Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
fbXZ4ErQMU.exe

Overview

General Information

Sample name:fbXZ4ErQMU.exe
renamed because original name is a hash value
Original sample name:9201c98d765025cad9fcbe9095c1f34960b641d38c6a4e999720a0c3c129353f.exe
Analysis ID:1569258
MD5:c58b26e27e2d9aa8080e289445e1c8ca
SHA1:50dc9a8d9735a94a18cf3b35cb3c88217b3d05cd
SHA256:9201c98d765025cad9fcbe9095c1f34960b641d38c6a4e999720a0c3c129353f
Tags:exeuser-adrian__luca
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
PE / OLE file has an invalid certificate
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • fbXZ4ErQMU.exe (PID: 3728 cmdline: "C:\Users\user\Desktop\fbXZ4ErQMU.exe" MD5: C58B26E27E2D9AA8080E289445E1C8CA)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: fbXZ4ErQMU.exeAvira: detected
Source: fbXZ4ErQMU.exeReversingLabs: Detection: 57%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 90.4% probability
Source: fbXZ4ErQMU.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: fbXZ4ErQMU.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeCode function: 1_2_0040646B FindFirstFileA,FindClose,1_2_0040646B
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeCode function: 1_2_004027A1 FindFirstFileA,1_2_004027A1
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeCode function: 1_2_004058BF GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,1_2_004058BF
Source: fbXZ4ErQMU.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
Source: fbXZ4ErQMU.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeCode function: 1_2_0040535C GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,1_2_0040535C
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess Stats: CPU usage > 49%
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeCode function: 1_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,1_2_00403348
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeFile created: C:\Windows\resources\0809Jump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeFile created: C:\Windows\Arder.lnkJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeCode function: 1_2_004069451_2_00406945
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeCode function: 1_2_0040711C1_2_0040711C
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeCode function: 1_2_6EB11A981_2_6EB11A98
Source: fbXZ4ErQMU.exeStatic PE information: invalid certificate
Source: fbXZ4ErQMU.exe, 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameuganderens.exeDVarFileInfo$ vs fbXZ4ErQMU.exe
Source: fbXZ4ErQMU.exeBinary or memory string: OriginalFilenameuganderens.exeDVarFileInfo$ vs fbXZ4ErQMU.exe
Source: fbXZ4ErQMU.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@1/8@0/0
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeCode function: 1_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,1_2_00403348
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeCode function: 1_2_0040460D GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,1_2_0040460D
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeCode function: 1_2_0040216B CoCreateInstance,MultiByteToWideChar,1_2_0040216B
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeFile created: C:\Users\user\tranchetJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeFile created: C:\Users\user\AppData\Local\Temp\nsu400.tmpJump to behavior
Source: fbXZ4ErQMU.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: fbXZ4ErQMU.exeReversingLabs: Detection: 57%
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeFile read: C:\Users\user\Desktop\fbXZ4ErQMU.exeJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: Arder.lnk.1.drLNK file: ..\Users\user\Disannex.And37
Source: fbXZ4ErQMU.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeCode function: 1_2_6EB11A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,1_2_6EB11A98
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeCode function: 1_2_6EB12F60 push eax; ret 1_2_6EB12F8E
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeFile created: C:\Users\user\AppData\Local\Temp\nsk1249.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsk1249.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeCode function: 1_2_0040646B FindFirstFileA,FindClose,1_2_0040646B
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeCode function: 1_2_004027A1 FindFirstFileA,1_2_004027A1
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeCode function: 1_2_004058BF GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,1_2_004058BF
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeAPI call chain: ExitProcess graph end nodegraph_1-4156
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeAPI call chain: ExitProcess graph end nodegraph_1-3980
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeCode function: 1_2_6EB11A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,1_2_6EB11A98
Source: C:\Users\user\Desktop\fbXZ4ErQMU.exeCode function: 1_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,1_2_00403348
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
Access Token Manipulation
11
Masquerading
OS Credential Dumping2
File and Directory Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Access Token Manipulation
LSASS Memory3
System Information Discovery
Remote Desktop Protocol1
Clipboard Data
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
fbXZ4ErQMU.exe58%ReversingLabsWin32.Trojan.Guloader
fbXZ4ErQMU.exe100%AviraTR/Injector.otkux
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\nsk1249.tmp\System.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://nsis.sf.net/NSIS_Error0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://nsis.sf.net/NSIS_ErrorfbXZ4ErQMU.exefalse
  • Avira URL Cloud: safe
unknown
http://nsis.sf.net/NSIS_ErrorErrorfbXZ4ErQMU.exefalse
    high
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1569258
    Start date and time:2024-12-05 16:50:40 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 7m 17s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:12
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:fbXZ4ErQMU.exe
    renamed because original name is a hash value
    Original Sample Name:9201c98d765025cad9fcbe9095c1f34960b641d38c6a4e999720a0c3c129353f.exe
    Detection:MAL
    Classification:mal60.winEXE@1/8@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 47
    • Number of non-executed functions: 29
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Override analysis time to 240s for sample files taking high CPU consumption
    • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, tse1.mm.bing.net, ctldl.windowsupdate.com, g.bing.com, arc.msn.com, fe3cr.delivery.mp.microsoft.com
    • Report size getting too big, too many NtCreateKey calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • VT rate limit hit for: fbXZ4ErQMU.exe
    No simulations
    No context
    No context
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    C:\Users\user\AppData\Local\Temp\nsk1249.tmp\System.dlldIPYIbWXs1.exeGet hashmaliciousUnknownBrowse
      dIPYIbWXs1.exeGet hashmaliciousGuLoaderBrowse
        eAvqHiIsgR.exeGet hashmaliciousGuLoaderBrowse
          eAvqHiIsgR.exeGet hashmaliciousGuLoaderBrowse
            RFQ-24064562-SUPPLY-NOv-ORDER.com.exeGet hashmaliciousRemcos, GuLoaderBrowse
              LkzvfB4VFj.exeGet hashmaliciousFormBook, GuLoaderBrowse
                LkzvfB4VFj.exeGet hashmaliciousGuLoaderBrowse
                  z120X20SO__UK__EKMELAMA.exeGet hashmaliciousGuLoader, RemcosBrowse
                    Quotation-GINC-19-00204.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                      Produkttyper.exeGet hashmaliciousFormBook, GuLoaderBrowse
                        Process:C:\Users\user\Desktop\fbXZ4ErQMU.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):11776
                        Entropy (8bit):5.854450882766351
                        Encrypted:false
                        SSDEEP:192:jPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4I:u7VpNo8gmOyRsVc4
                        MD5:34442E1E0C2870341DF55E1B7B3CCCDC
                        SHA1:99B2FA21AEAD4B6CCD8FF2F6D3D3453A51D9C70C
                        SHA-256:269D232712C86983336BADB40B9E55E80052D8389ED095EBF9214964D43B6BB1
                        SHA-512:4A8C57FB12997438B488B862F3FC9DC0F236E07BB47B2BCE6053DCB03AC7AD171842F02AC749F02DDA4719C681D186330524CD2953D33CB50854844E74B33D51
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Joe Sandbox View:
                        • Filename: dIPYIbWXs1.exe, Detection: malicious, Browse
                        • Filename: dIPYIbWXs1.exe, Detection: malicious, Browse
                        • Filename: eAvqHiIsgR.exe, Detection: malicious, Browse
                        • Filename: eAvqHiIsgR.exe, Detection: malicious, Browse
                        • Filename: RFQ-24064562-SUPPLY-NOv-ORDER.com.exe, Detection: malicious, Browse
                        • Filename: LkzvfB4VFj.exe, Detection: malicious, Browse
                        • Filename: LkzvfB4VFj.exe, Detection: malicious, Browse
                        • Filename: z120X20SO__UK__EKMELAMA.exe, Detection: malicious, Browse
                        • Filename: Quotation-GINC-19-00204.exe, Detection: malicious, Browse
                        • Filename: Produkttyper.exe, Detection: malicious, Browse
                        Reputation:moderate, very likely benign file
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L.....`...........!..... ..........!).......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\fbXZ4ErQMU.exe
                        File Type:ASCII text, with very long lines (65536), with no line terminators
                        Category:dropped
                        Size (bytes):455584
                        Entropy (8bit):2.656352367412479
                        Encrypted:false
                        SSDEEP:3072:ONKMH32ik+9vLI8uCpKGo+JpkP5rGopqtbuUf5j60:Oh32ik+9vXHpK5+JpkBrG+6buUf5j60
                        MD5:23117B3934A86E8695598259FB457193
                        SHA1:A93A91497D007EC9FEB500D6022272BE025A0CEF
                        SHA-256:7C0F10CFF86EA22DBF210D01EF43CB7C5BB6BF4ABAC18151D1D70FEC485FA8A4
                        SHA-512:6D89701A2A6E1D2089EA7EDA900D0F708F18BF419B048B6C4CCB2598D01C593FF7249E44C4B9C96F499EDF8E860A6D7D177D51817D091B410FE68C107E13B044
                        Malicious:false
                        Reputation:low
                        Preview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
                        Process:C:\Users\user\Desktop\fbXZ4ErQMU.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):229378
                        Entropy (8bit):7.492569922983724
                        Encrypted:false
                        SSDEEP:3072:Tq6BlW6gYV7fcXEjHoHv/0TQPEQjtZoL9VWToGyQV6U7HTehRHsWL83:TqslW6LV7UXSoPsbQjtkFGTeUl3
                        MD5:BB8D669BD88B3093874F7BF94B0D5746
                        SHA1:CAA0D57B29D39044BD4D003086D370F6666A8F5A
                        SHA-256:E7911C7E36701424FB672BE8FDB7E13F66197E1B14841740A24821B98CB1D510
                        SHA-512:E959EB6F2A45146DF2BFD26618A5A6567DCFE4B43643637B5429E5BED24112D340B42DD2CCC2A5BB2D95C6F862A7AF68079AD77E9B6672257B9EED39C8BD91F6
                        Malicious:false
                        Reputation:low
                        Preview:.....666666.^^..............ee...........m....2.......aaaaaa.7...........M............................aaa._.||..b...9....@.^.......'..tt.....S.............................l......ss.555555............S...............l....h..............RRRR....1.........X..pp.....V.K.........FFF..........................1..................>>....i.R...!!!.............I.QQ........................................eee....................................----...................................................'.....5.....5..#...ww........................n.......999.k.iiiii......,,.^^.JJJ...........].....ee.W.TT.....K................W.,................VVV.n............................................D.....................................j......|...YY.XX............2.....www............ZZ.P...........|||||.....................;.2..I..............P.FF.[............\.......................ee.........................???......................................A...........@@.....#.G..'.........................IIII....F.
                        Process:C:\Users\user\Desktop\fbXZ4ErQMU.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):485127
                        Entropy (8bit):1.2565961974341746
                        Encrypted:false
                        SSDEEP:768:bgBMgq+aLnwfPnz/Km1iLGyDPiU55NCk+T93YpnK77oTpvYP3knePjlW0kwNGL+q:XQ3wvosOsCpxFJrXSBmHzTu58UR
                        MD5:580D05E679E74B036B55CA8E5FF32769
                        SHA1:10175C43AB7B725FFFCF770EB2C3555E91D3BA13
                        SHA-256:B3E34975017C193D4672BEC42BC52B55F8AE1F1D5F30D56DCFD0B3A4242C3BE4
                        SHA-512:0E26F0084BED372785A5E8C8BE3A0717074AA52C2E8B5413FA9F2CB8DEED40BF8BDBF15C411EFFA432A8B96E50AE6085E8F90A97350827AFAA1BE1AB4B3E1643
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview:.................3.........................................=.....................................`.............................................................................n........................... .L.........................(,.b...e.......\...............................u.....................[.............................n........................[........................................c...........................W...........................................................*..].h.............R..............................................*............................^.....$.....w...................................................p...............................................................$.t...................................w*....................b....E.......................|.............5.......E................................................P.........d..................vl...........}..."..................................1.............................k.....7...............
                        Process:C:\Users\user\Desktop\fbXZ4ErQMU.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):389868
                        Entropy (8bit):1.2469892412772452
                        Encrypted:false
                        SSDEEP:768:8mGX5iY6YFC1hSNYG8n6aCKBHwcX7e3ZNrt7qNIxKpGEopKfWOO72cDEDQ+7IF5i:m5ittaAwW6q8KH13QyOgs2w
                        MD5:2A500E1219C4894E2D45C32C5A5A11FD
                        SHA1:AC9A88DE4C84E1EB8A535E1061CBC6584380D24E
                        SHA-256:C65F223375C6DFE8CE71213D5DD24F39CDE31F772D2C66521BF07B21BE45E6C1
                        SHA-512:89ED91AF91CF969FE7EC087EE107B52959582615EFB2AB72A21D6C3820E5BDDA78EE02EB39BB323FD996D85510627387616DF8917B12052A62D288D8E9448596
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview:...........................E.....................................................................<......................].....f........................_...G..........S....................................@...............j...................................................I...................|..C..........................................................d......%t..........N..................d...Q...........p....3..........................................L...........y...............................-........................................................................@.........]..3........A................................*............................................................................................@...........(............................{..4......................................k.................{.....................W.................,......+...............K....b.......................!.............................H..)..........................E..........................
                        Process:C:\Users\user\Desktop\fbXZ4ErQMU.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):442363
                        Entropy (8bit):1.2533707838755617
                        Encrypted:false
                        SSDEEP:1536:f6KFImN7hPg1fMcZ9pkK6m1rmkrDAji7VW9EgfrY:PyMtabPE+7ctfM
                        MD5:5465B75724C031B21C018F7D72941F72
                        SHA1:98176B27A41A35401A96D0AAC0859EEC25A4C5FE
                        SHA-256:7390780C6FB1F7B57C950A11AE287127CB6144CE9AD1C26E8C242BADB685729B
                        SHA-512:7084191B13FF854943DEE9FB6DDC1D7F89D06055FF4DA7E04DA1C359B557AC22762209B8DFE061F3AF628DF077E1D1D1009E9F9A18E3C9441AEE7FD4FDFF1688
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview:.........................................................................|......................................v..g..................................................................C...........`.......................................... ...............#.....................K..0.................\................................4.......................................y...................."........k..............9.H.................................................................."...........m............................6...................................................E..)..........[..............TZ..............Q............_...........$...... ..........................W....................................................y..................................q......!.................................... .....................o..........*........................................................................[..............9..................s....;..........................................
                        Process:C:\Users\user\Desktop\fbXZ4ErQMU.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):521
                        Entropy (8bit):4.284169749449499
                        Encrypted:false
                        SSDEEP:12:7+SriF8i+WUQDJBYqRIE47W0BvM71ARi9ulhji4JDQCr6K:7tuZ+d6/GEUI18jhJsCr6K
                        MD5:B089BD0CBC944DE0B1023E6CE9318BD3
                        SHA1:715FA74E243D5C3419519E7371ED1836C9BCFA4A
                        SHA-256:1E8ABB4A5E85595B0EF2FC73E9012EDDFE1BCB7363E90A2EA46F561DD3742F93
                        SHA-512:A164EB2AB02E612E9F96531006C4A71B8D6E8EA6444D86907CB15EF2C1AAB4680EAF3BB580C6A1D5B89A3F454F3E532242FC1DE2B71A9FFF56F812F6E4638885
                        Malicious:false
                        Preview:dibasic skinnebenssaarenes rembrandt unembayed timerne ependytes overtorturing.ruskindenes cellemembranen visirs daarligste bartholomeuss eslabon trflen communizations karikaturtegners forsgsstadiet hillocked..perfumers afplukker simonized jubilumsmiddags dolktids spokane milliontedel indfoertes dour..margented pomerans semicylindrical skifferolies kernerelationerne univalent,tiltrdelsesforelsning hydrion caggy stabejserne figurist vt klutzier bendy hanekamme..duilin molompi cuartino fornagl tortricoidea unhurrying.
                        Process:C:\Users\user\Desktop\fbXZ4ErQMU.exe
                        File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                        Category:dropped
                        Size (bytes):748
                        Entropy (8bit):3.258132022150919
                        Encrypted:false
                        SSDEEP:12:8wl0nsX2loGlnEE1EfV3w/g/+CNJkKAb4t2YZ/elFlSJm:8Y0v1cG/4PHAJqy
                        MD5:5B6F2EC922BDE3B31269E52EE1FEB3BF
                        SHA1:86A242E66674B73C06B1FD453BDB90443538DF5E
                        SHA-256:3486CC0FEDD42B0CA86D2472416EC62E68DBC03128EFA8B4C4B559BB664FA08A
                        SHA-512:865586291EB2369A71611B7BD56A25270C05C7409048CE8E084715C6790B3250A5DB568742F8C00774435F33C2D129BB3839980B811263A4D5544D45D648A05F
                        Malicious:false
                        Preview:L..................F........................................................E....P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....Z.1...........user..B............................................e.n.g.i.n.e.e.r.....l.2...........Disannex.And37..N............................................D.i.s.a.n.n.e.x...A.n.d.3.7....... .....\.U.s.e.r.s.\.e.n.g.i.n.e.e.r.\.D.i.s.a.n.n.e.x...A.n.d.3.7.&.C.:.\.U.s.e.r.s.\.e.n.g.i.n.e.e.r.\.t.r.a.n.c.h.e.t.\.T.r.y.k.m.a.a.l.e.r.e.........(.................l^".`G...3..qs................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.3.................
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                        Entropy (8bit):7.5537524720559555
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:fbXZ4ErQMU.exe
                        File size:901'168 bytes
                        MD5:c58b26e27e2d9aa8080e289445e1c8ca
                        SHA1:50dc9a8d9735a94a18cf3b35cb3c88217b3d05cd
                        SHA256:9201c98d765025cad9fcbe9095c1f34960b641d38c6a4e999720a0c3c129353f
                        SHA512:e5fae7426e750146275dc91004378503555d068bcf60446d9b4ed1a082a95889fb1cfdf05f857a1d454681763bf24454f27410cd8086faed75edc2fa157a301c
                        SSDEEP:24576:yiGFaq43NvCl4+wlZdujTrlsJAvOnMJ/QOea:yiGFu3NvIwSdsJUCMJ/qa
                        TLSH:4B151262F600D9AAD4318F718DAFD196EAD17E2528650B8B7F9D7B2FACB1050C10F225
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG..sw..PG..VA..PG.Rich.PG.........PE..L... ..`.................f...|......H3............@
                        Icon Hash:0e13672535353f1c
                        Entrypoint:0x403348
                        Entrypoint Section:.text
                        Digitally signed:true
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Time Stamp:0x60FC9220 [Sat Jul 24 22:20:16 2021 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:ced282d9b261d1462772017fe2f6972b
                        Signature Valid:false
                        Signature Issuer:CN="Genfundet Klimaeksperter trichloromethyl ", E=frsteviolinerne@Spayad.Nat, L=Puls, S=Schleswig-Holstein, C=DE
                        Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                        Error Number:-2146762487
                        Not Before, Not After
                        • 03/03/2024 03:35:28 03/03/2027 03:35:28
                        Subject Chain
                        • CN="Genfundet Klimaeksperter trichloromethyl ", E=frsteviolinerne@Spayad.Nat, L=Puls, S=Schleswig-Holstein, C=DE
                        Version:3
                        Thumbprint MD5:7F4300F89CB33F3547D88A3CF12D3064
                        Thumbprint SHA-1:6744129A179DDD70100E4EF2E477E7017324962E
                        Thumbprint SHA-256:F5A72CA616B49A6ACBAA0063F9BC40694B0F283A502262C92A5E0E69F2EE0F0F
                        Serial:2CC20419A347B6321BC816E32297152DFB393513
                        Instruction
                        sub esp, 00000184h
                        push ebx
                        push esi
                        push edi
                        xor ebx, ebx
                        push 00008001h
                        mov dword ptr [esp+18h], ebx
                        mov dword ptr [esp+10h], 0040A198h
                        mov dword ptr [esp+20h], ebx
                        mov byte ptr [esp+14h], 00000020h
                        call dword ptr [004080B8h]
                        call dword ptr [004080BCh]
                        and eax, BFFFFFFFh
                        cmp ax, 00000006h
                        mov dword ptr [0042F42Ch], eax
                        je 00007F6054C679C3h
                        push ebx
                        call 00007F6054C6AB26h
                        cmp eax, ebx
                        je 00007F6054C679B9h
                        push 00000C00h
                        call eax
                        mov esi, 004082A0h
                        push esi
                        call 00007F6054C6AAA2h
                        push esi
                        call dword ptr [004080CCh]
                        lea esi, dword ptr [esi+eax+01h]
                        cmp byte ptr [esi], bl
                        jne 00007F6054C6799Dh
                        push 0000000Bh
                        call 00007F6054C6AAFAh
                        push 00000009h
                        call 00007F6054C6AAF3h
                        push 00000007h
                        mov dword ptr [0042F424h], eax
                        call 00007F6054C6AAE7h
                        cmp eax, ebx
                        je 00007F6054C679C1h
                        push 0000001Eh
                        call eax
                        test eax, eax
                        je 00007F6054C679B9h
                        or byte ptr [0042F42Fh], 00000040h
                        push ebp
                        call dword ptr [00408038h]
                        push ebx
                        call dword ptr [00408288h]
                        mov dword ptr [0042F4F8h], eax
                        push ebx
                        lea eax, dword ptr [esp+38h]
                        push 00000160h
                        push eax
                        push ebx
                        push 00429850h
                        call dword ptr [0040816Ch]
                        push 0040A188h
                        Programming Language:
                        • [EXP] VC++ 6.0 SP5 build 8804
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x85440xa0.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x580000x41dd0.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0xdac500x13e0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x80000x29c.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x64570x6600f6e38befa56abea7a550141c731da779False0.6682368259803921data6.434985703212657IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x80000x13800x1400569269e9338b2e8ce268ead1326e2b0bFalse0.4625data5.2610038973135005IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xa0000x255380x60017edd496e40111b5a48947c480fda13cFalse0.4635416666666667data4.133728555004788IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .ndata0x300000x280000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0x580000x41dd00x41e0051f103b856396aac282c5bd5a24beff1False0.6063619248102466data5.8960782160116745IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0x583b80x130caPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.998410786148207
                        RT_ICON0x6b4880x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.40775464332189754
                        RT_ICON0x7bcb00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.4554866512507883
                        RT_ICON0x851580x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 26560EnglishUnited States0.462218045112782
                        RT_ICON0x8b9400x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.4729667282809612
                        RT_ICON0x90dc80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.46835144071799717
                        RT_ICON0x94ff00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5149377593360995
                        RT_ICON0x975980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.5457317073170732
                        RT_ICON0x986400x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.6073770491803279
                        RT_ICON0x98fc80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6719858156028369
                        RT_DIALOG0x994300x100dataEnglishUnited States0.5234375
                        RT_DIALOG0x995300x11cdataEnglishUnited States0.6056338028169014
                        RT_DIALOG0x996500xc4dataEnglishUnited States0.5918367346938775
                        RT_DIALOG0x997180x60dataEnglishUnited States0.7291666666666666
                        RT_GROUP_ICON0x997780x92Targa image data - Map 32 x 12490 x 1 +1EnglishUnited States0.7191780821917808
                        RT_VERSION0x998100x27cdataEnglishUnited States0.5
                        RT_MANIFEST0x99a900x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                        DLLImport
                        ADVAPI32.dllRegCreateKeyExA, RegEnumKeyA, RegQueryValueExA, RegSetValueExA, RegCloseKey, RegDeleteValueA, RegDeleteKeyA, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, SetFileSecurityA, RegOpenKeyExA, RegEnumValueA
                        SHELL32.dllSHGetFileInfoA, SHFileOperationA, SHGetPathFromIDListA, ShellExecuteExA, SHGetSpecialFolderLocation, SHBrowseForFolderA
                        ole32.dllIIDFromString, OleInitialize, OleUninitialize, CoCreateInstance, CoTaskMemFree
                        COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                        USER32.dllSetClipboardData, CharPrevA, CallWindowProcA, PeekMessageA, DispatchMessageA, MessageBoxIndirectA, GetDlgItemTextA, SetDlgItemTextA, GetSystemMetrics, CreatePopupMenu, AppendMenuA, TrackPopupMenu, FillRect, EmptyClipboard, LoadCursorA, GetMessagePos, CheckDlgButton, GetSysColor, SetCursor, GetWindowLongA, SetClassLongA, SetWindowPos, IsWindowEnabled, GetWindowRect, GetSystemMenu, EnableMenuItem, RegisterClassA, ScreenToClient, EndDialog, GetClassInfoA, SystemParametersInfoA, CreateWindowExA, ExitWindowsEx, DialogBoxParamA, CharNextA, SetTimer, DestroyWindow, CreateDialogParamA, SetForegroundWindow, SetWindowTextA, PostQuitMessage, SendMessageTimeoutA, ShowWindow, wsprintfA, GetDlgItem, FindWindowExA, IsWindow, GetDC, SetWindowLongA, LoadImageA, InvalidateRect, ReleaseDC, EnableWindow, BeginPaint, SendMessageA, DefWindowProcA, DrawTextA, GetClientRect, EndPaint, IsWindowVisible, CloseClipboard, OpenClipboard
                        GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectA, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                        KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetProcAddress, GetSystemDirectoryA, WideCharToMultiByte, MoveFileExA, ReadFile, GetTempFileNameA, WriteFile, RemoveDirectoryA, CreateProcessA, CreateFileA, GetLastError, CreateThread, CreateDirectoryA, GlobalUnlock, GetDiskFreeSpaceA, GlobalLock, SetErrorMode, GetVersion, lstrcpynA, GetCommandLineA, GetTempPathA, lstrlenA, SetEnvironmentVariableA, ExitProcess, GetWindowsDirectoryA, GetCurrentProcess, GetModuleFileNameA, CopyFileA, GetTickCount, Sleep, GetFileSize, GetFileAttributesA, SetCurrentDirectoryA, SetFileAttributesA, GetFullPathNameA, GetShortPathNameA, MoveFileA, CompareFileTime, SetFileTime, SearchPathA, lstrcmpiA, lstrcmpA, CloseHandle, GlobalFree, GlobalAlloc, ExpandEnvironmentStringsA, LoadLibraryExA, FreeLibrary, lstrcpyA, lstrcatA, FindClose, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, SetFilePointer, GetModuleHandleA, FindNextFileA, FindFirstFileA, DeleteFileA, MulDiv
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        No network behavior found

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Target ID:1
                        Start time:10:51:42
                        Start date:05/12/2024
                        Path:C:\Users\user\Desktop\fbXZ4ErQMU.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\fbXZ4ErQMU.exe"
                        Imagebase:0x400000
                        File size:901'168 bytes
                        MD5 hash:C58B26E27E2D9AA8080E289445E1C8CA
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:18.9%
                          Dynamic/Decrypted Code Coverage:14%
                          Signature Coverage:16.4%
                          Total number of Nodes:1541
                          Total number of Limit Nodes:46
                          execution_graph 4866 401d44 4867 402bac 17 API calls 4866->4867 4868 401d52 SetWindowLongA 4867->4868 4869 402a5a 4868->4869 3864 401ec5 3872 402bac 3864->3872 3866 401ecb 3867 402bac 17 API calls 3866->3867 3868 401ed7 3867->3868 3869 401ee3 ShowWindow 3868->3869 3870 401eee EnableWindow 3868->3870 3871 402a5a 3869->3871 3870->3871 3875 40618a 3872->3875 3874 402bc1 3874->3866 3888 406197 3875->3888 3876 4063b9 3877 4063ce 3876->3877 3908 4060f7 lstrcpynA 3876->3908 3877->3874 3879 406393 lstrlenA 3879->3888 3882 40618a 10 API calls 3882->3879 3884 4062af GetSystemDirectoryA 3884->3888 3885 4062c2 GetWindowsDirectoryA 3885->3888 3887 4062f6 SHGetSpecialFolderLocation 3887->3888 3891 40630e SHGetPathFromIDListA CoTaskMemFree 3887->3891 3888->3876 3888->3879 3888->3882 3888->3884 3888->3885 3888->3887 3889 40618a 10 API calls 3888->3889 3890 40633c lstrcatA 3888->3890 3892 405fde 3888->3892 3897 4063d2 3888->3897 3906 406055 wsprintfA 3888->3906 3907 4060f7 lstrcpynA 3888->3907 3889->3888 3890->3888 3891->3888 3909 405f7d 3892->3909 3895 406012 RegQueryValueExA RegCloseKey 3896 406041 3895->3896 3896->3888 3903 4063de 3897->3903 3898 406446 3899 40644a CharPrevA 3898->3899 3901 406465 3898->3901 3899->3898 3900 40643b CharNextA 3900->3898 3900->3903 3901->3888 3903->3898 3903->3900 3904 406429 CharNextA 3903->3904 3905 406436 CharNextA 3903->3905 3913 405aba 3903->3913 3904->3903 3905->3900 3906->3888 3907->3888 3908->3877 3910 405f8c 3909->3910 3911 405f90 3910->3911 3912 405f95 RegOpenKeyExA 3910->3912 3911->3895 3911->3896 3912->3911 3914 405ac0 3913->3914 3915 405ad3 3914->3915 3916 405ac6 CharNextA 3914->3916 3915->3903 3916->3914 3917 401746 3923 402bce 3917->3923 3921 401754 3922 405cbf 2 API calls 3921->3922 3922->3921 3924 402bda 3923->3924 3925 40618a 17 API calls 3924->3925 3926 402bfb 3925->3926 3927 40174d 3926->3927 3928 4063d2 5 API calls 3926->3928 3929 405cbf 3927->3929 3928->3927 3930 405cca GetTickCount GetTempFileNameA 3929->3930 3931 405cfb 3930->3931 3932 405cf7 3930->3932 3931->3921 3932->3930 3932->3931 4870 6eb11837 4871 6eb1185a 4870->4871 4872 6eb1188a GlobalFree 4871->4872 4873 6eb1189c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 4871->4873 4872->4873 4874 6eb11266 2 API calls 4873->4874 4875 6eb11a1e GlobalFree GlobalFree 4874->4875 4876 4045c6 4877 4045d6 4876->4877 4878 4045fc 4876->4878 4883 40417b 4877->4883 4886 4041e2 4878->4886 4882 4045e3 SetDlgItemTextA 4882->4878 4884 40618a 17 API calls 4883->4884 4885 404186 SetDlgItemTextA 4884->4885 4885->4882 4887 4042a5 4886->4887 4888 4041fa GetWindowLongA 4886->4888 4888->4887 4889 40420f 4888->4889 4889->4887 4890 40423c GetSysColor 4889->4890 4891 40423f 4889->4891 4890->4891 4892 404245 SetTextColor 4891->4892 4893 40424f SetBkMode 4891->4893 4892->4893 4894 404267 GetSysColor 4893->4894 4895 40426d 4893->4895 4894->4895 4896 404274 SetBkColor 4895->4896 4897 40427e 4895->4897 4896->4897 4897->4887 4898 404291 DeleteObject 4897->4898 4899 404298 CreateBrushIndirect 4897->4899 4898->4899 4899->4887 4900 401947 4901 402bce 17 API calls 4900->4901 4902 40194e lstrlenA 4901->4902 4903 402620 4902->4903 3933 403348 SetErrorMode GetVersion 3934 403389 3933->3934 3937 40338f 3933->3937 3935 406500 5 API calls 3934->3935 3935->3937 4023 406492 GetSystemDirectoryA 3937->4023 3938 4033a5 lstrlenA 3938->3937 3939 4033b4 3938->3939 4026 406500 GetModuleHandleA 3939->4026 3942 406500 5 API calls 3943 4033c2 3942->3943 3944 406500 5 API calls 3943->3944 3945 4033ce #17 OleInitialize SHGetFileInfoA 3944->3945 4032 4060f7 lstrcpynA 3945->4032 3948 40341a GetCommandLineA 4033 4060f7 lstrcpynA 3948->4033 3950 40342c 3951 405aba CharNextA 3950->3951 3952 403455 CharNextA 3951->3952 3960 403465 3952->3960 3953 40352f 3954 403542 GetTempPathA 3953->3954 4034 403317 3954->4034 3956 40355a 3957 4035b4 DeleteFileA 3956->3957 3958 40355e GetWindowsDirectoryA lstrcatA 3956->3958 4044 402ea1 GetTickCount GetModuleFileNameA 3957->4044 3961 403317 12 API calls 3958->3961 3959 405aba CharNextA 3959->3960 3960->3953 3960->3959 3964 403531 3960->3964 3963 40357a 3961->3963 3963->3957 3968 40357e GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 3963->3968 4129 4060f7 lstrcpynA 3964->4129 3965 4035c8 3966 40365e 3965->3966 3969 40364e 3965->3969 3973 405aba CharNextA 3965->3973 4146 403830 3966->4146 3971 403317 12 API calls 3968->3971 4072 40390a 3969->4072 3975 4035ac 3971->3975 3976 4035e3 3973->3976 3975->3957 3975->3966 3983 403629 3976->3983 3984 40368e 3976->3984 3977 403796 3980 403818 ExitProcess 3977->3980 3981 40379e GetCurrentProcess OpenProcessToken 3977->3981 3978 403678 4153 405813 3978->4153 3986 4037e9 3981->3986 3987 4037b9 LookupPrivilegeValueA AdjustTokenPrivileges 3981->3987 4130 405b7d 3983->4130 4157 40577e 3984->4157 3990 406500 5 API calls 3986->3990 3987->3986 3993 4037f0 3990->3993 3994 403805 ExitWindowsEx 3993->3994 3997 403811 3993->3997 3994->3980 3994->3997 3995 4036a4 lstrcatA 3996 4036af lstrcatA lstrcmpiA 3995->3996 3996->3966 3999 4036cb 3996->3999 4177 40140b 3997->4177 4002 4036d0 3999->4002 4003 4036d7 3999->4003 4001 403643 4145 4060f7 lstrcpynA 4001->4145 4160 4056e4 CreateDirectoryA 4002->4160 4165 405761 CreateDirectoryA 4003->4165 4008 4036dc SetCurrentDirectoryA 4009 4036f6 4008->4009 4010 4036eb 4008->4010 4169 4060f7 lstrcpynA 4009->4169 4168 4060f7 lstrcpynA 4010->4168 4013 40618a 17 API calls 4014 403735 DeleteFileA 4013->4014 4015 403742 CopyFileA 4014->4015 4020 403704 4014->4020 4015->4020 4016 40378a 4017 405ed6 36 API calls 4016->4017 4017->3966 4019 40618a 17 API calls 4019->4020 4020->4013 4020->4016 4020->4019 4022 403776 CloseHandle 4020->4022 4170 405ed6 MoveFileExA 4020->4170 4174 405796 CreateProcessA 4020->4174 4022->4020 4024 4064b4 wsprintfA LoadLibraryExA 4023->4024 4024->3938 4027 406526 GetProcAddress 4026->4027 4028 40651c 4026->4028 4030 4033bb 4027->4030 4029 406492 3 API calls 4028->4029 4031 406522 4029->4031 4030->3942 4031->4027 4031->4030 4032->3948 4033->3950 4035 4063d2 5 API calls 4034->4035 4037 403323 4035->4037 4036 40332d 4036->3956 4037->4036 4180 405a8f lstrlenA CharPrevA 4037->4180 4040 405761 2 API calls 4041 40333b 4040->4041 4042 405cbf 2 API calls 4041->4042 4043 403346 4042->4043 4043->3956 4183 405c90 GetFileAttributesA CreateFileA 4044->4183 4046 402ee1 4064 402ef1 4046->4064 4184 4060f7 lstrcpynA 4046->4184 4048 402f07 4185 405ad6 lstrlenA 4048->4185 4052 402f18 GetFileSize 4057 402f2f 4052->4057 4069 403012 4052->4069 4054 40301b 4056 40304b GlobalAlloc 4054->4056 4054->4064 4225 403300 SetFilePointer 4054->4225 4201 403300 SetFilePointer 4056->4201 4059 40307e 4057->4059 4057->4064 4068 402e3d 6 API calls 4057->4068 4057->4069 4222 4032ea 4057->4222 4061 402e3d 6 API calls 4059->4061 4061->4064 4062 403034 4065 4032ea ReadFile 4062->4065 4063 403066 4202 4030d8 4063->4202 4064->3965 4067 40303f 4065->4067 4067->4056 4067->4064 4068->4057 4190 402e3d 4069->4190 4071 4030af SetFilePointer 4071->4064 4073 406500 5 API calls 4072->4073 4074 40391e 4073->4074 4075 403924 4074->4075 4076 403936 4074->4076 4254 406055 wsprintfA 4075->4254 4077 405fde 3 API calls 4076->4077 4078 403961 4077->4078 4080 40397f lstrcatA 4078->4080 4082 405fde 3 API calls 4078->4082 4081 403934 4080->4081 4246 403bcf 4081->4246 4082->4080 4085 405b7d 18 API calls 4086 4039b1 4085->4086 4087 403a3a 4086->4087 4089 405fde 3 API calls 4086->4089 4088 405b7d 18 API calls 4087->4088 4090 403a40 4088->4090 4091 4039dd 4089->4091 4092 403a50 LoadImageA 4090->4092 4093 40618a 17 API calls 4090->4093 4091->4087 4097 4039f9 lstrlenA 4091->4097 4100 405aba CharNextA 4091->4100 4094 403af6 4092->4094 4095 403a77 RegisterClassA 4092->4095 4093->4092 4096 40140b 2 API calls 4094->4096 4098 403aad SystemParametersInfoA CreateWindowExA 4095->4098 4128 403b00 4095->4128 4099 403afc 4096->4099 4101 403a07 lstrcmpiA 4097->4101 4102 403a2d 4097->4102 4098->4094 4107 403bcf 18 API calls 4099->4107 4099->4128 4105 4039f7 4100->4105 4101->4102 4103 403a17 GetFileAttributesA 4101->4103 4104 405a8f 3 API calls 4102->4104 4106 403a23 4103->4106 4108 403a33 4104->4108 4105->4097 4106->4102 4109 405ad6 2 API calls 4106->4109 4110 403b0d 4107->4110 4255 4060f7 lstrcpynA 4108->4255 4109->4102 4112 403b19 ShowWindow 4110->4112 4113 403b9c 4110->4113 4115 406492 3 API calls 4112->4115 4256 4052f0 OleInitialize 4113->4256 4117 403b31 4115->4117 4116 403ba2 4118 403ba6 4116->4118 4119 403bbe 4116->4119 4120 403b3f GetClassInfoA 4117->4120 4122 406492 3 API calls 4117->4122 4125 40140b 2 API calls 4118->4125 4118->4128 4121 40140b 2 API calls 4119->4121 4123 403b53 GetClassInfoA RegisterClassA 4120->4123 4124 403b69 DialogBoxParamA 4120->4124 4121->4128 4122->4120 4123->4124 4126 40140b 2 API calls 4124->4126 4125->4128 4127 403b91 4126->4127 4127->4128 4128->3966 4129->3954 4274 4060f7 lstrcpynA 4130->4274 4132 405b8e 4275 405b28 CharNextA CharNextA 4132->4275 4135 403634 4135->3966 4144 4060f7 lstrcpynA 4135->4144 4136 4063d2 5 API calls 4142 405ba4 4136->4142 4137 405bcf lstrlenA 4138 405bda 4137->4138 4137->4142 4139 405a8f 3 API calls 4138->4139 4141 405bdf GetFileAttributesA 4139->4141 4141->4135 4142->4135 4142->4137 4143 405ad6 2 API calls 4142->4143 4281 40646b FindFirstFileA 4142->4281 4143->4137 4144->4001 4145->3969 4147 403848 4146->4147 4148 40383a CloseHandle 4146->4148 4284 403875 4147->4284 4148->4147 4154 405828 4153->4154 4155 40583c MessageBoxIndirectA 4154->4155 4156 403686 ExitProcess 4154->4156 4155->4156 4158 406500 5 API calls 4157->4158 4159 403693 lstrcatA 4158->4159 4159->3995 4159->3996 4161 4036d5 4160->4161 4162 405735 GetLastError 4160->4162 4161->4008 4162->4161 4163 405744 SetFileSecurityA 4162->4163 4163->4161 4164 40575a GetLastError 4163->4164 4164->4161 4166 405771 4165->4166 4167 405775 GetLastError 4165->4167 4166->4008 4167->4166 4168->4009 4169->4020 4171 405ef7 4170->4171 4172 405eea 4170->4172 4171->4020 4341 405d66 4172->4341 4175 4057d5 4174->4175 4176 4057c9 CloseHandle 4174->4176 4175->4020 4176->4175 4178 401389 2 API calls 4177->4178 4179 401420 4178->4179 4179->3980 4181 403335 4180->4181 4182 405aa9 lstrcatA 4180->4182 4181->4040 4182->4181 4183->4046 4184->4048 4186 405ae3 4185->4186 4187 402f0d 4186->4187 4188 405ae8 CharPrevA 4186->4188 4189 4060f7 lstrcpynA 4187->4189 4188->4186 4188->4187 4189->4052 4191 402e46 4190->4191 4192 402e5e 4190->4192 4193 402e56 4191->4193 4194 402e4f DestroyWindow 4191->4194 4195 402e66 4192->4195 4196 402e6e GetTickCount 4192->4196 4193->4054 4194->4193 4226 40653c 4195->4226 4198 402e7c CreateDialogParamA ShowWindow 4196->4198 4199 402e9f 4196->4199 4198->4199 4199->4054 4201->4063 4203 4030ee 4202->4203 4204 40311c 4203->4204 4232 403300 SetFilePointer 4203->4232 4206 4032ea ReadFile 4204->4206 4207 403127 4206->4207 4208 403072 4207->4208 4209 403283 4207->4209 4210 403139 GetTickCount 4207->4210 4208->4064 4208->4071 4211 4032c5 4209->4211 4215 403287 4209->4215 4210->4208 4214 403188 4210->4214 4213 4032ea ReadFile 4211->4213 4212 4032ea ReadFile 4212->4214 4213->4208 4214->4208 4214->4212 4218 4031de GetTickCount 4214->4218 4219 403203 MulDiv wsprintfA 4214->4219 4230 405d37 WriteFile 4214->4230 4215->4208 4216 4032ea ReadFile 4215->4216 4217 405d37 WriteFile 4215->4217 4216->4215 4217->4215 4218->4214 4233 40521e 4219->4233 4244 405d08 ReadFile 4222->4244 4225->4062 4227 406559 PeekMessageA 4226->4227 4228 402e6c 4227->4228 4229 40654f DispatchMessageA 4227->4229 4228->4054 4229->4227 4231 405d55 4230->4231 4231->4214 4232->4204 4234 405239 4233->4234 4243 4052dc 4233->4243 4235 405256 lstrlenA 4234->4235 4236 40618a 17 API calls 4234->4236 4237 405264 lstrlenA 4235->4237 4238 40527f 4235->4238 4236->4235 4239 405276 lstrcatA 4237->4239 4237->4243 4240 405292 4238->4240 4241 405285 SetWindowTextA 4238->4241 4239->4238 4242 405298 SendMessageA SendMessageA SendMessageA 4240->4242 4240->4243 4241->4240 4242->4243 4243->4214 4245 4032fd 4244->4245 4245->4057 4247 403be3 4246->4247 4263 406055 wsprintfA 4247->4263 4249 403c54 4264 403c88 4249->4264 4251 40398f 4251->4085 4252 403c59 4252->4251 4253 40618a 17 API calls 4252->4253 4253->4252 4254->4081 4255->4087 4267 4041c7 4256->4267 4258 405313 4262 40533a 4258->4262 4270 401389 4258->4270 4259 4041c7 SendMessageA 4260 40534c OleUninitialize 4259->4260 4260->4116 4262->4259 4263->4249 4265 40618a 17 API calls 4264->4265 4266 403c96 SetWindowTextA 4265->4266 4266->4252 4268 4041d0 SendMessageA 4267->4268 4269 4041df 4267->4269 4268->4269 4269->4258 4272 401390 4270->4272 4271 4013fe 4271->4258 4272->4271 4273 4013cb MulDiv SendMessageA 4272->4273 4273->4272 4274->4132 4276 405b43 4275->4276 4278 405b53 4275->4278 4277 405b4e CharNextA 4276->4277 4276->4278 4280 405b73 4277->4280 4279 405aba CharNextA 4278->4279 4278->4280 4279->4278 4280->4135 4280->4136 4282 406481 FindClose 4281->4282 4283 40648c 4281->4283 4282->4283 4283->4142 4285 403883 4284->4285 4286 40384d 4285->4286 4287 403888 FreeLibrary GlobalFree 4285->4287 4288 4058bf 4286->4288 4287->4286 4287->4287 4289 405b7d 18 API calls 4288->4289 4290 4058df 4289->4290 4291 4058e7 DeleteFileA 4290->4291 4292 4058fe 4290->4292 4293 403667 OleUninitialize 4291->4293 4294 405a2c 4292->4294 4328 4060f7 lstrcpynA 4292->4328 4293->3977 4293->3978 4294->4293 4299 40646b 2 API calls 4294->4299 4296 405924 4297 405937 4296->4297 4298 40592a lstrcatA 4296->4298 4301 405ad6 2 API calls 4297->4301 4300 40593d 4298->4300 4302 405a50 4299->4302 4303 40594b lstrcatA 4300->4303 4305 405956 lstrlenA FindFirstFileA 4300->4305 4301->4300 4302->4293 4304 405a54 4302->4304 4303->4305 4306 405a8f 3 API calls 4304->4306 4305->4294 4310 40597a 4305->4310 4307 405a5a 4306->4307 4309 405877 5 API calls 4307->4309 4308 405aba CharNextA 4308->4310 4311 405a66 4309->4311 4310->4308 4313 405a0b FindNextFileA 4310->4313 4324 4059cc 4310->4324 4329 4060f7 lstrcpynA 4310->4329 4312 405a80 4311->4312 4315 405a6a 4311->4315 4316 40521e 24 API calls 4312->4316 4313->4310 4317 405a23 FindClose 4313->4317 4315->4293 4318 40521e 24 API calls 4315->4318 4316->4293 4317->4294 4319 405a77 4318->4319 4320 405ed6 36 API calls 4319->4320 4323 405a7e 4320->4323 4322 4058bf 60 API calls 4322->4324 4323->4293 4324->4313 4324->4322 4325 40521e 24 API calls 4324->4325 4326 40521e 24 API calls 4324->4326 4327 405ed6 36 API calls 4324->4327 4330 405877 4324->4330 4325->4313 4326->4324 4327->4324 4328->4296 4329->4310 4338 405c6b GetFileAttributesA 4330->4338 4333 4058a4 4333->4324 4334 405892 RemoveDirectoryA 4336 4058a0 4334->4336 4335 40589a DeleteFileA 4335->4336 4336->4333 4337 4058b0 SetFileAttributesA 4336->4337 4337->4333 4339 405883 4338->4339 4340 405c7d SetFileAttributesA 4338->4340 4339->4333 4339->4334 4339->4335 4340->4339 4342 405db2 GetShortPathNameA 4341->4342 4343 405d8c 4341->4343 4345 405ed1 4342->4345 4346 405dc7 4342->4346 4368 405c90 GetFileAttributesA CreateFileA 4343->4368 4345->4171 4346->4345 4348 405dcf wsprintfA 4346->4348 4347 405d96 CloseHandle GetShortPathNameA 4347->4345 4349 405daa 4347->4349 4350 40618a 17 API calls 4348->4350 4349->4342 4349->4345 4351 405df7 4350->4351 4369 405c90 GetFileAttributesA CreateFileA 4351->4369 4353 405e04 4353->4345 4354 405e13 GetFileSize GlobalAlloc 4353->4354 4355 405e35 4354->4355 4356 405eca CloseHandle 4354->4356 4357 405d08 ReadFile 4355->4357 4356->4345 4358 405e3d 4357->4358 4358->4356 4370 405bf5 lstrlenA 4358->4370 4361 405e54 lstrcpyA 4364 405e76 4361->4364 4362 405e68 4363 405bf5 4 API calls 4362->4363 4363->4364 4365 405ead SetFilePointer 4364->4365 4366 405d37 WriteFile 4365->4366 4367 405ec3 GlobalFree 4366->4367 4367->4356 4368->4347 4369->4353 4371 405c36 lstrlenA 4370->4371 4372 405c3e 4371->4372 4373 405c0f lstrcmpiA 4371->4373 4372->4361 4372->4362 4373->4372 4374 405c2d CharNextA 4373->4374 4374->4371 4904 4038c8 4905 4038d3 4904->4905 4906 4038da GlobalAlloc 4905->4906 4907 4038d7 4905->4907 4906->4907 4908 6eb11638 4909 6eb11667 4908->4909 4910 6eb11a98 18 API calls 4909->4910 4911 6eb1166e 4910->4911 4912 6eb11681 4911->4912 4913 6eb11675 4911->4913 4915 6eb116a8 4912->4915 4916 6eb1168b 4912->4916 4914 6eb11266 2 API calls 4913->4914 4921 6eb1167f 4914->4921 4918 6eb116d2 4915->4918 4919 6eb116ae 4915->4919 4917 6eb114e2 3 API calls 4916->4917 4923 6eb11690 4917->4923 4922 6eb114e2 3 API calls 4918->4922 4920 6eb11559 3 API calls 4919->4920 4924 6eb116b3 4920->4924 4922->4921 4925 6eb11559 3 API calls 4923->4925 4926 6eb11266 2 API calls 4924->4926 4927 6eb11696 4925->4927 4928 6eb116b9 GlobalFree 4926->4928 4929 6eb11266 2 API calls 4927->4929 4928->4921 4930 6eb116cd GlobalFree 4928->4930 4931 6eb1169c GlobalFree 4929->4931 4930->4921 4931->4921 4935 401fcb 4936 402bce 17 API calls 4935->4936 4937 401fd2 4936->4937 4938 40646b 2 API calls 4937->4938 4939 401fd8 4938->4939 4941 401fea 4939->4941 4942 406055 wsprintfA 4939->4942 4942->4941 4943 6eb1103d 4946 6eb1101b 4943->4946 4953 6eb114bb 4946->4953 4948 6eb11020 4949 6eb11024 4948->4949 4950 6eb11027 GlobalAlloc 4948->4950 4951 6eb114e2 3 API calls 4949->4951 4950->4949 4952 6eb1103b 4951->4952 4955 6eb114c1 4953->4955 4954 6eb114c7 4954->4948 4955->4954 4956 6eb114d3 GlobalFree 4955->4956 4956->4948 4396 6eb12921 4397 6eb12971 4396->4397 4398 6eb12931 VirtualProtect 4396->4398 4398->4397 4399 4014d6 4400 402bac 17 API calls 4399->4400 4401 4014dc Sleep 4400->4401 4403 402a5a 4401->4403 4416 401759 4417 402bce 17 API calls 4416->4417 4418 401760 4417->4418 4419 401786 4418->4419 4420 40177e 4418->4420 4457 4060f7 lstrcpynA 4419->4457 4456 4060f7 lstrcpynA 4420->4456 4423 401784 4427 4063d2 5 API calls 4423->4427 4424 401791 4425 405a8f 3 API calls 4424->4425 4426 401797 lstrcatA 4425->4426 4426->4423 4434 4017a3 4427->4434 4428 4017e4 4430 405c6b 2 API calls 4428->4430 4429 40646b 2 API calls 4429->4434 4430->4434 4432 4017ba CompareFileTime 4432->4434 4433 40187e 4435 40521e 24 API calls 4433->4435 4434->4428 4434->4429 4434->4432 4434->4433 4437 4060f7 lstrcpynA 4434->4437 4444 40618a 17 API calls 4434->4444 4450 405813 MessageBoxIndirectA 4434->4450 4453 401855 4434->4453 4455 405c90 GetFileAttributesA CreateFileA 4434->4455 4438 401888 4435->4438 4436 40521e 24 API calls 4443 40186a 4436->4443 4437->4434 4439 4030d8 31 API calls 4438->4439 4440 40189b 4439->4440 4441 4018af SetFileTime 4440->4441 4442 4018c1 CloseHandle 4440->4442 4441->4442 4442->4443 4445 4018d2 4442->4445 4444->4434 4446 4018d7 4445->4446 4447 4018ea 4445->4447 4448 40618a 17 API calls 4446->4448 4449 40618a 17 API calls 4447->4449 4451 4018df lstrcatA 4448->4451 4452 4018f2 4449->4452 4450->4434 4451->4452 4452->4443 4454 405813 MessageBoxIndirectA 4452->4454 4453->4436 4453->4443 4454->4443 4455->4434 4456->4423 4457->4424 4957 401959 4958 402bac 17 API calls 4957->4958 4959 401960 4958->4959 4960 402bac 17 API calls 4959->4960 4961 40196d 4960->4961 4962 402bce 17 API calls 4961->4962 4963 401984 lstrlenA 4962->4963 4964 401994 4963->4964 4968 4019d4 4964->4968 4969 4060f7 lstrcpynA 4964->4969 4966 4019c4 4967 4019c9 lstrlenA 4966->4967 4966->4968 4967->4968 4969->4966 4970 40535c 4971 405507 4970->4971 4972 40537e GetDlgItem GetDlgItem GetDlgItem 4970->4972 4974 405537 4971->4974 4975 40550f GetDlgItem CreateThread CloseHandle 4971->4975 5015 4041b0 SendMessageA 4972->5015 4977 405565 4974->4977 4978 405586 4974->4978 4979 40554d ShowWindow ShowWindow 4974->4979 4975->4974 4976 4053ee 4982 4053f5 GetClientRect GetSystemMetrics SendMessageA SendMessageA 4976->4982 4980 4055c0 4977->4980 4984 405575 4977->4984 4985 405599 ShowWindow 4977->4985 4981 4041e2 8 API calls 4978->4981 5017 4041b0 SendMessageA 4979->5017 4980->4978 4991 4055cd SendMessageA 4980->4991 4986 405592 4981->4986 4989 405463 4982->4989 4990 405447 SendMessageA SendMessageA 4982->4990 5018 404154 4984->5018 4987 4055b9 4985->4987 4988 4055ab 4985->4988 4994 404154 SendMessageA 4987->4994 4993 40521e 24 API calls 4988->4993 4995 405476 4989->4995 4996 405468 SendMessageA 4989->4996 4990->4989 4991->4986 4997 4055e6 CreatePopupMenu 4991->4997 4993->4987 4994->4980 4999 40417b 18 API calls 4995->4999 4996->4995 4998 40618a 17 API calls 4997->4998 5000 4055f6 AppendMenuA 4998->5000 5001 405486 4999->5001 5002 405614 GetWindowRect 5000->5002 5003 405627 TrackPopupMenu 5000->5003 5004 4054c3 GetDlgItem SendMessageA 5001->5004 5005 40548f ShowWindow 5001->5005 5002->5003 5003->4986 5007 405643 5003->5007 5004->4986 5006 4054ea SendMessageA SendMessageA 5004->5006 5008 4054b2 5005->5008 5009 4054a5 ShowWindow 5005->5009 5006->4986 5010 405662 SendMessageA 5007->5010 5016 4041b0 SendMessageA 5008->5016 5009->5008 5010->5010 5011 40567f OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5010->5011 5013 4056a1 SendMessageA 5011->5013 5013->5013 5014 4056c3 GlobalUnlock SetClipboardData CloseClipboard 5013->5014 5014->4986 5015->4976 5016->5004 5017->4977 5019 404161 SendMessageA 5018->5019 5020 40415b 5018->5020 5019->4978 5020->5019 5021 40275d 5022 402763 5021->5022 5023 402a5a 5022->5023 5024 40276b FindClose 5022->5024 5024->5023 5025 401a5e 5026 402bac 17 API calls 5025->5026 5027 401a67 5026->5027 5028 402bac 17 API calls 5027->5028 5029 401a0e 5028->5029 5030 40495e 5031 40498a 5030->5031 5032 40496e 5030->5032 5034 404990 SHGetPathFromIDListA 5031->5034 5035 4049bd 5031->5035 5041 4057f7 GetDlgItemTextA 5032->5041 5037 4049a0 5034->5037 5040 4049a7 SendMessageA 5034->5040 5036 40497b SendMessageA 5036->5031 5038 40140b 2 API calls 5037->5038 5038->5040 5040->5035 5041->5036 5042 4029de 5043 406500 5 API calls 5042->5043 5044 4029e5 5043->5044 5045 402bce 17 API calls 5044->5045 5046 4029ee 5045->5046 5048 402a2a 5046->5048 5052 40614a 5046->5052 5049 4029fc 5049->5048 5056 406134 5049->5056 5053 406155 5052->5053 5054 406178 IIDFromString 5053->5054 5055 406171 5053->5055 5054->5049 5055->5049 5059 406119 WideCharToMultiByte 5056->5059 5058 402a1d CoTaskMemFree 5058->5048 5059->5058 5060 4027df 5061 402bce 17 API calls 5060->5061 5063 4027ed 5061->5063 5062 402803 5065 405c6b 2 API calls 5062->5065 5063->5062 5064 402bce 17 API calls 5063->5064 5064->5062 5066 402809 5065->5066 5088 405c90 GetFileAttributesA CreateFileA 5066->5088 5068 402816 5069 402822 GlobalAlloc 5068->5069 5070 4028bf 5068->5070 5071 4028b6 CloseHandle 5069->5071 5072 40283b 5069->5072 5073 4028c7 DeleteFileA 5070->5073 5074 4028da 5070->5074 5071->5070 5089 403300 SetFilePointer 5072->5089 5073->5074 5076 402841 5077 4032ea ReadFile 5076->5077 5078 40284a GlobalAlloc 5077->5078 5079 402894 5078->5079 5080 40285a 5078->5080 5082 405d37 WriteFile 5079->5082 5081 4030d8 31 API calls 5080->5081 5083 402867 5081->5083 5084 4028a0 GlobalFree 5082->5084 5087 40288b GlobalFree 5083->5087 5085 4030d8 31 API calls 5084->5085 5086 4028b3 5085->5086 5086->5071 5087->5079 5088->5068 5089->5076 4665 4023e0 4666 402bce 17 API calls 4665->4666 4667 4023f1 4666->4667 4668 402bce 17 API calls 4667->4668 4669 4023fa 4668->4669 4670 402bce 17 API calls 4669->4670 4671 402404 GetPrivateProfileStringA 4670->4671 5090 4028e0 5091 402bac 17 API calls 5090->5091 5092 4028e6 5091->5092 5093 402925 5092->5093 5094 40290e 5092->5094 5101 4027bf 5092->5101 5095 40293f 5093->5095 5096 40292f 5093->5096 5097 402922 5094->5097 5098 402913 5094->5098 5100 40618a 17 API calls 5095->5100 5099 402bac 17 API calls 5096->5099 5105 406055 wsprintfA 5097->5105 5104 4060f7 lstrcpynA 5098->5104 5099->5101 5100->5101 5104->5101 5105->5101 5106 401b63 5107 402bce 17 API calls 5106->5107 5108 401b6a 5107->5108 5109 402bac 17 API calls 5108->5109 5110 401b73 wsprintfA 5109->5110 5111 402a5a 5110->5111 5112 401d65 5113 401d78 GetDlgItem 5112->5113 5114 401d6b 5112->5114 5116 401d72 5113->5116 5115 402bac 17 API calls 5114->5115 5115->5116 5117 401db9 GetClientRect LoadImageA SendMessageA 5116->5117 5118 402bce 17 API calls 5116->5118 5120 401e1a 5117->5120 5122 401e26 5117->5122 5118->5117 5121 401e1f DeleteObject 5120->5121 5120->5122 5121->5122 5123 4042e6 5124 4042fc 5123->5124 5129 404408 5123->5129 5127 40417b 18 API calls 5124->5127 5125 404477 5126 404541 5125->5126 5128 404481 GetDlgItem 5125->5128 5135 4041e2 8 API calls 5126->5135 5130 404352 5127->5130 5131 404497 5128->5131 5132 4044ff 5128->5132 5129->5125 5129->5126 5133 40444c GetDlgItem SendMessageA 5129->5133 5134 40417b 18 API calls 5130->5134 5131->5132 5140 4044bd SendMessageA LoadCursorA SetCursor 5131->5140 5132->5126 5136 404511 5132->5136 5156 40419d EnableWindow 5133->5156 5138 40435f CheckDlgButton 5134->5138 5139 40453c 5135->5139 5141 404517 SendMessageA 5136->5141 5142 404528 5136->5142 5154 40419d EnableWindow 5138->5154 5160 40458a 5140->5160 5141->5142 5142->5139 5146 40452e SendMessageA 5142->5146 5143 404472 5157 404566 5143->5157 5146->5139 5148 40437d GetDlgItem 5155 4041b0 SendMessageA 5148->5155 5151 404393 SendMessageA 5152 4043b1 GetSysColor 5151->5152 5153 4043ba SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5151->5153 5152->5153 5153->5139 5154->5148 5155->5151 5156->5143 5158 404574 5157->5158 5159 404579 SendMessageA 5157->5159 5158->5159 5159->5125 5163 4057d9 ShellExecuteExA 5160->5163 5162 4044f0 LoadCursorA SetCursor 5162->5132 5163->5162 4713 40166a 4714 402bce 17 API calls 4713->4714 4715 401671 4714->4715 4716 402bce 17 API calls 4715->4716 4717 40167a 4716->4717 4718 402bce 17 API calls 4717->4718 4719 401683 MoveFileA 4718->4719 4720 401696 4719->4720 4726 40168f 4719->4726 4721 4022e2 4720->4721 4723 40646b 2 API calls 4720->4723 4722 401423 24 API calls 4722->4721 4724 4016a5 4723->4724 4724->4721 4725 405ed6 36 API calls 4724->4725 4725->4726 4726->4722 4727 40216b 4728 402bce 17 API calls 4727->4728 4729 402172 4728->4729 4730 402bce 17 API calls 4729->4730 4731 40217c 4730->4731 4732 402bce 17 API calls 4731->4732 4733 402186 4732->4733 4734 402bce 17 API calls 4733->4734 4735 402193 4734->4735 4736 402bce 17 API calls 4735->4736 4737 40219d 4736->4737 4738 4021df CoCreateInstance 4737->4738 4739 402bce 17 API calls 4737->4739 4742 4021fe 4738->4742 4744 4022ac 4738->4744 4739->4738 4740 401423 24 API calls 4741 4022e2 4740->4741 4743 40228c MultiByteToWideChar 4742->4743 4742->4744 4743->4744 4744->4740 4744->4741 5164 4022eb 5165 402bce 17 API calls 5164->5165 5166 4022f1 5165->5166 5167 402bce 17 API calls 5166->5167 5168 4022fa 5167->5168 5169 402bce 17 API calls 5168->5169 5170 402303 5169->5170 5171 40646b 2 API calls 5170->5171 5172 40230c 5171->5172 5173 40231d lstrlenA lstrlenA 5172->5173 5177 402310 5172->5177 5175 40521e 24 API calls 5173->5175 5174 40521e 24 API calls 5178 402318 5174->5178 5176 402359 SHFileOperationA 5175->5176 5176->5177 5176->5178 5177->5174 5177->5178 4754 40266d 4755 402bac 17 API calls 4754->4755 4760 402677 4755->4760 4756 4026e5 4757 405d08 ReadFile 4757->4760 4758 4026e7 4763 406055 wsprintfA 4758->4763 4759 4026f7 4759->4756 4762 40270d SetFilePointer 4759->4762 4760->4756 4760->4757 4760->4758 4760->4759 4762->4756 4763->4756 5179 40236d 5180 402374 5179->5180 5182 402387 5179->5182 5181 40618a 17 API calls 5180->5181 5183 402381 5181->5183 5183->5182 5184 405813 MessageBoxIndirectA 5183->5184 5184->5182 5185 4019ed 5186 402bce 17 API calls 5185->5186 5187 4019f4 5186->5187 5188 402bce 17 API calls 5187->5188 5189 4019fd 5188->5189 5190 401a04 lstrcmpiA 5189->5190 5191 401a16 lstrcmpA 5189->5191 5192 401a0a 5190->5192 5191->5192 5193 40296e 5194 402bac 17 API calls 5193->5194 5195 402974 5194->5195 5196 4029af 5195->5196 5198 4027bf 5195->5198 5199 402986 5195->5199 5197 40618a 17 API calls 5196->5197 5196->5198 5197->5198 5199->5198 5201 406055 wsprintfA 5199->5201 5201->5198 5202 6eb11000 5203 6eb1101b 5 API calls 5202->5203 5204 6eb11019 5203->5204 5205 4014f4 SetForegroundWindow 5206 402a5a 5205->5206 4800 402476 4801 402bce 17 API calls 4800->4801 4802 402488 4801->4802 4803 402bce 17 API calls 4802->4803 4804 402492 4803->4804 4817 402c5e 4804->4817 4807 402a5a 4808 4024c7 4812 402bac 17 API calls 4808->4812 4815 4024d3 4808->4815 4809 402bce 17 API calls 4811 4024c0 lstrlenA 4809->4811 4810 4024f5 RegSetValueExA 4814 40250b RegCloseKey 4810->4814 4811->4808 4812->4815 4813 4030d8 31 API calls 4813->4810 4814->4807 4815->4810 4815->4813 4818 402c79 4817->4818 4821 405fab 4818->4821 4822 405fba 4821->4822 4823 4024a2 4822->4823 4824 405fc5 RegCreateKeyExA 4822->4824 4823->4807 4823->4808 4823->4809 4824->4823 5207 402777 5208 40277d 5207->5208 5209 402781 FindNextFileA 5208->5209 5212 402793 5208->5212 5210 4027d2 5209->5210 5209->5212 5213 4060f7 lstrcpynA 5210->5213 5213->5212 5214 401ef9 5215 402bce 17 API calls 5214->5215 5216 401eff 5215->5216 5217 402bce 17 API calls 5216->5217 5218 401f08 5217->5218 5219 402bce 17 API calls 5218->5219 5220 401f11 5219->5220 5221 402bce 17 API calls 5220->5221 5222 401f1a 5221->5222 5223 401423 24 API calls 5222->5223 5224 401f21 5223->5224 5231 4057d9 ShellExecuteExA 5224->5231 5226 401f5c 5227 4027bf 5226->5227 5228 406575 5 API calls 5226->5228 5229 401f76 CloseHandle 5228->5229 5229->5227 5231->5226 4825 401f7b 4826 402bce 17 API calls 4825->4826 4827 401f81 4826->4827 4828 40521e 24 API calls 4827->4828 4829 401f8b 4828->4829 4830 405796 2 API calls 4829->4830 4831 401f91 4830->4831 4833 4027bf 4831->4833 4839 401fb2 CloseHandle 4831->4839 4840 406575 WaitForSingleObject 4831->4840 4835 401fa6 4836 401fb4 4835->4836 4837 401fab 4835->4837 4836->4839 4845 406055 wsprintfA 4837->4845 4839->4833 4841 40658f 4840->4841 4842 4065a1 GetExitCodeProcess 4841->4842 4843 40653c 2 API calls 4841->4843 4842->4835 4844 406596 WaitForSingleObject 4843->4844 4844->4841 4845->4839 5232 401ffb 5233 402bce 17 API calls 5232->5233 5234 402002 5233->5234 5235 406500 5 API calls 5234->5235 5236 402011 5235->5236 5237 402029 GlobalAlloc 5236->5237 5238 402091 5236->5238 5237->5238 5239 40203d 5237->5239 5240 406500 5 API calls 5239->5240 5241 402044 5240->5241 5242 406500 5 API calls 5241->5242 5243 40204e 5242->5243 5243->5238 5247 406055 wsprintfA 5243->5247 5245 402085 5248 406055 wsprintfA 5245->5248 5247->5245 5248->5238 5249 4018fd 5250 401934 5249->5250 5251 402bce 17 API calls 5250->5251 5252 401939 5251->5252 5253 4058bf 67 API calls 5252->5253 5254 401942 5253->5254 5255 401000 5256 401037 BeginPaint GetClientRect 5255->5256 5257 40100c DefWindowProcA 5255->5257 5259 4010f3 5256->5259 5260 401179 5257->5260 5261 401073 CreateBrushIndirect FillRect DeleteObject 5259->5261 5262 4010fc 5259->5262 5261->5259 5263 401102 CreateFontIndirectA 5262->5263 5264 401167 EndPaint 5262->5264 5263->5264 5265 401112 6 API calls 5263->5265 5264->5260 5265->5264 5266 401900 5267 402bce 17 API calls 5266->5267 5268 401907 5267->5268 5269 405813 MessageBoxIndirectA 5268->5269 5270 401910 5269->5270 5271 404b80 GetDlgItem GetDlgItem 5272 404bd6 7 API calls 5271->5272 5278 404dfd 5271->5278 5273 404c72 SendMessageA 5272->5273 5274 404c7e DeleteObject 5272->5274 5273->5274 5275 404c89 5274->5275 5277 404cc0 5275->5277 5279 40618a 17 API calls 5275->5279 5276 404edf 5281 404f8b 5276->5281 5286 404df0 5276->5286 5291 404f38 SendMessageA 5276->5291 5280 40417b 18 API calls 5277->5280 5278->5276 5305 404e6c 5278->5305 5325 404ace SendMessageA 5278->5325 5284 404ca2 SendMessageA SendMessageA 5279->5284 5285 404cd4 5280->5285 5282 404f95 SendMessageA 5281->5282 5283 404f9d 5281->5283 5282->5283 5293 404fb6 5283->5293 5294 404faf ImageList_Destroy 5283->5294 5302 404fc6 5283->5302 5284->5275 5290 40417b 18 API calls 5285->5290 5288 4041e2 8 API calls 5286->5288 5287 404ed1 SendMessageA 5287->5276 5292 40518b 5288->5292 5306 404ce5 5290->5306 5291->5286 5296 404f4d SendMessageA 5291->5296 5297 404fbf GlobalFree 5293->5297 5293->5302 5294->5293 5295 40513f 5295->5286 5300 405151 ShowWindow GetDlgItem ShowWindow 5295->5300 5299 404f60 5296->5299 5297->5302 5298 404dbf GetWindowLongA SetWindowLongA 5301 404dd8 5298->5301 5308 404f71 SendMessageA 5299->5308 5300->5286 5303 404df5 5301->5303 5304 404ddd ShowWindow 5301->5304 5302->5295 5317 405001 5302->5317 5330 404b4e 5302->5330 5324 4041b0 SendMessageA 5303->5324 5323 4041b0 SendMessageA 5304->5323 5305->5276 5305->5287 5306->5298 5307 404d37 SendMessageA 5306->5307 5309 404dba 5306->5309 5312 404d75 SendMessageA 5306->5312 5313 404d89 SendMessageA 5306->5313 5307->5306 5308->5281 5309->5298 5309->5301 5312->5306 5313->5306 5315 40510b 5316 405115 InvalidateRect 5315->5316 5319 405121 5315->5319 5316->5319 5318 40502f SendMessageA 5317->5318 5322 405045 5317->5322 5318->5322 5319->5295 5339 404a89 5319->5339 5321 4050b9 SendMessageA SendMessageA 5321->5322 5322->5315 5322->5321 5323->5286 5324->5278 5326 404af1 GetMessagePos ScreenToClient SendMessageA 5325->5326 5327 404b2d SendMessageA 5325->5327 5328 404b25 5326->5328 5329 404b2a 5326->5329 5327->5328 5328->5305 5329->5327 5342 4060f7 lstrcpynA 5330->5342 5332 404b61 5343 406055 wsprintfA 5332->5343 5334 404b6b 5335 40140b 2 API calls 5334->5335 5336 404b74 5335->5336 5344 4060f7 lstrcpynA 5336->5344 5338 404b7b 5338->5317 5345 4049c4 5339->5345 5341 404a9e 5341->5295 5342->5332 5343->5334 5344->5338 5346 4049da 5345->5346 5347 40618a 17 API calls 5346->5347 5348 404a3e 5347->5348 5349 40618a 17 API calls 5348->5349 5350 404a49 5349->5350 5351 40618a 17 API calls 5350->5351 5352 404a5f lstrlenA wsprintfA SetDlgItemTextA 5351->5352 5352->5341 5353 401502 5354 40150a 5353->5354 5356 40151d 5353->5356 5355 402bac 17 API calls 5354->5355 5355->5356 5357 402604 5358 402bce 17 API calls 5357->5358 5359 40260b 5358->5359 5362 405c90 GetFileAttributesA CreateFileA 5359->5362 5361 402617 5362->5361 5363 401b87 5364 401b94 5363->5364 5365 401bd8 5363->5365 5368 401c1c 5364->5368 5372 401bab 5364->5372 5366 401c01 GlobalAlloc 5365->5366 5367 401bdc 5365->5367 5369 40618a 17 API calls 5366->5369 5376 402387 5367->5376 5384 4060f7 lstrcpynA 5367->5384 5370 40618a 17 API calls 5368->5370 5368->5376 5369->5368 5373 402381 5370->5373 5382 4060f7 lstrcpynA 5372->5382 5373->5376 5377 405813 MessageBoxIndirectA 5373->5377 5374 401bee GlobalFree 5374->5376 5377->5376 5378 401bba 5383 4060f7 lstrcpynA 5378->5383 5380 401bc9 5385 4060f7 lstrcpynA 5380->5385 5382->5378 5383->5380 5384->5374 5385->5376 4375 402588 4387 402c0e 4375->4387 4378 402bac 17 API calls 4379 40259b 4378->4379 4380 4025a9 4379->4380 4385 4027bf 4379->4385 4381 4025c2 RegEnumValueA 4380->4381 4382 4025b6 RegEnumKeyA 4380->4382 4383 4025de RegCloseKey 4381->4383 4384 4025d7 4381->4384 4382->4383 4383->4385 4384->4383 4388 402bce 17 API calls 4387->4388 4389 402c25 4388->4389 4390 405f7d RegOpenKeyExA 4389->4390 4391 402592 4390->4391 4391->4378 4392 401389 4394 401390 4392->4394 4393 4013fe 4394->4393 4395 4013cb MulDiv SendMessageA 4394->4395 4395->4394 5386 40460d 5387 404639 5386->5387 5388 40464a 5386->5388 5447 4057f7 GetDlgItemTextA 5387->5447 5389 404656 GetDlgItem 5388->5389 5392 4046b5 5388->5392 5391 40466a 5389->5391 5395 40467e SetWindowTextA 5391->5395 5398 405b28 4 API calls 5391->5398 5400 40618a 17 API calls 5392->5400 5409 404799 5392->5409 5445 404943 5392->5445 5393 404644 5394 4063d2 5 API calls 5393->5394 5394->5388 5399 40417b 18 API calls 5395->5399 5397 4041e2 8 API calls 5402 404957 5397->5402 5403 404674 5398->5403 5404 40469a 5399->5404 5405 404729 SHBrowseForFolderA 5400->5405 5401 4047c9 5406 405b7d 18 API calls 5401->5406 5403->5395 5411 405a8f 3 API calls 5403->5411 5407 40417b 18 API calls 5404->5407 5408 404741 CoTaskMemFree 5405->5408 5405->5409 5410 4047cf 5406->5410 5412 4046a8 5407->5412 5413 405a8f 3 API calls 5408->5413 5409->5445 5449 4057f7 GetDlgItemTextA 5409->5449 5450 4060f7 lstrcpynA 5410->5450 5411->5395 5448 4041b0 SendMessageA 5412->5448 5416 40474e 5413->5416 5418 404785 SetDlgItemTextA 5416->5418 5422 40618a 17 API calls 5416->5422 5417 4046ae 5420 406500 5 API calls 5417->5420 5418->5409 5419 4047e6 5421 406500 5 API calls 5419->5421 5420->5392 5429 4047ed 5421->5429 5423 40476d lstrcmpiA 5422->5423 5423->5418 5425 40477e lstrcatA 5423->5425 5424 404829 5451 4060f7 lstrcpynA 5424->5451 5425->5418 5427 404830 5428 405b28 4 API calls 5427->5428 5430 404836 GetDiskFreeSpaceA 5428->5430 5429->5424 5433 405ad6 2 API calls 5429->5433 5434 404881 5429->5434 5432 40485a MulDiv 5430->5432 5430->5434 5432->5434 5433->5429 5435 4048f2 5434->5435 5436 404a89 20 API calls 5434->5436 5437 404915 5435->5437 5439 40140b 2 API calls 5435->5439 5438 4048df 5436->5438 5452 40419d EnableWindow 5437->5452 5440 4048f4 SetDlgItemTextA 5438->5440 5441 4048e4 5438->5441 5439->5437 5440->5435 5443 4049c4 20 API calls 5441->5443 5443->5435 5444 404931 5444->5445 5446 404566 SendMessageA 5444->5446 5445->5397 5446->5445 5447->5393 5448->5417 5449->5401 5450->5419 5451->5427 5452->5444 5453 401490 5454 40521e 24 API calls 5453->5454 5455 401497 5454->5455 5456 6eb110e0 5457 6eb1110e 5456->5457 5458 6eb111c4 GlobalFree 5457->5458 5459 6eb112ad 2 API calls 5457->5459 5460 6eb111c3 5457->5460 5461 6eb11266 2 API calls 5457->5461 5462 6eb11155 GlobalAlloc 5457->5462 5463 6eb111ea GlobalFree 5457->5463 5464 6eb111b1 GlobalFree 5457->5464 5465 6eb112d1 lstrcpyA 5457->5465 5459->5457 5460->5458 5461->5464 5462->5457 5463->5457 5464->5457 5465->5457 5466 6eb12be3 5467 6eb12bfb 5466->5467 5468 6eb11534 2 API calls 5467->5468 5469 6eb12c16 5468->5469 5470 405192 5471 4051a2 5470->5471 5472 4051b6 5470->5472 5474 4051ff 5471->5474 5475 4051a8 5471->5475 5473 4051be IsWindowVisible 5472->5473 5481 4051d5 5472->5481 5473->5474 5476 4051cb 5473->5476 5477 405204 CallWindowProcA 5474->5477 5478 4041c7 SendMessageA 5475->5478 5479 404ace 5 API calls 5476->5479 5480 4051b2 5477->5480 5478->5480 5479->5481 5481->5477 5482 404b4e 4 API calls 5481->5482 5482->5474 4404 402516 4405 402c0e 17 API calls 4404->4405 4406 402520 4405->4406 4407 402bce 17 API calls 4406->4407 4408 402529 4407->4408 4409 402533 RegQueryValueExA 4408->4409 4413 4027bf 4408->4413 4410 402559 RegCloseKey 4409->4410 4411 402553 4409->4411 4410->4413 4411->4410 4415 406055 wsprintfA 4411->4415 4415->4410 4458 40239c 4459 4023a4 4458->4459 4460 4023aa 4458->4460 4461 402bce 17 API calls 4459->4461 4462 4023ba 4460->4462 4464 402bce 17 API calls 4460->4464 4461->4460 4463 4023c8 4462->4463 4465 402bce 17 API calls 4462->4465 4466 402bce 17 API calls 4463->4466 4464->4462 4465->4463 4467 4023d1 WritePrivateProfileStringA 4466->4467 4468 40209d 4469 40215d 4468->4469 4470 4020af 4468->4470 4472 401423 24 API calls 4469->4472 4471 402bce 17 API calls 4470->4471 4473 4020b6 4471->4473 4479 4022e2 4472->4479 4474 402bce 17 API calls 4473->4474 4475 4020bf 4474->4475 4476 4020d4 LoadLibraryExA 4475->4476 4477 4020c7 GetModuleHandleA 4475->4477 4476->4469 4478 4020e4 GetProcAddress 4476->4478 4477->4476 4477->4478 4480 402130 4478->4480 4481 4020f3 4478->4481 4484 40521e 24 API calls 4480->4484 4482 402112 4481->4482 4483 4020fb 4481->4483 4489 6eb116db 4482->4489 4531 401423 4483->4531 4486 402103 4484->4486 4486->4479 4487 402151 FreeLibrary 4486->4487 4487->4479 4490 6eb1170b 4489->4490 4534 6eb11a98 4490->4534 4492 6eb11712 4493 6eb11834 4492->4493 4494 6eb11723 4492->4494 4495 6eb1172a 4492->4495 4493->4486 4584 6eb122af 4494->4584 4568 6eb122f1 4495->4568 4500 6eb11770 4597 6eb124d8 4500->4597 4501 6eb1178e 4506 6eb11794 4501->4506 4507 6eb117dc 4501->4507 4502 6eb11740 4505 6eb11746 4502->4505 4511 6eb11751 4502->4511 4503 6eb11759 4515 6eb1174f 4503->4515 4594 6eb12cc3 4503->4594 4505->4515 4578 6eb12a38 4505->4578 4616 6eb1156b 4506->4616 4509 6eb124d8 11 API calls 4507->4509 4521 6eb117cd 4509->4521 4510 6eb11776 4608 6eb11559 4510->4608 4588 6eb126b2 4511->4588 4515->4500 4515->4501 4518 6eb124d8 11 API calls 4518->4521 4520 6eb11757 4520->4515 4530 6eb11823 4521->4530 4622 6eb1249e 4521->4622 4523 6eb1182d GlobalFree 4523->4493 4527 6eb1180f 4527->4530 4626 6eb114e2 wsprintfA 4527->4626 4528 6eb11808 FreeLibrary 4528->4527 4530->4493 4530->4523 4532 40521e 24 API calls 4531->4532 4533 401431 4532->4533 4533->4486 4629 6eb11215 GlobalAlloc 4534->4629 4536 6eb11abf 4630 6eb11215 GlobalAlloc 4536->4630 4538 6eb11d00 GlobalFree GlobalFree GlobalFree 4539 6eb11d1d 4538->4539 4552 6eb11d67 4538->4552 4541 6eb120f1 4539->4541 4549 6eb11d32 4539->4549 4539->4552 4540 6eb11bbd GlobalAlloc 4556 6eb11aca 4540->4556 4542 6eb12113 GetModuleHandleA 4541->4542 4541->4552 4543 6eb12124 LoadLibraryA 4542->4543 4544 6eb12139 4542->4544 4543->4544 4543->4552 4637 6eb115c2 GetProcAddress 4544->4637 4545 6eb11c08 lstrcpyA 4548 6eb11c12 lstrcpyA 4545->4548 4546 6eb11c26 GlobalFree 4546->4556 4548->4556 4549->4552 4633 6eb11224 4549->4633 4550 6eb1218a 4550->4552 4555 6eb12197 lstrlenA 4550->4555 4551 6eb11fb7 4636 6eb11215 GlobalAlloc 4551->4636 4552->4492 4638 6eb115c2 GetProcAddress 4555->4638 4556->4538 4556->4540 4556->4545 4556->4546 4556->4548 4556->4551 4556->4552 4557 6eb11ef9 GlobalFree 4556->4557 4558 6eb12033 4556->4558 4561 6eb11c64 4556->4561 4563 6eb11224 2 API calls 4556->4563 4557->4556 4558->4552 4565 6eb1208c lstrcpyA 4558->4565 4559 6eb1214b 4559->4550 4566 6eb12174 GetProcAddress 4559->4566 4561->4556 4631 6eb11534 GlobalSize GlobalAlloc 4561->4631 4562 6eb121b0 4562->4552 4563->4556 4565->4552 4566->4550 4567 6eb11fbf 4567->4492 4572 6eb1230a 4568->4572 4570 6eb12446 GlobalFree 4571 6eb11730 4570->4571 4570->4572 4571->4502 4571->4503 4571->4515 4572->4570 4573 6eb123b8 GlobalAlloc MultiByteToWideChar 4572->4573 4574 6eb11224 GlobalAlloc lstrcpynA 4572->4574 4575 6eb12405 4572->4575 4640 6eb112ad 4572->4640 4573->4575 4576 6eb123e4 GlobalAlloc CLSIDFromString GlobalFree 4573->4576 4574->4572 4575->4570 4644 6eb12646 4575->4644 4576->4570 4580 6eb12a4a 4578->4580 4579 6eb12aef VirtualAllocEx 4583 6eb12b0d 4579->4583 4580->4579 4582 6eb12bd9 4582->4515 4647 6eb129e4 4583->4647 4585 6eb122c4 4584->4585 4586 6eb11729 4585->4586 4587 6eb122cf GlobalAlloc 4585->4587 4586->4495 4587->4585 4592 6eb126e2 4588->4592 4589 6eb12790 4591 6eb12796 GlobalSize 4589->4591 4593 6eb127a0 4589->4593 4590 6eb1277d GlobalAlloc 4590->4593 4591->4593 4592->4589 4592->4590 4593->4520 4595 6eb12cce 4594->4595 4596 6eb12d0e GlobalFree 4595->4596 4651 6eb11215 GlobalAlloc 4597->4651 4599 6eb12563 lstrcpynA 4606 6eb124e4 4599->4606 4600 6eb12574 StringFromGUID2 WideCharToMultiByte 4600->4606 4601 6eb12598 WideCharToMultiByte 4601->4606 4602 6eb125b9 wsprintfA 4602->4606 4603 6eb125dd GlobalFree 4603->4606 4604 6eb12617 GlobalFree 4604->4510 4605 6eb11266 2 API calls 4605->4606 4606->4599 4606->4600 4606->4601 4606->4602 4606->4603 4606->4604 4606->4605 4652 6eb112d1 4606->4652 4656 6eb11215 GlobalAlloc 4608->4656 4610 6eb1155e 4611 6eb1156b 2 API calls 4610->4611 4612 6eb11568 4611->4612 4613 6eb11266 4612->4613 4614 6eb112a8 GlobalFree 4613->4614 4615 6eb1126f GlobalAlloc lstrcpynA 4613->4615 4614->4521 4615->4614 4617 6eb11577 wsprintfA 4616->4617 4620 6eb115a4 lstrcpyA 4616->4620 4621 6eb115bd 4617->4621 4620->4621 4621->4518 4623 6eb124ac 4622->4623 4625 6eb117ef 4622->4625 4624 6eb124c5 GlobalFree 4623->4624 4623->4625 4624->4623 4625->4527 4625->4528 4627 6eb11266 2 API calls 4626->4627 4628 6eb11503 4627->4628 4628->4530 4629->4536 4630->4556 4632 6eb11552 4631->4632 4632->4561 4639 6eb11215 GlobalAlloc 4633->4639 4635 6eb11233 lstrcpynA 4635->4552 4636->4567 4637->4559 4638->4562 4639->4635 4641 6eb112b4 4640->4641 4642 6eb11224 2 API calls 4641->4642 4643 6eb112cf 4642->4643 4643->4572 4645 6eb12654 VirtualAlloc 4644->4645 4646 6eb126aa 4644->4646 4645->4646 4646->4575 4648 6eb129ef 4647->4648 4649 6eb129f4 GetLastError 4648->4649 4650 6eb129ff 4648->4650 4649->4650 4650->4582 4651->4606 4653 6eb112f9 4652->4653 4654 6eb112da 4652->4654 4653->4606 4654->4653 4655 6eb112e0 lstrcpyA 4654->4655 4655->4653 4656->4610 4657 40159d 4658 402bce 17 API calls 4657->4658 4659 4015a4 SetFileAttributesA 4658->4659 4660 4015b6 4659->4660 5483 40149d 5484 402387 5483->5484 5485 4014ab PostQuitMessage 5483->5485 5485->5484 5486 401a1e 5487 402bce 17 API calls 5486->5487 5488 401a27 ExpandEnvironmentStringsA 5487->5488 5489 401a3b 5488->5489 5491 401a4e 5488->5491 5490 401a40 lstrcmpA 5489->5490 5489->5491 5490->5491 4661 40171f 4662 402bce 17 API calls 4661->4662 4663 401726 SearchPathA 4662->4663 4664 401741 4663->4664 5497 401d1f 5498 402bac 17 API calls 5497->5498 5499 401d26 5498->5499 5500 402bac 17 API calls 5499->5500 5501 401d32 GetDlgItem 5500->5501 5502 402620 5501->5502 5503 6eb115d1 5504 6eb114bb GlobalFree 5503->5504 5507 6eb115e9 5504->5507 5505 6eb1162f GlobalFree 5506 6eb11604 5506->5505 5507->5505 5507->5506 5508 6eb1161b VirtualFree 5507->5508 5508->5505 4672 402421 4673 402453 4672->4673 4674 402428 4672->4674 4676 402bce 17 API calls 4673->4676 4675 402c0e 17 API calls 4674->4675 4677 40242f 4675->4677 4678 40245a 4676->4678 4679 402439 4677->4679 4683 402467 4677->4683 4684 402c8c 4678->4684 4681 402bce 17 API calls 4679->4681 4682 402440 RegDeleteValueA RegCloseKey 4681->4682 4682->4683 4685 402c9f 4684->4685 4686 402c98 4684->4686 4685->4686 4688 402cd0 4685->4688 4686->4683 4689 405f7d RegOpenKeyExA 4688->4689 4690 402cfe 4689->4690 4691 402db3 4690->4691 4692 402d08 4690->4692 4691->4686 4693 402d31 4692->4693 4694 402d0e RegEnumValueA 4692->4694 4695 402d98 RegCloseKey 4693->4695 4696 402d6d RegEnumKeyA 4693->4696 4697 402d76 RegCloseKey 4693->4697 4699 402cd0 6 API calls 4693->4699 4694->4693 4694->4695 4695->4691 4696->4693 4696->4697 4698 406500 5 API calls 4697->4698 4700 402d86 4698->4700 4699->4693 4701 402da8 4700->4701 4702 402d8a RegDeleteKeyA 4700->4702 4701->4691 4702->4691 4703 4027a1 4704 402bce 17 API calls 4703->4704 4705 4027a8 FindFirstFileA 4704->4705 4706 4027cb 4705->4706 4710 4027bb 4705->4710 4707 4027d2 4706->4707 4711 406055 wsprintfA 4706->4711 4712 4060f7 lstrcpynA 4707->4712 4711->4707 4712->4710 5509 402626 5510 40262b 5509->5510 5511 40263f 5509->5511 5512 402bac 17 API calls 5510->5512 5513 402bce 17 API calls 5511->5513 5515 402634 5512->5515 5514 402646 lstrlenA 5513->5514 5514->5515 5516 405d37 WriteFile 5515->5516 5517 402668 5515->5517 5516->5517 5518 403ca7 5519 403dfa 5518->5519 5520 403cbf 5518->5520 5522 403e4b 5519->5522 5523 403e0b GetDlgItem GetDlgItem 5519->5523 5520->5519 5521 403ccb 5520->5521 5524 403cd6 SetWindowPos 5521->5524 5525 403ce9 5521->5525 5527 403ea5 5522->5527 5536 401389 2 API calls 5522->5536 5526 40417b 18 API calls 5523->5526 5524->5525 5529 403d06 5525->5529 5530 403cee ShowWindow 5525->5530 5531 403e35 SetClassLongA 5526->5531 5528 4041c7 SendMessageA 5527->5528 5532 403df5 5527->5532 5556 403eb7 5528->5556 5533 403d28 5529->5533 5534 403d0e DestroyWindow 5529->5534 5530->5529 5535 40140b 2 API calls 5531->5535 5537 403d2d SetWindowLongA 5533->5537 5538 403d3e 5533->5538 5586 404104 5534->5586 5535->5522 5539 403e7d 5536->5539 5537->5532 5542 403db5 5538->5542 5543 403d4a GetDlgItem 5538->5543 5539->5527 5544 403e81 SendMessageA 5539->5544 5540 40140b 2 API calls 5540->5556 5541 404106 DestroyWindow EndDialog 5541->5586 5545 4041e2 8 API calls 5542->5545 5547 403d7a 5543->5547 5548 403d5d SendMessageA IsWindowEnabled 5543->5548 5544->5532 5545->5532 5546 404135 ShowWindow 5546->5532 5550 403d87 5547->5550 5551 403dce SendMessageA 5547->5551 5552 403d9a 5547->5552 5560 403d7f 5547->5560 5548->5532 5548->5547 5549 40618a 17 API calls 5549->5556 5550->5551 5550->5560 5551->5542 5554 403da2 5552->5554 5555 403db7 5552->5555 5553 404154 SendMessageA 5553->5542 5557 40140b 2 API calls 5554->5557 5558 40140b 2 API calls 5555->5558 5556->5532 5556->5540 5556->5541 5556->5549 5559 40417b 18 API calls 5556->5559 5561 40417b 18 API calls 5556->5561 5577 404046 DestroyWindow 5556->5577 5557->5560 5558->5560 5559->5556 5560->5542 5560->5553 5562 403f32 GetDlgItem 5561->5562 5563 403f47 5562->5563 5564 403f4f ShowWindow EnableWindow 5562->5564 5563->5564 5587 40419d EnableWindow 5564->5587 5566 403f79 EnableWindow 5571 403f8d 5566->5571 5567 403f92 GetSystemMenu EnableMenuItem SendMessageA 5568 403fc2 SendMessageA 5567->5568 5567->5571 5568->5571 5570 403c88 18 API calls 5570->5571 5571->5567 5571->5570 5588 4041b0 SendMessageA 5571->5588 5589 4060f7 lstrcpynA 5571->5589 5573 403ff1 lstrlenA 5574 40618a 17 API calls 5573->5574 5575 404002 SetWindowTextA 5574->5575 5576 401389 2 API calls 5575->5576 5576->5556 5578 404060 CreateDialogParamA 5577->5578 5577->5586 5579 404093 5578->5579 5578->5586 5580 40417b 18 API calls 5579->5580 5581 40409e GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5580->5581 5582 401389 2 API calls 5581->5582 5583 4040e4 5582->5583 5583->5532 5584 4040ec ShowWindow 5583->5584 5585 4041c7 SendMessageA 5584->5585 5585->5586 5586->5532 5586->5546 5587->5566 5588->5571 5589->5573 5590 6eb11058 5592 6eb11074 5590->5592 5591 6eb110dc 5592->5591 5593 6eb114bb GlobalFree 5592->5593 5594 6eb11091 5592->5594 5593->5594 5595 6eb114bb GlobalFree 5594->5595 5596 6eb110a1 5595->5596 5597 6eb110b1 5596->5597 5598 6eb110a8 GlobalSize 5596->5598 5599 6eb110b5 GlobalAlloc 5597->5599 5600 6eb110c6 5597->5600 5598->5597 5601 6eb114e2 3 API calls 5599->5601 5602 6eb110d1 GlobalFree 5600->5602 5601->5600 5602->5591 4745 40272b 4746 402732 4745->4746 4748 4029aa 4745->4748 4747 402bac 17 API calls 4746->4747 4749 402739 4747->4749 4750 402748 SetFilePointer 4749->4750 4750->4748 4751 402758 4750->4751 4753 406055 wsprintfA 4751->4753 4753->4748 5603 6eb1225a 5604 6eb122c4 5603->5604 5605 6eb122ee 5604->5605 5606 6eb122cf GlobalAlloc 5604->5606 5606->5604 4764 401c2e 4765 402bac 17 API calls 4764->4765 4766 401c35 4765->4766 4767 402bac 17 API calls 4766->4767 4768 401c42 4767->4768 4769 401c57 4768->4769 4770 402bce 17 API calls 4768->4770 4771 401c67 4769->4771 4774 402bce 17 API calls 4769->4774 4770->4769 4772 401c72 4771->4772 4773 401cbe 4771->4773 4775 402bac 17 API calls 4772->4775 4776 402bce 17 API calls 4773->4776 4774->4771 4777 401c77 4775->4777 4778 401cc3 4776->4778 4779 402bac 17 API calls 4777->4779 4780 402bce 17 API calls 4778->4780 4781 401c83 4779->4781 4782 401ccc FindWindowExA 4780->4782 4783 401c90 SendMessageTimeoutA 4781->4783 4784 401cae SendMessageA 4781->4784 4785 401cea 4782->4785 4783->4785 4784->4785 5607 4042b1 lstrcpynA lstrlenA 4792 401e35 GetDC 4793 402bac 17 API calls 4792->4793 4794 401e47 GetDeviceCaps MulDiv ReleaseDC 4793->4794 4795 402bac 17 API calls 4794->4795 4796 401e78 4795->4796 4797 40618a 17 API calls 4796->4797 4798 401eb5 CreateFontIndirectA 4797->4798 4799 402620 4798->4799 5608 402a35 SendMessageA 5609 402a5a 5608->5609 5610 402a4f InvalidateRect 5608->5610 5610->5609 5611 4014b7 5612 4014bd 5611->5612 5613 401389 2 API calls 5612->5613 5614 4014c5 5613->5614 5615 402dba 5616 402dc9 SetTimer 5615->5616 5618 402de2 5615->5618 5616->5618 5617 402e37 5618->5617 5619 402dfc MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 5618->5619 5619->5617 4846 4015bb 4847 402bce 17 API calls 4846->4847 4848 4015c2 4847->4848 4849 405b28 4 API calls 4848->4849 4863 4015ca 4849->4863 4850 401624 4852 401629 4850->4852 4854 401652 4850->4854 4851 405aba CharNextA 4851->4863 4853 401423 24 API calls 4852->4853 4856 401630 4853->4856 4855 401423 24 API calls 4854->4855 4862 40164a 4855->4862 4865 4060f7 lstrcpynA 4856->4865 4857 405761 2 API calls 4857->4863 4859 40577e 5 API calls 4859->4863 4860 40163b SetCurrentDirectoryA 4860->4862 4861 40160c GetFileAttributesA 4861->4863 4863->4850 4863->4851 4863->4857 4863->4859 4863->4861 4864 4056e4 4 API calls 4863->4864 4864->4863 4865->4860 5620 4016bb 5621 402bce 17 API calls 5620->5621 5622 4016c1 GetFullPathNameA 5621->5622 5623 4016d8 5622->5623 5629 4016f9 5622->5629 5626 40646b 2 API calls 5623->5626 5623->5629 5624 402a5a 5625 40170d GetShortPathNameA 5625->5624 5627 4016e9 5626->5627 5627->5629 5630 4060f7 lstrcpynA 5627->5630 5629->5624 5629->5625 5630->5629

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 403348-403387 SetErrorMode GetVersion 1 403389-403391 call 406500 0->1 2 40339a 0->2 1->2 7 403393 1->7 4 40339f-4033b2 call 406492 lstrlenA 2->4 9 4033b4-4033d0 call 406500 * 3 4->9 7->2 16 4033e1-40343f #17 OleInitialize SHGetFileInfoA call 4060f7 GetCommandLineA call 4060f7 9->16 17 4033d2-4033d8 9->17 24 403441-403446 16->24 25 40344b-403460 call 405aba CharNextA 16->25 17->16 21 4033da 17->21 21->16 24->25 28 403525-403529 25->28 29 403465-403468 28->29 30 40352f 28->30 32 403470-403478 29->32 33 40346a-40346e 29->33 31 403542-40355c GetTempPathA call 403317 30->31 42 4035b4-4035ce DeleteFileA call 402ea1 31->42 43 40355e-40357c GetWindowsDirectoryA lstrcatA call 403317 31->43 34 403480-403483 32->34 35 40347a-40347b 32->35 33->32 33->33 37 403515-403522 call 405aba 34->37 38 403489-40348d 34->38 35->34 37->28 57 403524 37->57 40 4034a5-4034d2 38->40 41 40348f-403495 38->41 47 4034d4-4034da 40->47 48 4034e5-403513 40->48 45 403497-403499 41->45 46 40349b 41->46 58 403662-403672 call 403830 OleUninitialize 42->58 59 4035d4-4035da 42->59 43->42 61 40357e-4035ae GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 403317 43->61 45->40 45->46 46->40 52 4034e0 47->52 53 4034dc-4034de 47->53 48->37 55 403531-40353d call 4060f7 48->55 52->48 53->48 53->52 55->31 57->28 72 403796-40379c 58->72 73 403678-403688 call 405813 ExitProcess 58->73 62 403652-403659 call 40390a 59->62 63 4035dc-4035e7 call 405aba 59->63 61->42 61->58 70 40365e 62->70 74 4035e9-403612 63->74 75 40361d-403627 63->75 70->58 77 403818-403820 72->77 78 40379e-4037b7 GetCurrentProcess OpenProcessToken 72->78 79 403614-403616 74->79 82 403629-403636 call 405b7d 75->82 83 40368e-4036a2 call 40577e lstrcatA 75->83 80 403822 77->80 81 403826-40382a ExitProcess 77->81 85 4037e9-4037f7 call 406500 78->85 86 4037b9-4037e3 LookupPrivilegeValueA AdjustTokenPrivileges 78->86 79->75 87 403618-40361b 79->87 80->81 82->58 96 403638-40364e call 4060f7 * 2 82->96 97 4036a4-4036aa lstrcatA 83->97 98 4036af-4036c9 lstrcatA lstrcmpiA 83->98 94 403805-40380f ExitWindowsEx 85->94 95 4037f9-403803 85->95 86->85 87->75 87->79 94->77 99 403811-403813 call 40140b 94->99 95->94 95->99 96->62 97->98 98->58 101 4036cb-4036ce 98->101 99->77 105 4036d0-4036d5 call 4056e4 101->105 106 4036d7 call 405761 101->106 111 4036dc-4036e9 SetCurrentDirectoryA 105->111 106->111 113 4036f6-40371e call 4060f7 111->113 114 4036eb-4036f1 call 4060f7 111->114 118 403724-403740 call 40618a DeleteFileA 113->118 114->113 121 403781-403788 118->121 122 403742-403752 CopyFileA 118->122 121->118 123 40378a-403791 call 405ed6 121->123 122->121 124 403754-403774 call 405ed6 call 40618a call 405796 122->124 123->58 124->121 133 403776-40377d CloseHandle 124->133 133->121
                          APIs
                          • SetErrorMode.KERNELBASE ref: 0040336D
                          • GetVersion.KERNEL32 ref: 00403373
                          • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004033A6
                          • #17.COMCTL32(?,00000007,00000009,0000000B), ref: 004033E2
                          • OleInitialize.OLE32(00000000), ref: 004033E9
                          • SHGetFileInfoA.SHELL32(00429850,00000000,?,00000160,00000000,?,00000007,00000009,0000000B), ref: 00403405
                          • GetCommandLineA.KERNEL32(hyaenic Setup,NSIS Error,?,00000007,00000009,0000000B), ref: 0040341A
                          • CharNextA.USER32(00000000,"C:\Users\user\Desktop\fbXZ4ErQMU.exe",00000020,"C:\Users\user\Desktop\fbXZ4ErQMU.exe",00000000,?,00000007,00000009,0000000B), ref: 00403456
                          • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000007,00000009,0000000B), ref: 00403553
                          • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000007,00000009,0000000B), ref: 00403564
                          • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 00403570
                          • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 00403584
                          • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040358C
                          • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040359D
                          • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 004035A5
                          • DeleteFileA.KERNELBASE(1033,?,00000007,00000009,0000000B), ref: 004035B9
                            • Part of subcall function 00406500: GetModuleHandleA.KERNEL32(?,?,?,004033BB,0000000B), ref: 00406512
                            • Part of subcall function 00406500: GetProcAddress.KERNEL32(00000000,?), ref: 0040652D
                            • Part of subcall function 0040390A: lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\tranchet,1033,0042A890,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A890,00000000,00000002,76233410), ref: 004039FA
                            • Part of subcall function 0040390A: lstrcmpiA.KERNEL32(?,.exe), ref: 00403A0D
                            • Part of subcall function 0040390A: GetFileAttributesA.KERNEL32(Call), ref: 00403A18
                            • Part of subcall function 0040390A: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\tranchet), ref: 00403A61
                            • Part of subcall function 0040390A: RegisterClassA.USER32(0042EBC0), ref: 00403A9E
                            • Part of subcall function 00403830: CloseHandle.KERNEL32(000002DC,00403667,?,?,00000007,00000009,0000000B), ref: 0040383B
                          • OleUninitialize.OLE32(?,?,00000007,00000009,0000000B), ref: 00403667
                          • ExitProcess.KERNEL32 ref: 00403688
                          • GetCurrentProcess.KERNEL32(00000028,?,00000007,00000009,0000000B), ref: 004037A5
                          • OpenProcessToken.ADVAPI32(00000000), ref: 004037AC
                          • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004037C4
                          • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004037E3
                          • ExitWindowsEx.USER32(00000002,80040002), ref: 00403807
                          • ExitProcess.KERNEL32 ref: 0040382A
                            • Part of subcall function 00405813: MessageBoxIndirectA.USER32(0040A218), ref: 0040586E
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: Process$ExitFile$EnvironmentHandlePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCloseCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                          • String ID: "$"C:\Users\user\Desktop\fbXZ4ErQMU.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\fbXZ4ErQMU.exe$C:\Users\user\tranchet$C:\Users\user\tranchet\Trykmaalere$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$`K$v$hyaenic Setup$~nsu
                          • API String ID: 3776617018-3407071837
                          • Opcode ID: 9f7172ca61a1f038ac1aa6a8db1429cac06e36ed1de7e549aa4fc7ed9372f958
                          • Instruction ID: 2464a3ec660faf4d6335bd380e0cd13b62da1685a36c15adf6e00eeeb0483762
                          • Opcode Fuzzy Hash: 9f7172ca61a1f038ac1aa6a8db1429cac06e36ed1de7e549aa4fc7ed9372f958
                          • Instruction Fuzzy Hash: 49C107705047416AD7216F759D89B2F3EACAB4530AF45443FF181BA2E2CB7C8A058B2F

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 337 4058bf-4058e5 call 405b7d 340 4058e7-4058f9 DeleteFileA 337->340 341 4058fe-405905 337->341 342 405a88-405a8c 340->342 343 405907-405909 341->343 344 405918-405928 call 4060f7 341->344 345 405a36-405a3b 343->345 346 40590f-405912 343->346 350 405937-405938 call 405ad6 344->350 351 40592a-405935 lstrcatA 344->351 345->342 349 405a3d-405a40 345->349 346->344 346->345 352 405a42-405a48 349->352 353 405a4a-405a52 call 40646b 349->353 355 40593d-405940 350->355 351->355 352->342 353->342 360 405a54-405a68 call 405a8f call 405877 353->360 358 405942-405949 355->358 359 40594b-405951 lstrcatA 355->359 358->359 361 405956-405974 lstrlenA FindFirstFileA 358->361 359->361 376 405a80-405a83 call 40521e 360->376 377 405a6a-405a6d 360->377 363 40597a-405991 call 405aba 361->363 364 405a2c-405a30 361->364 370 405993-405997 363->370 371 40599c-40599f 363->371 364->345 366 405a32 364->366 366->345 370->371 373 405999 370->373 374 4059a1-4059a6 371->374 375 4059b2-4059c0 call 4060f7 371->375 373->371 378 4059a8-4059aa 374->378 379 405a0b-405a1d FindNextFileA 374->379 387 4059c2-4059ca 375->387 388 4059d7-4059e2 call 405877 375->388 376->342 377->352 381 405a6f-405a7e call 40521e call 405ed6 377->381 378->375 383 4059ac-4059b0 378->383 379->363 385 405a23-405a26 FindClose 379->385 381->342 383->375 383->379 385->364 387->379 390 4059cc-4059d5 call 4058bf 387->390 396 405a03-405a06 call 40521e 388->396 397 4059e4-4059e7 388->397 390->379 396->379 399 4059e9-4059f9 call 40521e call 405ed6 397->399 400 4059fb-405a01 397->400 399->379 400->379
                          APIs
                          • DeleteFileA.KERNELBASE(?,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004058E8
                          • lstrcatA.KERNEL32(0042B898,\*.*,0042B898,?,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405930
                          • lstrcatA.KERNEL32(?,0040A014,?,0042B898,?,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405951
                          • lstrlenA.KERNEL32(?,?,0040A014,?,0042B898,?,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405957
                          • FindFirstFileA.KERNELBASE(0042B898,?,?,?,0040A014,?,0042B898,?,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405968
                          • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405A15
                          • FindClose.KERNEL32(00000000), ref: 00405A26
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 004058CC
                          • \*.*, xrefs: 0040592A
                          • "C:\Users\user\Desktop\fbXZ4ErQMU.exe", xrefs: 004058BF
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                          • String ID: "C:\Users\user\Desktop\fbXZ4ErQMU.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                          • API String ID: 2035342205-2539231498
                          • Opcode ID: c5c9cbc54ac5a0b6362327b9ac4809c8afb714a0d61d87f2a5b8dc3e2328684f
                          • Instruction ID: 53fbf83e18d3e9f22f7fd61ce8145b7df245fbcc76992db59ab4b54644bc6f5f
                          • Opcode Fuzzy Hash: c5c9cbc54ac5a0b6362327b9ac4809c8afb714a0d61d87f2a5b8dc3e2328684f
                          • Instruction Fuzzy Hash: 4251C470A00A49AADB21AB618D85BBF7A78DF52314F14427FF841711D2C73C8942DF6A
                          APIs
                          • CoCreateInstance.OLE32(00408524,?,00000001,00408514,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004021F0
                          • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,00408514,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004022A2
                          Strings
                          • C:\Users\user\tranchet\Trykmaalere, xrefs: 00402230
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: ByteCharCreateInstanceMultiWide
                          • String ID: C:\Users\user\tranchet\Trykmaalere
                          • API String ID: 123533781-9360506
                          • Opcode ID: d5ac8e536bab36e1472226809c0cdf08a9d371e862c1e59943db98e9419baf02
                          • Instruction ID: cfd0f9f97044ed47efa98841b374527745dcc5d1cf4597a5ef188e8ddd78f045
                          • Opcode Fuzzy Hash: d5ac8e536bab36e1472226809c0cdf08a9d371e862c1e59943db98e9419baf02
                          • Instruction Fuzzy Hash: DF510671A00208AFCB50DFE4C989E9D7BB6FF48314F2041AAF515EB2D1DA799981CB54
                          APIs
                          • FindFirstFileA.KERNELBASE(76233410,0042C0E0,0042BC98,00405BC0,0042BC98,0042BC98,00000000,0042BC98,0042BC98,76233410,?,C:\Users\user\AppData\Local\Temp\,004058DF,?,76233410,C:\Users\user\AppData\Local\Temp\), ref: 00406476
                          • FindClose.KERNELBASE(00000000), ref: 00406482
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID:
                          • API String ID: 2295610775-0
                          • Opcode ID: 834111d6c5cf34f6f1a5acdd2360b111687db49f4aa82fd60f9155d80f0d726b
                          • Instruction ID: 43645372537bfa69987f3f85d1e9d0a1072f39b89fcefe97c81bac3be47e5bfd
                          • Opcode Fuzzy Hash: 834111d6c5cf34f6f1a5acdd2360b111687db49f4aa82fd60f9155d80f0d726b
                          • Instruction Fuzzy Hash: 9AD01231514120DFC3502B786D4C84F7A589F05330321CB36F86AF22E0C7348C2296EC
                          APIs
                          • FindFirstFileA.KERNELBASE(00000000,?,00000002), ref: 004027B0
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: FileFindFirst
                          • String ID:
                          • API String ID: 1974802433-0
                          • Opcode ID: a5b213f8be24180874f9adf411d6afc31dfa0cb9f64df1b0b64d1ebf68b7fd5b
                          • Instruction ID: cbd12963852304709d998dbd60bf7e8f33587a64a337c4fd13578998f516bfb3
                          • Opcode Fuzzy Hash: a5b213f8be24180874f9adf411d6afc31dfa0cb9f64df1b0b64d1ebf68b7fd5b
                          • Instruction Fuzzy Hash: 3EF0A072604110DED711EBA49A49AFEB768AF61314F60457FF112B20C1D7B889469B3A

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 134 40390a-403922 call 406500 137 403924-403934 call 406055 134->137 138 403936-403967 call 405fde 134->138 145 40398a-4039b3 call 403bcf call 405b7d 137->145 143 403969-40397a call 405fde 138->143 144 40397f-403985 lstrcatA 138->144 143->144 144->145 152 4039b9-4039be 145->152 153 403a3a-403a42 call 405b7d 145->153 152->153 154 4039c0-4039e4 call 405fde 152->154 159 403a50-403a75 LoadImageA 153->159 160 403a44-403a4b call 40618a 153->160 154->153 161 4039e6-4039e8 154->161 163 403af6-403afe call 40140b 159->163 164 403a77-403aa7 RegisterClassA 159->164 160->159 166 4039f9-403a05 lstrlenA 161->166 167 4039ea-4039f7 call 405aba 161->167 176 403b00-403b03 163->176 177 403b08-403b13 call 403bcf 163->177 168 403bc5 164->168 169 403aad-403af1 SystemParametersInfoA CreateWindowExA 164->169 173 403a07-403a15 lstrcmpiA 166->173 174 403a2d-403a35 call 405a8f call 4060f7 166->174 167->166 172 403bc7-403bce 168->172 169->163 173->174 175 403a17-403a21 GetFileAttributesA 173->175 174->153 180 403a23-403a25 175->180 181 403a27-403a28 call 405ad6 175->181 176->172 187 403b19-403b33 ShowWindow call 406492 177->187 188 403b9c-403ba4 call 4052f0 177->188 180->174 180->181 181->174 195 403b35-403b3a call 406492 187->195 196 403b3f-403b51 GetClassInfoA 187->196 193 403ba6-403bac 188->193 194 403bbe-403bc0 call 40140b 188->194 193->176 197 403bb2-403bb9 call 40140b 193->197 194->168 195->196 200 403b53-403b63 GetClassInfoA RegisterClassA 196->200 201 403b69-403b9a DialogBoxParamA call 40140b call 40385a 196->201 197->176 200->201 201->172
                          APIs
                            • Part of subcall function 00406500: GetModuleHandleA.KERNEL32(?,?,?,004033BB,0000000B), ref: 00406512
                            • Part of subcall function 00406500: GetProcAddress.KERNEL32(00000000,?), ref: 0040652D
                          • lstrcatA.KERNEL32(1033,0042A890,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A890,00000000,00000002,76233410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\fbXZ4ErQMU.exe",00000000), ref: 00403985
                          • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\tranchet,1033,0042A890,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A890,00000000,00000002,76233410), ref: 004039FA
                          • lstrcmpiA.KERNEL32(?,.exe), ref: 00403A0D
                          • GetFileAttributesA.KERNEL32(Call), ref: 00403A18
                          • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\tranchet), ref: 00403A61
                            • Part of subcall function 00406055: wsprintfA.USER32 ref: 00406062
                          • RegisterClassA.USER32(0042EBC0), ref: 00403A9E
                          • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403AB6
                          • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403AEB
                          • ShowWindow.USER32(00000005,00000000), ref: 00403B21
                          • GetClassInfoA.USER32(00000000,RichEdit20A,0042EBC0), ref: 00403B4D
                          • GetClassInfoA.USER32(00000000,RichEdit,0042EBC0), ref: 00403B5A
                          • RegisterClassA.USER32(0042EBC0), ref: 00403B63
                          • DialogBoxParamA.USER32(?,00000000,00403CA7,00000000), ref: 00403B82
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                          • String ID: "C:\Users\user\Desktop\fbXZ4ErQMU.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\tranchet$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                          • API String ID: 1975747703-3162135946
                          • Opcode ID: eddc3fe444e159470dd51134533c2a37fedb4af5c6bfbfbca7f7312343edc14b
                          • Instruction ID: 74cd8b4f7d81cde8c77274d740e3983652abf123a0ec58253698c850822a2f16
                          • Opcode Fuzzy Hash: eddc3fe444e159470dd51134533c2a37fedb4af5c6bfbfbca7f7312343edc14b
                          • Instruction Fuzzy Hash: EC61A5702402016ED220FB669D46F373ABCEB4474DF50403FF995B62E3DA7DA9068A2D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 208 402ea1-402eef GetTickCount GetModuleFileNameA call 405c90 211 402ef1-402ef6 208->211 212 402efb-402f29 call 4060f7 call 405ad6 call 4060f7 GetFileSize 208->212 213 4030d1-4030d5 211->213 220 403014-403022 call 402e3d 212->220 221 402f2f 212->221 227 403024-403027 220->227 228 403077-40307c 220->228 223 402f34-402f4b 221->223 225 402f4d 223->225 226 402f4f-402f58 call 4032ea 223->226 225->226 234 40307e-403086 call 402e3d 226->234 235 402f5e-402f65 226->235 230 403029-403041 call 403300 call 4032ea 227->230 231 40304b-403075 GlobalAlloc call 403300 call 4030d8 227->231 228->213 230->228 254 403043-403049 230->254 231->228 259 403088-403099 231->259 234->228 239 402fe1-402fe5 235->239 240 402f67-402f7b call 405c4b 235->240 244 402fe7-402fee call 402e3d 239->244 245 402fef-402ff5 239->245 240->245 257 402f7d-402f84 240->257 244->245 250 403004-40300c 245->250 251 402ff7-403001 call 4065b7 245->251 250->223 258 403012 250->258 251->250 254->228 254->231 257->245 263 402f86-402f8d 257->263 258->220 260 4030a1-4030a6 259->260 261 40309b 259->261 264 4030a7-4030ad 260->264 261->260 263->245 265 402f8f-402f96 263->265 264->264 266 4030af-4030ca SetFilePointer call 405c4b 264->266 265->245 267 402f98-402f9f 265->267 271 4030cf 266->271 267->245 268 402fa1-402fc1 267->268 268->228 270 402fc7-402fcb 268->270 272 402fd3-402fdb 270->272 273 402fcd-402fd1 270->273 271->213 272->245 274 402fdd-402fdf 272->274 273->258 273->272 274->245
                          APIs
                          • GetTickCount.KERNEL32 ref: 00402EB2
                          • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\fbXZ4ErQMU.exe,00000400), ref: 00402ECE
                            • Part of subcall function 00405C90: GetFileAttributesA.KERNELBASE(00000003,00402EE1,C:\Users\user\Desktop\fbXZ4ErQMU.exe,80000000,00000003), ref: 00405C94
                            • Part of subcall function 00405C90: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405CB6
                          • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\fbXZ4ErQMU.exe,C:\Users\user\Desktop\fbXZ4ErQMU.exe,80000000,00000003), ref: 00402F1A
                          • GlobalAlloc.KERNELBASE(00000040,00000020), ref: 00403050
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                          • String ID: "C:\Users\user\Desktop\fbXZ4ErQMU.exe"$@TA$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\fbXZ4ErQMU.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                          • API String ID: 2803837635-1454061590
                          • Opcode ID: d2642f5c1e57ff917447350ecc80b65a471f1c26fbd3ec2d1bf2d56bf534e989
                          • Instruction ID: b77d5a27d8a3a8735664692b17331c00252a13d20c8f5ee7c59d5cd6c332e3a5
                          • Opcode Fuzzy Hash: d2642f5c1e57ff917447350ecc80b65a471f1c26fbd3ec2d1bf2d56bf534e989
                          • Instruction Fuzzy Hash: B851E471A00204ABDF20AF64DD85FAF7AB8AB14359F60413BF500B22D1C7B89E858B5D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 275 40618a-406195 276 406197-4061a6 275->276 277 4061a8-4061be 275->277 276->277 278 4061c4-4061cf 277->278 279 4063af-4063b3 277->279 278->279 282 4061d5-4061dc 278->282 280 4061e1-4061eb 279->280 281 4063b9-4063c3 279->281 280->281 285 4061f1-4061f8 280->285 283 4063c5-4063c9 call 4060f7 281->283 284 4063ce-4063cf 281->284 282->279 283->284 287 4063a2 285->287 288 4061fe-406232 285->288 289 4063a4-4063aa 287->289 290 4063ac-4063ae 287->290 291 406238-406242 288->291 292 40634f-406352 288->292 289->279 290->279 295 406244-406248 291->295 296 40625c 291->296 293 406382-406385 292->293 294 406354-406357 292->294 300 406393-4063a0 lstrlenA 293->300 301 406387-40638e call 40618a 293->301 297 406367-406373 call 4060f7 294->297 298 406359-406365 call 406055 294->298 295->296 302 40624a-40624e 295->302 299 406263-40626a 296->299 313 406378-40637e 297->313 298->313 305 40626c-40626e 299->305 306 40626f-406271 299->306 300->279 301->300 302->296 303 406250-406254 302->303 303->296 309 406256-40625a 303->309 305->306 311 406273-40628e call 405fde 306->311 312 4062aa-4062ad 306->312 309->299 318 406293-406296 311->318 316 4062bd-4062c0 312->316 317 4062af-4062bb GetSystemDirectoryA 312->317 313->300 315 406380 313->315 319 406347-40634d call 4063d2 315->319 321 4062c2-4062d0 GetWindowsDirectoryA 316->321 322 40632d-40632f 316->322 320 406331-406334 317->320 323 406336-40633a 318->323 324 40629c-4062a5 call 40618a 318->324 319->300 320->319 320->323 321->322 322->320 325 4062d2-4062dc 322->325 323->319 330 40633c-406342 lstrcatA 323->330 324->320 327 4062f6-40630c SHGetSpecialFolderLocation 325->327 328 4062de-4062e1 325->328 333 40632a 327->333 334 40630e-406328 SHGetPathFromIDListA CoTaskMemFree 327->334 328->327 332 4062e3-4062ea 328->332 330->319 336 4062f2-4062f4 332->336 333->322 334->320 334->333 336->320 336->327
                          APIs
                          • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 004062B5
                          • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,0042A070,00000000,00405256,0042A070,00000000), ref: 004062C8
                          • SHGetSpecialFolderLocation.SHELL32(00405256,762323A0,?,0042A070,00000000,00405256,0042A070,00000000), ref: 00406304
                          • SHGetPathFromIDListA.SHELL32(762323A0,Call), ref: 00406312
                          • CoTaskMemFree.OLE32(762323A0), ref: 0040631E
                          • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00406342
                          • lstrlenA.KERNEL32(Call,?,0042A070,00000000,00405256,0042A070,00000000,00000000,00424248,762323A0), ref: 00406394
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                          • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                          • API String ID: 717251189-1230650788
                          • Opcode ID: 8246b69a52679e6fada9b088fd1c5cd7587de1068ebf998f283e7bad78f4f284
                          • Instruction ID: 7f70e83a291e570019a42af90a820afb382591873456cc4d5332d159a7ba1b0c
                          • Opcode Fuzzy Hash: 8246b69a52679e6fada9b088fd1c5cd7587de1068ebf998f283e7bad78f4f284
                          • Instruction Fuzzy Hash: 58612470A00110AADF206F65CC90BBE3B75AB55310F52403FE943BA2D1C77C8962DB9E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 406 401759-40177c call 402bce call 405afc 411 401786-401798 call 4060f7 call 405a8f lstrcatA 406->411 412 40177e-401784 call 4060f7 406->412 417 40179d-4017a3 call 4063d2 411->417 412->417 422 4017a8-4017ac 417->422 423 4017ae-4017b8 call 40646b 422->423 424 4017df-4017e2 422->424 431 4017ca-4017dc 423->431 432 4017ba-4017c8 CompareFileTime 423->432 425 4017e4-4017e5 call 405c6b 424->425 426 4017ea-401806 call 405c90 424->426 425->426 434 401808-40180b 426->434 435 40187e-4018a7 call 40521e call 4030d8 426->435 431->424 432->431 436 401860-40186a call 40521e 434->436 437 40180d-40184f call 4060f7 * 2 call 40618a call 4060f7 call 405813 434->437 447 4018a9-4018ad 435->447 448 4018af-4018bb SetFileTime 435->448 449 401873-401879 436->449 437->422 469 401855-401856 437->469 447->448 451 4018c1-4018cc CloseHandle 447->451 448->451 452 402a63 449->452 454 4018d2-4018d5 451->454 455 402a5a-402a5d 451->455 456 402a65-402a69 452->456 459 4018d7-4018e8 call 40618a lstrcatA 454->459 460 4018ea-4018ed call 40618a 454->460 455->452 466 4018f2-402382 459->466 460->466 470 402387-40238c 466->470 471 402382 call 405813 466->471 469->449 472 401858-401859 469->472 470->456 471->470 472->436
                          APIs
                          • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\tranchet\Trykmaalere,00000000,00000000,00000031), ref: 00401798
                          • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\tranchet\Trykmaalere,00000000,00000000,00000031), ref: 004017C2
                            • Part of subcall function 004060F7: lstrcpynA.KERNEL32(?,?,00000400,0040341A,hyaenic Setup,NSIS Error,?,00000007,00000009,0000000B), ref: 00406104
                            • Part of subcall function 0040521E: lstrlenA.KERNEL32(0042A070,00000000,00424248,762323A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                            • Part of subcall function 0040521E: lstrlenA.KERNEL32(00403233,0042A070,00000000,00424248,762323A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                            • Part of subcall function 0040521E: lstrcatA.KERNEL32(0042A070,00403233,00403233,0042A070,00000000,00424248,762323A0), ref: 0040527A
                            • Part of subcall function 0040521E: SetWindowTextA.USER32(0042A070,0042A070), ref: 0040528C
                            • Part of subcall function 0040521E: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                            • Part of subcall function 0040521E: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                            • Part of subcall function 0040521E: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                          • String ID: C:\Users\user\AppData\Local\Temp\nsk1249.tmp$C:\Users\user\AppData\Local\Temp\nsk1249.tmp\System.dll$C:\Users\user\tranchet\Trykmaalere$Call
                          • API String ID: 1941528284-1616265224
                          • Opcode ID: 90f03a76fcf5146749e92d53d58810ea094b6bbbf58b510143803768f557fb10
                          • Instruction ID: bb6028c3778eb4cec0c6c1d7eb8bf073a5325157b60575559d09146ef789c5eb
                          • Opcode Fuzzy Hash: 90f03a76fcf5146749e92d53d58810ea094b6bbbf58b510143803768f557fb10
                          • Instruction Fuzzy Hash: D4419A32900515BACB107BB5CC45DAF3678EF05329F20833FF426B51E1DA7C8A529A6D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 473 4030d8-4030ec 474 4030f5-4030fe 473->474 475 4030ee 473->475 476 403100 474->476 477 403107-40310c 474->477 475->474 476->477 478 40311c-403129 call 4032ea 477->478 479 40310e-403117 call 403300 477->479 483 4032d8 478->483 484 40312f-403133 478->484 479->478 485 4032da-4032db 483->485 486 403283-403285 484->486 487 403139-403182 GetTickCount 484->487 490 4032e3-4032e7 485->490 488 4032c5-4032c8 486->488 489 403287-40328a 486->489 491 4032e0 487->491 492 403188-403190 487->492 493 4032ca 488->493 494 4032cd-4032d6 call 4032ea 488->494 489->491 495 40328c 489->495 491->490 496 403192 492->496 497 403195-4031a3 call 4032ea 492->497 493->494 494->483 506 4032dd 494->506 500 40328f-403295 495->500 496->497 497->483 505 4031a9-4031b2 497->505 503 403297 500->503 504 403299-4032a7 call 4032ea 500->504 503->504 504->483 510 4032a9-4032b5 call 405d37 504->510 509 4031b8-4031d8 call 406625 505->509 506->491 515 40327b-40327d 509->515 516 4031de-4031f1 GetTickCount 509->516 517 4032b7-4032c1 510->517 518 40327f-403281 510->518 515->485 519 4031f3-4031fb 516->519 520 403236-403238 516->520 517->500 521 4032c3 517->521 518->485 522 403203-403233 MulDiv wsprintfA call 40521e 519->522 523 4031fd-403201 519->523 524 40323a-40323e 520->524 525 40326f-403273 520->525 521->491 522->520 523->520 523->522 528 403240-403247 call 405d37 524->528 529 403255-403260 524->529 525->492 526 403279 525->526 526->491 533 40324c-40324e 528->533 530 403263-403267 529->530 530->509 534 40326d 530->534 533->518 535 403250-403253 533->535 534->491 535->530
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: CountTick$wsprintf
                          • String ID: ... %d%%$HBB
                          • API String ID: 551687249-372310663
                          • Opcode ID: 6105a75ac29723741842d4acb1fda97f5bbbd1560d169b08801a999ce2df6a86
                          • Instruction ID: fb515496a62f3aa3a261881475cff076317c99cf113f2c02ef85df511ffa7adb
                          • Opcode Fuzzy Hash: 6105a75ac29723741842d4acb1fda97f5bbbd1560d169b08801a999ce2df6a86
                          • Instruction Fuzzy Hash: 68515C71900219ABCB10DF95DA44A9E7BA8EF54356F1481BFE800B72D0C7789A41CBAD

                          Control-flow Graph

                          APIs
                          • GetDC.USER32(?), ref: 00401E38
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E52
                          • MulDiv.KERNEL32(00000000,00000000), ref: 00401E5A
                          • ReleaseDC.USER32(?,00000000), ref: 00401E6B
                          • CreateFontIndirectA.GDI32(0040B838), ref: 00401EBA
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: CapsCreateDeviceFontIndirectRelease
                          • String ID: Calibri
                          • API String ID: 3808545654-1409258342
                          • Opcode ID: f10f52d3ac84b2d12136eae3b4e18ea67906ed9852a07f942bb56bd2ae0fd4ab
                          • Instruction ID: 5cb61850c30ba341adb392aac0b64178207aa51c0a8ebf491f77c064e1fc76ea
                          • Opcode Fuzzy Hash: f10f52d3ac84b2d12136eae3b4e18ea67906ed9852a07f942bb56bd2ae0fd4ab
                          • Instruction Fuzzy Hash: A9019E72500240AFE7007BB0AE4AB9A3FF8EB55311F10843EF281B61F2CB7904458B6C

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 549 4056e4-40572f CreateDirectoryA 550 405731-405733 549->550 551 405735-405742 GetLastError 549->551 552 40575c-40575e 550->552 551->552 553 405744-405758 SetFileSecurityA 551->553 553->550 554 40575a GetLastError 553->554 554->552
                          APIs
                          • CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405727
                          • GetLastError.KERNEL32 ref: 0040573B
                          • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 00405750
                          • GetLastError.KERNEL32 ref: 0040575A
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 0040570A
                          • C:\Users\user\Desktop, xrefs: 004056E4
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: ErrorLast$CreateDirectoryFileSecurity
                          • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                          • API String ID: 3449924974-1229045261
                          • Opcode ID: daf6715ee4a9a889a1accaf74548b3993ec7aecc528708590295bf6406307990
                          • Instruction ID: 199f41d5e308de8b96f609cf750b761cce64c3ab1ca85d652f9564a15c89f022
                          • Opcode Fuzzy Hash: daf6715ee4a9a889a1accaf74548b3993ec7aecc528708590295bf6406307990
                          • Instruction Fuzzy Hash: FF010471C00219EADF019BA0C944BEFBBB8EB04354F00403AD944B6290E7B89A48DBA9

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 555 406492-4064b2 GetSystemDirectoryA 556 4064b4 555->556 557 4064b6-4064b8 555->557 556->557 558 4064c8-4064ca 557->558 559 4064ba-4064c2 557->559 561 4064cb-4064fd wsprintfA LoadLibraryExA 558->561 559->558 560 4064c4-4064c6 559->560 560->561
                          APIs
                          • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004064A9
                          • wsprintfA.USER32 ref: 004064E2
                          • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004064F6
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: DirectoryLibraryLoadSystemwsprintf
                          • String ID: %s%s.dll$UXTHEME$\
                          • API String ID: 2200240437-4240819195
                          • Opcode ID: 265ca81b40b881dab18d3809a90e9c8d4eed5c2f9756e13f598d1e00e091b07b
                          • Instruction ID: 03f82d29dddd483449b3488b7c2e1daaa1831c8d2f1a72e13e07ee25955ceb49
                          • Opcode Fuzzy Hash: 265ca81b40b881dab18d3809a90e9c8d4eed5c2f9756e13f598d1e00e091b07b
                          • Instruction Fuzzy Hash: DDF0213051020A6BDB55D764DD0DFFB375CEB08304F14017AA58AF11C1DA78D5398B6D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 562 405cbf-405cc9 563 405cca-405cf5 GetTickCount GetTempFileNameA 562->563 564 405d04-405d06 563->564 565 405cf7-405cf9 563->565 567 405cfe-405d01 564->567 565->563 566 405cfb 565->566 566->567
                          APIs
                          • GetTickCount.KERNEL32 ref: 00405CD3
                          • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,00000007,00000009,0000000B), ref: 00405CED
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405CC2
                          • "C:\Users\user\Desktop\fbXZ4ErQMU.exe", xrefs: 00405CBF
                          • nsa, xrefs: 00405CCA
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: CountFileNameTempTick
                          • String ID: "C:\Users\user\Desktop\fbXZ4ErQMU.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                          • API String ID: 1716503409-786397669
                          • Opcode ID: 3d6f8019ec5f34494dc3b68805de6783e4b5f3688fe49378b00e43b1512e0d50
                          • Instruction ID: e7aa094648ebfea3bacdca9f43850832113df4cf88f6c4d01cd72ac7e01032f8
                          • Opcode Fuzzy Hash: 3d6f8019ec5f34494dc3b68805de6783e4b5f3688fe49378b00e43b1512e0d50
                          • Instruction Fuzzy Hash: 0AF08236308308ABEB108F56ED04B9B7BACDF91750F10C03BFA44EB290D6B499548758

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 568 402cd0-402cf9 call 405f7d 570 402cfe-402d02 568->570 571 402db3-402db7 570->571 572 402d08-402d0c 570->572 573 402d31-402d44 572->573 574 402d0e-402d2f RegEnumValueA 572->574 576 402d6d-402d74 RegEnumKeyA 573->576 574->573 575 402d98-402da6 RegCloseKey 574->575 575->571 577 402d46-402d48 576->577 578 402d76-402d88 RegCloseKey call 406500 576->578 577->575 579 402d4a-402d5e call 402cd0 577->579 584 402da8-402dae 578->584 585 402d8a-402d96 RegDeleteKeyA 578->585 579->578 586 402d60-402d6c 579->586 584->571 585->571 586->576
                          APIs
                          • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402D24
                          • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402D70
                          • RegCloseKey.ADVAPI32(?,?,?), ref: 00402D79
                          • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402D90
                          • RegCloseKey.ADVAPI32(?,?,?), ref: 00402D9B
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: CloseEnum$DeleteValue
                          • String ID:
                          • API String ID: 1354259210-0
                          • Opcode ID: c08e85f7896b9a4561d683b23b3b2dae21a167d845191f4bc040fadce0444681
                          • Instruction ID: 1e980c0bf3dfe1ee8e8c0bbb525d6a304c4f3a3ada6f962fb42c7dde8bd75a6e
                          • Opcode Fuzzy Hash: c08e85f7896b9a4561d683b23b3b2dae21a167d845191f4bc040fadce0444681
                          • Instruction Fuzzy Hash: C6215771900108BBEF129F90CE89EEE7A7DEF44344F100076FA55B11E0E7B48E54AA68

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 587 6eb116db-6eb11717 call 6eb11a98 591 6eb11834-6eb11836 587->591 592 6eb1171d-6eb11721 587->592 593 6eb11723-6eb11729 call 6eb122af 592->593 594 6eb1172a-6eb11737 call 6eb122f1 592->594 593->594 599 6eb11767-6eb1176e 594->599 600 6eb11739-6eb1173e 594->600 601 6eb11770-6eb1178c call 6eb124d8 call 6eb11559 call 6eb11266 GlobalFree 599->601 602 6eb1178e-6eb11792 599->602 603 6eb11740-6eb11741 600->603 604 6eb11759-6eb1175c 600->604 626 6eb117e3-6eb117e7 601->626 609 6eb11794-6eb117da call 6eb1156b call 6eb124d8 602->609 610 6eb117dc-6eb117e2 call 6eb124d8 602->610 607 6eb11743-6eb11744 603->607 608 6eb11749-6eb1174a call 6eb12a38 603->608 604->599 605 6eb1175e-6eb1175f call 6eb12cc3 604->605 618 6eb11764 605->618 614 6eb11751-6eb11757 call 6eb126b2 607->614 615 6eb11746-6eb11747 607->615 621 6eb1174f 608->621 609->626 610->626 625 6eb11766 614->625 615->599 615->608 618->625 621->618 625->599 630 6eb11824-6eb1182b 626->630 631 6eb117e9-6eb117f7 call 6eb1249e 626->631 630->591 633 6eb1182d-6eb1182e GlobalFree 630->633 637 6eb117f9-6eb117fc 631->637 638 6eb1180f-6eb11816 631->638 633->591 637->638 639 6eb117fe-6eb11806 637->639 638->630 640 6eb11818-6eb11823 call 6eb114e2 638->640 639->638 641 6eb11808-6eb11809 FreeLibrary 639->641 640->630 641->638
                          APIs
                            • Part of subcall function 6EB11A98: GlobalFree.KERNEL32(?), ref: 6EB11D09
                            • Part of subcall function 6EB11A98: GlobalFree.KERNEL32(?), ref: 6EB11D0E
                            • Part of subcall function 6EB11A98: GlobalFree.KERNEL32(?), ref: 6EB11D13
                          • GlobalFree.KERNEL32(00000000), ref: 6EB11786
                          • FreeLibrary.KERNEL32(?), ref: 6EB11809
                          • GlobalFree.KERNEL32(00000000), ref: 6EB1182E
                            • Part of subcall function 6EB122AF: GlobalAlloc.KERNEL32(00000040,?), ref: 6EB122E0
                            • Part of subcall function 6EB126B2: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6EB11757,00000000), ref: 6EB12782
                            • Part of subcall function 6EB1156B: wsprintfA.USER32 ref: 6EB11599
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4681309721.000000006EB11000.00000020.00000001.01000000.00000005.sdmp, Offset: 6EB10000, based on PE: true
                          • Associated: 00000001.00000002.4681285419.000000006EB10000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000001.00000002.4681324196.000000006EB13000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000001.00000002.4681340147.000000006EB15000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_6eb10000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc$Librarywsprintf
                          • String ID:
                          • API String ID: 3962662361-3916222277
                          • Opcode ID: f0a50e38e956bad673f12062e63a630dd1efc570fab14b93a4005d5842727237
                          • Instruction ID: 30cac877c441d1bcc16151071e49ea0b01ce2c8f0fe7a135e5aa86755c2ec91d
                          • Opcode Fuzzy Hash: f0a50e38e956bad673f12062e63a630dd1efc570fab14b93a4005d5842727237
                          • Instruction Fuzzy Hash: F641E4B10183868ADB409FE48884BD93FECFF22338F088478EA159B585DB74C549C7A1

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 644 401c2e-401c4e call 402bac * 2 649 401c50-401c57 call 402bce 644->649 650 401c5a-401c5e 644->650 649->650 652 401c60-401c67 call 402bce 650->652 653 401c6a-401c70 650->653 652->653 654 401c72-401c8e call 402bac * 2 653->654 655 401cbe-401ce4 call 402bce * 2 FindWindowExA 653->655 667 401c90-401cac SendMessageTimeoutA 654->667 668 401cae-401cbc SendMessageA 654->668 669 401cea 655->669 670 401ced-401cf0 667->670 668->669 669->670 671 401cf6 670->671 672 402a5a-402a69 670->672 671->672
                          APIs
                          • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C9E
                          • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401CB6
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: MessageSend$Timeout
                          • String ID: !
                          • API String ID: 1777923405-2657877971
                          • Opcode ID: b3808b2228016cded034fddbbda71ccd0a5c26c3e8a9a8fe6146862fd49d124c
                          • Instruction ID: ba3ca6c87ae36af76b9178a01453159e8aa8f3f4b54328e0dc7fa76aa85262fd
                          • Opcode Fuzzy Hash: b3808b2228016cded034fddbbda71ccd0a5c26c3e8a9a8fe6146862fd49d124c
                          • Instruction Fuzzy Hash: 10216071A44208BEEB05AFB5D98AAAD7FB4EF44304F20447FF502B61D1D6B88541DB28

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 675 402476-4024a7 call 402bce * 2 call 402c5e 682 402a5a-402a69 675->682 683 4024ad-4024b7 675->683 685 4024c7-4024ca 683->685 686 4024b9-4024c6 call 402bce lstrlenA 683->686 689 4024e1-4024e4 685->689 690 4024cc-4024e0 call 402bac 685->690 686->685 691 4024f5-402509 RegSetValueExA 689->691 692 4024e6-4024f0 call 4030d8 689->692 690->689 696 40250b 691->696 697 40250e-4025eb RegCloseKey 691->697 692->691 696->697 697->682
                          APIs
                          • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsk1249.tmp,00000023,00000011,00000002), ref: 004024C1
                          • RegSetValueExA.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsk1249.tmp,00000000,00000011,00000002), ref: 00402501
                          • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsk1249.tmp,00000000,00000011,00000002), ref: 004025E5
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: CloseValuelstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\nsk1249.tmp
                          • API String ID: 2655323295-3325367321
                          • Opcode ID: 7a7c23c04c90be8b3e585445916e0e680a3a1629c3414f9b9df94d306a1b16c3
                          • Instruction ID: f8068cdfa95035626473adca5f51816a5c1db3e2bbb00f719c7efdf62c59a762
                          • Opcode Fuzzy Hash: 7a7c23c04c90be8b3e585445916e0e680a3a1629c3414f9b9df94d306a1b16c3
                          • Instruction Fuzzy Hash: 12118171E00218AFEF10AFA59E89EAE7A74EB44314F20443BF505F71D1D6B99D419B28
                          APIs
                          • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 004020C8
                            • Part of subcall function 0040521E: lstrlenA.KERNEL32(0042A070,00000000,00424248,762323A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                            • Part of subcall function 0040521E: lstrlenA.KERNEL32(00403233,0042A070,00000000,00424248,762323A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                            • Part of subcall function 0040521E: lstrcatA.KERNEL32(0042A070,00403233,00403233,0042A070,00000000,00424248,762323A0), ref: 0040527A
                            • Part of subcall function 0040521E: SetWindowTextA.USER32(0042A070,0042A070), ref: 0040528C
                            • Part of subcall function 0040521E: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                            • Part of subcall function 0040521E: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                            • Part of subcall function 0040521E: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                          • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 004020D8
                          • GetProcAddress.KERNEL32(00000000,?), ref: 004020E8
                          • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 00402152
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                          • String ID:
                          • API String ID: 2987980305-0
                          • Opcode ID: 2b161932b8e15f20ea054abb7da5fd45cac2ee1996f8da02ed958f71ebdc799e
                          • Instruction ID: f7200b9d034bcb950a45a2beb12b39e5fe5f048be62c56950c98b25cd9e943c1
                          • Opcode Fuzzy Hash: 2b161932b8e15f20ea054abb7da5fd45cac2ee1996f8da02ed958f71ebdc799e
                          • Instruction Fuzzy Hash: 7A21C932600115EBCF207FA58F49A5F76B1AF14359F20423BF651B61D1CABC89829A5E
                          APIs
                            • Part of subcall function 00405B28: CharNextA.USER32(?,?,0042BC98,?,00405B94,0042BC98,0042BC98,76233410,?,C:\Users\user\AppData\Local\Temp\,004058DF,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B36
                            • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B3B
                            • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B4F
                          • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                            • Part of subcall function 004056E4: CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405727
                          • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\tranchet\Trykmaalere,00000000,00000000,000000F0), ref: 0040163C
                          Strings
                          • C:\Users\user\tranchet\Trykmaalere, xrefs: 00401631
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: CharNext$Directory$AttributesCreateCurrentFile
                          • String ID: C:\Users\user\tranchet\Trykmaalere
                          • API String ID: 1892508949-9360506
                          • Opcode ID: 6f48d1f4569c46ba79332d618e5f2744522d6a7c4d3c9928c8ba38f6ac20f072
                          • Instruction ID: 2360f0c6ce39ff042ef5b5b007943225e6ab3dc636003d735fb75761c746189e
                          • Opcode Fuzzy Hash: 6f48d1f4569c46ba79332d618e5f2744522d6a7c4d3c9928c8ba38f6ac20f072
                          • Instruction Fuzzy Hash: C1110431204141EBCB307FB55D419BF37B09A52725B284A7FE591B22E3DA3D4943AA2E
                          APIs
                          • RegQueryValueExA.KERNELBASE(?,?,00000000,?,?,00000400,Call,0042A070,?,?,?,00000002,Call,?,00406293,80000002), ref: 00406024
                          • RegCloseKey.KERNELBASE(?,?,00406293,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,?,0042A070), ref: 0040602F
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: CloseQueryValue
                          • String ID: Call
                          • API String ID: 3356406503-1824292864
                          • Opcode ID: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                          • Instruction ID: 43fb42cdfa68b2f9ef01d23c83e90927a4e1ed7766022ad00d18a88e1c3f91d6
                          • Opcode Fuzzy Hash: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                          • Instruction Fuzzy Hash: 9F01BC72100209ABCF22CF20CC09FDB3FA9EF45364F00403AF916A2191D238C968CBA4
                          APIs
                          • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042C098,Error launching installer), ref: 004057BF
                          • CloseHandle.KERNEL32(?), ref: 004057CC
                          Strings
                          • Error launching installer, xrefs: 004057A9
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: CloseCreateHandleProcess
                          • String ID: Error launching installer
                          • API String ID: 3712363035-66219284
                          • Opcode ID: de0eed9ff358aa0300570f89c8dde483a6f9bec5cddf33796de70880124f880f
                          • Instruction ID: 4c3df7556a0b034395016ee82922b733160aa74f7bc511f6187c6ec266d632ef
                          • Opcode Fuzzy Hash: de0eed9ff358aa0300570f89c8dde483a6f9bec5cddf33796de70880124f880f
                          • Instruction Fuzzy Hash: 4DE0B6B4600209BFEB109BA4ED89F7F7BBCEB04604F504525BE59F2290E67498199A7C
                          APIs
                          • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025BA
                          • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 004025CD
                          • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsk1249.tmp,00000000,00000011,00000002), ref: 004025E5
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: Enum$CloseValue
                          • String ID:
                          • API String ID: 397863658-0
                          • Opcode ID: 7b99555fd6f8dae37ea9679ab54f9e8123d87756e6997b06f3b56209368cff92
                          • Instruction ID: ee0fd62ac357f9525b55a30647733f0e3798e9bebba0400de635a53faed38b57
                          • Opcode Fuzzy Hash: 7b99555fd6f8dae37ea9679ab54f9e8123d87756e6997b06f3b56209368cff92
                          • Instruction Fuzzy Hash: 22017C71604204FFE7219F549E99ABF7ABCEF40358F20403EF505A61C0DAB88A459629
                          APIs
                          • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 00402546
                          • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsk1249.tmp,00000000,00000011,00000002), ref: 004025E5
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: CloseQueryValue
                          • String ID:
                          • API String ID: 3356406503-0
                          • Opcode ID: 6213eafd8b46f955f614869397e07eb9b1fadeed980eca135cc1a2a492507a25
                          • Instruction ID: 101e8c123746c764c526cee79e76b60048690b918ccacca24166b7bb3c1ff757
                          • Opcode Fuzzy Hash: 6213eafd8b46f955f614869397e07eb9b1fadeed980eca135cc1a2a492507a25
                          • Instruction Fuzzy Hash: EA11C171A00205EFDF25DF64CE985AE7AB4EF00355F20843FE446B72C0D6B88A86DB19
                          APIs
                          • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                          • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: c8a7ffa28b32ff67f29a84afd2625c26bb9c758fd8177903822af55b1e7359ed
                          • Instruction ID: 5c958b1953f7fe6cfac6f5d6f257cc34f78b067395a477e057d2c1298905e336
                          • Opcode Fuzzy Hash: c8a7ffa28b32ff67f29a84afd2625c26bb9c758fd8177903822af55b1e7359ed
                          • Instruction Fuzzy Hash: F801D1317242209BE7195B79DD08B6A3698E710718F50823AF851F61F1DA78DC129B4D
                          APIs
                          • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 00402442
                          • RegCloseKey.ADVAPI32(00000000), ref: 0040244B
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: CloseDeleteValue
                          • String ID:
                          • API String ID: 2831762973-0
                          • Opcode ID: 07b32314aa9a422e600aa3f6776080c68f979d551996adedd097d7eb0a26439f
                          • Instruction ID: 28034f9d49707e31730e5ee4ae5769526bd8744af0d0927f07882998c216e066
                          • Opcode Fuzzy Hash: 07b32314aa9a422e600aa3f6776080c68f979d551996adedd097d7eb0a26439f
                          • Instruction Fuzzy Hash: E3F09632600121DBE720BFA49B8EAAE72A59B40314F25453FF602B71C1D9F84E4246AE
                          APIs
                          • ShowWindow.USER32(00000000,00000000), ref: 00401EE3
                          • EnableWindow.USER32(00000000,00000000), ref: 00401EEE
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: Window$EnableShow
                          • String ID:
                          • API String ID: 1136574915-0
                          • Opcode ID: 8b7817ca22b79e9cee4aa1cb1be03623fa11f3862aed9c5f3b00cb70b3c6cfe0
                          • Instruction ID: 2686c2d45ba130581374544c13beebfcaf73fd10f5aa92b185336ae358fe78f7
                          • Opcode Fuzzy Hash: 8b7817ca22b79e9cee4aa1cb1be03623fa11f3862aed9c5f3b00cb70b3c6cfe0
                          • Instruction Fuzzy Hash: 69E09232B04200EFD714EFA5EA8856E7BB0EB40325B20413FF001F20C1DAB848418A69
                          APIs
                          • GetModuleHandleA.KERNEL32(?,?,?,004033BB,0000000B), ref: 00406512
                          • GetProcAddress.KERNEL32(00000000,?), ref: 0040652D
                            • Part of subcall function 00406492: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004064A9
                            • Part of subcall function 00406492: wsprintfA.USER32 ref: 004064E2
                            • Part of subcall function 00406492: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004064F6
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                          • String ID:
                          • API String ID: 2547128583-0
                          • Opcode ID: 86a36fe79f27c55ffb4f68e9eb19a7d4fc21bb30cdd0e1b9c8c3d4c34093b0ac
                          • Instruction ID: acae0596759e2787f84b09bdc6f4b17f60683fab7501ae0ee02ebffea3798694
                          • Opcode Fuzzy Hash: 86a36fe79f27c55ffb4f68e9eb19a7d4fc21bb30cdd0e1b9c8c3d4c34093b0ac
                          • Instruction Fuzzy Hash: F7E08672A0421177D2105A74BE0893B72A8DE89740302043EF546F2144D7389C71966D
                          APIs
                          • GetFileAttributesA.KERNELBASE(00000003,00402EE1,C:\Users\user\Desktop\fbXZ4ErQMU.exe,80000000,00000003), ref: 00405C94
                          • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405CB6
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: File$AttributesCreate
                          • String ID:
                          • API String ID: 415043291-0
                          • Opcode ID: 495096ec3bada98d59396949f3e5d8db788c55d9a14f95543a77051fd5c04aa8
                          • Instruction ID: ee59d6d0e1d409ab4f08bbdf592326cff3c7222ef74ae4255e7f212f1854b30f
                          • Opcode Fuzzy Hash: 495096ec3bada98d59396949f3e5d8db788c55d9a14f95543a77051fd5c04aa8
                          • Instruction Fuzzy Hash: F5D09E31654201AFEF0D8F20DE16F2E7AA2EB84B00F11952CB782941E1DA715819AB19
                          APIs
                          • CreateDirectoryA.KERNELBASE(?,00000000,0040333B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 00405767
                          • GetLastError.KERNEL32(?,00000007,00000009,0000000B), ref: 00405775
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: CreateDirectoryErrorLast
                          • String ID:
                          • API String ID: 1375471231-0
                          • Opcode ID: 16e4c654e9ce22ade12b11bcec0acffe1e0d8e5e5550dff24455bfee17a8caa2
                          • Instruction ID: 5acf30d11c51c39224c83c09ee2e5989404a14e094893e30e7ab7d3df00569a4
                          • Opcode Fuzzy Hash: 16e4c654e9ce22ade12b11bcec0acffe1e0d8e5e5550dff24455bfee17a8caa2
                          • Instruction Fuzzy Hash: 21C04C31244505EFD6105B30AE08F177A90AB50741F1644396186E10B0EA388455E96D
                          APIs
                          • VirtualAllocEx.KERNELBASE(00000000), ref: 6EB12AF7
                          Memory Dump Source
                          • Source File: 00000001.00000002.4681309721.000000006EB11000.00000020.00000001.01000000.00000005.sdmp, Offset: 6EB10000, based on PE: true
                          • Associated: 00000001.00000002.4681285419.000000006EB10000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000001.00000002.4681324196.000000006EB13000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000001.00000002.4681340147.000000006EB15000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_6eb10000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: 915162d694b97dce1c0ecf413fc3235e3234018f1d3f8dc2ba345e219fd0445b
                          • Instruction ID: 92c20156b5b8508acf6e421e31d2b17e427cd791efa24fd852390ca23422fa0a
                          • Opcode Fuzzy Hash: 915162d694b97dce1c0ecf413fc3235e3234018f1d3f8dc2ba345e219fd0445b
                          • Instruction Fuzzy Hash: 4A4169729186459FDB20DFEAD886BD93F68EB17378F244C29E40487604D7349982ABA0
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: wsprintf
                          • String ID:
                          • API String ID: 2111968516-0
                          • Opcode ID: 367ecb1198001a867d8e3b7756d3c175cfd735077116dd6966e3788219f0b2a9
                          • Instruction ID: 7f5a5d1368c13d317d2e99ee4d98356b480ceadea176dd08c5889da6900fd1c4
                          • Opcode Fuzzy Hash: 367ecb1198001a867d8e3b7756d3c175cfd735077116dd6966e3788219f0b2a9
                          • Instruction Fuzzy Hash: 7E21B730D04299FADF328BA885886AEBB749F11314F1440BFE491B73D1C2BD8A85DB19
                          APIs
                          • MoveFileA.KERNEL32(00000000,00000000), ref: 00401685
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: FileMove
                          • String ID:
                          • API String ID: 3562171763-0
                          • Opcode ID: 1edc5c0a003d732ce3bee6573eefb30b8b2fa69015ea7de72e37931521f2516e
                          • Instruction ID: c16fe538d576f0a812f108a5c598968f2bbae53de2c44bc87e09c6d73b5458c5
                          • Opcode Fuzzy Hash: 1edc5c0a003d732ce3bee6573eefb30b8b2fa69015ea7de72e37931521f2516e
                          • Instruction Fuzzy Hash: EEF01D3160852496DB20ABA54E49E5F3264DB42769B24033BF422B21D1EABC8542956E
                          APIs
                          • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 00402749
                            • Part of subcall function 00406055: wsprintfA.USER32 ref: 00406062
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: FilePointerwsprintf
                          • String ID:
                          • API String ID: 327478801-0
                          • Opcode ID: 6490c60e78b8e72c9ff7044d1ebd2fda03870678213011db9787ff048aa9e55a
                          • Instruction ID: d2cb0ca5e863be2ef59b536234997f243a65a7806d73518010ac019a9530af38
                          • Opcode Fuzzy Hash: 6490c60e78b8e72c9ff7044d1ebd2fda03870678213011db9787ff048aa9e55a
                          • Instruction Fuzzy Hash: 7EE09271B00114EED711FBA4AE49DBF77B8EB40315B10403BF102F10C1CABC49128A2E
                          APIs
                          • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 004023D5
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: PrivateProfileStringWrite
                          • String ID:
                          • API String ID: 390214022-0
                          • Opcode ID: cd8b371b6f55f1d33d0eddf2f35f8062392e7128ea2648a4caa2e71cbd90ff81
                          • Instruction ID: a2264a5e3b04165b7de03e79847980bb6a424129cbe2f78830b73284cd35be0b
                          • Opcode Fuzzy Hash: cd8b371b6f55f1d33d0eddf2f35f8062392e7128ea2648a4caa2e71cbd90ff81
                          • Instruction Fuzzy Hash: F8E04831610114ABD7203EB14F8D97F31A9DB44304B34153FBA11761C6D9FC5C414279
                          APIs
                          • SearchPathA.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 00401733
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: PathSearch
                          • String ID:
                          • API String ID: 2203818243-0
                          • Opcode ID: e053cd0a5a713bcd6573213f31fe775dca372833d122c7f25a227a8b80c7c065
                          • Instruction ID: 99b882ef8ac932529d6fdfe3c41faefb6a71927cb26e20fd81cb329c01224dc0
                          • Opcode Fuzzy Hash: e053cd0a5a713bcd6573213f31fe775dca372833d122c7f25a227a8b80c7c065
                          • Instruction Fuzzy Hash: 93E0DF72304210EFD710DF649E49BAB37A8DF10368B20427AE111A60C2E6F89906873D
                          APIs
                          • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402C7F,00000000,?,?), ref: 00405FD4
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: Create
                          • String ID:
                          • API String ID: 2289755597-0
                          • Opcode ID: 33f0ef72135594440bd39ae1090de480165a05d63dfabbbeebd316e266d8c237
                          • Instruction ID: 8c71f3c26dc4a4bf3eef9e60a583d004d00a96479e721722a8f6be6a9d57506c
                          • Opcode Fuzzy Hash: 33f0ef72135594440bd39ae1090de480165a05d63dfabbbeebd316e266d8c237
                          • Instruction Fuzzy Hash: 1CE0E6B201450ABEDF095F50DD0ED7B3B1DE704300F14452EF906D4050E6B5A9205A34
                          APIs
                          • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004032FD,00000000,00000000,00403127,000000FF,00000004,00000000,00000000,00000000), ref: 00405D1C
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: da94c88c01f32db49c143d41d40f73f2c481f3bafd85dc9fd8b917d4e0158b31
                          • Instruction ID: 6bc3b1048b15a49576125e72cb6f14b4cec2b2626e36b687d4021167e808d8fe
                          • Opcode Fuzzy Hash: da94c88c01f32db49c143d41d40f73f2c481f3bafd85dc9fd8b917d4e0158b31
                          • Instruction Fuzzy Hash: 2BE08C3221021EABCF109E608C08EEB3B6CEF00360F048833FD54E2140D234E8209BA4
                          APIs
                          • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004032B3,00000000,0041D448,000000FF,0041D448,000000FF,000000FF,00000004,00000000), ref: 00405D4B
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: FileWrite
                          • String ID:
                          • API String ID: 3934441357-0
                          • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                          • Instruction ID: 0f83f4d47d9459a9b0ba24ed2798b341cbbd10940215494d2392ac534f962254
                          • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                          • Instruction Fuzzy Hash: 41E08C3220025AABCF10AFA08C04EEB3B6CEF00360F008833FA15E7050D630E8219BA8
                          APIs
                          • VirtualProtect.KERNELBASE(6EB1404C,00000004,00000040,6EB1403C), ref: 6EB1293F
                          Memory Dump Source
                          • Source File: 00000001.00000002.4681309721.000000006EB11000.00000020.00000001.01000000.00000005.sdmp, Offset: 6EB10000, based on PE: true
                          • Associated: 00000001.00000002.4681285419.000000006EB10000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000001.00000002.4681324196.000000006EB13000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000001.00000002.4681340147.000000006EB15000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_6eb10000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: ProtectVirtual
                          • String ID:
                          • API String ID: 544645111-0
                          • Opcode ID: 650c8aef5058b3004855d1d30dcacafb046b53f75e59d2bc022d34c67b0ced72
                          • Instruction ID: acd24c15343467f22864dbbe8e6abd88e11f369a1e2534f579f0a25f736ff319
                          • Opcode Fuzzy Hash: 650c8aef5058b3004855d1d30dcacafb046b53f75e59d2bc022d34c67b0ced72
                          • Instruction Fuzzy Hash: E9F0ACB1508A82DECB50CF7B844E7853FE0A32737CB06492EE158D7A41E3344A468B15
                          APIs
                          • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402413
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: PrivateProfileString
                          • String ID:
                          • API String ID: 1096422788-0
                          • Opcode ID: b20ff68c1f91e8945650ad06eb6636fe2efcf37a6f72d7170e5f25b2e3b7c808
                          • Instruction ID: ec2b9ed2aa8753cc56e49b6d1f5b0ead50a941972cde74363bc07da0fbfd84e4
                          • Opcode Fuzzy Hash: b20ff68c1f91e8945650ad06eb6636fe2efcf37a6f72d7170e5f25b2e3b7c808
                          • Instruction Fuzzy Hash: 40E04630904208BAEB006FA08E09EAD3A79EF01710F20003AF9617B0D1E6B89482D72E
                          APIs
                          • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,0042A070,?,?,0040600B,0042A070,?,?,?,00000002,Call), ref: 00405FA1
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: Open
                          • String ID:
                          • API String ID: 71445658-0
                          • Opcode ID: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                          • Instruction ID: 8d979316dbb681ef417a562383420c35b8ea1d7cbf1ba97b3ef1f912197d15a8
                          • Opcode Fuzzy Hash: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                          • Instruction Fuzzy Hash: 26D0EC7200460ABBDF115E90DD05FAB3B1DEB08310F044426FA05E5091D679D530AA25
                          APIs
                          • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015A8
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: 5887674a1f5513ec9541be2dff6cbc71c684969360942c525d855edfecb85619
                          • Instruction ID: 936ed37629fa473271aaed7dd48578ad272974d6d3f069640798472dc64bc079
                          • Opcode Fuzzy Hash: 5887674a1f5513ec9541be2dff6cbc71c684969360942c525d855edfecb85619
                          • Instruction Fuzzy Hash: F6D01232704115DBDB10EFA59B08A9E73B5EB10325B308277E111F21D1E6B9C9469A2D
                          APIs
                          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403066,?), ref: 0040330E
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID:
                          • API String ID: 973152223-0
                          • Opcode ID: 3686d685932152b10745f2b752acc0f7a7db7aadca6958b8d51083a7e9476777
                          • Instruction ID: eadcf480fe67690f272c505b4903882a1233053cb438a9b9796e5ea94341b5dd
                          • Opcode Fuzzy Hash: 3686d685932152b10745f2b752acc0f7a7db7aadca6958b8d51083a7e9476777
                          • Instruction Fuzzy Hash: 25B09231140200AADA215F409E09F057B21AB94700F208424B244280F086712025EA0D
                          APIs
                            • Part of subcall function 0040521E: lstrlenA.KERNEL32(0042A070,00000000,00424248,762323A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                            • Part of subcall function 0040521E: lstrlenA.KERNEL32(00403233,0042A070,00000000,00424248,762323A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                            • Part of subcall function 0040521E: lstrcatA.KERNEL32(0042A070,00403233,00403233,0042A070,00000000,00424248,762323A0), ref: 0040527A
                            • Part of subcall function 0040521E: SetWindowTextA.USER32(0042A070,0042A070), ref: 0040528C
                            • Part of subcall function 0040521E: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                            • Part of subcall function 0040521E: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                            • Part of subcall function 0040521E: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                            • Part of subcall function 00405796: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042C098,Error launching installer), ref: 004057BF
                            • Part of subcall function 00405796: CloseHandle.KERNEL32(?), ref: 004057CC
                          • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FC0
                            • Part of subcall function 00406575: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406586
                            • Part of subcall function 00406575: GetExitCodeProcess.KERNEL32(?,?), ref: 004065A8
                            • Part of subcall function 00406055: wsprintfA.USER32 ref: 00406062
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                          • String ID:
                          • API String ID: 2972824698-0
                          • Opcode ID: ada5aadaf350f23a8dbf3a026041224ab9f957c4560aafed3a43088b721b475c
                          • Instruction ID: 93961662e530d2e5a08160df11036b73ffef590b917d11c16f189fde5a143e01
                          • Opcode Fuzzy Hash: ada5aadaf350f23a8dbf3a026041224ab9f957c4560aafed3a43088b721b475c
                          • Instruction Fuzzy Hash: 88F09032A05021EBCB20BBA15E84DAFB2B5DF01318B21423FF502B21D1DB7C4D425A6E
                          APIs
                          • Sleep.KERNELBASE(00000000), ref: 004014E9
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 5004c81fc86d5aad5056578f097f916dd0ceefac499e9113037a72ef071e40e2
                          • Instruction ID: c67a8691079fc4563931701ff3f7f14ff0a893aaeadd9329411c5994133067d8
                          • Opcode Fuzzy Hash: 5004c81fc86d5aad5056578f097f916dd0ceefac499e9113037a72ef071e40e2
                          • Instruction Fuzzy Hash: 0CD05E73B10100DBD720EBB8BAC485F77B8EB503253308837E402E2091E579C8424628
                          APIs
                          • GlobalAlloc.KERNELBASE(00000040,6EB11233,?,6EB112CF,-6EB1404B,6EB111AB,-000000A0), ref: 6EB1121D
                          Memory Dump Source
                          • Source File: 00000001.00000002.4681309721.000000006EB11000.00000020.00000001.01000000.00000005.sdmp, Offset: 6EB10000, based on PE: true
                          • Associated: 00000001.00000002.4681285419.000000006EB10000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000001.00000002.4681324196.000000006EB13000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000001.00000002.4681340147.000000006EB15000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_6eb10000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: AllocGlobal
                          • String ID:
                          • API String ID: 3761449716-0
                          • Opcode ID: 331a6c84c5fd320657f33db195ade86a445e198abceb02f6eaa9fb90db50270a
                          • Instruction ID: 4cc4b2f4ef41224ffba8e69824aedc8724efbbbdc62f0b345e98b7adf7ca81b7
                          • Opcode Fuzzy Hash: 331a6c84c5fd320657f33db195ade86a445e198abceb02f6eaa9fb90db50270a
                          • Instruction Fuzzy Hash: B9A02230800802CBCE028BE0880FF803B20E32B320F008008E3000A880C2300000CB30
                          APIs
                          • GetDlgItem.USER32(?,00000403), ref: 004053BB
                          • GetDlgItem.USER32(?,000003EE), ref: 004053CA
                          • GetClientRect.USER32(?,?), ref: 00405407
                          • GetSystemMetrics.USER32(00000002), ref: 0040540E
                          • SendMessageA.USER32(?,0000101B,00000000,?), ref: 0040542F
                          • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405440
                          • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405453
                          • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405461
                          • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405474
                          • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405496
                          • ShowWindow.USER32(?,00000008), ref: 004054AA
                          • GetDlgItem.USER32(?,000003EC), ref: 004054CB
                          • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004054DB
                          • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004054F4
                          • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 00405500
                          • GetDlgItem.USER32(?,000003F8), ref: 004053D9
                            • Part of subcall function 004041B0: SendMessageA.USER32(00000028,?,00000001,00403FE0), ref: 004041BE
                          • GetDlgItem.USER32(?,000003EC), ref: 0040551C
                          • CreateThread.KERNEL32(00000000,00000000,Function_000052F0,00000000), ref: 0040552A
                          • CloseHandle.KERNEL32(00000000), ref: 00405531
                          • ShowWindow.USER32(00000000), ref: 00405554
                          • ShowWindow.USER32(?,00000008), ref: 0040555B
                          • ShowWindow.USER32(00000008), ref: 004055A1
                          • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004055D5
                          • CreatePopupMenu.USER32 ref: 004055E6
                          • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004055FB
                          • GetWindowRect.USER32(?,000000FF), ref: 0040561B
                          • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405634
                          • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405670
                          • OpenClipboard.USER32(00000000), ref: 00405680
                          • EmptyClipboard.USER32 ref: 00405686
                          • GlobalAlloc.KERNEL32(00000042,?), ref: 0040568F
                          • GlobalLock.KERNEL32(00000000), ref: 00405699
                          • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004056AD
                          • GlobalUnlock.KERNEL32(00000000), ref: 004056C6
                          • SetClipboardData.USER32(00000001,00000000), ref: 004056D1
                          • CloseClipboard.USER32 ref: 004056D7
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                          • String ID:
                          • API String ID: 590372296-0
                          • Opcode ID: e77ccb86652fbc0499d97b80cacae04005d5d9073b444bb924cd904a6cf5059e
                          • Instruction ID: ad896caeff922a337f51dbee0e8d50556c939e1053927b0f1ec287220421205b
                          • Opcode Fuzzy Hash: e77ccb86652fbc0499d97b80cacae04005d5d9073b444bb924cd904a6cf5059e
                          • Instruction Fuzzy Hash: 3DA14A70900608BFDB119F61DD89EAE7FB9FB08354F50403AFA45BA1A0CB754E519F68
                          APIs
                          • GetDlgItem.USER32(?,000003FB), ref: 0040465C
                          • SetWindowTextA.USER32(00000000,?), ref: 00404686
                          • SHBrowseForFolderA.SHELL32(?,00429C68,?), ref: 00404737
                          • CoTaskMemFree.OLE32(00000000), ref: 00404742
                          • lstrcmpiA.KERNEL32(Call,0042A890), ref: 00404774
                          • lstrcatA.KERNEL32(?,Call), ref: 00404780
                          • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404792
                            • Part of subcall function 004057F7: GetDlgItemTextA.USER32(?,?,00000400,004047C9), ref: 0040580A
                            • Part of subcall function 004063D2: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\fbXZ4ErQMU.exe",76233410,C:\Users\user\AppData\Local\Temp\,00000000,00403323,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040642A
                            • Part of subcall function 004063D2: CharNextA.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 00406437
                            • Part of subcall function 004063D2: CharNextA.USER32(?,"C:\Users\user\Desktop\fbXZ4ErQMU.exe",76233410,C:\Users\user\AppData\Local\Temp\,00000000,00403323,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040643C
                            • Part of subcall function 004063D2: CharPrevA.USER32(?,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000,00403323,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040644C
                          • GetDiskFreeSpaceA.KERNEL32(00429860,?,?,0000040F,?,00429860,00429860,?,00000001,00429860,?,?,000003FB,?), ref: 00404850
                          • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040486B
                            • Part of subcall function 004049C4: lstrlenA.KERNEL32(0042A890,0042A890,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004048DF,000000DF,00000000,00000400,?), ref: 00404A62
                            • Part of subcall function 004049C4: wsprintfA.USER32 ref: 00404A6A
                            • Part of subcall function 004049C4: SetDlgItemTextA.USER32(?,0042A890), ref: 00404A7D
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                          • String ID: A$C:\Users\user\tranchet$Call
                          • API String ID: 2624150263-3484575184
                          • Opcode ID: 22496922587a79a87c82097af160ec6f00736279c4fa3eb8ac5991cd3654d7e0
                          • Instruction ID: 02b07c61478aeb9ac600f99876a590f4236d4304051c708c1213a6c52027fc1c
                          • Opcode Fuzzy Hash: 22496922587a79a87c82097af160ec6f00736279c4fa3eb8ac5991cd3654d7e0
                          • Instruction Fuzzy Hash: CAA16FB1900209ABDB11EFA6DD45AAF77B8EF84314F14843BF601B62D1DB7C89418B69
                          APIs
                            • Part of subcall function 6EB11215: GlobalAlloc.KERNELBASE(00000040,6EB11233,?,6EB112CF,-6EB1404B,6EB111AB,-000000A0), ref: 6EB1121D
                          • GlobalAlloc.KERNEL32(00000040,000014A4), ref: 6EB11BC4
                          • lstrcpyA.KERNEL32(00000008,?), ref: 6EB11C0C
                          • lstrcpyA.KERNEL32(00000408,?), ref: 6EB11C16
                          • GlobalFree.KERNEL32(00000000), ref: 6EB11C29
                          • GlobalFree.KERNEL32(?), ref: 6EB11D09
                          • GlobalFree.KERNEL32(?), ref: 6EB11D0E
                          • GlobalFree.KERNEL32(?), ref: 6EB11D13
                          • GlobalFree.KERNEL32(00000000), ref: 6EB11EFA
                          • lstrcpyA.KERNEL32(?,?), ref: 6EB12098
                          • GetModuleHandleA.KERNEL32(00000008), ref: 6EB12114
                          • LoadLibraryA.KERNEL32(00000008), ref: 6EB12125
                          • GetProcAddress.KERNEL32(?,?), ref: 6EB1217E
                          • lstrlenA.KERNEL32(00000408), ref: 6EB12198
                          Memory Dump Source
                          • Source File: 00000001.00000002.4681309721.000000006EB11000.00000020.00000001.01000000.00000005.sdmp, Offset: 6EB10000, based on PE: true
                          • Associated: 00000001.00000002.4681285419.000000006EB10000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000001.00000002.4681324196.000000006EB13000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000001.00000002.4681340147.000000006EB15000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_6eb10000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                          • String ID:
                          • API String ID: 245916457-0
                          • Opcode ID: a75411654857346ef59cf0de61ff1322fa15b7485b13461396550b3dc2c5f751
                          • Instruction ID: 886d5877b3cd0785794efec9c7661e780637ed26a4f121ad505de8a79698441f
                          • Opcode Fuzzy Hash: a75411654857346ef59cf0de61ff1322fa15b7485b13461396550b3dc2c5f751
                          • Instruction Fuzzy Hash: F922AA7191C68A9EDB50CFE9C4943EEBFF4FB16324F18452ED1A1A7280D7705689CB90
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1141b8caf72e3132df9e3aa140a50eda8930c9371ed3a7f86c2d2c6764d1ec0e
                          • Instruction ID: f64ed9f862d89b69eb15ddc430260785fe10463149b241517d112065bf602f9e
                          • Opcode Fuzzy Hash: 1141b8caf72e3132df9e3aa140a50eda8930c9371ed3a7f86c2d2c6764d1ec0e
                          • Instruction Fuzzy Hash: 57E19BB190070ACFDB24CF59C880BAAB7F5EB45305F15892EE497A7291D378AA51CF14
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 99f6c7e6b8620be82bccd3d2e3e98bb61de1be8b453b643f323292903d4af905
                          • Instruction ID: 8f207273dfcdbc59f762b6c847d1a58b94b1624b669f9e87ec0d9a9138a8e2bc
                          • Opcode Fuzzy Hash: 99f6c7e6b8620be82bccd3d2e3e98bb61de1be8b453b643f323292903d4af905
                          • Instruction Fuzzy Hash: 0DC15A31E04259CBCF18CF68D4905EEBBB2BF98314F25826AD8567B380D734A942CF95
                          APIs
                          • GetDlgItem.USER32(?,000003F9), ref: 00404B97
                          • GetDlgItem.USER32(?,00000408), ref: 00404BA4
                          • GlobalAlloc.KERNEL32(00000040,?), ref: 00404BF3
                          • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404C0A
                          • SetWindowLongA.USER32(?,000000FC,00405192), ref: 00404C24
                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404C36
                          • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404C4A
                          • SendMessageA.USER32(?,00001109,00000002), ref: 00404C60
                          • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404C6C
                          • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404C7C
                          • DeleteObject.GDI32(00000110), ref: 00404C81
                          • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404CAC
                          • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404CB8
                          • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D52
                          • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404D82
                            • Part of subcall function 004041B0: SendMessageA.USER32(00000028,?,00000001,00403FE0), ref: 004041BE
                          • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D96
                          • GetWindowLongA.USER32(?,000000F0), ref: 00404DC4
                          • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404DD2
                          • ShowWindow.USER32(?,00000005), ref: 00404DE2
                          • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404EDD
                          • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404F42
                          • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404F57
                          • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404F7B
                          • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404F9B
                          • ImageList_Destroy.COMCTL32(?), ref: 00404FB0
                          • GlobalFree.KERNEL32(?), ref: 00404FC0
                          • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00405039
                          • SendMessageA.USER32(?,00001102,?,?), ref: 004050E2
                          • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 004050F1
                          • InvalidateRect.USER32(?,00000000,00000001), ref: 0040511B
                          • ShowWindow.USER32(?,00000000), ref: 00405169
                          • GetDlgItem.USER32(?,000003FE), ref: 00405174
                          • ShowWindow.USER32(00000000), ref: 0040517B
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                          • String ID: $M$N
                          • API String ID: 2564846305-813528018
                          • Opcode ID: fdda06af448e6c65fc04a67e7919175d0af5b83356ee1959317fb13923aa2151
                          • Instruction ID: 99b70255f3faedab1c4ad885451b662392dfc0d6b29454a89b749d4faaca394f
                          • Opcode Fuzzy Hash: fdda06af448e6c65fc04a67e7919175d0af5b83356ee1959317fb13923aa2151
                          • Instruction Fuzzy Hash: 5D027DB0A00209AFDB20DF94DD85AAE7BB5FB44354F50813AF610BA2E0D7798D52CF58
                          APIs
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403CE3
                          • ShowWindow.USER32(?), ref: 00403D00
                          • DestroyWindow.USER32 ref: 00403D14
                          • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403D30
                          • GetDlgItem.USER32(?,?), ref: 00403D51
                          • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403D65
                          • IsWindowEnabled.USER32(00000000), ref: 00403D6C
                          • GetDlgItem.USER32(?,00000001), ref: 00403E1A
                          • GetDlgItem.USER32(?,00000002), ref: 00403E24
                          • SetClassLongA.USER32(?,000000F2,?), ref: 00403E3E
                          • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403E8F
                          • GetDlgItem.USER32(?,00000003), ref: 00403F35
                          • ShowWindow.USER32(00000000,?), ref: 00403F56
                          • EnableWindow.USER32(?,?), ref: 00403F68
                          • EnableWindow.USER32(?,?), ref: 00403F83
                          • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F99
                          • EnableMenuItem.USER32(00000000), ref: 00403FA0
                          • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403FB8
                          • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403FCB
                          • lstrlenA.KERNEL32(0042A890,?,0042A890,00000000), ref: 00403FF5
                          • SetWindowTextA.USER32(?,0042A890), ref: 00404004
                          • ShowWindow.USER32(?,0000000A), ref: 00404138
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                          • String ID:
                          • API String ID: 184305955-0
                          • Opcode ID: f90a3406d0b8a8c4b834731162917c717653151454b1dbe7dd2907c4aa61ec43
                          • Instruction ID: 5e2b37e592d4e435839d8b6e88a40281f914ef55e2ab9fcffeaa2cd4c4a1132c
                          • Opcode Fuzzy Hash: f90a3406d0b8a8c4b834731162917c717653151454b1dbe7dd2907c4aa61ec43
                          • Instruction Fuzzy Hash: 45C1D271600204AFDB21AF62ED88D2B3ABCEB95706F50053EF641B51F0CB799892DB1D
                          APIs
                          • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00404371
                          • GetDlgItem.USER32(00000000,000003E8), ref: 00404385
                          • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 004043A3
                          • GetSysColor.USER32(?), ref: 004043B4
                          • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 004043C3
                          • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 004043D2
                          • lstrlenA.KERNEL32(?), ref: 004043D5
                          • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004043E4
                          • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004043F9
                          • GetDlgItem.USER32(?,0000040A), ref: 0040445B
                          • SendMessageA.USER32(00000000), ref: 0040445E
                          • GetDlgItem.USER32(?,000003E8), ref: 00404489
                          • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 004044C9
                          • LoadCursorA.USER32(00000000,00007F02), ref: 004044D8
                          • SetCursor.USER32(00000000), ref: 004044E1
                          • LoadCursorA.USER32(00000000,00007F00), ref: 004044F7
                          • SetCursor.USER32(00000000), ref: 004044FA
                          • SendMessageA.USER32(00000111,00000001,00000000), ref: 00404526
                          • SendMessageA.USER32(00000010,00000000,00000000), ref: 0040453A
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                          • String ID: Call$N
                          • API String ID: 3103080414-3438112850
                          • Opcode ID: 745d5685d33c6010513eb6a6e6710873411dad37f80b0c9191fb1ce11dc8c820
                          • Instruction ID: 2ba0dcbd17e821031ba3c657239c4b48ae58aa12c0a6ed8defdb88479dfe25c9
                          • Opcode Fuzzy Hash: 745d5685d33c6010513eb6a6e6710873411dad37f80b0c9191fb1ce11dc8c820
                          • Instruction Fuzzy Hash: CC61C2B1A00209BFDF10AF61DD45F6A3B69EB94754F00803AFB04BA1D1C7B8A951CF98
                          APIs
                          • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                          • BeginPaint.USER32(?,?), ref: 00401047
                          • GetClientRect.USER32(?,?), ref: 0040105B
                          • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                          • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                          • DeleteObject.GDI32(?), ref: 004010ED
                          • CreateFontIndirectA.GDI32(?), ref: 00401105
                          • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                          • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                          • SelectObject.GDI32(00000000,?), ref: 00401140
                          • DrawTextA.USER32(00000000,hyaenic Setup,000000FF,00000010,00000820), ref: 00401156
                          • SelectObject.GDI32(00000000,00000000), ref: 00401160
                          • DeleteObject.GDI32(?), ref: 00401165
                          • EndPaint.USER32(?,?), ref: 0040116E
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                          • String ID: F$hyaenic Setup
                          • API String ID: 941294808-1687442416
                          • Opcode ID: bb71a3ab4a4fa1f895d534f8b47170c1d9b9c824dc85430c64170ade6c4bb6c2
                          • Instruction ID: fc049dc8deed713fddbaab3278265d12b48f61153473f3c5d5e2d7be2f7e1970
                          • Opcode Fuzzy Hash: bb71a3ab4a4fa1f895d534f8b47170c1d9b9c824dc85430c64170ade6c4bb6c2
                          • Instruction Fuzzy Hash: 33417D71400249AFCF058FA5DE459AFBFB9FF44314F00802AF591AA1A0CB74D955DFA4
                          APIs
                          • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00405EF7,?,?), ref: 00405D97
                          • GetShortPathNameA.KERNEL32(?,0042C620,00000400), ref: 00405DA0
                            • Part of subcall function 00405BF5: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C05
                            • Part of subcall function 00405BF5: lstrlenA.KERNEL32(00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C37
                          • GetShortPathNameA.KERNEL32(?,0042CA20,00000400), ref: 00405DBD
                          • wsprintfA.USER32 ref: 00405DDB
                          • GetFileSize.KERNEL32(00000000,00000000,0042CA20,C0000000,00000004,0042CA20,?,?,?,?,?), ref: 00405E16
                          • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E25
                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E5D
                          • SetFilePointer.KERNEL32(0040A3D8,00000000,00000000,00000000,00000000,0042C220,00000000,-0000000A,0040A3D8,00000000,[Rename],00000000,00000000,00000000), ref: 00405EB3
                          • GlobalFree.KERNEL32(00000000), ref: 00405EC4
                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405ECB
                            • Part of subcall function 00405C90: GetFileAttributesA.KERNELBASE(00000003,00402EE1,C:\Users\user\Desktop\fbXZ4ErQMU.exe,80000000,00000003), ref: 00405C94
                            • Part of subcall function 00405C90: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405CB6
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                          • String ID: %s=%s$[Rename]
                          • API String ID: 2171350718-1727408572
                          • Opcode ID: bb326c4fff2569f995f741f5889aaa438d16cb529eb983989e6eb254c782141b
                          • Instruction ID: 2ccb2bf8dd744840d543bbc1a34bde763c5e5f86f0f2c8118c993f85f4779e4e
                          • Opcode Fuzzy Hash: bb326c4fff2569f995f741f5889aaa438d16cb529eb983989e6eb254c782141b
                          • Instruction Fuzzy Hash: 39310531600B15ABC2206B659D48F6B3A5CDF45755F14043BB981F62C2DF7CE9028AFD
                          APIs
                          • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\fbXZ4ErQMU.exe",76233410,C:\Users\user\AppData\Local\Temp\,00000000,00403323,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040642A
                          • CharNextA.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 00406437
                          • CharNextA.USER32(?,"C:\Users\user\Desktop\fbXZ4ErQMU.exe",76233410,C:\Users\user\AppData\Local\Temp\,00000000,00403323,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040643C
                          • CharPrevA.USER32(?,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000,00403323,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040644C
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 004063D3
                          • *?|<>/":, xrefs: 0040641A
                          • "C:\Users\user\Desktop\fbXZ4ErQMU.exe", xrefs: 0040640E
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: Char$Next$Prev
                          • String ID: "C:\Users\user\Desktop\fbXZ4ErQMU.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                          • API String ID: 589700163-9005018
                          • Opcode ID: 6d9cd5a565d063f7c871d931481108c2ccc59b6be6080685bd61ccbc84ff8956
                          • Instruction ID: ed52d7626cbd5fe55056ecced6ac67fd73520a103458dc51ec5e44788bc33e0d
                          • Opcode Fuzzy Hash: 6d9cd5a565d063f7c871d931481108c2ccc59b6be6080685bd61ccbc84ff8956
                          • Instruction Fuzzy Hash: 6B1104518047A169FB3207380C40B7B7F888B97764F1A447FE8C6722C2C67C5CA796AD
                          APIs
                          • GetWindowLongA.USER32(?,000000EB), ref: 004041FF
                          • GetSysColor.USER32(00000000), ref: 0040423D
                          • SetTextColor.GDI32(?,00000000), ref: 00404249
                          • SetBkMode.GDI32(?,?), ref: 00404255
                          • GetSysColor.USER32(?), ref: 00404268
                          • SetBkColor.GDI32(?,?), ref: 00404278
                          • DeleteObject.GDI32(?), ref: 00404292
                          • CreateBrushIndirect.GDI32(?), ref: 0040429C
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                          • String ID:
                          • API String ID: 2320649405-0
                          • Opcode ID: dc1d3e55db8ec23378b3830e5d111dcc895b5f12cd74b581ce4b7be4d8059b2f
                          • Instruction ID: 212a8ad98d70f233ee07b83b669a1ba7ccffb4b50a3226e4c630c70d8ffb5278
                          • Opcode Fuzzy Hash: dc1d3e55db8ec23378b3830e5d111dcc895b5f12cd74b581ce4b7be4d8059b2f
                          • Instruction Fuzzy Hash: 3B2165716007059BCB309F78DD08B5BBBF4AF85750B04896EFD96A22E0C738E814CB54
                          APIs
                            • Part of subcall function 6EB11215: GlobalAlloc.KERNELBASE(00000040,6EB11233,?,6EB112CF,-6EB1404B,6EB111AB,-000000A0), ref: 6EB1121D
                          • GlobalFree.KERNEL32(?), ref: 6EB125DE
                          • GlobalFree.KERNEL32(00000000), ref: 6EB12618
                          Memory Dump Source
                          • Source File: 00000001.00000002.4681309721.000000006EB11000.00000020.00000001.01000000.00000005.sdmp, Offset: 6EB10000, based on PE: true
                          • Associated: 00000001.00000002.4681285419.000000006EB10000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000001.00000002.4681324196.000000006EB13000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000001.00000002.4681340147.000000006EB15000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_6eb10000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc
                          • String ID:
                          • API String ID: 1780285237-0
                          • Opcode ID: f8c4e6452236c42a8aa66755eb070aa77b3c0667b47b03375cf67995c7872580
                          • Instruction ID: a45636d54c916993cb8ab327a845d7cd77249544b5b525f1e8943db962d694d7
                          • Opcode Fuzzy Hash: f8c4e6452236c42a8aa66755eb070aa77b3c0667b47b03375cf67995c7872580
                          • Instruction Fuzzy Hash: 0841BD71108282EFCB058F94CCE9EAA7FAEEB97324B05492DF50097600E7309905AB62
                          APIs
                          • lstrlenA.KERNEL32(0042A070,00000000,00424248,762323A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                          • lstrlenA.KERNEL32(00403233,0042A070,00000000,00424248,762323A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                          • lstrcatA.KERNEL32(0042A070,00403233,00403233,0042A070,00000000,00424248,762323A0), ref: 0040527A
                          • SetWindowTextA.USER32(0042A070,0042A070), ref: 0040528C
                          • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                          • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                          • SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: MessageSend$lstrlen$TextWindowlstrcat
                          • String ID:
                          • API String ID: 2531174081-0
                          • Opcode ID: ffc7fd16b0850e8ca78275056b27aa311aff222ca9cd1cb1225c1906ca535124
                          • Instruction ID: 52f605d016cfd88bb70700c5a478074e15cc738f975766ab4ed8c3314b346ff2
                          • Opcode Fuzzy Hash: ffc7fd16b0850e8ca78275056b27aa311aff222ca9cd1cb1225c1906ca535124
                          • Instruction Fuzzy Hash: C721AC71900518BBDF119FA5DD8599FBFA8EF04354F1480BAF804B6291C7798E50CF98
                          APIs
                          • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404AE9
                          • GetMessagePos.USER32 ref: 00404AF1
                          • ScreenToClient.USER32(?,?), ref: 00404B0B
                          • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404B1D
                          • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404B43
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: Message$Send$ClientScreen
                          • String ID: f
                          • API String ID: 41195575-1993550816
                          • Opcode ID: fae6ee4ef260730fd0e6baeb46c05ac4d0d99299cd6b7910a3b5b88b2e21feb9
                          • Instruction ID: cdc5f22e578355ebae6afd16dcadc4be4e42c2ab1ff41a6041c2d58f87c209b7
                          • Opcode Fuzzy Hash: fae6ee4ef260730fd0e6baeb46c05ac4d0d99299cd6b7910a3b5b88b2e21feb9
                          • Instruction Fuzzy Hash: 33014C71900219BADB01DBA4DD85BFEBBBCAF55715F10012ABA40B61D0D6B4A9018BA4
                          APIs
                          • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402DD5
                          • MulDiv.KERNEL32(000DAA48,00000064,000DC030), ref: 00402E00
                          • wsprintfA.USER32 ref: 00402E10
                          • SetWindowTextA.USER32(?,?), ref: 00402E20
                          • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402E32
                          Strings
                          • verifying installer: %d%%, xrefs: 00402E0A
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: Text$ItemTimerWindowwsprintf
                          • String ID: verifying installer: %d%%
                          • API String ID: 1451636040-82062127
                          • Opcode ID: 79fc7e6e1ca0acae8e9a75e18e021abc494deab029f93f770ff90eafb88ab8ab
                          • Instruction ID: 65898b716c6b5e3943ed5d7f8865a7929710e3ce64d80c757a7a8fa3a9c1cc58
                          • Opcode Fuzzy Hash: 79fc7e6e1ca0acae8e9a75e18e021abc494deab029f93f770ff90eafb88ab8ab
                          • Instruction Fuzzy Hash: BD01FF70640209FBEF20AF60DE4AEEE3769AB14345F008039FA06A51D0DBB59D55DB59
                          APIs
                          • GlobalFree.KERNEL32(00000000), ref: 6EB12447
                            • Part of subcall function 6EB11224: lstrcpynA.KERNEL32(00000000,?,6EB112CF,-6EB1404B,6EB111AB,-000000A0), ref: 6EB11234
                          • GlobalAlloc.KERNEL32(00000040,?), ref: 6EB123C2
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 6EB123D7
                          • GlobalAlloc.KERNEL32(00000040,00000010), ref: 6EB123E8
                          • CLSIDFromString.OLE32(00000000,00000000), ref: 6EB123F6
                          • GlobalFree.KERNEL32(00000000), ref: 6EB123FD
                          Memory Dump Source
                          • Source File: 00000001.00000002.4681309721.000000006EB11000.00000020.00000001.01000000.00000005.sdmp, Offset: 6EB10000, based on PE: true
                          • Associated: 00000001.00000002.4681285419.000000006EB10000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000001.00000002.4681324196.000000006EB13000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000001.00000002.4681340147.000000006EB15000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_6eb10000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                          • String ID:
                          • API String ID: 3730416702-0
                          • Opcode ID: 3d3b0d21784c5ce81cb9a0644656e82163184cbca51f833bebacf8fe4f05c048
                          • Instruction ID: 8b0349acee7dcbf96f2101c3690b149267f9e40dd3ffcc24f10a60091e5bd631
                          • Opcode Fuzzy Hash: 3d3b0d21784c5ce81cb9a0644656e82163184cbca51f833bebacf8fe4f05c048
                          • Instruction Fuzzy Hash: 8E418CB150C382DFDB108FA59948BEABBE8FB52335F00491EE545C7590D7309945DB62
                          APIs
                          • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402833
                          • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 0040284F
                          • GlobalFree.KERNEL32(?), ref: 0040288E
                          • GlobalFree.KERNEL32(00000000), ref: 004028A1
                          • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 004028B9
                          • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 004028CD
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: Global$AllocFree$CloseDeleteFileHandle
                          • String ID:
                          • API String ID: 2667972263-0
                          • Opcode ID: e200f0a06a1b791de6fcd90df19bdd9ae0c902d0d002ce7977cb24af33c736ef
                          • Instruction ID: 50ad9526884773a844389ca9465edd1da2989015e588fa45899e7f45ead5980e
                          • Opcode Fuzzy Hash: e200f0a06a1b791de6fcd90df19bdd9ae0c902d0d002ce7977cb24af33c736ef
                          • Instruction Fuzzy Hash: 78216D72800128BBDF217FA5CE49D9E7A79EF09364F24423EF550762D1CA794D418FA8
                          APIs
                          Memory Dump Source
                          • Source File: 00000001.00000002.4681309721.000000006EB11000.00000020.00000001.01000000.00000005.sdmp, Offset: 6EB10000, based on PE: true
                          • Associated: 00000001.00000002.4681285419.000000006EB10000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000001.00000002.4681324196.000000006EB13000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000001.00000002.4681340147.000000006EB15000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_6eb10000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: FreeGlobal
                          • String ID:
                          • API String ID: 2979337801-0
                          • Opcode ID: 38d89b4b9064a24b2b4cde1ba894833f6eefb6d56295fafcfec0234f994b4569
                          • Instruction ID: 3216b36d1360e4ae7ba7ed5d74493309e55defeab1cad97a3fd94c6967d4d38d
                          • Opcode Fuzzy Hash: 38d89b4b9064a24b2b4cde1ba894833f6eefb6d56295fafcfec0234f994b4569
                          • Instruction Fuzzy Hash: 9B512632D2C0D9AEDB40CFE9C8545EEBFBDEB663B5F1C056AD430A3104C2315A4A8791
                          APIs
                          • GetDlgItem.USER32(?,?), ref: 00401D7E
                          • GetClientRect.USER32(?,?), ref: 00401DCC
                          • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401DFC
                          • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401E10
                          • DeleteObject.GDI32(00000000), ref: 00401E20
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                          • String ID:
                          • API String ID: 1849352358-0
                          • Opcode ID: 64047181dbb11954f6248d6d4ebce6329301936260590e1bb013e11241bca830
                          • Instruction ID: ea2313c62ec258575502bac7b5a91221d1b2f7c42d1e166e88532b570a834240
                          • Opcode Fuzzy Hash: 64047181dbb11954f6248d6d4ebce6329301936260590e1bb013e11241bca830
                          • Instruction Fuzzy Hash: 02212872A00109AFCB15DFA4DD85AAEBBB5EB48300F24417EF905F62A1DB389941DB54
                          APIs
                          • lstrlenA.KERNEL32(0042A890,0042A890,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004048DF,000000DF,00000000,00000400,?), ref: 00404A62
                          • wsprintfA.USER32 ref: 00404A6A
                          • SetDlgItemTextA.USER32(?,0042A890), ref: 00404A7D
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: ItemTextlstrlenwsprintf
                          • String ID: %u.%u%s%s
                          • API String ID: 3540041739-3551169577
                          • Opcode ID: 5f94da5c7593bdf0e2880c0754fbf5196b9ea6ae0f0d3d8572f030c1a72350cb
                          • Instruction ID: 22449cd78037b5055574fdfa12b268b27ceb02c465c900d7a820e94443fbddbc
                          • Opcode Fuzzy Hash: 5f94da5c7593bdf0e2880c0754fbf5196b9ea6ae0f0d3d8572f030c1a72350cb
                          • Instruction Fuzzy Hash: 1911E773A041243BDB00A56D9C41EAF3298DF81374F260237FA26F71D1E979CC1246A9
                          APIs
                          • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403335,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 00405A95
                          • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403335,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 00405A9E
                          • lstrcatA.KERNEL32(?,0040A014,?,00000007,00000009,0000000B), ref: 00405AAF
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A8F
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: CharPrevlstrcatlstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\
                          • API String ID: 2659869361-3936084776
                          • Opcode ID: 7e3bd0a74015a4b4c7bd8f32b9337ec82444728bd267b6e5413a6877d2367a50
                          • Instruction ID: 6078a555604e81c1816c45b3e60b5c3e7c31ed84b02af53c952a19e53ba35867
                          • Opcode Fuzzy Hash: 7e3bd0a74015a4b4c7bd8f32b9337ec82444728bd267b6e5413a6877d2367a50
                          • Instruction Fuzzy Hash: 68D0A7B26055307AE21126155C06ECB19488F463447060066F500BB193C77C4C114BFD
                          APIs
                          • DestroyWindow.USER32(00000000,00000000,0040301B,00000001), ref: 00402E50
                          • GetTickCount.KERNEL32 ref: 00402E6E
                          • CreateDialogParamA.USER32(0000006F,00000000,00402DBA,00000000), ref: 00402E8B
                          • ShowWindow.USER32(00000000,00000005), ref: 00402E99
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: Window$CountCreateDestroyDialogParamShowTick
                          • String ID:
                          • API String ID: 2102729457-0
                          • Opcode ID: 8c1e1bd8efa9ab411d4161537fee885c8283498bc89c51da2617a800704498c9
                          • Instruction ID: cc5f9dcce599e9be0c1e5b41ef6f72156ec830c1ee92694e4cf82ced2ffe4824
                          • Opcode Fuzzy Hash: 8c1e1bd8efa9ab411d4161537fee885c8283498bc89c51da2617a800704498c9
                          • Instruction Fuzzy Hash: B6F05E30A45630EBC6317B64FE4CA8B7B64BB44B45B91047AF045B22E8C6740C83CBED
                          APIs
                            • Part of subcall function 004060F7: lstrcpynA.KERNEL32(?,?,00000400,0040341A,hyaenic Setup,NSIS Error,?,00000007,00000009,0000000B), ref: 00406104
                            • Part of subcall function 00405B28: CharNextA.USER32(?,?,0042BC98,?,00405B94,0042BC98,0042BC98,76233410,?,C:\Users\user\AppData\Local\Temp\,004058DF,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B36
                            • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B3B
                            • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B4F
                          • lstrlenA.KERNEL32(0042BC98,00000000,0042BC98,0042BC98,76233410,?,C:\Users\user\AppData\Local\Temp\,004058DF,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405BD0
                          • GetFileAttributesA.KERNEL32(0042BC98,0042BC98,0042BC98,0042BC98,0042BC98,0042BC98,00000000,0042BC98,0042BC98,76233410,?,C:\Users\user\AppData\Local\Temp\,004058DF,?,76233410,C:\Users\user\AppData\Local\Temp\), ref: 00405BE0
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B7D
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: CharNext$AttributesFilelstrcpynlstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\
                          • API String ID: 3248276644-3936084776
                          • Opcode ID: e638d3577084fc0f37fd401aa5ef1a5930802456fef8e272e5ea6ea3ca1dc2da
                          • Instruction ID: a7953992a1868a2a025aeaadbe30fe94b9837340da5d1ec43b16535858986a89
                          • Opcode Fuzzy Hash: e638d3577084fc0f37fd401aa5ef1a5930802456fef8e272e5ea6ea3ca1dc2da
                          • Instruction Fuzzy Hash: 6DF02821105E6116D222323A1C05AAF3A74CE82364715013FF862B22D3CF7CB9139DBE
                          APIs
                          • IsWindowVisible.USER32(?), ref: 004051C1
                          • CallWindowProcA.USER32(?,?,?,?), ref: 00405212
                            • Part of subcall function 004041C7: SendMessageA.USER32(00000000,00000000,00000000,00000000), ref: 004041D9
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: Window$CallMessageProcSendVisible
                          • String ID:
                          • API String ID: 3748168415-3916222277
                          • Opcode ID: 9af3a59599e8879c459ffb9579ce68eec3d4baecce8abe749bc9c6a9b619fe8d
                          • Instruction ID: 7056b910bbb205cd539ea3acc8ab51e06e0639846daa80cdaddfd33d10a348e5
                          • Opcode Fuzzy Hash: 9af3a59599e8879c459ffb9579ce68eec3d4baecce8abe749bc9c6a9b619fe8d
                          • Instruction Fuzzy Hash: 47017171200609ABEF20AF11DD80A5B3666EB84354F14413AFB107A1D1C77A8C62DE6E
                          APIs
                          • FreeLibrary.KERNEL32(?,76233410,00000000,C:\Users\user\AppData\Local\Temp\,0040384D,00403667,?,?,00000007,00000009,0000000B), ref: 0040388F
                          • GlobalFree.KERNEL32(005BC930), ref: 00403896
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00403875
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: Free$GlobalLibrary
                          • String ID: C:\Users\user\AppData\Local\Temp\
                          • API String ID: 1100898210-3936084776
                          • Opcode ID: 7191d99a6f9acf46369f1b571abb68d71f554d24c115b495d4645827db6beddd
                          • Instruction ID: eaa0fdc8f68cdeff62b7926931e70464fa678e679eb7ff43971a821d65c68845
                          • Opcode Fuzzy Hash: 7191d99a6f9acf46369f1b571abb68d71f554d24c115b495d4645827db6beddd
                          • Instruction Fuzzy Hash: 20E08C335110205BC7613F54EA0471A77ECAF59B62F4A017EF8847B26087781C464A88
                          APIs
                          • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402F0D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\fbXZ4ErQMU.exe,C:\Users\user\Desktop\fbXZ4ErQMU.exe,80000000,00000003), ref: 00405ADC
                          • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402F0D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\fbXZ4ErQMU.exe,C:\Users\user\Desktop\fbXZ4ErQMU.exe,80000000,00000003), ref: 00405AEA
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: CharPrevlstrlen
                          • String ID: C:\Users\user\Desktop
                          • API String ID: 2709904686-3125694417
                          • Opcode ID: 7cfe4fb9fb084f73e38b743788eacbc948a8cb50b3ca3a16f7beb83d38b7a1d7
                          • Instruction ID: fbea36dfa466fa1ea2516b65251d52c814037185d06ce8b70eff5ee1363e4df1
                          • Opcode Fuzzy Hash: 7cfe4fb9fb084f73e38b743788eacbc948a8cb50b3ca3a16f7beb83d38b7a1d7
                          • Instruction Fuzzy Hash: 73D0A7B25089706EFB0352509C00B8F6E88CF17300F0A04A3E080A7191C7B84C424BFD
                          APIs
                          • GlobalAlloc.KERNEL32(00000040,?), ref: 6EB1115B
                          • GlobalFree.KERNEL32(00000000), ref: 6EB111B4
                          • GlobalFree.KERNEL32(?), ref: 6EB111C7
                          • GlobalFree.KERNEL32(?), ref: 6EB111F5
                          Memory Dump Source
                          • Source File: 00000001.00000002.4681309721.000000006EB11000.00000020.00000001.01000000.00000005.sdmp, Offset: 6EB10000, based on PE: true
                          • Associated: 00000001.00000002.4681285419.000000006EB10000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000001.00000002.4681324196.000000006EB13000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000001.00000002.4681340147.000000006EB15000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_6eb10000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc
                          • String ID:
                          • API String ID: 1780285237-0
                          • Opcode ID: f065032a895e83c587a1d76b30e3cfb041c3d94b5761eca519de10141a644be1
                          • Instruction ID: f153a853b82a95d01117b58fd2deeddfa9a276b42cead01696e4194b1fbde9b5
                          • Opcode Fuzzy Hash: f065032a895e83c587a1d76b30e3cfb041c3d94b5761eca519de10141a644be1
                          • Instruction Fuzzy Hash: 2A31C0B141C586AFDB008FE9D84EBE9BFF8EB26274F184529E844C7610D7308D198B65
                          APIs
                          • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C05
                          • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405C1D
                          • CharNextA.USER32(00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C2E
                          • lstrlenA.KERNEL32(00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C37
                          Memory Dump Source
                          • Source File: 00000001.00000002.4675720955.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.4675707374.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675737045.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675751907.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.4675832507.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_fbXZ4ErQMU.jbxd
                          Similarity
                          • API ID: lstrlen$CharNextlstrcmpi
                          • String ID:
                          • API String ID: 190613189-0
                          • Opcode ID: b2794e6bf21c90d62e2ecb38362cfad12420dfe545fda3f665c5114a80d4c16b
                          • Instruction ID: 0c44f0240925c5b75b39479a83fd13515cb2c3d3321eb5bdfbc953cb3faf5d46
                          • Opcode Fuzzy Hash: b2794e6bf21c90d62e2ecb38362cfad12420dfe545fda3f665c5114a80d4c16b
                          • Instruction Fuzzy Hash: FBF0F631105A18FFDB12DFA4CD00D9EBBA8EF55350B2540B9E840F7210D634DE01AFA8