Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ODjwCjQBAP.exe

Overview

General Information

Sample name:ODjwCjQBAP.exe
renamed because original name is a hash value
Original sample name:c10aac838dd326d74fcc69eeae41117036ac26b858285fa0da034cba44762f7a.exe
Analysis ID:1569269
MD5:2b78431a8969c829339ed0da29004757
SHA1:c09051c5f433348c6cf5b5c0781af877f44212d2
SHA256:c10aac838dd326d74fcc69eeae41117036ac26b858285fa0da034cba44762f7a
Tags:exeuser-adrian__luca
Infos:

Detection

GuLoader
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
PE / OLE file has an invalid certificate
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • ODjwCjQBAP.exe (PID: 1036 cmdline: "C:\Users\user\Desktop\ODjwCjQBAP.exe" MD5: 2B78431A8969C829339ED0DA29004757)
    • ODjwCjQBAP.exe (PID: 1816 cmdline: "C:\Users\user\Desktop\ODjwCjQBAP.exe" MD5: 2B78431A8969C829339ED0DA29004757)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000003.00000002.3344359724.00000000017C7000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000000.00000002.1777235257.0000000005387000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-05T17:15:53.295514+010028032702Potentially Bad Traffic192.168.2.84971184.38.129.1680TCP
      2024-12-05T17:16:25.343227+010028032702Potentially Bad Traffic192.168.2.84971384.38.129.1680TCP
      2024-12-05T17:16:57.390276+010028032702Potentially Bad Traffic192.168.2.84978084.38.129.1680TCP
      2024-12-05T17:17:29.437939+010028032702Potentially Bad Traffic192.168.2.84985584.38.129.1680TCP
      2024-12-05T17:18:01.469937+010028032702Potentially Bad Traffic192.168.2.84992884.38.129.1680TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: ODjwCjQBAP.exeReversingLabs: Detection: 52%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: ODjwCjQBAP.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: ODjwCjQBAP.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: 0_2_0040270B FindFirstFileA,0_2_0040270B
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: 0_2_004061FB FindFirstFileA,FindClose,0_2_004061FB
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: 0_2_00405799 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405799
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: 3_2_0040270B FindFirstFileA,3_2_0040270B
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: 3_2_004061FB FindFirstFileA,FindClose,3_2_004061FB
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: 3_2_00405799 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,3_2_00405799
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeFile opened: C:\Users\userJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeFile opened: C:\Users\user\AppDataJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\INetCacheJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeFile opened: C:\Users\user\AppData\Local\Microsoft\WindowsJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeFile opened: C:\Users\user\AppData\Local\MicrosoftJump to behavior
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49711 -> 84.38.129.16:80
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49713 -> 84.38.129.16:80
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49855 -> 84.38.129.16:80
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49780 -> 84.38.129.16:80
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49928 -> 84.38.129.16:80
      Source: global trafficHTTP traffic detected: GET /uvsMrbCwSaj148.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 84.38.129.16Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /uvsMrbCwSaj148.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 84.38.129.16Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /uvsMrbCwSaj148.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 84.38.129.16Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /uvsMrbCwSaj148.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 84.38.129.16Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /uvsMrbCwSaj148.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 84.38.129.16Cache-Control: no-cache
      Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
      Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
      Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
      Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
      Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
      Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
      Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
      Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
      Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
      Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
      Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
      Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
      Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
      Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
      Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
      Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
      Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
      Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
      Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
      Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
      Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
      Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
      Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
      Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
      Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
      Source: global trafficHTTP traffic detected: GET /uvsMrbCwSaj148.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 84.38.129.16Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /uvsMrbCwSaj148.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 84.38.129.16Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /uvsMrbCwSaj148.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 84.38.129.16Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /uvsMrbCwSaj148.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 84.38.129.16Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /uvsMrbCwSaj148.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 84.38.129.16Cache-Control: no-cache
      Source: ODjwCjQBAP.exe, 00000003.00000002.3345433624.0000000002874000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://84.38.129.16/uvsMrbCwSaj148.bin
      Source: ODjwCjQBAP.exe, 00000003.00000002.3345433624.0000000002874000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://84.38.129.16/uvsMrbCwSaj148.bin-
      Source: ODjwCjQBAP.exe, 00000003.00000002.3345433624.0000000002874000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://84.38.129.16/uvsMrbCwSaj148.bin;
      Source: ODjwCjQBAP.exe, 00000003.00000002.3345433624.0000000002874000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://84.38.129.16/uvsMrbCwSaj148.binAppData
      Source: ODjwCjQBAP.exe, 00000003.00000002.3345433624.0000000002874000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://84.38.129.16/uvsMrbCwSaj148.binm32
      Source: ODjwCjQBAP.exe, 00000003.00000002.3345433624.0000000002874000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://84.38.129.16/uvsMrbCwSaj148.biny
      Source: ODjwCjQBAP.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
      Source: ODjwCjQBAP.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: 0_2_0040524E GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040524E
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: 0_2_004032BF EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004032BF
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: 3_2_004032BF EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,3_2_004032BF
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeFile created: C:\Windows\SysWOW64\lamellate.iniJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: 0_2_004065420_2_00406542
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: 0_2_00404A8D0_2_00404A8D
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: 3_2_004065423_2_00406542
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: 3_2_00404A8D3_2_00404A8D
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: String function: 00402ACE appears 52 times
      Source: ODjwCjQBAP.exeStatic PE information: invalid certificate
      Source: ODjwCjQBAP.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal68.troj.evad.winEXE@3/18@0/1
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: 0_2_004032BF EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004032BF
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: 3_2_004032BF EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,3_2_004032BF
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: 0_2_0040451A GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_0040451A
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: 0_2_004020CD CoCreateInstance,MultiByteToWideChar,0_2_004020CD
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorouslyJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeFile created: C:\Users\user\AppData\Local\Temp\nso8D24.tmpJump to behavior
      Source: ODjwCjQBAP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: ODjwCjQBAP.exeReversingLabs: Detection: 52%
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeFile read: C:\Users\user\Desktop\ODjwCjQBAP.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\ODjwCjQBAP.exe "C:\Users\user\Desktop\ODjwCjQBAP.exe"
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeProcess created: C:\Users\user\Desktop\ODjwCjQBAP.exe "C:\Users\user\Desktop\ODjwCjQBAP.exe"
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeProcess created: C:\Users\user\Desktop\ODjwCjQBAP.exe "C:\Users\user\Desktop\ODjwCjQBAP.exe"Jump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeFile written: C:\ProgramData\ankomstperrons.iniJump to behavior
      Source: ODjwCjQBAP.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000003.00000002.3344359724.00000000017C7000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1777235257.0000000005387000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: 0_2_10001A5D GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_10001A5D
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: 0_2_10002D20 push eax; ret 0_2_10002D4E
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeFile created: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeAPI/Special instruction interceptor: Address: 5B28751
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeAPI/Special instruction interceptor: Address: 1F68751
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeRDTSC instruction interceptor: First address: 5ACB7D8 second address: 5ACB7D8 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FA854E6447Fh 0x00000006 test bh, 0000001Ch 0x00000009 cmp al, cl 0x0000000b inc ebp 0x0000000c test dx, cx 0x0000000f inc ebx 0x00000010 cmp ch, FFFFFF80h 0x00000013 rdtsc
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeRDTSC instruction interceptor: First address: 1F0B7D8 second address: 1F0B7D8 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FA854F1910Fh 0x00000006 test bh, 0000001Ch 0x00000009 cmp al, cl 0x0000000b inc ebp 0x0000000c test dx, cx 0x0000000f inc ebx 0x00000010 cmp ch, FFFFFF80h 0x00000013 rdtsc
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: 0_2_0040270B FindFirstFileA,0_2_0040270B
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: 0_2_004061FB FindFirstFileA,FindClose,0_2_004061FB
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: 0_2_00405799 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405799
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: 3_2_0040270B FindFirstFileA,3_2_0040270B
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: 3_2_004061FB FindFirstFileA,FindClose,3_2_004061FB
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: 3_2_00405799 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,3_2_00405799
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeFile opened: C:\Users\userJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeFile opened: C:\Users\user\AppDataJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\INetCacheJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeFile opened: C:\Users\user\AppData\Local\Microsoft\WindowsJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeFile opened: C:\Users\user\AppData\Local\MicrosoftJump to behavior
      Source: ODjwCjQBAP.exe, 00000003.00000002.3345433624.000000000288E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
      Source: ODjwCjQBAP.exe, 00000003.00000002.3345433624.0000000002857000.00000004.00000020.00020000.00000000.sdmp, ODjwCjQBAP.exe, 00000003.00000002.3345433624.000000000288E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeAPI call chain: ExitProcess graph end nodegraph_0-4889
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeAPI call chain: ExitProcess graph end nodegraph_0-4896
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: 0_2_10001A5D GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_10001A5D
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeProcess created: C:\Users\user\Desktop\ODjwCjQBAP.exe "C:\Users\user\Desktop\ODjwCjQBAP.exe"Jump to behavior
      Source: C:\Users\user\Desktop\ODjwCjQBAP.exeCode function: 0_2_00405F19 GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405F19
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      DLL Side-Loading
      1
      Access Token Manipulation
      11
      Masquerading
      OS Credential Dumping21
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
      Process Injection
      1
      Access Token Manipulation
      LSASS Memory4
      File and Directory Discovery
      Remote Desktop Protocol1
      Clipboard Data
      1
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      11
      Process Injection
      Security Account Manager23
      System Information Discovery
      SMB/Windows Admin SharesData from Network Shared Drive1
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Deobfuscate/Decode Files or Information
      NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture11
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
      Obfuscated Files or Information
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      DLL Side-Loading
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      ODjwCjQBAP.exe53%ReversingLabsWin32.Spyware.Snakekeylogger
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://84.38.129.16/uvsMrbCwSaj148.bin;0%Avira URL Cloudsafe
      http://84.38.129.16/uvsMrbCwSaj148.bin0%Avira URL Cloudsafe
      http://84.38.129.16/uvsMrbCwSaj148.biny0%Avira URL Cloudsafe
      http://84.38.129.16/uvsMrbCwSaj148.binAppData0%Avira URL Cloudsafe
      http://84.38.129.16/uvsMrbCwSaj148.binm320%Avira URL Cloudsafe
      http://84.38.129.16/uvsMrbCwSaj148.bin-0%Avira URL Cloudsafe
      No contacted domains info
      NameMaliciousAntivirus DetectionReputation
      http://84.38.129.16/uvsMrbCwSaj148.binfalse
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://84.38.129.16/uvsMrbCwSaj148.binyODjwCjQBAP.exe, 00000003.00000002.3345433624.0000000002874000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://84.38.129.16/uvsMrbCwSaj148.bin;ODjwCjQBAP.exe, 00000003.00000002.3345433624.0000000002874000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://84.38.129.16/uvsMrbCwSaj148.binm32ODjwCjQBAP.exe, 00000003.00000002.3345433624.0000000002874000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://84.38.129.16/uvsMrbCwSaj148.binAppDataODjwCjQBAP.exe, 00000003.00000002.3345433624.0000000002874000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://nsis.sf.net/NSIS_ErrorODjwCjQBAP.exefalse
        high
        http://nsis.sf.net/NSIS_ErrorErrorODjwCjQBAP.exefalse
          high
          http://84.38.129.16/uvsMrbCwSaj148.bin-ODjwCjQBAP.exe, 00000003.00000002.3345433624.0000000002874000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          84.38.129.16
          unknownLatvia
          203557DATACLUB-NLfalse
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1569269
          Start date and time:2024-12-05 17:13:48 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 7m 2s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Run name:Run with higher sleep bypass
          Number of analysed new started processes analysed:8
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:ODjwCjQBAP.exe
          renamed because original name is a hash value
          Original Sample Name:c10aac838dd326d74fcc69eeae41117036ac26b858285fa0da034cba44762f7a.exe
          Detection:MAL
          Classification:mal68.troj.evad.winEXE@3/18@0/1
          EGA Information:
          • Successful, ratio: 50%
          HCA Information:
          • Successful, ratio: 91%
          • Number of executed functions: 65
          • Number of non-executed functions: 67
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
          • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Execution Graph export aborted for target ODjwCjQBAP.exe, PID 1816 because there are no executed function
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • VT rate limit hit for: ODjwCjQBAP.exe
          No simulations
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          84.38.129.16Purchase Order.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
          • 84.38.129.16/efxSlCP242.bin
          Documenti di spedizione.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
          • 84.38.129.16/rNWbaMk175.bin
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          DATACLUB-NLShipping documents.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
          • 84.38.133.48
          u9aPQQIwhj.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
          • 84.38.133.42
          Shipping documents 000293994900.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
          • 84.38.133.42
          QUOTE #46789_AL_JAMEELA24.exeGet hashmaliciousRemcos, GuLoaderBrowse
          • 84.38.133.160
          Purchase Order.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
          • 84.38.129.16
          Documenti di spedizione.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
          • 84.38.129.16
          PO-94858.exeGet hashmaliciousSnake KeyloggerBrowse
          • 185.29.11.116
          PO-94858.exeGet hashmaliciousSnake KeyloggerBrowse
          • 185.29.11.116
          Order 10172024.bat.exeGet hashmaliciousAgentTeslaBrowse
          • 185.29.11.116
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dllAnfrage.exeGet hashmaliciousFormBook, GuLoaderBrowse
            Anfrage_244384.exeGet hashmaliciousFormBook, GuLoaderBrowse
              Anfrage_244384.exeGet hashmaliciousFormBook, GuLoaderBrowse
                Anfrage244384.exeGet hashmaliciousFormBook, GuLoaderBrowse
                  Anfrage244384.exeGet hashmaliciousFormBook, GuLoaderBrowse
                    Anfrage_244384.exeGet hashmaliciousFormBook, GuLoaderBrowse
                      5112024976.exeGet hashmaliciousFormBook, GuLoaderBrowse
                        5112024976.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          Anfrage24438.zipGet hashmaliciousFormBook, GuLoaderBrowse
                            Process:C:\Users\user\Desktop\ODjwCjQBAP.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):42
                            Entropy (8bit):3.9726590202682766
                            Encrypted:false
                            SSDEEP:3:guTWyXRAK4vn:TzRAKi
                            MD5:276D6E1D94791E4BC828A3B5F04A73EA
                            SHA1:4665FD1D7598D3D751B5232BBB0859123D79A3BE
                            SHA-256:812A9FCAACC7A28EBA4FA5EDB16AE49DD9BBFECFC112E5957C984BC4A50F7304
                            SHA-512:F8A6F577DE29F60997EAB5F032C6CAF6C2565C8E018EDDD88900DFF17062CCA7D2B6BA30844F8A7A0DB4759056481F6C1D290C99378E8C540031B3C3E008E8DE
                            Malicious:false
                            Reputation:low
                            Preview:[Tnkerne]..Stikkelen=Skjorteknappernes66..
                            Process:C:\Users\user\Desktop\ODjwCjQBAP.exe
                            File Type:Matlab v4 mat-file (little endian) , numeric, rows 20224, columns 0
                            Category:dropped
                            Size (bytes):241857
                            Entropy (8bit):1.2492742831199217
                            Encrypted:false
                            SSDEEP:768:kn4C0nabowYKKucVjMHtvH3Eq1Zg5c+0o4u1uLlOxRuYP9aVsVL/e3ec6Axhe7rO:zAzhHNuZla85OxXCm
                            MD5:FB3375E7CB0698DF507062161A26885F
                            SHA1:5E98C5E6F50A1B57B1E72B412D9632603FF954EF
                            SHA-256:EB781B87F06CBBB43E36413F70A97528DFF827A3DA9575E56142324F9CF43477
                            SHA-512:949FB9F863EB2EC85B84C4DB3E4EA023F1C3FC09CB79FE52B58569C616FC28F2E0D095DB535C3B80EF44CE4F75EA4752313F4F20A3E3A61E49163FCE8078B79B
                            Malicious:false
                            Reputation:low
                            Preview:.....O..............c...>........................q....................r...................W............................................................................................................up........................r.................".............................................~...........9...............+.....................................................................................W...............Y..............................................k.....J................... ................................................R..................................................................................5...............T.........................................O..........^........x...........W.......Q......................:......H............+.................................................................6.................................7............w..........s......$...........9..................................................................*........................
                            Process:C:\Users\user\Desktop\ODjwCjQBAP.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):513
                            Entropy (8bit):4.312755423928167
                            Encrypted:false
                            SSDEEP:12:iN2DyKkMNtYdKYK90GbzE1gcaAy6AGb0CY3EoAAV:iYDZBGILeGzAy6jbts
                            MD5:3A44600B8B24F5CC7EF13B014C5FC8E6
                            SHA1:DABC64C2788C61476C159BF60E27A0385B761223
                            SHA-256:037EE7216549B3D566F3D53E5801D45ADACF332F937FB43BD5A5E3F0DF9662A6
                            SHA-512:02985E9F575B10700A6C8FE167DB6EBD81E1B8DE758DFAB47BB01AB7FE568525C17E933AA2DB98673E1A43EB3EF63CAB6E97D59FE1B1D52E3484737E0D9B4CBE
                            Malicious:false
                            Reputation:low
                            Preview:radiatoporose psychophonasthenia byjubilum,sirrees kyserne meathead dormitorier unarbitrative siddembelets kilopondene..locomutation josies sketchene tordentalerne budcykler beaumont naphthous frkkert..stenddes incorporable billowing dorsilateral bogkrybberne staler shantungfrakkes affy jaspilite..hanbury lastede smrrebrdsbutikkers keloids lydighedsngtelsers mesokurtic defectless banenettenes brkmidlernes preceded undfangedes querela afstandsmaalers..alexipharmical egenvgte acarids descends compresbyter buy,
                            Process:C:\Users\user\Desktop\ODjwCjQBAP.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):305301
                            Entropy (8bit):1.2617727746454932
                            Encrypted:false
                            SSDEEP:768:OFl7dydtg1PEAqjKsB0peIl0LVJmpGgJQZwWmkYvYTDjBlqndyzkEV5ndnGVa76E:hdKCZmTCLm4TyycJrcYKLdL59NBGa
                            MD5:EADA66A6285325455F7E0780C000CB65
                            SHA1:125A71ABF2ADCCFE6E4BB3D7BF80CAC064F71690
                            SHA-256:D1E27B338C60688975AE1BB239D860E30490A7FEB5AEB1DF1DAD87244DD073AC
                            SHA-512:669BA190147018B4CBA35D6CDE23D00683E73DE0C70B60C1AA03EDEC2C7CC629DA73A7495DB05CF4151E100C339C76AFD87A3D179FE98045ED38B02A7A478FB1
                            Malicious:false
                            Reputation:low
                            Preview:.....................................?...........................~.............u....................................................................C....m...............................6....................................?...............^.......n...............................................................................................................[........................................................R..].......................L....h.............................................................s...................................................,.............=.............6........................3.... ...K.................................?.Z.............\...7..8. ....................................................&......................y........................................................................@...................g..................f................w.................................................?........................u.....W.Z. ..........................
                            Process:C:\Users\user\Desktop\ODjwCjQBAP.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):302102
                            Entropy (8bit):1.2507376038892632
                            Encrypted:false
                            SSDEEP:768:+0WlDZ0cyMp2n0GbzqUGvbn/eHiEmNAXxM4cCQHkR1WuFkHnvVG26UZRR15NykM4:b0/vvkPqdcKMyJAnrZpdZ
                            MD5:43EB990B1BE1B4570969A310174D319F
                            SHA1:BEAE29DB714C0576F1BA9256E64F1A0A015B3E84
                            SHA-256:6884CDA80715F73C9D9AA9AD45B9BDE3D9965D2009270BA685B30DD21421C04D
                            SHA-512:C0FBE88619A7BC3BB8F6CBC8B77B4C1E21A2AFB8A92B1DF4324C20980C5CF6362CB75B7D065391437147BA746A933EBBD51167E4DF2B94477298A87331E15C75
                            Malicious:false
                            Preview:.............................................u..................$....................................G........H.................................................u'..................................{..........&...............................N......................................H.........S..............................................................M.............v.........................J..................................................................................B......................................`........q......................G....%.L...............%.........b.........................>.................................f..<.................................<...l..............P......].....................................d.....H........{......................>...............3........................................j......................................@..............v.............................L..........S................f....2................................................
                            Process:C:\Users\user\Desktop\ODjwCjQBAP.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):398964
                            Entropy (8bit):1.2601730304396117
                            Encrypted:false
                            SSDEEP:1536:qIRuZM0E+SCsypSaDWDKQreAN/Ge8+QM8+cj4WHOlXtZ:pRuPs3DKYc5+QM1KW
                            MD5:34495288F83EB902AC00567354E11253
                            SHA1:F421E0A307361C05A9534639D2B3A446F4673BAF
                            SHA-256:F917E97748DEE607ABCC405FA70D7614B2F96675914B64AE7FD6AC299BCF220B
                            SHA-512:E2DE646C75526DDA1B22AEBFF7B7991DEC89D351012FA21D925046EF5DD78ABD2D999ACAAE7C8BA33747480D3C921CDAB05D98839AF3A552063070A3B4C48496
                            Malicious:false
                            Preview:.................i....................9........T............................................................g....................................................................6...................?..............].Z.....................................................}...6..............................<....................................................:..x.............;...............P..m...h.........................................................................................................................O..............d....P...................w..........u....3.....................................................:.......^......m.................................................................................................X.............3...................................m.................................................4...L..............................................................................................G.................................1.........."..5...........
                            Process:C:\Users\user\Desktop\ODjwCjQBAP.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):421931
                            Entropy (8bit):7.01357660979347
                            Encrypted:false
                            SSDEEP:6144:GwXhFBgBHfn9LmvuRhFnvx1z4GvhBdI1/QKrulObwrH8rii28xe90oaQ6BYiFJ:O10GJ4tulOeYpBkaoa9PJ
                            MD5:274FB510C29F8D4455002BE77288131E
                            SHA1:B32B89FEA5CD3527E0EED372E8E39A86531C865B
                            SHA-256:6ABCB47AEE8A2120422C246DE8C03B6A01A04B431BEC3E906A5BC1297B7D74BC
                            SHA-512:347C665D7E99F536ED6E5CF1CFEF00AF8FD40EDA43042E09A28C1780517347AB066B17C7533FD1DCA279813277C97DFEC9C2116E51DB9F4E3E1C73B0C24DDD2D
                            Malicious:false
                            Preview:...........w......................W.BBBB......................>..................RR.eeee.B........99........O.O.bbb...........e...............................ddd...........AAA...H....4.....e......MM.u...........................III.........???.......:...........RRRR..................2....eee.0.......***....................44.....e......................................................__..........''..o....zzzz......l..w.........................5.........ccc.....................................3.....fff......5...........+.......'...........uu...../..==....((..............55.<.RRR........UU.999........L.............c..........................t...~~~................NNN......l.Y... ...........E..\...............II....\........QQ......gg.N......WWWWWWWWWW..........................m...'.....*............. ....+.....................`....~~...m....~~~.....YY...$$$..@.))).i.....................f.........D...........#............BB...>..^^.......................]]]........11...................xxx.
                            Process:C:\Users\user\Desktop\ODjwCjQBAP.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):438667
                            Entropy (8bit):1.2554285943940462
                            Encrypted:false
                            SSDEEP:1536:WQqatwb3BquFonZ0MZGDfw/Ams7/cTCDEhqR9:prwTBq1ZPGD4/xsDEh8
                            MD5:1EF716DEB3AD336E09ABC68798EEFB78
                            SHA1:15E56DD29E83D44626E46F219AA1EFC8FEC6FB73
                            SHA-256:6401066B34D5FD3C9103C01112200E109A78A3DC584B7E55392B7A45020A76B0
                            SHA-512:6BD0842FE87E9C7467249673485392D1A718B84A757BE8AB94F4323F5BE358C0975A7E5BC4F74AF2EF69F5DB46AD00DCE3DDA9BBD20C2A6CE9D364883A40E7F9
                            Malicious:false
                            Preview:...........................a.............o.................L........................................s..)..........................................E................./.................@....................................................?........................d.................................................................~..............................................T...................=..............................9....../......................0....H..............x.....................................7..........................................................N............7..................................................R...............R...................z.................................................`......................G...............................................................................`.....................~.........................-.........................................................................................................n.....................
                            Process:C:\Users\user\Desktop\ODjwCjQBAP.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):419878
                            Entropy (8bit):1.2587845148762749
                            Encrypted:false
                            SSDEEP:1536:iKHVhskoaFMrwPuNqw8hbEZ1EvgaKCiIklf3:JHcP9+w8hb8IQ
                            MD5:93C85B7E4C86F442491FF2D5F5B3FE0B
                            SHA1:893EE5DC579DA377DCE95F9DECAF57438F967112
                            SHA-256:7D60978D18793A119BB47B0D702E2D1EFAE28514EB46E9F96D75BB6FDA4ECF99
                            SHA-512:A0D6B52554F688E47986FFA6B3885393F47A5D51895DC40219BDB1C838609755B1A801E446B926B44AB6C2F4B8A05A183D3C6BBF0D16CA84802CB5DBCA1581C9
                            Malicious:false
                            Preview:.............................................................R2..I...............y.......................................!.............................B....................... .................................@.......................d.....d..................................`........,......................m.....L......j......3....H....;.........................................~......s......................................................K...........................................Q.........G.................................................a..............$...............................Y.......s................p...................................................................................................................................................................D...............................................&.......................B..............................2........i...........................................................`...............................................
                            Process:C:\Users\user\Desktop\ODjwCjQBAP.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):125626
                            Entropy (8bit):4.599921276453497
                            Encrypted:false
                            SSDEEP:1536:FdxtDxEepm0mgEeyIhPnO0BACj/73YG9OmZA/sI53ieUSF7c54uce:F4L0xhPnLyhrmZfIjUSAce
                            MD5:B7832AD2AB09886CD2EF522834F98D9C
                            SHA1:8065F02B75FB64B473F4D2639A7979E259CD2174
                            SHA-256:5D03DDF30ABA8BBF73CDCA6306FB9A3147C4862C514C1EE8C7D1B680C782DD39
                            SHA-512:257CCC8A6541EBAE7FA47B2BB3B7723EB90BED8B68CB3FB6BFC8528DAF1E736CCFAD8C8D6A98C6F580A2845BEA31E823E5011134D67FACFFA1C5B4FD087BBA7A
                            Malicious:false
                            Preview:.............I.kk.......x...........FFF.......:....""""...............TTT......HHH..<<.............................K.....I......s.........................a.....v.f..11............ll...>>>...NNN.........................KKK...]...........***....................2..ccc.sssss.rr.\..............rr...............V.u.CCC.......U......WW............._.../.rr.........,,.VV..............................................>>>.........BB............bb......II..PP........UUUUUUU..[[[.....//...........................\\.BBBB.<..........::.k....a..........&&&.....................,,...............?.O.....CCCC.........................T............................w.............+........888.zzzzzzzz...q.....+++............RR......ccc.......x........TT.......... .????..MM..........**.................___......1....c............cc...........jjjjj..WW......;...........W......A.{................{.............kk.......<<....,.[[[.....$$$...JJJ.....E.....6.....c..III.............III..uu...................m.```...z.
                            Process:C:\Users\user\Desktop\ODjwCjQBAP.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.522964554947562
                            Encrypted:false
                            SSDEEP:3:sEMBQEJkJVEjyQRg8UxQoXUn:78ixvUn
                            MD5:96583A1C65FA65B73DA55976CF33BD46
                            SHA1:1419DD1AF5EEA789F27B794B8B00B58FBD4436EC
                            SHA-256:47E7B2386AD56F9DD02D07945CD2CD17241F850D16BBF81F204A0ADCAA344619
                            SHA-512:6328BE4F2F4E35B6CCE2C8F822EDFAAB3B63F61FC6F6845B7505D6C2E8F2F693EE2D19E8BF671BA64D9F72A34F9B834B2A301D2363F45E71267A9B7DE98A2AF3
                            Malicious:false
                            Preview:kernel32::VirtualAlloc(i 0,i 15593472, i 0x3000, i 0x40)p.r1
                            Process:C:\Users\user\Desktop\ODjwCjQBAP.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):74
                            Entropy (8bit):3.9637832956585757
                            Encrypted:false
                            SSDEEP:3:sRQE1wFEt/ijNJyI3dj2+n:aQEGiwh3D
                            MD5:16D513397F3C1F8334E8F3E4FC49828F
                            SHA1:4EE15AFCA81CA6A13AF4E38240099B730D6931F0
                            SHA-256:D3C781A1855C8A70F5ACA88D9E2C92AFFFA80541334731F62CAA9494AA8A0C36
                            SHA-512:4A350B790FDD2FE957E9AB48D5969B217AB19FC7F93F3774F1121A5F140FF9A9EAAA8FA30E06A9EF40AD776E698C2E65A05323C3ADF84271DA1716E75F5183C3
                            Malicious:false
                            Preview:kernel32::CreateFileA(m r4 , i 0x80000000, i 0, p 0, i 4, i 0x80, i 0)i.r5
                            Process:C:\Users\user\Desktop\ODjwCjQBAP.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):52
                            Entropy (8bit):4.0914493934217315
                            Encrypted:false
                            SSDEEP:3:sBa99k1NoCFOn:KankVg
                            MD5:5D04A35D3950677049C7A0CF17E37125
                            SHA1:CAFDD49A953864F83D387774B39B2657A253470F
                            SHA-256:A9493973DD293917F3EBB932AB255F8CAC40121707548DE100D5969956BB1266
                            SHA-512:C7B1AFD95299C0712BDBC67F9D2714926D6EC9F71909AF615AFFC400D8D2216AB76F6AC35057088836435DE36E919507E1B25BE87B07C911083F964EB67E003B
                            Malicious:false
                            Preview:kernel32::SetFilePointer(i r5, i 1200 , i 0,i 0)i.r3
                            Process:C:\Users\user\Desktop\ODjwCjQBAP.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):2682753
                            Entropy (8bit):2.7848088611908874
                            Encrypted:false
                            SSDEEP:12288:/10GJ4tulOeYpBkaoa9PuCvwqeJ6gvBse+tJ:/10qM0UBkratxehBse+7
                            MD5:2C8A73338F777DE95B016F5B6B0C5FDC
                            SHA1:61D7202F7EA11E8F77A8F2196109389593F88F95
                            SHA-256:4F705E202B3704AFE971846F09B9968CBECBBBD90C4E84C7D903F5C798166A1D
                            SHA-512:74E42B5EE48AB51BE6E37C771A7712B9110F6BF50DE89AEFE422A61561087B270792A38CF02F6155F5A29655EB34D524C8C82242E2797437F121A2BA4EE796DC
                            Malicious:false
                            Preview:.@......,........................0.......?.......@..........................]...{...........................................................................................................................................................................................................J...N...............j...............................................................................................................................g...........................................................................L...#...'...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\ODjwCjQBAP.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):56
                            Entropy (8bit):4.250903860294566
                            Encrypted:false
                            SSDEEP:3:sAAEVvjskqMj84n:fLd3t
                            MD5:A251227F7BA8BD5EF8A5B99D81D44222
                            SHA1:27CBF4978A9082A801672164A389B96119BE8271
                            SHA-256:164EA3B0C3B4B7D9275271180CF650175DC675686D5557EF713831B124688F5F
                            SHA-512:EBB510350495107D5BD8E696D2DFADCFA4B775811246EA11E29B882D63C055DAA8D352C057F0C8D5156A3848964EE62C6B39883B3150F0D4BA7EE27F2091A158
                            Malicious:false
                            Preview:kernel32::ReadFile(i r5, i r1, i 15593472,*i 0, i 0)i.r3
                            Process:C:\Users\user\Desktop\ODjwCjQBAP.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):11264
                            Entropy (8bit):5.7711167426271945
                            Encrypted:false
                            SSDEEP:192:OPtkumJX7zB22kGwfy0mtVgkCPOsX1un:/702k5qpdsXQn
                            MD5:3F176D1EE13B0D7D6BD92E1C7A0B9BAE
                            SHA1:FE582246792774C2C9DD15639FFA0ACA90D6FD0B
                            SHA-256:FA4AB1D6F79FD677433A31ADA7806373A789D34328DA46CCB0449BBF347BD73E
                            SHA-512:0A69124819B7568D0DEA4E9E85CE8FE61C7BA697C934E3A95E2DCFB9F252B1D9DA7FAF8774B6E8EFD614885507ACC94987733EBA09A2F5E7098B774DFC8524B6
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Joe Sandbox View:
                            • Filename: Anfrage.exe, Detection: malicious, Browse
                            • Filename: Anfrage_244384.exe, Detection: malicious, Browse
                            • Filename: Anfrage_244384.exe, Detection: malicious, Browse
                            • Filename: Anfrage244384.exe, Detection: malicious, Browse
                            • Filename: Anfrage244384.exe, Detection: malicious, Browse
                            • Filename: Anfrage_244384.exe, Detection: malicious, Browse
                            • Filename: 5112024976.exe, Detection: malicious, Browse
                            • Filename: 5112024976.exe, Detection: malicious, Browse
                            • Filename: Anfrage24438.zip, Detection: malicious, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......)...m.m.m...k.m.~....j.9..i....l....l.Richm.........................PE..L.....MX...........!.................'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text...O........................... ..`.rdata..S....0......."..............@..@.data...h....@.......&..............@....reloc..`....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\ODjwCjQBAP.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):30
                            Entropy (8bit):4.256564762130954
                            Encrypted:false
                            SSDEEP:3:DyWgLQIfLBJXmgU:mkIP25
                            MD5:F15BFDEBB2DF02D02C8491BDE1B4E9BD
                            SHA1:93BD46F57C3316C27CAD2605DDF81D6C0BDE9301
                            SHA-256:C87F2FF45BB530577FB8856DF1760EDAF1060AE4EE2934B17FDD21B7D116F043
                            SHA-512:1757ED4AE4D47D0C839511C18BE5D75796224D4A3049E2D8853650ACE2C5057C42040DE6450BF90DD4969862E9EBB420CD8A34F8DD9C970779ED2E5459E8F2F1
                            Malicious:false
                            Preview:user32::EnumWindows(i r1 ,i 0)
                            Process:C:\Users\user\Desktop\ODjwCjQBAP.exe
                            File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                            Category:dropped
                            Size (bytes):1322
                            Entropy (8bit):3.152997243828327
                            Encrypted:false
                            SSDEEP:24:8J7aRkD4/BPefDbDLqizZYpbDVaizZeiQ45HALqy:8kRkDsxy/DLqiNwDVaiNlQeAOy
                            MD5:39B5645AD795D01CDF65BFFD5889D6DC
                            SHA1:1CFD5DBD3536D5C03400CE066AEF3CCC6F76D3B0
                            SHA-256:905677DA2320F068DE49BAA144526A0541DEE10AE01CE4D5F23BDADB8F78EFA7
                            SHA-512:7A4BA6142FBC6F7D80976EC323B8EE831D78B94C1004D75410703021370D14F020B288F617752FDAEB45124F3F12AF4AF8F4BF4ED477189FC5804AE0E05898BF
                            Malicious:false
                            Preview:L..................F.............................................................P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....T.1...........user..>............................................h.u.b.e.r.t.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....P.1...........Local.<............................................L.o.c.a.l.....\.1...........Microsoft.D............................................M.i.c.r.o.s.o.f.t.....V.1...........Windows.@............................................W.i.n.d.o.w.s.....\.1...........INetCache.D............................................I.N.e.t.C.a.c.h.e.....n.2...........divergentes.pin.P............................................d.i.v.e.r.g.e.n.t.e.s...p.i.n.......;...\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.I.N.e.t.C.a.c.h.e.\.d.i.v.e.r.g.e.n.t.e.s...p.i.n.R.C.:.\.U.s.e.r.s.\.h.u.b.e.r.t.\.A.p.p.D.a.t
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                            Entropy (8bit):7.310486265921839
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:ODjwCjQBAP.exe
                            File size:1'040'520 bytes
                            MD5:2b78431a8969c829339ed0da29004757
                            SHA1:c09051c5f433348c6cf5b5c0781af877f44212d2
                            SHA256:c10aac838dd326d74fcc69eeae41117036ac26b858285fa0da034cba44762f7a
                            SHA512:3530aaad10469254279ffd782e61d4254cb73f5b9c2527f1a4a38f0424d5acb3a860d29b7ed9b4b619a98ab3b20742f0c3705321afb026b4b6e8c57dc052fabf
                            SSDEEP:24576:+o8RUr/5+1g8UJT4l8at7kEeTg/ITSZOG+1Mjb2WsQbd38TRAn9:+h+/0S8S0OeXITSI1Mjvsa4i9
                            TLSH:5225F1E1B380466AF4790D36848BC2E152F1FD969E021A5723BCF36D2D73290564BDFA
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F.........................PE..L...5.MX.................`.........
                            Icon Hash:2f6b71f16d4c71b3
                            Entrypoint:0x4032bf
                            Entrypoint Section:.text
                            Digitally signed:true
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x584DCA35 [Sun Dec 11 21:50:45 2016 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:4f67aeda01a0484282e8c59006b0b352
                            Signature Valid:false
                            Signature Issuer:CN=Bordroom, O=Bordroom, L=Harwick, C=US
                            Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                            Error Number:-2146762487
                            Not Before, Not After
                            • 08/06/2024 02:30:48 08/06/2027 02:30:48
                            Subject Chain
                            • CN=Bordroom, O=Bordroom, L=Harwick, C=US
                            Version:3
                            Thumbprint MD5:EA52BE382F8398DA30FBEF403C134581
                            Thumbprint SHA-1:630A44123CE84C2B91C3A1C3D058D5EFC79FCD93
                            Thumbprint SHA-256:D6AF5D9F936528206E9F16636C16E7286901048F173665CACA233214CBFAFE32
                            Serial:2D659AA4E05CD2D4CEAFB2673653B38DCBC537F4
                            Instruction
                            sub esp, 00000184h
                            push ebx
                            push esi
                            push edi
                            xor ebx, ebx
                            push 00008001h
                            mov dword ptr [esp+18h], ebx
                            mov dword ptr [esp+10h], 00409130h
                            mov dword ptr [esp+20h], ebx
                            mov byte ptr [esp+14h], 00000020h
                            call dword ptr [00407120h]
                            call dword ptr [004070ACh]
                            cmp ax, 00000006h
                            je 00007FA8545EE853h
                            push ebx
                            call 00007FA8545F17D9h
                            cmp eax, ebx
                            je 00007FA8545EE849h
                            push 00000C00h
                            call eax
                            mov esi, 00407298h
                            push esi
                            call 00007FA8545F1755h
                            push esi
                            call dword ptr [004070A8h]
                            lea esi, dword ptr [esi+eax+01h]
                            cmp byte ptr [esi], bl
                            jne 00007FA8545EE82Dh
                            push ebp
                            push 00000009h
                            call 00007FA8545F17ACh
                            push 00000007h
                            call 00007FA8545F17A5h
                            mov dword ptr [00423724h], eax
                            call dword ptr [00407044h]
                            push ebx
                            call dword ptr [00407288h]
                            mov dword ptr [004237D8h], eax
                            push ebx
                            lea eax, dword ptr [esp+38h]
                            push 00000160h
                            push eax
                            push ebx
                            push 0041ECF0h
                            call dword ptr [00407174h]
                            push 004091ECh
                            push 00422F20h
                            call 00007FA8545F13CFh
                            call dword ptr [004070A4h]
                            mov ebp, 00429000h
                            push eax
                            push ebp
                            call 00007FA8545F13BDh
                            push ebx
                            call dword ptr [00407154h]
                            Programming Language:
                            • [EXP] VC++ 6.0 SP5 build 8804
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x74280xa0.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x470000x42ba0.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0xfcea80x11e0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x70000x298.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x5e590x60001892c55874b94ef60ac62cf77f0ecd0eFalse0.6585693359375data6.424194540104456IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x70000x12460x14006389f916226544852e494114faf192adFalse0.4271484375data5.0003960999706765IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x90000x1a8180x400f02c8b5709d3fb8c6cc1ab777c138d8fFalse0.6455078125data5.211928615453691IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .ndata0x240000x230000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x470000x42ba00x42c00cb7fd179fd9ca3f4757b01d96679c1b0False0.21076559573970038data3.8403807556058642IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0x472080x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336EnglishUnited States0.20773293487587655
                            RT_DIALOG0x892300x144dataEnglishUnited States0.5216049382716049
                            RT_DIALOG0x893780x100dataEnglishUnited States0.5234375
                            RT_DIALOG0x894780x11cdataEnglishUnited States0.6056338028169014
                            RT_DIALOG0x895980x60dataEnglishUnited States0.7291666666666666
                            RT_GROUP_ICON0x895f80x14dataEnglishUnited States1.1
                            RT_VERSION0x896100x24cdataEnglishUnited States0.5357142857142857
                            RT_MANIFEST0x898600x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                            DLLImport
                            KERNEL32.dllCopyFileA, Sleep, GetTickCount, CreateFileA, GetFileSize, GetModuleFileNameA, ReadFile, GetFileAttributesA, SetFileAttributesA, ExitProcess, SetEnvironmentVariableA, GetWindowsDirectoryA, GetTempPathA, GetCommandLineA, lstrlenA, GetVersion, GetCurrentProcess, GetFullPathNameA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, CloseHandle, SetCurrentDirectoryA, MoveFileA, CompareFileTime, GetShortPathNameA, SearchPathA, lstrcmpiA, SetFileTime, lstrcmpA, ExpandEnvironmentStringsA, lstrcpynA, SetErrorMode, GlobalFree, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, GlobalAlloc
                            USER32.dllScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA
                            GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                            SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA
                            ADVAPI32.dllRegDeleteKeyA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, AdjustTokenPrivileges, RegOpenKeyExA, RegEnumValueA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                            COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                            ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                            2024-12-05T17:15:53.295514+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.84971184.38.129.1680TCP
                            2024-12-05T17:16:25.343227+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.84971384.38.129.1680TCP
                            2024-12-05T17:16:57.390276+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.84978084.38.129.1680TCP
                            2024-12-05T17:17:29.437939+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.84985584.38.129.1680TCP
                            2024-12-05T17:18:01.469937+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.84992884.38.129.1680TCP
                            TimestampSource PortDest PortSource IPDest IP
                            Dec 5, 2024 17:15:31.275600910 CET4971180192.168.2.884.38.129.16
                            Dec 5, 2024 17:15:31.395955086 CET804971184.38.129.16192.168.2.8
                            Dec 5, 2024 17:15:31.396212101 CET4971180192.168.2.884.38.129.16
                            Dec 5, 2024 17:15:31.396956921 CET4971180192.168.2.884.38.129.16
                            Dec 5, 2024 17:15:31.517824888 CET804971184.38.129.16192.168.2.8
                            Dec 5, 2024 17:15:53.295387983 CET804971184.38.129.16192.168.2.8
                            Dec 5, 2024 17:15:53.295514107 CET4971180192.168.2.884.38.129.16
                            Dec 5, 2024 17:15:53.297307014 CET4971180192.168.2.884.38.129.16
                            Dec 5, 2024 17:15:53.417090893 CET804971184.38.129.16192.168.2.8
                            Dec 5, 2024 17:16:03.313343048 CET4971380192.168.2.884.38.129.16
                            Dec 5, 2024 17:16:03.433021069 CET804971384.38.129.16192.168.2.8
                            Dec 5, 2024 17:16:03.433109999 CET4971380192.168.2.884.38.129.16
                            Dec 5, 2024 17:16:03.433336020 CET4971380192.168.2.884.38.129.16
                            Dec 5, 2024 17:16:03.553077936 CET804971384.38.129.16192.168.2.8
                            Dec 5, 2024 17:16:25.342994928 CET804971384.38.129.16192.168.2.8
                            Dec 5, 2024 17:16:25.343226910 CET4971380192.168.2.884.38.129.16
                            Dec 5, 2024 17:16:25.343362093 CET4971380192.168.2.884.38.129.16
                            Dec 5, 2024 17:16:25.464910030 CET804971384.38.129.16192.168.2.8
                            Dec 5, 2024 17:16:35.360316992 CET4978080192.168.2.884.38.129.16
                            Dec 5, 2024 17:16:35.480397940 CET804978084.38.129.16192.168.2.8
                            Dec 5, 2024 17:16:35.480509043 CET4978080192.168.2.884.38.129.16
                            Dec 5, 2024 17:16:35.480705976 CET4978080192.168.2.884.38.129.16
                            Dec 5, 2024 17:16:35.600684881 CET804978084.38.129.16192.168.2.8
                            Dec 5, 2024 17:16:57.390193939 CET804978084.38.129.16192.168.2.8
                            Dec 5, 2024 17:16:57.390275955 CET4978080192.168.2.884.38.129.16
                            Dec 5, 2024 17:16:57.390387058 CET4978080192.168.2.884.38.129.16
                            Dec 5, 2024 17:16:57.511425018 CET804978084.38.129.16192.168.2.8
                            Dec 5, 2024 17:17:07.431627989 CET4985580192.168.2.884.38.129.16
                            Dec 5, 2024 17:17:07.552006960 CET804985584.38.129.16192.168.2.8
                            Dec 5, 2024 17:17:07.552195072 CET4985580192.168.2.884.38.129.16
                            Dec 5, 2024 17:17:07.552422047 CET4985580192.168.2.884.38.129.16
                            Dec 5, 2024 17:17:07.672646999 CET804985584.38.129.16192.168.2.8
                            Dec 5, 2024 17:17:29.437796116 CET804985584.38.129.16192.168.2.8
                            Dec 5, 2024 17:17:29.437938929 CET4985580192.168.2.884.38.129.16
                            Dec 5, 2024 17:17:29.438035011 CET4985580192.168.2.884.38.129.16
                            Dec 5, 2024 17:17:29.558353901 CET804985584.38.129.16192.168.2.8
                            Dec 5, 2024 17:17:39.453943014 CET4992880192.168.2.884.38.129.16
                            Dec 5, 2024 17:17:39.573725939 CET804992884.38.129.16192.168.2.8
                            Dec 5, 2024 17:17:39.573821068 CET4992880192.168.2.884.38.129.16
                            Dec 5, 2024 17:17:39.573976040 CET4992880192.168.2.884.38.129.16
                            Dec 5, 2024 17:17:39.693752050 CET804992884.38.129.16192.168.2.8
                            Dec 5, 2024 17:18:01.469815969 CET804992884.38.129.16192.168.2.8
                            Dec 5, 2024 17:18:01.469937086 CET4992880192.168.2.884.38.129.16
                            Dec 5, 2024 17:18:01.469986916 CET4992880192.168.2.884.38.129.16
                            Dec 5, 2024 17:18:01.589951038 CET804992884.38.129.16192.168.2.8
                            • 84.38.129.16
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.84971184.38.129.16801816C:\Users\user\Desktop\ODjwCjQBAP.exe
                            TimestampBytes transferredDirectionData
                            Dec 5, 2024 17:15:31.396956921 CET175OUTGET /uvsMrbCwSaj148.bin HTTP/1.1
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                            Host: 84.38.129.16
                            Cache-Control: no-cache


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            1192.168.2.84971384.38.129.16801816C:\Users\user\Desktop\ODjwCjQBAP.exe
                            TimestampBytes transferredDirectionData
                            Dec 5, 2024 17:16:03.433336020 CET175OUTGET /uvsMrbCwSaj148.bin HTTP/1.1
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                            Host: 84.38.129.16
                            Cache-Control: no-cache


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            2192.168.2.84978084.38.129.16801816C:\Users\user\Desktop\ODjwCjQBAP.exe
                            TimestampBytes transferredDirectionData
                            Dec 5, 2024 17:16:35.480705976 CET175OUTGET /uvsMrbCwSaj148.bin HTTP/1.1
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                            Host: 84.38.129.16
                            Cache-Control: no-cache


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            3192.168.2.84985584.38.129.16801816C:\Users\user\Desktop\ODjwCjQBAP.exe
                            TimestampBytes transferredDirectionData
                            Dec 5, 2024 17:17:07.552422047 CET175OUTGET /uvsMrbCwSaj148.bin HTTP/1.1
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                            Host: 84.38.129.16
                            Cache-Control: no-cache


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            4192.168.2.84992884.38.129.16801816C:\Users\user\Desktop\ODjwCjQBAP.exe
                            TimestampBytes transferredDirectionData
                            Dec 5, 2024 17:17:39.573976040 CET175OUTGET /uvsMrbCwSaj148.bin HTTP/1.1
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                            Host: 84.38.129.16
                            Cache-Control: no-cache


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:11:14:53
                            Start date:05/12/2024
                            Path:C:\Users\user\Desktop\ODjwCjQBAP.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\ODjwCjQBAP.exe"
                            Imagebase:0x400000
                            File size:1'040'520 bytes
                            MD5 hash:2B78431A8969C829339ED0DA29004757
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.1777235257.0000000005387000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:true

                            Target ID:3
                            Start time:11:15:21
                            Start date:05/12/2024
                            Path:C:\Users\user\Desktop\ODjwCjQBAP.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\ODjwCjQBAP.exe"
                            Imagebase:0x400000
                            File size:1'040'520 bytes
                            MD5 hash:2B78431A8969C829339ED0DA29004757
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000003.00000002.3344359724.00000000017C7000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:23.9%
                              Dynamic/Decrypted Code Coverage:13.9%
                              Signature Coverage:21.3%
                              Total number of Nodes:1520
                              Total number of Limit Nodes:53
                              execution_graph 5065 10001000 5068 1000101b 5065->5068 5075 100014bb 5068->5075 5070 10001020 5071 10001024 5070->5071 5072 10001027 GlobalAlloc 5070->5072 5073 100014e2 3 API calls 5071->5073 5072->5071 5074 10001019 5073->5074 5077 100014c1 5075->5077 5076 100014c7 5076->5070 5077->5076 5078 100014d3 GlobalFree 5077->5078 5078->5070 3917 402241 3932 402ace 3917->3932 3920 402ace 18 API calls 3921 402250 3920->3921 3922 402ace 18 API calls 3921->3922 3923 402259 3922->3923 3938 4061fb FindFirstFileA 3923->3938 3926 402273 lstrlenA lstrlenA 3929 405110 25 API calls 3926->3929 3927 402266 3941 405110 3927->3941 3930 4022af SHFileOperationA 3929->3930 3930->3927 3931 40226e 3930->3931 3933 402ada 3932->3933 3952 405f19 3933->3952 3936 402247 3936->3920 3939 406211 FindClose 3938->3939 3940 402262 3938->3940 3939->3940 3940->3926 3940->3927 3942 40512b 3941->3942 3951 4051ce 3941->3951 3943 405148 lstrlenA 3942->3943 3944 405f19 18 API calls 3942->3944 3945 405171 3943->3945 3946 405156 lstrlenA 3943->3946 3944->3943 3948 405184 3945->3948 3949 405177 SetWindowTextA 3945->3949 3947 405168 lstrcatA 3946->3947 3946->3951 3947->3945 3950 40518a SendMessageA SendMessageA SendMessageA 3948->3950 3948->3951 3949->3948 3950->3951 3951->3931 3968 405f26 3952->3968 3953 406149 3954 402afb 3953->3954 3986 405ef7 lstrcpynA 3953->3986 3954->3936 3970 406162 3954->3970 3956 405fc7 GetVersion 3956->3968 3957 406120 lstrlenA 3957->3968 3958 405f19 10 API calls 3958->3957 3962 40603f GetSystemDirectoryA 3962->3968 3963 406052 GetWindowsDirectoryA 3963->3968 3964 406162 5 API calls 3964->3968 3965 405f19 10 API calls 3965->3968 3966 4060c9 lstrcatA 3966->3968 3967 406086 SHGetSpecialFolderLocation 3967->3968 3969 40609e SHGetPathFromIDListA CoTaskMemFree 3967->3969 3968->3953 3968->3956 3968->3957 3968->3958 3968->3962 3968->3963 3968->3964 3968->3965 3968->3966 3968->3967 3979 405dde RegOpenKeyExA 3968->3979 3984 405e55 wsprintfA 3968->3984 3985 405ef7 lstrcpynA 3968->3985 3969->3968 3977 40616e 3970->3977 3971 4061da CharPrevA 3975 4061d6 3971->3975 3972 4061cb CharNextA 3972->3975 3972->3977 3973 4061f5 3973->3936 3975->3971 3975->3973 3976 4061b9 CharNextA 3976->3977 3977->3972 3977->3975 3977->3976 3978 4061c6 CharNextA 3977->3978 3987 405994 3977->3987 3978->3972 3980 405e11 RegQueryValueExA 3979->3980 3981 405e4f 3979->3981 3982 405e32 RegCloseKey 3980->3982 3981->3968 3982->3981 3984->3968 3985->3968 3986->3954 3988 40599a 3987->3988 3989 4059ad 3988->3989 3990 4059a0 CharNextA 3988->3990 3989->3977 3990->3988 5079 406542 5083 4063c6 5079->5083 5080 406d31 5081 406450 GlobalAlloc 5081->5080 5081->5083 5082 406447 GlobalFree 5082->5081 5083->5080 5083->5081 5083->5082 5084 4064c7 GlobalAlloc 5083->5084 5085 4064be GlobalFree 5083->5085 5084->5080 5084->5083 5085->5084 5086 4022c3 5087 4022dd 5086->5087 5088 4022ca 5086->5088 5089 405f19 18 API calls 5088->5089 5090 4022d7 5089->5090 5091 4056ed MessageBoxIndirectA 5090->5091 5091->5087 4032 401746 4033 402ace 18 API calls 4032->4033 4034 40174d 4033->4034 4038 405b99 4034->4038 4036 401754 4037 405b99 2 API calls 4036->4037 4037->4036 4039 405ba4 GetTickCount GetTempFileNameA 4038->4039 4040 405bd1 4039->4040 4041 405bd5 4039->4041 4040->4039 4040->4041 4041->4036 5092 4026c7 5093 4026cd 5092->5093 5094 4026d5 FindClose 5093->5094 5095 40295e 5093->5095 5094->5095 5096 401947 5097 402ace 18 API calls 5096->5097 5098 40194e lstrlenA 5097->5098 5099 40258a 5098->5099 5100 402749 5101 402ace 18 API calls 5100->5101 5102 402757 5101->5102 5103 40276d 5102->5103 5104 402ace 18 API calls 5102->5104 5105 405b45 2 API calls 5103->5105 5104->5103 5106 402773 5105->5106 5128 405b6a GetFileAttributesA CreateFileA 5106->5128 5108 402780 5109 402823 5108->5109 5110 40278c GlobalAlloc 5108->5110 5113 40282b DeleteFileA 5109->5113 5114 40283e 5109->5114 5111 4027a5 5110->5111 5112 40281a CloseHandle 5110->5112 5129 403277 SetFilePointer 5111->5129 5112->5109 5113->5114 5116 4027ab 5117 403261 ReadFile 5116->5117 5118 4027b4 GlobalAlloc 5117->5118 5119 4027c4 5118->5119 5120 4027f8 5118->5120 5122 402ff0 45 API calls 5119->5122 5121 405c11 WriteFile 5120->5121 5123 402804 GlobalFree 5121->5123 5127 4027d1 5122->5127 5124 402ff0 45 API calls 5123->5124 5125 402817 5124->5125 5125->5112 5126 4027ef GlobalFree 5126->5120 5127->5126 5128->5108 5129->5116 4145 1000270b 4146 1000275b 4145->4146 4147 1000271b VirtualProtect 4145->4147 4147->4146 4158 4020cd 4159 402ace 18 API calls 4158->4159 4160 4020d4 4159->4160 4161 402ace 18 API calls 4160->4161 4162 4020de 4161->4162 4163 402ace 18 API calls 4162->4163 4164 4020e8 4163->4164 4165 402ace 18 API calls 4164->4165 4166 4020f2 4165->4166 4167 402ace 18 API calls 4166->4167 4168 4020fc 4167->4168 4169 40213b CoCreateInstance 4168->4169 4170 402ace 18 API calls 4168->4170 4173 40215a 4169->4173 4175 402202 4169->4175 4170->4169 4172 402238 4174 4021e2 MultiByteToWideChar 4173->4174 4173->4175 4174->4175 4175->4172 4176 401423 4175->4176 4177 405110 25 API calls 4176->4177 4178 401431 4177->4178 4178->4172 5140 1000180d 5141 10001830 5140->5141 5142 10001860 GlobalFree 5141->5142 5143 10001872 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5141->5143 5142->5143 5144 10001266 2 API calls 5143->5144 5145 100019e3 GlobalFree GlobalFree 5144->5145 4179 40524e 4180 405270 GetDlgItem GetDlgItem GetDlgItem 4179->4180 4181 4053f9 4179->4181 4225 404111 SendMessageA 4180->4225 4183 405401 GetDlgItem CreateThread CloseHandle 4181->4183 4184 405429 4181->4184 4183->4184 4228 4051e2 OleInitialize 4183->4228 4185 405457 4184->4185 4187 405478 4184->4187 4188 40543f ShowWindow ShowWindow 4184->4188 4189 4054b2 4185->4189 4190 40545f 4185->4190 4186 4052e0 4191 4052e7 GetClientRect GetSystemMetrics SendMessageA SendMessageA 4186->4191 4195 404143 8 API calls 4187->4195 4227 404111 SendMessageA 4188->4227 4189->4187 4200 4054bf SendMessageA 4189->4200 4193 405467 4190->4193 4194 40548b ShowWindow 4190->4194 4198 405355 4191->4198 4199 405339 SendMessageA SendMessageA 4191->4199 4201 4040b5 SendMessageA 4193->4201 4196 4054ab 4194->4196 4197 40549d 4194->4197 4202 405484 4195->4202 4204 4040b5 SendMessageA 4196->4204 4203 405110 25 API calls 4197->4203 4205 405368 4198->4205 4206 40535a SendMessageA 4198->4206 4199->4198 4200->4202 4207 4054d8 CreatePopupMenu 4200->4207 4201->4187 4203->4196 4204->4189 4209 4040dc 19 API calls 4205->4209 4206->4205 4208 405f19 18 API calls 4207->4208 4210 4054e8 AppendMenuA 4208->4210 4211 405378 4209->4211 4212 405506 GetWindowRect 4210->4212 4213 405519 TrackPopupMenu 4210->4213 4214 405381 ShowWindow 4211->4214 4215 4053b5 GetDlgItem SendMessageA 4211->4215 4212->4213 4213->4202 4217 405535 4213->4217 4218 4053a4 4214->4218 4219 405397 ShowWindow 4214->4219 4215->4202 4216 4053dc SendMessageA SendMessageA 4215->4216 4216->4202 4220 405554 SendMessageA 4217->4220 4226 404111 SendMessageA 4218->4226 4219->4218 4220->4220 4221 405571 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4220->4221 4223 405593 SendMessageA 4221->4223 4223->4223 4224 4055b5 GlobalUnlock SetClipboardData CloseClipboard 4223->4224 4224->4202 4225->4186 4226->4215 4227->4185 4229 404128 SendMessageA 4228->4229 4230 405205 4229->4230 4233 401389 2 API calls 4230->4233 4234 40522c 4230->4234 4231 404128 SendMessageA 4232 40523e OleUninitialize 4231->4232 4233->4230 4234->4231 4246 4023d3 4247 4023d9 4246->4247 4248 402ace 18 API calls 4247->4248 4249 4023eb 4248->4249 4250 402ace 18 API calls 4249->4250 4251 4023f5 RegCreateKeyExA 4250->4251 4252 402729 4251->4252 4253 40241f 4251->4253 4254 402437 4253->4254 4255 402ace 18 API calls 4253->4255 4256 402443 4254->4256 4258 402aac 18 API calls 4254->4258 4257 402430 lstrlenA 4255->4257 4259 402462 RegSetValueExA 4256->4259 4263 402ff0 4256->4263 4257->4254 4258->4256 4261 402478 RegCloseKey 4259->4261 4261->4252 4264 40301b 4263->4264 4265 402fff SetFilePointer 4263->4265 4278 4030f8 GetTickCount 4264->4278 4265->4264 4268 4030b8 4268->4259 4271 4030f8 43 API calls 4272 403052 4271->4272 4272->4268 4273 4030be ReadFile 4272->4273 4275 403061 4272->4275 4273->4268 4275->4268 4276 405be2 ReadFile 4275->4276 4277 405c11 WriteFile 4275->4277 4276->4275 4277->4275 4279 403250 4278->4279 4280 403126 4278->4280 4281 402cab 33 API calls 4279->4281 4293 403277 SetFilePointer 4280->4293 4288 403022 4281->4288 4283 403131 SetFilePointer 4287 403156 4283->4287 4287->4288 4289 405c11 WriteFile 4287->4289 4290 403231 SetFilePointer 4287->4290 4294 403261 4287->4294 4297 406393 4287->4297 4304 402cab 4287->4304 4288->4268 4291 405be2 ReadFile 4288->4291 4289->4287 4290->4279 4292 40303b 4291->4292 4292->4268 4292->4271 4293->4283 4295 405be2 ReadFile 4294->4295 4296 403274 4295->4296 4296->4287 4298 4063b8 4297->4298 4301 4063c0 4297->4301 4298->4287 4299 406450 GlobalAlloc 4299->4298 4299->4301 4300 406447 GlobalFree 4300->4299 4301->4298 4301->4299 4301->4300 4301->4301 4302 4064c7 GlobalAlloc 4301->4302 4303 4064be GlobalFree 4301->4303 4302->4298 4302->4301 4303->4302 4305 402cd1 4304->4305 4306 402cb9 4304->4306 4307 402ce1 GetTickCount 4305->4307 4308 402cd9 4305->4308 4309 402cc2 DestroyWindow 4306->4309 4310 402cc9 4306->4310 4307->4310 4312 402cef 4307->4312 4319 4062cc 4308->4319 4309->4310 4310->4287 4313 402d24 CreateDialogParamA ShowWindow 4312->4313 4314 402cf7 4312->4314 4313->4310 4314->4310 4323 402c8f 4314->4323 4316 402d05 wsprintfA 4317 405110 25 API calls 4316->4317 4318 402d22 4317->4318 4318->4310 4320 4062e9 PeekMessageA 4319->4320 4321 4062f9 4320->4321 4322 4062df DispatchMessageA 4320->4322 4321->4310 4322->4320 4324 402ca0 MulDiv 4323->4324 4325 402c9e 4323->4325 4324->4316 4325->4324 5146 4044d3 5147 4044e3 5146->5147 5148 404509 5146->5148 5149 4040dc 19 API calls 5147->5149 5150 404143 8 API calls 5148->5150 5151 4044f0 SetDlgItemTextA 5149->5151 5152 404515 5150->5152 5151->5148 5153 401cd4 5154 402aac 18 API calls 5153->5154 5155 401cda IsWindow 5154->5155 5156 401a0e 5155->5156 4326 4014d6 4327 402aac 18 API calls 4326->4327 4328 4014dc Sleep 4327->4328 4330 40295e 4328->4330 4331 4025d7 4332 402aac 18 API calls 4331->4332 4334 4025e1 4332->4334 4333 40264f 4334->4333 4335 405be2 ReadFile 4334->4335 4336 402651 4334->4336 4339 402661 4334->4339 4335->4334 4340 405e55 wsprintfA 4336->4340 4338 402677 SetFilePointer 4338->4333 4339->4333 4339->4338 4340->4333 4341 401759 4342 402ace 18 API calls 4341->4342 4343 401760 4342->4343 4344 401786 4343->4344 4345 40177e 4343->4345 4381 405ef7 lstrcpynA 4344->4381 4380 405ef7 lstrcpynA 4345->4380 4348 401784 4352 406162 5 API calls 4348->4352 4349 401791 4382 405969 lstrlenA CharPrevA 4349->4382 4376 4017a3 4352->4376 4353 4061fb 2 API calls 4353->4376 4356 4017ba CompareFileTime 4356->4376 4357 40187e 4358 405110 25 API calls 4357->4358 4360 401888 4358->4360 4359 401855 4361 405110 25 API calls 4359->4361 4378 40186a 4359->4378 4362 402ff0 45 API calls 4360->4362 4361->4378 4363 40189b 4362->4363 4365 4018af SetFileTime 4363->4365 4367 4018c1 CloseHandle 4363->4367 4364 405ef7 lstrcpynA 4364->4376 4365->4367 4366 405f19 18 API calls 4366->4376 4368 4018d2 4367->4368 4367->4378 4369 4018d7 4368->4369 4370 4018ea 4368->4370 4371 405f19 18 API calls 4369->4371 4372 405f19 18 API calls 4370->4372 4374 4018df lstrcatA 4371->4374 4375 4018f2 4372->4375 4374->4375 4377 4056ed MessageBoxIndirectA 4375->4377 4376->4353 4376->4356 4376->4357 4376->4359 4376->4364 4376->4366 4379 405b6a GetFileAttributesA CreateFileA 4376->4379 4385 405b45 GetFileAttributesA 4376->4385 4388 4056ed 4376->4388 4377->4378 4379->4376 4380->4348 4381->4349 4383 405983 lstrcatA 4382->4383 4384 401797 lstrcatA 4382->4384 4383->4384 4384->4348 4386 405b64 4385->4386 4387 405b57 SetFileAttributesA 4385->4387 4386->4376 4387->4386 4389 405702 4388->4389 4390 40574e 4389->4390 4391 405716 MessageBoxIndirectA 4389->4391 4390->4376 4391->4390 4392 401e59 4393 402ace 18 API calls 4392->4393 4394 401e5f 4393->4394 4395 402ace 18 API calls 4394->4395 4396 401e68 4395->4396 4397 402ace 18 API calls 4396->4397 4398 401e71 4397->4398 4399 402ace 18 API calls 4398->4399 4400 401e7a 4399->4400 4401 401423 25 API calls 4400->4401 4402 401e81 ShellExecuteA 4401->4402 4403 401eae 4402->4403 5157 401659 5158 402ace 18 API calls 5157->5158 5159 40165f 5158->5159 5160 4061fb 2 API calls 5159->5160 5161 401665 5160->5161 5162 401959 5163 402aac 18 API calls 5162->5163 5164 401960 5163->5164 5165 402aac 18 API calls 5164->5165 5166 40196d 5165->5166 5167 402ace 18 API calls 5166->5167 5168 401984 lstrlenA 5167->5168 5169 401994 5168->5169 5170 4019d4 5169->5170 5174 405ef7 lstrcpynA 5169->5174 5172 4019c4 5172->5170 5173 4019c9 lstrlenA 5172->5173 5173->5170 5174->5172 5175 1000161a 5176 10001649 5175->5176 5177 10001a5d 18 API calls 5176->5177 5178 10001650 5177->5178 5179 10001663 5178->5179 5180 10001657 5178->5180 5181 1000168a 5179->5181 5182 1000166d 5179->5182 5183 10001266 2 API calls 5180->5183 5185 10001690 5181->5185 5186 100016b4 5181->5186 5184 100014e2 3 API calls 5182->5184 5190 10001661 5183->5190 5187 10001672 5184->5187 5188 10001559 3 API calls 5185->5188 5189 100014e2 3 API calls 5186->5189 5191 10001559 3 API calls 5187->5191 5192 10001695 5188->5192 5189->5190 5193 10001678 5191->5193 5194 10001266 2 API calls 5192->5194 5195 10001266 2 API calls 5193->5195 5196 1000169b GlobalFree 5194->5196 5197 1000167e GlobalFree 5195->5197 5196->5190 5198 100016af GlobalFree 5196->5198 5197->5190 5198->5190 5199 401b5d 5200 401b6a 5199->5200 5201 401bae 5199->5201 5204 401bf2 5200->5204 5209 401b81 5200->5209 5202 401bb2 5201->5202 5203 401bd7 GlobalAlloc 5201->5203 5217 4022dd 5202->5217 5220 405ef7 lstrcpynA 5202->5220 5206 405f19 18 API calls 5203->5206 5205 405f19 18 API calls 5204->5205 5204->5217 5207 4022d7 5205->5207 5206->5204 5212 4056ed MessageBoxIndirectA 5207->5212 5218 405ef7 lstrcpynA 5209->5218 5210 401bc4 GlobalFree 5210->5217 5212->5217 5213 401b90 5219 405ef7 lstrcpynA 5213->5219 5215 401b9f 5221 405ef7 lstrcpynA 5215->5221 5218->5213 5219->5215 5220->5210 5221->5217 5222 401f5d 5223 402ace 18 API calls 5222->5223 5224 401f64 5223->5224 5225 406290 5 API calls 5224->5225 5226 401f73 5225->5226 5227 401f8b GlobalAlloc 5226->5227 5228 401ff3 5226->5228 5227->5228 5229 401f9f 5227->5229 5230 406290 5 API calls 5229->5230 5231 401fa6 5230->5231 5232 406290 5 API calls 5231->5232 5233 401fb0 5232->5233 5233->5228 5237 405e55 wsprintfA 5233->5237 5235 401fe7 5238 405e55 wsprintfA 5235->5238 5237->5235 5238->5228 5239 401a5e 5240 402aac 18 API calls 5239->5240 5241 401a64 5240->5241 5242 402aac 18 API calls 5241->5242 5243 401a0e 5242->5243 5244 4026e1 5245 4026e7 5244->5245 5246 4026eb FindNextFileA 5245->5246 5247 4026fd 5245->5247 5246->5247 5248 40273c 5246->5248 5250 405ef7 lstrcpynA 5248->5250 5250->5247 5258 401563 5259 402906 5258->5259 5262 405e55 wsprintfA 5259->5262 5261 40290b 5262->5261 4422 40166a 4423 402ace 18 API calls 4422->4423 4424 401671 4423->4424 4425 402ace 18 API calls 4424->4425 4426 40167a 4425->4426 4427 402ace 18 API calls 4426->4427 4428 401683 MoveFileA 4427->4428 4429 401696 4428->4429 4430 40168f 4428->4430 4431 4061fb 2 API calls 4429->4431 4434 402238 4429->4434 4432 401423 25 API calls 4430->4432 4433 4016a5 4431->4433 4432->4434 4433->4434 4436 405db2 MoveFileExA 4433->4436 4437 405dd3 4436->4437 4438 405dc6 4436->4438 4437->4430 4440 405c40 lstrcpyA 4438->4440 4441 405c68 4440->4441 4442 405c8e GetShortPathNameA 4440->4442 4467 405b6a GetFileAttributesA CreateFileA 4441->4467 4444 405ca3 4442->4444 4445 405dad 4442->4445 4444->4445 4447 405cab wsprintfA 4444->4447 4445->4437 4446 405c72 CloseHandle GetShortPathNameA 4446->4445 4448 405c86 4446->4448 4449 405f19 18 API calls 4447->4449 4448->4442 4448->4445 4450 405cd3 4449->4450 4468 405b6a GetFileAttributesA CreateFileA 4450->4468 4452 405ce0 4452->4445 4453 405cef GetFileSize GlobalAlloc 4452->4453 4454 405d11 4453->4454 4455 405da6 CloseHandle 4453->4455 4456 405be2 ReadFile 4454->4456 4455->4445 4457 405d19 4456->4457 4457->4455 4469 405acf lstrlenA 4457->4469 4460 405d30 lstrcpyA 4462 405d52 4460->4462 4461 405d44 4463 405acf 4 API calls 4461->4463 4464 405d89 SetFilePointer 4462->4464 4463->4462 4465 405c11 WriteFile 4464->4465 4466 405d9f GlobalFree 4465->4466 4466->4455 4467->4446 4468->4452 4470 405b10 lstrlenA 4469->4470 4471 405b18 4470->4471 4472 405ae9 lstrcmpiA 4470->4472 4471->4460 4471->4461 4472->4471 4473 405b07 CharNextA 4472->4473 4473->4470 5263 40486b 5264 404897 5263->5264 5265 40487b 5263->5265 5266 4048ca 5264->5266 5267 40489d SHGetPathFromIDListA 5264->5267 5274 4056d1 GetDlgItemTextA 5265->5274 5269 4048b4 SendMessageA 5267->5269 5270 4048ad 5267->5270 5269->5266 5272 40140b 2 API calls 5270->5272 5271 404888 SendMessageA 5271->5264 5272->5269 5274->5271 5275 4019ed 5276 402ace 18 API calls 5275->5276 5277 4019f4 5276->5277 5278 402ace 18 API calls 5277->5278 5279 4019fd 5278->5279 5280 401a04 lstrcmpiA 5279->5280 5281 401a16 lstrcmpA 5279->5281 5282 401a0a 5280->5282 5281->5282 5283 40256e 5284 402ace 18 API calls 5283->5284 5285 402575 5284->5285 5288 405b6a GetFileAttributesA CreateFileA 5285->5288 5287 402581 5288->5287 4474 40156f 4475 401586 4474->4475 4476 40157f ShowWindow 4474->4476 4477 401594 ShowWindow 4475->4477 4478 40295e 4475->4478 4476->4475 4477->4478 5289 4041f0 lstrcpynA lstrlenA 4479 4022f2 4480 4022fa 4479->4480 4482 402300 4479->4482 4481 402ace 18 API calls 4480->4481 4481->4482 4483 402ace 18 API calls 4482->4483 4485 402310 4482->4485 4483->4485 4484 40231e 4487 402ace 18 API calls 4484->4487 4485->4484 4486 402ace 18 API calls 4485->4486 4486->4484 4488 402327 WritePrivateProfileStringA 4487->4488 5290 100015b3 5291 100014bb GlobalFree 5290->5291 5293 100015cb 5291->5293 5292 10001611 GlobalFree 5293->5292 5294 100015e6 5293->5294 5295 100015fd VirtualFree 5293->5295 5294->5292 5295->5292 5296 4014f4 SetForegroundWindow 5297 40295e 5296->5297 4586 4024f5 4587 402bd8 19 API calls 4586->4587 4588 4024ff 4587->4588 4589 402aac 18 API calls 4588->4589 4590 402508 4589->4590 4591 402523 RegEnumKeyA 4590->4591 4592 40252f RegEnumValueA 4590->4592 4594 402729 4590->4594 4593 402548 RegCloseKey 4591->4593 4592->4593 4592->4594 4593->4594 5298 401cf5 5299 402aac 18 API calls 5298->5299 5300 401cfc 5299->5300 5301 402aac 18 API calls 5300->5301 5302 401d08 GetDlgItem 5301->5302 5303 40258a 5302->5303 4603 402377 4604 4023a7 4603->4604 4605 40237c 4603->4605 4607 402ace 18 API calls 4604->4607 4606 402bd8 19 API calls 4605->4606 4608 402383 4606->4608 4609 4023ae 4607->4609 4610 40238d 4608->4610 4614 4023c4 4608->4614 4615 402b0e RegOpenKeyExA 4609->4615 4611 402ace 18 API calls 4610->4611 4612 402394 RegDeleteValueA RegCloseKey 4611->4612 4612->4614 4616 402ba2 4615->4616 4622 402b39 4615->4622 4616->4614 4617 402b5f RegEnumKeyA 4618 402b71 RegCloseKey 4617->4618 4617->4622 4626 406290 GetModuleHandleA 4618->4626 4620 402b96 RegCloseKey 4625 402b85 4620->4625 4621 402b0e 5 API calls 4621->4622 4622->4617 4622->4618 4622->4620 4622->4621 4624 402bb1 RegDeleteKeyA 4624->4625 4625->4616 4627 4062b6 GetProcAddress 4626->4627 4628 4062ac 4626->4628 4630 402b81 4627->4630 4632 406222 GetSystemDirectoryA 4628->4632 4630->4624 4630->4625 4631 4062b2 4631->4627 4631->4630 4633 406244 wsprintfA LoadLibraryExA 4632->4633 4633->4631 5318 1000103d 5319 1000101b 5 API calls 5318->5319 5320 10001056 5319->5320 5321 4018fd 5322 401934 5321->5322 5323 402ace 18 API calls 5322->5323 5324 401939 5323->5324 5325 405799 69 API calls 5324->5325 5326 401942 5325->5326 4666 401fff 4667 402011 4666->4667 4668 4020bf 4666->4668 4669 402ace 18 API calls 4667->4669 4671 401423 25 API calls 4668->4671 4670 402018 4669->4670 4672 402ace 18 API calls 4670->4672 4676 402238 4671->4676 4673 402021 4672->4673 4674 402036 LoadLibraryExA 4673->4674 4675 402029 GetModuleHandleA 4673->4675 4674->4668 4677 402046 GetProcAddress 4674->4677 4675->4674 4675->4677 4678 402092 4677->4678 4679 402055 4677->4679 4680 405110 25 API calls 4678->4680 4681 402074 4679->4681 4682 40205d 4679->4682 4684 402065 4680->4684 4687 100016bd 4681->4687 4683 401423 25 API calls 4682->4683 4683->4684 4684->4676 4685 4020b3 FreeLibrary 4684->4685 4685->4676 4688 100016ed 4687->4688 4729 10001a5d 4688->4729 4690 100016f4 4691 1000180a 4690->4691 4692 10001705 4690->4692 4693 1000170c 4690->4693 4691->4684 4778 100021b0 4692->4778 4761 100021fa 4693->4761 4698 10001770 4704 100017b2 4698->4704 4705 10001776 4698->4705 4699 10001752 4791 100023da 4699->4791 4700 10001722 4703 10001728 4700->4703 4710 10001733 4700->4710 4701 1000173b 4715 10001731 4701->4715 4788 10002aa3 4701->4788 4703->4715 4772 100027e8 4703->4772 4708 100023da 11 API calls 4704->4708 4706 10001559 3 API calls 4705->4706 4712 1000178c 4706->4712 4713 100017a4 4708->4713 4709 10001758 4802 10001559 4709->4802 4782 10002589 4710->4782 4718 100023da 11 API calls 4712->4718 4728 100017f9 4713->4728 4813 100023a0 4713->4813 4715->4698 4715->4699 4717 10001739 4717->4715 4718->4713 4721 10001803 GlobalFree 4721->4691 4725 100017e5 4725->4728 4817 100014e2 wsprintfA 4725->4817 4727 100017de FreeLibrary 4727->4725 4728->4691 4728->4721 4820 10001215 GlobalAlloc 4729->4820 4731 10001a81 4821 10001215 GlobalAlloc 4731->4821 4733 10001cbb GlobalFree GlobalFree GlobalFree 4734 10001cd8 4733->4734 4749 10001d22 4733->4749 4735 1000201a 4734->4735 4744 10001ced 4734->4744 4734->4749 4737 1000203c GetModuleHandleA 4735->4737 4735->4749 4736 10001b60 GlobalAlloc 4756 10001a8c 4736->4756 4740 10002062 4737->4740 4741 1000204d LoadLibraryA 4737->4741 4738 10001bab lstrcpyA 4743 10001bb5 lstrcpyA 4738->4743 4739 10001bc9 GlobalFree 4739->4756 4828 100015a4 GetProcAddress 4740->4828 4741->4740 4741->4749 4743->4756 4744->4749 4824 10001224 4744->4824 4745 100020b3 4746 100020c0 lstrlenA 4745->4746 4745->4749 4829 100015a4 GetProcAddress 4746->4829 4748 10001f7a 4748->4749 4753 10001fbe lstrcpyA 4748->4753 4749->4690 4750 10002074 4750->4745 4760 1000209d GetProcAddress 4750->4760 4753->4749 4754 10001c07 4754->4756 4822 10001534 GlobalSize GlobalAlloc 4754->4822 4755 10001e75 GlobalFree 4755->4756 4756->4733 4756->4736 4756->4738 4756->4739 4756->4743 4756->4748 4756->4749 4756->4754 4756->4755 4759 10001224 2 API calls 4756->4759 4827 10001215 GlobalAlloc 4756->4827 4757 100020d9 4757->4749 4759->4756 4760->4745 4763 10002212 4761->4763 4762 10001224 GlobalAlloc lstrcpynA 4762->4763 4763->4762 4765 10002349 GlobalFree 4763->4765 4766 100022b9 GlobalAlloc MultiByteToWideChar 4763->4766 4767 1000230a lstrlenA 4763->4767 4831 100012ad 4763->4831 4765->4763 4768 10001712 4765->4768 4769 10002303 4766->4769 4770 100022e3 GlobalAlloc CLSIDFromString GlobalFree 4766->4770 4767->4765 4767->4769 4768->4700 4768->4701 4768->4715 4769->4765 4835 1000251d 4769->4835 4770->4765 4774 100027fa 4772->4774 4773 1000289f EnumWindows 4775 100028bd 4773->4775 4774->4773 4776 100029b9 4775->4776 4777 100029ae GetLastError 4775->4777 4776->4715 4777->4776 4779 100021c0 4778->4779 4780 1000170b 4778->4780 4779->4780 4781 100021d2 GlobalAlloc 4779->4781 4780->4693 4781->4779 4786 100025a5 4782->4786 4783 100025f6 GlobalAlloc 4787 10002618 4783->4787 4784 10002609 4785 1000260e GlobalSize 4784->4785 4784->4787 4785->4787 4786->4783 4786->4784 4787->4717 4789 10002aae 4788->4789 4790 10002aee GlobalFree 4789->4790 4838 10001215 GlobalAlloc 4791->4838 4793 1000243a lstrcpynA 4800 100023e6 4793->4800 4794 1000244b StringFromGUID2 WideCharToMultiByte 4794->4800 4795 1000246f WideCharToMultiByte 4795->4800 4796 100024b4 GlobalFree 4796->4800 4797 10002490 wsprintfA 4797->4800 4798 100024ee GlobalFree 4798->4709 4799 10001266 2 API calls 4799->4800 4800->4793 4800->4794 4800->4795 4800->4796 4800->4797 4800->4798 4800->4799 4839 100012d1 4800->4839 4843 10001215 GlobalAlloc 4802->4843 4804 1000155f 4805 1000156c lstrcpyA 4804->4805 4807 10001586 4804->4807 4808 100015a0 4805->4808 4807->4808 4809 1000158b wsprintfA 4807->4809 4810 10001266 4808->4810 4809->4808 4811 100012a8 GlobalFree 4810->4811 4812 1000126f GlobalAlloc lstrcpynA 4810->4812 4811->4713 4812->4811 4814 100023ae 4813->4814 4816 100017c5 4813->4816 4815 100023c7 GlobalFree 4814->4815 4814->4816 4815->4814 4816->4725 4816->4727 4818 10001266 2 API calls 4817->4818 4819 10001503 4818->4819 4819->4728 4820->4731 4821->4756 4823 10001552 4822->4823 4823->4754 4830 10001215 GlobalAlloc 4824->4830 4826 10001233 lstrcpynA 4826->4749 4827->4756 4828->4750 4829->4757 4830->4826 4832 100012b4 4831->4832 4833 10001224 2 API calls 4832->4833 4834 100012cf 4833->4834 4834->4763 4836 10002581 4835->4836 4837 1000252b VirtualAlloc 4835->4837 4836->4769 4837->4836 4838->4800 4840 100012f9 4839->4840 4841 100012da 4839->4841 4840->4800 4841->4840 4842 100012e0 lstrcpyA 4841->4842 4842->4840 4843->4804 5334 401000 5335 401037 BeginPaint GetClientRect 5334->5335 5336 40100c DefWindowProcA 5334->5336 5338 4010f3 5335->5338 5339 401179 5336->5339 5340 401073 CreateBrushIndirect FillRect DeleteObject 5338->5340 5341 4010fc 5338->5341 5340->5338 5342 401102 CreateFontIndirectA 5341->5342 5343 401167 EndPaint 5341->5343 5342->5343 5344 401112 6 API calls 5342->5344 5343->5339 5344->5343 5345 401900 5346 402ace 18 API calls 5345->5346 5347 401907 5346->5347 5348 4056ed MessageBoxIndirectA 5347->5348 5349 401910 5348->5349 5350 401502 5351 40150a 5350->5351 5353 40151d 5350->5353 5352 402aac 18 API calls 5351->5352 5352->5353 3991 402483 4002 402bd8 3991->4002 3993 40248d 3994 402ace 18 API calls 3993->3994 3995 402496 3994->3995 3996 4024a0 RegQueryValueExA 3995->3996 3997 402729 3995->3997 3998 4024c0 3996->3998 3999 4024c6 RegCloseKey 3996->3999 3998->3999 4006 405e55 wsprintfA 3998->4006 3999->3997 4003 402ace 18 API calls 4002->4003 4004 402bf1 4003->4004 4005 402bff RegOpenKeyExA 4004->4005 4005->3993 4006->3999 5354 100029c3 5355 100029db 5354->5355 5356 10001534 2 API calls 5355->5356 5357 100029f6 5356->5357 4007 401c04 4029 402aac 4007->4029 4009 401c0b 4010 402aac 18 API calls 4009->4010 4011 401c18 4010->4011 4012 401c2d 4011->4012 4013 402ace 18 API calls 4011->4013 4014 401c3d 4012->4014 4015 402ace 18 API calls 4012->4015 4013->4012 4016 401c94 4014->4016 4017 401c48 4014->4017 4015->4014 4018 402ace 18 API calls 4016->4018 4019 402aac 18 API calls 4017->4019 4021 401c99 4018->4021 4020 401c4d 4019->4020 4022 402aac 18 API calls 4020->4022 4023 402ace 18 API calls 4021->4023 4024 401c59 4022->4024 4025 401ca2 FindWindowExA 4023->4025 4026 401c84 SendMessageA 4024->4026 4027 401c66 SendMessageTimeoutA 4024->4027 4028 401cc0 4025->4028 4026->4028 4027->4028 4030 405f19 18 API calls 4029->4030 4031 402ac1 4030->4031 4031->4009 5358 405084 5359 405094 5358->5359 5360 4050a8 5358->5360 5361 4050f1 5359->5361 5362 40509a 5359->5362 5363 4050b0 IsWindowVisible 5360->5363 5369 4050c7 5360->5369 5364 4050f6 CallWindowProcA 5361->5364 5365 404128 SendMessageA 5362->5365 5363->5361 5366 4050bd 5363->5366 5367 4050a4 5364->5367 5365->5367 5371 4049db SendMessageA 5366->5371 5369->5364 5376 404a5b 5369->5376 5372 404a3a SendMessageA 5371->5372 5373 4049fe GetMessagePos ScreenToClient SendMessageA 5371->5373 5375 404a32 5372->5375 5374 404a37 5373->5374 5373->5375 5374->5372 5375->5369 5385 405ef7 lstrcpynA 5376->5385 5378 404a6e 5386 405e55 wsprintfA 5378->5386 5380 404a78 5381 40140b 2 API calls 5380->5381 5382 404a81 5381->5382 5387 405ef7 lstrcpynA 5382->5387 5384 404a88 5384->5361 5385->5378 5386->5380 5387->5384 4042 403c09 4043 403c21 4042->4043 4044 403d5c 4042->4044 4043->4044 4045 403c2d 4043->4045 4046 403dad 4044->4046 4047 403d6d GetDlgItem GetDlgItem 4044->4047 4048 403c38 SetWindowPos 4045->4048 4049 403c4b 4045->4049 4051 403e07 4046->4051 4059 401389 2 API calls 4046->4059 4050 4040dc 19 API calls 4047->4050 4048->4049 4052 403c50 ShowWindow 4049->4052 4053 403c68 4049->4053 4054 403d97 SetClassLongA 4050->4054 4073 403d57 4051->4073 4112 404128 4051->4112 4052->4053 4056 403c70 DestroyWindow 4053->4056 4057 403c8a 4053->4057 4058 40140b 2 API calls 4054->4058 4111 404065 4056->4111 4060 403ca0 4057->4060 4061 403c8f SetWindowLongA 4057->4061 4058->4046 4062 403ddf 4059->4062 4065 403d49 4060->4065 4066 403cac GetDlgItem 4060->4066 4061->4073 4062->4051 4067 403de3 SendMessageA 4062->4067 4063 40140b 2 API calls 4069 403e19 4063->4069 4064 404067 DestroyWindow EndDialog 4064->4111 4131 404143 4065->4131 4070 403cdc 4066->4070 4071 403cbf SendMessageA IsWindowEnabled 4066->4071 4067->4073 4068 404096 ShowWindow 4068->4073 4069->4063 4069->4064 4069->4073 4074 405f19 18 API calls 4069->4074 4079 4040dc 19 API calls 4069->4079 4102 403fa7 DestroyWindow 4069->4102 4115 4040dc 4069->4115 4075 403ce9 4070->4075 4076 403d30 SendMessageA 4070->4076 4077 403cfc 4070->4077 4085 403ce1 4070->4085 4071->4070 4071->4073 4074->4069 4075->4076 4075->4085 4076->4065 4080 403d04 4077->4080 4081 403d19 4077->4081 4079->4069 4125 40140b 4080->4125 4084 40140b 2 API calls 4081->4084 4082 403d17 4082->4065 4086 403d20 4084->4086 4128 4040b5 4085->4128 4086->4065 4086->4085 4088 403e94 GetDlgItem 4089 403eb1 ShowWindow KiUserCallbackDispatcher 4088->4089 4090 403ea9 4088->4090 4118 4040fe KiUserCallbackDispatcher 4089->4118 4090->4089 4092 403edb EnableWindow 4095 403eef 4092->4095 4093 403ef4 GetSystemMenu EnableMenuItem SendMessageA 4094 403f24 SendMessageA 4093->4094 4093->4095 4094->4095 4095->4093 4119 404111 SendMessageA 4095->4119 4120 405ef7 lstrcpynA 4095->4120 4098 403f52 lstrlenA 4099 405f19 18 API calls 4098->4099 4100 403f63 SetWindowTextA 4099->4100 4121 401389 4100->4121 4103 403fc1 CreateDialogParamA 4102->4103 4102->4111 4104 403ff4 4103->4104 4103->4111 4105 4040dc 19 API calls 4104->4105 4106 403fff GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4105->4106 4107 401389 2 API calls 4106->4107 4108 404045 4107->4108 4108->4073 4109 40404d ShowWindow 4108->4109 4110 404128 SendMessageA 4109->4110 4110->4111 4111->4068 4111->4073 4113 404140 4112->4113 4114 404131 SendMessageA 4112->4114 4113->4069 4114->4113 4116 405f19 18 API calls 4115->4116 4117 4040e7 SetDlgItemTextA 4116->4117 4117->4088 4118->4092 4119->4095 4120->4098 4123 401390 4121->4123 4122 4013fe 4122->4069 4123->4122 4124 4013cb MulDiv SendMessageA 4123->4124 4124->4123 4126 401389 2 API calls 4125->4126 4127 401420 4126->4127 4127->4085 4129 4040c2 SendMessageA 4128->4129 4130 4040bc 4128->4130 4129->4082 4130->4129 4132 40415b GetWindowLongA 4131->4132 4142 4041e4 4131->4142 4133 40416c 4132->4133 4132->4142 4134 40417b GetSysColor 4133->4134 4135 40417e 4133->4135 4134->4135 4136 404184 SetTextColor 4135->4136 4137 40418e SetBkMode 4135->4137 4136->4137 4138 4041a6 GetSysColor 4137->4138 4139 4041ac 4137->4139 4138->4139 4140 4041b3 SetBkColor 4139->4140 4141 4041bd 4139->4141 4140->4141 4141->4142 4143 4041d0 DeleteObject 4141->4143 4144 4041d7 CreateBrushIndirect 4141->4144 4142->4073 4143->4144 4144->4142 4148 40270b 4149 402ace 18 API calls 4148->4149 4150 402712 FindFirstFileA 4149->4150 4151 402735 4150->4151 4152 402725 4150->4152 4153 40273c 4151->4153 4156 405e55 wsprintfA 4151->4156 4157 405ef7 lstrcpynA 4153->4157 4156->4153 4157->4152 5388 404a8d GetDlgItem GetDlgItem 5389 404adf 7 API calls 5388->5389 5395 404cf7 5388->5395 5390 404b82 DeleteObject 5389->5390 5391 404b75 SendMessageA 5389->5391 5392 404b8b 5390->5392 5391->5390 5393 404bc2 5392->5393 5394 405f19 18 API calls 5392->5394 5396 4040dc 19 API calls 5393->5396 5399 404ba4 SendMessageA SendMessageA 5394->5399 5398 404ddb 5395->5398 5405 4049db 5 API calls 5395->5405 5421 404d68 5395->5421 5402 404bd6 5396->5402 5397 404e87 5400 404e91 SendMessageA 5397->5400 5401 404e99 5397->5401 5398->5397 5407 404e34 SendMessageA 5398->5407 5431 404cea 5398->5431 5399->5392 5400->5401 5409 404eb2 5401->5409 5410 404eab ImageList_Destroy 5401->5410 5418 404ec2 5401->5418 5406 4040dc 19 API calls 5402->5406 5403 404143 8 API calls 5408 40507d 5403->5408 5404 404dcd SendMessageA 5404->5398 5405->5421 5422 404be4 5406->5422 5412 404e49 SendMessageA 5407->5412 5407->5431 5414 404ebb GlobalFree 5409->5414 5409->5418 5410->5409 5411 405031 5416 405043 ShowWindow GetDlgItem ShowWindow 5411->5416 5411->5431 5413 404e5c 5412->5413 5424 404e6d SendMessageA 5413->5424 5414->5418 5415 404cb8 GetWindowLongA SetWindowLongA 5417 404cd1 5415->5417 5416->5431 5419 404cd7 ShowWindow 5417->5419 5420 404cef 5417->5420 5418->5411 5430 404a5b 4 API calls 5418->5430 5435 404efd 5418->5435 5439 404111 SendMessageA 5419->5439 5440 404111 SendMessageA 5420->5440 5421->5398 5421->5404 5422->5415 5423 404c33 SendMessageA 5422->5423 5425 404cb2 5422->5425 5428 404c80 SendMessageA 5422->5428 5429 404c6f SendMessageA 5422->5429 5423->5422 5424->5397 5425->5415 5425->5417 5428->5422 5429->5422 5430->5435 5431->5403 5432 405007 InvalidateRect 5432->5411 5433 40501d 5432->5433 5441 404996 5433->5441 5434 404f2b SendMessageA 5438 404f41 5434->5438 5435->5434 5435->5438 5437 404fb5 SendMessageA SendMessageA 5437->5438 5438->5432 5438->5437 5439->5431 5440->5395 5444 4048d1 5441->5444 5443 4049ab 5443->5411 5445 4048e7 5444->5445 5446 405f19 18 API calls 5445->5446 5447 40494b 5446->5447 5448 405f19 18 API calls 5447->5448 5449 404956 5448->5449 5450 405f19 18 API calls 5449->5450 5451 40496c lstrlenA wsprintfA SetDlgItemTextA 5450->5451 5451->5443 4235 402590 4236 402595 4235->4236 4237 4025a9 4235->4237 4239 402aac 18 API calls 4236->4239 4238 402ace 18 API calls 4237->4238 4240 4025b0 lstrlenA 4238->4240 4241 40259e 4239->4241 4240->4241 4243 4025d2 4241->4243 4244 405c11 WriteFile 4241->4244 4245 405c2f 4244->4245 4245->4243 5459 401490 5460 405110 25 API calls 5459->5460 5461 401497 5460->5461 5462 402c13 5463 402c22 SetTimer 5462->5463 5464 402c3b 5462->5464 5463->5464 5465 402c89 5464->5465 5466 402c8f MulDiv 5464->5466 5467 402c49 wsprintfA SetWindowTextA SetDlgItemTextA 5466->5467 5467->5465 5469 401d95 GetDC 5470 402aac 18 API calls 5469->5470 5471 401da7 GetDeviceCaps MulDiv ReleaseDC 5470->5471 5472 402aac 18 API calls 5471->5472 5473 401dd8 5472->5473 5474 405f19 18 API calls 5473->5474 5475 401e15 CreateFontIndirectA 5474->5475 5476 40258a 5475->5476 5477 10001058 5479 10001074 5477->5479 5478 100010dc 5479->5478 5480 100014bb GlobalFree 5479->5480 5481 10001091 5479->5481 5480->5481 5482 100014bb GlobalFree 5481->5482 5483 100010a1 5482->5483 5484 100010b1 5483->5484 5485 100010a8 GlobalSize 5483->5485 5486 100010b5 GlobalAlloc 5484->5486 5488 100010c6 5484->5488 5485->5484 5487 100014e2 3 API calls 5486->5487 5487->5488 5489 100010d1 GlobalFree 5488->5489 5489->5478 5490 40451a 5491 404546 5490->5491 5492 404557 5490->5492 5551 4056d1 GetDlgItemTextA 5491->5551 5494 404563 GetDlgItem 5492->5494 5501 4045c2 5492->5501 5497 404577 5494->5497 5495 4046a6 5500 404850 5495->5500 5553 4056d1 GetDlgItemTextA 5495->5553 5496 404551 5498 406162 5 API calls 5496->5498 5499 40458b SetWindowTextA 5497->5499 5503 405a02 4 API calls 5497->5503 5498->5492 5504 4040dc 19 API calls 5499->5504 5507 404143 8 API calls 5500->5507 5501->5495 5501->5500 5505 405f19 18 API calls 5501->5505 5509 404581 5503->5509 5510 4045a7 5504->5510 5511 404636 SHBrowseForFolderA 5505->5511 5506 4046d6 5512 405a57 18 API calls 5506->5512 5508 404864 5507->5508 5509->5499 5516 405969 3 API calls 5509->5516 5513 4040dc 19 API calls 5510->5513 5511->5495 5514 40464e CoTaskMemFree 5511->5514 5515 4046dc 5512->5515 5517 4045b5 5513->5517 5518 405969 3 API calls 5514->5518 5554 405ef7 lstrcpynA 5515->5554 5516->5499 5552 404111 SendMessageA 5517->5552 5520 40465b 5518->5520 5523 404692 SetDlgItemTextA 5520->5523 5527 405f19 18 API calls 5520->5527 5522 4045bb 5525 406290 5 API calls 5522->5525 5523->5495 5524 4046f3 5526 406290 5 API calls 5524->5526 5525->5501 5533 4046fa 5526->5533 5528 40467a lstrcmpiA 5527->5528 5528->5523 5531 40468b lstrcatA 5528->5531 5529 404736 5555 405ef7 lstrcpynA 5529->5555 5531->5523 5532 40473d 5534 405a02 4 API calls 5532->5534 5533->5529 5537 4059b0 2 API calls 5533->5537 5539 40478e 5533->5539 5535 404743 GetDiskFreeSpaceA 5534->5535 5538 404767 MulDiv 5535->5538 5535->5539 5537->5533 5538->5539 5540 4047ff 5539->5540 5542 404996 21 API calls 5539->5542 5541 404822 5540->5541 5543 40140b 2 API calls 5540->5543 5556 4040fe KiUserCallbackDispatcher 5541->5556 5544 4047ec 5542->5544 5543->5541 5546 404801 SetDlgItemTextA 5544->5546 5547 4047f1 5544->5547 5546->5540 5549 4048d1 21 API calls 5547->5549 5548 40483e 5548->5500 5557 4044af 5548->5557 5549->5540 5551->5496 5552->5522 5553->5506 5554->5524 5555->5532 5556->5548 5558 4044c2 SendMessageA 5557->5558 5559 4044bd 5557->5559 5558->5500 5559->5558 5560 401d1a 5561 402aac 18 API calls 5560->5561 5562 401d28 SetWindowLongA 5561->5562 5563 40295e 5562->5563 4404 40159d 4405 402ace 18 API calls 4404->4405 4406 4015a4 SetFileAttributesA 4405->4406 4407 4015b6 4406->4407 5569 40149d 5570 4014ab PostQuitMessage 5569->5570 5571 4022dd 5569->5571 5570->5571 4408 401a1e 4409 402ace 18 API calls 4408->4409 4410 401a27 ExpandEnvironmentStringsA 4409->4410 4411 401a3b 4410->4411 4413 401a4e 4410->4413 4412 401a40 lstrcmpA 4411->4412 4411->4413 4412->4413 5572 40171f 5573 402ace 18 API calls 5572->5573 5574 401726 SearchPathA 5573->5574 5575 401741 5574->5575 5576 100010e0 5585 1000110e 5576->5585 5577 100011c4 GlobalFree 5578 100012ad 2 API calls 5578->5585 5579 100011c3 5579->5577 5580 100011ea GlobalFree 5580->5585 5581 10001266 2 API calls 5584 100011b1 GlobalFree 5581->5584 5582 10001155 GlobalAlloc 5582->5585 5583 100012d1 lstrcpyA 5583->5585 5584->5585 5585->5577 5585->5578 5585->5579 5585->5580 5585->5581 5585->5582 5585->5583 5585->5584 5586 10002162 5587 100021c0 5586->5587 5588 100021f6 5586->5588 5587->5588 5589 100021d2 GlobalAlloc 5587->5589 5589->5587 4414 401e25 4415 402aac 18 API calls 4414->4415 4416 401e2b 4415->4416 4417 402aac 18 API calls 4416->4417 4418 401e37 4417->4418 4419 401e43 ShowWindow 4418->4419 4420 401e4e EnableWindow 4418->4420 4421 40295e 4419->4421 4420->4421 5590 404225 5591 40423b 5590->5591 5598 404347 5590->5598 5595 4040dc 19 API calls 5591->5595 5592 4043b6 5593 4043c0 GetDlgItem 5592->5593 5594 40448a 5592->5594 5596 4043d6 5593->5596 5597 404448 5593->5597 5600 404143 8 API calls 5594->5600 5599 404291 5595->5599 5596->5597 5605 4043fc 6 API calls 5596->5605 5597->5594 5606 40445a 5597->5606 5598->5592 5598->5594 5602 40438b GetDlgItem SendMessageA 5598->5602 5601 4040dc 19 API calls 5599->5601 5603 404485 5600->5603 5604 40429e CheckDlgButton 5601->5604 5621 4040fe KiUserCallbackDispatcher 5602->5621 5619 4040fe KiUserCallbackDispatcher 5604->5619 5605->5597 5609 404460 SendMessageA 5606->5609 5610 404471 5606->5610 5609->5610 5610->5603 5613 404477 SendMessageA 5610->5613 5611 4043b1 5614 4044af SendMessageA 5611->5614 5612 4042bc GetDlgItem 5620 404111 SendMessageA 5612->5620 5613->5603 5614->5592 5616 4042d2 SendMessageA 5617 4042f0 GetSysColor 5616->5617 5618 4042f9 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5616->5618 5617->5618 5618->5603 5619->5612 5620->5616 5621->5611 5629 401f2d 5630 402ace 18 API calls 5629->5630 5631 401f34 5630->5631 5632 4061fb 2 API calls 5631->5632 5633 401f3a 5632->5633 5635 401f4c 5633->5635 5636 405e55 wsprintfA 5633->5636 5636->5635 4489 401932 4490 401934 4489->4490 4491 402ace 18 API calls 4490->4491 4492 401939 4491->4492 4495 405799 4492->4495 4532 405a57 4495->4532 4498 4057c1 DeleteFileA 4504 401942 4498->4504 4499 4057d8 4511 405906 4499->4511 4546 405ef7 lstrcpynA 4499->4546 4501 4057fe 4502 405811 4501->4502 4503 405804 lstrcatA 4501->4503 4547 4059b0 lstrlenA 4502->4547 4505 405817 4503->4505 4508 405825 lstrcatA 4505->4508 4510 405830 lstrlenA FindFirstFileA 4505->4510 4507 4061fb 2 API calls 4509 40592a 4507->4509 4508->4510 4509->4504 4512 405969 3 API calls 4509->4512 4510->4511 4530 405854 4510->4530 4511->4504 4511->4507 4514 405934 4512->4514 4513 405994 CharNextA 4513->4530 4515 405751 5 API calls 4514->4515 4516 405940 4515->4516 4517 405944 4516->4517 4518 40595a 4516->4518 4517->4504 4522 405110 25 API calls 4517->4522 4520 405110 25 API calls 4518->4520 4520->4504 4521 4058e5 FindNextFileA 4523 4058fd FindClose 4521->4523 4521->4530 4524 405951 4522->4524 4523->4511 4525 405db2 38 API calls 4524->4525 4525->4504 4527 405799 62 API calls 4527->4530 4528 405110 25 API calls 4528->4521 4529 405110 25 API calls 4529->4530 4530->4513 4530->4521 4530->4527 4530->4528 4530->4529 4531 405db2 38 API calls 4530->4531 4551 405ef7 lstrcpynA 4530->4551 4552 405751 4530->4552 4531->4530 4560 405ef7 lstrcpynA 4532->4560 4534 405a68 4561 405a02 CharNextA CharNextA 4534->4561 4537 4057b9 4537->4498 4537->4499 4538 406162 5 API calls 4544 405a7e 4538->4544 4539 405aa9 lstrlenA 4540 405ab4 4539->4540 4539->4544 4542 405969 3 API calls 4540->4542 4541 4061fb 2 API calls 4541->4544 4543 405ab9 GetFileAttributesA 4542->4543 4543->4537 4544->4537 4544->4539 4544->4541 4545 4059b0 2 API calls 4544->4545 4545->4539 4546->4501 4548 4059bd 4547->4548 4549 4059c2 CharPrevA 4548->4549 4550 4059ce 4548->4550 4549->4548 4549->4550 4550->4505 4551->4530 4553 405b45 2 API calls 4552->4553 4555 40575d 4553->4555 4554 40577e 4554->4530 4555->4554 4556 405774 DeleteFileA 4555->4556 4557 40576c RemoveDirectoryA 4555->4557 4558 40577a 4556->4558 4557->4558 4558->4554 4559 40578a SetFileAttributesA 4558->4559 4559->4554 4560->4534 4562 405a1d 4561->4562 4565 405a2d 4561->4565 4564 405a28 CharNextA 4562->4564 4562->4565 4563 405a4d 4563->4537 4563->4538 4564->4563 4565->4563 4566 405994 CharNextA 4565->4566 4566->4565 4567 401eb3 4568 402ace 18 API calls 4567->4568 4569 401eb9 4568->4569 4570 405110 25 API calls 4569->4570 4571 401ec3 4570->4571 4582 405688 CreateProcessA 4571->4582 4573 401f1f CloseHandle 4577 402729 4573->4577 4574 401ee8 WaitForSingleObject 4575 401ec9 4574->4575 4576 401ef6 GetExitCodeProcess 4574->4576 4575->4573 4575->4574 4575->4577 4578 4062cc 2 API calls 4575->4578 4579 401f11 4576->4579 4580 401f08 4576->4580 4578->4574 4579->4573 4585 405e55 wsprintfA 4580->4585 4583 4056c7 4582->4583 4584 4056bb CloseHandle 4582->4584 4583->4575 4584->4583 4585->4579 5637 403835 5638 403840 5637->5638 5639 403847 GlobalAlloc 5638->5639 5640 403844 5638->5640 5639->5640 5641 406c35 5644 4063c6 5641->5644 5642 406450 GlobalAlloc 5642->5644 5645 406d31 5642->5645 5643 406447 GlobalFree 5643->5642 5644->5642 5644->5643 5644->5644 5644->5645 5646 4064c7 GlobalAlloc 5644->5646 5647 4064be GlobalFree 5644->5647 5646->5644 5646->5645 5647->5646 4596 402336 4597 402ace 18 API calls 4596->4597 4598 402347 4597->4598 4599 402ace 18 API calls 4598->4599 4600 402350 4599->4600 4601 402ace 18 API calls 4600->4601 4602 40235a GetPrivateProfileStringA 4601->4602 5648 4014b7 5649 4014bd 5648->5649 5650 401389 2 API calls 5649->5650 5651 4014c5 5650->5651 5652 401b39 5653 402ace 18 API calls 5652->5653 5654 401b40 5653->5654 5655 402aac 18 API calls 5654->5655 5656 401b49 wsprintfA 5655->5656 5657 40295e 5656->5657 5658 402939 SendMessageA 5659 402953 InvalidateRect 5658->5659 5660 40295e 5658->5660 5659->5660 4635 4015bb 4636 402ace 18 API calls 4635->4636 4637 4015c2 4636->4637 4638 405a02 4 API calls 4637->4638 4648 4015ca 4638->4648 4639 401624 4641 401652 4639->4641 4642 401629 4639->4642 4640 405994 CharNextA 4640->4648 4645 401423 25 API calls 4641->4645 4643 401423 25 API calls 4642->4643 4644 401630 4643->4644 4662 405ef7 lstrcpynA 4644->4662 4652 40164a 4645->4652 4648->4639 4648->4640 4651 40160c GetFileAttributesA 4648->4651 4654 405670 4648->4654 4657 4055d6 CreateDirectoryA 4648->4657 4663 405653 CreateDirectoryA 4648->4663 4650 40163b SetCurrentDirectoryA 4650->4652 4651->4648 4655 406290 5 API calls 4654->4655 4656 405677 4655->4656 4656->4648 4658 405623 4657->4658 4659 405627 GetLastError 4657->4659 4658->4648 4659->4658 4660 405636 SetFileSecurityA 4659->4660 4660->4658 4661 40564c GetLastError 4660->4661 4661->4658 4662->4650 4664 405663 4663->4664 4665 405667 GetLastError 4663->4665 4664->4648 4665->4664 5661 4016bb 5662 402ace 18 API calls 5661->5662 5663 4016c1 GetFullPathNameA 5662->5663 5666 4016d8 5663->5666 5670 4016f9 5663->5670 5664 40170d GetShortPathNameA 5665 40295e 5664->5665 5667 4061fb 2 API calls 5666->5667 5666->5670 5668 4016e9 5667->5668 5668->5670 5671 405ef7 lstrcpynA 5668->5671 5670->5664 5670->5665 5671->5670 5672 401d3b GetDlgItem GetClientRect 5673 402ace 18 API calls 5672->5673 5674 401d6b LoadImageA SendMessageA 5673->5674 5675 401d89 DeleteObject 5674->5675 5676 40295e 5674->5676 5675->5676 4844 4032bf SetErrorMode GetVersion 4845 4032f6 4844->4845 4846 4032fc 4844->4846 4847 406290 5 API calls 4845->4847 4848 406222 3 API calls 4846->4848 4847->4846 4849 403312 lstrlenA 4848->4849 4849->4846 4850 403321 4849->4850 4851 406290 5 API calls 4850->4851 4852 403329 4851->4852 4853 406290 5 API calls 4852->4853 4854 403330 #17 OleInitialize SHGetFileInfoA 4853->4854 4932 405ef7 lstrcpynA 4854->4932 4856 40336d GetCommandLineA 4933 405ef7 lstrcpynA 4856->4933 4858 40337f GetModuleHandleA 4859 403396 4858->4859 4860 405994 CharNextA 4859->4860 4861 4033aa CharNextA 4860->4861 4870 4033ba 4861->4870 4862 403484 4863 403497 GetTempPathA 4862->4863 4934 40328e 4863->4934 4865 4034af 4867 4034b3 GetWindowsDirectoryA lstrcatA 4865->4867 4868 403509 DeleteFileA 4865->4868 4866 405994 CharNextA 4866->4870 4871 40328e 12 API calls 4867->4871 4944 402d4a GetTickCount GetModuleFileNameA 4868->4944 4870->4862 4870->4866 4873 403486 4870->4873 4872 4034cf 4871->4872 4872->4868 4875 4034d3 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4872->4875 5030 405ef7 lstrcpynA 4873->5030 4874 40351d 4876 4035b3 4874->4876 4879 4035a3 4874->4879 4883 405994 CharNextA 4874->4883 4878 40328e 12 API calls 4875->4878 5033 403785 4876->5033 4881 403501 4878->4881 4974 403877 4879->4974 4881->4868 4881->4876 4885 403538 4883->4885 4894 4035e3 4885->4894 4895 40357e 4885->4895 4886 4036eb 4888 4036f3 GetCurrentProcess OpenProcessToken 4886->4888 4889 40376d ExitProcess 4886->4889 4887 4035cd 4890 4056ed MessageBoxIndirectA 4887->4890 4891 40373e 4888->4891 4892 40370e LookupPrivilegeValueA AdjustTokenPrivileges 4888->4892 4896 4035db ExitProcess 4890->4896 4899 406290 5 API calls 4891->4899 4892->4891 4898 405670 5 API calls 4894->4898 4897 405a57 18 API calls 4895->4897 4900 403589 4897->4900 4901 4035e8 lstrcatA 4898->4901 4902 403745 4899->4902 4900->4876 5031 405ef7 lstrcpynA 4900->5031 4903 403604 lstrcatA lstrcmpiA 4901->4903 4904 4035f9 lstrcatA 4901->4904 4905 40375a ExitWindowsEx 4902->4905 4908 403766 4902->4908 4903->4876 4907 403620 4903->4907 4904->4903 4905->4889 4905->4908 4910 403625 4907->4910 4911 40362c 4907->4911 4912 40140b 2 API calls 4908->4912 4909 403598 5032 405ef7 lstrcpynA 4909->5032 4914 4055d6 4 API calls 4910->4914 4915 405653 2 API calls 4911->4915 4912->4889 4916 40362a 4914->4916 4917 403631 SetCurrentDirectoryA 4915->4917 4916->4917 4918 403640 4917->4918 4919 40364b 4917->4919 5042 405ef7 lstrcpynA 4918->5042 5043 405ef7 lstrcpynA 4919->5043 4922 405f19 18 API calls 4923 40368a DeleteFileA 4922->4923 4924 403697 CopyFileA 4923->4924 4929 403659 4923->4929 4924->4929 4925 4036df 4927 405db2 38 API calls 4925->4927 4926 405db2 38 API calls 4926->4929 4927->4876 4928 405f19 18 API calls 4928->4929 4929->4922 4929->4925 4929->4926 4929->4928 4930 405688 2 API calls 4929->4930 4931 4036cb CloseHandle 4929->4931 4930->4929 4931->4929 4932->4856 4933->4858 4935 406162 5 API calls 4934->4935 4937 40329a 4935->4937 4936 4032a4 4936->4865 4937->4936 4938 405969 3 API calls 4937->4938 4939 4032ac 4938->4939 4940 405653 2 API calls 4939->4940 4941 4032b2 4940->4941 4942 405b99 2 API calls 4941->4942 4943 4032bd 4942->4943 4943->4865 5044 405b6a GetFileAttributesA CreateFileA 4944->5044 4946 402d8d 4973 402d9a 4946->4973 5045 405ef7 lstrcpynA 4946->5045 4948 402db0 4949 4059b0 2 API calls 4948->4949 4950 402db6 4949->4950 5046 405ef7 lstrcpynA 4950->5046 4952 402dc1 GetFileSize 4953 402ec2 4952->4953 4971 402dd8 4952->4971 4954 402cab 33 API calls 4953->4954 4955 402ec9 4954->4955 4957 402f05 GlobalAlloc 4955->4957 4955->4973 5048 403277 SetFilePointer 4955->5048 4956 403261 ReadFile 4956->4971 4961 402f1c 4957->4961 4958 402f5d 4959 402cab 33 API calls 4958->4959 4959->4973 4965 405b99 2 API calls 4961->4965 4962 402ee6 4963 403261 ReadFile 4962->4963 4966 402ef1 4963->4966 4964 402cab 33 API calls 4964->4971 4967 402f2d CreateFileA 4965->4967 4966->4957 4966->4973 4968 402f67 4967->4968 4967->4973 5047 403277 SetFilePointer 4968->5047 4970 402f75 4972 402ff0 45 API calls 4970->4972 4971->4953 4971->4956 4971->4958 4971->4964 4971->4973 4972->4973 4973->4874 4975 406290 5 API calls 4974->4975 4976 40388b 4975->4976 4977 403891 4976->4977 4978 4038a3 4976->4978 5058 405e55 wsprintfA 4977->5058 4979 405dde 3 API calls 4978->4979 4980 4038ce 4979->4980 4982 4038ec lstrcatA 4980->4982 4984 405dde 3 API calls 4980->4984 4983 4038a1 4982->4983 5049 403b3c 4983->5049 4984->4982 4987 405a57 18 API calls 4988 40391e 4987->4988 4989 4039a7 4988->4989 4991 405dde 3 API calls 4988->4991 4990 405a57 18 API calls 4989->4990 4992 4039ad 4990->4992 4993 40394a 4991->4993 4994 4039bd LoadImageA 4992->4994 4995 405f19 18 API calls 4992->4995 4993->4989 4999 403966 lstrlenA 4993->4999 5003 405994 CharNextA 4993->5003 4996 403a63 4994->4996 4997 4039e4 RegisterClassA 4994->4997 4995->4994 4998 40140b 2 API calls 4996->4998 5000 403a6d 4997->5000 5001 403a1a SystemParametersInfoA CreateWindowExA 4997->5001 5002 403a69 4998->5002 5004 403974 lstrcmpiA 4999->5004 5005 40399a 4999->5005 5000->4876 5001->4996 5002->5000 5010 403b3c 19 API calls 5002->5010 5008 403964 5003->5008 5004->5005 5006 403984 GetFileAttributesA 5004->5006 5007 405969 3 API calls 5005->5007 5009 403990 5006->5009 5011 4039a0 5007->5011 5008->4999 5009->5005 5012 4059b0 2 API calls 5009->5012 5013 403a7a 5010->5013 5059 405ef7 lstrcpynA 5011->5059 5012->5005 5015 403a86 ShowWindow 5013->5015 5016 403b09 5013->5016 5018 406222 3 API calls 5015->5018 5017 4051e2 5 API calls 5016->5017 5019 403b0f 5017->5019 5020 403a9e 5018->5020 5021 403b13 5019->5021 5022 403b2b 5019->5022 5023 403aac GetClassInfoA 5020->5023 5025 406222 3 API calls 5020->5025 5021->5000 5028 40140b 2 API calls 5021->5028 5024 40140b 2 API calls 5022->5024 5026 403ac0 GetClassInfoA RegisterClassA 5023->5026 5027 403ad6 DialogBoxParamA 5023->5027 5024->5000 5025->5023 5026->5027 5029 40140b 2 API calls 5027->5029 5028->5000 5029->5000 5030->4863 5031->4909 5032->4879 5034 4037a0 5033->5034 5035 403796 CloseHandle 5033->5035 5036 4037b4 5034->5036 5037 4037aa CloseHandle 5034->5037 5035->5034 5061 4037e2 5036->5061 5037->5036 5040 405799 69 API calls 5041 4035bc OleUninitialize 5040->5041 5041->4886 5041->4887 5042->4919 5043->4929 5044->4946 5045->4948 5046->4952 5047->4970 5048->4962 5050 403b50 5049->5050 5060 405e55 wsprintfA 5050->5060 5052 403bc1 5053 405f19 18 API calls 5052->5053 5054 403bcd SetWindowTextA 5053->5054 5055 4038fc 5054->5055 5056 403be9 5054->5056 5055->4987 5056->5055 5057 405f19 18 API calls 5056->5057 5057->5056 5058->4983 5059->4989 5060->5052 5062 4037f0 5061->5062 5063 4037b9 5062->5063 5064 4037f5 FreeLibrary GlobalFree 5062->5064 5063->5040 5064->5063 5064->5064

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 4032bf-4032f4 SetErrorMode GetVersion 1 4032f6-4032fe call 406290 0->1 2 403307 0->2 1->2 7 403300 1->7 4 40330c-40331f call 406222 lstrlenA 2->4 9 403321-403394 call 406290 * 2 #17 OleInitialize SHGetFileInfoA call 405ef7 GetCommandLineA call 405ef7 GetModuleHandleA 4->9 7->2 18 4033a0-4033b5 call 405994 CharNextA 9->18 19 403396-40339b 9->19 22 40347a-40347e 18->22 19->18 23 403484 22->23 24 4033ba-4033bd 22->24 27 403497-4034b1 GetTempPathA call 40328e 23->27 25 4033c5-4033cd 24->25 26 4033bf-4033c3 24->26 28 4033d5-4033d8 25->28 29 4033cf-4033d0 25->29 26->25 26->26 37 4034b3-4034d1 GetWindowsDirectoryA lstrcatA call 40328e 27->37 38 403509-403523 DeleteFileA call 402d4a 27->38 31 40346a-403477 call 405994 28->31 32 4033de-4033e2 28->32 29->28 31->22 50 403479 31->50 35 4033e4-4033ea 32->35 36 4033fa-403427 32->36 41 4033f0 35->41 42 4033ec-4033ee 35->42 43 403429-40342f 36->43 44 40343a-403468 36->44 37->38 52 4034d3-403503 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 40328e 37->52 53 4035b7-4035c7 call 403785 OleUninitialize 38->53 54 403529-40352f 38->54 41->36 42->36 42->41 46 403431-403433 43->46 47 403435 43->47 44->31 49 403486-403492 call 405ef7 44->49 46->44 46->47 47->44 49->27 50->22 52->38 52->53 66 4036eb-4036f1 53->66 67 4035cd-4035dd call 4056ed ExitProcess 53->67 57 403531-40353c call 405994 54->57 58 4035a7-4035ae call 403877 54->58 70 403572-40357c 57->70 71 40353e-403567 57->71 64 4035b3 58->64 64->53 68 4036f3-40370c GetCurrentProcess OpenProcessToken 66->68 69 40376d-403775 66->69 73 40373e-40374c call 406290 68->73 74 40370e-403738 LookupPrivilegeValueA AdjustTokenPrivileges 68->74 76 403777 69->76 77 40377b-40377f ExitProcess 69->77 78 4035e3-4035f7 call 405670 lstrcatA 70->78 79 40357e-40358b call 405a57 70->79 75 403569-40356b 71->75 91 40375a-403764 ExitWindowsEx 73->91 92 40374e-403758 73->92 74->73 75->70 84 40356d-403570 75->84 76->77 89 403604-40361e lstrcatA lstrcmpiA 78->89 90 4035f9-4035ff lstrcatA 78->90 79->53 88 40358d-4035a3 call 405ef7 * 2 79->88 84->70 84->75 88->58 89->53 94 403620-403623 89->94 90->89 91->69 95 403766-403768 call 40140b 91->95 92->91 92->95 97 403625-40362a call 4055d6 94->97 98 40362c call 405653 94->98 95->69 106 403631-40363e SetCurrentDirectoryA 97->106 98->106 107 403640-403646 call 405ef7 106->107 108 40364b-403673 call 405ef7 106->108 107->108 112 403679-403695 call 405f19 DeleteFileA 108->112 115 4036d6-4036dd 112->115 116 403697-4036a7 CopyFileA 112->116 115->112 118 4036df-4036e6 call 405db2 115->118 116->115 117 4036a9-4036c9 call 405db2 call 405f19 call 405688 116->117 117->115 127 4036cb-4036d2 CloseHandle 117->127 118->53 127->115
                              APIs
                              • SetErrorMode.KERNELBASE ref: 004032E4
                              • GetVersion.KERNEL32 ref: 004032EA
                              • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403313
                              • #17.COMCTL32(00000007,00000009), ref: 00403335
                              • OleInitialize.OLE32(00000000), ref: 0040333C
                              • SHGetFileInfoA.SHELL32(0041ECF0,00000000,?,00000160,00000000), ref: 00403358
                              • GetCommandLineA.KERNEL32(00422F20,NSIS Error), ref: 0040336D
                              • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\ODjwCjQBAP.exe",00000000), ref: 00403380
                              • CharNextA.USER32(00000000,"C:\Users\user\Desktop\ODjwCjQBAP.exe",00000020), ref: 004033AB
                              • GetTempPathA.KERNELBASE(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 004034A8
                              • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004034B9
                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034C5
                              • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034D9
                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004034E1
                              • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 004034F2
                              • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 004034FA
                              • DeleteFileA.KERNELBASE(1033), ref: 0040350E
                                • Part of subcall function 00406290: GetModuleHandleA.KERNEL32(?,?,?,00403329,00000009), ref: 004062A2
                                • Part of subcall function 00406290: GetProcAddress.KERNEL32(00000000,?), ref: 004062BD
                              • OleUninitialize.OLE32(?), ref: 004035BC
                              • ExitProcess.KERNEL32 ref: 004035DD
                              • GetCurrentProcess.KERNEL32(00000028,?), ref: 004036FA
                              • OpenProcessToken.ADVAPI32(00000000), ref: 00403701
                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403719
                              • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 00403738
                              • ExitWindowsEx.USER32(00000002,80040002), ref: 0040375C
                              • ExitProcess.KERNEL32 ref: 0040377F
                                • Part of subcall function 004056ED: MessageBoxIndirectA.USER32(00409230), ref: 00405748
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Process$Exit$EnvironmentFileHandleModulePathTempTokenVariableWindowslstrcat$AddressAdjustCharCommandCurrentDeleteDirectoryErrorIndirectInfoInitializeLineLookupMessageModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrlen
                              • String ID: "$"C:\Users\user\Desktop\ODjwCjQBAP.exe"$.tmp$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Brudgomme$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\ODjwCjQBAP.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                              • API String ID: 3329125770-2461469901
                              • Opcode ID: e89bfe13b8eb1ba36e43d38e3c68fc4bfbdc91619f963e3beaaf1f3555cbe72f
                              • Instruction ID: 987bc29005933e48b9d04248005189ae3273ffe916fb5a61461eda946c2e522c
                              • Opcode Fuzzy Hash: e89bfe13b8eb1ba36e43d38e3c68fc4bfbdc91619f963e3beaaf1f3555cbe72f
                              • Instruction Fuzzy Hash: FCC109706082816AE7216F259D49A2F3EACEF81706F44447FF481761E2CB7C9A05CB6E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 128 40524e-40526a 129 405270-405337 GetDlgItem * 3 call 404111 call 4049ae GetClientRect GetSystemMetrics SendMessageA * 2 128->129 130 4053f9-4053ff 128->130 150 405355-405358 129->150 151 405339-405353 SendMessageA * 2 129->151 132 405401-405423 GetDlgItem CreateThread CloseHandle 130->132 133 405429-405435 130->133 132->133 135 405457-40545d 133->135 136 405437-40543d 133->136 140 4054b2-4054b5 135->140 141 40545f-405465 135->141 138 405478-40547f call 404143 136->138 139 40543f-405452 ShowWindow * 2 call 404111 136->139 154 405484-405488 138->154 139->135 140->138 143 4054b7-4054bd 140->143 145 405467-405473 call 4040b5 141->145 146 40548b-40549b ShowWindow 141->146 143->138 152 4054bf-4054d2 SendMessageA 143->152 145->138 148 4054ab-4054ad call 4040b5 146->148 149 40549d-4054a6 call 405110 146->149 148->140 149->148 157 405368-40537f call 4040dc 150->157 158 40535a-405366 SendMessageA 150->158 151->150 159 4054d8-405504 CreatePopupMenu call 405f19 AppendMenuA 152->159 160 4055cf-4055d1 152->160 167 405381-405395 ShowWindow 157->167 168 4053b5-4053d6 GetDlgItem SendMessageA 157->168 158->157 165 405506-405516 GetWindowRect 159->165 166 405519-40552f TrackPopupMenu 159->166 160->154 165->166 166->160 170 405535-40554f 166->170 171 4053a4 167->171 172 405397-4053a2 ShowWindow 167->172 168->160 169 4053dc-4053f4 SendMessageA * 2 168->169 169->160 173 405554-40556f SendMessageA 170->173 174 4053aa-4053b0 call 404111 171->174 172->174 173->173 175 405571-405591 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 173->175 174->168 177 405593-4055b3 SendMessageA 175->177 177->177 178 4055b5-4055c9 GlobalUnlock SetClipboardData CloseClipboard 177->178 178->160
                              APIs
                              • GetDlgItem.USER32(?,00000403), ref: 004052AD
                              • GetDlgItem.USER32(?,000003EE), ref: 004052BC
                              • GetClientRect.USER32(?,?), ref: 004052F9
                              • GetSystemMetrics.USER32(00000002), ref: 00405300
                              • SendMessageA.USER32(?,0000101B,00000000,?), ref: 00405321
                              • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405332
                              • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405345
                              • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405353
                              • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405366
                              • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405388
                              • ShowWindow.USER32(?,00000008), ref: 0040539C
                              • GetDlgItem.USER32(?,000003EC), ref: 004053BD
                              • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004053CD
                              • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004053E6
                              • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004053F2
                              • GetDlgItem.USER32(?,000003F8), ref: 004052CB
                                • Part of subcall function 00404111: SendMessageA.USER32(00000028,?,00000001,00403F42), ref: 0040411F
                              • GetDlgItem.USER32(?,000003EC), ref: 0040540E
                              • CreateThread.KERNELBASE(00000000,00000000,Function_000051E2,00000000), ref: 0040541C
                              • CloseHandle.KERNELBASE(00000000), ref: 00405423
                              • ShowWindow.USER32(00000000), ref: 00405446
                              • ShowWindow.USER32(?,00000008), ref: 0040544D
                              • ShowWindow.USER32(00000008), ref: 00405493
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004054C7
                              • CreatePopupMenu.USER32 ref: 004054D8
                              • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004054ED
                              • GetWindowRect.USER32(?,000000FF), ref: 0040550D
                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405526
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405562
                              • OpenClipboard.USER32(00000000), ref: 00405572
                              • EmptyClipboard.USER32 ref: 00405578
                              • GlobalAlloc.KERNEL32(00000042,?), ref: 00405581
                              • GlobalLock.KERNEL32(00000000), ref: 0040558B
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 0040559F
                              • GlobalUnlock.KERNEL32(00000000), ref: 004055B8
                              • SetClipboardData.USER32(00000001,00000000), ref: 004055C3
                              • CloseClipboard.USER32 ref: 004055C9
                              Strings
                              • indfrselsartikel Setup: Installing, xrefs: 0040553E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                              • String ID: indfrselsartikel Setup: Installing
                              • API String ID: 590372296-1446409084
                              • Opcode ID: bd05f583e1d858ca64e0ebc0ccb0213cdf64d916f2755f86f6f3f2ff8d205a57
                              • Instruction ID: e0dc4773203ce2f112709eab9a11bfc184f4d069c8d5349c47d5b80479340f4b
                              • Opcode Fuzzy Hash: bd05f583e1d858ca64e0ebc0ccb0213cdf64d916f2755f86f6f3f2ff8d205a57
                              • Instruction Fuzzy Hash: 10A148B1900208BFDF119F60DD89AAE7BB9FB48355F00407AFA01B61A0C7B55E51DF69

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 427 405f19-405f24 428 405f26-405f35 427->428 429 405f37-405f4c 427->429 428->429 430 405f52-405f5d 429->430 431 40613f-406143 429->431 430->431 432 405f63-405f6a 430->432 433 406149-406153 431->433 434 405f6f-405f79 431->434 432->431 436 406155-406159 call 405ef7 433->436 437 40615e-40615f 433->437 434->433 435 405f7f-405f86 434->435 438 406132 435->438 439 405f8c-405fc1 435->439 436->437 441 406134-40613a 438->441 442 40613c-40613e 438->442 443 405fc7-405fd2 GetVersion 439->443 444 4060dc-4060df 439->444 441->431 442->431 445 405fd4-405fd8 443->445 446 405fec 443->446 447 4060e1-4060e4 444->447 448 40610f-406112 444->448 445->446 451 405fda-405fde 445->451 454 405ff3-405ffa 446->454 452 4060f4-406100 call 405ef7 447->452 453 4060e6-4060f2 call 405e55 447->453 449 406120-406130 lstrlenA 448->449 450 406114-40611b call 405f19 448->450 449->431 450->449 451->446 456 405fe0-405fe4 451->456 465 406105-40610b 452->465 453->465 458 405ffc-405ffe 454->458 459 405fff-406001 454->459 456->446 461 405fe6-405fea 456->461 458->459 463 406003-40601e call 405dde 459->463 464 40603a-40603d 459->464 461->454 470 406023-406026 463->470 468 40604d-406050 464->468 469 40603f-40604b GetSystemDirectoryA 464->469 465->449 467 40610d 465->467 471 4060d4-4060da call 406162 467->471 473 406052-406060 GetWindowsDirectoryA 468->473 474 4060ba-4060bc 468->474 472 4060be-4060c1 469->472 475 4060c3-4060c7 470->475 476 40602c-406035 call 405f19 470->476 471->449 472->471 472->475 473->474 474->472 477 406062-40606c 474->477 475->471 480 4060c9-4060cf lstrcatA 475->480 476->472 482 406086-40609c SHGetSpecialFolderLocation 477->482 483 40606e-406071 477->483 480->471 486 4060b7 482->486 487 40609e-4060b5 SHGetPathFromIDListA CoTaskMemFree 482->487 483->482 485 406073-40607a 483->485 488 406082-406084 485->488 486->474 487->472 487->486 488->472 488->482
                              APIs
                              • GetVersion.KERNEL32(?,Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,00000000,00405148,Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,00000000), ref: 00405FCA
                              • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 00406045
                              • GetWindowsDirectoryA.KERNEL32(Call,00000400), ref: 00406058
                              • SHGetSpecialFolderLocation.SHELL32(?,00000000), ref: 00406094
                              • SHGetPathFromIDListA.SHELL32(00000000,Call), ref: 004060A2
                              • CoTaskMemFree.OLE32(00000000), ref: 004060AD
                              • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004060CF
                              • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,00000000,00405148,Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,00000000), ref: 00406121
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                              • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                              • API String ID: 900638850-44911991
                              • Opcode ID: 91bdcf4667245f18d3d7c7fe1ddc958c0af6ea5d13b0ad944f7f20b056a88a1b
                              • Instruction ID: 17f1afa1df4653d6aa239bb2462815deac18f6a32033811d9d8cd7bf3bfa2e02
                              • Opcode Fuzzy Hash: 91bdcf4667245f18d3d7c7fe1ddc958c0af6ea5d13b0ad944f7f20b056a88a1b
                              • Instruction Fuzzy Hash: 68613671A00111AEDF209F24CC84BBF3BA8EB45314F12813BE942BA2D1D77D4962DB5E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 489 405799-4057bf call 405a57 492 4057c1-4057d3 DeleteFileA 489->492 493 4057d8-4057df 489->493 494 405962-405966 492->494 495 4057e1-4057e3 493->495 496 4057f2-405802 call 405ef7 493->496 497 405910-405915 495->497 498 4057e9-4057ec 495->498 502 405811-405812 call 4059b0 496->502 503 405804-40580f lstrcatA 496->503 497->494 500 405917-40591a 497->500 498->496 498->497 504 405924-40592c call 4061fb 500->504 505 40591c-405922 500->505 506 405817-40581a 502->506 503->506 504->494 513 40592e-405942 call 405969 call 405751 504->513 505->494 509 405825-40582b lstrcatA 506->509 510 40581c-405823 506->510 512 405830-40584e lstrlenA FindFirstFileA 509->512 510->509 510->512 514 405854-40586b call 405994 512->514 515 405906-40590a 512->515 525 405944-405947 513->525 526 40595a-40595d call 405110 513->526 523 405876-405879 514->523 524 40586d-405871 514->524 515->497 517 40590c 515->517 517->497 528 40587b-405880 523->528 529 40588c-40589a call 405ef7 523->529 524->523 527 405873 524->527 525->505 531 405949-405958 call 405110 call 405db2 525->531 526->494 527->523 533 405882-405884 528->533 534 4058e5-4058f7 FindNextFileA 528->534 539 4058b1-4058bc call 405751 529->539 540 40589c-4058a4 529->540 531->494 533->529 538 405886-40588a 533->538 534->514 537 4058fd-405900 FindClose 534->537 537->515 538->529 538->534 549 4058dd-4058e0 call 405110 539->549 550 4058be-4058c1 539->550 540->534 542 4058a6-4058af call 405799 540->542 542->534 549->534 552 4058c3-4058d3 call 405110 call 405db2 550->552 553 4058d5-4058db 550->553 552->534 553->534
                              APIs
                              • DeleteFileA.KERNELBASE(?,?,75573410,75572EE0,00000000), ref: 004057C2
                              • lstrcatA.KERNEL32(00420D38,\*.*,00420D38,?,?,75573410,75572EE0,00000000), ref: 0040580A
                              • lstrcatA.KERNEL32(?,00409014,?,00420D38,?,?,75573410,75572EE0,00000000), ref: 0040582B
                              • lstrlenA.KERNEL32(?,?,00409014,?,00420D38,?,?,75573410,75572EE0,00000000), ref: 00405831
                              • FindFirstFileA.KERNELBASE(00420D38,?,?,?,00409014,?,00420D38,?,?,75573410,75572EE0,00000000), ref: 00405842
                              • FindNextFileA.KERNELBASE(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004058EF
                              • FindClose.KERNEL32(00000000), ref: 00405900
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                              • String ID: "C:\Users\user\Desktop\ODjwCjQBAP.exe"$8B$\*.*
                              • API String ID: 2035342205-1966537797
                              • Opcode ID: cfe99db393b1e675a819fff40dd9f0895a0815041bfdd0424623d1025dab5344
                              • Instruction ID: 8d03ba635bdf6d692437a4f2007131f6bbb84493a6188974bf12e3b4770be62e
                              • Opcode Fuzzy Hash: cfe99db393b1e675a819fff40dd9f0895a0815041bfdd0424623d1025dab5344
                              • Instruction Fuzzy Hash: 3E51AF71900A14EADF217B618C49BAF7AB8DF42724F14807BF850762D2D73C8992DE6D
                              APIs
                              • CoCreateInstance.OLE32(00407408,?,00000001,004073F8,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040214C
                              • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,004073F8,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004021F8
                              Strings
                              • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Brudgomme, xrefs: 0040218C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: ByteCharCreateInstanceMultiWide
                              • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Brudgomme
                              • API String ID: 123533781-4191831094
                              • Opcode ID: f23b3e070ea651c53f475647926b923c96bbc9cd24cd4c0868bd15dc3a0dd132
                              • Instruction ID: 13bc962cd5a1e0844f107594f4b7cb0b9a1bacf2988c66099de3663f442cfceb
                              • Opcode Fuzzy Hash: f23b3e070ea651c53f475647926b923c96bbc9cd24cd4c0868bd15dc3a0dd132
                              • Instruction Fuzzy Hash: 5A5107B5E00208BFCB00DFE4C988A9DBBB6EF48314F2445AAF515FB2D1DA799941CB54
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e78d97ed3c230bfcbd776d1da080b0f670dc0f56a58da5166f9bdd2003ef958d
                              • Instruction ID: 395035d2fa7d2bfd2a07fc8d885f942395c55dc3dc65efbd6096f39d55049081
                              • Opcode Fuzzy Hash: e78d97ed3c230bfcbd776d1da080b0f670dc0f56a58da5166f9bdd2003ef958d
                              • Instruction Fuzzy Hash: 18F16671D00229CBCF28CFA8C8946ADBBB1FF44305F25856ED856BB281D7385A96DF44
                              APIs
                              • FindFirstFileA.KERNELBASE(75573410,00421580,C:\,00405A9A,C:\,C:\,00000000,C:\,C:\,75573410,?,75572EE0,004057B9,?,75573410,75572EE0), ref: 00406206
                              • FindClose.KERNEL32(00000000), ref: 00406212
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID: C:\
                              • API String ID: 2295610775-3404278061
                              • Opcode ID: f9303f41664d55177506eb3caad4b25aa18344ea0c32c7844788a1b00efad07c
                              • Instruction ID: 9db82b8fa8063fa17328456ed946e1162a1eeecbf7bffbc6415ee5c88b4ce2a6
                              • Opcode Fuzzy Hash: f9303f41664d55177506eb3caad4b25aa18344ea0c32c7844788a1b00efad07c
                              • Instruction Fuzzy Hash: 6FD0133555D02057C30027746C0C44779545F653307124B77F456F52F0D3345C7245DD
                              APIs
                              • FindFirstFileA.KERNELBASE(00000000,?,00000002), ref: 0040271A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: FileFindFirst
                              • String ID:
                              • API String ID: 1974802433-0
                              • Opcode ID: e9e1605c35cf92ad64c5223491071bd3b38123b796805ea0b055523b80a06de9
                              • Instruction ID: 73f39e672a50c1adebb7c94b7850a11d736dff73d217dd7b8340578855458d28
                              • Opcode Fuzzy Hash: e9e1605c35cf92ad64c5223491071bd3b38123b796805ea0b055523b80a06de9
                              • Instruction Fuzzy Hash: 2CF02772604004AAC700EB6499089EEB778DB15324F60007BF180B20C0C7B84A429B2A

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 179 403c09-403c1b 180 403c21-403c27 179->180 181 403d5c-403d6b 179->181 180->181 182 403c2d-403c36 180->182 183 403dba-403dcf 181->183 184 403d6d-403db5 GetDlgItem * 2 call 4040dc SetClassLongA call 40140b 181->184 185 403c38-403c45 SetWindowPos 182->185 186 403c4b-403c4e 182->186 188 403dd1-403dd4 183->188 189 403e0f-403e14 call 404128 183->189 184->183 185->186 190 403c50-403c62 ShowWindow 186->190 191 403c68-403c6e 186->191 193 403dd6-403de1 call 401389 188->193 194 403e07-403e09 188->194 196 403e19-403e34 189->196 190->191 197 403c70-403c85 DestroyWindow 191->197 198 403c8a-403c8d 191->198 193->194 216 403de3-403e02 SendMessageA 193->216 194->189 201 4040a9 194->201 202 403e36-403e38 call 40140b 196->202 203 403e3d-403e43 196->203 205 404086-40408c 197->205 207 403ca0-403ca6 198->207 208 403c8f-403c9b SetWindowLongA 198->208 204 4040ab-4040b2 201->204 202->203 212 404067-404080 DestroyWindow EndDialog 203->212 213 403e49-403e54 203->213 205->201 210 40408e-404094 205->210 214 403d49-403d57 call 404143 207->214 215 403cac-403cbd GetDlgItem 207->215 208->204 210->201 217 404096-40409f ShowWindow 210->217 212->205 213->212 218 403e5a-403ea7 call 405f19 call 4040dc * 3 GetDlgItem 213->218 214->204 219 403cdc-403cdf 215->219 220 403cbf-403cd6 SendMessageA IsWindowEnabled 215->220 216->204 217->201 249 403eb1-403eed ShowWindow KiUserCallbackDispatcher call 4040fe EnableWindow 218->249 250 403ea9-403eae 218->250 224 403ce1-403ce2 219->224 225 403ce4-403ce7 219->225 220->201 220->219 227 403d12-403d17 call 4040b5 224->227 228 403cf5-403cfa 225->228 229 403ce9-403cef 225->229 227->214 230 403d30-403d43 SendMessageA 228->230 231 403cfc-403d02 228->231 229->230 234 403cf1-403cf3 229->234 230->214 235 403d04-403d0a call 40140b 231->235 236 403d19-403d22 call 40140b 231->236 234->227 245 403d10 235->245 236->214 246 403d24-403d2e 236->246 245->227 246->245 253 403ef2 249->253 254 403eef-403ef0 249->254 250->249 255 403ef4-403f22 GetSystemMenu EnableMenuItem SendMessageA 253->255 254->255 256 403f24-403f35 SendMessageA 255->256 257 403f37 255->257 258 403f3d-403f76 call 404111 call 405ef7 lstrlenA call 405f19 SetWindowTextA call 401389 256->258 257->258 258->196 267 403f7c-403f7e 258->267 267->196 268 403f84-403f88 267->268 269 403fa7-403fbb DestroyWindow 268->269 270 403f8a-403f90 268->270 269->205 272 403fc1-403fee CreateDialogParamA 269->272 270->201 271 403f96-403f9c 270->271 271->196 273 403fa2 271->273 272->205 274 403ff4-40404b call 4040dc GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 272->274 273->201 274->201 279 40404d-404060 ShowWindow call 404128 274->279 281 404065 279->281 281->205
                              APIs
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C45
                              • ShowWindow.USER32(?), ref: 00403C62
                              • DestroyWindow.USER32 ref: 00403C76
                              • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403C92
                              • GetDlgItem.USER32(?,?), ref: 00403CB3
                              • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403CC7
                              • IsWindowEnabled.USER32(00000000), ref: 00403CCE
                              • GetDlgItem.USER32(?,00000001), ref: 00403D7C
                              • GetDlgItem.USER32(?,00000002), ref: 00403D86
                              • SetClassLongA.USER32(?,000000F2,?), ref: 00403DA0
                              • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403DF1
                              • GetDlgItem.USER32(?,00000003), ref: 00403E97
                              • ShowWindow.USER32(00000000,?), ref: 00403EB8
                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403ECA
                              • EnableWindow.USER32(?,?), ref: 00403EE5
                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403EFB
                              • EnableMenuItem.USER32(00000000), ref: 00403F02
                              • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403F1A
                              • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403F2D
                              • lstrlenA.KERNEL32(indfrselsartikel Setup: Installing,?,indfrselsartikel Setup: Installing,00422F20), ref: 00403F56
                              • SetWindowTextA.USER32(?,indfrselsartikel Setup: Installing), ref: 00403F65
                              • ShowWindow.USER32(?,0000000A), ref: 00404099
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                              • String ID: indfrselsartikel Setup: Installing
                              • API String ID: 3282139019-1446409084
                              • Opcode ID: bcb4864de90c51be376c5c7d5e0fb192880a71d4046b15d718494db90bb2b626
                              • Instruction ID: 2eb83949b6bd8974722fa043abbaf2d62199bae10e2b8edc7fb886fd11b27e7e
                              • Opcode Fuzzy Hash: bcb4864de90c51be376c5c7d5e0fb192880a71d4046b15d718494db90bb2b626
                              • Instruction Fuzzy Hash: 3EC1F2B1604201BBDB20AF61EE84E2B3ABCFB84305F51053EF611B11E1C7799842EB5E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 282 403877-40388f call 406290 285 403891-4038a1 call 405e55 282->285 286 4038a3-4038d4 call 405dde 282->286 293 4038f7-403920 call 403b3c call 405a57 285->293 291 4038d6-4038e7 call 405dde 286->291 292 4038ec-4038f2 lstrcatA 286->292 291->292 292->293 300 403926-40392b 293->300 301 4039a7-4039af call 405a57 293->301 300->301 302 40392d-403945 call 405dde 300->302 307 4039b1-4039b8 call 405f19 301->307 308 4039bd-4039e2 LoadImageA 301->308 306 40394a-403951 302->306 306->301 309 403953-403955 306->309 307->308 311 403a63-403a6b call 40140b 308->311 312 4039e4-403a14 RegisterClassA 308->312 314 403966-403972 lstrlenA 309->314 315 403957-403964 call 405994 309->315 324 403a75-403a80 call 403b3c 311->324 325 403a6d-403a70 311->325 316 403b32 312->316 317 403a1a-403a5e SystemParametersInfoA CreateWindowExA 312->317 321 403974-403982 lstrcmpiA 314->321 322 40399a-4039a2 call 405969 call 405ef7 314->322 315->314 320 403b34-403b3b 316->320 317->311 321->322 323 403984-40398e GetFileAttributesA 321->323 322->301 328 403990-403992 323->328 329 403994-403995 call 4059b0 323->329 335 403a86-403aa0 ShowWindow call 406222 324->335 336 403b09-403b0a call 4051e2 324->336 325->320 328->322 328->329 329->322 343 403aa2-403aa7 call 406222 335->343 344 403aac-403abe GetClassInfoA 335->344 339 403b0f-403b11 336->339 341 403b13-403b19 339->341 342 403b2b-403b2d call 40140b 339->342 341->325 345 403b1f-403b26 call 40140b 341->345 342->316 343->344 348 403ac0-403ad0 GetClassInfoA RegisterClassA 344->348 349 403ad6-403af9 DialogBoxParamA call 40140b 344->349 345->325 348->349 352 403afe-403b07 call 4037c7 349->352 352->320
                              APIs
                                • Part of subcall function 00406290: GetModuleHandleA.KERNEL32(?,?,?,00403329,00000009), ref: 004062A2
                                • Part of subcall function 00406290: GetProcAddress.KERNEL32(00000000,?), ref: 004062BD
                              • lstrcatA.KERNEL32(1033,indfrselsartikel Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,indfrselsartikel Setup: Installing,00000000,00000002,75573410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\ODjwCjQBAP.exe",00000000), ref: 004038F2
                              • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously,1033,indfrselsartikel Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,indfrselsartikel Setup: Installing,00000000,00000002,75573410), ref: 00403967
                              • lstrcmpiA.KERNEL32(?,.exe), ref: 0040397A
                              • GetFileAttributesA.KERNEL32(Call), ref: 00403985
                              • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously), ref: 004039CE
                                • Part of subcall function 00405E55: wsprintfA.USER32 ref: 00405E62
                              • RegisterClassA.USER32(00422EC0), ref: 00403A0B
                              • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403A23
                              • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403A58
                              • ShowWindow.USER32(00000005,00000000), ref: 00403A8E
                              • GetClassInfoA.USER32(00000000,RichEdit20A,00422EC0), ref: 00403ABA
                              • GetClassInfoA.USER32(00000000,RichEdit,00422EC0), ref: 00403AC7
                              • RegisterClassA.USER32(00422EC0), ref: 00403AD0
                              • DialogBoxParamA.USER32(?,00000000,00403C09,00000000), ref: 00403AEF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                              • String ID: "C:\Users\user\Desktop\ODjwCjQBAP.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously$C:\Users\user\AppData\Local\Temp\$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$indfrselsartikel Setup: Installing
                              • API String ID: 1975747703-3050263206
                              • Opcode ID: b5acaa8937ced472a66d3687a921226f39372a12dbbf564bd8eff0e0bc24d963
                              • Instruction ID: 29345e8072be8e75dc90901d6125d60d13300850aec60374d900494af90ecb47
                              • Opcode Fuzzy Hash: b5acaa8937ced472a66d3687a921226f39372a12dbbf564bd8eff0e0bc24d963
                              • Instruction Fuzzy Hash: 8161A4B06442407ED620AF65AD45F373A6CEB8474AF40447FF945B22E2C6BCAD029A3D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 356 402d4a-402d98 GetTickCount GetModuleFileNameA call 405b6a 359 402da4-402dd2 call 405ef7 call 4059b0 call 405ef7 GetFileSize 356->359 360 402d9a-402d9f 356->360 368 402ec2-402ed0 call 402cab 359->368 369 402dd8-402def 359->369 361 402fe9-402fed 360->361 375 402fa1-402fa6 368->375 376 402ed6-402ed9 368->376 371 402df1 369->371 372 402df3-402e00 call 403261 369->372 371->372 380 402e06-402e0c 372->380 381 402f5d-402f65 call 402cab 372->381 375->361 378 402f05-402f51 GlobalAlloc call 406373 call 405b99 CreateFileA 376->378 379 402edb-402ef3 call 403277 call 403261 376->379 406 402f53-402f58 378->406 407 402f67-402f97 call 403277 call 402ff0 378->407 379->375 404 402ef9-402eff 379->404 385 402e8c-402e90 380->385 386 402e0e-402e26 call 405b25 380->386 381->375 389 402e92-402e98 call 402cab 385->389 390 402e99-402e9f 385->390 386->390 403 402e28-402e2f 386->403 389->390 395 402ea1-402eaf call 406305 390->395 396 402eb2-402ebc 390->396 395->396 396->368 396->369 403->390 408 402e31-402e38 403->408 404->375 404->378 406->361 416 402f9c-402f9f 407->416 408->390 410 402e3a-402e41 408->410 410->390 411 402e43-402e4a 410->411 411->390 413 402e4c-402e6c 411->413 413->375 415 402e72-402e76 413->415 417 402e78-402e7c 415->417 418 402e7e-402e86 415->418 416->375 419 402fa8-402fb9 416->419 417->368 417->418 418->390 420 402e88-402e8a 418->420 421 402fc1-402fc6 419->421 422 402fbb 419->422 420->390 423 402fc7-402fcd 421->423 422->421 423->423 424 402fcf-402fe7 call 405b25 423->424 424->361
                              APIs
                              • GetTickCount.KERNEL32 ref: 00402D5E
                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\ODjwCjQBAP.exe,00000400), ref: 00402D7A
                                • Part of subcall function 00405B6A: GetFileAttributesA.KERNELBASE(00000003,00402D8D,C:\Users\user\Desktop\ODjwCjQBAP.exe,80000000,00000003), ref: 00405B6E
                                • Part of subcall function 00405B6A: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B90
                              • GetFileSize.KERNEL32(00000000,00000000,0042B000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\ODjwCjQBAP.exe,C:\Users\user\Desktop\ODjwCjQBAP.exe,80000000,00000003), ref: 00402DC3
                              • GlobalAlloc.KERNELBASE(00000040,00409130), ref: 00402F0A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                              • String ID: "C:\Users\user\Desktop\ODjwCjQBAP.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\ODjwCjQBAP.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft$z(
                              • API String ID: 2803837635-3853291294
                              • Opcode ID: e5ab56cf196d26c18991739aeee88d59d7819f5e2225516add2df55f48501880
                              • Instruction ID: 1e54d23c6bd4663b885b54a46d63d50a2b02afe17d1d0705d7bda66adc4b1b0c
                              • Opcode Fuzzy Hash: e5ab56cf196d26c18991739aeee88d59d7819f5e2225516add2df55f48501880
                              • Instruction Fuzzy Hash: 6661E5B1A40215ABDF20AF64DE89A9E76B8EB04355F11413FF904B72C1C7BC9D418B9C

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 558 401759-40177c call 402ace call 4059d6 563 401786-401798 call 405ef7 call 405969 lstrcatA 558->563 564 40177e-401784 call 405ef7 558->564 569 40179d-4017a3 call 406162 563->569 564->569 574 4017a8-4017ac 569->574 575 4017ae-4017b8 call 4061fb 574->575 576 4017df-4017e2 574->576 583 4017ca-4017dc 575->583 584 4017ba-4017c8 CompareFileTime 575->584 578 4017e4-4017e5 call 405b45 576->578 579 4017ea-401806 call 405b6a 576->579 578->579 586 401808-40180b 579->586 587 40187e-4018a7 call 405110 call 402ff0 579->587 583->576 584->583 589 401860-40186a call 405110 586->589 590 40180d-40184f call 405ef7 * 2 call 405f19 call 405ef7 call 4056ed 586->590 600 4018a9-4018ad 587->600 601 4018af-4018bb SetFileTime 587->601 602 401873-401879 589->602 590->574 622 401855-401856 590->622 600->601 604 4018c1-4018cc CloseHandle 600->604 601->604 605 402967 602->605 607 4018d2-4018d5 604->607 608 40295e-402961 604->608 609 402969-40296d 605->609 611 4018d7-4018e8 call 405f19 lstrcatA 607->611 612 4018ea-4018ed call 405f19 607->612 608->605 618 4018f2-4022e2 call 4056ed 611->618 612->618 618->609 622->602 624 401858-401859 622->624 624->589
                              APIs
                              • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Brudgomme,00000000,00000000,00000031), ref: 00401798
                              • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Brudgomme,00000000,00000000,00000031), ref: 004017C2
                                • Part of subcall function 00405EF7: lstrcpynA.KERNEL32(?,?,00000400,0040336D,00422F20,NSIS Error), ref: 00405F04
                                • Part of subcall function 00405110: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000,?), ref: 00405149
                                • Part of subcall function 00405110: lstrlenA.KERNEL32(00402D22,Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000), ref: 00405159
                                • Part of subcall function 00405110: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,00402D22,00402D22,Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,00000000,00000000,00000000), ref: 0040516C
                                • Part of subcall function 00405110: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll), ref: 0040517E
                                • Part of subcall function 00405110: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A4
                                • Part of subcall function 00405110: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051BE
                                • Part of subcall function 00405110: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051CC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                              • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Brudgomme$C:\Users\user\AppData\Local\Temp\nsx95D2.tmp$C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll$Call
                              • API String ID: 1941528284-3522070890
                              • Opcode ID: f1777878cc107186975007c34ec6e0b6c00b7ce99c1c8040aed14bca133d0caf
                              • Instruction ID: 1ba5c428860e61568eef0a4ccac71dac967fbf7ecb8295bcfefdc03a30224d69
                              • Opcode Fuzzy Hash: f1777878cc107186975007c34ec6e0b6c00b7ce99c1c8040aed14bca133d0caf
                              • Instruction Fuzzy Hash: 2341F471A04515BACF107BB5DC45EAF3678EF41328B20823BF021B11E2DA3C8A419FAD

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 625 405110-405125 626 4051db-4051df 625->626 627 40512b-40513d 625->627 628 405148-405154 lstrlenA 627->628 629 40513f-405143 call 405f19 627->629 631 405171-405175 628->631 632 405156-405166 lstrlenA 628->632 629->628 634 405184-405188 631->634 635 405177-40517e SetWindowTextA 631->635 632->626 633 405168-40516c lstrcatA 632->633 633->631 636 40518a-4051cc SendMessageA * 3 634->636 637 4051ce-4051d0 634->637 635->634 636->637 637->626 638 4051d2-4051d5 637->638 638->626
                              APIs
                              • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000,?), ref: 00405149
                              • lstrlenA.KERNEL32(00402D22,Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000), ref: 00405159
                              • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,00402D22,00402D22,Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,00000000,00000000,00000000), ref: 0040516C
                              • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll), ref: 0040517E
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A4
                              • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051BE
                              • SendMessageA.USER32(?,00001013,?,00000000), ref: 004051CC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                              • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll
                              • API String ID: 2531174081-3706143473
                              • Opcode ID: 1646e66f1100ef219ca1350417871fd30607a5d42d26b8f3d60eba681ba6f46d
                              • Instruction ID: 38fa31381a166635c2069e030e34d3db0945d62c2eda65f80c6bd2e149c96a35
                              • Opcode Fuzzy Hash: 1646e66f1100ef219ca1350417871fd30607a5d42d26b8f3d60eba681ba6f46d
                              • Instruction Fuzzy Hash: FD215C71E00518BBDF119FA5CD80ADFBFB9EB04354F14807AF904AA291C7799A41CFA8

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 639 4055d6-405621 CreateDirectoryA 640 405623-405625 639->640 641 405627-405634 GetLastError 639->641 642 40564e-405650 640->642 641->642 643 405636-40564a SetFileSecurityA 641->643 643->640 644 40564c GetLastError 643->644 644->642
                              APIs
                              • CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405619
                              • GetLastError.KERNEL32 ref: 0040562D
                              • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 00405642
                              • GetLastError.KERNEL32 ref: 0040564C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: ErrorLast$CreateDirectoryFileSecurity
                              • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$ds@$ts@
                              • API String ID: 3449924974-4250707527
                              • Opcode ID: f10b22bb5142ab39e3e91bc7df170e02474760785f1b3b99a39c7e09e389b4b4
                              • Instruction ID: f6395dc840433d181f75b3fc8fae80690a43e09e82cbb082af9cf45b84ce1534
                              • Opcode Fuzzy Hash: f10b22bb5142ab39e3e91bc7df170e02474760785f1b3b99a39c7e09e389b4b4
                              • Instruction Fuzzy Hash: 82010871D04259EAEF119FA0DC44BEFBFB8EB14314F008576D908B6280D779A604CFAA

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 645 406222-406242 GetSystemDirectoryA 646 406244 645->646 647 406246-406248 645->647 646->647 648 406258-40625a 647->648 649 40624a-406252 647->649 651 40625b-40628d wsprintfA LoadLibraryExA 648->651 649->648 650 406254-406256 649->650 650->651
                              APIs
                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00406239
                              • wsprintfA.USER32 ref: 00406272
                              • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 00406286
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: DirectoryLibraryLoadSystemwsprintf
                              • String ID: %s%s.dll$UXTHEME$\
                              • API String ID: 2200240437-4240819195
                              • Opcode ID: c7ba92785c192ffb77ecdfb90d0fa47c7b7783556fece6129122b9a6395f8fae
                              • Instruction ID: 4eb1d724573375327ef03b870ab6fb06d37159ba94d5fa14c1e1425601a81350
                              • Opcode Fuzzy Hash: c7ba92785c192ffb77ecdfb90d0fa47c7b7783556fece6129122b9a6395f8fae
                              • Instruction Fuzzy Hash: A2F0FC3090011AA7DB24B768DC0DFEB365CAB08305F1401BAA546E11D1D578F9258B69

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 652 4023d3-402419 call 402bc3 call 402ace * 2 RegCreateKeyExA 659 40295e-40296d 652->659 660 40241f-402427 652->660 661 402437-40243a 660->661 662 402429-402436 call 402ace lstrlenA 660->662 666 40243c-40244d call 402aac 661->666 667 40244e-402451 661->667 662->661 666->667 670 402462-402476 RegSetValueExA 667->670 671 402453-40245d call 402ff0 667->671 673 402478 670->673 674 40247b-402555 RegCloseKey 670->674 671->670 673->674 674->659 677 402729-402730 674->677 677->659
                              APIs
                              • RegCreateKeyExA.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402411
                              • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsx95D2.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 00402431
                              • RegSetValueExA.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsx95D2.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040246E
                              • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsx95D2.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040254F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: CloseCreateValuelstrlen
                              • String ID: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp
                              • API String ID: 1356686001-3649263006
                              • Opcode ID: 532cf4714589016526744554cc58b87e9890b833549d6e086e2f56b221f18e11
                              • Instruction ID: 45e6817f5ac0ad5077c8573445b5e51b6f54d3a00a8772886ac111494e5e57ea
                              • Opcode Fuzzy Hash: 532cf4714589016526744554cc58b87e9890b833549d6e086e2f56b221f18e11
                              • Instruction Fuzzy Hash: B52181B1E00109BEEB10EFA4DE49EAF7BB8EB54358F20403AF505B61D1D6B95D019B28

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 678 405b99-405ba3 679 405ba4-405bcf GetTickCount GetTempFileNameA 678->679 680 405bd1-405bd3 679->680 681 405bde-405be0 679->681 680->679 682 405bd5 680->682 683 405bd8-405bdb 681->683 682->683
                              APIs
                              • GetTickCount.KERNEL32 ref: 00405BAD
                              • GetTempFileNameA.KERNELBASE(?,?,00000000,?), ref: 00405BC7
                              Strings
                              • nsa, xrefs: 00405BA4
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B9C
                              • "C:\Users\user\Desktop\ODjwCjQBAP.exe", xrefs: 00405B99
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: CountFileNameTempTick
                              • String ID: "C:\Users\user\Desktop\ODjwCjQBAP.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                              • API String ID: 1716503409-2833922381
                              • Opcode ID: fefc0482c854070ed442c91c2c9b831f833a608d20a08577fe9f9df7fb59a314
                              • Instruction ID: bfd989d901498d13fd43eebbd57bf0dae5b4b0e38faf5f28c0e1a6b78de2ea97
                              • Opcode Fuzzy Hash: fefc0482c854070ed442c91c2c9b831f833a608d20a08577fe9f9df7fb59a314
                              • Instruction Fuzzy Hash: B7F082367086046BEB108F55EC04B9B7BACDF91750F10C03BFA08DA1D0E6B5F9548B59

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 684 402b0e-402b37 RegOpenKeyExA 685 402ba2-402ba6 684->685 686 402b39-402b44 684->686 687 402b5f-402b6f RegEnumKeyA 686->687 688 402b71-402b83 RegCloseKey call 406290 687->688 689 402b46-402b49 687->689 697 402b85-402b94 688->697 698 402ba9-402baf 688->698 691 402b96-402b99 RegCloseKey 689->691 692 402b4b-402b5d call 402b0e 689->692 694 402b9f-402ba1 691->694 692->687 692->688 694->685 697->685 698->694 699 402bb1-402bbf RegDeleteKeyA 698->699 699->694 701 402bc1 699->701 701->685
                              APIs
                              • RegOpenKeyExA.KERNELBASE(?,?,00000000,?,?), ref: 00402B2F
                              • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402B6B
                              • RegCloseKey.ADVAPI32(?), ref: 00402B74
                              • RegCloseKey.ADVAPI32(?), ref: 00402B99
                              • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402BB7
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Close$DeleteEnumOpen
                              • String ID:
                              • API String ID: 1912718029-0
                              • Opcode ID: 1b6bc3f1deefa661c1c70c6fa14cacfade3144c59ce8f26d4f2651a72c65fdc8
                              • Instruction ID: cbb66f3b7e8ae2888f759c75a40f8dd5de3b5766fb854263a8955dc236021e84
                              • Opcode Fuzzy Hash: 1b6bc3f1deefa661c1c70c6fa14cacfade3144c59ce8f26d4f2651a72c65fdc8
                              • Instruction Fuzzy Hash: 39117C71A00108FFDF11AF90DE89DAA3B7DEB54345F004076FA05F10A0D378AE51AB69

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 702 100016bd-100016f9 call 10001a5d 706 1000180a-1000180c 702->706 707 100016ff-10001703 702->707 708 10001705-1000170b call 100021b0 707->708 709 1000170c-10001719 call 100021fa 707->709 708->709 714 10001749-10001750 709->714 715 1000171b-10001720 709->715 716 10001770-10001774 714->716 717 10001752-1000176e call 100023da call 10001559 call 10001266 GlobalFree 714->717 718 10001722-10001723 715->718 719 1000173b-1000173e 715->719 724 100017b2-100017b8 call 100023da 716->724 725 10001776-100017b0 call 10001559 call 100023da 716->725 742 100017b9-100017bd 717->742 722 10001725-10001726 718->722 723 1000172b-1000172c call 100027e8 718->723 719->714 720 10001740-10001741 call 10002aa3 719->720 734 10001746 720->734 730 10001733-10001739 call 10002589 722->730 731 10001728-10001729 722->731 737 10001731 723->737 724->742 725->742 741 10001748 730->741 731->714 731->723 734->741 737->734 741->714 745 100017fa-10001801 742->745 746 100017bf-100017cd call 100023a0 742->746 745->706 748 10001803-10001804 GlobalFree 745->748 752 100017e5-100017ec 746->752 753 100017cf-100017d2 746->753 748->706 752->745 755 100017ee-100017f9 call 100014e2 752->755 753->752 754 100017d4-100017dc 753->754 754->752 757 100017de-100017df FreeLibrary 754->757 755->745 757->752
                              APIs
                                • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC4
                                • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC9
                                • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CCE
                              • GlobalFree.KERNEL32(00000000), ref: 10001768
                              • FreeLibrary.KERNEL32(?), ref: 100017DF
                              • GlobalFree.KERNEL32(00000000), ref: 10001804
                                • Part of subcall function 100021B0: GlobalAlloc.KERNEL32(00000040,7D8BEC45), ref: 100021E2
                                • Part of subcall function 10002589: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,10001739,00000000), ref: 100025FB
                                • Part of subcall function 10001559: lstrcpyA.KERNEL32(00000000,?,00000000,10001695,00000000), ref: 10001572
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1780204384.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.1780179855.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.1780263017.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.1780284598.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc$Librarylstrcpy
                              • String ID:
                              • API String ID: 1791698881-3916222277
                              • Opcode ID: 676a92eb632660267f66b66a0e8313324764f953d5bc12d8e45a65eb3bf091b8
                              • Instruction ID: 7bd52774c71d274dd6e07030a7ef65efb9a892d3f5f2eddd47f658e3267813e4
                              • Opcode Fuzzy Hash: 676a92eb632660267f66b66a0e8313324764f953d5bc12d8e45a65eb3bf091b8
                              • Instruction Fuzzy Hash: B5319C79408205DAFB41DF649CC5BCA37ECFF042D5F018465FA0A9A09EDF78A8858B60
                              APIs
                              • GetTickCount.KERNEL32 ref: 0040310C
                                • Part of subcall function 00403277: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402F75,?), ref: 00403285
                              • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,00403022,00000004,00000000,00000000,?,?,00402F9C,000000FF,00000000,00000000,00409130,?), ref: 0040313F
                              • SetFilePointer.KERNELBASE(0028EF7A,00000000,00000000,004128D8,00004000,?,00000000,00403022,00000004,00000000,00000000,?,?,00402F9C,000000FF,00000000), ref: 0040323A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: FilePointer$CountTick
                              • String ID: z(
                              • API String ID: 1092082344-1367383871
                              • Opcode ID: f6133f0060067ae216a0a077ebe86ad3920cfc852d280aeddc091818d184f87e
                              • Instruction ID: b8bc3f79dcbb40427391aad23e9a2a3a4e055ade3e5059820f7b6748c1a5a64e
                              • Opcode Fuzzy Hash: f6133f0060067ae216a0a077ebe86ad3920cfc852d280aeddc091818d184f87e
                              • Instruction Fuzzy Hash: 3131A2B29042109BDB10BF29EE8086A3BECF754756715823FE501B22E0C738DD52DB5E
                              APIs
                              • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C74
                              • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C8C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: MessageSend$Timeout
                              • String ID: !
                              • API String ID: 1777923405-2657877971
                              • Opcode ID: ddb3ae1d6e1b3602016cf6e102a5b51033461e7a55de6e6a3b1605d6dd40c2f8
                              • Instruction ID: 023f80fe09a274ffd38664002148efa248b1b49841e283c842910b226ff12a9e
                              • Opcode Fuzzy Hash: ddb3ae1d6e1b3602016cf6e102a5b51033461e7a55de6e6a3b1605d6dd40c2f8
                              • Instruction Fuzzy Hash: BA219171A44208BEEB15EFA4DA46AED7FB1EF84314F24403EF101B61D1DA7886408B28
                              APIs
                              • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 0040202A
                                • Part of subcall function 00405110: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000,?), ref: 00405149
                                • Part of subcall function 00405110: lstrlenA.KERNEL32(00402D22,Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000), ref: 00405159
                                • Part of subcall function 00405110: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,00402D22,00402D22,Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,00000000,00000000,00000000), ref: 0040516C
                                • Part of subcall function 00405110: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll), ref: 0040517E
                                • Part of subcall function 00405110: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A4
                                • Part of subcall function 00405110: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051BE
                                • Part of subcall function 00405110: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051CC
                              • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 0040203A
                              • GetProcAddress.KERNEL32(00000000,?), ref: 0040204A
                              • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 004020B4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                              • String ID:
                              • API String ID: 2987980305-0
                              • Opcode ID: 725aac035963670df89eafb1b7d16b4a342722268493254e79787a1b1d8c7f06
                              • Instruction ID: 7d08e1e337802b2334af88e0c199d29f708e40c37bf94ee781fb5d0f0b1c297d
                              • Opcode Fuzzy Hash: 725aac035963670df89eafb1b7d16b4a342722268493254e79787a1b1d8c7f06
                              • Instruction Fuzzy Hash: 7B219571E00225F7DB207FA48E49A6E7A74AB44354F20417BF601B22D1D6BE4A42965E
                              APIs
                              • SetFilePointer.KERNELBASE(00409130,00000000,00000000,00000000,00000000,?,?,00402F9C,000000FF,00000000,00000000,00409130,?), ref: 00403015
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: FilePointer
                              • String ID: z(
                              • API String ID: 973152223-1367383871
                              • Opcode ID: a1130b4f43b5ef58eef6a304646b232a08a6a9d0fa451b453d71d72267b47fb8
                              • Instruction ID: 0c39837240ac6e21a4d945e0ab2cbfd2cf40700f690e74d620895d0cf024726c
                              • Opcode Fuzzy Hash: a1130b4f43b5ef58eef6a304646b232a08a6a9d0fa451b453d71d72267b47fb8
                              • Instruction Fuzzy Hash: 83316D30202219FFDB109F56EC85A9A3AACEB00355F20C53AF905E6195D339DE40EBA9
                              APIs
                                • Part of subcall function 00405A02: CharNextA.USER32(?,?,C:\,?,00405A6E,C:\,C:\,75573410,?,75572EE0,004057B9,?,75573410,75572EE0,00000000), ref: 00405A10
                                • Part of subcall function 00405A02: CharNextA.USER32(00000000), ref: 00405A15
                                • Part of subcall function 00405A02: CharNextA.USER32(00000000), ref: 00405A29
                              • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                                • Part of subcall function 004055D6: CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405619
                              • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Brudgomme,00000000,00000000,000000F0), ref: 0040163C
                              Strings
                              • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Brudgomme, xrefs: 00401631
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: CharNext$Directory$AttributesCreateCurrentFile
                              • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Brudgomme
                              • API String ID: 1892508949-4191831094
                              • Opcode ID: d3ecf39b463245ce7325277e5a84709cb344a9e2d097f8503a0b38c2d9d22c49
                              • Instruction ID: 08eb89b31b1746408a8977735749f07bd83b4a0adfeb71850534f1b020668021
                              • Opcode Fuzzy Hash: d3ecf39b463245ce7325277e5a84709cb344a9e2d097f8503a0b38c2d9d22c49
                              • Instruction Fuzzy Hash: AF110831608151EBDF317FA54D415BF26B0DA92324B28097FE4D1B22D2D53E4943AA7E
                              APIs
                                • Part of subcall function 00405EF7: lstrcpynA.KERNEL32(?,?,00000400,0040336D,00422F20,NSIS Error), ref: 00405F04
                                • Part of subcall function 00405A02: CharNextA.USER32(?,?,C:\,?,00405A6E,C:\,C:\,75573410,?,75572EE0,004057B9,?,75573410,75572EE0,00000000), ref: 00405A10
                                • Part of subcall function 00405A02: CharNextA.USER32(00000000), ref: 00405A15
                                • Part of subcall function 00405A02: CharNextA.USER32(00000000), ref: 00405A29
                              • lstrlenA.KERNEL32(C:\,00000000,C:\,C:\,75573410,?,75572EE0,004057B9,?,75573410,75572EE0,00000000), ref: 00405AAA
                              • GetFileAttributesA.KERNELBASE(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,75573410,?,75572EE0,004057B9,?,75573410,75572EE0), ref: 00405ABA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: CharNext$AttributesFilelstrcpynlstrlen
                              • String ID: C:\
                              • API String ID: 3248276644-3404278061
                              • Opcode ID: 0ef386635608f692f0e7c0f61560742430c47c7f4d5a656852c6bdb0725f2d70
                              • Instruction ID: e1d085c028a746cb3a9e1ce3b1c858eea9bd943bc63f8ca8d2e2b8bbc1a38a79
                              • Opcode Fuzzy Hash: 0ef386635608f692f0e7c0f61560742430c47c7f4d5a656852c6bdb0725f2d70
                              • Instruction Fuzzy Hash: 02F0C835305D6526C622233A5C89AAF5A54CE86324719073BF891B52D2DB3C89439D7E
                              APIs
                              • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00421538,Error launching installer), ref: 004056B1
                              • CloseHandle.KERNEL32(?), ref: 004056BE
                              Strings
                              • Error launching installer, xrefs: 0040569B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: CloseCreateHandleProcess
                              • String ID: Error launching installer
                              • API String ID: 3712363035-66219284
                              • Opcode ID: 8605fb0cc1bd08462260b177f6e223d0fe872a64a1cb3e3de70a479640e30f4e
                              • Instruction ID: a84e3f3112e4284354e87e930577f618970dfa48977d7da17d28cbc3385d6636
                              • Opcode Fuzzy Hash: 8605fb0cc1bd08462260b177f6e223d0fe872a64a1cb3e3de70a479640e30f4e
                              • Instruction Fuzzy Hash: 36E04FB0A002097FEB009B60EC05F7B7ABCE710204F808571BD01F2160D278A8008A78
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 813088101d1177fb169553b46c52c2ff17d2ea35d6802c76714b97bf352b3534
                              • Instruction ID: 2e33bf0a2efd24b19013112e0e3dc0c5d96cbb3b8ddfa3d6198f03b0ea5f4905
                              • Opcode Fuzzy Hash: 813088101d1177fb169553b46c52c2ff17d2ea35d6802c76714b97bf352b3534
                              • Instruction Fuzzy Hash: 38A14271E00229CBDF28CFA8C8447ADBBB1FF44305F15806AD856BB281D7789A96DF44
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 76287d30da9bd6127f444d76b1a2dea5d718215deeea3e4961f0482c034aff3f
                              • Instruction ID: b6fdc69984dd60fe5839cdbb69547f11a37967466e553f406be5e4f069ddcdf3
                              • Opcode Fuzzy Hash: 76287d30da9bd6127f444d76b1a2dea5d718215deeea3e4961f0482c034aff3f
                              • Instruction Fuzzy Hash: 06912371E00228CBDF28CF98C8547ADBBB1FF44305F15816AD856BB291C778AA96DF44
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9112cbabc6f4a79aea4e3429d0b79d6c933dfda102b28fdb5082a60d62602a4e
                              • Instruction ID: c7cee2028620334147dbeeecb81edbae78790ee6bd2d36d3aed28758d5738f0f
                              • Opcode Fuzzy Hash: 9112cbabc6f4a79aea4e3429d0b79d6c933dfda102b28fdb5082a60d62602a4e
                              • Instruction Fuzzy Hash: CF813471E00228DBDF24CFA8C844BADBBB1FF44305F25816AD856BB291D7389996DF14
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: db9708fb04e2e0ecb222d306fe81c02053fdbbf4ae968347cebcb7f9112ce6f9
                              • Instruction ID: 57d0a4a62e73b261e138738b2685f27b9a830e1577229771e06a9dcc4a08ef7a
                              • Opcode Fuzzy Hash: db9708fb04e2e0ecb222d306fe81c02053fdbbf4ae968347cebcb7f9112ce6f9
                              • Instruction Fuzzy Hash: DC816771E04228DBDF24CFA8C844BADBBB1FF44315F11816AD856BB280C7786996DF44
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 51b9571c4f2cef3f00a150e7480631ebf45f04a25ed8f4987f17413b8e50dd21
                              • Instruction ID: 7a0e56a60353855b6858f4e45cba095cd8fb81da81d2b3e1620468e36a0fecf5
                              • Opcode Fuzzy Hash: 51b9571c4f2cef3f00a150e7480631ebf45f04a25ed8f4987f17413b8e50dd21
                              • Instruction Fuzzy Hash: E2710371E00228DBDF28CFA8C844BADBBB1FF44305F15806AD856BB291D7389996DF54
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: cd56666480845857346ca32992c88f0ff24d6c501f81c377169dfb98ddf17ec5
                              • Instruction ID: 640397e2d056f1a05ee02a3664d9fcc147c5dfb75bdb54ac859d1c8af1b059c5
                              • Opcode Fuzzy Hash: cd56666480845857346ca32992c88f0ff24d6c501f81c377169dfb98ddf17ec5
                              • Instruction Fuzzy Hash: 7F712471E00228DBDF28CF98C844BADBBB1FF44305F15806AD856BB291C7789996DF48
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5b6ae2104ab0ec81b4e73fa48072ed289b5e7c7f1ead31899d3077504e5afad2
                              • Instruction ID: 45e0d9c6199636d87fa33ccb5d6651f7628d4ee42d5e4054af8bad143df77737
                              • Opcode Fuzzy Hash: 5b6ae2104ab0ec81b4e73fa48072ed289b5e7c7f1ead31899d3077504e5afad2
                              • Instruction Fuzzy Hash: D1714771E00228DBDF28CF98C844BADBBB1FF44305F15806AD956BB291C778AA56DF44
                              APIs
                                • Part of subcall function 004061FB: FindFirstFileA.KERNELBASE(75573410,00421580,C:\,00405A9A,C:\,C:\,00000000,C:\,C:\,75573410,?,75572EE0,004057B9,?,75573410,75572EE0), ref: 00406206
                                • Part of subcall function 004061FB: FindClose.KERNEL32(00000000), ref: 00406212
                              • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00402281
                              • lstrlenA.KERNEL32(00000000), ref: 0040228B
                              • SHFileOperationA.SHELL32(?,?,?,00000000), ref: 004022B3
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: FileFindlstrlen$CloseFirstOperation
                              • String ID:
                              • API String ID: 1486964399-0
                              • Opcode ID: 68b53b7b15cd5aa11021285071f00655329fa620989aceaac5983d704ca72be5
                              • Instruction ID: 0317ded50e63044e70734c05992738adc8c04a0539f45c02fec05e083cfe155c
                              • Opcode Fuzzy Hash: 68b53b7b15cd5aa11021285071f00655329fa620989aceaac5983d704ca72be5
                              • Instruction Fuzzy Hash: 15113071E14219AACB10EFF5DA49A9EBAB8AF44314F14447FB100FB2C2D6BDC5418B69
                              APIs
                                • Part of subcall function 00405110: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000,?), ref: 00405149
                                • Part of subcall function 00405110: lstrlenA.KERNEL32(00402D22,Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000), ref: 00405159
                                • Part of subcall function 00405110: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,00402D22,00402D22,Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,00000000,00000000,00000000), ref: 0040516C
                                • Part of subcall function 00405110: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll), ref: 0040517E
                                • Part of subcall function 00405110: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A4
                                • Part of subcall function 00405110: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051BE
                                • Part of subcall function 00405110: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051CC
                                • Part of subcall function 00405688: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00421538,Error launching installer), ref: 004056B1
                                • Part of subcall function 00405688: CloseHandle.KERNEL32(?), ref: 004056BE
                              • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00401EED
                              • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EFD
                              • CloseHandle.KERNELBASE(?,00000000,000000EB,00000000), ref: 00401F22
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcat
                              • String ID:
                              • API String ID: 3521207402-0
                              • Opcode ID: e995d9f419432ab23205a23d5c1414ada8c426ee2d3ef18cbb1adcd6d691f71f
                              • Instruction ID: d3d55c0d0bbc33f725c23921dd181786adb59914180f86dd2947d51e8879a6ae
                              • Opcode Fuzzy Hash: e995d9f419432ab23205a23d5c1414ada8c426ee2d3ef18cbb1adcd6d691f71f
                              • Instruction Fuzzy Hash: 3C019231E04106EBCF20AF91CD49AAE7BB1EB40314F10807BF605B61E1C7794A859B9E
                              APIs
                                • Part of subcall function 00402BD8: RegOpenKeyExA.KERNELBASE(00000000,00000494,00000000,00000022,00000000,?,?), ref: 00402C00
                              • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402527
                              • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 0040253A
                              • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsx95D2.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040254F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Enum$CloseOpenValue
                              • String ID:
                              • API String ID: 167947723-0
                              • Opcode ID: 05547f92edfa2ad71c40473a60083347d41093bd1c43fb3d169fc0aa66b556e7
                              • Instruction ID: 11bb5dddaf85e4de06b60e46a4a286c6c0f73d8de59455db5a8421e4b605592f
                              • Opcode Fuzzy Hash: 05547f92edfa2ad71c40473a60083347d41093bd1c43fb3d169fc0aa66b556e7
                              • Instruction Fuzzy Hash: 5601DFB1A04201FFE7119F65AD88ABF7ABCDF40395F20003FF105A61C0D6B84A41966A
                              APIs
                              • RegOpenKeyExA.KERNELBASE(80000002,00406023,00000000,00000002,?,00000002,?,?,00406023,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405E07
                              • RegQueryValueExA.KERNELBASE(?,?,00000000,00406023,?,00406023), ref: 00405E28
                              • RegCloseKey.KERNELBASE(?), ref: 00405E49
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID:
                              • API String ID: 3677997916-0
                              • Opcode ID: 0c8888e50600bbfc423f29d3e13c34afc4b2d72f1a725d9a4029968a390a76be
                              • Instruction ID: a5bfd4e994019c5e115080bbecddc2f5f1976c63067f757e38b3d402cdd28771
                              • Opcode Fuzzy Hash: 0c8888e50600bbfc423f29d3e13c34afc4b2d72f1a725d9a4029968a390a76be
                              • Instruction Fuzzy Hash: 5F014C7154020AEFDB118F64DD48EDB3FACEF14354B004036FA4596220D235DA64CBA5
                              APIs
                                • Part of subcall function 00405B45: GetFileAttributesA.KERNELBASE(?,?,0040575D,?,?,00000000,00405940,?,?,?,?), ref: 00405B4A
                                • Part of subcall function 00405B45: SetFileAttributesA.KERNELBASE(?,00000000), ref: 00405B5E
                              • RemoveDirectoryA.KERNEL32(?,?,?,00000000,00405940), ref: 0040576C
                              • DeleteFileA.KERNELBASE(?,?,?,00000000,00405940), ref: 00405774
                              • SetFileAttributesA.KERNEL32(?,00000000), ref: 0040578C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: File$Attributes$DeleteDirectoryRemove
                              • String ID:
                              • API String ID: 1655745494-0
                              • Opcode ID: ecb533084f054dec527d8ee4002c22eb7271b0964ed621fa894de998c2c2fbf7
                              • Instruction ID: 95a73edef03a3fe4ea7fa24255aadd7873cdb690117aa2712c5123595e980fc6
                              • Opcode Fuzzy Hash: ecb533084f054dec527d8ee4002c22eb7271b0964ed621fa894de998c2c2fbf7
                              • Instruction Fuzzy Hash: F2E02B31108A9197C21067349D0CB5F6AD5EFC6314F044A36F991F31C1C73858069EBE
                              APIs
                              • ShellExecuteA.SHELL32(?,00000000,00000000,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Brudgomme,?), ref: 00401E9F
                              Strings
                              • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Brudgomme, xrefs: 00401E8A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: ExecuteShell
                              • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Brudgomme
                              • API String ID: 587946157-4191831094
                              • Opcode ID: 62972551e4f607768522ca5215d0e9555a819d9815caab0e71c71de7bb35adcf
                              • Instruction ID: 7c51c884e7587c3efeb31cb3e5c9943a81f4090218bfe93557c80408bc49aec8
                              • Opcode Fuzzy Hash: 62972551e4f607768522ca5215d0e9555a819d9815caab0e71c71de7bb35adcf
                              • Instruction Fuzzy Hash: 58F0F671B14104BADB21ABB59F4AE6D2AA5DB81318F38043BF050F71C2D9FD8942DB28
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1780204384.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.1780179855.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.1780263017.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.1780284598.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: EnumErrorLastWindows
                              • String ID:
                              • API String ID: 14984897-0
                              • Opcode ID: 7af5c486cb8ea8547353861cfd678fbd8d20862330e18d67419e74999799b2ae
                              • Instruction ID: 700bf99a33fcd989ee77f819fa46e2371db99389a88ce2eb288524e3b596c0af
                              • Opcode Fuzzy Hash: 7af5c486cb8ea8547353861cfd678fbd8d20862330e18d67419e74999799b2ae
                              • Instruction Fuzzy Hash: 9751A2BA908214DFFB10DF64DCC674937A4EB443D4F21842AEA08E726DCF34A9808B95
                              APIs
                                • Part of subcall function 00402BD8: RegOpenKeyExA.KERNELBASE(00000000,00000494,00000000,00000022,00000000,?,?), ref: 00402C00
                              • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 004024B3
                              • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsx95D2.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040254F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID:
                              • API String ID: 3677997916-0
                              • Opcode ID: 842ccded7b04f1c996c394db29755cab0eaefbc32d4fd585d2de1ae204d8f70a
                              • Instruction ID: 85d806923b24475f53c36965a20abc0d18f92dd5d526b72c5aa3047674b5102d
                              • Opcode Fuzzy Hash: 842ccded7b04f1c996c394db29755cab0eaefbc32d4fd585d2de1ae204d8f70a
                              • Instruction Fuzzy Hash: 7611C171A04205FFDB20CF60CA985AEBBB4AF00359F20443FE142B72C0D2B84A85DB5A
                              APIs
                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                              • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: 6f3fd260d9a20665192313664cef065be83871c58b0681ff97f62226ed226405
                              • Instruction ID: 8ec6bfb8ef4f3ff43576048fe9568e939b5e998f238dec90285f5c94a9fc96e2
                              • Opcode Fuzzy Hash: 6f3fd260d9a20665192313664cef065be83871c58b0681ff97f62226ed226405
                              • Instruction Fuzzy Hash: 2201F431B24210ABE7294B389E04B6A36A8F710314F11823BF911F66F1D7B8DC029B4D
                              APIs
                                • Part of subcall function 00402BD8: RegOpenKeyExA.KERNELBASE(00000000,00000494,00000000,00000022,00000000,?,?), ref: 00402C00
                              • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 00402396
                              • RegCloseKey.ADVAPI32(00000000), ref: 0040239F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: CloseDeleteOpenValue
                              • String ID:
                              • API String ID: 849931509-0
                              • Opcode ID: ce34e0a5a3cad0306182936bac4226b47a4e95e33cdd8971417c4bf24fbf648c
                              • Instruction ID: 7cc126104223fee90c4482272470a44d0e33bb4baa6becb9c0b30a5ba769ccb5
                              • Opcode Fuzzy Hash: ce34e0a5a3cad0306182936bac4226b47a4e95e33cdd8971417c4bf24fbf648c
                              • Instruction Fuzzy Hash: 25F0A472A00111ABD720AFA09A8E9BE76B89B40344F24043BF201B71C0D5BD5D028769
                              APIs
                              • lstrlenA.KERNEL32(00000000,00000011), ref: 004025B1
                              Strings
                              • C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll, xrefs: 004025A2, 004025C7
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: lstrlen
                              • String ID: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll
                              • API String ID: 1659193697-80383326
                              • Opcode ID: 9108d4ceed508d8a02313cc574e378f3b7a987aa5820872456f395d40ec67233
                              • Instruction ID: 2bf8431ce51e6c58f43ec2947d6bdc143d6e81ddf8616a76c722d5425931f27b
                              • Opcode Fuzzy Hash: 9108d4ceed508d8a02313cc574e378f3b7a987aa5820872456f395d40ec67233
                              • Instruction Fuzzy Hash: 82F0E272A08244BACB20FBB55E4AA9F6AA4CBC1314B34403FF141B71C2C6BC4542DA2D
                              APIs
                              • ExpandEnvironmentStringsA.KERNELBASE(00000000,?,00000400,00000001), ref: 00401A31
                              • lstrcmpA.KERNEL32(?,?,?,00000400,00000001), ref: 00401A44
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: EnvironmentExpandStringslstrcmp
                              • String ID:
                              • API String ID: 1938659011-0
                              • Opcode ID: 99ff6f7ebc29e3294f0bf96d9ec24245debac9b57580bca197066bfebfa759a6
                              • Instruction ID: ab1dd0d9c5eb94bf9ce54f5104db011015230574e834771f483328ebd508fd9c
                              • Opcode Fuzzy Hash: 99ff6f7ebc29e3294f0bf96d9ec24245debac9b57580bca197066bfebfa759a6
                              • Instruction Fuzzy Hash: 9DF08271B05241EBCB20DF659D45A9B7FE8EFD1394B10843BE145F6190D2388541DA69
                              APIs
                              • ShowWindow.USER32(00000000,00000000), ref: 00401E43
                              • EnableWindow.USER32(00000000,00000000), ref: 00401E4E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Window$EnableShow
                              • String ID:
                              • API String ID: 1136574915-0
                              • Opcode ID: 36dcea6e1d224af34142dbcc53fa3142b8bf20b1b5b4f1e3402a8bbf529d307d
                              • Instruction ID: 6bc854546bde8c1d97c50108fc272036e6fafce41083740c3c393c21766323e0
                              • Opcode Fuzzy Hash: 36dcea6e1d224af34142dbcc53fa3142b8bf20b1b5b4f1e3402a8bbf529d307d
                              • Instruction Fuzzy Hash: 2BE012B2B08211BFEB14EFB4E9895AE7BB4EF40325B20403BE401F11D1D67D59419B59
                              APIs
                              • ShowWindow.USER32(00000000), ref: 00401581
                              • ShowWindow.USER32(00010432), ref: 00401596
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: ShowWindow
                              • String ID:
                              • API String ID: 1268545403-0
                              • Opcode ID: 17699a1f730cc25233c13bc64813f1e04f0aaa057b5d2da36e90e35cf9de59ca
                              • Instruction ID: 1fba713723e617fd63a9d4476e2d2033a2576266d828a69d52802257caf8ad67
                              • Opcode Fuzzy Hash: 17699a1f730cc25233c13bc64813f1e04f0aaa057b5d2da36e90e35cf9de59ca
                              • Instruction Fuzzy Hash: 42E086B6B00115BBCB24DF64EE9087E77B6E784320750043FD502B3290C2B69D429B58
                              APIs
                              • GetModuleHandleA.KERNEL32(?,?,?,00403329,00000009), ref: 004062A2
                              • GetProcAddress.KERNEL32(00000000,?), ref: 004062BD
                                • Part of subcall function 00406222: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00406239
                                • Part of subcall function 00406222: wsprintfA.USER32 ref: 00406272
                                • Part of subcall function 00406222: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 00406286
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                              • String ID:
                              • API String ID: 2547128583-0
                              • Opcode ID: 3d400e748f947671e30b9badb510484ff95b6787d133025eb2c4a7967b05848e
                              • Instruction ID: 9986063a3a3a914c3c9c85809e338cef1f66889ba2e3f6f8a6abe9a53671474f
                              • Opcode Fuzzy Hash: 3d400e748f947671e30b9badb510484ff95b6787d133025eb2c4a7967b05848e
                              • Instruction Fuzzy Hash: BAE0CD32A08111B7D650B7705D0497773AC9FC475030208BEF907F2185E738EC319769
                              APIs
                              • GetFileAttributesA.KERNELBASE(00000003,00402D8D,C:\Users\user\Desktop\ODjwCjQBAP.exe,80000000,00000003), ref: 00405B6E
                              • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B90
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: File$AttributesCreate
                              • String ID:
                              • API String ID: 415043291-0
                              • Opcode ID: 4a69860c6089f1fb7fd455c1891d9cc54c05e48a968a67635bcc5e625bd0c43f
                              • Instruction ID: 2e597581bf20324382b204af2e2b9293bc3b27f4d9e8cb915424ec39c2be7a6e
                              • Opcode Fuzzy Hash: 4a69860c6089f1fb7fd455c1891d9cc54c05e48a968a67635bcc5e625bd0c43f
                              • Instruction Fuzzy Hash: A7D09E31658201EFFF098F20DD16F2EBBA2EB84B00F10962CBA92941E0D6755815DB26
                              APIs
                              • GetFileAttributesA.KERNELBASE(?,?,0040575D,?,?,00000000,00405940,?,?,?,?), ref: 00405B4A
                              • SetFileAttributesA.KERNELBASE(?,00000000), ref: 00405B5E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: AttributesFile
                              • String ID:
                              • API String ID: 3188754299-0
                              • Opcode ID: 123b2631ce2b274a689f6f42d71c67174a47df8962c272e460887a4e83ced065
                              • Instruction ID: 899457fb2a373ec916eabf998b05f3716e4ca5246c779d0db29ba2cd27af7bf6
                              • Opcode Fuzzy Hash: 123b2631ce2b274a689f6f42d71c67174a47df8962c272e460887a4e83ced065
                              • Instruction Fuzzy Hash: E2D01272908521AFC6102738ED0C89BBF65EB543717058B31FDB9E22F0D7345C528AA9
                              APIs
                              • CreateDirectoryA.KERNELBASE(?,00000000,004032B2,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034AF), ref: 00405659
                              • GetLastError.KERNEL32 ref: 00405667
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: CreateDirectoryErrorLast
                              • String ID:
                              • API String ID: 1375471231-0
                              • Opcode ID: e7d0addc6a0e2cebebc6ed5ef3cfbde17ba04572b5523194c914a84283870961
                              • Instruction ID: 0da22567c4b446b4f42a21ca14333010da7ca755278e2de90fea66cf95c641d8
                              • Opcode Fuzzy Hash: e7d0addc6a0e2cebebc6ed5ef3cfbde17ba04572b5523194c914a84283870961
                              • Instruction Fuzzy Hash: 80C04C30A19502DAD7105B31DD08F177E60EB50741F548935A10AE11F0D6769451DD3F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: wsprintf
                              • String ID:
                              • API String ID: 2111968516-0
                              • Opcode ID: ba0784285b27e5103b764f78ef6fb10791d77067d667a4e03e7b1a8b22abeba3
                              • Instruction ID: c506eed3d8509f523d62ce86bbd7ec2d7c700efff23c78fc82727488f7f797df
                              • Opcode Fuzzy Hash: ba0784285b27e5103b764f78ef6fb10791d77067d667a4e03e7b1a8b22abeba3
                              • Instruction Fuzzy Hash: 5A21F970D0429ABADF218FA885486AEBF749F01314F1445BFE890B63D1C1BE8A81CF59
                              APIs
                              • MoveFileA.KERNEL32(00000000,00000000), ref: 00401685
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: FileMove
                              • String ID:
                              • API String ID: 3562171763-0
                              • Opcode ID: 6a883f9504f5c2888ca71b0d8159a7984c3ca00eae0cacb2c6aae2654bc04831
                              • Instruction ID: 5898f67605d89fe4fb30f7e570565f9f0960a3a70fe6e37fe1d860f2248c6c53
                              • Opcode Fuzzy Hash: 6a883f9504f5c2888ca71b0d8159a7984c3ca00eae0cacb2c6aae2654bc04831
                              • Instruction Fuzzy Hash: 2AF09635B08115A6DB20A7A54F0DD5F15649B81364B34423BF151B21D1DABD860295AF
                              APIs
                              • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 0040232B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: PrivateProfileStringWrite
                              • String ID:
                              • API String ID: 390214022-0
                              • Opcode ID: 6b5e48cc008279052f1a47b51cc32cf127a00dc2733201354761e156b3ebbbdf
                              • Instruction ID: 5f6267e841dd840bf6295cbe1617e7a0042591bb1814ca2e8a4844537e2a2c78
                              • Opcode Fuzzy Hash: 6b5e48cc008279052f1a47b51cc32cf127a00dc2733201354761e156b3ebbbdf
                              • Instruction Fuzzy Hash: 67E04F31B001246BD7307AB10F8E97F10999BC4304B39153ABA01B62C6EDBC4C414AB9
                              APIs
                              • WriteFile.KERNELBASE(00409130,00000000,00000000,00000000,00000000,004120D1,0040A8D8,004031F8,0040A8D8,004120D1,004128D8,00004000,?,00000000,00403022,00000004), ref: 00405C25
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: FileWrite
                              • String ID:
                              • API String ID: 3934441357-0
                              • Opcode ID: d04482319dc3028e4ce08f739f1cf32aeeec85f3b87b0f01a1fec36d148a5575
                              • Instruction ID: a68fbbb5dd244fa7f7e93bb3aa8c49248ed304819acaaafe9587b6e0b9a7c414
                              • Opcode Fuzzy Hash: d04482319dc3028e4ce08f739f1cf32aeeec85f3b87b0f01a1fec36d148a5575
                              • Instruction Fuzzy Hash: 59E0EC3261835EAFEF209E659C00AEB7B6CEB05361F048836FD15E2150D271E8219BA9
                              APIs
                              • RegOpenKeyExA.KERNELBASE(00000000,00000494,00000000,00000022,00000000,?,?), ref: 00402C00
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Open
                              • String ID:
                              • API String ID: 71445658-0
                              • Opcode ID: ed1d997f1767e4ebe1524a955060e6e59f62574de8c72c2eb948d7caa6f8d669
                              • Instruction ID: e7f2061ded5818062db825bc0413707355dbbb7a887edde82a058a89c260750b
                              • Opcode Fuzzy Hash: ed1d997f1767e4ebe1524a955060e6e59f62574de8c72c2eb948d7caa6f8d669
                              • Instruction Fuzzy Hash: 5EE046B6250108BADB00EFA4EE4AFA537ECAB44700F008021B608E60A1C678E6108B79
                              APIs
                              • ReadFile.KERNELBASE(00409130,00000000,00000000,00000000,00000000,004128D8,0040A8D8,00403274,00409130,00409130,00403178,004128D8,00004000,?,00000000,00403022), ref: 00405BF6
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: ffd4dfc917ffc97e7d907f9c2c90699c203f3b0ebfd4578ed28d6b2a376640fe
                              • Instruction ID: ff987474db4941a2a63fe891919fb2946ba1e32a0df937fa27738628adbeee07
                              • Opcode Fuzzy Hash: ffd4dfc917ffc97e7d907f9c2c90699c203f3b0ebfd4578ed28d6b2a376640fe
                              • Instruction Fuzzy Hash: 5EE0EC3261835AABEF509E559C04EEB7B6CFB05360F045432FD15E2190D275E8219BA5
                              APIs
                              • VirtualProtect.KERNELBASE(1000404C,00000004,00000040,1000403C), ref: 10002729
                              Memory Dump Source
                              • Source File: 00000000.00000002.1780204384.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.1780179855.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.1780263017.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.1780284598.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                              • Instruction ID: 4f82052a8ee677216feeb46ba648c84afb962adc58c95b92ee0d34447feb5494
                              • Opcode Fuzzy Hash: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                              • Instruction Fuzzy Hash: B5F09BF19092A0DEF360DF688CC4B063FE4E3983D5B03892AE358F6269EB7441448B19
                              APIs
                              • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402369
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: PrivateProfileString
                              • String ID:
                              • API String ID: 1096422788-0
                              • Opcode ID: 90e07bb3a0b3f4804eab7f86ac5a4e71b50077df0b3d61eb17d11243db03f5ce
                              • Instruction ID: 863d308e192ce4c0f66b0ae01519e0470cfafd3cecd099ef988cf845eccf6abb
                              • Opcode Fuzzy Hash: 90e07bb3a0b3f4804eab7f86ac5a4e71b50077df0b3d61eb17d11243db03f5ce
                              • Instruction Fuzzy Hash: D1E08630A04208BADB10AFA08F09EAD3A79AF41710F24003AF9507B0D1EAB84481DB2D
                              APIs
                              • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015A8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: AttributesFile
                              • String ID:
                              • API String ID: 3188754299-0
                              • Opcode ID: 96c910dea8fbf951c2b9a4b5f3b3c3063cfa5e5189f353d5a1020b82a892de8f
                              • Instruction ID: bac0d5995861a33a007bf1aced2086678d13136d77447ce7e9e78d56ca3cc0cd
                              • Opcode Fuzzy Hash: 96c910dea8fbf951c2b9a4b5f3b3c3063cfa5e5189f353d5a1020b82a892de8f
                              • Instruction Fuzzy Hash: DCD05BB2704115EBCB10DFE5EB0869D77B0DB40365F304137D151F21D0D2BADA559759
                              APIs
                              • SendMessageA.USER32(0001042C,00000000,00000000,00000000), ref: 0040413A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: 50a7dacb6371fe0cd67611078dbaf3ccf85a23f01bbb2752a0812b92d5b89748
                              • Instruction ID: 75e74fd11ebe5bc6c3f22cf38e5f61c8940f983f04da59faa373adfcae7f6129
                              • Opcode Fuzzy Hash: 50a7dacb6371fe0cd67611078dbaf3ccf85a23f01bbb2752a0812b92d5b89748
                              • Instruction Fuzzy Hash: 82C04C717442017AEA218B519D49F0677586794700F6544257320A60D0C6B4E450E62D
                              APIs
                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402F75,?), ref: 00403285
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: FilePointer
                              • String ID:
                              • API String ID: 973152223-0
                              • Opcode ID: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                              • Instruction ID: 49fdcfdf8b1973cd13611e97ba0bfafd8618b6cb304eeeee9131019f9f046fb0
                              • Opcode Fuzzy Hash: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                              • Instruction Fuzzy Hash: 03B01271644200BFDA214F00DF05F057B21A790700F10C030B748380F082712420EB4D
                              APIs
                              • SendMessageA.USER32(00000028,?,00000001,00403F42), ref: 0040411F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: 3d364c0f7cae05b6249e8bcc12743ca4c2e9a63f4273028bf1a1c1708aea3851
                              • Instruction ID: a78b9239c319e9cb66b61a8ea9955aebbc10e43728856a3b978814f56e37e297
                              • Opcode Fuzzy Hash: 3d364c0f7cae05b6249e8bcc12743ca4c2e9a63f4273028bf1a1c1708aea3851
                              • Instruction Fuzzy Hash: 19B092B6684200BAEE228B00DD09F457AB2E7A8742F008024B200240B0CAB200A1DB19
                              APIs
                              • KiUserCallbackDispatcher.NTDLL(?,00403EDB), ref: 00404108
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: CallbackDispatcherUser
                              • String ID:
                              • API String ID: 2492992576-0
                              • Opcode ID: 14a97dc87043aa2e894c667cdbf79e2d841fd90f9686f850a1099e45bc3f86c8
                              • Instruction ID: 4b90da896e4fa09681504a9dabf2ba00c57f91177066947fb67d52e8ca440c18
                              • Opcode Fuzzy Hash: 14a97dc87043aa2e894c667cdbf79e2d841fd90f9686f850a1099e45bc3f86c8
                              • Instruction Fuzzy Hash: FCA012324040009BCB014B90FE04C457F31A754300701C031E10180030C2310824FF09
                              APIs
                              • Sleep.KERNELBASE(00000000), ref: 004014E9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: d70777c03fab58a6680eac8bb77f8d646d92531b9a9c42126c115ca3ec13432e
                              • Instruction ID: 6696c5b565abb4b072559f1c40de02a1b67f072cada9199909c9bbabd3d4a8ec
                              • Opcode Fuzzy Hash: d70777c03fab58a6680eac8bb77f8d646d92531b9a9c42126c115ca3ec13432e
                              • Instruction Fuzzy Hash: 1CD05EB3B14141ABDB20EBB8BAC445E77E4EB403257304837E502E2091E6798A428618
                              APIs
                              • GetDlgItem.USER32(?,000003F9), ref: 00404AA5
                              • GetDlgItem.USER32(?,00000408), ref: 00404AB0
                              • GlobalAlloc.KERNEL32(00000040,?), ref: 00404AFA
                              • LoadBitmapA.USER32(0000006E), ref: 00404B0D
                              • SetWindowLongA.USER32(?,000000FC,00405084), ref: 00404B26
                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404B3A
                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404B4C
                              • SendMessageA.USER32(?,00001109,00000002), ref: 00404B62
                              • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404B6E
                              • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404B80
                              • DeleteObject.GDI32(00000000), ref: 00404B83
                              • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404BAE
                              • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404BBA
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C4F
                              • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404C7A
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C8E
                              • GetWindowLongA.USER32(?,000000F0), ref: 00404CBD
                              • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404CCB
                              • ShowWindow.USER32(?,00000005), ref: 00404CDC
                              • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404DD9
                              • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404E3E
                              • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404E53
                              • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404E77
                              • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404E97
                              • ImageList_Destroy.COMCTL32(00000000), ref: 00404EAC
                              • GlobalFree.KERNEL32(00000000), ref: 00404EBC
                              • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404F35
                              • SendMessageA.USER32(?,00001102,?,?), ref: 00404FDE
                              • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404FED
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 0040500D
                              • ShowWindow.USER32(?,00000000), ref: 0040505B
                              • GetDlgItem.USER32(?,000003FE), ref: 00405066
                              • ShowWindow.USER32(00000000), ref: 0040506D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                              • String ID: $M$N
                              • API String ID: 1638840714-813528018
                              • Opcode ID: 83e2ede0a7d074a44b451b0b1dd27b036aaffd7360a27c1076ab9aa670ade9c5
                              • Instruction ID: e0cc5522092fb32f5c2674b78011ac89e49f6c9f2dab24d514a8ff43177d9d20
                              • Opcode Fuzzy Hash: 83e2ede0a7d074a44b451b0b1dd27b036aaffd7360a27c1076ab9aa670ade9c5
                              • Instruction Fuzzy Hash: 1E025EB0900209AFEB209F94DC85AAE7BB5FB84315F10817AF611B62E1C7799D42DF58
                              APIs
                              • GetDlgItem.USER32(?,000003FB), ref: 00404569
                              • SetWindowTextA.USER32(00000000,?), ref: 00404593
                              • SHBrowseForFolderA.SHELL32(?,0041F108,?), ref: 00404644
                              • CoTaskMemFree.OLE32(00000000), ref: 0040464F
                              • lstrcmpiA.KERNEL32(Call,indfrselsartikel Setup: Installing), ref: 00404681
                              • lstrcatA.KERNEL32(?,Call), ref: 0040468D
                              • SetDlgItemTextA.USER32(?,000003FB,?), ref: 0040469F
                                • Part of subcall function 004056D1: GetDlgItemTextA.USER32(?,?,00000400,004046D6), ref: 004056E4
                                • Part of subcall function 00406162: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\ODjwCjQBAP.exe",75573410,C:\Users\user\AppData\Local\Temp\,00000000,0040329A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034AF), ref: 004061BA
                                • Part of subcall function 00406162: CharNextA.USER32(?,?,?,00000000), ref: 004061C7
                                • Part of subcall function 00406162: CharNextA.USER32(?,"C:\Users\user\Desktop\ODjwCjQBAP.exe",75573410,C:\Users\user\AppData\Local\Temp\,00000000,0040329A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034AF), ref: 004061CC
                                • Part of subcall function 00406162: CharPrevA.USER32(?,?,75573410,C:\Users\user\AppData\Local\Temp\,00000000,0040329A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034AF), ref: 004061DC
                              • GetDiskFreeSpaceA.KERNEL32(0041ED00,?,?,0000040F,?,0041ED00,0041ED00,?,00000001,0041ED00,?,?,000003FB,?), ref: 0040475D
                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404778
                                • Part of subcall function 004048D1: lstrlenA.KERNEL32(indfrselsartikel Setup: Installing,indfrselsartikel Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047EC,000000DF,00000000,00000400,?), ref: 0040496F
                                • Part of subcall function 004048D1: wsprintfA.USER32 ref: 00404977
                                • Part of subcall function 004048D1: SetDlgItemTextA.USER32(?,indfrselsartikel Setup: Installing), ref: 0040498A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                              • String ID: A$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously$Call$indfrselsartikel Setup: Installing
                              • API String ID: 2624150263-3506316403
                              • Opcode ID: aa897a388f026c859834b9177abdad11152a1d64c9f36690aee5ee8c86f27191
                              • Instruction ID: 7ea719a0b93bcaca37b111b678a2b5d6f3f78fc0ed79788128ac85d93e839f9f
                              • Opcode Fuzzy Hash: aa897a388f026c859834b9177abdad11152a1d64c9f36690aee5ee8c86f27191
                              • Instruction Fuzzy Hash: D5A18EB1900209ABDB11AFA5CC45AAFB7B8EF85314F10843BF711B62D1D77C8A418F69
                              APIs
                                • Part of subcall function 10001215: GlobalAlloc.KERNEL32(00000040,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                              • GlobalAlloc.KERNEL32(00000040,000014A4), ref: 10001B67
                              • lstrcpyA.KERNEL32(00000008,?), ref: 10001BAF
                              • lstrcpyA.KERNEL32(00000408,?), ref: 10001BB9
                              • GlobalFree.KERNEL32(00000000), ref: 10001BCC
                              • GlobalFree.KERNEL32(?), ref: 10001CC4
                              • GlobalFree.KERNEL32(?), ref: 10001CC9
                              • GlobalFree.KERNEL32(?), ref: 10001CCE
                              • GlobalFree.KERNEL32(00000000), ref: 10001E76
                              • lstrcpyA.KERNEL32(?,?), ref: 10001FCA
                              Memory Dump Source
                              • Source File: 00000000.00000002.1780204384.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.1780179855.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.1780263017.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.1780284598.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Global$Free$lstrcpy$Alloc
                              • String ID:
                              • API String ID: 4227406936-0
                              • Opcode ID: 108015169a1f9511be137f3b76d088d284be53ebd3be1ec406ce9b744c5ee79e
                              • Instruction ID: 780798ea066e4ece118e8e5fed0bf18c828ec290136deaf2e43fc5d0554b8685
                              • Opcode Fuzzy Hash: 108015169a1f9511be137f3b76d088d284be53ebd3be1ec406ce9b744c5ee79e
                              • Instruction Fuzzy Hash: 17129971D0424ADFFB20CFA4C8847EEBBF4FB043C4F61852AD5A1A2199DB749A81CB51
                              APIs
                              • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 004042B0
                              • GetDlgItem.USER32(00000000,000003E8), ref: 004042C4
                              • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 004042E2
                              • GetSysColor.USER32(?), ref: 004042F3
                              • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404302
                              • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404311
                              • lstrlenA.KERNEL32(?), ref: 00404314
                              • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404323
                              • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 00404338
                              • GetDlgItem.USER32(?,0000040A), ref: 0040439A
                              • SendMessageA.USER32(00000000), ref: 0040439D
                              • GetDlgItem.USER32(?,000003E8), ref: 004043C8
                              • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404408
                              • LoadCursorA.USER32(00000000,00007F02), ref: 00404417
                              • SetCursor.USER32(00000000), ref: 00404420
                              • ShellExecuteA.SHELL32(0000070B,open,004226C0,00000000,00000000,00000001), ref: 00404433
                              • LoadCursorA.USER32(00000000,00007F00), ref: 00404440
                              • SetCursor.USER32(00000000), ref: 00404443
                              • SendMessageA.USER32(00000111,00000001,00000000), ref: 0040446F
                              • SendMessageA.USER32(00000010,00000000,00000000), ref: 00404483
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                              • String ID: Call$N$open
                              • API String ID: 3615053054-2563687911
                              • Opcode ID: e76cc1a0ba7ef7f86ae8e4ee464b0340797726a5bea064de8fa3a19247962d01
                              • Instruction ID: 93f755629d35b640548b5af6b7c61ab120d2ba211fed136cde477a70902604c8
                              • Opcode Fuzzy Hash: e76cc1a0ba7ef7f86ae8e4ee464b0340797726a5bea064de8fa3a19247962d01
                              • Instruction Fuzzy Hash: 5D61A3B1A40209BFEB109F61DC45F6A7B69FB84714F10803AFB057A2D1C7B8A951CF99
                              APIs
                              • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                              • BeginPaint.USER32(?,?), ref: 00401047
                              • GetClientRect.USER32(?,?), ref: 0040105B
                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                              • DeleteObject.GDI32(?), ref: 004010ED
                              • CreateFontIndirectA.GDI32(?), ref: 00401105
                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                              • SelectObject.GDI32(00000000,?), ref: 00401140
                              • DrawTextA.USER32(00000000,00422F20,000000FF,00000010,00000820), ref: 00401156
                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                              • DeleteObject.GDI32(?), ref: 00401165
                              • EndPaint.USER32(?,?), ref: 0040116E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                              • String ID: F
                              • API String ID: 941294808-1304234792
                              • Opcode ID: 7c104425433eee9aa72c8594e5c9845c7e8c7dbb4814f5ad4226ea4ba1dd0cf1
                              • Instruction ID: f6076547c65416f673289c9e9aa760257b54fe90aa12de16c0a46004740ece36
                              • Opcode Fuzzy Hash: 7c104425433eee9aa72c8594e5c9845c7e8c7dbb4814f5ad4226ea4ba1dd0cf1
                              • Instruction Fuzzy Hash: C2419B71804249AFCF058FA4CD459AFBBB9FF45310F00812AF961AA1A0C738EA50DFA5
                              APIs
                              • lstrcpyA.KERNEL32(00421AC0,NUL,?,00000000,?,00000000,00405DD3,?,?), ref: 00405C4F
                              • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,00405DD3,?,?), ref: 00405C73
                              • GetShortPathNameA.KERNEL32(?,00421AC0,00000400), ref: 00405C7C
                                • Part of subcall function 00405ACF: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D2C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405ADF
                                • Part of subcall function 00405ACF: lstrlenA.KERNEL32(00000000,?,00000000,00405D2C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B11
                              • GetShortPathNameA.KERNEL32(00421EC0,00421EC0,00000400), ref: 00405C99
                              • wsprintfA.USER32 ref: 00405CB7
                              • GetFileSize.KERNEL32(00000000,00000000,00421EC0,C0000000,00000004,00421EC0,?,?,?,?,?), ref: 00405CF2
                              • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405D01
                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D39
                              • SetFilePointer.KERNEL32(004093C8,00000000,00000000,00000000,00000000,004216C0,00000000,-0000000A,004093C8,00000000,[Rename],00000000,00000000,00000000), ref: 00405D8F
                              • GlobalFree.KERNEL32(00000000), ref: 00405DA0
                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405DA7
                                • Part of subcall function 00405B6A: GetFileAttributesA.KERNELBASE(00000003,00402D8D,C:\Users\user\Desktop\ODjwCjQBAP.exe,80000000,00000003), ref: 00405B6E
                                • Part of subcall function 00405B6A: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B90
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                              • String ID: %s=%s$NUL$[Rename]
                              • API String ID: 222337774-4148678300
                              • Opcode ID: 13050e4631be9f4a8a8c31851d4856950631349ab05fbd5c9e4b7c65e501b528
                              • Instruction ID: 58b8e60db813422e8a8f05baf12fe1cb7cc397f7baf35d3febd204dd1aeecf15
                              • Opcode Fuzzy Hash: 13050e4631be9f4a8a8c31851d4856950631349ab05fbd5c9e4b7c65e501b528
                              • Instruction Fuzzy Hash: D031C271A04B596BD2202B219D49F6B3A6CDF85754F18003BF901F62D2E67CA8018EAD
                              APIs
                              • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\ODjwCjQBAP.exe",75573410,C:\Users\user\AppData\Local\Temp\,00000000,0040329A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034AF), ref: 004061BA
                              • CharNextA.USER32(?,?,?,00000000), ref: 004061C7
                              • CharNextA.USER32(?,"C:\Users\user\Desktop\ODjwCjQBAP.exe",75573410,C:\Users\user\AppData\Local\Temp\,00000000,0040329A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034AF), ref: 004061CC
                              • CharPrevA.USER32(?,?,75573410,C:\Users\user\AppData\Local\Temp\,00000000,0040329A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034AF), ref: 004061DC
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00406163
                              • *?|<>/":, xrefs: 004061AA
                              • "C:\Users\user\Desktop\ODjwCjQBAP.exe", xrefs: 0040619E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Char$Next$Prev
                              • String ID: "C:\Users\user\Desktop\ODjwCjQBAP.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                              • API String ID: 589700163-2337240744
                              • Opcode ID: 2fcb21d4fe3ff3b998ebc2bd8af41eb25bf4dc23d8027269f2ae341fb2b2b84f
                              • Instruction ID: 28f88d73301ddfe76a8902f897fcc58808f561dcfc6ac49559e28e986a88295b
                              • Opcode Fuzzy Hash: 2fcb21d4fe3ff3b998ebc2bd8af41eb25bf4dc23d8027269f2ae341fb2b2b84f
                              • Instruction Fuzzy Hash: AF11C8718083912DFB3216644C44B777F998F9A760F19007BE9D6762C3C67C5C53826D
                              APIs
                              • GetWindowLongA.USER32(?,000000EB), ref: 00404160
                              • GetSysColor.USER32(00000000), ref: 0040417C
                              • SetTextColor.GDI32(?,00000000), ref: 00404188
                              • SetBkMode.GDI32(?,?), ref: 00404194
                              • GetSysColor.USER32(?), ref: 004041A7
                              • SetBkColor.GDI32(?,?), ref: 004041B7
                              • DeleteObject.GDI32(?), ref: 004041D1
                              • CreateBrushIndirect.GDI32(?), ref: 004041DB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                              • String ID:
                              • API String ID: 2320649405-0
                              • Opcode ID: e8c91e704ef8b2f1a11ad189bfd14f771d09f9d58710722270f9777396a44b4e
                              • Instruction ID: 7122de99037e03f190bb62226e04253736cb74e6c142f140589d3e5d77d1f23d
                              • Opcode Fuzzy Hash: e8c91e704ef8b2f1a11ad189bfd14f771d09f9d58710722270f9777396a44b4e
                              • Instruction Fuzzy Hash: DB21A4B5804704ABCB219F78DD08B5BBBF8AF41714F048629E995E62E0C734E944CB55
                              APIs
                              • GlobalFree.KERNEL32(00000000), ref: 1000234A
                                • Part of subcall function 10001224: lstrcpynA.KERNEL32(00000000,?,100012CF,-1000404B,100011AB,-000000A0), ref: 10001234
                              • GlobalAlloc.KERNEL32(00000040,?), ref: 100022C3
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 100022D8
                              • GlobalAlloc.KERNEL32(00000040,00000010), ref: 100022E7
                              • CLSIDFromString.OLE32(00000000,00000000), ref: 100022F4
                              • GlobalFree.KERNEL32(00000000), ref: 100022FB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1780204384.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.1780179855.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.1780263017.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.1780284598.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                              • String ID:
                              • API String ID: 3730416702-0
                              • Opcode ID: 8ca201b8c9dcbb45ad50e4cb45e4e1ae2e8a5d70f393ea2d6c63899163ff979d
                              • Instruction ID: bfa8c22ebd78897ea4dc14f883c746723b208fa17a75ef0c69fbb79ff87ab60c
                              • Opcode Fuzzy Hash: 8ca201b8c9dcbb45ad50e4cb45e4e1ae2e8a5d70f393ea2d6c63899163ff979d
                              • Instruction Fuzzy Hash: B541ABB1108311EFF320DFA48884B5BB7F8FF443D1F218529F946D61A9DB34AA448B61
                              APIs
                                • Part of subcall function 10001215: GlobalAlloc.KERNEL32(00000040,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                              • GlobalFree.KERNEL32(?), ref: 100024B5
                              • GlobalFree.KERNEL32(00000000), ref: 100024EF
                              Memory Dump Source
                              • Source File: 00000000.00000002.1780204384.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.1780179855.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.1780263017.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.1780284598.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc
                              • String ID:
                              • API String ID: 1780285237-0
                              • Opcode ID: 8ed12168559ed504bf2d16f5614b25cf9b7800a5843296302d7a865f42518c80
                              • Instruction ID: 4e6b36a645f71e2aed4a85f2c36ff1861f2741140ba068ae73f9b0a79c1593cf
                              • Opcode Fuzzy Hash: 8ed12168559ed504bf2d16f5614b25cf9b7800a5843296302d7a865f42518c80
                              • Instruction Fuzzy Hash: EA319CB1504250EFF322CF64CCC4C6B7BBDEB852D4B124529FA4193168CB31AC94DB62
                              APIs
                              • DestroyWindow.USER32(00000000,00000000), ref: 00402CC3
                              • GetTickCount.KERNEL32 ref: 00402CE1
                              • wsprintfA.USER32 ref: 00402D0F
                                • Part of subcall function 00405110: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000,?), ref: 00405149
                                • Part of subcall function 00405110: lstrlenA.KERNEL32(00402D22,Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000), ref: 00405159
                                • Part of subcall function 00405110: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,00402D22,00402D22,Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,00000000,00000000,00000000), ref: 0040516C
                                • Part of subcall function 00405110: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsx95D2.tmp\System.dll), ref: 0040517E
                                • Part of subcall function 00405110: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A4
                                • Part of subcall function 00405110: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051BE
                                • Part of subcall function 00405110: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051CC
                              • CreateDialogParamA.USER32(0000006F,00000000,00402C13,00000000), ref: 00402D33
                              • ShowWindow.USER32(00000000,00000005), ref: 00402D41
                                • Part of subcall function 00402C8F: MulDiv.KERNEL32(0002E496,00000064,00033077), ref: 00402CA4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                              • String ID: ... %d%%
                              • API String ID: 722711167-2449383134
                              • Opcode ID: 78a221e97a99680450e3ca11bf4e3b45821cb4013d8a2558b5166950edff25d0
                              • Instruction ID: 547fa0e596d0efa3134ade0ba199646732fee1a7f54f1ab5f8be41358a9578df
                              • Opcode Fuzzy Hash: 78a221e97a99680450e3ca11bf4e3b45821cb4013d8a2558b5166950edff25d0
                              • Instruction Fuzzy Hash: DC019BB0906614E7EB21BB64EF0DEDE766CEB04701B444037F405B11E5C7B89941D79E
                              APIs
                              • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 004049F6
                              • GetMessagePos.USER32 ref: 004049FE
                              • ScreenToClient.USER32(?,?), ref: 00404A18
                              • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404A2A
                              • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404A50
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Message$Send$ClientScreen
                              • String ID: f
                              • API String ID: 41195575-1993550816
                              • Opcode ID: 13dcb630cae817d26763a7c5c34c1a537cec2b83c976c16d0abeb4614e4307e4
                              • Instruction ID: 2232a7e87341d92c9ad346ae082ec06308d60ff2d87fc7f715a57a5a5eae5b25
                              • Opcode Fuzzy Hash: 13dcb630cae817d26763a7c5c34c1a537cec2b83c976c16d0abeb4614e4307e4
                              • Instruction Fuzzy Hash: E5018071E40219BADB00DB94CC41BFEBBB8AB45711F10412BBA10B61C0D7B465018BA5
                              APIs
                              • GetDC.USER32(?), ref: 00401D98
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DB2
                              • MulDiv.KERNEL32(00000000,00000000), ref: 00401DBA
                              • ReleaseDC.USER32(?,00000000), ref: 00401DCB
                              • CreateFontIndirectA.GDI32(0040A808), ref: 00401E1A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: CapsCreateDeviceFontIndirectRelease
                              • String ID: Calibri
                              • API String ID: 3808545654-1409258342
                              • Opcode ID: 7163b3b0dcdfa28c572866efb14d0ddf6d6d7c1142750631c0734f8fd9b33859
                              • Instruction ID: 31dc6bfce766dd2e9c365b6b9c1ce0fa0646d0edadaed3ffd0317ad467dc8ee1
                              • Opcode Fuzzy Hash: 7163b3b0dcdfa28c572866efb14d0ddf6d6d7c1142750631c0734f8fd9b33859
                              • Instruction Fuzzy Hash: 1E017572948340AFE7006B74AE4EB993FF4DB95315F10847AF201B62E2C6B905528F6E
                              APIs
                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C2E
                              • wsprintfA.USER32 ref: 00402C62
                              • SetWindowTextA.USER32(?,?), ref: 00402C72
                              • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402C84
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Text$ItemTimerWindowwsprintf
                              • String ID: unpacking data: %d%%$verifying installer: %d%%
                              • API String ID: 1451636040-1158693248
                              • Opcode ID: ef5ff3cba37bdb2e26199f17b8c5be3437539e0f0002abd4d10d443ac5288961
                              • Instruction ID: e0e458c2d16b5d3c5a169a1492fe07981551179f6e5c56f92d0567975436b572
                              • Opcode Fuzzy Hash: ef5ff3cba37bdb2e26199f17b8c5be3437539e0f0002abd4d10d443ac5288961
                              • Instruction Fuzzy Hash: 35F0317090420DABEF205F60CD0AFAE3769EB04345F00C43AFA16B51D0D7B99A55CB59
                              APIs
                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040279D
                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 004027B9
                              • GlobalFree.KERNEL32(?), ref: 004027F2
                              • GlobalFree.KERNEL32(00000000), ref: 00402805
                              • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 0040281D
                              • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402831
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Global$AllocFree$CloseDeleteFileHandle
                              • String ID:
                              • API String ID: 2667972263-0
                              • Opcode ID: 7d68071d91978c31b4045b951977b232c33a3f1e4c4fbf1767583406490216b2
                              • Instruction ID: 589acf511f7bba285ed25554ef0f071862dbcd9cf46fffc414e4c77000f41e55
                              • Opcode Fuzzy Hash: 7d68071d91978c31b4045b951977b232c33a3f1e4c4fbf1767583406490216b2
                              • Instruction Fuzzy Hash: 5E219A71C04128BBCF216FA5CE89DAE7A79AF09324F14423AF520762E1C6795D40DBA9
                              APIs
                              • lstrlenA.KERNEL32(indfrselsartikel Setup: Installing,indfrselsartikel Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047EC,000000DF,00000000,00000400,?), ref: 0040496F
                              • wsprintfA.USER32 ref: 00404977
                              • SetDlgItemTextA.USER32(?,indfrselsartikel Setup: Installing), ref: 0040498A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: ItemTextlstrlenwsprintf
                              • String ID: %u.%u%s%s$indfrselsartikel Setup: Installing
                              • API String ID: 3540041739-1387766795
                              • Opcode ID: bf1bdcac2109adbb76e2cfdf4929b7a7dc251d6602f1380599200b875f001fd7
                              • Instruction ID: 7f1be1aa0c85ccb86495671cb382a06f82cddcf8175a130fa0267404931b34df
                              • Opcode Fuzzy Hash: bf1bdcac2109adbb76e2cfdf4929b7a7dc251d6602f1380599200b875f001fd7
                              • Instruction Fuzzy Hash: CF11B7736041283BDB0065799D45EAF3298DB85374F250637FA25F21D1E978CC1255EC
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1780204384.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.1780179855.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.1780263017.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.1780284598.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: FreeGlobal
                              • String ID:
                              • API String ID: 2979337801-0
                              • Opcode ID: 83a27a6a764e204457f331ddef67b06d43c1ca0f526d792f63dc3af4834dec0e
                              • Instruction ID: adaf369aa6dab84e94bee76403d526b7d43184adb12fe210256c1aedb67fe499
                              • Opcode Fuzzy Hash: 83a27a6a764e204457f331ddef67b06d43c1ca0f526d792f63dc3af4834dec0e
                              • Instruction Fuzzy Hash: 43512536D04159AEFB55DFB488A4AEEBBF6EF453C0F124169E841B315DCA306E4087D2
                              APIs
                              • GetDlgItem.USER32(?), ref: 00401D3F
                              • GetClientRect.USER32(00000000,?), ref: 00401D4C
                              • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D6D
                              • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D7B
                              • DeleteObject.GDI32(00000000), ref: 00401D8A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                              • String ID:
                              • API String ID: 1849352358-0
                              • Opcode ID: b98f244c4997ac906f623e123468edec3404108b831d84f192b6a7b6dae47352
                              • Instruction ID: 3a73a5ecaa8fddf8dab02391599d10e6f088d4e67d6af50185a53a7dc2f76cba
                              • Opcode Fuzzy Hash: b98f244c4997ac906f623e123468edec3404108b831d84f192b6a7b6dae47352
                              • Instruction Fuzzy Hash: D6F0FFB2A04119BFDB11EBA4DE88DAFBBBCEB44301B104476F601F2191C6749D018B79
                              APIs
                              • SetWindowTextA.USER32(00000000,00422F20), ref: 00403BD4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: TextWindow
                              • String ID: "C:\Users\user\Desktop\ODjwCjQBAP.exe"$1033$indfrselsartikel Setup: Installing
                              • API String ID: 530164218-417816923
                              • Opcode ID: 67c3d82ce6484f9e1e19bcd04ff1a02b9bccfbab982ecba75f5a52bbb9d475e3
                              • Instruction ID: c62297436265aa8c4426bdacc88999ed38b20c31bf5381ba95a45bc0aedbf607
                              • Opcode Fuzzy Hash: 67c3d82ce6484f9e1e19bcd04ff1a02b9bccfbab982ecba75f5a52bbb9d475e3
                              • Instruction Fuzzy Hash: 6711D8B1B046119BC730AF15DD50A77777DEB8475A328813FE901A73D2C73DAE029A98
                              APIs
                              • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004032AC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034AF), ref: 0040596F
                              • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004032AC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034AF), ref: 00405978
                              • lstrcatA.KERNEL32(?,00409014), ref: 00405989
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405969
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: CharPrevlstrcatlstrlen
                              • String ID: C:\Users\user\AppData\Local\Temp\
                              • API String ID: 2659869361-4083868402
                              • Opcode ID: 39623dee3265ed167cf4eb0d952b1efefe5673d98ca6e2622bb109ae9f6b3ea7
                              • Instruction ID: 4e6a192690b432b60a96f5238a9074c153a0d937d76e079e8aa32f917c06b110
                              • Opcode Fuzzy Hash: 39623dee3265ed167cf4eb0d952b1efefe5673d98ca6e2622bb109ae9f6b3ea7
                              • Instruction Fuzzy Hash: 7FD0A9A2A09930AAD31222158C05EAB6A4CCF42310B0A0062F200B22E2C77C0D418BFE
                              APIs
                              • CharNextA.USER32(?,?,C:\,?,00405A6E,C:\,C:\,75573410,?,75572EE0,004057B9,?,75573410,75572EE0,00000000), ref: 00405A10
                              • CharNextA.USER32(00000000), ref: 00405A15
                              • CharNextA.USER32(00000000), ref: 00405A29
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: CharNext
                              • String ID: C:\
                              • API String ID: 3213498283-3404278061
                              • Opcode ID: c01f0a1332e094523614662ca2a683f3687d2570a221d834ee5f6cec315170af
                              • Instruction ID: f957f906ea029efbd3510901c55ab9b0ae73d09d1d9c73be6bc34f8378a19dae
                              • Opcode Fuzzy Hash: c01f0a1332e094523614662ca2a683f3687d2570a221d834ee5f6cec315170af
                              • Instruction Fuzzy Hash: C2F0C291B04FA06FFB32A2681C84F775A88CB55710F04116BE180662C2C2785C418F9A
                              APIs
                              • CloseHandle.KERNEL32(000002C4,C:\Users\user\AppData\Local\Temp\,004035BC,?), ref: 00403797
                              • CloseHandle.KERNEL32(000002D0,C:\Users\user\AppData\Local\Temp\,004035BC,?), ref: 004037AB
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 0040378A
                              • C:\Users\user\AppData\Local\Temp\nsx95D2.tmp, xrefs: 004037BB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: CloseHandle
                              • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsx95D2.tmp
                              • API String ID: 2962429428-1063466950
                              • Opcode ID: 8243f35e0eeb5762c06f3a20855541ba65908ed27c56bedd9f13c791d511c691
                              • Instruction ID: 4fe8f3727f95cb8dfcfe97d6293448c3a92072a7c91c92fe8e25374afea9a46a
                              • Opcode Fuzzy Hash: 8243f35e0eeb5762c06f3a20855541ba65908ed27c56bedd9f13c791d511c691
                              • Instruction Fuzzy Hash: E6E08CB0900620DAC524AF7CBD859463B289B41335760C726F578F30F2C338AE875AAC
                              APIs
                              • IsWindowVisible.USER32(?), ref: 004050B3
                              • CallWindowProcA.USER32(?,?,?,?), ref: 00405104
                                • Part of subcall function 00404128: SendMessageA.USER32(0001042C,00000000,00000000,00000000), ref: 0040413A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Window$CallMessageProcSendVisible
                              • String ID:
                              • API String ID: 3748168415-3916222277
                              • Opcode ID: 0b9e3fe4afe9fd5950d24fc38bd805c0ffc83546a9c92a8d1e346af401a4be56
                              • Instruction ID: e292fc6bb5149b142bd52d3e096dd2ae09329e4c6d4eed70fd370e7000aba408
                              • Opcode Fuzzy Hash: 0b9e3fe4afe9fd5950d24fc38bd805c0ffc83546a9c92a8d1e346af401a4be56
                              • Instruction Fuzzy Hash: B2018F71504609ABDF205F11ED84AEF3765EB84750F208037FA01B92D1C77A9D92AFAE
                              APIs
                              • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402DB6,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\ODjwCjQBAP.exe,C:\Users\user\Desktop\ODjwCjQBAP.exe,80000000,00000003), ref: 004059B6
                              • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402DB6,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\ODjwCjQBAP.exe,C:\Users\user\Desktop\ODjwCjQBAP.exe,80000000,00000003), ref: 004059C4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: CharPrevlstrlen
                              • String ID: C:\Users\user\Desktop
                              • API String ID: 2709904686-1876063424
                              • Opcode ID: cad1fee570528055bb4f840757e41c2b2d093a40416f1971c342fc3ba500c074
                              • Instruction ID: 4c364b2a586e3df4272a597733e657329f4de9264f8513980004e000b8aa575c
                              • Opcode Fuzzy Hash: cad1fee570528055bb4f840757e41c2b2d093a40416f1971c342fc3ba500c074
                              • Instruction Fuzzy Hash: 82D0C7E2419E709EF30352549D04B9F6E98DF16750F0A14A2F141E6192D77C5D418BAD
                              APIs
                              • GlobalAlloc.KERNEL32(00000040,?), ref: 1000115B
                              • GlobalFree.KERNEL32(00000000), ref: 100011B4
                              • GlobalFree.KERNEL32(?), ref: 100011C7
                              • GlobalFree.KERNEL32(?), ref: 100011F5
                              Memory Dump Source
                              • Source File: 00000000.00000002.1780204384.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.1780179855.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.1780263017.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.1780284598.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc
                              • String ID:
                              • API String ID: 1780285237-0
                              • Opcode ID: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                              • Instruction ID: 5d3a3765e571093bf703368c32e31ec5bfeafbef09712c331e02e9e13643e521
                              • Opcode Fuzzy Hash: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                              • Instruction Fuzzy Hash: 6531ABB1808255AFF715CFA8DC89AEA7FE8EB052C1B164115FA45D726CDB34D910CB24
                              APIs
                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D2C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405ADF
                              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405AF7
                              • CharNextA.USER32(00000000,?,00000000,00405D2C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B08
                              • lstrlenA.KERNEL32(00000000,?,00000000,00405D2C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B11
                              Memory Dump Source
                              • Source File: 00000000.00000002.1775553689.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1775541058.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775566824.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775579906.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1775645636.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: lstrlen$CharNextlstrcmpi
                              • String ID:
                              • API String ID: 190613189-0
                              • Opcode ID: ca0b18bb87844b4bf03c2f7d3918b69422ab9094ff5260ece92dc9b1c2472986
                              • Instruction ID: b8bae3ead32ec2695fa88c6f2b94aa478c41e31f8fdb951db119f3f4d21ee890
                              • Opcode Fuzzy Hash: ca0b18bb87844b4bf03c2f7d3918b69422ab9094ff5260ece92dc9b1c2472986
                              • Instruction Fuzzy Hash: C1F0C231605518BFCB029FA5DC4099FBBB8EF46350B2140A5F800F7250D274FE019BA9
                              APIs
                              • SetErrorMode.KERNEL32 ref: 004032E4
                              • GetVersion.KERNEL32 ref: 004032EA
                              • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403313
                              • #17.COMCTL32(00000007,00000009), ref: 00403335
                              • OleInitialize.OLE32(00000000), ref: 0040333C
                              • SHGetFileInfoA.SHELL32(0041ECF0,00000000,?,00000160,00000000), ref: 00403358
                              • GetCommandLineA.KERNEL32(00422F20,NSIS Error), ref: 0040336D
                              • GetModuleHandleA.KERNEL32(00000000,00429000,00000000), ref: 00403380
                              • CharNextA.USER32(00000000,00429000,00000020), ref: 004033AB
                              • GetTempPathA.KERNEL32(00000400,0042A400,00000000,00000020), ref: 004034A8
                              • GetWindowsDirectoryA.KERNEL32(0042A400,000003FB), ref: 004034B9
                              • lstrcatA.KERNEL32(0042A400,\Temp), ref: 004034C5
                              • GetTempPathA.KERNEL32(000003FC,0042A400,0042A400,\Temp), ref: 004034D9
                              • lstrcatA.KERNEL32(0042A400,Low), ref: 004034E1
                              • SetEnvironmentVariableA.KERNEL32(TEMP,0042A400,0042A400,Low), ref: 004034F2
                              • SetEnvironmentVariableA.KERNEL32(TMP,0042A400), ref: 004034FA
                              • DeleteFileA.KERNEL32(0042A000), ref: 0040350E
                                • Part of subcall function 00406290: GetModuleHandleA.KERNEL32(?,?,?,00403329,00000009), ref: 004062A2
                                • Part of subcall function 00406290: GetProcAddress.KERNEL32(00000000,?), ref: 004062BD
                              • OleUninitialize.OLE32(?), ref: 004035BC
                              • ExitProcess.KERNEL32 ref: 004035DD
                              • GetCurrentProcess.KERNEL32(00000028,?), ref: 004036FA
                              • OpenProcessToken.ADVAPI32(00000000), ref: 00403701
                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403719
                              • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 00403738
                              • ExitWindowsEx.USER32(00000002,80040002), ref: 0040375C
                              • ExitProcess.KERNEL32 ref: 0040377F
                                • Part of subcall function 004056ED: MessageBoxIndirectA.USER32(00409230), ref: 00405748
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Process$Exit$EnvironmentFileHandleModulePathTempTokenVariableWindowslstrcat$AddressAdjustCharCommandCurrentDeleteDirectoryErrorIndirectInfoInitializeLineLookupMessageModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrlen
                              • String ID: "$.tmp$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                              • API String ID: 3329125770-3941163293
                              • Opcode ID: e18221ddd9e48752b7ffbdf688241eb0e22038d92db6db9d705f5ccec6b49e04
                              • Instruction ID: 987bc29005933e48b9d04248005189ae3273ffe916fb5a61461eda946c2e522c
                              • Opcode Fuzzy Hash: e18221ddd9e48752b7ffbdf688241eb0e22038d92db6db9d705f5ccec6b49e04
                              • Instruction Fuzzy Hash: FCC109706082816AE7216F259D49A2F3EACEF81706F44447FF481761E2CB7C9A05CB6E
                              APIs
                              • GetDlgItem.USER32(?,000003F9), ref: 00404AA5
                              • GetDlgItem.USER32(?,00000408), ref: 00404AB0
                              • GlobalAlloc.KERNEL32(00000040,?), ref: 00404AFA
                              • LoadBitmapA.USER32(0000006E), ref: 00404B0D
                              • SetWindowLongA.USER32(?,000000FC,00405084), ref: 00404B26
                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404B3A
                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404B4C
                              • SendMessageA.USER32(?,00001109,00000002), ref: 00404B62
                              • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404B6E
                              • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404B80
                              • DeleteObject.GDI32(00000000), ref: 00404B83
                              • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404BAE
                              • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404BBA
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C4F
                              • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404C7A
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C8E
                              • GetWindowLongA.USER32(?,000000F0), ref: 00404CBD
                              • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404CCB
                              • ShowWindow.USER32(?,00000005), ref: 00404CDC
                              • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404DD9
                              • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404E3E
                              • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404E53
                              • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404E77
                              • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404E97
                              • ImageList_Destroy.COMCTL32(?), ref: 00404EAC
                              • GlobalFree.KERNEL32(?), ref: 00404EBC
                              • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404F35
                              • SendMessageA.USER32(?,00001102,?,?), ref: 00404FDE
                              • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404FED
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 0040500D
                              • ShowWindow.USER32(?,00000000), ref: 0040505B
                              • GetDlgItem.USER32(?,000003FE), ref: 00405066
                              • ShowWindow.USER32(00000000), ref: 0040506D
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                              • String ID: $M$N
                              • API String ID: 1638840714-813528018
                              • Opcode ID: ba7290f4b2f558e76718ca09df7d9ac4a37db348ff9a84ef3540181398f9072b
                              • Instruction ID: e0cc5522092fb32f5c2674b78011ac89e49f6c9f2dab24d514a8ff43177d9d20
                              • Opcode Fuzzy Hash: ba7290f4b2f558e76718ca09df7d9ac4a37db348ff9a84ef3540181398f9072b
                              • Instruction Fuzzy Hash: 1E025EB0900209AFEB209F94DC85AAE7BB5FB84315F10817AF611B62E1C7799D42DF58
                              APIs
                              • DeleteFileA.KERNEL32(?,?,75573410,75572EE0,00000000), ref: 004057C2
                              • lstrcatA.KERNEL32(00420D38,\*.*,00420D38,?,?,75573410,75572EE0,00000000), ref: 0040580A
                              • lstrcatA.KERNEL32(?,00409014,?,00420D38,?,?,75573410,75572EE0,00000000), ref: 0040582B
                              • lstrlenA.KERNEL32(?,?,00409014,?,00420D38,?,?,75573410,75572EE0,00000000), ref: 00405831
                              • FindFirstFileA.KERNEL32(00420D38,?,?,?,00409014,?,00420D38,?,?,75573410,75572EE0,00000000), ref: 00405842
                              • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004058EF
                              • FindClose.KERNEL32(00000000), ref: 00405900
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                              • String ID: 8B$\*.*
                              • API String ID: 2035342205-1085368084
                              • Opcode ID: ea9ce5b97ce8e4b443abb3ca9957b13dd705908b98673029f699f8bd1230974e
                              • Instruction ID: 8d03ba635bdf6d692437a4f2007131f6bbb84493a6188974bf12e3b4770be62e
                              • Opcode Fuzzy Hash: ea9ce5b97ce8e4b443abb3ca9957b13dd705908b98673029f699f8bd1230974e
                              • Instruction Fuzzy Hash: 3E51AF71900A14EADF217B618C49BAF7AB8DF42724F14807BF850762D2D73C8992DE6D
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e78d97ed3c230bfcbd776d1da080b0f670dc0f56a58da5166f9bdd2003ef958d
                              • Instruction ID: 395035d2fa7d2bfd2a07fc8d885f942395c55dc3dc65efbd6096f39d55049081
                              • Opcode Fuzzy Hash: e78d97ed3c230bfcbd776d1da080b0f670dc0f56a58da5166f9bdd2003ef958d
                              • Instruction Fuzzy Hash: 18F16671D00229CBCF28CFA8C8946ADBBB1FF44305F25856ED856BB281D7385A96DF44
                              APIs
                              • GetDlgItem.USER32(?,00000403), ref: 004052AD
                              • GetDlgItem.USER32(?,000003EE), ref: 004052BC
                              • GetClientRect.USER32(?,?), ref: 004052F9
                              • GetSystemMetrics.USER32(00000002), ref: 00405300
                              • SendMessageA.USER32(?,0000101B,00000000,?), ref: 00405321
                              • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405332
                              • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405345
                              • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405353
                              • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405366
                              • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405388
                              • ShowWindow.USER32(?,00000008), ref: 0040539C
                              • GetDlgItem.USER32(?,000003EC), ref: 004053BD
                              • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004053CD
                              • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004053E6
                              • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004053F2
                              • GetDlgItem.USER32(?,000003F8), ref: 004052CB
                                • Part of subcall function 00404111: SendMessageA.USER32(00000028,?,00000001,00403F42), ref: 0040411F
                              • GetDlgItem.USER32(?,000003EC), ref: 0040540E
                              • CreateThread.KERNEL32(00000000,00000000,Function_000051E2,00000000), ref: 0040541C
                              • CloseHandle.KERNEL32(00000000), ref: 00405423
                              • ShowWindow.USER32(00000000), ref: 00405446
                              • ShowWindow.USER32(?,00000008), ref: 0040544D
                              • ShowWindow.USER32(00000008), ref: 00405493
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004054C7
                              • CreatePopupMenu.USER32 ref: 004054D8
                              • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004054ED
                              • GetWindowRect.USER32(?,000000FF), ref: 0040550D
                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405526
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405562
                              • OpenClipboard.USER32(00000000), ref: 00405572
                              • EmptyClipboard.USER32 ref: 00405578
                              • GlobalAlloc.KERNEL32(00000042,?), ref: 00405581
                              • GlobalLock.KERNEL32(00000000), ref: 0040558B
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 0040559F
                              • GlobalUnlock.KERNEL32(00000000), ref: 004055B8
                              • SetClipboardData.USER32(00000001,00000000), ref: 004055C3
                              • CloseClipboard.USER32 ref: 004055C9
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                              • String ID:
                              • API String ID: 590372296-0
                              • Opcode ID: c64a89a41c0802a74bba5a78dd280d07ec270940df5a5324a2dbd363d8ad6a15
                              • Instruction ID: e0dc4773203ce2f112709eab9a11bfc184f4d069c8d5349c47d5b80479340f4b
                              • Opcode Fuzzy Hash: c64a89a41c0802a74bba5a78dd280d07ec270940df5a5324a2dbd363d8ad6a15
                              • Instruction Fuzzy Hash: 10A148B1900208BFDF119F60DD89AAE7BB9FB48355F00407AFA01B61A0C7B55E51DF69
                              APIs
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C45
                              • ShowWindow.USER32(?), ref: 00403C62
                              • DestroyWindow.USER32 ref: 00403C76
                              • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403C92
                              • GetDlgItem.USER32(?,?), ref: 00403CB3
                              • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403CC7
                              • IsWindowEnabled.USER32(00000000), ref: 00403CCE
                              • GetDlgItem.USER32(?,00000001), ref: 00403D7C
                              • GetDlgItem.USER32(?,00000002), ref: 00403D86
                              • SetClassLongA.USER32(?,000000F2,?), ref: 00403DA0
                              • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403DF1
                              • GetDlgItem.USER32(?,00000003), ref: 00403E97
                              • ShowWindow.USER32(00000000,?), ref: 00403EB8
                              • EnableWindow.USER32(?,?), ref: 00403ECA
                              • EnableWindow.USER32(?,?), ref: 00403EE5
                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403EFB
                              • EnableMenuItem.USER32(00000000), ref: 00403F02
                              • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403F1A
                              • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403F2D
                              • lstrlenA.KERNEL32(0041FD30,?,0041FD30,00422F20), ref: 00403F56
                              • SetWindowTextA.USER32(?,0041FD30), ref: 00403F65
                              • ShowWindow.USER32(?,0000000A), ref: 00404099
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                              • String ID:
                              • API String ID: 184305955-0
                              • Opcode ID: f52cdbaf3123b7cbd9944adc9014d9948be0515c381cedadf67d37a6be0de08c
                              • Instruction ID: 2eb83949b6bd8974722fa043abbaf2d62199bae10e2b8edc7fb886fd11b27e7e
                              • Opcode Fuzzy Hash: f52cdbaf3123b7cbd9944adc9014d9948be0515c381cedadf67d37a6be0de08c
                              • Instruction Fuzzy Hash: 3EC1F2B1604201BBDB20AF61EE84E2B3ABCFB84305F51053EF611B11E1C7799842EB5E
                              APIs
                              • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 004042B0
                              • GetDlgItem.USER32(?,000003E8), ref: 004042C4
                              • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 004042E2
                              • GetSysColor.USER32(?), ref: 004042F3
                              • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404302
                              • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404311
                              • lstrlenA.KERNEL32 ref: 00404314
                              • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404323
                              • SendMessageA.USER32(00000000,00000449,?,?), ref: 00404338
                              • GetDlgItem.USER32(?,0000040A), ref: 0040439A
                              • SendMessageA.USER32(00000000), ref: 0040439D
                              • GetDlgItem.USER32(?,000003E8), ref: 004043C8
                              • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404408
                              • LoadCursorA.USER32(00000000,00007F02), ref: 00404417
                              • SetCursor.USER32(00000000), ref: 00404420
                              • ShellExecuteA.SHELL32(0000070B,open,004226C0,00000000,00000000,00000001), ref: 00404433
                              • LoadCursorA.USER32(00000000,00007F00), ref: 00404440
                              • SetCursor.USER32(00000000), ref: 00404443
                              • SendMessageA.USER32(00000111,00000001,00000000), ref: 0040446F
                              • SendMessageA.USER32(00000010,00000000,00000000), ref: 00404483
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                              • String ID: N$open
                              • API String ID: 3615053054-904208323
                              • Opcode ID: fcb538ac3dcd5d073d4dc883c570750d07bdf7e1e6628805ae3c2de539a5b723
                              • Instruction ID: 42d062241169b884b3317a3a104e1cf407c17e646fd8fbbbf9edf650e8e07a34
                              • Opcode Fuzzy Hash: fcb538ac3dcd5d073d4dc883c570750d07bdf7e1e6628805ae3c2de539a5b723
                              • Instruction Fuzzy Hash: 5771B1B1A40205BFEB10DF61DC45F6A3B69FB84314F10807AFB05BA2D1C7B8A951DB99
                              APIs
                                • Part of subcall function 00406290: GetModuleHandleA.KERNEL32(?,?,?,00403329,00000009), ref: 004062A2
                                • Part of subcall function 00406290: GetProcAddress.KERNEL32(00000000,?), ref: 004062BD
                              • lstrcatA.KERNEL32(0042A000,0041FD30,80000001,Control Panel\Desktop\ResourceLocale,00000000,0041FD30,00000000,00000002,75573410,0042A400,00429000,00000000), ref: 004038F2
                              • lstrlenA.KERNEL32(004226C0,?,?,?,004226C0,00000000,00429400,0042A000,0041FD30,80000001,Control Panel\Desktop\ResourceLocale,00000000,0041FD30,00000000,00000002,75573410), ref: 00403967
                              • lstrcmpiA.KERNEL32(?,.exe), ref: 0040397A
                              • GetFileAttributesA.KERNEL32(004226C0), ref: 00403985
                              • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,00429400), ref: 004039CE
                                • Part of subcall function 00405E55: wsprintfA.USER32 ref: 00405E62
                              • RegisterClassA.USER32(00422EC0), ref: 00403A0B
                              • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403A23
                              • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403A58
                              • ShowWindow.USER32(00000005,00000000), ref: 00403A8E
                              • GetClassInfoA.USER32(00000000,RichEdit20A,00422EC0), ref: 00403ABA
                              • GetClassInfoA.USER32(00000000,RichEdit,00422EC0), ref: 00403AC7
                              • RegisterClassA.USER32(00422EC0), ref: 00403AD0
                              • DialogBoxParamA.USER32(?,00000000,00403C09,00000000), ref: 00403AEF
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                              • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                              • API String ID: 1975747703-2904746566
                              • Opcode ID: acb9e1483f64e376554eea66f981f1d844e256060aa5afb508f73614915c59b6
                              • Instruction ID: 29345e8072be8e75dc90901d6125d60d13300850aec60374d900494af90ecb47
                              • Opcode Fuzzy Hash: acb9e1483f64e376554eea66f981f1d844e256060aa5afb508f73614915c59b6
                              • Instruction Fuzzy Hash: 8161A4B06442407ED620AF65AD45F373A6CEB8474AF40447FF945B22E2C6BCAD029A3D
                              APIs
                              • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                              • BeginPaint.USER32(?,?), ref: 00401047
                              • GetClientRect.USER32(?,?), ref: 0040105B
                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                              • DeleteObject.GDI32(?), ref: 004010ED
                              • CreateFontIndirectA.GDI32(?), ref: 00401105
                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                              • SelectObject.GDI32(00000000,?), ref: 00401140
                              • DrawTextA.USER32(00000000,00422F20,000000FF,00000010,00000820), ref: 00401156
                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                              • DeleteObject.GDI32(?), ref: 00401165
                              • EndPaint.USER32(?,?), ref: 0040116E
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                              • String ID: F
                              • API String ID: 941294808-1304234792
                              • Opcode ID: 7c104425433eee9aa72c8594e5c9845c7e8c7dbb4814f5ad4226ea4ba1dd0cf1
                              • Instruction ID: f6076547c65416f673289c9e9aa760257b54fe90aa12de16c0a46004740ece36
                              • Opcode Fuzzy Hash: 7c104425433eee9aa72c8594e5c9845c7e8c7dbb4814f5ad4226ea4ba1dd0cf1
                              • Instruction Fuzzy Hash: C2419B71804249AFCF058FA4CD459AFBBB9FF45310F00812AF961AA1A0C738EA50DFA5
                              APIs
                              • lstrcpyA.KERNEL32(00421AC0,NUL,?,00000000,?,00000000,00405DD3,?,?), ref: 00405C4F
                              • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,00405DD3,?,?), ref: 00405C73
                              • GetShortPathNameA.KERNEL32(?,00421AC0,00000400), ref: 00405C7C
                                • Part of subcall function 00405ACF: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D2C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405ADF
                                • Part of subcall function 00405ACF: lstrlenA.KERNEL32(00000000,?,00000000,00405D2C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B11
                              • GetShortPathNameA.KERNEL32(00421EC0,00421EC0,00000400), ref: 00405C99
                              • wsprintfA.USER32 ref: 00405CB7
                              • GetFileSize.KERNEL32(00000000,00000000,00421EC0,C0000000,00000004,00421EC0,?,?,?,?,?), ref: 00405CF2
                              • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405D01
                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D39
                              • SetFilePointer.KERNEL32(004093C8,00000000,00000000,00000000,00000000,004216C0,00000000,-0000000A,004093C8,00000000,[Rename],00000000,00000000,00000000), ref: 00405D8F
                              • GlobalFree.KERNEL32(00000000), ref: 00405DA0
                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405DA7
                                • Part of subcall function 00405B6A: GetFileAttributesA.KERNEL32(00000003,00402D8D,0042AC00,80000000,00000003), ref: 00405B6E
                                • Part of subcall function 00405B6A: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B90
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                              • String ID: %s=%s$NUL$[Rename]
                              • API String ID: 222337774-4148678300
                              • Opcode ID: 2e3f1d5478f9f0c6b3014663fcb7d6cbfaa562a2a519d3499902ae05c7337469
                              • Instruction ID: 58b8e60db813422e8a8f05baf12fe1cb7cc397f7baf35d3febd204dd1aeecf15
                              • Opcode Fuzzy Hash: 2e3f1d5478f9f0c6b3014663fcb7d6cbfaa562a2a519d3499902ae05c7337469
                              • Instruction Fuzzy Hash: D031C271A04B596BD2202B219D49F6B3A6CDF85754F18003BF901F62D2E67CA8018EAD
                              APIs
                              • GetDlgItem.USER32(?,000003FB), ref: 00404569
                              • SetWindowTextA.USER32(00000000,?), ref: 00404593
                              • SHBrowseForFolderA.SHELL32(?,0041F108,?), ref: 00404644
                              • CoTaskMemFree.OLE32(00000000), ref: 0040464F
                              • lstrcmpiA.KERNEL32(004226C0,0041FD30), ref: 00404681
                              • lstrcatA.KERNEL32(?,004226C0), ref: 0040468D
                              • SetDlgItemTextA.USER32(?,000003FB,?), ref: 0040469F
                                • Part of subcall function 004056D1: GetDlgItemTextA.USER32(?,?,00000400,004046D6), ref: 004056E4
                                • Part of subcall function 00406162: CharNextA.USER32(?,*?|<>/":,00000000,00429000,75573410,0042A400,00000000,0040329A,0042A400,0042A400,004034AF), ref: 004061BA
                                • Part of subcall function 00406162: CharNextA.USER32(?,?,?,00000000), ref: 004061C7
                                • Part of subcall function 00406162: CharNextA.USER32(?,00429000,75573410,0042A400,00000000,0040329A,0042A400,0042A400,004034AF), ref: 004061CC
                                • Part of subcall function 00406162: CharPrevA.USER32(?,?,75573410,0042A400,00000000,0040329A,0042A400,0042A400,004034AF), ref: 004061DC
                              • GetDiskFreeSpaceA.KERNEL32(0041ED00,?,?,0000040F,?,0041ED00,0041ED00,?,00000001,0041ED00,?,?,000003FB,?), ref: 0040475D
                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404778
                                • Part of subcall function 004048D1: lstrlenA.KERNEL32(0041FD30,0041FD30,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047EC,000000DF,00000000,00000400,?), ref: 0040496F
                                • Part of subcall function 004048D1: wsprintfA.USER32 ref: 00404977
                                • Part of subcall function 004048D1: SetDlgItemTextA.USER32(?,0041FD30), ref: 0040498A
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                              • String ID: A
                              • API String ID: 2624150263-3554254475
                              • Opcode ID: 22e506ab911b47b1d52a2713ecca6c1ad83ea481866ddf22d065b1d45e7491c6
                              • Instruction ID: 7ea719a0b93bcaca37b111b678a2b5d6f3f78fc0ed79788128ac85d93e839f9f
                              • Opcode Fuzzy Hash: 22e506ab911b47b1d52a2713ecca6c1ad83ea481866ddf22d065b1d45e7491c6
                              • Instruction Fuzzy Hash: D5A18EB1900209ABDB11AFA5CC45AAFB7B8EF85314F10843BF711B62D1D77C8A418F69
                              APIs
                              • GetTickCount.KERNEL32 ref: 00402D5E
                              • GetModuleFileNameA.KERNEL32(00000000,0042AC00,00000400), ref: 00402D7A
                                • Part of subcall function 00405B6A: GetFileAttributesA.KERNEL32(00000003,00402D8D,0042AC00,80000000,00000003), ref: 00405B6E
                                • Part of subcall function 00405B6A: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B90
                              • GetFileSize.KERNEL32(00000000,00000000,0042B000,00000000,00429C00,00429C00,0042AC00,0042AC00,80000000,00000003), ref: 00402DC3
                              • GlobalAlloc.KERNEL32(00000040,00409130), ref: 00402F0A
                              Strings
                              • soft, xrefs: 00402E3A
                              • Null, xrefs: 00402E43
                              • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402FA1
                              • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402F53
                              • Inst, xrefs: 00402E31
                              • Error launching installer, xrefs: 00402D9A
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                              • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                              • API String ID: 2803837635-3016655952
                              • Opcode ID: 6949a2dc81abe6ae8ca3848ee1a274e905e25326872c2b53de3725809208b6fc
                              • Instruction ID: 1e54d23c6bd4663b885b54a46d63d50a2b02afe17d1d0705d7bda66adc4b1b0c
                              • Opcode Fuzzy Hash: 6949a2dc81abe6ae8ca3848ee1a274e905e25326872c2b53de3725809208b6fc
                              • Instruction Fuzzy Hash: 6661E5B1A40215ABDF20AF64DE89A9E76B8EB04355F11413FF904B72C1C7BC9D418B9C
                              APIs
                              • GetVersion.KERNEL32(?,0041F510,00000000,00405148,0041F510,00000000), ref: 00405FCA
                              • GetSystemDirectoryA.KERNEL32(004226C0,00000400), ref: 00406045
                              • GetWindowsDirectoryA.KERNEL32(004226C0,00000400), ref: 00406058
                              • SHGetSpecialFolderLocation.SHELL32(?,00000000), ref: 00406094
                              • SHGetPathFromIDListA.SHELL32(00000000,004226C0), ref: 004060A2
                              • CoTaskMemFree.OLE32(00000000), ref: 004060AD
                              • lstrcatA.KERNEL32(004226C0,\Microsoft\Internet Explorer\Quick Launch), ref: 004060CF
                              • lstrlenA.KERNEL32(004226C0,?,0041F510,00000000,00405148,0041F510,00000000), ref: 00406121
                              Strings
                              • \Microsoft\Internet Explorer\Quick Launch, xrefs: 004060C9
                              • Software\Microsoft\Windows\CurrentVersion, xrefs: 00406014
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                              • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                              • API String ID: 900638850-730719616
                              • Opcode ID: ecdefe2751fc2be78af5e26724b3c6b53ae81c07b092af95d9830a7abdf9c2ab
                              • Instruction ID: 17f1afa1df4653d6aa239bb2462815deac18f6a32033811d9d8cd7bf3bfa2e02
                              • Opcode Fuzzy Hash: ecdefe2751fc2be78af5e26724b3c6b53ae81c07b092af95d9830a7abdf9c2ab
                              • Instruction Fuzzy Hash: 68613671A00111AEDF209F24CC84BBF3BA8EB45314F12813BE942BA2D1D77D4962DB5E
                              APIs
                              • GetWindowLongA.USER32(?,000000EB), ref: 00404160
                              • GetSysColor.USER32(00000000), ref: 0040417C
                              • SetTextColor.GDI32(?,00000000), ref: 00404188
                              • SetBkMode.GDI32(?,?), ref: 00404194
                              • GetSysColor.USER32(?), ref: 004041A7
                              • SetBkColor.GDI32(?,?), ref: 004041B7
                              • DeleteObject.GDI32(?), ref: 004041D1
                              • CreateBrushIndirect.GDI32(?), ref: 004041DB
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                              • String ID:
                              • API String ID: 2320649405-0
                              • Opcode ID: e8c91e704ef8b2f1a11ad189bfd14f771d09f9d58710722270f9777396a44b4e
                              • Instruction ID: 7122de99037e03f190bb62226e04253736cb74e6c142f140589d3e5d77d1f23d
                              • Opcode Fuzzy Hash: e8c91e704ef8b2f1a11ad189bfd14f771d09f9d58710722270f9777396a44b4e
                              • Instruction Fuzzy Hash: DB21A4B5804704ABCB219F78DD08B5BBBF8AF41714F048629E995E62E0C734E944CB55
                              APIs
                              • lstrlenA.KERNEL32(0041F510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000,?), ref: 00405149
                              • lstrlenA.KERNEL32(00402D22,0041F510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000), ref: 00405159
                              • lstrcatA.KERNEL32(0041F510,00402D22,00402D22,0041F510,00000000,00000000,00000000), ref: 0040516C
                              • SetWindowTextA.USER32(0041F510,0041F510), ref: 0040517E
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A4
                              • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051BE
                              • SendMessageA.USER32(?,00001013,?,00000000), ref: 004051CC
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                              • String ID:
                              • API String ID: 2531174081-0
                              • Opcode ID: 5079ce61eb60a58f18aa72498b661a7186dcc34ecfe9b72952c752fd8c1df286
                              • Instruction ID: 38fa31381a166635c2069e030e34d3db0945d62c2eda65f80c6bd2e149c96a35
                              • Opcode Fuzzy Hash: 5079ce61eb60a58f18aa72498b661a7186dcc34ecfe9b72952c752fd8c1df286
                              • Instruction Fuzzy Hash: FD215C71E00518BBDF119FA5CD80ADFBFB9EB04354F14807AF904AA291C7799A41CFA8
                              APIs
                              • DestroyWindow.USER32(?,00000000), ref: 00402CC3
                              • GetTickCount.KERNEL32 ref: 00402CE1
                              • wsprintfA.USER32 ref: 00402D0F
                                • Part of subcall function 00405110: lstrlenA.KERNEL32(0041F510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000,?), ref: 00405149
                                • Part of subcall function 00405110: lstrlenA.KERNEL32(00402D22,0041F510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000), ref: 00405159
                                • Part of subcall function 00405110: lstrcatA.KERNEL32(0041F510,00402D22,00402D22,0041F510,00000000,00000000,00000000), ref: 0040516C
                                • Part of subcall function 00405110: SetWindowTextA.USER32(0041F510,0041F510), ref: 0040517E
                                • Part of subcall function 00405110: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A4
                                • Part of subcall function 00405110: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051BE
                                • Part of subcall function 00405110: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051CC
                              • CreateDialogParamA.USER32(0000006F,00000000,00402C13,00000000), ref: 00402D33
                              • ShowWindow.USER32(00000000,00000005), ref: 00402D41
                                • Part of subcall function 00402C8F: MulDiv.KERNEL32(?,00000064,?), ref: 00402CA4
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                              • String ID: ... %d%%
                              • API String ID: 722711167-2449383134
                              • Opcode ID: 1e33dda50caea38695290f70d86be4c9e72cbf0e3d215f61cbcfcdcf3d334b50
                              • Instruction ID: 547fa0e596d0efa3134ade0ba199646732fee1a7f54f1ab5f8be41358a9578df
                              • Opcode Fuzzy Hash: 1e33dda50caea38695290f70d86be4c9e72cbf0e3d215f61cbcfcdcf3d334b50
                              • Instruction Fuzzy Hash: DC019BB0906614E7EB21BB64EF0DEDE766CEB04701B444037F405B11E5C7B89941D79E
                              APIs
                              • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 004049F6
                              • GetMessagePos.USER32 ref: 004049FE
                              • ScreenToClient.USER32(?,?), ref: 00404A18
                              • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404A2A
                              • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404A50
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Message$Send$ClientScreen
                              • String ID: f
                              • API String ID: 41195575-1993550816
                              • Opcode ID: 13dcb630cae817d26763a7c5c34c1a537cec2b83c976c16d0abeb4614e4307e4
                              • Instruction ID: 2232a7e87341d92c9ad346ae082ec06308d60ff2d87fc7f715a57a5a5eae5b25
                              • Opcode Fuzzy Hash: 13dcb630cae817d26763a7c5c34c1a537cec2b83c976c16d0abeb4614e4307e4
                              • Instruction Fuzzy Hash: E5018071E40219BADB00DB94CC41BFEBBB8AB45711F10412BBA10B61C0D7B465018BA5
                              APIs
                              • CreateDirectoryA.KERNEL32(?,?,0042A400), ref: 00405619
                              • GetLastError.KERNEL32 ref: 0040562D
                              • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 00405642
                              • GetLastError.KERNEL32 ref: 0040564C
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: ErrorLast$CreateDirectoryFileSecurity
                              • String ID: ds@$ts@
                              • API String ID: 3449924974-968229870
                              • Opcode ID: f10b22bb5142ab39e3e91bc7df170e02474760785f1b3b99a39c7e09e389b4b4
                              • Instruction ID: f6395dc840433d181f75b3fc8fae80690a43e09e82cbb082af9cf45b84ce1534
                              • Opcode Fuzzy Hash: f10b22bb5142ab39e3e91bc7df170e02474760785f1b3b99a39c7e09e389b4b4
                              • Instruction Fuzzy Hash: 82010871D04259EAEF119FA0DC44BEFBFB8EB14314F008576D908B6280D779A604CFAA
                              APIs
                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C2E
                              • wsprintfA.USER32 ref: 00402C62
                              • SetWindowTextA.USER32(?,?), ref: 00402C72
                              • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402C84
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Text$ItemTimerWindowwsprintf
                              • String ID: unpacking data: %d%%$verifying installer: %d%%
                              • API String ID: 1451636040-1158693248
                              • Opcode ID: ef5ff3cba37bdb2e26199f17b8c5be3437539e0f0002abd4d10d443ac5288961
                              • Instruction ID: e0e458c2d16b5d3c5a169a1492fe07981551179f6e5c56f92d0567975436b572
                              • Opcode Fuzzy Hash: ef5ff3cba37bdb2e26199f17b8c5be3437539e0f0002abd4d10d443ac5288961
                              • Instruction Fuzzy Hash: 35F0317090420DABEF205F60CD0AFAE3769EB04345F00C43AFA16B51D0D7B99A55CB59
                              APIs
                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00406239
                              • wsprintfA.USER32 ref: 00406272
                              • LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 00406286
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: DirectoryLibraryLoadSystemwsprintf
                              • String ID: %s%s.dll$UXTHEME$\
                              • API String ID: 2200240437-4240819195
                              • Opcode ID: c7ba92785c192ffb77ecdfb90d0fa47c7b7783556fece6129122b9a6395f8fae
                              • Instruction ID: 4eb1d724573375327ef03b870ab6fb06d37159ba94d5fa14c1e1425601a81350
                              • Opcode Fuzzy Hash: c7ba92785c192ffb77ecdfb90d0fa47c7b7783556fece6129122b9a6395f8fae
                              • Instruction Fuzzy Hash: A2F0FC3090011AA7DB24B768DC0DFEB365CAB08305F1401BAA546E11D1D578F9258B69
                              APIs
                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040279D
                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 004027B9
                              • GlobalFree.KERNEL32(?), ref: 004027F2
                              • GlobalFree.KERNEL32(00000000), ref: 00402805
                              • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 0040281D
                              • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402831
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Global$AllocFree$CloseDeleteFileHandle
                              • String ID:
                              • API String ID: 2667972263-0
                              • Opcode ID: 127938ffedbdb685085fdf40d0208ae81fb03e7592c7cd39d7ae25b5127f120c
                              • Instruction ID: 589acf511f7bba285ed25554ef0f071862dbcd9cf46fffc414e4c77000f41e55
                              • Opcode Fuzzy Hash: 127938ffedbdb685085fdf40d0208ae81fb03e7592c7cd39d7ae25b5127f120c
                              • Instruction Fuzzy Hash: 5E219A71C04128BBCF216FA5CE89DAE7A79AF09324F14423AF520762E1C6795D40DBA9
                              APIs
                              • CharNextA.USER32(?,*?|<>/":,00000000,00429000,75573410,0042A400,00000000,0040329A,0042A400,0042A400,004034AF), ref: 004061BA
                              • CharNextA.USER32(?,?,?,00000000), ref: 004061C7
                              • CharNextA.USER32(?,00429000,75573410,0042A400,00000000,0040329A,0042A400,0042A400,004034AF), ref: 004061CC
                              • CharPrevA.USER32(?,?,75573410,0042A400,00000000,0040329A,0042A400,0042A400,004034AF), ref: 004061DC
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Char$Next$Prev
                              • String ID: *?|<>/":
                              • API String ID: 589700163-165019052
                              • Opcode ID: 2fcb21d4fe3ff3b998ebc2bd8af41eb25bf4dc23d8027269f2ae341fb2b2b84f
                              • Instruction ID: 28f88d73301ddfe76a8902f897fcc58808f561dcfc6ac49559e28e986a88295b
                              • Opcode Fuzzy Hash: 2fcb21d4fe3ff3b998ebc2bd8af41eb25bf4dc23d8027269f2ae341fb2b2b84f
                              • Instruction Fuzzy Hash: AF11C8718083912DFB3216644C44B777F998F9A760F19007BE9D6762C3C67C5C53826D
                              APIs
                              • lstrcatA.KERNEL32(00000000,00000000,00409400,00429800,00000000,00000000,00000031), ref: 00401798
                              • CompareFileTime.KERNEL32(-00000014,?,00409400,00409400,00000000,00000000,00409400,00429800,00000000,00000000,00000031), ref: 004017C2
                                • Part of subcall function 00405EF7: lstrcpynA.KERNEL32(?,?,00000400,0040336D,00422F20,NSIS Error), ref: 00405F04
                                • Part of subcall function 00405110: lstrlenA.KERNEL32(0041F510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000,?), ref: 00405149
                                • Part of subcall function 00405110: lstrlenA.KERNEL32(00402D22,0041F510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000), ref: 00405159
                                • Part of subcall function 00405110: lstrcatA.KERNEL32(0041F510,00402D22,00402D22,0041F510,00000000,00000000,00000000), ref: 0040516C
                                • Part of subcall function 00405110: SetWindowTextA.USER32(0041F510,0041F510), ref: 0040517E
                                • Part of subcall function 00405110: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A4
                                • Part of subcall function 00405110: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051BE
                                • Part of subcall function 00405110: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051CC
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                              • String ID:
                              • API String ID: 1941528284-0
                              • Opcode ID: 385cb254830b3dbcb0c35d99c8dbf43eaeb3157a66b4005c67f4322c39a81f81
                              • Instruction ID: 1ba5c428860e61568eef0a4ccac71dac967fbf7ecb8295bcfefdc03a30224d69
                              • Opcode Fuzzy Hash: 385cb254830b3dbcb0c35d99c8dbf43eaeb3157a66b4005c67f4322c39a81f81
                              • Instruction Fuzzy Hash: 2341F471A04515BACF107BB5DC45EAF3678EF41328B20823BF021B11E2DA3C8A419FAD
                              APIs
                              • RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?), ref: 00402B2F
                              • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402B6B
                              • RegCloseKey.ADVAPI32(?), ref: 00402B74
                              • RegCloseKey.ADVAPI32(?), ref: 00402B99
                              • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402BB7
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Close$DeleteEnumOpen
                              • String ID:
                              • API String ID: 1912718029-0
                              • Opcode ID: ba179b4ab06ec51544505c7bb4ef6d82f25395ff453b8f9fc11c3f7a3e81ed6a
                              • Instruction ID: cbb66f3b7e8ae2888f759c75a40f8dd5de3b5766fb854263a8955dc236021e84
                              • Opcode Fuzzy Hash: ba179b4ab06ec51544505c7bb4ef6d82f25395ff453b8f9fc11c3f7a3e81ed6a
                              • Instruction Fuzzy Hash: 39117C71A00108FFDF11AF90DE89DAA3B7DEB54345F004076FA05F10A0D378AE51AB69
                              APIs
                              • GetDC.USER32(?), ref: 00401D98
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DB2
                              • MulDiv.KERNEL32(00000000,00000000), ref: 00401DBA
                              • ReleaseDC.USER32(?,00000000), ref: 00401DCB
                              • CreateFontIndirectA.GDI32(0040A808), ref: 00401E1A
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: CapsCreateDeviceFontIndirectRelease
                              • String ID:
                              • API String ID: 3808545654-0
                              • Opcode ID: 384e23ba8be56f1d8b58cd2f78efa8b6131d55f969df9b920b0b3fd3205056ac
                              • Instruction ID: 31dc6bfce766dd2e9c365b6b9c1ce0fa0646d0edadaed3ffd0317ad467dc8ee1
                              • Opcode Fuzzy Hash: 384e23ba8be56f1d8b58cd2f78efa8b6131d55f969df9b920b0b3fd3205056ac
                              • Instruction Fuzzy Hash: 1E017572948340AFE7006B74AE4EB993FF4DB95315F10847AF201B62E2C6B905528F6E
                              APIs
                              • GetDlgItem.USER32(?), ref: 00401D3F
                              • GetClientRect.USER32(00000000,?), ref: 00401D4C
                              • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D6D
                              • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D7B
                              • DeleteObject.GDI32(00000000), ref: 00401D8A
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                              • String ID:
                              • API String ID: 1849352358-0
                              • Opcode ID: bd1a246c87c7f6178c6ecc63fdf164811e3027df84ebbbc61871bc77a69c7b8e
                              • Instruction ID: 3a73a5ecaa8fddf8dab02391599d10e6f088d4e67d6af50185a53a7dc2f76cba
                              • Opcode Fuzzy Hash: bd1a246c87c7f6178c6ecc63fdf164811e3027df84ebbbc61871bc77a69c7b8e
                              • Instruction Fuzzy Hash: D6F0FFB2A04119BFDB11EBA4DE88DAFBBBCEB44301B104476F601F2191C6749D018B79
                              APIs
                              • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C74
                              • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C8C
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: MessageSend$Timeout
                              • String ID: !
                              • API String ID: 1777923405-2657877971
                              • Opcode ID: ddb3ae1d6e1b3602016cf6e102a5b51033461e7a55de6e6a3b1605d6dd40c2f8
                              • Instruction ID: 023f80fe09a274ffd38664002148efa248b1b49841e283c842910b226ff12a9e
                              • Opcode Fuzzy Hash: ddb3ae1d6e1b3602016cf6e102a5b51033461e7a55de6e6a3b1605d6dd40c2f8
                              • Instruction Fuzzy Hash: BA219171A44208BEEB15EFA4DA46AED7FB1EF84314F24403EF101B61D1DA7886408B28
                              APIs
                              • lstrlenA.KERNEL32(0041FD30,0041FD30,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047EC,000000DF,00000000,00000400,?), ref: 0040496F
                              • wsprintfA.USER32 ref: 00404977
                              • SetDlgItemTextA.USER32(?,0041FD30), ref: 0040498A
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: ItemTextlstrlenwsprintf
                              • String ID: %u.%u%s%s
                              • API String ID: 3540041739-3551169577
                              • Opcode ID: 82e12f032b3efd850847d5b584d2a8547bd6d54b12269a14f91348113f1031b8
                              • Instruction ID: 7f1be1aa0c85ccb86495671cb382a06f82cddcf8175a130fa0267404931b34df
                              • Opcode Fuzzy Hash: 82e12f032b3efd850847d5b584d2a8547bd6d54b12269a14f91348113f1031b8
                              • Instruction Fuzzy Hash: CF11B7736041283BDB0065799D45EAF3298DB85374F250637FA25F21D1E978CC1255EC
                              APIs
                              • RegCreateKeyExA.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402411
                              • lstrlenA.KERNEL32(00409C00,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 00402431
                              • RegSetValueExA.ADVAPI32(?,?,?,?,00409C00,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040246E
                              • RegCloseKey.ADVAPI32(?,?,?,00409C00,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040254F
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: CloseCreateValuelstrlen
                              • String ID:
                              • API String ID: 1356686001-0
                              • Opcode ID: 65fbc6128c6ea6ccac0771d36d25ae40eb91bbe92aaef5046d3fe99f3cf24475
                              • Instruction ID: 45e6817f5ac0ad5077c8573445b5e51b6f54d3a00a8772886ac111494e5e57ea
                              • Opcode Fuzzy Hash: 65fbc6128c6ea6ccac0771d36d25ae40eb91bbe92aaef5046d3fe99f3cf24475
                              • Instruction Fuzzy Hash: B52181B1E00109BEEB10EFA4DE49EAF7BB8EB54358F20403AF505B61D1D6B95D019B28
                              APIs
                              • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 0040202A
                                • Part of subcall function 00405110: lstrlenA.KERNEL32(0041F510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000,?), ref: 00405149
                                • Part of subcall function 00405110: lstrlenA.KERNEL32(00402D22,0041F510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000), ref: 00405159
                                • Part of subcall function 00405110: lstrcatA.KERNEL32(0041F510,00402D22,00402D22,0041F510,00000000,00000000,00000000), ref: 0040516C
                                • Part of subcall function 00405110: SetWindowTextA.USER32(0041F510,0041F510), ref: 0040517E
                                • Part of subcall function 00405110: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A4
                                • Part of subcall function 00405110: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051BE
                                • Part of subcall function 00405110: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051CC
                              • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040203A
                              • GetProcAddress.KERNEL32(00000000,?), ref: 0040204A
                              • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 004020B4
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                              • String ID:
                              • API String ID: 2987980305-0
                              • Opcode ID: b9f0aec67fea9bc98c5863c357296edba73ca0e05b72c9a1f083ca6005b565f3
                              • Instruction ID: 7d08e1e337802b2334af88e0c199d29f708e40c37bf94ee781fb5d0f0b1c297d
                              • Opcode Fuzzy Hash: b9f0aec67fea9bc98c5863c357296edba73ca0e05b72c9a1f083ca6005b565f3
                              • Instruction Fuzzy Hash: 7B219571E00225F7DB207FA48E49A6E7A74AB44354F20417BF601B22D1D6BE4A42965E
                              APIs
                              • IsWindowVisible.USER32(?), ref: 004050B3
                              • CallWindowProcA.USER32(?,?,?,?), ref: 00405104
                                • Part of subcall function 00404128: SendMessageA.USER32(?,00000000,00000000,00000000), ref: 0040413A
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: Window$CallMessageProcSendVisible
                              • String ID:
                              • API String ID: 3748168415-3916222277
                              • Opcode ID: 0b9e3fe4afe9fd5950d24fc38bd805c0ffc83546a9c92a8d1e346af401a4be56
                              • Instruction ID: e292fc6bb5149b142bd52d3e096dd2ae09329e4c6d4eed70fd370e7000aba408
                              • Opcode Fuzzy Hash: 0b9e3fe4afe9fd5950d24fc38bd805c0ffc83546a9c92a8d1e346af401a4be56
                              • Instruction Fuzzy Hash: B2018F71504609ABDF205F11ED84AEF3765EB84750F208037FA01B92D1C77A9D92AFAE
                              APIs
                              • GetTickCount.KERNEL32 ref: 00405BAD
                              • GetTempFileNameA.KERNEL32(?,?,00000000,?), ref: 00405BC7
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: CountFileNameTempTick
                              • String ID: nsa
                              • API String ID: 1716503409-2209301699
                              • Opcode ID: fefc0482c854070ed442c91c2c9b831f833a608d20a08577fe9f9df7fb59a314
                              • Instruction ID: bfd989d901498d13fd43eebbd57bf0dae5b4b0e38faf5f28c0e1a6b78de2ea97
                              • Opcode Fuzzy Hash: fefc0482c854070ed442c91c2c9b831f833a608d20a08577fe9f9df7fb59a314
                              • Instruction Fuzzy Hash: B7F082367086046BEB108F55EC04B9B7BACDF91750F10C03BFA08DA1D0E6B5F9548B59
                              APIs
                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00421538,Error launching installer), ref: 004056B1
                              • CloseHandle.KERNEL32(?), ref: 004056BE
                              Strings
                              • Error launching installer, xrefs: 0040569B
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: CloseCreateHandleProcess
                              • String ID: Error launching installer
                              • API String ID: 3712363035-66219284
                              • Opcode ID: 8605fb0cc1bd08462260b177f6e223d0fe872a64a1cb3e3de70a479640e30f4e
                              • Instruction ID: a84e3f3112e4284354e87e930577f618970dfa48977d7da17d28cbc3385d6636
                              • Opcode Fuzzy Hash: 8605fb0cc1bd08462260b177f6e223d0fe872a64a1cb3e3de70a479640e30f4e
                              • Instruction Fuzzy Hash: 36E04FB0A002097FEB009B60EC05F7B7ABCE710204F808571BD01F2160D278A8008A78
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 813088101d1177fb169553b46c52c2ff17d2ea35d6802c76714b97bf352b3534
                              • Instruction ID: 2e33bf0a2efd24b19013112e0e3dc0c5d96cbb3b8ddfa3d6198f03b0ea5f4905
                              • Opcode Fuzzy Hash: 813088101d1177fb169553b46c52c2ff17d2ea35d6802c76714b97bf352b3534
                              • Instruction Fuzzy Hash: 38A14271E00229CBDF28CFA8C8447ADBBB1FF44305F15806AD856BB281D7789A96DF44
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 76287d30da9bd6127f444d76b1a2dea5d718215deeea3e4961f0482c034aff3f
                              • Instruction ID: b6fdc69984dd60fe5839cdbb69547f11a37967466e553f406be5e4f069ddcdf3
                              • Opcode Fuzzy Hash: 76287d30da9bd6127f444d76b1a2dea5d718215deeea3e4961f0482c034aff3f
                              • Instruction Fuzzy Hash: 06912371E00228CBDF28CF98C8547ADBBB1FF44305F15816AD856BB291C778AA96DF44
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9112cbabc6f4a79aea4e3429d0b79d6c933dfda102b28fdb5082a60d62602a4e
                              • Instruction ID: c7cee2028620334147dbeeecb81edbae78790ee6bd2d36d3aed28758d5738f0f
                              • Opcode Fuzzy Hash: 9112cbabc6f4a79aea4e3429d0b79d6c933dfda102b28fdb5082a60d62602a4e
                              • Instruction Fuzzy Hash: CF813471E00228DBDF24CFA8C844BADBBB1FF44305F25816AD856BB291D7389996DF14
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: db9708fb04e2e0ecb222d306fe81c02053fdbbf4ae968347cebcb7f9112ce6f9
                              • Instruction ID: 57d0a4a62e73b261e138738b2685f27b9a830e1577229771e06a9dcc4a08ef7a
                              • Opcode Fuzzy Hash: db9708fb04e2e0ecb222d306fe81c02053fdbbf4ae968347cebcb7f9112ce6f9
                              • Instruction Fuzzy Hash: DC816771E04228DBDF24CFA8C844BADBBB1FF44315F11816AD856BB280C7786996DF44
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 51b9571c4f2cef3f00a150e7480631ebf45f04a25ed8f4987f17413b8e50dd21
                              • Instruction ID: 7a0e56a60353855b6858f4e45cba095cd8fb81da81d2b3e1620468e36a0fecf5
                              • Opcode Fuzzy Hash: 51b9571c4f2cef3f00a150e7480631ebf45f04a25ed8f4987f17413b8e50dd21
                              • Instruction Fuzzy Hash: E2710371E00228DBDF28CFA8C844BADBBB1FF44305F15806AD856BB291D7389996DF54
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: cd56666480845857346ca32992c88f0ff24d6c501f81c377169dfb98ddf17ec5
                              • Instruction ID: 640397e2d056f1a05ee02a3664d9fcc147c5dfb75bdb54ac859d1c8af1b059c5
                              • Opcode Fuzzy Hash: cd56666480845857346ca32992c88f0ff24d6c501f81c377169dfb98ddf17ec5
                              • Instruction Fuzzy Hash: 7F712471E00228DBDF28CF98C844BADBBB1FF44305F15806AD856BB291C7789996DF48
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5b6ae2104ab0ec81b4e73fa48072ed289b5e7c7f1ead31899d3077504e5afad2
                              • Instruction ID: 45e0d9c6199636d87fa33ccb5d6651f7628d4ee42d5e4054af8bad143df77737
                              • Opcode Fuzzy Hash: 5b6ae2104ab0ec81b4e73fa48072ed289b5e7c7f1ead31899d3077504e5afad2
                              • Instruction Fuzzy Hash: D1714771E00228DBDF28CF98C844BADBBB1FF44305F15806AD956BB291C778AA56DF44
                              APIs
                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D2C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405ADF
                              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405AF7
                              • CharNextA.USER32(00000000,?,00000000,00405D2C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B08
                              • lstrlenA.KERNEL32(00000000,?,00000000,00405D2C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B11
                              Memory Dump Source
                              • Source File: 00000003.00000002.3344253630.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3344239012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344270852.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344288065.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3344314513.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_ODjwCjQBAP.jbxd
                              Similarity
                              • API ID: lstrlen$CharNextlstrcmpi
                              • String ID:
                              • API String ID: 190613189-0
                              • Opcode ID: ca0b18bb87844b4bf03c2f7d3918b69422ab9094ff5260ece92dc9b1c2472986
                              • Instruction ID: b8bae3ead32ec2695fa88c6f2b94aa478c41e31f8fdb951db119f3f4d21ee890
                              • Opcode Fuzzy Hash: ca0b18bb87844b4bf03c2f7d3918b69422ab9094ff5260ece92dc9b1c2472986
                              • Instruction Fuzzy Hash: C1F0C231605518BFCB029FA5DC4099FBBB8EF46350B2140A5F800F7250D274FE019BA9