499 SetClassLongW call 40140b 618->621 625 403fc9-403fd6 SetWindowPos 619->625 626 403fdc-403fe3 619->626 623 4041c6-4041cb call 4044e5 620->623 624 404188-40418b 620->624 621->620 638 4041d0-4041eb 623->638 628 40418d-404198 call 401389 624->628 629 4041be-4041c0 624->629 625->626 631 403fe5-403fff ShowWindow 626->631 632 404027-40402d 626->632 628->629 655 40419a-4041b9 SendMessageW 628->655 629->623 637 404466 629->637 639 404100-40410e call 404500 631->639 640 404005-404018 GetWindowLongW 631->640 634 404046-404049 632->634 635 40402f-404041 DestroyWindow 632->635 645 40404b-404057 SetWindowLongW 634->645 646 40405c-404062 634->646 643 404443-404449 635->643 644 404468-40446f 637->644 649 4041f4-4041fa 638->649 650 4041ed-4041ef call 40140b 638->650 639->644 640->639 641 40401e-404021 ShowWindow 640->641 641->632 643->637 651 40444b-404451 643->651 645->644 646->639 654 404068-404077 GetDlgItem 646->654 652 404200-40420b 649->652 653 404424-40443d DestroyWindow EndDialog 649->653 650->649 651->637 658 404453-40445c ShowWindow 651->658 652->653 659 404211-40425e call 40657a call 404499 * 3 GetDlgItem 652->659 653->643 660 404096-404099 654->660 661 404079-404090 SendMessageW IsWindowEnabled 654->661 655->644 658->637 688 404260-404265 659->688 689 404268-4042a4 ShowWindow KiUserCallbackDispatcher call 4044bb EnableWindow 659->689 663 40409b-40409c 660->663 664 40409e-4040a1 660->664 661->637 661->660 666 4040cc-4040d1 call 404472 663->666 667 4040a3-4040a9 664->667 668 4040af-4040b4 664->668 666->639 671 4040ea-4040fa SendMessageW 667->671 672 4040ab-4040ad 667->672 668->671 673 4040b6-4040bc 668->673 671->639 672->666 676 4040d3-4040dc call 40140b 673->676 677 4040be-4040c4 call 40140b 673->677 676->639 686 4040de-4040e8 676->686 684 4040ca 677->684 684->666 686->684 688->689 692 4042a6-4042a7 689->692 693 4042a9 689->693 694 4042ab-4042d9 GetSystemMenu EnableMenuItem SendMessageW 692->694 693->694 695 4042db-4042ec SendMessageW 694->695 696 4042ee 694->696 697 4042f4-40432c call 4044ce call 403f7b call 40653d lstrlenW call 40657a SetWindowTextW call 401389 695->697 696->697 707 404331-404333 697->707 707->638 708 404339-40433b 707->708 708->638 709 404341-404345 708->709 710 404364-404378 DestroyWindow 709->710 711 404347-40434d 709->711 710->643 713 40437e-4043ab CreateDialogParamW 710->713 711->637 712 404353-404359 711->712 712->638 714 40435f 712->714 713->643 715 4043b1-404408 call 404499 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 713->715 714->637 715->637 720 40440a-404422 ShowWindow call 4044e5 715->720 720->643
                                                                      APIs
                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403FD6
                                                                      • ShowWindow.USER32(?), ref: 00403FF6
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00404008
                                                                      • ShowWindow.USER32(?,00000004), ref: 00404021
                                                                      • DestroyWindow.USER32 ref: 00404035
                                                                      • SetWindowLongW.USER32(?,00000000,00000000), ref: 0040404E
                                                                      • GetDlgItem.USER32(?,?), ref: 0040406D
                                                                      • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00404081
                                                                      • IsWindowEnabled.USER32(00000000), ref: 00404088
                                                                      • GetDlgItem.USER32(?,00000001), ref: 00404133
                                                                      • GetDlgItem.USER32(?,00000002), ref: 0040413D
                                                                      • SetClassLongW.USER32(?,000000F2,?), ref: 00404157
                                                                      • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004041A8
                                                                      • GetDlgItem.USER32(?,00000003), ref: 0040424E
                                                                      • ShowWindow.USER32(00000000,?), ref: 0040426F
                                                                      • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00404281
                                                                      • EnableWindow.USER32(?,?), ref: 0040429C
                                                                      • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004042B2
                                                                      • EnableMenuItem.USER32(00000000), ref: 004042B9
                                                                      • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004042D1
                                                                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004042E4
                                                                      • lstrlenW.KERNEL32(0042D268,?,0042D268,00000000), ref: 0040430E
                                                                      • SetWindowTextW.USER32(?,0042D268), ref: 00404322
                                                                      • ShowWindow.USER32(?,0000000A), ref: 00404456
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                      • String ID:
                                                                      • API String ID: 121052019-0
                                                                      • Opcode ID: e7f11a10533a611f3fe78e549378f399a66bd747c21cf404ab37e5123baac86e
                                                                      • Instruction ID: 19e8ffe36521fda3862950d2389d84f1ef0c133ac5ff71005f69e3a94542e2f3
                                                                      • Opcode Fuzzy Hash: e7f11a10533a611f3fe78e549378f399a66bd747c21cf404ab37e5123baac86e
                                                                      • Instruction Fuzzy Hash: DDC1A1B1A00704ABDB206F61EE49E2B3A68FB84746F15053EF741B61F1CB799841DB2D

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 723 403bec-403c04 call 40690a 726 403c06-403c16 call 406484 723->726 727 403c18-403c4f call 40640b 723->727 736 403c72-403c9b call 403ec2 call 405f14 726->736 732 403c51-403c62 call 40640b 727->732 733 403c67-403c6d lstrcatW 727->733 732->733 733->736 741 403ca1-403ca6 736->741 742 403d2d-403d35 call 405f14 736->742 741->742 743 403cac-403cd4 call 40640b 741->743 748 403d43-403d68 LoadImageW 742->748 749 403d37-403d3e call 40657a 742->749 743->742 750 403cd6-403cda 743->750 752 403de9-403df1 call 40140b 748->752 753 403d6a-403d9a RegisterClassW 748->753 749->748 754 403cec-403cf8 lstrlenW 750->754 755 403cdc-403ce9 call 405e39 750->755 767 403df3-403df6 752->767 768 403dfb-403e06 call 403ec2 752->768 756 403da0-403de4 SystemParametersInfoW CreateWindowExW 753->756 757 403eb8 753->757 761 403d20-403d28 call 405e0c call 40653d 754->761 762 403cfa-403d08 lstrcmpiW 754->762 755->754 756->752 760 403eba-403ec1 757->760 761->742 762->761 766 403d0a-403d14 GetFileAttributesW 762->766 771 403d16-403d18 766->771 772 403d1a-403d1b call 405e58 766->772 767->760 776 403e0c-403e26 ShowWindow call 40689a 768->776 777 403e8f-403e97 call 405672 768->777 771->761 771->772 772->761 784 403e32-403e44 GetClassInfoW 776->784 785 403e28-403e2d call 40689a 776->785 782 403eb1-403eb3 call 40140b 777->782 783 403e99-403e9f 777->783 782->757 783->767 786 403ea5-403eac call 40140b 783->786 789 403e46-403e56 GetClassInfoW RegisterClassW 784->789 790 403e5c-403e7f DialogBoxParamW call 40140b 784->790 785->784 786->767 789->790 794 403e84-403e8d call 403b3c 790->794 794->760
                                                                      APIs
                                                                        • Part of subcall function 0040690A: GetModuleHandleA.KERNEL32(?,00000020,?,0040363D,0000000B), ref: 0040691C
                                                                        • Part of subcall function 0040690A: GetProcAddress.KERNEL32(00000000,?), ref: 00406937
                                                                      • lstrcatW.KERNEL32(1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,75573420,C:\Users\user\AppData\Local\Temp\,?,00000000,?), ref: 00403C6D
                                                                      • lstrlenW.KERNEL32(get,?,?,?,get,00000000,00440800,1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,75573420), ref: 00403CED
                                                                      • lstrcmpiW.KERNEL32(?,.exe,get,?,?,?,get,00000000,00440800,1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000), ref: 00403D00
                                                                      • GetFileAttributesW.KERNEL32(get,?,00000000,?), ref: 00403D0B
                                                                      • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,00440800), ref: 00403D54
                                                                        • Part of subcall function 00406484: wsprintfW.USER32 ref: 00406491
                                                                      • RegisterClassW.USER32(00433EA0), ref: 00403D91
                                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403DA9
                                                                      • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403DDE
                                                                      • ShowWindow.USER32(00000005,00000000,?,00000000,?), ref: 00403E14
                                                                      • GetClassInfoW.USER32(00000000,RichEdit20W,00433EA0), ref: 00403E40
                                                                      • GetClassInfoW.USER32(00000000,RichEdit,00433EA0), ref: 00403E4D
                                                                      • RegisterClassW.USER32(00433EA0), ref: 00403E56
                                                                      • DialogBoxParamW.USER32(?,00000000,00403F9A,00000000), ref: 00403E75
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                      • String ID: .DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb$get
                                                                      • API String ID: 1975747703-2863344434
                                                                      • Opcode ID: b5e4680adf6fab30abf8c31c9b96982c96c1f128c8b6e65fe06ccfbd791f05a2
                                                                      • Instruction ID: 6cc527b2f10929733706d009ff8c1d9b21e511251dd9cb17fe62514cef47010a
                                                                      • Opcode Fuzzy Hash: b5e4680adf6fab30abf8c31c9b96982c96c1f128c8b6e65fe06ccfbd791f05a2
                                                                      • Instruction Fuzzy Hash: F561A670140300BED721AF66ED46F2B3A6CEB84B5AF40453FF945B62E2CB7D59018A6D

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 797 6fd71494-6fd714a0 798 6fd714a6-6fd714ab 797->798 799 6fd71608-6fd71662 GetDlgItem * 3 RedrawWindow * 3 UpdateWindow * 3 797->799 801 6fd715f4-6fd715f7 call 6fd710a0 798->801 802 6fd714b1-6fd714b4 798->802 800 6fd71664 799->800 804 6fd71666-6fd7166a 800->804 807 6fd715fc-6fd71606 call 6fd7109b 801->807 805 6fd71564-6fd7156d 802->805 806 6fd714ba-6fd714be 802->806 808 6fd715c3 805->808 809 6fd7156f-6fd71572 805->809 806->800 810 6fd714c4-6fd714ca 806->810 807->800 815 6fd715c8-6fd715cb 808->815 809->800 812 6fd71578-6fd7157e 809->812 813 6fd714d0-6fd714db IsWindow 810->813 814 6fd7155c-6fd7155f 810->814 812->800 817 6fd71584-6fd7158c 812->817 813->814 818 6fd714dd-6fd714e4 813->818 814->804 819 6fd715de-6fd715f2 KillTimer DestroyWindow 815->819 820 6fd715cd-6fd715d8 815->820 821 6fd7158e-6fd715b3 MessageBoxW 817->821 822 6fd715b9-6fd715c1 817->822 823 6fd714e6-6fd714fb GetTickCount 818->823 824 6fd71505-6fd7150c 818->824 819->800 820->800 820->819 821->800 821->822 822->815 823->824 827 6fd714fd-6fd714ff 823->827 825 6fd7150e-6fd71517 call 6fd710be 824->825 826 6fd71519 call 6fd710a5 824->826 831 6fd7151e-6fd7155a GetDlgItem RedrawWindow GetDlgItem RedrawWindow GetDlgItem RedrawWindow 825->831 826->831 827->824 831->814
                                                                      APIs
                                                                      • IsWindow.USER32(?), ref: 6FD714D3
                                                                      • GetTickCount.KERNEL32 ref: 6FD714E6
                                                                      • GetDlgItem.USER32(?,000003E9), ref: 6FD71532
                                                                      • RedrawWindow.USER32(00000000), ref: 6FD7153B
                                                                      • GetDlgItem.USER32(?,00000002), ref: 6FD71546
                                                                      • RedrawWindow.USER32(00000000), ref: 6FD71549
                                                                      • GetDlgItem.USER32(?,000003ED), ref: 6FD71557
                                                                      • RedrawWindow.USER32(00000000), ref: 6FD7155A
                                                                      • MessageBoxW.USER32(?,?,6FD793E0,00000034), ref: 6FD715AA
                                                                      • KillTimer.USER32(?,00000001), ref: 6FD715E3
                                                                      • DestroyWindow.USER32(?), ref: 6FD715EC
                                                                      • GetDlgItem.USER32(?,000003E9), ref: 6FD71616
                                                                      • GetDlgItem.USER32(?,00000002), ref: 6FD71620
                                                                      • GetDlgItem.USER32(?,000003ED), ref: 6FD7162C
                                                                      • RedrawWindow.USER32(?,00000000,00000000,00000001), ref: 6FD7163F
                                                                      • RedrawWindow.USER32(00000000,00000000,00000000,00000001), ref: 6FD71648
                                                                      • RedrawWindow.USER32(00000000,00000000,00000000,00000001), ref: 6FD71651
                                                                      • UpdateWindow.USER32(?), ref: 6FD7165C
                                                                      • UpdateWindow.USER32(00000000), ref: 6FD7165F
                                                                      • UpdateWindow.USER32(00000000), ref: 6FD71662
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706805863.000000006FD71000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD70000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706784915.000000006FD70000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706824623.000000006FD77000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706839008.000000006FD78000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706980410.000000006FD7F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fd70000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Window$ItemRedraw$Update$CountDestroyKillMessageTickTimer
                                                                      • String ID: Inetc plug-in
                                                                      • API String ID: 2903798878-2626376821
                                                                      • Opcode ID: fe009c4c36282e9079ed68b40d2bdc442e3eb92e15b1edbb9ec27821593f51c7
                                                                      • Instruction ID: 19052a3e4f39f6a44207faa7a6797acde07c4128e166934aa640c20f7206fea6
                                                                      • Opcode Fuzzy Hash: fe009c4c36282e9079ed68b40d2bdc442e3eb92e15b1edbb9ec27821593f51c7
                                                                      • Instruction Fuzzy Hash: 3F414F72640318BBEF765F34CC55F9A3FA9EB02764F084226F9059E1A4CB71B950DA90

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 832 40307d-4030cb GetTickCount GetModuleFileNameW call 40602d 835 4030d7-403105 call 40653d call 405e58 call 40653d GetFileSize 832->835 836 4030cd-4030d2 832->836 844 4031f0-4031fe call 403019 835->844 845 40310b 835->845 837 4032ad-4032b1 836->837 851 403200-403203 844->851 852 403253-403258 844->852 847 403110-403127 845->847 849 403129 847->849 850 40312b-403134 call 4034cf 847->850 849->850 858 40325a-403262 call 403019 850->858 859 40313a-403141 850->859 854 403205-40321d call 4034e5 call 4034cf 851->854 855 403227-403251 GlobalAlloc call 4034e5 call 4032b4 851->855 852->837 854->852 880 40321f-403225 854->880 855->852 879 403264-403275 855->879 858->852 863 403143-403157 call 405fe8 859->863 864 4031bd-4031c1 859->864 869 4031cb-4031d1 863->869 883 403159-403160 863->883 868 4031c3-4031ca call 403019 864->868 864->869 868->869 874 4031e0-4031e8 869->874 875 4031d3-4031dd call 4069f7 869->875 874->847 878 4031ee 874->878 875->874 878->844 884 403277 879->884 885 40327d-403282 879->885 880->852 880->855 883->869 887 403162-403169 883->887 884->885 889 403283-403289 885->889 887->869 888 40316b-403172 887->888 888->869 890 403174-40317b 888->890 889->889 891 40328b-4032a6 SetFilePointer call 405fe8 889->891 890->869 892 40317d-40319d 890->892 895 4032ab 891->895 892->852 894 4031a3-4031a7 892->894 896 4031a9-4031ad 894->896 897 4031af-4031b7 894->897 895->837 896->878 896->897 897->869 898 4031b9-4031bb 897->898 898->869
                                                                      APIs
                                                                      • GetTickCount.KERNEL32 ref: 0040308E
                                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Setup.exe,00000400,?,?,?,?,?,0040387D,?), ref: 004030AA
                                                                        • Part of subcall function 0040602D: GetFileAttributesW.KERNEL32(00000003,004030BD,C:\Users\user\Desktop\Setup.exe,80000000,00000003,?,?,?,?,?,0040387D,?), ref: 00406031
                                                                        • Part of subcall function 0040602D: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,0040387D,?), ref: 00406053
                                                                      • GetFileSize.KERNEL32(00000000,00000000,00444000,00000000,00441800,00441800,C:\Users\user\Desktop\Setup.exe,C:\Users\user\Desktop\Setup.exe,80000000,00000003,?,?,?,?,?,0040387D), ref: 004030F6
                                                                      • GlobalAlloc.KERNEL32(00000040,}8@,?,?,?,?,?,0040387D,?), ref: 0040322C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop\Setup.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft$}8@
                                                                      • API String ID: 2803837635-2653049739
                                                                      • Opcode ID: b2925046ebf4ee23c20be954f21b6b8de3b8febbf6f0f410cc7df6a070a5bb34
                                                                      • Instruction ID: 750c061bb954c4555836cecba7cc54c639b148d890841a972b43b12454d44aa7
                                                                      • Opcode Fuzzy Hash: b2925046ebf4ee23c20be954f21b6b8de3b8febbf6f0f410cc7df6a070a5bb34
                                                                      • Instruction Fuzzy Hash: 7951B571904204AFDB10AF65ED42B9E7EACAB48756F14807BF904B62D1C77C9F408B9D

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1120 40657a-406585 1121 406587-406596 1120->1121 1122 406598-4065ae 1120->1122 1121->1122 1123 4065b0-4065bd 1122->1123 1124 4065c6-4065cf 1122->1124 1123->1124 1127 4065bf-4065c2 1123->1127 1125 4065d5 1124->1125 1126 4067aa-4067b5 1124->1126 1128 4065da-4065e7 1125->1128 1129 4067c0-4067c1 1126->1129 1130 4067b7-4067bb call 40653d 1126->1130 1127->1124 1128->1126 1131 4065ed-4065f6 1128->1131 1130->1129 1133 406788 1131->1133 1134 4065fc-406639 1131->1134 1137 406796-406799 1133->1137 1138 40678a-406794 1133->1138 1135 40672c-406731 1134->1135 1136 40663f-406646 1134->1136 1140 406733-406739 1135->1140 1141 406764-406769 1135->1141 1142 406648-40664a 1136->1142 1143 40664b-40664d 1136->1143 1139 40679b-4067a4 1137->1139 1138->1139 1139->1126 1144 4065d7 1139->1144 1145 406749-406755 call 40653d 1140->1145 1146 40673b-406747 call 406484 1140->1146 1149 406778-406786 lstrlenW 1141->1149 1150 40676b-406773 call 40657a 1141->1150 1142->1143 1147 40668a-40668d 1143->1147 1148 40664f-406676 call 40640b 1143->1148 1144->1128 1161 40675a-406760 1145->1161 1146->1161 1155 40669d-4066a0 1147->1155 1156 40668f-40669b GetSystemDirectoryW 1147->1156 1165 406713-406717 1148->1165 1167 40667c-406685 call 40657a 1148->1167 1149->1139 1150->1149 1158 4066a2-4066b0 GetWindowsDirectoryW 1155->1158 1159 406709-40670b 1155->1159 1157 40670d-406711 1156->1157 1157->1165 1166 406724-40672a call 4067c4 1157->1166 1158->1159 1159->1157 1164 4066b2-4066ba 1159->1164 1161->1149 1163 406762 1161->1163 1163->1166 1168 4066d1-4066e7 SHGetSpecialFolderLocation 1164->1168 1169 4066bc-4066c5 1164->1169 1165->1166 1170 406719-40671f lstrcatW 1165->1170 1166->1149 1167->1157 1173 406705 1168->1173 1174 4066e9-406703 SHGetPathFromIDListW CoTaskMemFree 1168->1174 1177 4066cd-4066cf 1169->1177 1170->1166 1173->1159 1174->1157 1174->1173 1177->1157 1177->1168
                                                                      APIs
                                                                      • GetSystemDirectoryW.KERNEL32(get,00000400), ref: 00406695
                                                                      • GetWindowsDirectoryW.KERNEL32(get,00000400,00000000,0042C248,?,004055D6,0042C248,00000000,00000000,00425020,755723A0), ref: 004066A8
                                                                      • lstrcatW.KERNEL32(get,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                                                                      • lstrlenW.KERNEL32(get,00000000,0042C248,?,004055D6,0042C248,00000000), ref: 00406779
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Directory$SystemWindowslstrcatlstrlen
                                                                      • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$get$https://pcapp.store/pixel.gif?guid=
                                                                      • API String ID: 4260037668-826360470
                                                                      • Opcode ID: 71c82525ba0a65243e1f04eb87fe478d36a31e86dfe70ef8bf5ce9ddd18f012c
                                                                      • Instruction ID: 685928b229c5d1fd60d609eb920d771e11fa4d776b5b66b0bad6c944a0f90ddf
                                                                      • Opcode Fuzzy Hash: 71c82525ba0a65243e1f04eb87fe478d36a31e86dfe70ef8bf5ce9ddd18f012c
                                                                      • Instruction Fuzzy Hash: 1D61D131900205EADB209F64DD80BAE77A5EF54318F22813BE907B72D0D77D99A1CB5D

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1242 4032b4-4032cb 1243 4032d4-4032dd 1242->1243 1244 4032cd 1242->1244 1245 4032e6-4032eb 1243->1245 1246 4032df 1243->1246 1244->1243 1247 4032fb-403308 call 4034cf 1245->1247 1248 4032ed-4032f6 call 4034e5 1245->1248 1246->1245 1252 4034bd 1247->1252 1253 40330e-403312 1247->1253 1248->1247 1254 4034bf-4034c0 1252->1254 1255 403468-40346a 1253->1255 1256 403318-403361 GetTickCount 1253->1256 1257 4034c8-4034cc 1254->1257 1260 4034aa-4034ad 1255->1260 1261 40346c-40346f 1255->1261 1258 4034c5 1256->1258 1259 403367-40336f 1256->1259 1258->1257 1263 403371 1259->1263 1264 403374-403382 call 4034cf 1259->1264 1265 4034b2-4034bb call 4034cf 1260->1265 1266 4034af 1260->1266 1261->1258 1262 403471 1261->1262 1267 403474-40347a 1262->1267 1263->1264 1264->1252 1276 403388-403391 1264->1276 1265->1252 1274 4034c2 1265->1274 1266->1265 1270 40347c 1267->1270 1271 40347e-40348c call 4034cf 1267->1271 1270->1271 1271->1252 1279 40348e-40349a call 4060df 1271->1279 1274->1258 1278 403397-4033b7 call 406a65 1276->1278 1284 403460-403462 1278->1284 1285 4033bd-4033d0 GetTickCount 1278->1285 1286 403464-403466 1279->1286 1287 40349c-4034a6 1279->1287 1284->1254 1288 4033d2-4033da 1285->1288 1289 40341b-40341d 1285->1289 1286->1254 1287->1267 1292 4034a8 1287->1292 1293 4033e2-403418 MulDiv wsprintfW call 40559f 1288->1293 1294 4033dc-4033e0 1288->1294 1290 403454-403458 1289->1290 1291 40341f-403423 1289->1291 1290->1259 1297 40345e 1290->1297 1295 403425-40342c call 4060df 1291->1295 1296 40343a-403445 1291->1296 1292->1258 1293->1289 1294->1289 1294->1293 1302 403431-403433 1295->1302 1301 403448-40344c 1296->1301 1297->1258 1301->1278 1303 403452 1301->1303 1302->1286 1304 403435-403438 1302->1304 1303->1258 1304->1301
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: CountTick$wsprintf
                                                                      • String ID: *B$ PB$ A$ A$... %d%%$}8@
                                                                      • API String ID: 551687249-3288948294
                                                                      • Opcode ID: d1cfd4714e4687a3a26bd4ac3846c46955ae89f51795138bd42b88bfc39313c7
                                                                      • Instruction ID: 54ab186c05730647c672001b6e56d135182c7b51176e178f40f708a1e84a381e
                                                                      • Opcode Fuzzy Hash: d1cfd4714e4687a3a26bd4ac3846c46955ae89f51795138bd42b88bfc39313c7
                                                                      • Instruction Fuzzy Hash: E251BD31810219EBCF11DF65DA44B9E7BB8AF05756F10827BE804BB2C1D7789E44CBA9

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetDlgItem.USER32(?,00000000), ref: 6FD91813
                                                                      • GetWindowRect.USER32(00000000,?), ref: 6FD9181E
                                                                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 6FD9182E
                                                                      • CreateDialogParamW.USER32(00000001,?,6FD914D6,00000000), ref: 6FD91843
                                                                      • SetWindowPos.USER32(00000000,00000000,?,?,?,?,00000014), ref: 6FD91876
                                                                      • SetWindowLongW.USER32(?,00000004,6FD91407), ref: 6FD91884
                                                                      • GetProcessHeap.KERNEL32(00000008,00000000), ref: 6FD9189E
                                                                      • HeapAlloc.KERNEL32(00000000), ref: 6FD918A5
                                                                        • Part of subcall function 6FD91E9C: GlobalAlloc.KERNEL32(00000040,?,?,6FD910BE,error,?,00000104), ref: 6FD91EB2
                                                                        • Part of subcall function 6FD91E9C: lstrcpynW.KERNEL32(00000004,?,?,6FD910BE,error,?,00000104), ref: 6FD91EC8
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2707158755.000000006FD91000.00000020.00000001.01000000.0000000B.sdmp, Offset: 6FD90000, based on PE: true
                                                                      • Associated: 00000000.00000002.2707011598.000000006FD90000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2707198671.000000006FD93000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2707227440.000000006FD94000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2707243260.000000006FD98000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fd90000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Window$AllocHeap$CreateDialogGlobalItemLongParamPointsProcessRectlstrcpyn
                                                                      • String ID: error$p^Cw
                                                                      • API String ID: 1928716940-4078540929
                                                                      • Opcode ID: 51184a5d5e3028ac8d1087e11a0d940d601091d0acf1753a35a52bda797ad746
                                                                      • Instruction ID: 8e3d47fd11c1277bcc8c172db4ccd016880dc068729c30d400d14f78cd97b769
                                                                      • Opcode Fuzzy Hash: 51184a5d5e3028ac8d1087e11a0d940d601091d0acf1753a35a52bda797ad746
                                                                      • Instruction Fuzzy Hash: A0311876800A14ABEF509FE5C949DAE7FBCFB0B761B08400AF609A7241D7327524DBA0

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1316 40176f-401794 call 402da6 call 405e83 1321 401796-40179c call 40653d 1316->1321 1322 40179e-4017b0 call 40653d call 405e0c lstrcatW 1316->1322 1327 4017b5-4017b6 call 4067c4 1321->1327 1322->1327 1331 4017bb-4017bf 1327->1331 1332 4017c1-4017cb call 406873 1331->1332 1333 4017f2-4017f5 1331->1333 1340 4017dd-4017ef 1332->1340 1341 4017cd-4017db CompareFileTime 1332->1341 1335 4017f7-4017f8 call 406008 1333->1335 1336 4017fd-401819 call 40602d 1333->1336 1335->1336 1343 40181b-40181e 1336->1343 1344 40188d-4018b6 call 40559f call 4032b4 1336->1344 1340->1333 1341->1340 1346 401820-40185e call 40653d * 2 call 40657a call 40653d call 405b9d 1343->1346 1347 40186f-401879 call 40559f 1343->1347 1357 4018b8-4018bc 1344->1357 1358 4018be-4018ca SetFileTime 1344->1358 1346->1331 1380 401864-401865 1346->1380 1359 401882-401888 1347->1359 1357->1358 1362 4018d0-4018db CloseHandle 1357->1362 1358->1362 1360 402c33 1359->1360 1363 402c35-402c39 1360->1363 1365 4018e1-4018e4 1362->1365 1366 402c2a-402c2d 1362->1366 1368 4018e6-4018f7 call 40657a lstrcatW 1365->1368 1369 4018f9-4018fc call 40657a 1365->1369 1366->1360 1375 401901-402398 1368->1375 1369->1375 1378 40239d-4023a2 1375->1378 1379 402398 call 405b9d 1375->1379 1378->1363 1379->1378 1380->1359 1381 401867-401868 1380->1381 1381->1347
                                                                      APIs
                                                                      • lstrcatW.KERNEL32(00000000,00000000,get,00441000,?,?,00000031), ref: 004017B0
                                                                      • CompareFileTime.KERNEL32(-00000014,?,get,get,00000000,00000000,get,00441000,?,?,00000031), ref: 004017D5
                                                                        • Part of subcall function 0040653D: lstrcpynW.KERNEL32(?,?,00000400,0040369D,00433F00,NSIS Error), ref: 0040654A
                                                                        • Part of subcall function 0040559F: lstrlenW.KERNEL32(0042C248,00000000,00425020,755723A0,?,?,?,?,?,?,?,?,?,00403418,00000000,?), ref: 004055D7
                                                                        • Part of subcall function 0040559F: lstrlenW.KERNEL32(00403418,0042C248,00000000,00425020,755723A0,?,?,?,?,?,?,?,?,?,00403418,00000000), ref: 004055E7
                                                                        • Part of subcall function 0040559F: lstrcatW.KERNEL32(0042C248,00403418,00403418,0042C248,00000000,00425020,755723A0), ref: 004055FA
                                                                        • Part of subcall function 0040559F: SetWindowTextW.USER32(0042C248,0042C248), ref: 0040560C
                                                                        • Part of subcall function 0040559F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405632
                                                                        • Part of subcall function 0040559F: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040564C
                                                                        • Part of subcall function 0040559F: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsiA50F.tmp$C:\Users\user\AppData\Local\Temp\nsiA50F.tmp\inetc.dll$get
                                                                      • API String ID: 1941528284-3416983306
                                                                      • Opcode ID: 4def49e1654eb24e31e7e0ccc8337252fe7285c88cb32d22f2bbeb2144da9b53
                                                                      • Instruction ID: 1e3f5e060805a06bac003644be00ba5f3fef1f2c353f2d3d357c0a6c5ca497fd
                                                                      • Opcode Fuzzy Hash: 4def49e1654eb24e31e7e0ccc8337252fe7285c88cb32d22f2bbeb2144da9b53
                                                                      • Instruction Fuzzy Hash: F4419371900108BACF11BFB5DD85DAE7A79EF45768B20423FF422B10E2D63C8A91966D

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1382 4026ec-402705 call 402d84 1385 402c2a-402c2d 1382->1385 1386 40270b-402712 1382->1386 1389 402c33-402c39 1385->1389 1387 402714 1386->1387 1388 402717-40271a 1386->1388 1387->1388 1391 402720-40272f call 40649d 1388->1391 1392 40287e-402886 1388->1392 1391->1392 1395 402735 1391->1395 1392->1385 1396 40273b-40273f 1395->1396 1397 4027d4-4027d7 1396->1397 1398 402745-402760 ReadFile 1396->1398 1399 4027d9-4027dc 1397->1399 1400 4027ef-4027ff call 4060b0 1397->1400 1398->1392 1401 402766-40276b 1398->1401 1399->1400 1402 4027de-4027e9 call 40610e 1399->1402 1400->1392 1411 402801 1400->1411 1401->1392 1404 402771-40277f 1401->1404 1402->1392 1402->1400 1407 402785-402797 MultiByteToWideChar 1404->1407 1408 40283a-402846 call 406484 1404->1408 1407->1411 1412 402799-40279c 1407->1412 1408->1389 1414 402804-402807 1411->1414 1415 40279e-4027a9 1412->1415 1414->1408 1416 402809-40280e 1414->1416 1415->1414 1417 4027ab-4027d0 SetFilePointer MultiByteToWideChar 1415->1417 1418 402810-402815 1416->1418 1419 40284b-40284f 1416->1419 1417->1415 1420 4027d2 1417->1420 1418->1419 1423 402817-40282a 1418->1423 1421 402851-402855 1419->1421 1422 40286c-402878 SetFilePointer 1419->1422 1420->1411 1424 402857-40285b 1421->1424 1425 40285d-40286a 1421->1425 1422->1392 1423->1392 1426 40282c-402832 1423->1426 1424->1422 1424->1425 1425->1392 1426->1396 1427 402838 1426->1427 1427->1392
                                                                      APIs
                                                                      • ReadFile.KERNEL32(?,?,?,?), ref: 00402758
                                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402793
                                                                      • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027B6
                                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027CC
                                                                        • Part of subcall function 0040610E: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00406124
                                                                      • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 00402878
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                      • String ID: 9
                                                                      • API String ID: 163830602-2366072709
                                                                      • Opcode ID: 05ec9e9945247294569ed32eb70c3e484d87f4f0290394ce4997a83a7f1e58dd
                                                                      • Instruction ID: 36eba916602f65c1f8b814f2f26102ddc75cc08ed25eda7b441ea0696c55e726
                                                                      • Opcode Fuzzy Hash: 05ec9e9945247294569ed32eb70c3e484d87f4f0290394ce4997a83a7f1e58dd
                                                                      • Instruction Fuzzy Hash: C551E975D00219AADF20EF95CA89AAEBB79FF04304F10817BE541B62D4D7B49D82CB58
                                                                      APIs
                                                                      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068B1
                                                                      • wsprintfW.USER32 ref: 004068EC
                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406900
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                      • String ID: %s%S.dll$UXTHEME$\
                                                                      • API String ID: 2200240437-1946221925
                                                                      • Opcode ID: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                                                      • Instruction ID: 21628a1c63ce2f140fdd4d546058f3b0ba52bdb51e88dcb335987c0e659eada7
                                                                      • Opcode Fuzzy Hash: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                                                      • Instruction Fuzzy Hash: D0F0F671511119ABDB10BB64DD0DF9B376CBF00305F10847AA646F10D0EB7CDA68CBA8
                                                                      APIs
                                                                        • Part of subcall function 6D2612BB: GlobalAlloc.KERNEL32(00000040,?,6D2612DB,?,6D26137F,00000019,6D2611CA,-000000A0), ref: 6D2612C5
                                                                      • GlobalFree.KERNEL32(?), ref: 6D262743
                                                                      • GlobalFree.KERNELBASE(00000000), ref: 6D262778
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706727938.000000006D261000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D260000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706709486.000000006D260000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706745853.000000006D264000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706765225.000000006D266000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d260000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Global$Free$Alloc
                                                                      • String ID:
                                                                      • API String ID: 1780285237-0
                                                                      • Opcode ID: 1edea3893a29bc94e90f2c3ba7648f6c7a3657ad1500ecb474511039311c8b2b
                                                                      • Instruction ID: 1c618d4eff601494a2843517fad1e05e71a4ab8202b8c68a971d7564e96d34e5
                                                                      • Opcode Fuzzy Hash: 1edea3893a29bc94e90f2c3ba7648f6c7a3657ad1500ecb474511039311c8b2b
                                                                      • Instruction Fuzzy Hash: 0731A0B15983DAEBCB278F54C9D8D3A77B6FF8A3493148529F24182110C730A895DB71
                                                                      APIs
                                                                      • CreateDirectoryW.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405AB1
                                                                      • GetLastError.KERNEL32 ref: 00405AC5
                                                                      • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405ADA
                                                                      • GetLastError.KERNEL32 ref: 00405AE4
                                                                      Strings
                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A94
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                                                      • API String ID: 3449924974-4083868402
                                                                      • Opcode ID: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                                                      • Instruction ID: 637b0a295f6611997b04f2fb2f8121e2d74ae93851c1d74b8ff7b710bfe1865b
                                                                      • Opcode Fuzzy Hash: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                                                      • Instruction Fuzzy Hash: 1A010871D04219EAEF019BA0DD84BEFBBB4EB14314F00813AD545B6281E7789648CFE9
                                                                      APIs
                                                                      • GlobalFree.KERNELBASE(00000000), ref: 6D2625C2
                                                                        • Part of subcall function 6D2612CC: lstrcpynW.KERNEL32(00000000,?,6D26137F,00000019,6D2611CA,-000000A0), ref: 6D2612DC
                                                                      • GlobalAlloc.KERNEL32(00000040), ref: 6D262548
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 6D262563
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706727938.000000006D261000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D260000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706709486.000000006D260000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706745853.000000006D264000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706765225.000000006D266000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d260000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                                      • String ID:
                                                                      • API String ID: 4216380887-0
                                                                      • Opcode ID: b00948eefe11c588776a2a0d5eec8034939ce6aace0b9d9f7a5575b73b09c770
                                                                      • Instruction ID: ab5e0da1c764a339184fcf9a44fa95e263c5bbfbba8030eda7a11fcd03a15c8e
                                                                      • Opcode Fuzzy Hash: b00948eefe11c588776a2a0d5eec8034939ce6aace0b9d9f7a5575b73b09c770
                                                                      • Instruction Fuzzy Hash: 3C41ADF019838ADFD739DF28D854A3677B8FF4A319B00892DE54686181E730A5C5CBB1
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,?), ref: 00401D9A
                                                                      • GetClientRect.USER32(?,?), ref: 00401DE5
                                                                      • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E15
                                                                      • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E29
                                                                      • DeleteObject.GDI32(00000000), ref: 00401E39
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                      • String ID:
                                                                      • API String ID: 1849352358-0
                                                                      • Opcode ID: 0d14a93a4aa2f7ddc0f91d11ffebc05af74b5a93feb44974f4da7284e64bbe2b
                                                                      • Instruction ID: b69f8f45c5cbb28dd5603d9b1d667d2ce3d3910c133b75fee4ecc707c572ca23
                                                                      • Opcode Fuzzy Hash: 0d14a93a4aa2f7ddc0f91d11ffebc05af74b5a93feb44974f4da7284e64bbe2b
                                                                      • Instruction Fuzzy Hash: 3321F672904119AFCB05DBA4DE45AEEBBB5EF08314F14003AFA45F62A0DB389951DB98
                                                                      APIs
                                                                        • Part of subcall function 6D261BFF: GlobalFree.KERNEL32(?), ref: 6D261E74
                                                                        • Part of subcall function 6D261BFF: GlobalFree.KERNEL32(?), ref: 6D261E79
                                                                        • Part of subcall function 6D261BFF: GlobalFree.KERNELBASE(?), ref: 6D261E7E
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D2618C5
                                                                      • FreeLibrary.KERNEL32(?), ref: 6D26194B
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D261970
                                                                        • Part of subcall function 6D26243E: GlobalAlloc.KERNEL32(00000040,?), ref: 6D26246F
                                                                        • Part of subcall function 6D262810: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6D261896,00000000), ref: 6D2628E0
                                                                        • Part of subcall function 6D261666: wsprintfW.USER32 ref: 6D261694
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706727938.000000006D261000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D260000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706709486.000000006D260000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706745853.000000006D264000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706765225.000000006D266000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d260000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Global$Free$Alloc$Librarywsprintf
                                                                      • String ID:
                                                                      • API String ID: 3962662361-3916222277
                                                                      • Opcode ID: b445783aa9fbe0f27b5ee08c3407fc20223c92fd3cb8328cb5b6c64e760f84ed
                                                                      • Instruction ID: c387a5fbeacfb0339df643f8487c74fd840d3e32b90ceafd88c9e5a08ab5a677
                                                                      • Opcode Fuzzy Hash: b445783aa9fbe0f27b5ee08c3407fc20223c92fd3cb8328cb5b6c64e760f84ed
                                                                      • Instruction Fuzzy Hash: A541A7714883CF9BEF129F24D888BA537A8BF06359F148475EB559A08ADB74E0C4C770
                                                                      APIs
                                                                      • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB3
                                                                      • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CCB
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Timeout
                                                                      • String ID: !
                                                                      • API String ID: 1777923405-2657877971
                                                                      • Opcode ID: 56378305e9cef062e59ac21505f1e4874eb63478d5e018d68d94a8de4df44513
                                                                      • Instruction ID: 549e056fbb7746b1afa8e7352ee9f1cbf83a3633853e14f9ff1f16dc1dd81c22
                                                                      • Opcode Fuzzy Hash: 56378305e9cef062e59ac21505f1e4874eb63478d5e018d68d94a8de4df44513
                                                                      • Instruction Fuzzy Hash: 46219C7190420AAFEF05AFA4D94AAAE7BB4FF84304F14453EF601B61D0D7B88941CB98
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsiA50F.tmp,00000023,00000011,00000002), ref: 004024D5
                                                                      • RegSetValueExW.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsiA50F.tmp,00000000,00000011,00000002), ref: 00402515
                                                                      • RegCloseKey.KERNEL32(?,?,?,C:\Users\user\AppData\Local\Temp\nsiA50F.tmp,00000000,00000011,00000002), ref: 004025FD
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: CloseValuelstrlen
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsiA50F.tmp
                                                                      • API String ID: 2655323295-2171371601
                                                                      • Opcode ID: 3f2741e17913f4b3ae47e715a678bc9f1b76d5c80f35dbb4c6e867a5b8f0e772
                                                                      • Instruction ID: a32c4fc66ba480c3aafb49ec1434dbeb720bd0d2787204a1d049ba7b64bbfaa1
                                                                      • Opcode Fuzzy Hash: 3f2741e17913f4b3ae47e715a678bc9f1b76d5c80f35dbb4c6e867a5b8f0e772
                                                                      • Instruction Fuzzy Hash: 8B118E71E00119BEEF10AFA5DE49EAEBAB8FF44358F15443AF504F61C1D7B88D40AA58
                                                                      APIs
                                                                      • GetTickCount.KERNEL32 ref: 0040607A
                                                                      • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,?,0040352B,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406095
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: CountFileNameTempTick
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                      • API String ID: 1716503409-1331003597
                                                                      • Opcode ID: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                                                      • Instruction ID: cc98cbd97bba9fac9576f26979179aa346a2ab2dc3c85b14509754d74f2b81c3
                                                                      • Opcode Fuzzy Hash: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                                                      • Instruction Fuzzy Hash: CEF09076B40204FBEB00CF69ED05E9EB7BCEB95750F11803AFA05F7140E6B499648768
                                                                      APIs
                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 6D261171
                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 6D2611E3
                                                                      • GlobalFree.KERNEL32 ref: 6D26124A
                                                                      • GlobalFree.KERNELBASE(?), ref: 6D26129B
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D2612B1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706727938.000000006D261000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D260000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706709486.000000006D260000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706745853.000000006D264000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706765225.000000006D266000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d260000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Global$Free$Alloc
                                                                      • String ID:
                                                                      • API String ID: 1780285237-0
                                                                      • Opcode ID: d2db71fb0ebb827b345f59d52d0b709521dc5359a6b08a358ce31eb32a1d7655
                                                                      • Instruction ID: 4b054d21d76e59e18d5cb23dec00325ad91ef67977b40b5a64a79c5ab97fa42d
                                                                      • Opcode Fuzzy Hash: d2db71fb0ebb827b345f59d52d0b709521dc5359a6b08a358ce31eb32a1d7655
                                                                      • Instruction Fuzzy Hash: 5851707594439ADFDB02CF68C848A3677F4FB4A719B008565EA44DB251E734F9C0CB60
                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 00402103
                                                                      • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00402114
                                                                      • KiUserCallbackDispatcher.NTDLL(?,00000400,?,0040CE50,0040A000,?,00000008,00000001,000000F0), ref: 00402164
                                                                        • Part of subcall function 0040559F: lstrlenW.KERNEL32(0042C248,00000000,00425020,755723A0,?,?,?,?,?,?,?,?,?,00403418,00000000,?), ref: 004055D7
                                                                        • Part of subcall function 0040559F: lstrlenW.KERNEL32(00403418,0042C248,00000000,00425020,755723A0,?,?,?,?,?,?,?,?,?,00403418,00000000), ref: 004055E7
                                                                        • Part of subcall function 0040559F: lstrcatW.KERNEL32(0042C248,00403418,00403418,0042C248,00000000,00425020,755723A0), ref: 004055FA
                                                                        • Part of subcall function 0040559F: SetWindowTextW.USER32(0042C248,0042C248), ref: 0040560C
                                                                        • Part of subcall function 0040559F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405632
                                                                        • Part of subcall function 0040559F: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040564C
                                                                        • Part of subcall function 0040559F: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565A
                                                                      • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 00402191
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Librarylstrlen$CallbackDispatcherFreeHandleLoadModuleTextUserWindowlstrcat
                                                                      • String ID:
                                                                      • API String ID: 719239633-0
                                                                      • Opcode ID: 0812a69665cf11e377adb3684f8a171474585e26745252b9346dd4e1bc3f05c7
                                                                      • Instruction ID: d1cf9917c249e547a3b1759614bc69e8b445b1996c4dbd71fd6f6dd46acd7470
                                                                      • Opcode Fuzzy Hash: 0812a69665cf11e377adb3684f8a171474585e26745252b9346dd4e1bc3f05c7
                                                                      • Instruction Fuzzy Hash: 2A21C231904104FACF11AFA5CE48A9D7A71BF48358F20413BF605B91E1DBBD8A82965D
                                                                      APIs
                                                                      • HttpSendRequestExW.WININET(?,?,00000000,00000008,00000000), ref: 6FD724F4
                                                                      • HttpSendRequestW.WININET(?,00000000,00000000), ref: 6FD7250F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706805863.000000006FD71000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD70000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706784915.000000006FD70000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706824623.000000006FD77000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706839008.000000006FD78000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706980410.000000006FD7F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fd70000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: HttpRequestSend
                                                                      • String ID: (
                                                                      • API String ID: 360639707-3887548279
                                                                      • Opcode ID: b34824c9d5bc1f230acee19d25fb729a1149099c944e50498828f10d0c2e7e39
                                                                      • Instruction ID: 519d42203751559d6cde9efc24cbf865857df94ac11c5b412095a12939554f71
                                                                      • Opcode Fuzzy Hash: b34824c9d5bc1f230acee19d25fb729a1149099c944e50498828f10d0c2e7e39
                                                                      • Instruction Fuzzy Hash: B2F0F932D0075AAAEF118FA0CD45B9D7BF6BB9A318F18920AF50078094DBB165948B95
                                                                      APIs
                                                                      • GlobalFree.KERNEL32(0056E3D8), ref: 00401C0B
                                                                      • GlobalAlloc.KERNEL32(00000040,00000804), ref: 00401C1D
                                                                        • Part of subcall function 0040657A: lstrcatW.KERNEL32(get,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                                                                        • Part of subcall function 0040657A: lstrlenW.KERNEL32(get,00000000,0042C248,?,004055D6,0042C248,00000000), ref: 00406779
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Global$AllocFreelstrcatlstrlen
                                                                      • String ID: get
                                                                      • API String ID: 3292104215-4248514160
                                                                      • Opcode ID: f7499587b74b1f9cb3fce9f730428132cfcdd1475af0708a05741156e8f6fa82
                                                                      • Instruction ID: 7c0f58a685d1fc6dd3685da305ee1819882fb4420ac17dc2787245939102450a
                                                                      • Opcode Fuzzy Hash: f7499587b74b1f9cb3fce9f730428132cfcdd1475af0708a05741156e8f6fa82
                                                                      • Instruction Fuzzy Hash: 1B21D872904210EBDB20AFA8EE84A5E73B4EB04715755063BF552F72D0D7B8AC414B9D
                                                                      APIs
                                                                      • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025D1
                                                                      • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 004025E4
                                                                      • RegCloseKey.KERNEL32(?,?,?,C:\Users\user\AppData\Local\Temp\nsiA50F.tmp,00000000,00000011,00000002), ref: 004025FD
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Enum$CloseValue
                                                                      • String ID:
                                                                      • API String ID: 397863658-0
                                                                      • Opcode ID: 89c6ceebaf26a2410158c75cc71a1e3b778611476644ea09d24f59567d4f9c93
                                                                      • Instruction ID: 08080f496e1fbaad801da7c4a2f11cdf7a22a5a493a276a89d416976773fa01e
                                                                      • Opcode Fuzzy Hash: 89c6ceebaf26a2410158c75cc71a1e3b778611476644ea09d24f59567d4f9c93
                                                                      • Instruction Fuzzy Hash: 89017CB1A04105ABEB159F94DE58AAEB66CEF40348F10403AF501B61C0EBB85E44966D
                                                                      APIs
                                                                        • Part of subcall function 00405EB7: CharNextW.USER32(?,?,0042FA70,?,00405F2B,0042FA70,0042FA70, 4Wu,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,75573420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405EC5
                                                                        • Part of subcall function 00405EB7: CharNextW.USER32(00000000), ref: 00405ECA
                                                                        • Part of subcall function 00405EB7: CharNextW.USER32(00000000), ref: 00405EE2
                                                                      • GetFileAttributesW.KERNEL32(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                                                                        • Part of subcall function 00405A6E: CreateDirectoryW.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405AB1
                                                                      • SetCurrentDirectoryW.KERNEL32(?,00441000,?,00000000,000000F0), ref: 0040164D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                      • String ID:
                                                                      • API String ID: 1892508949-0
                                                                      • Opcode ID: e89a9e6a3f09ade376d0d4b3fd71c203f5cd3ef8be9bd613e1140dffb9deb40c
                                                                      • Instruction ID: 910f9ca0e916fbda017ea5bccd1daba2d9720f9cae8b5c5670dceb894c5ef12e
                                                                      • Opcode Fuzzy Hash: e89a9e6a3f09ade376d0d4b3fd71c203f5cd3ef8be9bd613e1140dffb9deb40c
                                                                      • Instruction Fuzzy Hash: 3E11D031504110EBCF216FA5CD4099F36A0EF25369B28493BE945B52F1DA3E4A829A8E
                                                                      APIs
                                                                      • RegQueryValueExW.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,00000033), ref: 0040255B
                                                                      • RegCloseKey.KERNEL32(?,?,?,C:\Users\user\AppData\Local\Temp\nsiA50F.tmp,00000000,00000011,00000002), ref: 004025FD
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: CloseQueryValue
                                                                      • String ID:
                                                                      • API String ID: 3356406503-0
                                                                      • Opcode ID: 3fb0128ec3c0afb48f28764f09fc95c95f98cfbd5e462e7a9813c2ba4e742ed8
                                                                      • Instruction ID: 3e5dab0bbcc9b7b4348569693e39c51bc0b27c59e8ea0ed6abb05ebc10b9b344
                                                                      • Opcode Fuzzy Hash: 3fb0128ec3c0afb48f28764f09fc95c95f98cfbd5e462e7a9813c2ba4e742ed8
                                                                      • Instruction Fuzzy Hash: 5F116D71900219EADF14DFA4DA589AE77B4FF04345B20443BE401B62C0E7B88A45EB5D
                                                                      APIs
                                                                        • Part of subcall function 00405B63: ShellExecuteExW.SHELL32(?), ref: 00405B72
                                                                        • Part of subcall function 004069B5: WaitForSingleObject.KERNEL32(?,00000064), ref: 004069C6
                                                                        • Part of subcall function 004069B5: GetExitCodeProcess.KERNEL32(?,?), ref: 004069E8
                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FEB
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: CloseCodeExecuteExitHandleObjectProcessShellSingleWait
                                                                      • String ID: @
                                                                      • API String ID: 165873841-2766056989
                                                                      • Opcode ID: e9e6b888b2ac62b7866e10c79cc816c8736e15ae282fdec460a2aeb23ba8a534
                                                                      • Instruction ID: 706d8f23dd4fc365793d21c3b3cee38f3579e955c6bce5a1691758ef83551cc9
                                                                      • Opcode Fuzzy Hash: e9e6b888b2ac62b7866e10c79cc816c8736e15ae282fdec460a2aeb23ba8a534
                                                                      • Instruction Fuzzy Hash: 20115B71E042189ADB50EFB9CA49B8CB6F4BF04304F24447AE405F72C1EBBC89459B18
                                                                      APIs
                                                                      • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                      • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID:
                                                                      • API String ID: 3850602802-0
                                                                      • Opcode ID: d8feea9b0bd879c8f8267a4ec85e9a32d700cac98845316580bbb569ce856791
                                                                      • Instruction ID: f98c5e72cab4da6dd47fcf147c12dc0649e5852bd482257a86ca63d172a8b8d6
                                                                      • Opcode Fuzzy Hash: d8feea9b0bd879c8f8267a4ec85e9a32d700cac98845316580bbb569ce856791
                                                                      • Instruction Fuzzy Hash: 0B01F4316202209FE7094B389D05B6A3698E710319F14823FF851F65F1EA78DC029B4C
                                                                      APIs
                                                                      • ShowWindow.USER32(00000000,00000000), ref: 00401EFC
                                                                      • EnableWindow.USER32(00000000,00000000), ref: 00401F07
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Window$EnableShow
                                                                      • String ID:
                                                                      • API String ID: 1136574915-0
                                                                      • Opcode ID: 5ade1ed26a80a7dd8760c06c43378076533002221f41e68569be4ee1dd8de31a
                                                                      • Instruction ID: ff95e9915c8c9942b49c08d49a5710ecdabad47c7be9b03b7ba0a01474a23479
                                                                      • Opcode Fuzzy Hash: 5ade1ed26a80a7dd8760c06c43378076533002221f41e68569be4ee1dd8de31a
                                                                      • Instruction Fuzzy Hash: E7E04872908211CFE705EBA4EE495AD77F4EF40325710497FE501F11D1DBB55D00965D
                                                                      APIs
                                                                      • GetModuleHandleA.KERNEL32(?,00000020,?,0040363D,0000000B), ref: 0040691C
                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00406937
                                                                        • Part of subcall function 0040689A: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068B1
                                                                        • Part of subcall function 0040689A: wsprintfW.USER32 ref: 004068EC
                                                                        • Part of subcall function 0040689A: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406900
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                      • String ID:
                                                                      • API String ID: 2547128583-0
                                                                      • Opcode ID: 6f78d3fdf53352f122fdb8e7e1f438bdfac4fae158339a91a146711bf240c1a4
                                                                      • Instruction ID: 98bdf7d71c6046f852b78b75196177710d0a141037308efd39b2ac7baa162fea
                                                                      • Opcode Fuzzy Hash: 6f78d3fdf53352f122fdb8e7e1f438bdfac4fae158339a91a146711bf240c1a4
                                                                      • Instruction Fuzzy Hash: 9FE0867390422066D21196745D44D7773A89B99750306443EF946F2090DB38DC31A76E
                                                                      APIs
                                                                      • SendMessageW.USER32(?,0000000B,?), ref: 00402C14
                                                                      • InvalidateRect.USER32(?), ref: 00402C24
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: InvalidateMessageRectSend
                                                                      • String ID:
                                                                      • API String ID: 909852535-0
                                                                      • Opcode ID: 0509652848a83ac1d7feddac23dc24ced32f84c0220a85d8a6f2313ae5a63aab
                                                                      • Instruction ID: 5efb85e177e5feb05262591b5578bbf68be0fc1facb886aaf0ec985341d6bcc2
                                                                      • Opcode Fuzzy Hash: 0509652848a83ac1d7feddac23dc24ced32f84c0220a85d8a6f2313ae5a63aab
                                                                      • Instruction Fuzzy Hash: CEE08C72700008FFEB01CBA4EE84DAEB779FB40315B00007AF502A00A0D7300D40DA28
                                                                      APIs
                                                                      • GetFileAttributesW.KERNEL32(00000003,004030BD,C:\Users\user\Desktop\Setup.exe,80000000,00000003,?,?,?,?,?,0040387D,?), ref: 00406031
                                                                      • CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,0040387D,?), ref: 00406053
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: File$AttributesCreate
                                                                      • String ID:
                                                                      • API String ID: 415043291-0
                                                                      • Opcode ID: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                                                      • Instruction ID: 1030bc0f2bf25390ef9c6131bda9d6cfedcac9e68b753c15eded60bf4a570351
                                                                      • Opcode Fuzzy Hash: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                                                      • Instruction Fuzzy Hash: 5ED09E31254201AFEF098F20DE16F2E7BA2EB94B04F11552CB786941E0DAB15C199B15
                                                                      APIs
                                                                      • GetFileAttributesW.KERNEL32(?,?,00405C0D,?,?,00000000,00405DE3,?,?,?,?), ref: 0040600D
                                                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00406021
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: AttributesFile
                                                                      • String ID:
                                                                      • API String ID: 3188754299-0
                                                                      • Opcode ID: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                                                      • Instruction ID: c979a2e86073268fb5c10017c0603d576bb262e7e1663e1e1b2ee048d1a5e24b
                                                                      • Opcode Fuzzy Hash: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                                                      • Instruction Fuzzy Hash: 34D012725041316FC2102728EF0C89BBF55EF643717014B35F9A5A22F0CB304C638A98
                                                                      APIs
                                                                      • CreateDirectoryW.KERNEL32(?,00000000,00403520,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00405AF1
                                                                      • GetLastError.KERNEL32 ref: 00405AFF
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: CreateDirectoryErrorLast
                                                                      • String ID:
                                                                      • API String ID: 1375471231-0
                                                                      • Opcode ID: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                                                      • Instruction ID: 33feed20cbbf131019f18849f7ccc9358209a8d33535326e0157453b6049084a
                                                                      • Opcode Fuzzy Hash: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                                                      • Instruction Fuzzy Hash: 1BC04C30204501AED6105B609E48B177AA4DB50741F16843D6146E41E0DA789455EE2D
                                                                      APIs
                                                                      • SetFilePointer.KERNEL32(00000000,?,00000000,?,?), ref: 004028AF
                                                                        • Part of subcall function 00406484: wsprintfW.USER32 ref: 00406491
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: FilePointerwsprintf
                                                                      • String ID:
                                                                      • API String ID: 327478801-0
                                                                      • Opcode ID: 1a69bed114d0c3cb27e295a60469d00fb85b85c1c8bbaab52ea3f411131a6a45
                                                                      • Instruction ID: a13d1cf18dcce6f7d85bed0b4e0fde0de6b16079219dfacd376ffc086bc6f252
                                                                      • Opcode Fuzzy Hash: 1a69bed114d0c3cb27e295a60469d00fb85b85c1c8bbaab52ea3f411131a6a45
                                                                      • Instruction Fuzzy Hash: D3E09271A04105BFDB01EFA5AE499AEB3B8EF44319B10483BF102F00C1DA794D119B2D
                                                                      APIs
                                                                      • WriteFile.KERNEL32(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403498,00000000,0041EA20,000000FF,0041EA20,000000FF,000000FF,00000004,00000000), ref: 004060F3
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: FileWrite
                                                                      • String ID:
                                                                      • API String ID: 3934441357-0
                                                                      • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                                      • Instruction ID: d8d859634201a592f38c73999a999f352708a9e59580de02994c407fa40ca669
                                                                      • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                                      • Instruction Fuzzy Hash: FAE08C3220026AABEF109E60DC04AEB3B6CFB00360F014837FA16E7081E270E93087A4
                                                                      APIs
                                                                      • ReadFile.KERNEL32(00000000,00000000,00000004,00000004,00000000,000000FF,?,004034E2,00000000,00000000,00403306,000000FF,00000004,00000000,00000000,00000000), ref: 004060C4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: FileRead
                                                                      • String ID:
                                                                      • API String ID: 2738559852-0
                                                                      • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                                                      • Instruction ID: 1583d2e05e1cff28e3594e7db3f0db2d88eef65457287744bb544c492d9958e5
                                                                      • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                                                      • Instruction Fuzzy Hash: AEE0EC322502AAABDF10AE65DC04AEB7B6CEB05361F018936FD16E6150E631E92197A4
                                                                      APIs
                                                                      • VirtualProtect.KERNEL32(6D26505C,00000004,00000040,6D26504C), ref: 6D262A9D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706727938.000000006D261000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D260000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706709486.000000006D260000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706745853.000000006D264000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706765225.000000006D266000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d260000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: ProtectVirtual
                                                                      • String ID:
                                                                      • API String ID: 544645111-0
                                                                      • Opcode ID: 8d49f57d04c5b96b75db184e407325b56cb93aa60413bd242ae9b886dbb780b6
                                                                      • Instruction ID: 1bb38225cfeaafaacbe700d3a6cf7398d2424f0e7cb572678eba92a5d1eafbf8
                                                                      • Opcode Fuzzy Hash: 8d49f57d04c5b96b75db184e407325b56cb93aa60413bd242ae9b886dbb780b6
                                                                      • Instruction Fuzzy Hash: 85F07FB05483C5EFCB50CB28854873A3BF0A70E209B14856AA188D624AE3748488DBA1
                                                                      APIs
                                                                      • RegOpenKeyExW.KERNEL32(00000000,00000000,00000000,?,?,0042C248,?,?,00406438,0042C248,00000000,?,?,get,?), ref: 004063CE
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Open
                                                                      • String ID:
                                                                      • API String ID: 71445658-0
                                                                      • Opcode ID: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                                                                      • Instruction ID: 4361357c0318622cec318f667d88df30c4c29b75262f7bca7234b06b46464da2
                                                                      • Opcode Fuzzy Hash: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                                                                      • Instruction Fuzzy Hash: 83D0123210020EBBDF115F91AD01FAB3B5DAB08310F014426FE06E40A1D775D530A764
                                                                      APIs
                                                                        • Part of subcall function 0040657A: lstrcatW.KERNEL32(get,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                                                                        • Part of subcall function 0040657A: lstrlenW.KERNEL32(get,00000000,0042C248,?,004055D6,0042C248,00000000), ref: 00406779
                                                                      • SetDlgItemTextW.USER32(?,?,00000000), ref: 004044B3
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: ItemTextlstrcatlstrlen
                                                                      • String ID:
                                                                      • API String ID: 281422827-0
                                                                      • Opcode ID: 686190c6e4e1e5cc0914df72c0c951126eb576f2e70f28df627782bea9933419
                                                                      • Instruction ID: 6ac98b26730712a62f5b3967fa7f39b4c61dbbfa6ef1674fce18da22a1fc1fc0
                                                                      • Opcode Fuzzy Hash: 686190c6e4e1e5cc0914df72c0c951126eb576f2e70f28df627782bea9933419
                                                                      • Instruction Fuzzy Hash: D3C08C35008200BFD641A714EC42F0FB7A8FFA031AF00C42EB05CA10D1C63494208A2A
                                                                      APIs
                                                                      • SendMessageW.USER32(00000028,?,00000001,004042F9), ref: 004044DC
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID:
                                                                      • API String ID: 3850602802-0
                                                                      • Opcode ID: ea04ea026f55595d688d74c1d87789f1c1942be7a89ca5b988cfd0b6025de892
                                                                      • Instruction ID: f9270ce27bc2d5d500308faa7c43699bdd9cec228278350af1c7ef3a72e6c056
                                                                      • Opcode Fuzzy Hash: ea04ea026f55595d688d74c1d87789f1c1942be7a89ca5b988cfd0b6025de892
                                                                      • Instruction Fuzzy Hash: 4FB01235181A00FBDE514B00DE09F857E62F7E4701F058038F341240F0CBB200A4DB08
                                                                      APIs
                                                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00403242,?,?,?,?,?,?,0040387D,?), ref: 004034F3
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: FilePointer
                                                                      • String ID:
                                                                      • API String ID: 973152223-0
                                                                      • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                                                      • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
                                                                      • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                                                      • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
                                                                      APIs
                                                                      • GlobalAlloc.KERNEL32(00000000), ref: 6D262C57
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706727938.000000006D261000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D260000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706709486.000000006D260000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706745853.000000006D264000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706765225.000000006D266000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d260000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: AllocGlobal
                                                                      • String ID:
                                                                      • API String ID: 3761449716-0
                                                                      • Opcode ID: c0fd09cde7c48aa87f6e47a82722b958ce47e2e3694e4ecb884c276a7da630f6
                                                                      • Instruction ID: b684237a9f706b632045ca5c873fc94e4df092fd1c5e00ea3ffa70268694e1b6
                                                                      • Opcode Fuzzy Hash: c0fd09cde7c48aa87f6e47a82722b958ce47e2e3694e4ecb884c276a7da630f6
                                                                      • Instruction Fuzzy Hash: 604147B25883CAEFDB209F64D988B7A3774EF4A35DF21C825E60486105D739D8C4CAB1
                                                                      APIs
                                                                        • Part of subcall function 0040559F: lstrlenW.KERNEL32(0042C248,00000000,00425020,755723A0,?,?,?,?,?,?,?,?,?,00403418,00000000,?), ref: 004055D7
                                                                        • Part of subcall function 0040559F: lstrlenW.KERNEL32(00403418,0042C248,00000000,00425020,755723A0,?,?,?,?,?,?,?,?,?,00403418,00000000), ref: 004055E7
                                                                        • Part of subcall function 0040559F: lstrcatW.KERNEL32(0042C248,00403418,00403418,0042C248,00000000,00425020,755723A0), ref: 004055FA
                                                                        • Part of subcall function 0040559F: SetWindowTextW.USER32(0042C248,0042C248), ref: 0040560C
                                                                        • Part of subcall function 0040559F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405632
                                                                        • Part of subcall function 0040559F: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040564C
                                                                        • Part of subcall function 0040559F: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565A
                                                                        • Part of subcall function 00405B20: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,00000000,00000000), ref: 00405B49
                                                                        • Part of subcall function 00405B20: CloseHandle.KERNEL32(?), ref: 00405B56
                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FEB
                                                                        • Part of subcall function 004069B5: WaitForSingleObject.KERNEL32(?,00000064), ref: 004069C6
                                                                        • Part of subcall function 004069B5: GetExitCodeProcess.KERNEL32(?,?), ref: 004069E8
                                                                        • Part of subcall function 00406484: wsprintfW.USER32 ref: 00406491
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                                      • String ID:
                                                                      • API String ID: 2972824698-0
                                                                      • Opcode ID: 5953877b6410b482209df80f50a5fc1a362c20bdcc401faed897dac012a701f2
                                                                      • Instruction ID: a015d294fcb9cc4e365613bb9e09bf6e78b00889af70ee47f703a6c6056ea9c8
                                                                      • Opcode Fuzzy Hash: 5953877b6410b482209df80f50a5fc1a362c20bdcc401faed897dac012a701f2
                                                                      • Instruction Fuzzy Hash: 2DF09072904112EBCB21BBA59A84EDE76E8DF01318F25403BE102B21D1D77C4E429A6E
                                                                      APIs
                                                                      • GlobalAlloc.KERNEL32(00000040,?,6D2612DB,?,6D26137F,00000019,6D2611CA,-000000A0), ref: 6D2612C5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706727938.000000006D261000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D260000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706709486.000000006D260000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706745853.000000006D264000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706765225.000000006D266000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d260000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: AllocGlobal
                                                                      • String ID:
                                                                      • API String ID: 3761449716-0
                                                                      • Opcode ID: 5f80afa5423167ac70a5835dd479904134bcb85019a6e9c7fcf02c7011c98a6f
                                                                      • Instruction ID: a2f888825913be75d402690bd98bcda9c3e13c216bba2b166625e7866747a12a
                                                                      • Opcode Fuzzy Hash: 5f80afa5423167ac70a5835dd479904134bcb85019a6e9c7fcf02c7011c98a6f
                                                                      • Instruction Fuzzy Hash: 6BB01270A04250DFEE008B64CC4EF3732B4E709309F04C000FA00C0185C320C800C534
                                                                      APIs
                                                                      • lstrcmpiW.KERNEL32(00000000,PreConfig,?,?,?,?,?,?,?,?,00000000,?,nsJSON NSIS plug-in/1.0.x.x,?,?), ref: 6D2533B5
                                                                      • lstrcmpiW.KERNEL32(00000000,Proxy,?,?,?,?,?,?,?,?,00000000,?,nsJSON NSIS plug-in/1.0.x.x,?,?), ref: 6D2533C5
                                                                      • InternetOpenW.WININET(?,00000001,00000000,00000000,00000000), ref: 6D253421
                                                                      • GlobalAlloc.KERNEL32(00000040,0000003C,?,?,?,?,?,?,?,?,00000000,?,nsJSON NSIS plug-in/1.0.x.x,?,?), ref: 6D253436
                                                                      • lstrcmpiW.KERNEL32(00000000,6D255110,Raw,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6D253487
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,nsJSON NSIS plug-in/1.0.x.x,?,?), ref: 6D2534D7
                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,nsJSON NSIS plug-in/1.0.x.x), ref: 6D2534FD
                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,nsJSON NSIS plug-in/1.0.x.x), ref: 6D25351F
                                                                      • GlobalAlloc.KERNEL32(00000040,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,nsJSON NSIS plug-in/1.0.x.x), ref: 6D253531
                                                                      • GlobalAlloc.KERNEL32(00000040,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,nsJSON NSIS plug-in/1.0.x.x), ref: 6D25354A
                                                                      • InternetCrackUrlW.WININET(?,00000000,00000000,00000000), ref: 6D253561
                                                                      • InternetConnectW.WININET(?,?,?,00000000,00000000,00000003,00000000,00000000), ref: 6D253582
                                                                      • lstrcpyW.KERNEL32(?,6D2552F8,?,GET,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6D2535D4
                                                                      • lstrcpyW.KERNEL32(?,?,?,GET,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6D2535E8
                                                                      • lstrlenW.KERNEL32(00000000,?,?,00000000,?,GET), ref: 6D25361D
                                                                      • InternetSetOptionW.WININET(?,0000002B,?,00000000), ref: 6D25362C
                                                                      • lstrlenW.KERNEL32(00000000,?,?,00000000,?,?,00000000,?,GET), ref: 6D253653
                                                                      • InternetSetOptionW.WININET(?,0000002C,?,00000000), ref: 6D253662
                                                                      • InternetSetOptionW.WININET(?,00000041,?,00000004), ref: 6D25368D
                                                                      • lstrlenW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,GET), ref: 6D2536B1
                                                                      • InternetSetOptionW.WININET(?,0000001C,?,00000000), ref: 6D2536C0
                                                                      • lstrlenW.KERNEL32(00000000,?,?,00000000,?,00000000,?,?,?,?,?,?,GET), ref: 6D2536E4
                                                                      • InternetSetOptionW.WININET(?,0000001D,?,00000000), ref: 6D2536F3
                                                                      • InternetSetOptionW.WININET(?,00000002,?,00000004), ref: 6D253727
                                                                      • InternetSetOptionW.WININET(?,00000005,?,00000004), ref: 6D25375B
                                                                      • InternetSetOptionW.WININET(?,00000006,?,00000004), ref: 6D25378F
                                                                      • HttpOpenRequestW.WININET(?,?,?,00000000,00000000,6D256024,84480200,00000000), ref: 6D2537B6
                                                                      • HttpAddRequestHeadersW.WININET(00000000,?,000000FF,00000000), ref: 6D25382E
                                                                      • HttpAddRequestHeadersW.WININET(00000000,Accept-Encoding: gzip,deflate,000000FF,20000000), ref: 6D253847
                                                                      • lstrcmpiW.KERNEL32(?,POST,?,?,?,?,?,?,?,?,00000000), ref: 6D253855
                                                                      • HttpAddRequestHeadersW.WININET(00000000,Content-Type: application/x-www-form-urlencoded,000000FF,20000000), ref: 6D253879
                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 6D2538A2
                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 6D2538AD
                                                                      • GlobalAlloc.KERNEL32(00000040,00000000,?,?,?,?,?,?,?,?,00000000), ref: 6D2538C5
                                                                      • lstrcpyW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 6D2538D5
                                                                      • lstrcatW.KERNEL32(00000000,6D2551A0,?,?,?,?,?,?,?,?,00000000), ref: 6D2538E1
                                                                      • lstrcatW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 6D2538EB
                                                                      • lstrcatW.KERNEL32(00000000,6D2550F8,?,?,?,?,?,?,?,?,00000000), ref: 6D2538F7
                                                                      • HttpAddRequestHeadersW.WININET(?,00000000,?,A0000000), ref: 6D253907
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D25390E
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6D25396C
                                                                      • lstrcmpiW.KERNEL32(?,Unicode,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6D25399B
                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6D2539A8
                                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,?,00000000), ref: 6D2539B9
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6D2539C6
                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6D2539E2
                                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,?), ref: 6D253A0D
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6D253A1A
                                                                      • GlobalFree.KERNEL32(?), ref: 6D253A34
                                                                      • GlobalFree.KERNEL32(?), ref: 6D253A3D
                                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 6D253A4A
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 6D253A57
                                                                      • InternetQueryDataAvailable.WININET(00000000,?,00000000,00000000,?,?,?,?,?,?,?,?,00000000), ref: 6D253A81
                                                                      • GlobalAlloc.KERNEL32(00000040,?,?,?,?,?,?,?,?,?,00000000), ref: 6D253A96
                                                                      • InternetReadFile.WININET(00000000,00000000,?,?), ref: 6D253AB5
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 6D253B14
                                                                      • GlobalFree.KERNEL32(?), ref: 6D253B2F
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 6D253B37
                                                                      • HttpQueryInfoW.WININET(00000000,00000013,00000000,?,00000000), ref: 6D253B5C
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6D253B66
                                                                      • GlobalAlloc.KERNEL32(00000040,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6D253B7E
                                                                      • HttpQueryInfoW.WININET(00000000,00000013,00000000,?,00000000), ref: 6D253B95
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D253BB6
                                                                      • InternetCloseHandle.WININET(00000000), ref: 6D253BBD
                                                                      • GetLastError.KERNEL32(?,?,00000000,?,?,00000000,?,?,00000000,?,?,00000000,?,00000000), ref: 6D253BC5
                                                                      • InternetCloseHandle.WININET(?), ref: 6D253BDF
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,nsJSON NSIS plug-in/1.0.x.x,?,?), ref: 6D253BE7
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,nsJSON NSIS plug-in/1.0.x.x,?,?), ref: 6D253BF5
                                                                      • GlobalFree.KERNEL32(?), ref: 6D253C0F
                                                                      • GlobalFree.KERNEL32(?), ref: 6D253C18
                                                                      • GlobalFree.KERNEL32(?), ref: 6D253C32
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D253C39
                                                                      • InternetCloseHandle.WININET(?), ref: 6D253C42
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,nsJSON NSIS plug-in/1.0.x.x,?,?), ref: 6D253C4A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Internet$Global$ErrorLast$Httplstrlen$Free$OptionRequest$Alloc$lstrcmpi$Headers$CloseHandleQuerySendlstrcatlstrcpy$InfoOpen$AvailableConnectCrackDataFileRead
                                                                      • String ID: Accept-Encoding: gzip,deflate$AccessType$Agent$Bypass$ConnectTimeout$Content-Type: application/json$Content-Type: application/x-www-form-urlencoded$Data$DataEncoding$Decoding$GET$Headers$HttpOpenRequest$HttpSendRequest$InternetConnect$InternetCrackUrl$InternetOpen$InternetQueryDataAvailable$InternetReadFile$JSON_SerializeAlloc$Output$POST$Params$ParamsType$Password$PreConfig$Proxy$Raw$RawOutput$ReceiveTimeout$SendTimeout$Server$StatusCode$Unicode$UnicodeOutput$Url$Username$Verb$nsJSON NSIS plug-in/1.0.x.x
                                                                      • API String ID: 1670357981-3940592491
                                                                      • Opcode ID: 16f86a90be0a0b94a8b4871c07af6154d11a46e75a4517e6b58ac9fc65be382c
                                                                      • Instruction ID: c1fd90e5664e62600d35c7c661ee1166ac0235b06b6c68d0f9ffafa6c9a52742
                                                                      • Opcode Fuzzy Hash: 16f86a90be0a0b94a8b4871c07af6154d11a46e75a4517e6b58ac9fc65be382c
                                                                      • Instruction Fuzzy Hash: 2E424BB199421ABFEF015FB08C49EBF7BBCFF09215B015529FA05E6141EB35D9608BA0
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,00000403), ref: 0040573C
                                                                      • GetDlgItem.USER32(?,000003EE), ref: 0040574B
                                                                      • GetClientRect.USER32(?,?), ref: 00405788
                                                                      • GetSystemMetrics.USER32(00000002), ref: 0040578F
                                                                      • SendMessageW.USER32(?,00001061,00000000,?), ref: 004057B0
                                                                      • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004057C1
                                                                      • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004057D4
                                                                      • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004057E2
                                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 004057F5
                                                                      • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405817
                                                                      • ShowWindow.USER32(?,00000008), ref: 0040582B
                                                                      • GetDlgItem.USER32(?,000003EC), ref: 0040584C
                                                                      • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040585C
                                                                      • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405875
                                                                      • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405881
                                                                      • GetDlgItem.USER32(?,000003F8), ref: 0040575A
                                                                        • Part of subcall function 004044CE: SendMessageW.USER32(00000028,?,00000001,004042F9), ref: 004044DC
                                                                      • GetDlgItem.USER32(?,000003EC), ref: 0040589E
                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00005672,00000000), ref: 004058AC
                                                                      • CloseHandle.KERNEL32(00000000), ref: 004058B3
                                                                      • ShowWindow.USER32(00000000), ref: 004058D7
                                                                      • ShowWindow.USER32(00000000,00000008), ref: 004058DC
                                                                      • ShowWindow.USER32(00000008), ref: 00405926
                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040595A
                                                                      • CreatePopupMenu.USER32 ref: 0040596B
                                                                      • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 0040597F
                                                                      • GetWindowRect.USER32(?,?), ref: 0040599F
                                                                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004059B8
                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 004059F0
                                                                      • OpenClipboard.USER32(00000000), ref: 00405A00
                                                                      • EmptyClipboard.USER32 ref: 00405A06
                                                                      • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405A12
                                                                      • GlobalLock.KERNEL32(00000000), ref: 00405A1C
                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A30
                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00405A50
                                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 00405A5B
                                                                      • CloseClipboard.USER32 ref: 00405A61
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                      • String ID: {
                                                                      • API String ID: 590372296-366298937
                                                                      • Opcode ID: f02b1789a548c21c126c9045b4544d5ada5808600bf44a06586be8ced473be55
                                                                      • Instruction ID: 6b97441d6f4cfe62a880681573964a63c423f2dd70b2063085686802d9cc5617
                                                                      • Opcode Fuzzy Hash: f02b1789a548c21c126c9045b4544d5ada5808600bf44a06586be8ced473be55
                                                                      • Instruction Fuzzy Hash: C8B169B1900608FFDB119FA0DD85AAE7B79FB44355F00803AFA41BA1A0C7755E51DF58
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,000003FB), ref: 004049D9
                                                                      • SetWindowTextW.USER32(00000000,?), ref: 00404A03
                                                                      • SHBrowseForFolderW.SHELL32(?), ref: 00404AB4
                                                                      • CoTaskMemFree.OLE32(00000000), ref: 00404ABF
                                                                      • lstrcmpiW.KERNEL32(get,0042D268,00000000,?,?), ref: 00404AF1
                                                                      • lstrcatW.KERNEL32(?,get), ref: 00404AFD
                                                                      • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404B0F
                                                                        • Part of subcall function 00405B81: GetDlgItemTextW.USER32(?,?,00000400,00404B46), ref: 00405B94
                                                                        • Part of subcall function 004067C4: CharNextW.USER32(?,*?|<>/":,00000000,00000000,75573420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406827
                                                                        • Part of subcall function 004067C4: CharNextW.USER32(?,?,?,00000000,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406836
                                                                        • Part of subcall function 004067C4: CharNextW.USER32(?,00000000,75573420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 0040683B
                                                                        • Part of subcall function 004067C4: CharPrevW.USER32(?,?,75573420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 0040684E
                                                                      • GetDiskFreeSpaceW.KERNEL32(0042B238,?,?,0000040F,?,0042B238,0042B238,?,00000001,0042B238,?,?,000003FB,?), ref: 00404BD2
                                                                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404BED
                                                                        • Part of subcall function 00404D46: lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DE7
                                                                        • Part of subcall function 00404D46: wsprintfW.USER32 ref: 00404DF0
                                                                        • Part of subcall function 00404D46: SetDlgItemTextW.USER32(?,0042D268), ref: 00404E03
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                      • String ID: A$get$https://pcapp.store/pixel.gif?guid=
                                                                      • API String ID: 2624150263-3942083012
                                                                      • Opcode ID: aac53df244383e2a07a9d2c6e377dc106276e891bc31ab3524a37a2d2ad96109
                                                                      • Instruction ID: a81e8b8b6ddc8ea4f7a7a45a10ce21cc850824e22f7b82fba9ad49fead82d7d1
                                                                      • Opcode Fuzzy Hash: aac53df244383e2a07a9d2c6e377dc106276e891bc31ab3524a37a2d2ad96109
                                                                      • Instruction Fuzzy Hash: CBA191B1900208ABDB119FA6DD45AAFB7B8EF84314F10803BF601B62D1D77C9A41CB6D
                                                                      APIs
                                                                      • CoCreateInstance.OLE32(004085F0,?,00000001,004085E0,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402229
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: CreateInstance
                                                                      • String ID:
                                                                      • API String ID: 542301482-0
                                                                      • Opcode ID: f0c7f0c58da5b2556a219b4126ec8a5e6c03aa9de5f34d462473648d541e39b0
                                                                      • Instruction ID: 5977cb51530078b600b156af0050786de557c4b464dd586e6a5beaa7a0440451
                                                                      • Opcode Fuzzy Hash: f0c7f0c58da5b2556a219b4126ec8a5e6c03aa9de5f34d462473648d541e39b0
                                                                      • Instruction Fuzzy Hash: A7411571A00208EFCF40DFE4C989E9D7BB5BF49348B20456AF905EB2D1DB799981CB94
                                                                      APIs
                                                                      • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291A
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: FileFindFirst
                                                                      • String ID:
                                                                      • API String ID: 1974802433-0
                                                                      • Opcode ID: 23bc45f7dafbc09bf3d58dfb9668e04a20f74da7ffae18e0ad0b6f577034eb1d
                                                                      • Instruction ID: 3f6fbcf0fd4d311cdd608d5f72697756ed96b8559223cd5d9f1c4d92bc61f1b3
                                                                      • Opcode Fuzzy Hash: 23bc45f7dafbc09bf3d58dfb9668e04a20f74da7ffae18e0ad0b6f577034eb1d
                                                                      • Instruction Fuzzy Hash: 3CF08271A04105EFD701DBA4ED49AAEB378FF14314F60417BE116F21D0E7B88E159B29
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: fbe53aaae7eeab696340878b5eee03eb0fd33fb80e94407ce6853ed186f7d00c
                                                                      • Instruction ID: 3db1d01f4341fbbb805040525b4c18df43ce82c239752998d09602440244d977
                                                                      • Opcode Fuzzy Hash: fbe53aaae7eeab696340878b5eee03eb0fd33fb80e94407ce6853ed186f7d00c
                                                                      • Instruction Fuzzy Hash: FEE18A71A0070ADFCB24CF59D880BAABBF5FB44305F15852EE496A72D1D338AA91CF45
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ad3a06017d63110f505e6ee1591874ec5e375aadb040ddd80f083a0c788ff2d1
                                                                      • Instruction ID: 4d3fc1c80ea15bf86cc2801d6424e98614acddb7a54358772128df9d71e60e61
                                                                      • Opcode Fuzzy Hash: ad3a06017d63110f505e6ee1591874ec5e375aadb040ddd80f083a0c788ff2d1
                                                                      • Instruction Fuzzy Hash: C6C14871E042599BCF18CF68C8905EEBBB2BF88314F25866AD85677380D7347941CF95
                                                                      APIs
                                                                      • GlobalAlloc.KERNEL32(00000040,?,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 6D252ECB
                                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000,?,?,00000000), ref: 6D252EFE
                                                                      • SetHandleInformation.KERNEL32(?,00000001,00000000,?,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 6D252F15
                                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000,?,?,00000000), ref: 6D252F2D
                                                                      • SetHandleInformation.KERNEL32(?,00000001,00000000,?,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 6D252F3E
                                                                      • GlobalAlloc.KERNEL32(00000040,00000010,?,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 6D252F4C
                                                                      • GlobalAlloc.KERNEL32(00000040,00000044,?,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 6D252F5F
                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,00000000), ref: 6D252FC8
                                                                      • GlobalAlloc.KERNEL32(00000040,00000000,?,?,?,?,?,00000000), ref: 6D252FE2
                                                                      • lstrcpyW.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 6D25300F
                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,00000000), ref: 6D253014
                                                                      • lstrcpyW.KERNEL32(00000000,6D2550EC,?,?,?,?,?,00000000), ref: 6D253028
                                                                      • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000001,08000000,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 6D253095
                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6D2530C4
                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6D253132
                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6D253140
                                                                      • ReadFile.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6D253160
                                                                      • GlobalReAlloc.KERNEL32(00000000,00000002,00000042), ref: 6D25317E
                                                                      • GlobalAlloc.KERNEL32(00000040,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6D25318C
                                                                      • ReadFile.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6D2531CD
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6D2531D5
                                                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 6D253246
                                                                      • GlobalAlloc.KERNEL32(00000040,00000016,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6D253254
                                                                      • wsprintfW.USER32 ref: 6D253269
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D253285
                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6D25328D
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D2532A7
                                                                      • GlobalFree.KERNEL32(?), ref: 6D2532B1
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D2532B8
                                                                      • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 6D2532CA
                                                                      • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 6D2532D9
                                                                      • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 6D2532E8
                                                                      • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 6D2532F7
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D2532FE
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Global$Handle$Close$Alloc$Free$Create$FileInformationPipeProcessReadlstrcpylstrlen$CodeErrorExitLastwsprintf
                                                                      • String ID: %lu$Arguments$DoCreateProcess$ExitCode$Input$Output$Path$RawOutput$UnicodeInput$UnicodeOutput$WorkingDir
                                                                      • API String ID: 2805452489-696223222
                                                                      • Opcode ID: 5f199193345e86ecc194f726d3ba207562e35e3cdede0f9cfc0a06922730bf80
                                                                      • Instruction ID: 3b0f84a9ccbb30aa98a236f0e19007d194bc548048c1fee0a7b34a8364b78471
                                                                      • Opcode Fuzzy Hash: 5f199193345e86ecc194f726d3ba207562e35e3cdede0f9cfc0a06922730bf80
                                                                      • Instruction Fuzzy Hash: DBE19B7198420EEBDF118FA0CC49FBFBBB8FF4A715F114129EA14A6150D7319961CBA0
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,000003F9), ref: 00404F1E
                                                                      • GetDlgItem.USER32(?,00000408), ref: 00404F29
                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 00404F73
                                                                      • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404F8A
                                                                      • SetWindowLongW.USER32(?,000000FC,00405513), ref: 00404FA3
                                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404FB7
                                                                      • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404FC9
                                                                      • SendMessageW.USER32(?,00001109,00000002), ref: 00404FDF
                                                                      • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404FEB
                                                                      • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404FFD
                                                                      • DeleteObject.GDI32(00000000), ref: 00405000
                                                                      • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 0040502B
                                                                      • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405037
                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 004050D2
                                                                      • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00405102
                                                                        • Part of subcall function 004044CE: SendMessageW.USER32(00000028,?,00000001,004042F9), ref: 004044DC
                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405116
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00405144
                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00405152
                                                                      • ShowWindow.USER32(?,00000005), ref: 00405162
                                                                      • SendMessageW.USER32(?,00000419,00000000,?), ref: 0040525D
                                                                      • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004052C2
                                                                      • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 004052D7
                                                                      • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 004052FB
                                                                      • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 0040531B
                                                                      • ImageList_Destroy.COMCTL32(?), ref: 00405330
                                                                      • GlobalFree.KERNEL32(?), ref: 00405340
                                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004053B9
                                                                      • SendMessageW.USER32(?,00001102,?,?), ref: 00405462
                                                                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405471
                                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 0040549C
                                                                      • ShowWindow.USER32(?,00000000), ref: 004054EA
                                                                      • GetDlgItem.USER32(?,000003FE), ref: 004054F5
                                                                      • ShowWindow.USER32(00000000), ref: 004054FC
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                      • String ID: $M$N
                                                                      • API String ID: 2564846305-813528018
                                                                      • Opcode ID: dd942b7cbeaa18c8cf4828e28d43e61687b6a80dcb186ef465745c56d9013c5d
                                                                      • Instruction ID: 669472b6e39b4296dbb294a81ed98d86f32f22d8abeb4cff7518c6a892085abf
                                                                      • Opcode Fuzzy Hash: dd942b7cbeaa18c8cf4828e28d43e61687b6a80dcb186ef465745c56d9013c5d
                                                                      • Instruction Fuzzy Hash: EF028A70900608EFDB20DFA9DD45AAF7BB5FB84314F10817AE610BA2E0D7799942DF58
                                                                      APIs
                                                                      • GlobalAlloc.KERNEL32(00000040,00000000), ref: 6D253CC1
                                                                        • Part of subcall function 6D25414A: lstrcmpiW.KERNEL32(?,/tree,?,00000000,00000000,00000000,?,6D252D8C,00000000,00000000,00000000), ref: 6D254182
                                                                        • Part of subcall function 6D254B73: lstrcpyW.KERNEL32(00000000,00000004,00000000,?,6D254178,?,00000000,00000000,00000000,?,6D252D8C,00000000,00000000,00000000), ref: 6D254B94
                                                                        • Part of subcall function 6D254B73: GlobalFree.KERNEL32(00000000), ref: 6D254BA5
                                                                      • lstrcmpiW.KERNEL32(00000000,/noexpand,00000000), ref: 6D253CF0
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D253F55
                                                                        • Part of subcall function 6D254C09: GlobalAlloc.KERNEL32(00000040,?,00000000,?,6D2541B1,?,?,6D252D8C,00000000,00000000,00000000), ref: 6D254C25
                                                                        • Part of subcall function 6D254C09: lstrcpynW.KERNEL32(00000004,?,?,6D2541B1,?,?,6D252D8C,00000000,00000000,00000000), ref: 6D254C3A
                                                                      • wsprintfW.USER32 ref: 6D253E18
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Global$AllocFreelstrcmpi$lstrcpylstrcpynwsprintf
                                                                      • String ID: /count$/end$/exists$/index$/isempty$/key$/keys$/noexpand$/type$JSON_Serialize$array$node$string$value$yes
                                                                      • API String ID: 760165124-199274824
                                                                      • Opcode ID: d4dbc1a2d7a0f96013a08f07826ebe0b7012c145e6fd271185bb5a5fa94476c6
                                                                      • Instruction ID: a4cac888e5f1f2ec1374036c3bc9adbca488342e0698ef6ffeba4ee2352a5858
                                                                      • Opcode Fuzzy Hash: d4dbc1a2d7a0f96013a08f07826ebe0b7012c145e6fd271185bb5a5fa94476c6
                                                                      • Instruction Fuzzy Hash: BA71A0345E960FEADB025F288C88F7B77B8FF0775AB106125F915E2100E722D971D6A2
                                                                      APIs
                                                                      • GetTickCount.KERNEL32 ref: 6FD727D3
                                                                      • GetTickCount.KERNEL32 ref: 6FD727E7
                                                                      • wsprintfW.USER32 ref: 6FD7282E
                                                                      • MulDiv.KERNEL32(00000064,?), ref: 6FD72853
                                                                      • lstrlenW.KERNEL32(?, %d%%,00000000), ref: 6FD72866
                                                                      • wsprintfW.USER32 ref: 6FD72876
                                                                      • SetWindowTextW.USER32(?,?), ref: 6FD7288F
                                                                      • SetDlgItemTextW.USER32(?,000003E9,?), ref: 6FD728B7
                                                                      • SetDlgItemTextW.USER32(?,000003EA,6FD79140), ref: 6FD728C4
                                                                      • lstrcatW.KERNEL32(?, ( ), ref: 6FD72901
                                                                      • lstrlenW.KERNEL32(?), ref: 6FD7290A
                                                                      • lstrcatW.KERNEL32(?,/sec ),00000000), ref: 6FD72938
                                                                      • SetDlgItemTextW.USER32(?,000003EB,?), ref: 6FD72955
                                                                      • wsprintfW.USER32 ref: 6FD72986
                                                                      • SetDlgItemTextW.USER32(?,000003EF,?), ref: 6FD7299C
                                                                      • SetDlgItemTextW.USER32(?,000003EE,?), ref: 6FD729D0
                                                                      • MulDiv.KERNEL32(00000190,00000000), ref: 6FD729E5
                                                                      • SendDlgItemMessageW.USER32(?,000003ED,00000402,00000000), ref: 6FD729F7
                                                                      • MulDiv.KERNEL32(?,?,?), ref: 6FD72A15
                                                                      • wsprintfW.USER32 ref: 6FD72A41
                                                                      • GetDlgItem.USER32(?,000003EC), ref: 6FD72A62
                                                                      • SetWindowTextW.USER32(00000000), ref: 6FD72A69
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706805863.000000006FD71000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD70000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706784915.000000006FD70000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706824623.000000006FD77000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706839008.000000006FD78000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706980410.000000006FD7F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fd70000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: ItemText$wsprintf$CountTickWindowlstrcatlstrlen$MessageSend
                                                                      • String ID: ( $ %d%%$%d:%02d:%02d$%s - %s$/sec )$<$Inetc plug-in
                                                                      • API String ID: 2899058848-745815842
                                                                      • Opcode ID: 1d69481b1af72191b3dd52262bacb87b2333cbf3742460b8ae0150cbecf471a7
                                                                      • Instruction ID: 620c106b111c20460bf7d21f4bea437658e079c07769b0ab5c4898dfbfa88702
                                                                      • Opcode Fuzzy Hash: 1d69481b1af72191b3dd52262bacb87b2333cbf3742460b8ae0150cbecf471a7
                                                                      • Instruction Fuzzy Hash: 3971D172900624EBEF64DB64CC88EEA73FDEB49325F044155F544EE284DF70BA918BA1
                                                                      APIs
                                                                      • InternetGetLastResponseInfoW.WININET(?,?,?), ref: 6FD72B5C
                                                                      • wsprintfW.USER32 ref: 6FD72BAC
                                                                      • InternetGetLastResponseInfoW.WININET(?,?,?), ref: 6FD72C0A
                                                                      • wsprintfW.USER32 ref: 6FD72C6D
                                                                      • InternetGetLastResponseInfoW.WININET(?,?,?), ref: 6FD72CD0
                                                                      • FtpOpenFileW.WININET(?,?,80000000,80000002,00000000), ref: 6FD72D2F
                                                                      • GetLastError.KERNEL32 ref: 6FD72D40
                                                                      • InternetGetLastResponseInfoW.WININET(?,?,00000200), ref: 6FD72D67
                                                                      • FtpCreateDirectoryW.WININET(?,?), ref: 6FD72DD5
                                                                      • InternetGetLastResponseInfoW.WININET(?,?,00000200), ref: 6FD72DF1
                                                                      • lstrlenW.KERNEL32(?), ref: 6FD72DF4
                                                                      • FtpOpenFileW.WININET(?,?,40000000,80000002,00000000), ref: 6FD72E37
                                                                      • InternetGetLastResponseInfoW.WININET(?,?,00000200), ref: 6FD72E68
                                                                      • lstrcpynW.KERNEL32(?,?,00000020), ref: 6FD72EC7
                                                                      • InternetGetLastResponseInfoW.WININET(?,?,00000200), ref: 6FD72F12
                                                                      • LoadLibraryA.KERNEL32(WININET,FtpGetFileSize), ref: 6FD72F2E
                                                                      • GetProcAddress.KERNEL32(00000000), ref: 6FD72F35
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706805863.000000006FD71000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD70000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706784915.000000006FD70000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706824623.000000006FD77000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706839008.000000006FD78000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706980410.000000006FD7F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fd70000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Last$InfoInternetResponse$FileOpenwsprintf$AddressCreateDirectoryErrorLibraryLoadProclstrcpynlstrlen
                                                                      • String ID: 110$213 $350$550$553$FtpGetFileSize$REST %d$SIZE %s$TYPE I$WININET
                                                                      • API String ID: 1477666268-197188557
                                                                      • Opcode ID: ba694bba1a96454c4a5df9839bb3539c80ddf1489d356e43bcfcb98c26282c19
                                                                      • Instruction ID: 3e7a5a1eb5ce2e89fef62f77ab96834ed8223cb0433790fc2d49d9ecbd59f6e4
                                                                      • Opcode Fuzzy Hash: ba694bba1a96454c4a5df9839bb3539c80ddf1489d356e43bcfcb98c26282c19
                                                                      • Instruction Fuzzy Hash: D9C15B72904359EAEB74CB64CC89FDB77BCEB45325F14056AE414EA180EF70BA488A60
                                                                      APIs
                                                                      • GetTickCount.KERNEL32 ref: 6FD736D3
                                                                      • GetTickCount.KERNEL32 ref: 6FD736EE
                                                                      • MulDiv.KERNEL32(-6FD7980C,?,?), ref: 6FD7371D
                                                                      • MulDiv.KERNEL32(00000064,?,?), ref: 6FD73783
                                                                      • wsprintfW.USER32 ref: 6FD737D8
                                                                      • lstrlenW.KERNEL32(6FD7D630, (%d %s%s remaining),00000000,?,6FD7700C), ref: 6FD737FC
                                                                      • wsprintfW.USER32 ref: 6FD7380A
                                                                      • SetDlgItemTextW.USER32(000003E9,Connecting ...), ref: 6FD73834
                                                                      • MulDiv.KERNEL32(00000190,?,00000000), ref: 6FD7385C
                                                                      • GetDlgItem.USER32(000003ED,00000402), ref: 6FD73873
                                                                      • SendMessageW.USER32(00000000), ref: 6FD73876
                                                                      • wsprintfW.USER32 ref: 6FD738BD
                                                                      • GetDlgItem.USER32(000003EE), ref: 6FD738CD
                                                                      • IsWindow.USER32(00000000), ref: 6FD738DF
                                                                      • GetWindowTextW.USER32(00000000,6FD7DFD0,00000800), ref: 6FD738F5
                                                                      • lstrcmpW.KERNEL32(6FD7DFD0,6FD7D630), ref: 6FD73902
                                                                      • SetWindowTextW.USER32(00000000,6FD7D630), ref: 6FD7390E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706805863.000000006FD71000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD70000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706784915.000000006FD70000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706824623.000000006FD77000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706839008.000000006FD78000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706980410.000000006FD7F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fd70000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: ItemTextWindowwsprintf$CountTick$MessageSendlstrcmplstrlen
                                                                      • String ID: (%d %s%s remaining)$%dkB (%d%%) of %dkB @ %d.%01dkB/s$Connecting ...$Downloading %s$hour$minute$second
                                                                      • API String ID: 3991246718-1428494263
                                                                      • Opcode ID: 60bf5391517f5656e198c050b9a2f74b23bc9506b0624ae3edeb02e2903830c2
                                                                      • Instruction ID: 72eda2a840dd05beee8e84c658290899f9d430259aa70fd1f0f7bdfd03f80f0e
                                                                      • Opcode Fuzzy Hash: 60bf5391517f5656e198c050b9a2f74b23bc9506b0624ae3edeb02e2903830c2
                                                                      • Instruction Fuzzy Hash: 9651D572A00621EBFB745B24CC86B5A77E9EB4A370F184225F911EF2C4DB71B91186E1
                                                                      APIs
                                                                      • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004046F6
                                                                      • GetDlgItem.USER32(?,000003E8), ref: 0040470A
                                                                      • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404727
                                                                      • GetSysColor.USER32(?), ref: 00404738
                                                                      • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404746
                                                                      • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404754
                                                                      • lstrlenW.KERNEL32(?), ref: 00404759
                                                                      • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404766
                                                                      • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040477B
                                                                      • GetDlgItem.USER32(?,0000040A), ref: 004047D4
                                                                      • SendMessageW.USER32(00000000), ref: 004047DB
                                                                      • GetDlgItem.USER32(?,000003E8), ref: 00404806
                                                                      • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404849
                                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 00404857
                                                                      • SetCursor.USER32(00000000), ref: 0040485A
                                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00404873
                                                                      • SetCursor.USER32(00000000), ref: 00404876
                                                                      • SendMessageW.USER32(00000111,00000001,00000000), ref: 004048A5
                                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 004048B7
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                      • String ID: N$get
                                                                      • API String ID: 3103080414-214687294
                                                                      • Opcode ID: ce357ac6e0fd4f2b4f67e04795876aef6a46bd5fea1783cb4cf669a44dc9f0f8
                                                                      • Instruction ID: e0aa441e67ff77812dea5cfa76c138b5706349c0d06c8e95e02877fce1cb63d1
                                                                      • Opcode Fuzzy Hash: ce357ac6e0fd4f2b4f67e04795876aef6a46bd5fea1783cb4cf669a44dc9f0f8
                                                                      • Instruction Fuzzy Hash: 1A61A3B5900209BFDB10AF60DD85E6A7BA9FB44314F00843AFB05B62D0D778A951DF98
                                                                      APIs
                                                                      • HttpQueryInfoW.WININET(?,00000013,?,?,00000000), ref: 6FD739E4
                                                                      • lstrcmpW.KERNEL32(?,6FD77010), ref: 6FD73A0D
                                                                      • lstrcmpW.KERNEL32(00000000,401), ref: 6FD73A31
                                                                      • lstrcmpW.KERNEL32(00000000,403), ref: 6FD73A52
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706805863.000000006FD71000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD70000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706784915.000000006FD70000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706824623.000000006FD77000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706839008.000000006FD78000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706980410.000000006FD7F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fd70000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: lstrcmp$HttpInfoQuery
                                                                      • String ID: (%s)$304$401$403$404$405$407$5$Redirection$Request Error$Server Error
                                                                      • API String ID: 386791786-3813172215
                                                                      • Opcode ID: a918a7ca783bf4e65ae6541139135870df3bd22625785c1856a87d5b50f0cfd1
                                                                      • Instruction ID: d284696b8009a66c1d8aab73614025be050d1f216ff37f5e832bd9efa28dce01
                                                                      • Opcode Fuzzy Hash: a918a7ca783bf4e65ae6541139135870df3bd22625785c1856a87d5b50f0cfd1
                                                                      • Instruction Fuzzy Hash: 9741E1B580432AE6EBB09F60CD4AF8977F8EB01385F004196D614EF144EB70B659DBA2
                                                                      APIs
                                                                      • GlobalAlloc.KERNEL32(00000040,00000008,00000000,00000000,7556F360,?,?,?,6D2545D3,6D253C68,?,00000000,00000000), ref: 6D252BD8
                                                                        • Part of subcall function 6D2519D2: lstrcmpW.KERNEL32(00000000,6D2550D0,00000000,h<%m,6D252C02,00000000,00000000,Async,00000000,?,?,?,6D2545D3,6D253C68,?,00000000), ref: 6D2519EB
                                                                        • Part of subcall function 6D2519D2: lstrcmpiW.KERNEL32(00000000,false,?,?,?,6D2545D3,6D253C68,?,00000000,00000000), ref: 6D2519FD
                                                                      • CreateThread.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 6D252C11
                                                                      • GlobalAlloc.KERNEL32(00000040,?,?,?,?,?,?,?,?,6D2545D3,6D253C68,?,00000000,00000000), ref: 6D252C29
                                                                      • wsprintfW.USER32 ref: 6D252C42
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D252C5B
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D252C67
                                                                      • CreateThread.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 6D252C96
                                                                      • MsgWaitForMultipleObjectsEx.USER32(00000001,?,000000FF,00001DFF,00000000), ref: 6D252CB5
                                                                      • PeekMessageW.USER32(00000000,00000000,00000000,00000000,00000001), ref: 6D252CCB
                                                                      • TranslateMessage.USER32(00000000), ref: 6D252CDF
                                                                      • DispatchMessageW.USER32(00000000), ref: 6D252CE9
                                                                      • PostMessageW.USER32(00000000,00000012,?,?), ref: 6D252CFC
                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,6D2545D3,6D253C68,?,00000000), ref: 6D252D0B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: GlobalMessage$AllocCreateFreeThread$CloseDispatchHandleMultipleObjectsPeekPostTranslateWaitlstrcmplstrcmpiwsprintf
                                                                      • String ID: Async$Handle$UIAsync$h<%m
                                                                      • API String ID: 783503903-3558367965
                                                                      • Opcode ID: bfd3bb212ddea4833fc1e98c29d4cdef9782293ac6d0cd41da002f7816c855ad
                                                                      • Instruction ID: 1e90168fbc0a8a87a5801f1f1ea0e8ead98c1f86b85c9e4b6138bfd12611d0ec
                                                                      • Opcode Fuzzy Hash: bfd3bb212ddea4833fc1e98c29d4cdef9782293ac6d0cd41da002f7816c855ad
                                                                      • Instruction Fuzzy Hash: 274192B158221EFBDB215FA58C4CEBF7E7CEF4A266B100118FA15A2185DB35D920D7B0
                                                                      APIs
                                                                      • GlobalAlloc.KERNEL32(00000040,00000020,00000000,755734C0,00000000,?,?,6D2531E9,?,DoCreateProcess,00000000), ref: 6D254670
                                                                      • wsprintfW.USER32 ref: 6D254685
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D2546A3
                                                                      • GetModuleHandleA.KERNEL32(wininet.dll,1%m,00000400,00000000,00000000,00000000,?,?,6D2531E9,?,DoCreateProcess,00000000), ref: 6D2546C7
                                                                      • FormatMessageW.KERNEL32(00001300,00000000,1%m,00000400,00000000,00000000,00000000,?,?,6D2531E9,?,DoCreateProcess,00000000), ref: 6D2546DB
                                                                      • lstrlenW.KERNEL32(?,?,?,6D2531E9,?,DoCreateProcess,00000000), ref: 6D2546EE
                                                                      • GlobalAlloc.KERNEL32(00000040,?,?,?,6D2531E9,?,DoCreateProcess,00000000), ref: 6D254704
                                                                      • lstrcpyW.KERNEL32(00000000,?,?,?,?,6D2531E9,?,DoCreateProcess,00000000), ref: 6D25471A
                                                                      • lstrcpyW.KERNEL32(1%m,6D2551A0,?,?,?,6D2531E9,?,DoCreateProcess,00000000), ref: 6D254728
                                                                      • lstrcpyW.KERNEL32(1%m,00000000,?,?,?,6D2531E9,?,DoCreateProcess,00000000), ref: 6D254775
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D25478D
                                                                      • LocalFree.KERNEL32(00000000,?,DoCreateProcess), ref: 6D25479F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Global$Freelstrcpy$Alloc$FormatHandleLocalMessageModulelstrlenwsprintf
                                                                      • String ID: %lu$ErrorCode$ErrorMessage$wininet.dll$1%m
                                                                      • API String ID: 3175574836-342626864
                                                                      • Opcode ID: 448b85f12d4e4cb8bc5400f9487ba37144c6241b0ce66344fc7a7ba23d96654e
                                                                      • Instruction ID: 96eef46f3aa91f279ddd4d392c8fea082b05a4477d994e6cbcbf94d4028f17a7
                                                                      • Opcode Fuzzy Hash: 448b85f12d4e4cb8bc5400f9487ba37144c6241b0ce66344fc7a7ba23d96654e
                                                                      • Instruction Fuzzy Hash: 8531897548020EBBDF118FA4CC88FBFBB78EB4A759F500515FA14AA150D7719D31DAA0
                                                                      APIs
                                                                      • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                      • BeginPaint.USER32(?,?), ref: 00401047
                                                                      • GetClientRect.USER32(?,?), ref: 0040105B
                                                                      • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                      • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                      • DeleteObject.GDI32(?), ref: 004010ED
                                                                      • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                      • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                      • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                      • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                      • DrawTextW.USER32(00000000,00433F00,000000FF,00000010,00000820), ref: 00401156
                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                      • DeleteObject.GDI32(?), ref: 00401165
                                                                      • EndPaint.USER32(?,?), ref: 0040116E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                      • String ID: F
                                                                      • API String ID: 941294808-1304234792
                                                                      • Opcode ID: 15a6b7738402934ac822911e252168026e8f0364f08849f6e110b85e8bc9718e
                                                                      • Instruction ID: e457e53e67a16f607b198c8be77aa7e47a8fd9e6aa67a1a07366d16d1d2d9a76
                                                                      • Opcode Fuzzy Hash: 15a6b7738402934ac822911e252168026e8f0364f08849f6e110b85e8bc9718e
                                                                      • Instruction Fuzzy Hash: 0E418B71800209AFCF058FA5DE459AF7FB9FF44315F04802AF991AA1A0C738AA55DFA4
                                                                      APIs
                                                                        • Part of subcall function 6FD91E4E: lstrcpynW.KERNEL32(6FD91054,?,?,?,6FD91054,?), ref: 6FD91E7B
                                                                        • Part of subcall function 6FD91E4E: GlobalFree.KERNEL32 ref: 6FD91E8B
                                                                      • lstrcmpiW.KERNEL32(?,save,6FD94920,00000400,6FD95128,00000400,?,00000005), ref: 6FD91168
                                                                      • GetFileAttributesW.KERNEL32(6FD95128), ref: 6FD9117A
                                                                      • lstrcpyW.KERNEL32(6FD95928,6FD95128), ref: 6FD91193
                                                                      • lstrcpyW.KERNEL32(6FD94920,All Files|*.*), ref: 6FD911B8
                                                                      • CharNextW.USER32(6FD94920), ref: 6FD911D9
                                                                      • GetCurrentDirectoryW.KERNEL32(00000400,6FD94120), ref: 6FD911F1
                                                                      • GetSaveFileNameW.COMDLG32(0000004C), ref: 6FD91205
                                                                      • GetOpenFileNameW.COMDLG32(0000004C), ref: 6FD9120D
                                                                      • CommDlgExtendedError.COMDLG32 ref: 6FD91213
                                                                      • GetSaveFileNameW.COMDLG32(0000004C), ref: 6FD91230
                                                                      • GetOpenFileNameW.COMDLG32(0000004C), ref: 6FD91238
                                                                      • SetCurrentDirectoryW.KERNEL32(6FD94120,6FD95128), ref: 6FD91250
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2707158755.000000006FD91000.00000020.00000001.01000000.0000000B.sdmp, Offset: 6FD90000, based on PE: true
                                                                      • Associated: 00000000.00000002.2707011598.000000006FD90000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2707198671.000000006FD93000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2707227440.000000006FD94000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2707243260.000000006FD98000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fd90000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: File$Name$CurrentDirectoryOpenSavelstrcpy$AttributesCharCommErrorExtendedFreeGlobalNextlstrcmpilstrcpyn
                                                                      • String ID: All Files|*.*$L$save
                                                                      • API String ID: 3853173656-601108453
                                                                      • Opcode ID: f76553c8daee65b78a483c6fed2c80b328858d9795c57bf39169034328a9fe93
                                                                      • Instruction ID: ba2c62cc1f267c4ee715b122ba40cc1fa7d6036398f4c7a72c8ef7dbb1c0ad90
                                                                      • Opcode Fuzzy Hash: f76553c8daee65b78a483c6fed2c80b328858d9795c57bf39169034328a9fe93
                                                                      • Instruction Fuzzy Hash: C8414676900704FBEB809FE8C949A8A7BFCFB46366F044126F819E6281D775B855CB60
                                                                      APIs
                                                                      • GlobalAlloc.KERNEL32(00000040), ref: 6D254481
                                                                      • GlobalAlloc.KERNEL32(00000040), ref: 6D254494
                                                                      • lstrcmpiW.KERNEL32(00000000,/index,00000000), ref: 6D2544DC
                                                                      • lstrcmpiW.KERNEL32(00000000,/value), ref: 6D2544F1
                                                                      • lstrcmpiW.KERNEL32(00000000,/file), ref: 6D254501
                                                                      • lstrcmpiW.KERNEL32(00000000,/http), ref: 6D254511
                                                                      • lstrcmpiW.KERNEL32(00000000,/exec), ref: 6D254521
                                                                      • GlobalFree.KERNEL32(?), ref: 6D254592
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D254599
                                                                      • lstrcmpiW.KERNEL32(00000000,/unicode,00000000), ref: 6D254611
                                                                        • Part of subcall function 6D25414A: lstrcmpiW.KERNEL32(?,/tree,?,00000000,00000000,00000000,?,6D252D8C,00000000,00000000,00000000), ref: 6D254182
                                                                        • Part of subcall function 6D254B73: lstrcpyW.KERNEL32(00000000,00000004,00000000,?,6D254178,?,00000000,00000000,00000000,?,6D252D8C,00000000,00000000,00000000), ref: 6D254B94
                                                                        • Part of subcall function 6D254B73: GlobalFree.KERNEL32(00000000), ref: 6D254BA5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: lstrcmpi$Global$Free$Alloc$lstrcpy
                                                                      • String ID: /exec$/file$/http$/index$/unicode$/value
                                                                      • API String ID: 2337425550-1467310578
                                                                      • Opcode ID: c90027977daf69336b615e6ef57964f4756135853af16136686da30b7ed6bdfd
                                                                      • Instruction ID: 43891c0f79718d1ec72f35967d50a2a4c0055ee76c809ed5e36cdeb091ec6913
                                                                      • Opcode Fuzzy Hash: c90027977daf69336b615e6ef57964f4756135853af16136686da30b7ed6bdfd
                                                                      • Instruction Fuzzy Hash: C4519F719C460FABDF018F698C44EBFB7A8AF1D356F108121F91596105EB30CA72CB95
                                                                      APIs
                                                                      • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,0040631E,?,?), ref: 004061BE
                                                                      • GetShortPathNameW.KERNEL32(?,00430908,00000400), ref: 004061C7
                                                                        • Part of subcall function 00405F92: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FA2
                                                                        • Part of subcall function 00405F92: lstrlenA.KERNEL32(00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FD4
                                                                      • GetShortPathNameW.KERNEL32(?,00431108,00000400), ref: 004061E4
                                                                      • wsprintfA.USER32 ref: 00406202
                                                                      • GetFileSize.KERNEL32(00000000,00000000,00431108,C0000000,00000004,00431108,?,?,?,?,?), ref: 0040623D
                                                                      • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 0040624C
                                                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406284
                                                                      • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,00430508,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062DA
                                                                      • GlobalFree.KERNEL32(00000000), ref: 004062EB
                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004062F2
                                                                        • Part of subcall function 0040602D: GetFileAttributesW.KERNEL32(00000003,004030BD,C:\Users\user\Desktop\Setup.exe,80000000,00000003,?,?,?,?,?,0040387D,?), ref: 00406031
                                                                        • Part of subcall function 0040602D: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,0040387D,?), ref: 00406053
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                      • String ID: %ls=%ls$[Rename]
                                                                      • API String ID: 2171350718-461813615
                                                                      • Opcode ID: 6dbc896bee28fc2cd17c6beb7c7e3b01e9a95bb407788db3ff507c40593cf796
                                                                      • Instruction ID: 71978d88b6039f89b25a0dfa2ffa892efa56fbf884cfe692307f7793e751c739
                                                                      • Opcode Fuzzy Hash: 6dbc896bee28fc2cd17c6beb7c7e3b01e9a95bb407788db3ff507c40593cf796
                                                                      • Instruction Fuzzy Hash: 6A314670200716BBD2207B659D48F6B3A6CEF45754F15017EFA42F62C2EA3CA821867D
                                                                      APIs
                                                                      • lstrcmpW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,6D252DE0,00000000), ref: 6D251AB1
                                                                      • lstrcmpW.KERNEL32(?,00000000,00000000,00000000,00000000,?,?,6D252DE0), ref: 6D251AFA
                                                                      • GlobalAlloc.KERNEL32(00000040,00000010,?,?,6D252DE0), ref: 6D251B26
                                                                      • GlobalAlloc.KERNEL32(00000040,00000010,?,?,6D252DE0), ref: 6D251B4B
                                                                      • lstrlenW.KERNEL32(00000000,?,?,6D252DE0), ref: 6D251B63
                                                                      • GlobalAlloc.KERNEL32(00000040,00000000,?,?,6D252DE0), ref: 6D251B73
                                                                      • lstrcpyW.KERNEL32(?,00000000,?,?,6D252DE0), ref: 6D251B8D
                                                                      • lstrlenW.KERNEL32(00000000,?,?,6D252DE0), ref: 6D251BC3
                                                                      • GlobalAlloc.KERNEL32(00000040,00000000,?,?,6D252DE0), ref: 6D251BD3
                                                                      • lstrcpyW.KERNEL32(00000000,00000000,?,?,6D252DE0), ref: 6D251BE2
                                                                      • GlobalAlloc.KERNEL32(00000040,00000002,?,?,6D252DE0), ref: 6D251BEE
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D251C09
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Global$Alloc$lstrcmplstrcpylstrlen$Free
                                                                      • String ID: -%m
                                                                      • API String ID: 2483198964-3225033159
                                                                      • Opcode ID: d031cffcc6f890e9a1e9a9851d139b13c883ac19746dba3699c13ef1570c4150
                                                                      • Instruction ID: 21cac5e0df566f948abb65649e648cde6551d9e7a7eaa3e7b6a309674b973a2f
                                                                      • Opcode Fuzzy Hash: d031cffcc6f890e9a1e9a9851d139b13c883ac19746dba3699c13ef1570c4150
                                                                      • Instruction Fuzzy Hash: 13711470A8061BDFDF228F18C444F3A7BB4AF4A756F018569E85A9B250E731D8E0CB91
                                                                      APIs
                                                                      • SendMessageW.USER32(?,?,?), ref: 6FD91531
                                                                      • GetDlgItem.USER32(?,?), ref: 6FD91544
                                                                      • SetWindowLongW.USER32(?,00000000,00000000), ref: 6FD91659
                                                                      • GetWindowTextW.USER32(?,00000000,00000400), ref: 6FD916B0
                                                                      • DrawTextW.USER32(?,00000000,000000FF,?,00000414), ref: 6FD916D1
                                                                      • GetWindowLongW.USER32(?,000000EB), ref: 6FD9171C
                                                                      • SetTextColor.GDI32(?,00000000), ref: 6FD9172F
                                                                      • DrawTextW.USER32(?,00000000,000000FF,00000000,?), ref: 6FD91749
                                                                      • DrawFocusRect.USER32(?,00000010), ref: 6FD9176A
                                                                      • RemovePropW.USER32(00000000,NSIS: nsControl pointer property), ref: 6FD9178E
                                                                      Strings
                                                                      • NSIS: nsControl pointer property, xrefs: 6FD91786
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2707158755.000000006FD91000.00000020.00000001.01000000.0000000B.sdmp, Offset: 6FD90000, based on PE: true
                                                                      • Associated: 00000000.00000002.2707011598.000000006FD90000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2707198671.000000006FD93000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2707227440.000000006FD94000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2707243260.000000006FD98000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fd90000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Text$DrawWindow$Long$ColorFocusItemMessagePropRectRemoveSend
                                                                      • String ID: NSIS: nsControl pointer property
                                                                      • API String ID: 2008169532-1714965683
                                                                      • Opcode ID: 45a0b9c77551be7c6b1b417d91b736dc8a5bbf31300b49117031b89600e748ba
                                                                      • Instruction ID: 7d590a9f92b32df644533a74d91b4ab1fa28c3b935618602ce02fba0e08c1032
                                                                      • Opcode Fuzzy Hash: 45a0b9c77551be7c6b1b417d91b736dc8a5bbf31300b49117031b89600e748ba
                                                                      • Instruction Fuzzy Hash: F081AB71900206DBEF919FE4CC80BAA7BBDFF05310F058566E8559B1A6C772F895CBA0
                                                                      APIs
                                                                      • GetModuleHandleA.KERNEL32(wininet.dll,"?%m,00000400,"?%m,00000000,00000000,00000000,00000000,?,?,?,6D253F22,00000000,JSON_Serialize,00000000), ref: 6D253FED
                                                                      • FormatMessageW.KERNEL32(00001300,00000000,"?%m,00000400,"?%m,00000000,00000000,00000000,00000000,?,?,?,6D253F22,00000000,JSON_Serialize,00000000), ref: 6D25400F
                                                                      • lstrlenW.KERNEL32(00000000,00000000,?,?,?,6D253F22,00000000,JSON_Serialize,00000000), ref: 6D254023
                                                                      • lstrcpyW.KERNEL32(?,00000000,?,?,?,6D253F22,00000000,JSON_Serialize,00000000), ref: 6D254033
                                                                      • lstrcpyW.KERNEL32(00000000,6D2551A0,?,?,?,6D253F22,00000000,JSON_Serialize,00000000), ref: 6D254048
                                                                      • lstrcpyW.KERNEL32(?,"?%m,?,?,?,6D253F22,00000000,JSON_Serialize,00000000), ref: 6D25408D
                                                                      • wsprintfW.USER32 ref: 6D2540A5
                                                                      • LocalFree.KERNEL32(00000000), ref: 6D2540BA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: lstrcpy$FormatFreeHandleLocalMessageModulelstrlenwsprintf
                                                                      • String ID: (%lu)$"?%m$wininet.dll
                                                                      • API String ID: 2657572252-2785463851
                                                                      • Opcode ID: 0b6146e0cfc26fe240f3a7eae6ba21f74828f2ec2ffe924c465aabd02da415ec
                                                                      • Instruction ID: 63f471e4b0951cac3ee0dbff951b7fd7ea87a945f2816c4cecd572143f6115b7
                                                                      • Opcode Fuzzy Hash: 0b6146e0cfc26fe240f3a7eae6ba21f74828f2ec2ffe924c465aabd02da415ec
                                                                      • Instruction Fuzzy Hash: 9E31897558020AABEB158FA4CC88EBFBB7CEB49359F600612F914D6114D730E972CBA1
                                                                      APIs
                                                                      • GlobalAlloc.KERNEL32(00000040,00001000,00000000), ref: 6D251D07
                                                                      • GlobalAlloc.KERNEL32(00000040,00001000,00000000,?), ref: 6D251D65
                                                                      • lstrlenW.KERNEL32(?,00000001,00000000), ref: 6D251D96
                                                                      • lstrcmpiW.KERNEL32(00000004,true), ref: 6D251DC1
                                                                      • lstrlenW.KERNEL32(00000004,00000001,00000000), ref: 6D251E1D
                                                                      • lstrlenW.KERNEL32(?,00000001,00000000), ref: 6D251EB9
                                                                      • lstrlenW.KERNEL32(?,00000001,00000000), ref: 6D251F19
                                                                      • GlobalFree.KERNEL32(00000004), ref: 6D251FA7
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D251FDB
                                                                        • Part of subcall function 6D252536: lstrlenW.KERNEL32(00000000,6D253F05,?,6D253F05,?,00000000,?,00000000,00000000,00000000), ref: 6D252578
                                                                        • Part of subcall function 6D252536: lstrlenW.KERNEL32(?,6D253F05,?,6D253F05,?,00000000,?,00000000,00000000,00000000), ref: 6D252607
                                                                      • SetLastError.KERNEL32(00000000), ref: 6D251FE6
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen$Global$AllocFree$ErrorLastlstrcmpi
                                                                      • String ID: []=$true
                                                                      • API String ID: 462359672-2138158760
                                                                      • Opcode ID: c9cf7ddf0c9b32e2fa923bf86991c762a576fea35324905e91bbe51e3bc4dc09
                                                                      • Instruction ID: fba513b019f916d36b017de2028511275648fa6a00021febb57601bd2c22aec1
                                                                      • Opcode Fuzzy Hash: c9cf7ddf0c9b32e2fa923bf86991c762a576fea35324905e91bbe51e3bc4dc09
                                                                      • Instruction Fuzzy Hash: 39A1EAB6D5020EBBDF12CFD0CC85EEFB7BCAF08305F404566A615E6140E775AA948BA0
                                                                      APIs
                                                                      • GlobalAlloc.KERNEL32(00000040,00000000), ref: 6D2548D5
                                                                        • Part of subcall function 6D254B73: lstrcpyW.KERNEL32(00000000,00000004,00000000,?,6D254178,?,00000000,00000000,00000000,?,6D252D8C,00000000,00000000,00000000), ref: 6D254B94
                                                                        • Part of subcall function 6D254B73: GlobalFree.KERNEL32(00000000), ref: 6D254BA5
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D2549D1
                                                                        • Part of subcall function 6D251A11: GlobalAlloc.KERNEL32(00000040,00000010,?,?,6D252DE0), ref: 6D251B26
                                                                        • Part of subcall function 6D251A11: GlobalAlloc.KERNEL32(00000040,00000010,?,?,6D252DE0), ref: 6D251B4B
                                                                        • Part of subcall function 6D251A11: lstrlenW.KERNEL32(00000000,?,?,6D252DE0), ref: 6D251B63
                                                                        • Part of subcall function 6D251A11: GlobalAlloc.KERNEL32(00000040,00000000,?,?,6D252DE0), ref: 6D251B73
                                                                        • Part of subcall function 6D251A11: lstrcpyW.KERNEL32(?,00000000,?,?,6D252DE0), ref: 6D251B8D
                                                                      • lstrcmpiW.KERNEL32(00000000,/timeout,00000000,?), ref: 6D254954
                                                                      • WaitForSingleObject.KERNEL32(00000000,00000000,00000000), ref: 6D254987
                                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,?), ref: 6D2549AF
                                                                      • CloseHandle.KERNEL32(00000000), ref: 6D2549B6
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Global$Alloc$FreeObjectSingleWaitlstrcpy$CloseHandlelstrcmpilstrlen
                                                                      • String ID: /timeout$Handle$wait
                                                                      • API String ID: 371915083-854704214
                                                                      • Opcode ID: 231e8dd7aa43386590e2625cb19f78caf8ea2ce104cfdd479027a11d5d297dc3
                                                                      • Instruction ID: 194e084a876e1a62bd01519d898f2c2b989dafbf9af4b8915482d446987858f1
                                                                      • Opcode Fuzzy Hash: 231e8dd7aa43386590e2625cb19f78caf8ea2ce104cfdd479027a11d5d297dc3
                                                                      • Instruction Fuzzy Hash: BD31B43118C20FABDB015F658C49F6BB7BCAF4F22A7114226FA14D6141EB30D432C6A5
                                                                      APIs
                                                                      • GlobalAlloc.KERNEL32(00000040,00000000), ref: 6D254356
                                                                        • Part of subcall function 6D25414A: lstrcmpiW.KERNEL32(?,/tree,?,00000000,00000000,00000000,?,6D252D8C,00000000,00000000,00000000), ref: 6D254182
                                                                        • Part of subcall function 6D254B73: lstrcpyW.KERNEL32(00000000,00000004,00000000,?,6D254178,?,00000000,00000000,00000000,?,6D252D8C,00000000,00000000,00000000), ref: 6D254B94
                                                                        • Part of subcall function 6D254B73: GlobalFree.KERNEL32(00000000), ref: 6D254BA5
                                                                      • lstrcmpiW.KERNEL32(00000000,/file,00000000), ref: 6D254384
                                                                      • GetLastError.KERNEL32 ref: 6D25440E
                                                                        • Part of subcall function 6D254C09: GlobalAlloc.KERNEL32(00000040,?,00000000,?,6D2541B1,?,?,6D252D8C,00000000,00000000,00000000), ref: 6D254C25
                                                                        • Part of subcall function 6D254C09: lstrcpynW.KERNEL32(00000004,?,?,6D2541B1,?,?,6D252D8C,00000000,00000000,00000000), ref: 6D254C3A
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D25442A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Global$AllocFreelstrcmpi$ErrorLastlstrcpylstrcpyn
                                                                      • String ID: /file$/format$/unicode$JSON_Serialize
                                                                      • API String ID: 2114172429-2463986589
                                                                      • Opcode ID: ff5f16caee4a0f29cd840c227c55e8012e3122cd22531526a15fa75cba04b388
                                                                      • Instruction ID: 0cbd5ca981223ae1696e860f2dfadd022cfbe6f5ff7e5dc4e1e148df3b29a3bc
                                                                      • Opcode Fuzzy Hash: ff5f16caee4a0f29cd840c227c55e8012e3122cd22531526a15fa75cba04b388
                                                                      • Instruction Fuzzy Hash: 15318F7069920EABDB019F559888FBFB7B8EF4E346B144129FD09D6210E730D93286A5
                                                                      APIs
                                                                      • CreateFileW.KERNEL32(00000002,80000000,00000001,00000000,00000003,00000080,00000000,00000000,00000002,7556F360,00000000,00000002,00000000), ref: 6D252439
                                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 6D25244C
                                                                      • GlobalAlloc.KERNEL32(00000040,00000000), ref: 6D25246A
                                                                      • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 6D252480
                                                                      • CloseHandle.KERNEL32(00000000), ref: 6D252487
                                                                      • lstrlenW.KERNEL32(00000002,00000000,00000002,7556F360), ref: 6D25249C
                                                                      • lstrlenA.KERNEL32(00000002,00000000,00000002,7556F360), ref: 6D2524A4
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D25251A
                                                                      • GlobalFree.KERNEL32(00000002), ref: 6D252527
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: FileGlobal$Freelstrlen$AllocCloseCreateHandleReadSize
                                                                      • String ID:
                                                                      • API String ID: 670225477-0
                                                                      • Opcode ID: 220821f4f035b3ba1d7b722047ab0eec07a2b26b77d7d949ac22c0c7634be655
                                                                      • Instruction ID: a86859145826262042dd16ab96dd326ef93fdc936e2beafce96dfbcd5ce71f6c
                                                                      • Opcode Fuzzy Hash: 220821f4f035b3ba1d7b722047ab0eec07a2b26b77d7d949ac22c0c7634be655
                                                                      • Instruction Fuzzy Hash: A331C7B184524ABBDB218F65CC08FAF7BB8EF46325F008219FD16962C0D7349A10CB60
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(?,00000002,00000000,7556FFC0), ref: 6D251604
                                                                      • GlobalAlloc.KERNEL32(00000040,00000000), ref: 6D2516BB
                                                                      • wsprintfW.USER32 ref: 6D251756
                                                                      • lstrcpyW.KERNEL32(00000000,?), ref: 6D2517C9
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: AllocGloballstrcpylstrlenwsprintf
                                                                      • String ID: $\u%04x$~
                                                                      • API String ID: 1920656451-1521313420
                                                                      • Opcode ID: 0a8cd05ec9278c44d6b9a28804768985a0cebc3894b0b9343b2b2f58527a192b
                                                                      • Instruction ID: 48721c2c2fe0f42faafba58c15facd297a11cb02d71bf8b417a49bd70fdd2923
                                                                      • Opcode Fuzzy Hash: 0a8cd05ec9278c44d6b9a28804768985a0cebc3894b0b9343b2b2f58527a192b
                                                                      • Instruction Fuzzy Hash: F051F2359E030FEAEB034F5C88A4FB977B0FB55702F54811AE915D6194D3B585E0CB90
                                                                      APIs
                                                                      • GlobalAlloc.KERNEL32(00000040), ref: 6D252D5E
                                                                      • GlobalAlloc.KERNEL32(00000040), ref: 6D252D71
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D252E28
                                                                        • Part of subcall function 6D25414A: lstrcmpiW.KERNEL32(?,/tree,?,00000000,00000000,00000000,?,6D252D8C,00000000,00000000,00000000), ref: 6D254182
                                                                        • Part of subcall function 6D254B73: lstrcpyW.KERNEL32(00000000,00000004,00000000,?,6D254178,?,00000000,00000000,00000000,?,6D252D8C,00000000,00000000,00000000), ref: 6D254B94
                                                                        • Part of subcall function 6D254B73: GlobalFree.KERNEL32(00000000), ref: 6D254BA5
                                                                      • lstrcmpiW.KERNEL32(00000000,/end,00000000), ref: 6D252DAA
                                                                      • lstrcmpiW.KERNEL32(00000000,/index), ref: 6D252DBA
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D252E21
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Global$Freelstrcmpi$Alloc$lstrcpy
                                                                      • String ID: /end$/index
                                                                      • API String ID: 3216674501-41208782
                                                                      • Opcode ID: a05aafce2797af4ce73e2c2090e2c7c1a3ae384bdd1b47a0b65eeb02abfa929e
                                                                      • Instruction ID: 8308dcbab22de2d2d818d337dcf29fa9b63bf4de9eae364118689628d624f12f
                                                                      • Opcode Fuzzy Hash: a05aafce2797af4ce73e2c2090e2c7c1a3ae384bdd1b47a0b65eeb02abfa929e
                                                                      • Instruction Fuzzy Hash: 503174B168524EEFDB11CF65C888E6B3BB8EF4A356B044129F919D7240D731D921CBA0
                                                                      APIs
                                                                      • GlobalAlloc.KERNEL32(00000040,00000000), ref: 6D2547E0
                                                                        • Part of subcall function 6D25414A: lstrcmpiW.KERNEL32(?,/tree,?,00000000,00000000,00000000,?,6D252D8C,00000000,00000000,00000000), ref: 6D254182
                                                                        • Part of subcall function 6D254B73: lstrcpyW.KERNEL32(00000000,00000004,00000000,?,6D254178,?,00000000,00000000,00000000,?,6D252D8C,00000000,00000000,00000000), ref: 6D254B94
                                                                        • Part of subcall function 6D254B73: GlobalFree.KERNEL32(00000000), ref: 6D254BA5
                                                                      • lstrcmpiW.KERNEL32(00000000,/end,00000000), ref: 6D25480A
                                                                      • lstrcmpiW.KERNEL32(00000000,/index), ref: 6D25481A
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D254882
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Globallstrcmpi$Free$Alloclstrcpy
                                                                      • String ID: /end$/index$/options
                                                                      • API String ID: 2166273740-1446855818
                                                                      • Opcode ID: 904ea1678d830aab340ebfc189490daae50d8101b5cedcc110bc5ef64711db8f
                                                                      • Instruction ID: d699fbb32a079bf23442f7273caeca58660dc9096af2e0064135b3423cbc68e0
                                                                      • Opcode Fuzzy Hash: 904ea1678d830aab340ebfc189490daae50d8101b5cedcc110bc5ef64711db8f
                                                                      • Instruction Fuzzy Hash: 4E21A57158564FABDB018F569C8CEAB7BBCEF9A35AB044165FD0497200D730C936CBA1
                                                                      APIs
                                                                      • GetWindowLongW.USER32(?,000000EB), ref: 0040451D
                                                                      • GetSysColor.USER32(00000000), ref: 0040455B
                                                                      • SetTextColor.GDI32(?,00000000), ref: 00404567
                                                                      • SetBkMode.GDI32(?,?), ref: 00404573
                                                                      • GetSysColor.USER32(?), ref: 00404586
                                                                      • SetBkColor.GDI32(?,?), ref: 00404596
                                                                      • DeleteObject.GDI32(?), ref: 004045B0
                                                                      • CreateBrushIndirect.GDI32(?), ref: 004045BA
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                      • String ID:
                                                                      • API String ID: 2320649405-0
                                                                      • Opcode ID: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                                                      • Instruction ID: 19446832cb8519ea1938040ed984131457e28e93d0b00b9b4dc42373f0e33a15
                                                                      • Opcode Fuzzy Hash: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                                                      • Instruction Fuzzy Hash: 382177B1500705AFCB31DF68DD08B5BBBF8AF41714B058A2EEA96B22E1C734E944CB54
                                                                      APIs
                                                                      • SendMessageW.USER32(?,0000040D,00000000), ref: 6FD91CE6
                                                                      • ShowWindow.USER32(00000008), ref: 6FD91CF4
                                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 6FD91D10
                                                                      • IsDialogMessageW.USER32(?), ref: 6FD91D20
                                                                      • IsDialogMessageW.USER32(?), ref: 6FD91D30
                                                                      • TranslateMessage.USER32(?), ref: 6FD91D3A
                                                                      • DispatchMessageW.USER32(?), ref: 6FD91D44
                                                                      • SetWindowLongW.USER32(?,00000004), ref: 6FD91D5E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2707158755.000000006FD91000.00000020.00000001.01000000.0000000B.sdmp, Offset: 6FD90000, based on PE: true
                                                                      • Associated: 00000000.00000002.2707011598.000000006FD90000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2707198671.000000006FD93000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2707227440.000000006FD94000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2707243260.000000006FD98000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fd90000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Message$DialogWindow$DispatchLongSendShowTranslate
                                                                      • String ID:
                                                                      • API String ID: 1036221185-0
                                                                      • Opcode ID: 40b33aafd2af83ffa581910260ed78cb163562964330480762054a608c66caad
                                                                      • Instruction ID: c517c5c0d1fcd69cba3db860615369786474a68822c8807e427e9d53af99a3ab
                                                                      • Opcode Fuzzy Hash: 40b33aafd2af83ffa581910260ed78cb163562964330480762054a608c66caad
                                                                      • Instruction Fuzzy Hash: 81110932800A49FBEF119FE5DC0ADAE3B7DFB46762B044011F609A7065D732B425DB90
                                                                      APIs
                                                                      • GlobalAlloc.KERNEL32(00000040,00000000), ref: 6D254269
                                                                        • Part of subcall function 6D254B73: lstrcpyW.KERNEL32(00000000,00000004,00000000,?,6D254178,?,00000000,00000000,00000000,?,6D252D8C,00000000,00000000,00000000), ref: 6D254B94
                                                                        • Part of subcall function 6D254B73: GlobalFree.KERNEL32(00000000), ref: 6D254BA5
                                                                      • lstrcmpiW.KERNEL32(00000000,/unicode,00000000), ref: 6D254291
                                                                      • lstrcmpiW.KERNEL32(00000000,/always), ref: 6D2542A6
                                                                        • Part of subcall function 6D254C09: GlobalAlloc.KERNEL32(00000040,?,00000000,?,6D2541B1,?,?,6D252D8C,00000000,00000000,00000000), ref: 6D254C25
                                                                        • Part of subcall function 6D254C09: lstrcpynW.KERNEL32(00000004,?,?,6D2541B1,?,?,6D252D8C,00000000,00000000,00000000), ref: 6D254C3A
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D2542FA
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D254304
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Global$Free$Alloclstrcmpi$lstrcpylstrcpyn
                                                                      • String ID: /always$/unicode
                                                                      • API String ID: 3554853735-1970542336
                                                                      • Opcode ID: 4ceeafa197634064686d25150a63216bc9110a0aa922d5c6d7cb78acc08d211b
                                                                      • Instruction ID: 858f03c1992016be3f1a205b6ed4fe6fbe3236666d76b2612385954185ea6950
                                                                      • Opcode Fuzzy Hash: 4ceeafa197634064686d25150a63216bc9110a0aa922d5c6d7cb78acc08d211b
                                                                      • Instruction Fuzzy Hash: 8F21E13169521EABDB018F15C888F6F77B8AF4A36AF114116F904DB200D774D933CBA0
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(0042C248,00000000,00425020,755723A0,?,?,?,?,?,?,?,?,?,00403418,00000000,?), ref: 004055D7
                                                                      • lstrlenW.KERNEL32(00403418,0042C248,00000000,00425020,755723A0,?,?,?,?,?,?,?,?,?,00403418,00000000), ref: 004055E7
                                                                      • lstrcatW.KERNEL32(0042C248,00403418,00403418,0042C248,00000000,00425020,755723A0), ref: 004055FA
                                                                      • SetWindowTextW.USER32(0042C248,0042C248), ref: 0040560C
                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405632
                                                                      • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040564C
                                                                      • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565A
                                                                        • Part of subcall function 0040657A: lstrcatW.KERNEL32(get,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                                                                        • Part of subcall function 0040657A: lstrlenW.KERNEL32(get,00000000,0042C248,?,004055D6,0042C248,00000000), ref: 00406779
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSendlstrlen$lstrcat$TextWindow
                                                                      • String ID:
                                                                      • API String ID: 1495540970-0
                                                                      • Opcode ID: 195069dcc2a5024ac29c7a45bf60c8768b6efe327543dfefb6c4dd5180e0e504
                                                                      • Instruction ID: 138a2a903332092674924c4fce2a37a83712bc812e9b86ab44911e1df8857bb6
                                                                      • Opcode Fuzzy Hash: 195069dcc2a5024ac29c7a45bf60c8768b6efe327543dfefb6c4dd5180e0e504
                                                                      • Instruction Fuzzy Hash: C1219071900558BACF11AFA9DD84DDFBF75EF45354F14803AF904B22A0C7794A419F68
                                                                      APIs
                                                                      • CharNextW.USER32(?,*?|<>/":,00000000,00000000,75573420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406827
                                                                      • CharNextW.USER32(?,?,?,00000000,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406836
                                                                      • CharNextW.USER32(?,00000000,75573420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 0040683B
                                                                      • CharPrevW.USER32(?,?,75573420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 0040684E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Char$Next$Prev
                                                                      • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                      • API String ID: 589700163-2246974252
                                                                      • Opcode ID: 7f8a10c6574f84f045d99a2f2ba91d71661da1c9dbe2055a6f375f6d39957bd5
                                                                      • Instruction ID: 8e05d213a2b26a47bd0c986db1e6a85e10b5e067f284fb5e9645f7af11a9ce3c
                                                                      • Opcode Fuzzy Hash: 7f8a10c6574f84f045d99a2f2ba91d71661da1c9dbe2055a6f375f6d39957bd5
                                                                      • Instruction Fuzzy Hash: 7311862780161295DB313B158C44A77A2A8AF58798F56843FED86B32C1E77C8C9282AD
                                                                      APIs
                                                                        • Part of subcall function 6FD91E4E: lstrcpynW.KERNEL32(6FD91054,?,?,?,6FD91054,?), ref: 6FD91E7B
                                                                        • Part of subcall function 6FD91E4E: GlobalFree.KERNEL32 ref: 6FD91E8B
                                                                      • SHBrowseForFolderW.SHELL32(?), ref: 6FD910A8
                                                                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 6FD910C8
                                                                      • CoTaskMemFree.OLE32(00000000,error), ref: 6FD910E6
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2707158755.000000006FD91000.00000020.00000001.01000000.0000000B.sdmp, Offset: 6FD90000, based on PE: true
                                                                      • Associated: 00000000.00000002.2707011598.000000006FD90000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2707198671.000000006FD93000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2707227440.000000006FD94000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2707243260.000000006FD98000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fd90000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Free$BrowseFolderFromGlobalListPathTasklstrcpyn
                                                                      • String ID: 0vv$E$error
                                                                      • API String ID: 1728609016-41027614
                                                                      • Opcode ID: 2b8055c973e5c72f14f0a2e18390f15a12e7bbfeee7051361d72fcb88d2d38e1
                                                                      • Instruction ID: 97684fa035e01e2db09fcdd2bd4cd3c6d06825b3b6b0e159ee91ecbe14c1fc30
                                                                      • Opcode Fuzzy Hash: 2b8055c973e5c72f14f0a2e18390f15a12e7bbfeee7051361d72fcb88d2d38e1
                                                                      • Instruction Fuzzy Hash: 3E2149B6900318ABDB80DFE0C945BDE77BCBB09354F004256E518E6240E736BA54CFA1
                                                                      APIs
                                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404E6F
                                                                      • GetMessagePos.USER32 ref: 00404E77
                                                                      • ScreenToClient.USER32(?,?), ref: 00404E91
                                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404EA3
                                                                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404EC9
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Message$Send$ClientScreen
                                                                      • String ID: f
                                                                      • API String ID: 41195575-1993550816
                                                                      • Opcode ID: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                                                      • Instruction ID: 177f1d0b32132a6560496663958852c5fe6f1b23f9da62007dee57caca3d7f28
                                                                      • Opcode Fuzzy Hash: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                                                      • Instruction Fuzzy Hash: 34014C71900219BADB00DBA4DD85BFFBBB8AB54711F10012BBA50B61C0D7B49A058BA5
                                                                      APIs
                                                                      • GetDC.USER32(?), ref: 00401E51
                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E6B
                                                                      • MulDiv.KERNEL32(00000000,00000000), ref: 00401E73
                                                                      • ReleaseDC.USER32(?,00000000), ref: 00401E84
                                                                        • Part of subcall function 0040657A: lstrcatW.KERNEL32(get,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                                                                        • Part of subcall function 0040657A: lstrlenW.KERNEL32(get,00000000,0042C248,?,004055D6,0042C248,00000000), ref: 00406779
                                                                      • CreateFontIndirectW.GDI32(0040CDF0), ref: 00401ED3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: CapsCreateDeviceFontIndirectReleaselstrcatlstrlen
                                                                      • String ID: MS Shell Dlg
                                                                      • API String ID: 2584051700-76309092
                                                                      • Opcode ID: 7613f5a947f4bbf8195753a17fba9eaca46e1d6fc564812dac8d5fa739d0f051
                                                                      • Instruction ID: 78b13ae86a0973dc2b43aa2eb6c1af0beb3c1ef463c522f55250376beecb9f8a
                                                                      • Opcode Fuzzy Hash: 7613f5a947f4bbf8195753a17fba9eaca46e1d6fc564812dac8d5fa739d0f051
                                                                      • Instruction Fuzzy Hash: 7001B571904241EFEB005BB0EE49B9A3FB4BB15301F108A39F541B71D2C7B904458BED
                                                                      APIs
                                                                      • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB1
                                                                      • MulDiv.KERNEL32(0002BCFB,00000064,0002E668), ref: 00402FDC
                                                                      • wsprintfW.USER32 ref: 00402FEC
                                                                      • SetWindowTextW.USER32(?,?), ref: 00402FFC
                                                                      • SetDlgItemTextW.USER32(?,00000406,?), ref: 0040300E
                                                                      Strings
                                                                      • verifying installer: %d%%, xrefs: 00402FE6
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Text$ItemTimerWindowwsprintf
                                                                      • String ID: verifying installer: %d%%
                                                                      • API String ID: 1451636040-82062127
                                                                      • Opcode ID: 34baaeb4f482044ab67dd7918236f7f229881b82dd6befd7adca30260b95ec65
                                                                      • Instruction ID: eb17ebabde20c32bd565f0ca98bf5c3c7f8a04474e671541d9d17dad0456e96b
                                                                      • Opcode Fuzzy Hash: 34baaeb4f482044ab67dd7918236f7f229881b82dd6befd7adca30260b95ec65
                                                                      • Instruction Fuzzy Hash: 20014B7064020DABEF209F60DE4AFEA3B79FB04345F008039FA06B51D0DBB999559F69
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706805863.000000006FD71000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD70000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706784915.000000006FD70000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706824623.000000006FD77000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706839008.000000006FD78000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706980410.000000006FD7F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fd70000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: lstrcpywsprintf
                                                                      • String ID: %u MB$%u bytes$%u kB$???
                                                                      • API String ID: 2408954437-4199891213
                                                                      • Opcode ID: b872e17ea7eea712d59238c628111cb5859894777842478fd3db2f5f7a8988ec
                                                                      • Instruction ID: 3a375b233d8af739a937a04d8f867cd8487dc9897760a27b455935aa2c824f69
                                                                      • Opcode Fuzzy Hash: b872e17ea7eea712d59238c628111cb5859894777842478fd3db2f5f7a8988ec
                                                                      • Instruction Fuzzy Hash: B1F06571004608BADBF01B28AC50E69336DFB01338F504F12FC6EDC150DE21F5995552
                                                                      APIs
                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B1
                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029CD
                                                                      • GlobalFree.KERNEL32(?), ref: 00402A06
                                                                      • GlobalFree.KERNEL32(00000000), ref: 00402A19
                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A35
                                                                      • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A48
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                      • String ID:
                                                                      • API String ID: 2667972263-0
                                                                      • Opcode ID: 18333e3c7c5edca9258600c879c391e4e8cb8a080c4e0dd56f257e0fabcb70bb
                                                                      • Instruction ID: 8fc1a79e9ee36ebd610a2d663d7387b5f1fea8f48d7bc9e01940cd119f3fb53c
                                                                      • Opcode Fuzzy Hash: 18333e3c7c5edca9258600c879c391e4e8cb8a080c4e0dd56f257e0fabcb70bb
                                                                      • Instruction Fuzzy Hash: 5831C271D00124BBCF216FA9CE49DDEBE79AF49364F14023AF450762E0CB794C429BA8
                                                                      APIs
                                                                      • GetParent.USER32(?), ref: 6FD7138E
                                                                      • GetWindowRect.USER32(00000000,?), ref: 6FD713C0
                                                                      • GetClientRect.USER32(00000000,?), ref: 6FD713C4
                                                                      • GetWindowRect.USER32(?,?), ref: 6FD713D1
                                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 6FD71413
                                                                      • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,00000001), ref: 6FD71453
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706805863.000000006FD71000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD70000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706784915.000000006FD70000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706824623.000000006FD77000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706839008.000000006FD78000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706980410.000000006FD7F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fd70000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: RectWindow$ClientInfoParametersParentSystem
                                                                      • String ID:
                                                                      • API String ID: 1395677574-0
                                                                      • Opcode ID: 392718eb18f5f4b6f5b28b83c1684f0b243eadaa0c1afd56f51da94e6d2bc261
                                                                      • Instruction ID: 657e8d0cb01d31bce0f1357e455085758e015297e61f2a615c917717a6ab1d00
                                                                      • Opcode Fuzzy Hash: 392718eb18f5f4b6f5b28b83c1684f0b243eadaa0c1afd56f51da94e6d2bc261
                                                                      • Instruction Fuzzy Hash: 4C212B32A00529AFEF10DBB8CD49BDDBBF9AB45654F094165E900F7180DA70BD00CBA1
                                                                      APIs
                                                                      • lstrcpyW.KERNEL32(Downloading %s,Uploading %s), ref: 6FD74A5D
                                                                      • lstrcpyW.KERNEL32(Downloading,Uploading), ref: 6FD74A6D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706805863.000000006FD71000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD70000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706784915.000000006FD70000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706824623.000000006FD77000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706839008.000000006FD78000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706980410.000000006FD7F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fd70000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: lstrcpy
                                                                      • String ID: Downloading$Downloading %s$Uploading$Uploading %s
                                                                      • API String ID: 3722407311-2813864553
                                                                      • Opcode ID: 0dfcf5e9af6b6acf8414e560b4b6f6b7d77b61c8c65864e7f612b930296044d1
                                                                      • Instruction ID: 1590c8a1096cff357295e23933eeb5a3d7052782968e47831acbdfb086514a5a
                                                                      • Opcode Fuzzy Hash: 0dfcf5e9af6b6acf8414e560b4b6f6b7d77b61c8c65864e7f612b930296044d1
                                                                      • Instruction Fuzzy Hash: F6C00261048AA4BBDFF027B98D08A5E7FD49707262B1C0941E1455D5064E66305C96E6
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(15FF5700,00000000,?,?,?,?,?,?,?,?,6D253ED9,00000000), ref: 6D2517E5
                                                                      • GlobalAlloc.KERNEL32(00000040,?,?,?,?,?,?,?,?,?,6D253ED9,00000000), ref: 6D2517FA
                                                                      • wsprintfW.USER32 ref: 6D2518CD
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: AllocGloballstrlenwsprintf
                                                                      • String ID: 0x%c%c%c%c$\
                                                                      • API String ID: 983123113-737428342
                                                                      • Opcode ID: 5d05b0a04fa8d7e431625aeb0e80e1f009ab21c46381b6695dfcac709f9956f1
                                                                      • Instruction ID: 18beae2a9bdf86ef5b3127d801c03295eff5a09f1b40ab530ac589e7beafebf6
                                                                      • Opcode Fuzzy Hash: 5d05b0a04fa8d7e431625aeb0e80e1f009ab21c46381b6695dfcac709f9956f1
                                                                      • Instruction Fuzzy Hash: 3541C671A9421EABDB25CF98C885FBEB7B4FF4A311F108155E905EB240D234D9D1C790
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706727938.000000006D261000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D260000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706709486.000000006D260000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706745853.000000006D264000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706765225.000000006D266000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d260000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: FreeGlobal
                                                                      • String ID:
                                                                      • API String ID: 2979337801-0
                                                                      • Opcode ID: 0bece071f0955a28fe090fc13f0e45178b0ce287b75c04578d55d51cf442b8eb
                                                                      • Instruction ID: 2a54ce06ebd6c3709aedc9b7fdffb3d6e6e02570e384a5b04b9146a225f1b2a4
                                                                      • Opcode Fuzzy Hash: 0bece071f0955a28fe090fc13f0e45178b0ce287b75c04578d55d51cf442b8eb
                                                                      • Instruction Fuzzy Hash: D151B332DE83DFABCB179FA884809BE76B5BB45315B118169E500A3210E771BDC5C7B1
                                                                      APIs
                                                                      • lstrcmpW.KERNEL32(6D255050,?,00000000,?,00000000,|H%m,6D2521C4,|H%m,00000000,?,00000000,00000000,00000000,?,?,6D25487C), ref: 6D2529D4
                                                                      • lstrcmpiW.KERNEL32(6D255050,?,00000000,?,00000000,|H%m,6D2521C4,|H%m,00000000,?,00000000,00000000,00000000,?,?,6D25487C), ref: 6D2529DC
                                                                      • lstrcmpW.KERNEL32(75FF855B,?,00000000,?,00000000,|H%m,6D2521C4,|H%m,00000000,?,00000000,00000000,00000000,?,?,6D25487C), ref: 6D252A2A
                                                                      • lstrcmpiW.KERNEL32(75FF855B,?,00000000,?,00000000,|H%m,6D2521C4,|H%m,00000000,?,00000000,00000000,00000000,?,?,6D25487C), ref: 6D252A38
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: lstrcmplstrcmpi
                                                                      • String ID: |H%m
                                                                      • API String ID: 3524194181-2782187842
                                                                      • Opcode ID: afa22afaf1e3607e53340dbdabe918b6470f48a86fbbb23f2766553385e32bb8
                                                                      • Instruction ID: 8cc3a678d634bafdcf098064f4748194a05d779155788f8204772e205b212aa7
                                                                      • Opcode Fuzzy Hash: afa22afaf1e3607e53340dbdabe918b6470f48a86fbbb23f2766553385e32bb8
                                                                      • Instruction Fuzzy Hash: 0631D6B22C820BAFDB368F18C844F6677A5FF45761F298094E954872E1D732C872C790
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(00000800,?,00000004,?,?,?,6D251E4C,00000004,00000800,00000000), ref: 6D25131D
                                                                      • GlobalAlloc.KERNEL32(00000040,-00000002,?,?,?,6D251E4C,00000004,00000800,00000000), ref: 6D25132C
                                                                      • IsCharAlphaNumericW.USER32(?,00000000,?,?,?,6D251E4C,00000004,00000800,00000000), ref: 6D251351
                                                                      • lstrlenW.KERNEL32(00000000,00000000,?,?,?,6D251E4C,00000004,00000800,00000000), ref: 6D2513C0
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D2513E9
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Globallstrlen$AllocAlphaCharFreeNumeric
                                                                      • String ID:
                                                                      • API String ID: 2254421552-0
                                                                      • Opcode ID: c3f156a36fcfc6f27d92f088e8d1092316c9dc8e1fdb1479edbade9db3f501d5
                                                                      • Instruction ID: 7434cc4bec9568e461bcaced9be09e239776a5ba7421fde91880a4a58813e2ed
                                                                      • Opcode Fuzzy Hash: c3f156a36fcfc6f27d92f088e8d1092316c9dc8e1fdb1479edbade9db3f501d5
                                                                      • Instruction Fuzzy Hash: 5431F07659062BF7DB111F58C898F7B37B8EF0AB52B100042F900DA654E374C9A1C7A1
                                                                      APIs
                                                                      • CreateFileW.KERNEL32(00000000,40000000,00000002,00000000,00000002,00000080,00000000,00000000,00000000,00000000,?,?,6D253F05,?,00000000,?), ref: 6D251C6D
                                                                      • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 6D251C91
                                                                      • GetLastError.KERNEL32(?,?,6D253F05,?,00000000,?,00000000,00000000,00000000), ref: 6D251C99
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D251CCF
                                                                      • SetLastError.KERNEL32(00000000,6D253F05,?,00000000,?,00000000,00000000,00000000), ref: 6D251CD8
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$CloseCreateFileFreeGlobalHandle
                                                                      • String ID:
                                                                      • API String ID: 653717721-0
                                                                      • Opcode ID: ae71867bc05c57d06c9a49d635404c172d227c16b90cf5e2cb8b01f795c453b3
                                                                      • Instruction ID: 6d5e5a71f0555792cf730df89e2d999ca6078e945c37fb07a48a4e0506625fd1
                                                                      • Opcode Fuzzy Hash: ae71867bc05c57d06c9a49d635404c172d227c16b90cf5e2cb8b01f795c453b3
                                                                      • Instruction Fuzzy Hash: BB2181B295021DFFDB019F60CC48EAF37BCEF49366B118125F91597140E732DEA08AA1
                                                                      APIs
                                                                      • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402EFD
                                                                      • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F49
                                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F52
                                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F69
                                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F74
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: CloseEnum$DeleteValue
                                                                      • String ID:
                                                                      • API String ID: 1354259210-0
                                                                      • Opcode ID: 8cb330a57336db5e00a931244e28e0c1e8cbbd051d222c2bd1499622aecedac4
                                                                      • Instruction ID: ca6229ec891c5908b4c2d3bab14ae3db7b9396451d72a40731f1c02386a45f13
                                                                      • Opcode Fuzzy Hash: 8cb330a57336db5e00a931244e28e0c1e8cbbd051d222c2bd1499622aecedac4
                                                                      • Instruction Fuzzy Hash: DA215A7150010ABBEF119F90CE89EEF7B7DEB50384F100076F909B21A0D7B49E54AA68
                                                                      APIs
                                                                      • lstrcmpiW.KERNEL32(?,,`%m,00000000,00000000,00000000,?,?,6D252E0D,6D25602C,00000000,00000000), ref: 6D252AA9
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D252ADA
                                                                      • GlobalFree.KERNEL32(?), ref: 6D252AE1
                                                                      • GlobalFree.KERNEL32(?), ref: 6D252AE4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: FreeGlobal$lstrcmpi
                                                                      • String ID: ,`%m
                                                                      • API String ID: 2789208084-1485294008
                                                                      • Opcode ID: 2a22059dca700dbea4d06f2e036b5bed7dcaab1a62217ee8a9ffe50f9859177f
                                                                      • Instruction ID: 11376a779e5c255fecc5c6ce790e0fc748a96ed81acc94586e82efec4c74aca6
                                                                      • Opcode Fuzzy Hash: 2a22059dca700dbea4d06f2e036b5bed7dcaab1a62217ee8a9ffe50f9859177f
                                                                      • Instruction Fuzzy Hash: AC118B75A4161AAFDB21CF58C880E6AB7A8FF48651B1081A9EC5497340D772ED20CBD0
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(?,00000000,00000000,00000000), ref: 6D254A00
                                                                      • WriteFile.KERNEL32(00000000,?,00000000), ref: 6D254A0F
                                                                      • lstrlenW.KERNEL32(?,00000000), ref: 6D254A1A
                                                                      • WriteFile.KERNEL32(00000000,00000000,?,00000000,00000000,?,00000000,00000000), ref: 6D254A4A
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D254A51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: FileWritelstrlen$FreeGlobal
                                                                      • String ID:
                                                                      • API String ID: 3525607692-0
                                                                      • Opcode ID: eacbf8cbe09c20b6e3382017ac1de94607868638f171a85044a8fdfc919016fb
                                                                      • Instruction ID: 341ae32046c789bc363bf507a01475f35d123eeb0a36d7a58b324a333f00bcf0
                                                                      • Opcode Fuzzy Hash: eacbf8cbe09c20b6e3382017ac1de94607868638f171a85044a8fdfc919016fb
                                                                      • Instruction Fuzzy Hash: 4B010431450219AFDF129F50CC09FBB7BB8EF09215F044265B92AA6110D7B1AE21CBD4
                                                                      APIs
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,6D2622D8,?,00000808), ref: 6D2616D5
                                                                      • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,6D2622D8,?,00000808), ref: 6D2616DC
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,6D2622D8,?,00000808), ref: 6D2616F0
                                                                      • GetProcAddress.KERNEL32(6D2622D8,00000000), ref: 6D2616F7
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D261700
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706727938.000000006D261000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D260000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706709486.000000006D260000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706745853.000000006D264000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706765225.000000006D266000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d260000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                                      • String ID:
                                                                      • API String ID: 1148316912-0
                                                                      • Opcode ID: e36efe3de0741732a314946bac6899e048a8ab7e692f118329ea40eecbce6b23
                                                                      • Instruction ID: 0876efe84958c547e88e649ff0d28629a694d6fb7672c5aee27535e5394b108f
                                                                      • Opcode Fuzzy Hash: e36efe3de0741732a314946bac6899e048a8ab7e692f118329ea40eecbce6b23
                                                                      • Instruction Fuzzy Hash: 3DF0127210A2787BDA2016E6CC4CDAB7EACDF8F2F9B114211F65892190C6615C02D7F1
                                                                      APIs
                                                                      • lstrcmpiW.KERNEL32(00000000,JSON,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 6D253F9D
                                                                      • lstrcmpiW.KERNEL32(00000000,Raw,?,?,00000000,?,?,?,?,?,?,00000000,?,?,00000000), ref: 6D253FB0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: lstrcmpi
                                                                      • String ID: DataType$JSON$Raw
                                                                      • API String ID: 1586166983-3390691770
                                                                      • Opcode ID: ed880dd92a44dcba6e55dabc5451d40a6ee107b27d57ab1363a3a24e30e744dc
                                                                      • Instruction ID: 9a21f2758ef41a5f6f702fb8416ce5316e90c22bd1707104909d217b878af73c
                                                                      • Opcode Fuzzy Hash: ed880dd92a44dcba6e55dabc5451d40a6ee107b27d57ab1363a3a24e30e744dc
                                                                      • Instruction Fuzzy Hash: 00E026325EC11E3BCA112F34AC0AF7B3FAC9F43179B248320F90AE5186E719A4B150D8
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DE7
                                                                      • wsprintfW.USER32 ref: 00404DF0
                                                                      • SetDlgItemTextW.USER32(?,0042D268), ref: 00404E03
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: ItemTextlstrlenwsprintf
                                                                      • String ID: %u.%u%s%s
                                                                      • API String ID: 3540041739-3551169577
                                                                      • Opcode ID: f5c410226751388561f0977026f7bc113d9509f0ffdd9d2834ff72966f8c02b6
                                                                      • Instruction ID: d7f2b51e3f2153b105aad6c1cbcae815e44f670c765de83d30fbb221df5484fa
                                                                      • Opcode Fuzzy Hash: f5c410226751388561f0977026f7bc113d9509f0ffdd9d2834ff72966f8c02b6
                                                                      • Instruction Fuzzy Hash: AC11D573A041283BDB10656DAC45E9E369CAF81334F254237FA66F21D1EA78D91182E8
                                                                      APIs
                                                                        • Part of subcall function 0040653D: lstrcpynW.KERNEL32(?,?,00000400,0040369D,00433F00,NSIS Error), ref: 0040654A
                                                                        • Part of subcall function 00405EB7: CharNextW.USER32(?,?,0042FA70,?,00405F2B,0042FA70,0042FA70, 4Wu,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,75573420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405EC5
                                                                        • Part of subcall function 00405EB7: CharNextW.USER32(00000000), ref: 00405ECA
                                                                        • Part of subcall function 00405EB7: CharNextW.USER32(00000000), ref: 00405EE2
                                                                      • lstrlenW.KERNEL32(0042FA70,00000000,0042FA70,0042FA70, 4Wu,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,75573420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405F6D
                                                                      • GetFileAttributesW.KERNEL32(0042FA70,0042FA70,0042FA70,0042FA70,0042FA70,0042FA70,00000000,0042FA70,0042FA70, 4Wu,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,75573420,C:\Users\user\AppData\Local\Temp\), ref: 00405F7D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                      • String ID: 4Wu$C:\Users\user\AppData\Local\Temp\
                                                                      • API String ID: 3248276644-3057243036
                                                                      • Opcode ID: 442e1b1d96b1c23b6c0207761c3788c7dd97485575ed4e88a223653099446a7a
                                                                      • Instruction ID: e20fb510edeaf32ba19235dad054e15b0ffac27cf679254cac4fdbc394554759
                                                                      • Opcode Fuzzy Hash: 442e1b1d96b1c23b6c0207761c3788c7dd97485575ed4e88a223653099446a7a
                                                                      • Instruction Fuzzy Hash: E3F0F426119D6226DB22333A5C05EAF0554CE9276475A023BF895B12C5DB3C8A43D8AE
                                                                      APIs
                                                                        • Part of subcall function 6FD913D2: GetPropW.USER32(?,NSIS: nsControl pointer property), ref: 6FD913DB
                                                                      • LoadCursorW.USER32(00000000,00007F89), ref: 6FD914A8
                                                                      • SetCursor.USER32(00000000,?,?,?), ref: 6FD914AF
                                                                      • CallWindowProcW.USER32(?,?,00000020,?,?), ref: 6FD914CC
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2707158755.000000006FD91000.00000020.00000001.01000000.0000000B.sdmp, Offset: 6FD90000, based on PE: true
                                                                      • Associated: 00000000.00000002.2707011598.000000006FD90000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2707198671.000000006FD93000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2707227440.000000006FD94000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2707243260.000000006FD98000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fd90000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Cursor$CallLoadProcPropWindow
                                                                      • String ID:
                                                                      • API String ID: 1635134901-3916222277
                                                                      • Opcode ID: 61045b297c6eada24e58779f985d130eb432401216a57dfdab0b629fa06892fb
                                                                      • Instruction ID: 8600d0ec357cf8358bd66684de44bb52ab608fb6cd588dd545f4768b76c93c39
                                                                      • Opcode Fuzzy Hash: 61045b297c6eada24e58779f985d130eb432401216a57dfdab0b629fa06892fb
                                                                      • Instruction Fuzzy Hash: FCE0C936144209FBEF415FE2CD0599A3B6DAF09361F048520FA1D88060C776B470AB61
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040351A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00405E12
                                                                      • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040351A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00405E1C
                                                                      • lstrcatW.KERNEL32(?,0040A014), ref: 00405E2E
                                                                      Strings
                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405E0C
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: CharPrevlstrcatlstrlen
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                                                      • API String ID: 2659869361-4083868402
                                                                      • Opcode ID: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                                                                      • Instruction ID: 1a595bf39a0a3392b99637bd72bd9cca8666c17676e511d5d4bf90e80f698eee
                                                                      • Opcode Fuzzy Hash: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                                                                      • Instruction Fuzzy Hash: A8D0A731101930BAC2127B49EC08DDF62ACAE89340341443BF145B30A4CB7C5E5187FD
                                                                      APIs
                                                                      • GlobalFree.KERNEL32(?), ref: 6D252029
                                                                        • Part of subcall function 6D251558: GlobalFree.KERNEL32(?), ref: 6D2515B5
                                                                        • Part of subcall function 6D251558: GlobalFree.KERNEL32(?), ref: 6D2515C9
                                                                        • Part of subcall function 6D251558: GlobalFree.KERNEL32(00000000), ref: 6D2515E0
                                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,7556F360,?,6D254658), ref: 6D25205F
                                                                      • GlobalFree.KERNEL32(?), ref: 6D2520D2
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D2520F1
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D252152
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: FreeGlobal$lstrlen
                                                                      • String ID:
                                                                      • API String ID: 3041391548-0
                                                                      • Opcode ID: c6c7dd54a211f58adc4b78ec04c304f9a1288711da1b91f361660e826e8b6ef2
                                                                      • Instruction ID: ea52fa26f5ed0dce90697666b173cf965dc991204efbc095867bcc656bffc653
                                                                      • Opcode Fuzzy Hash: c6c7dd54a211f58adc4b78ec04c304f9a1288711da1b91f361660e826e8b6ef2
                                                                      • Instruction Fuzzy Hash: B2516EB119464FDFD7228F18C884E27B7E8FF56365721C62DE6A986290D731E8A1CF40
                                                                      APIs
                                                                      • lstrcmpiW.KERNEL32(00000000,00000000,00000000,?,?,6D2541D0,00000000,?,?,00000000,00000000,00000000,?,6D252D8C,00000000,00000000), ref: 6D252B59
                                                                      • GlobalAlloc.KERNEL32(00000040,0000000C,00000000,?,6D2541D0,00000000,?,?,00000000,00000000,00000000,?,6D252D8C,00000000,00000000,00000000), ref: 6D252B7A
                                                                      • lstrlenW.KERNEL32(00000000,?,6D2541D0,00000000,?,?,00000000,00000000,00000000,?,6D252D8C,00000000,00000000,00000000), ref: 6D252B7F
                                                                      • GlobalAlloc.KERNEL32(00000040,00000000,?,6D2541D0,00000000,?,?,00000000,00000000,00000000,?,6D252D8C,00000000,00000000,00000000), ref: 6D252B8F
                                                                      • lstrcpyW.KERNEL32(00000000,00000000,?,6D2541D0,00000000,?,?,00000000,00000000,00000000,?,6D252D8C,00000000,00000000,00000000), ref: 6D252B95
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: AllocGlobal$lstrcmpilstrcpylstrlen
                                                                      • String ID:
                                                                      • API String ID: 3653182775-0
                                                                      • Opcode ID: 3cff5b58c995c0fa3b0d19123bfc7fab737a8fbf8bbb65a374bd3339bd124cbb
                                                                      • Instruction ID: d12b62019fc11b36b716b6f036039904c568bda02eac31a4bdbec760afcbae88
                                                                      • Opcode Fuzzy Hash: 3cff5b58c995c0fa3b0d19123bfc7fab737a8fbf8bbb65a374bd3339bd124cbb
                                                                      • Instruction Fuzzy Hash: 18012DB169021AEFEF218F65C848F6B7BA8FF45795F004465EA089B294D731EC10CBA0
                                                                      APIs
                                                                      • ReadFile.KERNEL32(?,6FD79C90,00002000,?,00000000), ref: 6FD718B6
                                                                      • InternetWriteFile.WININET(?,6FD79C90,?,?), ref: 6FD718DC
                                                                      • InternetReadFile.WININET(?,6FD79C90,00002000,?), ref: 6FD7191A
                                                                      • WriteFile.KERNEL32(?,6FD79C90,?,?,00000000), ref: 6FD7199E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706805863.000000006FD71000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD70000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706784915.000000006FD70000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706824623.000000006FD77000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706839008.000000006FD78000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706980410.000000006FD7F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fd70000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: File$InternetReadWrite
                                                                      • String ID:
                                                                      • API String ID: 1380539803-0
                                                                      • Opcode ID: 5c8b3c6a92ec42cfa0cd3a05b9751aea3b049a5fa8fe768650349534a910d678
                                                                      • Instruction ID: 341193147344d44ea5af592f8b3310c7051849be91a534e31313c4038c5974a4
                                                                      • Opcode Fuzzy Hash: 5c8b3c6a92ec42cfa0cd3a05b9751aea3b049a5fa8fe768650349534a910d678
                                                                      • Instruction Fuzzy Hash: 1341B476600611EFFFA4CF64C5A4EA977F9FB02368B14031AD070AE208DB30B952C791
                                                                      APIs
                                                                      • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsiA50F.tmp\inetc.dll), ref: 00402695
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsiA50F.tmp$C:\Users\user\AppData\Local\Temp\nsiA50F.tmp\inetc.dll
                                                                      • API String ID: 1659193697-345751807
                                                                      • Opcode ID: fbd5ee5e4de60feb08ffa62b35b3018c7a91bb86716aa8782bbd76b946f17d50
                                                                      • Instruction ID: edf8e5a6553ae7ef136857fb61bcac29e22bbc78049b19fa22ca3c34260198f3
                                                                      • Opcode Fuzzy Hash: fbd5ee5e4de60feb08ffa62b35b3018c7a91bb86716aa8782bbd76b946f17d50
                                                                      • Instruction Fuzzy Hash: 2611EB71A00215BBCB10BFB18E4AAAE7665AF40744F25443FE002B71C2EAFC8891565E
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(7556F380,?,00000400,00000400,?,7556F380,00000000), ref: 6FD9133E
                                                                      • CharPrevW.USER32(7556F380,00000000,?,7556F380,00000000), ref: 6FD91349
                                                                      • MulDiv.KERNEL32(?,00000000,00000064), ref: 6FD9136D
                                                                      • MapDialogRect.USER32(7556F380,7556F380), ref: 6FD91393
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2707158755.000000006FD91000.00000020.00000001.01000000.0000000B.sdmp, Offset: 6FD90000, based on PE: true
                                                                      • Associated: 00000000.00000002.2707011598.000000006FD90000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2707198671.000000006FD93000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2707227440.000000006FD94000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2707243260.000000006FD98000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fd90000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: CharDialogPrevRectlstrlen
                                                                      • String ID:
                                                                      • API String ID: 3411278111-0
                                                                      • Opcode ID: 0b0bd55b7c6eb183c769a180c5c3b6238a21f68df51d75792ffd92c93231982b
                                                                      • Instruction ID: a5cb56ae12646e0619fe99cfcd452aa20e87ada9a87af27f28bb18924738c206
                                                                      • Opcode Fuzzy Hash: 0b0bd55b7c6eb183c769a180c5c3b6238a21f68df51d75792ffd92c93231982b
                                                                      • Instruction Fuzzy Hash: D5118635D04625EB8B50BFE8C9459DEB7BDEF42710B004619EC2897600D332B910CB94
                                                                      APIs
                                                                      • WideCharToMultiByte.KERNEL32(?,00000200,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,6D2523BE,00000000,?,00000000), ref: 6D25194F
                                                                      • GlobalAlloc.KERNEL32(00000040,00000001,?,6D2523BE,00000000,?,00000000,00000000,?,6D25294A,00000000,6D25510C,00000001,00000000,00000000,00000000), ref: 6D251961
                                                                      • WideCharToMultiByte.KERNEL32(?,00000200,00000000,00000000,00000000,00000000,00000000,00000000,?,6D2523BE,00000000,?,00000000,00000000,?,6D25294A), ref: 6D251980
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D251991
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharGlobalMultiWide$AllocFree
                                                                      • String ID:
                                                                      • API String ID: 2244543456-0
                                                                      • Opcode ID: 38d830dc3ec4bf3cb404a0cf83d3675ea212a796fb2cea0f496ef68eb3624d20
                                                                      • Instruction ID: d97d30859f7463f6ae198725e4a99d14c2412c83e704fbbf2f459e080a82f33a
                                                                      • Opcode Fuzzy Hash: 38d830dc3ec4bf3cb404a0cf83d3675ea212a796fb2cea0f496ef68eb3624d20
                                                                      • Instruction Fuzzy Hash: FB01697528461ABBEB120F55CC48FBB7FADFF4A761F000120FA18D9194D771D820CAA0
                                                                      APIs
                                                                      • CallWindowProcW.USER32(?,?,?,?), ref: 6FD91447
                                                                      • DestroyWindow.USER32 ref: 6FD9145E
                                                                      • GetProcessHeap.KERNEL32(00000000), ref: 6FD9146B
                                                                      • HeapFree.KERNEL32(00000000), ref: 6FD91472
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2707158755.000000006FD91000.00000020.00000001.01000000.0000000B.sdmp, Offset: 6FD90000, based on PE: true
                                                                      • Associated: 00000000.00000002.2707011598.000000006FD90000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2707198671.000000006FD93000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2707227440.000000006FD94000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2707243260.000000006FD98000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6fd90000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: HeapWindow$CallDestroyFreeProcProcess
                                                                      • String ID:
                                                                      • API String ID: 1278960361-0
                                                                      • Opcode ID: 67f7198970347bc93942e56b67a0885854a708767ab7294ca05c047faf3665af
                                                                      • Instruction ID: b1167bdb57c106c597fcb9458aedfd37e09ab51135ea4f9a9983f9b4d16f60dd
                                                                      • Opcode Fuzzy Hash: 67f7198970347bc93942e56b67a0885854a708767ab7294ca05c047faf3665af
                                                                      • Instruction Fuzzy Hash: 23011E33500604EBEF428FD5C9099DA7B7DFB4B372B084126F65896162D732B471EB90
                                                                      APIs
                                                                      • DestroyWindow.USER32(00000000,00000000,004031F7,00000001,?,?,?,?,?,0040387D,?), ref: 0040302C
                                                                      • GetTickCount.KERNEL32 ref: 0040304A
                                                                      • CreateDialogParamW.USER32(0000006F,00000000,00402F93,00000000), ref: 00403067
                                                                      • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,0040387D,?), ref: 00403075
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                      • String ID:
                                                                      • API String ID: 2102729457-0
                                                                      • Opcode ID: a982ea5e0a4ecb993fc2e9b794e4afe077943b4b771bcbca33e5c7758572dd30
                                                                      • Instruction ID: 3364d2369d767f53e7c05e99e54cbc9c067443d5da9c9f227d7c3a258cba7bb7
                                                                      • Opcode Fuzzy Hash: a982ea5e0a4ecb993fc2e9b794e4afe077943b4b771bcbca33e5c7758572dd30
                                                                      • Instruction Fuzzy Hash: A9F08270702A20AFC2316F50FE4998B7F68FB44B56741447AF446B15ACCB380DA2CB9D
                                                                      APIs
                                                                      • lstrcmpW.KERNEL32(00000000,6D2550D0,00000000,h<%m,6D252C02,00000000,00000000,Async,00000000,?,?,?,6D2545D3,6D253C68,?,00000000), ref: 6D2519EB
                                                                      • lstrcmpiW.KERNEL32(00000000,false,?,?,?,6D2545D3,6D253C68,?,00000000,00000000), ref: 6D2519FD
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: lstrcmplstrcmpi
                                                                      • String ID: false$h<%m
                                                                      • API String ID: 3524194181-1254420435
                                                                      • Opcode ID: a7fd3ae3246e8b9657a14d57646194791cbb78b815b47d86cf556d50e754676c
                                                                      • Instruction ID: e900be89e74ece1d950269899d86cc0910802866d88f99d826e451a01e71f563
                                                                      • Opcode Fuzzy Hash: a7fd3ae3246e8b9657a14d57646194791cbb78b815b47d86cf556d50e754676c
                                                                      • Instruction Fuzzy Hash: 86E0483129065A5BEB235F119C08F7777D89B09657B1089A4A819D5419D722E4A0D6D0
                                                                      APIs
                                                                      • IsWindowVisible.USER32(?), ref: 00405542
                                                                      • CallWindowProcW.USER32(?,?,?,?), ref: 00405593
                                                                        • Part of subcall function 004044E5: SendMessageW.USER32(00000000,00000000,00000000,00000000), ref: 004044F7
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Window$CallMessageProcSendVisible
                                                                      • String ID:
                                                                      • API String ID: 3748168415-3916222277
                                                                      • Opcode ID: 0dea828d0dd479423763887dac230e90f27d8b8ae518018479b0ad82d517bb95
                                                                      • Instruction ID: 904a7c61355239921aaa7855b64c86422fca6e8886f64d9e6fcbc6a993ea73ec
                                                                      • Opcode Fuzzy Hash: 0dea828d0dd479423763887dac230e90f27d8b8ae518018479b0ad82d517bb95
                                                                      • Instruction Fuzzy Hash: F3017CB1100608BFDF209F11DD80AAB3B27EB84754F50453AFA01762D5D77A8E92DA69
                                                                      APIs
                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000800,00000000,0042C248,00000000,?,?,get,?,?,00406672,80000002), ref: 00406451
                                                                      • RegCloseKey.ADVAPI32(?,?,00406672,80000002,Software\Microsoft\Windows\CurrentVersion,get,get,get,00000000,0042C248), ref: 0040645C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: CloseQueryValue
                                                                      • String ID: get
                                                                      • API String ID: 3356406503-4248514160
                                                                      • Opcode ID: a598e195228f1036644e08b1753da052d1713cd74bd9ea8ab147b12b545f69e3
                                                                      • Instruction ID: a8d415a3dc4e4479eaaa65942f717852bb8bd3539c12dad3b2e52d491ce509ba
                                                                      • Opcode Fuzzy Hash: a598e195228f1036644e08b1753da052d1713cd74bd9ea8ab147b12b545f69e3
                                                                      • Instruction Fuzzy Hash: FB017C72510209AADF21CF51CC09EDB3BB8FB54364F01803AFD5AA6190D738D968DBA8
                                                                      APIs
                                                                      • FreeLibrary.KERNEL32(?,75573420,00000000,C:\Users\user\AppData\Local\Temp\,00403B2F,00403A5E,?), ref: 00403B71
                                                                      • GlobalFree.KERNEL32(?), ref: 00403B78
                                                                      Strings
                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00403B57
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Free$GlobalLibrary
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                                                      • API String ID: 1100898210-4083868402
                                                                      • Opcode ID: 14d9b0f9b7ecca22f0083886da8930ddd6c03ed0d6fdc94ff3a28603f1b7b4ab
                                                                      • Instruction ID: 19c5699a9bb8b3376c06320bd1355d3f7d45777e2bc9a3354ca833756e7661a4
                                                                      • Opcode Fuzzy Hash: 14d9b0f9b7ecca22f0083886da8930ddd6c03ed0d6fdc94ff3a28603f1b7b4ab
                                                                      • Instruction Fuzzy Hash: 40E0EC3290212097C7615F55FE08B6E7B78AF49B26F05056AE884BB2628B746D428BDC
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(00000000,6D253F05,?,6D253F05,?,00000000,?,00000000,00000000,00000000), ref: 6D252578
                                                                      • lstrlenW.KERNEL32(?,6D253F05,?,00000000,00000000,00000000,?,6D251CC7,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 6D252642
                                                                      • lstrlenW.KERNEL32(?,6D253F05,?,6D253F05,?,00000000,?,00000000,00000000,00000000), ref: 6D252607
                                                                        • Part of subcall function 6D25229E: GlobalReAlloc.KERNEL32(00000000,?,00000042), ref: 6D2522D4
                                                                        • Part of subcall function 6D25229E: GetLastError.KERNEL32(?,?,6D252754,00000000,00000000,00000000,6D25510C,00000001,6D253F05,?,00000000,00000000,00000000,?,6D251CC7,00000000), ref: 6D2522DE
                                                                        • Part of subcall function 6D25229E: GlobalFree.KERNEL32(00000000), ref: 6D2522EB
                                                                        • Part of subcall function 6D25229E: lstrcpyW.KERNEL32(?,00000000,00000000,00000000,?,?,?,6D252754,00000000,00000000,00000000,6D25510C,00000001,6D253F05,?,00000000), ref: 6D252319
                                                                      • lstrcpyW.KERNEL32(?,6D255110,00000000,00000000,00000000,?,6D251CC7,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 6D2527AF
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen$Globallstrcpy$AllocErrorFreeLast
                                                                      • String ID:
                                                                      • API String ID: 2385761697-0
                                                                      • Opcode ID: 7731bd25b310bf086e50c6c6ad3b65b6b7491b48f52ae66664cba8686b49a6d5
                                                                      • Instruction ID: ba5dba9f2e53ccc155e49391f0b4f0405b1860c7d256f70564d2149b3643d344
                                                                      • Opcode Fuzzy Hash: 7731bd25b310bf086e50c6c6ad3b65b6b7491b48f52ae66664cba8686b49a6d5
                                                                      • Instruction Fuzzy Hash: 0F714DB518010EBFDF228F548C85EBB3B69EF49308F408014FE24AA1A1D736D971DBA1
                                                                      APIs
                                                                      • GlobalReAlloc.KERNEL32(00000000,?,00000042), ref: 6D2522D4
                                                                      • GetLastError.KERNEL32(?,?,6D252754,00000000,00000000,00000000,6D25510C,00000001,6D253F05,?,00000000,00000000,00000000,?,6D251CC7,00000000), ref: 6D2522DE
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D2522EB
                                                                      • lstrcpyW.KERNEL32(?,00000000,00000000,00000000,?,?,?,6D252754,00000000,00000000,00000000,6D25510C,00000001,6D253F05,?,00000000), ref: 6D252319
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: Global$AllocErrorFreeLastlstrcpy
                                                                      • String ID:
                                                                      • API String ID: 213496960-0
                                                                      • Opcode ID: 227bfb088c4e8522bad8a28c08e5d1ed693349cf48651258480008f91d47f99d
                                                                      • Instruction ID: 22b3235ec26226bda33319020aee91aec18765253dbd0fe22229e89ed7363013
                                                                      • Opcode Fuzzy Hash: 227bfb088c4e8522bad8a28c08e5d1ed693349cf48651258480008f91d47f99d
                                                                      • Instruction Fuzzy Hash: B33139B924020B9FDB25CF19C481E7AB3B5FF49316B60412CED95CB295D730E862CB90
                                                                      APIs
                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000002,00000002,6D2524FE,00000000,00000000,00000000,00000002,7556F360,?,6D2524FE,00000002,00000002), ref: 6D252210
                                                                      • GlobalAlloc.KERNEL32(00000040,?,?,6D2524FE,00000002,00000002), ref: 6D252226
                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000002,00000002,6D2524FE,00000000,00000000,?,?,6D2524FE,00000002,00000002), ref: 6D25223D
                                                                      • GlobalFree.KERNEL32(00000000), ref: 6D25224E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2706659220.000000006D251000.00000020.00000001.01000000.00000007.sdmp, Offset: 6D250000, based on PE: true
                                                                      • Associated: 00000000.00000002.2706638791.000000006D250000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706678319.000000006D255000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2706692445.000000006D257000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_6d250000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharGlobalMultiWide$AllocFree
                                                                      • String ID:
                                                                      • API String ID: 2244543456-0
                                                                      • Opcode ID: 982ddda330cf8c1080a9671532cdc9458ec66bca935fe3c76f857ce00656a525
                                                                      • Instruction ID: 122501877938eb5c6169a1c4b064e45a3f6a212ccac14545234ba16f4f11f739
                                                                      • Opcode Fuzzy Hash: 982ddda330cf8c1080a9671532cdc9458ec66bca935fe3c76f857ce00656a525
                                                                      • Instruction Fuzzy Hash: 8DF04F75244625BBEB210F958C4DF6B7BACEF8A755F804110FA09CA194D770C815CAA0
                                                                      APIs
                                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FA2
                                                                      • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405FBA
                                                                      • CharNextA.USER32(00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FCB
                                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FD4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2705193029.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2705173115.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705241056.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.000000000043A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705260088.0000000000442000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2705398530.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen$CharNextlstrcmpi
                                                                      • String ID:
                                                                      • API String ID: 190613189-0
                                                                      • Opcode ID: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                                                      • Instruction ID: bd09551308ad338638525116890fdadd4ab1f465f5503068af61de479685a4e4
                                                                      • Opcode Fuzzy Hash: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                                                      • Instruction Fuzzy Hash: 34F0C231604418FFC7029BA5CD0099EBBA8EF06250B2140AAF840FB210D678DE019BA9