Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
hca5qDUYZH.exe

Overview

General Information

Sample name:hca5qDUYZH.exe
renamed because original name is a hash value
Original sample name:1fc99b3f6aeb97b5038cca3d186cc114.exe
Analysis ID:1582678
MD5:1fc99b3f6aeb97b5038cca3d186cc114
SHA1:18ebdc4e20d22dcf620811861f02108ae601dc3e
SHA256:5f28460a67af2b71520bc2c2afa0548ad75f60abce185ccc0dd45935162e5295
Tags:exeuser-abuse_ch
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • hca5qDUYZH.exe (PID: 5460 cmdline: "C:\Users\user\Desktop\hca5qDUYZH.exe" MD5: 1FC99B3F6AEB97B5038CCA3D186CC114)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: hca5qDUYZH.exeVirustotal: Detection: 63%Perma Link
Source: hca5qDUYZH.exeReversingLabs: Detection: 52%
Source: hca5qDUYZH.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: C:\Users\user\Desktop\hca5qDUYZH.exeWindow detected: &Next >CancelMusicDevelopments RapidComposer v5 WiN-MAC MusicDevelopments RapidComposer v5 WiN-MACLicense AgreementPlease review the license terms before installing MusicDevelopments RapidComposer v5 WiN-MAC.Press Page Down to see the rest of the agreement.Welcome this is an important message and license agreement so please read all below carefully. MusicDevelopments RapidComposer v5 WiN-MAC is financed by advertisement. By clicking Accept you will continue with the installation of MusicDevelopments RapidComposer v5 WiN-MAC and the offers listed below.Get an unparalleled gaming and browsing experience on mobile and desktop with OperaGX. Set limits on CPU RAM and Network usage use Discord & Twitch from the sidebar and connect mobile and desktop browsers with the file-sharing Flow feature. By clicking "Accept" I agree to the EULA <https://legal.opera.com/eula/computers/> Privacy Policy <https://legal.opera.com/privacy/> and consent to install.clicking "I Agree" you agree to the EULA <http://goo.gl/fxTiKZ> and consent to install DotDo.ads in your browser without hassle. No more annoying advertiement and pop up ads!A proxy service to protect your privacy. Accept the EULA <https://www.termsfeed.com/live/4bb495ca-d123-4f4d-a727-e9c4d0f3fabe> by pressing "Agree". Y-Cleaner is fast and easy way to clean and keep your PC optimized.By clicking "Accept" I agree to the EULA <https://y-cleaner.com/eula.php > and consent to install.Total Security is provided by Qihoo 360 and trusted by millions of users worldwide to protect their systems. Whether you are shopping online downloading files or chatting with your friends you can be sure that 360 Total Security is there to keep you safe and your computer optimized. Accept the Privacy Policy <https://www.360totalsecurity.com/en/privacy/> by pressing "Agree". If you accept the terms of the agreement click I Agree to continue. You must accept the agreement to install MusicDevelopments RapidComposer v5 WiN-MAC.
Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: C:\Users\user\Desktop\hca5qDUYZH.exeCode function: 0_2_00405E61 FindFirstFileA,FindClose,0_2_00405E61
Source: C:\Users\user\Desktop\hca5qDUYZH.exeCode function: 0_2_0040548B CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_0040548B
Source: C:\Users\user\Desktop\hca5qDUYZH.exeCode function: 0_2_0040263E FindFirstFileA,0_2_0040263E
Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /star.php?a=3942&cc=DE&t=1735283824 HTTP/1.1User-Agent: InnoDownloadPlugin/1.5Host: lacecemetery.icuConnection: Keep-AliveCache-Control: no-cache
Source: global trafficDNS traffic detected: DNS query: lacecemetery.icu
Source: nseEC09.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: nseEC09.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: nseEC09.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: nseEC09.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: nseEC09.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: nseEC09.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: nseEC09.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: idman641build3.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: nseEC09.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: http://goo.gl/fxTiKZ
Source: nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/dol.php?paw=400431&spot=1&a=2666&on=420&o=1662&cr=
Source: nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/dol.php?paw=443709&spot=6&a=2666&on=460&o=1690&cr=
Source: nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/dol.php?paw=459484&spot=5&a=2666&on=440&o=1674&cr=
Source: nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/dol.php?paw=486977&spot=3&a=2666&on=487&o=1706&cr=
Source: nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/dol.php?paw=675554&spot=4&a=2666&on=443&o=1677&cr=
Source: nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/dol.php?paw=734044&spot=2&a=2666&on=310&o=365&cr=
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=1662&a=2666&dn=420&spot=1&
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=1674&a=2666&dn=440&spot=5&
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=1677&a=2666&dn=443&spot=4&
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=1690&a=2666&dn=460&spot=6&
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=1706&a=2666&dn=487&spot=3&
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=365&a=2666&dn=310&spot=2&t
Source: nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=1662&a=2666&dn=420&spot=1
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=1674&a=2666&dn=440&spot=5
Source: nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=1677&a=2666&dn=443&spot=4
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=1690&a=2666&dn=460&spot=6
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=1706&a=2666&dn=487&spot=3
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=365&a=2666&dn=310&spot=2&
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=1662&a=2666&dn=420&sp
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=1674&a=2666&dn=440&sp
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=1677&a=2666&dn=443&sp
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=1690&a=2666&dn=460&sp
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=1706&a=2666&dn=487&sp
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=365&a=2666&dn=310&spo
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=1662&a=2666&dn=420&spot=1&t=1
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=1674&a=2666&dn=440&spot=5&t=1
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=1677&a=2666&dn=443&spot=4&t=1
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=1690&a=2666&dn=460&spot=6&t=1
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=1706&a=2666&dn=487&spot=3&t=1
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=365&a=2666&dn=310&spot=2&t=17
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: http://log.egglamp.xyz/track_polosEU.php?tim=1735283824&rcc=DE&c=2666&p=0.27
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: http://log.egglamp.xyz/track_polosEU.php?tim=1735283824&rcc=DE&c=2666&p=0.27Inno
Source: hca5qDUYZH.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
Source: hca5qDUYZH.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: nseEC09.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://ocsp.digicert.com0
Source: nseEC09.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://ocsp.digicert.com0A
Source: nseEC09.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: nseEC09.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://ocsp.digicert.com0X
Source: nseEC09.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
Source: nseEC09.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://www.internetdownloadmanager.com6
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.000000000055A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lacecemetery.icu/
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.000000000055A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lacecemetery.icu/k
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.000000000055A000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: https://lacecemetery.icu/star.php?a=3942&cc=DE&t=1735283824
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.000000000055A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lacecemetery.icu/star.php?a=3942&cc=DE&t=1735283824G/
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: https://lacecemetery.icu/star.php?a=3942&cc=DE&t=1735283824InnoDownloadPlugin/1.5/USERAGENT/silentge
Source: hca5qDUYZH.exe, 00000000.00000002.3302524615.0000000005680000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lacecemetery.icu/star.php?a=3942&cc=DE&t=1735283824x
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: https://legal.opera.com/eula/computers/
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: https://legal.opera.com/privacy/
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: https://www.360totalsecurity.com/en/privacy/
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: https://www.termsfeed.com/live/4bb495ca-d123-4f4d-a727-e9c4d0f3fabe
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drString found in binary or memory: https://y-cleaner.com/eula.php
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: C:\Users\user\Desktop\hca5qDUYZH.exeCode function: 0_2_00405042 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405042

System Summary

barindex
Source: idman641build3.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_LOCKED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: C:\Users\user\Desktop\hca5qDUYZH.exeCode function: 0_2_0040323C EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_0040323C
Source: C:\Users\user\Desktop\hca5qDUYZH.exeCode function: 0_2_004048530_2_00404853
Source: C:\Users\user\Desktop\hca5qDUYZH.exeCode function: 0_2_004061310_2_00406131
Source: hca5qDUYZH.exe, 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameinetc.dllF vs hca5qDUYZH.exe
Source: hca5qDUYZH.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal52.winEXE@1/5@1/1
Source: C:\Users\user\Desktop\hca5qDUYZH.exeCode function: 0_2_00404356 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_00404356
Source: C:\Users\user\Desktop\hca5qDUYZH.exeCode function: 0_2_00402020 CoCreateInstance,MultiByteToWideChar,0_2_00402020
Source: C:\Users\user\Desktop\hca5qDUYZH.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\star[1].phpJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeFile created: C:\Users\user\AppData\Local\Temp\nsjEBD9.tmpJump to behavior
Source: hca5qDUYZH.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\hca5qDUYZH.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: hca5qDUYZH.exeVirustotal: Detection: 63%
Source: hca5qDUYZH.exeReversingLabs: Detection: 52%
Source: C:\Users\user\Desktop\hca5qDUYZH.exeFile read: C:\Users\user\Desktop\hca5qDUYZH.exeJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: acgenral.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeWindow detected: &Next >CancelMusicDevelopments RapidComposer v5 WiN-MAC MusicDevelopments RapidComposer v5 WiN-MACLicense AgreementPlease review the license terms before installing MusicDevelopments RapidComposer v5 WiN-MAC.Press Page Down to see the rest of the agreement.Welcome this is an important message and license agreement so please read all below carefully. MusicDevelopments RapidComposer v5 WiN-MAC is financed by advertisement. By clicking Accept you will continue with the installation of MusicDevelopments RapidComposer v5 WiN-MAC and the offers listed below.Get an unparalleled gaming and browsing experience on mobile and desktop with OperaGX. Set limits on CPU RAM and Network usage use Discord & Twitch from the sidebar and connect mobile and desktop browsers with the file-sharing Flow feature. By clicking "Accept" I agree to the EULA <https://legal.opera.com/eula/computers/> Privacy Policy <https://legal.opera.com/privacy/> and consent to install.clicking "I Agree" you agree to the EULA <http://goo.gl/fxTiKZ> and consent to install DotDo.ads in your browser without hassle. No more annoying advertiement and pop up ads!A proxy service to protect your privacy. Accept the EULA <https://www.termsfeed.com/live/4bb495ca-d123-4f4d-a727-e9c4d0f3fabe> by pressing "Agree". Y-Cleaner is fast and easy way to clean and keep your PC optimized.By clicking "Accept" I agree to the EULA <https://y-cleaner.com/eula.php > and consent to install.Total Security is provided by Qihoo 360 and trusted by millions of users worldwide to protect their systems. Whether you are shopping online downloading files or chatting with your friends you can be sure that 360 Total Security is there to keep you safe and your computer optimized. Accept the Privacy Policy <https://www.360totalsecurity.com/en/privacy/> by pressing "Agree". If you accept the terms of the agreement click I Agree to continue. You must accept the agreement to install MusicDevelopments RapidComposer v5 WiN-MAC.
Source: hca5qDUYZH.exeStatic file information: File size 11391040 > 1048576
Source: C:\Users\user\Desktop\hca5qDUYZH.exeCode function: 0_2_00405E88 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405E88
Source: C:\Users\user\Desktop\hca5qDUYZH.exeFile created: C:\idman641build3.exeJump to dropped file
Source: C:\Users\user\Desktop\hca5qDUYZH.exeFile created: C:\Users\user\AppData\Local\Temp\nsj455.tmp\inetc.dllJump to dropped file
Source: C:\Users\user\Desktop\hca5qDUYZH.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\hca5qDUYZH.exeDropped PE file which has not been started: C:\idman641build3.exeJump to dropped file
Source: C:\Users\user\Desktop\hca5qDUYZH.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsj455.tmp\inetc.dllJump to dropped file
Source: C:\Users\user\Desktop\hca5qDUYZH.exeCode function: 0_2_00405E61 FindFirstFileA,FindClose,0_2_00405E61
Source: C:\Users\user\Desktop\hca5qDUYZH.exeCode function: 0_2_0040548B CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_0040548B
Source: C:\Users\user\Desktop\hca5qDUYZH.exeCode function: 0_2_0040263E FindFirstFileA,0_2_0040263E
Source: hca5qDUYZH.exe, 00000000.00000002.3301434268.000000000055A000.00000004.00000020.00020000.00000000.sdmp, hca5qDUYZH.exe, 00000000.00000002.3301434268.00000000005A5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\hca5qDUYZH.exeAPI call chain: ExitProcess graph end nodegraph_0-3398
Source: C:\Users\user\Desktop\hca5qDUYZH.exeAPI call chain: ExitProcess graph end nodegraph_0-3400
Source: C:\Users\user\Desktop\hca5qDUYZH.exeCode function: 0_2_00405E88 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405E88
Source: C:\Users\user\Desktop\hca5qDUYZH.exeCode function: 0_2_00405B88 GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405B88
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
OS Credential Dumping1
Query Registry
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
DLL Side-Loading
LSASS Memory1
Security Software Discovery
Remote Desktop Protocol1
Clipboard Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager2
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS3
System Information Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
hca5qDUYZH.exe64%VirustotalBrowse
hca5qDUYZH.exe53%ReversingLabsWin32.Trojan.Etset
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\nsj455.tmp\inetc.dll5%ReversingLabs
C:\idman641build3.exe5%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://log.egglamp.xyz/track_polosEU.php?tim=1735283824&rcc=DE&c=2666&p=0.270%Avira URL Cloudsafe
http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=1690&a=2666&dn=460&spot=6&0%Avira URL Cloudsafe
http://lacecemetery.icu/dol.php?paw=734044&spot=2&a=2666&on=310&o=365&cr=0%Avira URL Cloudsafe
http://www.internetdownloadmanager.com60%Avira URL Cloudsafe
https://lacecemetery.icu/star.php?a=3942&cc=DE&t=1735283824x0%Avira URL Cloudsafe
http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=1706&a=2666&dn=487&spot=3&t=10%Avira URL Cloudsafe
http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=1677&a=2666&dn=443&spot=4&0%Avira URL Cloudsafe
http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=1677&a=2666&dn=443&spot=4&t=10%Avira URL Cloudsafe
http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=1706&a=2666&dn=487&sp0%Avira URL Cloudsafe
http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=365&a=2666&dn=310&spot=2&0%Avira URL Cloudsafe
https://lacecemetery.icu/star.php?a=3942&cc=DE&t=17352838240%Avira URL Cloudsafe
http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=1706&a=2666&dn=487&spot=30%Avira URL Cloudsafe
https://lacecemetery.icu/star.php?a=3942&cc=DE&t=1735283824InnoDownloadPlugin/1.5/USERAGENT/silentge0%Avira URL Cloudsafe
http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=1662&a=2666&dn=420&sp0%Avira URL Cloudsafe
http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=1690&a=2666&dn=460&spot=6&t=10%Avira URL Cloudsafe
https://y-cleaner.com/eula.php0%Avira URL Cloudsafe
http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=365&a=2666&dn=310&spot=2&t0%Avira URL Cloudsafe
http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=365&a=2666&dn=310&spot=2&t=170%Avira URL Cloudsafe
https://lacecemetery.icu/star.php?a=3942&cc=DE&t=1735283824G/0%Avira URL Cloudsafe
http://lacecemetery.icu/dol.php?paw=443709&spot=6&a=2666&on=460&o=1690&cr=0%Avira URL Cloudsafe
http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=1674&a=2666&dn=440&spot=5&t=10%Avira URL Cloudsafe
http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=1662&a=2666&dn=420&spot=1&t=10%Avira URL Cloudsafe
http://lacecemetery.icu/dol.php?paw=486977&spot=3&a=2666&on=487&o=1706&cr=0%Avira URL Cloudsafe
http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=365&a=2666&dn=310&spo0%Avira URL Cloudsafe
http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=1690&a=2666&dn=460&spot=60%Avira URL Cloudsafe
http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=1674&a=2666&dn=440&sp0%Avira URL Cloudsafe
http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=1662&a=2666&dn=420&spot=1&0%Avira URL Cloudsafe
http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=1674&a=2666&dn=440&spot=50%Avira URL Cloudsafe
http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=1662&a=2666&dn=420&spot=10%Avira URL Cloudsafe
http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=1677&a=2666&dn=443&spot=40%Avira URL Cloudsafe
http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=1677&a=2666&dn=443&sp0%Avira URL Cloudsafe
https://lacecemetery.icu/0%Avira URL Cloudsafe
http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=1690&a=2666&dn=460&sp0%Avira URL Cloudsafe
https://lacecemetery.icu/k0%Avira URL Cloudsafe
http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=1674&a=2666&dn=440&spot=5&0%Avira URL Cloudsafe
http://log.egglamp.xyz/track_polosEU.php?tim=1735283824&rcc=DE&c=2666&p=0.27Inno0%Avira URL Cloudsafe
http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=1706&a=2666&dn=487&spot=3&0%Avira URL Cloudsafe
http://lacecemetery.icu/dol.php?paw=400431&spot=1&a=2666&on=420&o=1662&cr=0%Avira URL Cloudsafe
http://lacecemetery.icu/dol.php?paw=675554&spot=4&a=2666&on=443&o=1677&cr=0%Avira URL Cloudsafe
http://lacecemetery.icu/dol.php?paw=459484&spot=5&a=2666&on=440&o=1674&cr=0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
lacecemetery.icu
188.114.96.3
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://lacecemetery.icu/star.php?a=3942&cc=DE&t=1735283824false
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=1690&a=2666&dn=460&spot=6&hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
    • Avira URL Cloud: safe
    unknown
    http://log.egglamp.xyz/track_polosEU.php?tim=1735283824&rcc=DE&c=2666&p=0.27hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
    • Avira URL Cloud: safe
    unknown
    http://lacecemetery.icu/dol.php?paw=734044&spot=2&a=2666&on=310&o=365&cr=nseEC09.tmp.0.drfalse
    • Avira URL Cloud: safe
    unknown
    http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=1677&a=2666&dn=443&spot=4&t=1hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
    • Avira URL Cloud: safe
    unknown
    http://www.internetdownloadmanager.com6nseEC09.tmp.0.dr, idman641build3.exe.0.drfalse
    • Avira URL Cloud: safe
    unknown
    http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=1706&a=2666&dn=487&spot=3&t=1hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
    • Avira URL Cloud: safe
    unknown
    http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=365&a=2666&dn=310&spot=2&hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
    • Avira URL Cloud: safe
    unknown
    http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=1706&a=2666&dn=487&sphca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
    • Avira URL Cloud: safe
    unknown
    http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=1677&a=2666&dn=443&spot=4&hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
    • Avira URL Cloud: safe
    unknown
    https://lacecemetery.icu/star.php?a=3942&cc=DE&t=1735283824xhca5qDUYZH.exe, 00000000.00000002.3302524615.0000000005680000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=1706&a=2666&dn=487&spot=3hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
    • Avira URL Cloud: safe
    unknown
    http://nsis.sf.net/NSIS_ErrorErrorhca5qDUYZH.exefalse
      high
      https://lacecemetery.icu/star.php?a=3942&cc=DE&t=1735283824InnoDownloadPlugin/1.5/USERAGENT/silentgehca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=1690&a=2666&dn=460&spot=6&t=1hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
      • Avira URL Cloud: safe
      unknown
      https://y-cleaner.com/eula.phphca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=1662&a=2666&dn=420&sphca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=365&a=2666&dn=310&spot=2&thca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=365&a=2666&dn=310&spot=2&t=17hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
      • Avira URL Cloud: safe
      unknown
      https://lacecemetery.icu/star.php?a=3942&cc=DE&t=1735283824G/hca5qDUYZH.exe, 00000000.00000002.3301434268.000000000055A000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://lacecemetery.icu/dol.php?paw=443709&spot=6&a=2666&on=460&o=1690&cr=nseEC09.tmp.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=1674&a=2666&dn=440&spot=5&t=1hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
      • Avira URL Cloud: safe
      unknown
      https://www.termsfeed.com/live/4bb495ca-d123-4f4d-a727-e9c4d0f3fabehca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
        high
        http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=1662&a=2666&dn=420&spot=1&t=1hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
        • Avira URL Cloud: safe
        unknown
        https://www.360totalsecurity.com/en/privacy/hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
          high
          http://goo.gl/fxTiKZhca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
            high
            http://lacecemetery.icu/dol.php?paw=486977&spot=3&a=2666&on=487&o=1706&cr=nseEC09.tmp.0.drfalse
            • Avira URL Cloud: safe
            unknown
            http://nsis.sf.net/NSIS_Errorhca5qDUYZH.exefalse
              high
              http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=365&a=2666&dn=310&spohca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
              • Avira URL Cloud: safe
              unknown
              http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=1690&a=2666&dn=460&spot=6hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
              • Avira URL Cloud: safe
              unknown
              http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=1662&a=2666&dn=420&spot=1&hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
              • Avira URL Cloud: safe
              unknown
              http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=1674&a=2666&dn=440&sphca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
              • Avira URL Cloud: safe
              unknown
              http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=1662&a=2666&dn=420&spot=1nseEC09.tmp.0.drfalse
              • Avira URL Cloud: safe
              unknown
              https://lacecemetery.icu/hca5qDUYZH.exe, 00000000.00000002.3301434268.000000000055A000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://log.egglamp.xyz/track_polosEU.php?tim=1735283824&rcc=DE&c=2666&p=0.27Innohca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
              • Avira URL Cloud: safe
              unknown
              http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=1674&a=2666&dn=440&spot=5hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
              • Avira URL Cloud: safe
              unknown
              http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=1677&a=2666&dn=443&spot=4nseEC09.tmp.0.drfalse
              • Avira URL Cloud: safe
              unknown
              http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=1677&a=2666&dn=443&sphca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
              • Avira URL Cloud: safe
              unknown
              http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=1690&a=2666&dn=460&sphca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
              • Avira URL Cloud: safe
              unknown
              https://legal.opera.com/eula/computers/hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
                high
                http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=1674&a=2666&dn=440&spot=5&hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
                • Avira URL Cloud: safe
                unknown
                https://lacecemetery.icu/khca5qDUYZH.exe, 00000000.00000002.3301434268.000000000055A000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://legal.opera.com/privacy/hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
                  high
                  http://lacecemetery.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=1706&a=2666&dn=487&spot=3&hca5qDUYZH.exe, 00000000.00000002.3301434268.0000000000522000.00000004.00000020.00020000.00000000.sdmp, nseEC09.tmp.0.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://lacecemetery.icu/dol.php?paw=400431&spot=1&a=2666&on=420&o=1662&cr=nseEC09.tmp.0.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://lacecemetery.icu/dol.php?paw=459484&spot=5&a=2666&on=440&o=1674&cr=nseEC09.tmp.0.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://lacecemetery.icu/dol.php?paw=675554&spot=4&a=2666&on=443&o=1677&cr=nseEC09.tmp.0.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  188.114.96.3
                  lacecemetery.icuEuropean Union
                  13335CLOUDFLARENETUSfalse
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1582678
                  Start date and time:2024-12-31 09:17:10 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 4m 42s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:4
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:hca5qDUYZH.exe
                  renamed because original name is a hash value
                  Original Sample Name:1fc99b3f6aeb97b5038cca3d186cc114.exe
                  Detection:MAL
                  Classification:mal52.winEXE@1/5@1/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 37
                  • Number of non-executed functions: 26
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                  • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.45, 172.202.163.200
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  No simulations
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  188.114.96.3QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                  • filetransfer.io/data-package/u7ghXEYp/download
                  CV_ Filipa Barbosa.exeGet hashmaliciousFormBookBrowse
                  • www.mffnow.info/1a34/
                  A2028041200SD.exeGet hashmaliciousFormBookBrowse
                  • www.mydreamdeal.click/1ag2/
                  SWIFT COPY 0028_pdf.exeGet hashmaliciousFormBookBrowse
                  • www.questmatch.pro/ipd6/
                  QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                  • filetransfer.io/data-package/I7fmQg9d/download
                  need quotations.exeGet hashmaliciousFormBookBrowse
                  • www.rtpwslot888gol.sbs/jmkz/
                  QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                  • filetransfer.io/data-package/Bh1Kj4RD/download
                  http://kklk16.bsyo45ksda.topGet hashmaliciousUnknownBrowse
                  • kklk16.bsyo45ksda.top/favicon.ico
                  QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                  • filetransfer.io/data-package/XrlEIxYp/download
                  QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                  • filetransfer.io/data-package/XrlEIxYp/download
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  CLOUDFLARENETUSPO_2024_056209_MQ04865_ENQ_1045.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                  • 188.114.96.3
                  DIS_37745672.pdfGet hashmaliciousKnowBe4, PDFPhishBrowse
                  • 104.17.247.203
                  Poket.mp4.htaGet hashmaliciousLummaCBrowse
                  • 188.114.97.3
                  https://nutricarm.es/wp-templates/f8b83.phpGet hashmaliciousUnknownBrowse
                  • 104.21.96.1
                  Exlan_setup_v3.1.2.exeGet hashmaliciousLummaCBrowse
                  • 172.67.157.254
                  RtU8kXPnKr.exeGet hashmaliciousQuasarBrowse
                  • 104.26.12.205
                  http://ghostbin.cafe24.com/Get hashmaliciousUnknownBrowse
                  • 104.18.27.193
                  http://parrottalks.infoGet hashmaliciousUnknownBrowse
                  • 1.1.1.1
                  https://gogl.to/3HGTGet hashmaliciousCAPTCHA Scam ClickFix, DcRat, KeyLogger, StormKitty, VenomRATBrowse
                  • 104.17.208.240
                  Fizzy Loader.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                  • 162.159.138.232
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  37f463bf4616ecd445d4a1937da06e19Loader.exeGet hashmaliciousMeduza StealerBrowse
                  • 188.114.96.3
                  setup.msiGet hashmaliciousUnknownBrowse
                  • 188.114.96.3
                  BHgwhz3lGN.exeGet hashmaliciousVidarBrowse
                  • 188.114.96.3
                  Open Purchase Order Summary Details-16-12-2024.vbsGet hashmaliciousLodaRAT, XRedBrowse
                  • 188.114.96.3
                  Open Purchase Order Summary Sheet.vbsGet hashmaliciousLodaRAT, XRedBrowse
                  • 188.114.96.3
                  Purchase Order Summary Details.vbsGet hashmaliciousLodaRAT, XRedBrowse
                  • 188.114.96.3
                  Purchase Order Summary Details.vbsGet hashmaliciousLodaRAT, XRedBrowse
                  • 188.114.96.3
                  xyxmml.msiGet hashmaliciousXRedBrowse
                  • 188.114.96.3
                  valyzt.msiGet hashmaliciousXRedBrowse
                  • 188.114.96.3
                  VKKDXE.exeGet hashmaliciousLodaRAT, XRedBrowse
                  • 188.114.96.3
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  C:\Users\user\AppData\Local\Temp\nsj455.tmp\inetc.dllEB2UOXRNsE.exeGet hashmaliciousUnknownBrowse
                    winrar-x64-620b2.exeGet hashmaliciousUnknownBrowse
                      quTbWcnSay.exeGet hashmaliciousUnknownBrowse
                        A897F2A98B77B6BFB6DBC62BF37A872DFA90C06387607.exeGet hashmaliciousUnknownBrowse
                          0D79B46F4C9E6F78C0655E3B2A6DD2A0F7B47DB44513D.exeGet hashmaliciousUnknownBrowse
                            BB4D7CD815700D90E229D1D6FA672B46842B66FFEDE69.exeGet hashmaliciousUnknownBrowse
                              61487917009BBCC5F0DAC7840265060F070ADC22139FB.exeGet hashmaliciousUnknownBrowse
                                1787A87F208CD0898943BD70E7E76A2C8B1B39679B20A.exeGet hashmaliciousUnknownBrowse
                                  A6A4706B8EFFF748CD8FDB24D6421683BAF448C9881F3.exeGet hashmaliciousUnknownBrowse
                                    81B7FB00321A57D0632B50993D514D34E586E86564C13.exeGet hashmaliciousUnknownBrowse
                                      Process:C:\Users\user\Desktop\hca5qDUYZH.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):2
                                      Entropy (8bit):1.0
                                      Encrypted:false
                                      SSDEEP:3:+:+
                                      MD5:7FA3B767C460B54A2BE4D49030B349C7
                                      SHA1:FD1286353570C5703799BA76999323B7C7447B06
                                      SHA-256:9390298F3FB0C5B160498935D79CB139AEF28E1C47358B4BBBA61862B9C26E59
                                      SHA-512:22494AF556A0782623729D0B5A9878F80AA6C21A6F51D346771842D613F51073C3B02FAB211BAFF42FB1998F38B77250DC7A1C71DD98B4B00CAE9620A6102AD7
                                      Malicious:false
                                      Reputation:moderate, very likely benign file
                                      Preview:no
                                      Process:C:\Users\user\Desktop\hca5qDUYZH.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):11365569
                                      Entropy (8bit):7.996926262537068
                                      Encrypted:true
                                      SSDEEP:196608:rYq5pjxAwA/THcNwTAlAWzN+PpC6UQJlU/rnsfx+KNZeYez8aQHD2peix:rTtxAwAb8NwT1I+Z7inI+sZh/HKpR
                                      MD5:E23AC8229D67BC598EA126055A806E8E
                                      SHA1:AA0C7A399E517C67E86EE4A05E169921D72932B2
                                      SHA-256:C18ABA748AF49681E80B1D789D3202674DC155F36A989577D8D92D3601D2870C
                                      SHA-512:EEDE2A29A1B3343D55DDAFCB295A29F57BDB7C828E4EA03BD27746B63AC95B4E127998087825F8B54A78BBEA90BD680589D76AE8628C63A0E5859AB27CE620CA
                                      Malicious:false
                                      Reputation:low
                                      Preview:.\......,........................;.......Z.......[..........................................................................1...................................................................................................................................................................................f.......................J.......................L...............j.......................J.......................................................................................................C...........4........+..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\hca5qDUYZH.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):23040
                                      Entropy (8bit):5.540206398655926
                                      Encrypted:false
                                      SSDEEP:384:PWc7V9H6MVsnCPFN4DC5/kdhdj/ouVj19L0d10Ac9khYLMkIX0+GbyeEaI2sJ:PWqTH/V7tHSWutp
                                      MD5:CAB75D596ADF6BAC4BA6A8374DD71DE9
                                      SHA1:FB90D4F13331D0C9275FA815937A4FF22EAD6FA3
                                      SHA-256:89E24E4124B607F3F98E4DF508C4DDD2701D8F7FCF1DC6E2ABA11D56C97C0C5A
                                      SHA-512:510786599289C8793526969CFE0A96E049436D40809C1C351642B2C67D5FB2394CB20887010727A5DA35C52A20C5557AD940967053B1B59AD91CA1307208C391
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 5%
                                      Joe Sandbox View:
                                      • Filename: EB2UOXRNsE.exe, Detection: malicious, Browse
                                      • Filename: winrar-x64-620b2.exe, Detection: malicious, Browse
                                      • Filename: quTbWcnSay.exe, Detection: malicious, Browse
                                      • Filename: A897F2A98B77B6BFB6DBC62BF37A872DFA90C06387607.exe, Detection: malicious, Browse
                                      • Filename: 0D79B46F4C9E6F78C0655E3B2A6DD2A0F7B47DB44513D.exe, Detection: malicious, Browse
                                      • Filename: BB4D7CD815700D90E229D1D6FA672B46842B66FFEDE69.exe, Detection: malicious, Browse
                                      • Filename: 61487917009BBCC5F0DAC7840265060F070ADC22139FB.exe, Detection: malicious, Browse
                                      • Filename: 1787A87F208CD0898943BD70E7E76A2C8B1B39679B20A.exe, Detection: malicious, Browse
                                      • Filename: A6A4706B8EFFF748CD8FDB24D6421683BAF448C9881F3.exe, Detection: malicious, Browse
                                      • Filename: 81B7FB00321A57D0632B50993D514D34E586E86564C13.exe, Detection: malicious, Browse
                                      Reputation:moderate, very likely benign file
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........yP..*P..*P..*.:.*Y..*P..*...*.["*R..*.[#*Q..*.[.*Q..*]..*Q..*.[.*Q..*RichP..*........PE..L...?..V...........!.........^......!0.......@............................................@..........................D..l....D..d...............................X....................................................@..P............................text...!,.......................... ..`.rdata.......@.......2..............@..@.data...<<...P.......@..............@....rsrc................H..............@..@.reloc..X............R..............@..B................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\hca5qDUYZH.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):2
                                      Entropy (8bit):1.0
                                      Encrypted:false
                                      SSDEEP:3:+:+
                                      MD5:7FA3B767C460B54A2BE4D49030B349C7
                                      SHA1:FD1286353570C5703799BA76999323B7C7447B06
                                      SHA-256:9390298F3FB0C5B160498935D79CB139AEF28E1C47358B4BBBA61862B9C26E59
                                      SHA-512:22494AF556A0782623729D0B5A9878F80AA6C21A6F51D346771842D613F51073C3B02FAB211BAFF42FB1998F38B77250DC7A1C71DD98B4B00CAE9620A6102AD7
                                      Malicious:false
                                      Reputation:moderate, very likely benign file
                                      Preview:no
                                      Process:C:\Users\user\Desktop\hca5qDUYZH.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):11318936
                                      Entropy (8bit):7.9978182614168265
                                      Encrypted:true
                                      SSDEEP:196608:UYq5pjxAwA/THcNwTAlAWzN+PpC6UQJlU/rnsfx+KNZeYez8aQHD2peix:UTtxAwAb8NwT1I+Z7inI+sZh/HKpR
                                      MD5:D82CD880F4AB8A8E574C1CC049C99304
                                      SHA1:390579E601945CBBD122DC1AEFBA1B94E1EFEE2C
                                      SHA-256:E3F599DDFDDD248D8C94DD88297B69166860C722B9A2B1E6FDC40C34FF367AB0
                                      SHA-512:18C2481255B237C3C73D8B0105BA32A41659FCF3C85F5174EA8F6808DDE11FE057591513F4A3ADD2667F6D461ECD9A66C14E5BAA2FDEF87C6CFEC817606D4B66
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 5%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........@,R.!B..!B..!B..>Q..!B..=L..!B..>H..!B..>F..!B..!C..!B...I..!B...H..!B.L'D..!B.Rich.!B.........PE..L....o;c.................<...h.......B.......P....@..................................,.......................................D..x....p..xG...............)..............................................................d............................text....;.......<.................. ....data........P.......@..............@....rsrc...xG...p...H...\..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                      Entropy (8bit):7.999804147607238
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 92.16%
                                      • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:hca5qDUYZH.exe
                                      File size:11'391'040 bytes
                                      MD5:1fc99b3f6aeb97b5038cca3d186cc114
                                      SHA1:18ebdc4e20d22dcf620811861f02108ae601dc3e
                                      SHA256:5f28460a67af2b71520bc2c2afa0548ad75f60abce185ccc0dd45935162e5295
                                      SHA512:2fe8c8ff8aa5ab5a5e5c2421af3affe2ad47729c5c8c8bd4be37599872d18354988175b00ecbe7cb630ed1c7fa20b97ed81b3921ba26e9201e20825fb1c7e151
                                      SSDEEP:196608:6dmOgTh+l6dE0szYVlsBl8tw12hkRAjFofiGG2EJPbJPRAiYU7Vxnn1Rb+p59sV:6dmlh+l6dBsMVlsB8wA5J28lxZ7nPipW
                                      TLSH:6DB633BE3B81F6F6DE58267430DF55A387DB3642332EDA030E452D1AA02C7E7555BA08
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..iu..i...iw..iu..i...i...id..i!..i...i...it..iRichu..i........................PE..L......K.................\.........
                                      Icon Hash:0771ccf8d84d2907
                                      Entrypoint:0x40323c
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                      DLL Characteristics:TERMINAL_SERVER_AWARE
                                      Time Stamp:0x4B1AE3C6 [Sat Dec 5 22:50:46 2009 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:099c0646ea7282d232219f8807883be0
                                      Instruction
                                      sub esp, 00000180h
                                      push ebx
                                      push ebp
                                      push esi
                                      xor ebx, ebx
                                      push edi
                                      mov dword ptr [esp+18h], ebx
                                      mov dword ptr [esp+10h], 00409130h
                                      xor esi, esi
                                      mov byte ptr [esp+14h], 00000020h
                                      call dword ptr [00407030h]
                                      push 00008001h
                                      call dword ptr [004070B4h]
                                      push ebx
                                      call dword ptr [0040727Ch]
                                      push 00000008h
                                      mov dword ptr [00423F58h], eax
                                      call 00007F72CCC32BAEh
                                      mov dword ptr [00423EA4h], eax
                                      push ebx
                                      lea eax, dword ptr [esp+34h]
                                      push 00000160h
                                      push eax
                                      push ebx
                                      push 0041F458h
                                      call dword ptr [00407158h]
                                      push 004091B8h
                                      push 004236A0h
                                      call 00007F72CCC32861h
                                      call dword ptr [004070B0h]
                                      mov edi, 00429000h
                                      push eax
                                      push edi
                                      call 00007F72CCC3284Fh
                                      push ebx
                                      call dword ptr [0040710Ch]
                                      cmp byte ptr [00429000h], 00000022h
                                      mov dword ptr [00423EA0h], eax
                                      mov eax, edi
                                      jne 00007F72CCC2FFACh
                                      mov byte ptr [esp+14h], 00000022h
                                      mov eax, 00429001h
                                      push dword ptr [esp+14h]
                                      push eax
                                      call 00007F72CCC32342h
                                      push eax
                                      call dword ptr [0040721Ch]
                                      mov dword ptr [esp+1Ch], eax
                                      jmp 00007F72CCC30005h
                                      cmp cl, 00000020h
                                      jne 00007F72CCC2FFA8h
                                      inc eax
                                      cmp byte ptr [eax], 00000020h
                                      je 00007F72CCC2FF9Ch
                                      cmp byte ptr [eax], 00000022h
                                      mov byte ptr [eax+eax+00h], 00000000h
                                      Programming Language:
                                      • [EXP] VC++ 6.0 SP5 build 8804
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x380000x3fe0.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x70000x28c.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x5a5a0x5c000bc2ffd32265a08d72b795b18265828dFalse0.6604534646739131data6.417698236857409IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x70000x11900x1200f179218a059068529bdb4637ef5fa28eFalse0.4453125data5.181627099249737IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0x90000x1af980x400975304d6dd6c4a4f076b15511e2bbbc0False0.55859375data4.70902740305165IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .ndata0x240000x140000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rsrc0x380000x3fe00x40006c8afe19b579117fedd2131322762f5cFalse0.63214111328125data5.949666716811652IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_ICON0x382e00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.7213883677298312
                                      RT_ICON0x393880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688, 256 important colorsEnglishUnited States0.6751066098081023
                                      RT_ICON0x3a2300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152, 256 important colorsEnglishUnited States0.7851985559566786
                                      RT_ICON0x3aad80x568Device independent bitmap graphic, 16 x 32 x 8, image size 320, 256 important colorsEnglishUnited States0.6560693641618497
                                      RT_ICON0x3b0400x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.8031914893617021
                                      RT_ICON0x3b4a80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.3118279569892473
                                      RT_ICON0x3b7900x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.36824324324324326
                                      RT_DIALOG0x3b8b80xb4dataEnglishUnited States0.6111111111111112
                                      RT_DIALOG0x3b9700x202dataEnglishUnited States0.4085603112840467
                                      RT_DIALOG0x3bb780xf8dataEnglishUnited States0.6290322580645161
                                      RT_DIALOG0x3bc700xeedataEnglishUnited States0.6260504201680672
                                      RT_GROUP_ICON0x3bd600x68dataEnglishUnited States0.6634615384615384
                                      RT_MANIFEST0x3bdc80x215XML 1.0 document, ASCII text, with very long lines (533), with no line terminatorsEnglishUnited States0.575984990619137
                                      DLLImport
                                      KERNEL32.dllCompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, CreateFileA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetFileTime, GetTempPathA, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetWindowsDirectoryA
                                      USER32.dllEndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
                                      GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
                                      SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
                                      ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
                                      COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                      ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                      VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      TimestampSource PortDest PortSource IPDest IP
                                      Dec 31, 2024 09:18:08.498593092 CET49704443192.168.2.5188.114.96.3
                                      Dec 31, 2024 09:18:08.498640060 CET44349704188.114.96.3192.168.2.5
                                      Dec 31, 2024 09:18:08.498718977 CET49704443192.168.2.5188.114.96.3
                                      Dec 31, 2024 09:18:08.508228064 CET49704443192.168.2.5188.114.96.3
                                      Dec 31, 2024 09:18:08.508240938 CET44349704188.114.96.3192.168.2.5
                                      Dec 31, 2024 09:18:08.983705044 CET44349704188.114.96.3192.168.2.5
                                      Dec 31, 2024 09:18:08.983874083 CET49704443192.168.2.5188.114.96.3
                                      Dec 31, 2024 09:18:09.297003031 CET49704443192.168.2.5188.114.96.3
                                      Dec 31, 2024 09:18:09.297022104 CET44349704188.114.96.3192.168.2.5
                                      Dec 31, 2024 09:18:09.297362089 CET44349704188.114.96.3192.168.2.5
                                      Dec 31, 2024 09:18:09.297457933 CET49704443192.168.2.5188.114.96.3
                                      Dec 31, 2024 09:18:09.299985886 CET49704443192.168.2.5188.114.96.3
                                      Dec 31, 2024 09:18:09.343332052 CET44349704188.114.96.3192.168.2.5
                                      Dec 31, 2024 09:18:09.435856104 CET44349704188.114.96.3192.168.2.5
                                      Dec 31, 2024 09:18:09.435905933 CET44349704188.114.96.3192.168.2.5
                                      Dec 31, 2024 09:18:09.435929060 CET49704443192.168.2.5188.114.96.3
                                      Dec 31, 2024 09:18:09.435988903 CET49704443192.168.2.5188.114.96.3
                                      Dec 31, 2024 09:18:09.443303108 CET49704443192.168.2.5188.114.96.3
                                      Dec 31, 2024 09:18:09.443321943 CET44349704188.114.96.3192.168.2.5
                                      TimestampSource PortDest PortSource IPDest IP
                                      Dec 31, 2024 09:18:08.477273941 CET6057153192.168.2.51.1.1.1
                                      Dec 31, 2024 09:18:08.493848085 CET53605711.1.1.1192.168.2.5
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Dec 31, 2024 09:18:08.477273941 CET192.168.2.51.1.1.10x178eStandard query (0)lacecemetery.icuA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Dec 31, 2024 09:18:08.493848085 CET1.1.1.1192.168.2.50x178eNo error (0)lacecemetery.icu188.114.96.3A (IP address)IN (0x0001)false
                                      Dec 31, 2024 09:18:08.493848085 CET1.1.1.1192.168.2.50x178eNo error (0)lacecemetery.icu188.114.97.3A (IP address)IN (0x0001)false
                                      • lacecemetery.icu
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.549704188.114.96.34435460C:\Users\user\Desktop\hca5qDUYZH.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-31 08:18:09 UTC161OUTGET /star.php?a=3942&cc=DE&t=1735283824 HTTP/1.1
                                      User-Agent: InnoDownloadPlugin/1.5
                                      Host: lacecemetery.icu
                                      Connection: Keep-Alive
                                      Cache-Control: no-cache
                                      2024-12-31 08:18:09 UTC790INHTTP/1.1 200 OK
                                      Date: Tue, 31 Dec 2024 08:18:09 GMT
                                      Content-Type: text/plain
                                      Content-Length: 2
                                      Connection: close
                                      X-Powered-By: PHP/5.5.38
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rFbaoTt7kciU2HbuW7CuB85dNbBlWwtsXXkIyF%2FVztoOx9KBhuKQBa5la%2BGt5o2kbvBxVBQACNEN8jL5%2BvfC8WrnZmFj9RavAOQog67IHJW0WV1QpwkLqdxh%2FkY3m9tGrc2d"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8fa8d6587f51c338-EWR
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1532&min_rtt=1524&rtt_var=589&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2838&recv_bytes=775&delivery_rate=1831869&cwnd=228&unsent_bytes=0&cid=a0978762752f52c8&ts=464&x=0"
                                      2024-12-31 08:18:09 UTC2INData Raw: 6e 6f
                                      Data Ascii: no


                                      Click to jump to process

                                      Click to jump to process

                                      Target ID:0
                                      Start time:03:18:01
                                      Start date:31/12/2024
                                      Path:C:\Users\user\Desktop\hca5qDUYZH.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\hca5qDUYZH.exe"
                                      Imagebase:0x400000
                                      File size:11'391'040 bytes
                                      MD5 hash:1FC99B3F6AEB97B5038CCA3D186CC114
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:false

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:21%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:22.7%
                                        Total number of Nodes:1260
                                        Total number of Limit Nodes:38
                                        execution_graph 3695 401cc1 GetDlgItem GetClientRect 3696 4029f6 18 API calls 3695->3696 3697 401cf1 LoadImageA SendMessageA 3696->3697 3698 40288b 3697->3698 3699 401d0f DeleteObject 3697->3699 3699->3698 3700 401dc1 3701 4029f6 18 API calls 3700->3701 3702 401dc7 3701->3702 3703 4029f6 18 API calls 3702->3703 3704 401dd0 3703->3704 3705 4029f6 18 API calls 3704->3705 3706 401dd9 3705->3706 3707 4029f6 18 API calls 3706->3707 3708 401de2 3707->3708 3709 401423 25 API calls 3708->3709 3710 401de9 ShellExecuteA 3709->3710 3711 401e16 3710->3711 3072 405042 3073 405063 GetDlgItem GetDlgItem GetDlgItem 3072->3073 3074 4051ee 3072->3074 3118 403f4d SendMessageA 3073->3118 3076 4051f7 GetDlgItem CreateThread CloseHandle 3074->3076 3077 40521f 3074->3077 3076->3077 3124 404fd6 OleInitialize 3076->3124 3079 40524a 3077->3079 3080 405236 ShowWindow ShowWindow 3077->3080 3081 40526c 3077->3081 3078 4050d4 3083 4050db GetClientRect GetSystemMetrics SendMessageA SendMessageA 3078->3083 3082 4052a8 3079->3082 3085 405281 ShowWindow 3079->3085 3086 40525b 3079->3086 3120 403f4d SendMessageA 3080->3120 3087 403f7f 8 API calls 3081->3087 3082->3081 3092 4052b3 SendMessageA 3082->3092 3090 40514a 3083->3090 3091 40512e SendMessageA SendMessageA 3083->3091 3088 4052a1 3085->3088 3089 405293 3085->3089 3121 403ef1 3086->3121 3099 40527a 3087->3099 3095 403ef1 SendMessageA 3088->3095 3094 404f04 25 API calls 3089->3094 3096 40515d 3090->3096 3097 40514f SendMessageA 3090->3097 3091->3090 3098 4052cc CreatePopupMenu 3092->3098 3092->3099 3094->3088 3095->3082 3101 403f18 19 API calls 3096->3101 3097->3096 3100 405b88 18 API calls 3098->3100 3102 4052dc AppendMenuA 3100->3102 3103 40516d 3101->3103 3104 405302 3102->3104 3105 4052ef GetWindowRect 3102->3105 3106 405176 ShowWindow 3103->3106 3107 4051aa GetDlgItem SendMessageA 3103->3107 3109 40530b TrackPopupMenu 3104->3109 3105->3109 3110 405199 3106->3110 3111 40518c ShowWindow 3106->3111 3107->3099 3108 4051d1 SendMessageA SendMessageA 3107->3108 3108->3099 3109->3099 3112 405329 3109->3112 3119 403f4d SendMessageA 3110->3119 3111->3110 3113 405345 SendMessageA 3112->3113 3113->3113 3115 405362 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3113->3115 3116 405384 SendMessageA 3115->3116 3116->3116 3117 4053a5 GlobalUnlock SetClipboardData CloseClipboard 3116->3117 3117->3099 3118->3078 3119->3107 3120->3079 3122 403ef8 3121->3122 3123 403efe SendMessageA 3121->3123 3122->3123 3123->3081 3131 403f64 3124->3131 3126 405020 3127 403f64 SendMessageA 3126->3127 3128 405032 OleUninitialize 3127->3128 3130 404ff9 3130->3126 3134 401389 3130->3134 3132 403f7c 3131->3132 3133 403f6d SendMessageA 3131->3133 3132->3130 3133->3132 3136 401390 3134->3136 3135 4013fe 3135->3130 3136->3135 3137 4013cb MulDiv SendMessageA 3136->3137 3137->3136 3276 403a45 3277 403b98 3276->3277 3278 403a5d 3276->3278 3280 403be9 3277->3280 3281 403ba9 GetDlgItem GetDlgItem 3277->3281 3278->3277 3279 403a69 3278->3279 3283 403a74 SetWindowPos 3279->3283 3284 403a87 3279->3284 3282 403c43 3280->3282 3290 401389 2 API calls 3280->3290 3285 403f18 19 API calls 3281->3285 3286 403f64 SendMessageA 3282->3286 3337 403b93 3282->3337 3283->3284 3287 403aa4 3284->3287 3288 403a8c ShowWindow 3284->3288 3289 403bd3 SetClassLongA 3285->3289 3335 403c55 3286->3335 3291 403ac6 3287->3291 3292 403aac DestroyWindow 3287->3292 3288->3287 3293 40140b 2 API calls 3289->3293 3294 403c1b 3290->3294 3295 403acb SetWindowLongA 3291->3295 3296 403adc 3291->3296 3345 403ea1 3292->3345 3293->3280 3294->3282 3299 403c1f SendMessageA 3294->3299 3295->3337 3297 403b85 3296->3297 3298 403ae8 GetDlgItem 3296->3298 3303 403f7f 8 API calls 3297->3303 3302 403afb SendMessageA IsWindowEnabled 3298->3302 3305 403b18 3298->3305 3299->3337 3300 40140b 2 API calls 3300->3335 3301 403ea3 DestroyWindow EndDialog 3301->3345 3302->3305 3302->3337 3303->3337 3304 403ed2 ShowWindow 3304->3337 3307 403b25 3305->3307 3308 403b6c SendMessageA 3305->3308 3309 403b38 3305->3309 3318 403b1d 3305->3318 3306 405b88 18 API calls 3306->3335 3307->3308 3307->3318 3308->3297 3312 403b40 3309->3312 3313 403b55 3309->3313 3310 403ef1 SendMessageA 3311 403b53 3310->3311 3311->3297 3349 40140b 3312->3349 3315 40140b 2 API calls 3313->3315 3314 403f18 19 API calls 3314->3335 3317 403b5c 3315->3317 3317->3297 3317->3318 3318->3310 3319 403f18 19 API calls 3320 403cd0 GetDlgItem 3319->3320 3321 403ce5 3320->3321 3322 403ced ShowWindow KiUserCallbackDispatcher 3320->3322 3321->3322 3346 403f3a KiUserCallbackDispatcher 3322->3346 3324 403d17 KiUserCallbackDispatcher 3327 403d2b 3324->3327 3325 403d30 GetSystemMenu EnableMenuItem SendMessageA 3326 403d60 SendMessageA 3325->3326 3325->3327 3326->3327 3327->3325 3347 403f4d SendMessageA 3327->3347 3348 405b66 lstrcpynA 3327->3348 3330 403d8e lstrlenA 3331 405b88 18 API calls 3330->3331 3332 403d9f SetWindowTextA 3331->3332 3333 401389 2 API calls 3332->3333 3333->3335 3334 403de3 DestroyWindow 3336 403dfd CreateDialogParamA 3334->3336 3334->3345 3335->3300 3335->3301 3335->3306 3335->3314 3335->3319 3335->3334 3335->3337 3338 403e30 3336->3338 3336->3345 3339 403f18 19 API calls 3338->3339 3340 403e3b GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3339->3340 3341 401389 2 API calls 3340->3341 3342 403e81 3341->3342 3342->3337 3343 403e89 ShowWindow 3342->3343 3344 403f64 SendMessageA 3343->3344 3344->3345 3345->3304 3345->3337 3346->3324 3347->3327 3348->3330 3350 401389 2 API calls 3349->3350 3351 401420 3350->3351 3351->3318 3712 401645 3713 4029f6 18 API calls 3712->3713 3714 40164c 3713->3714 3715 4029f6 18 API calls 3714->3715 3716 401655 3715->3716 3717 4029f6 18 API calls 3716->3717 3718 40165e MoveFileA 3717->3718 3719 401671 3718->3719 3720 40166a 3718->3720 3721 405e61 2 API calls 3719->3721 3724 402169 3719->3724 3722 401423 25 API calls 3720->3722 3723 401680 3721->3723 3722->3724 3723->3724 3725 4058b4 38 API calls 3723->3725 3725->3720 3726 401ec5 3727 4029f6 18 API calls 3726->3727 3728 401ecc GetFileVersionInfoSizeA 3727->3728 3729 401eef GlobalAlloc 3728->3729 3730 401f45 3728->3730 3729->3730 3731 401f03 GetFileVersionInfoA 3729->3731 3731->3730 3732 401f14 VerQueryValueA 3731->3732 3732->3730 3733 401f2d 3732->3733 3737 405ac4 wsprintfA 3733->3737 3735 401f39 3738 405ac4 wsprintfA 3735->3738 3737->3735 3738->3730 3739 4014ca 3740 404f04 25 API calls 3739->3740 3741 4014d1 3740->3741 3742 4025cc 3743 4025d3 3742->3743 3744 402838 3742->3744 3745 4029d9 18 API calls 3743->3745 3746 4025de 3745->3746 3747 4025e5 SetFilePointer 3746->3747 3747->3744 3748 4025f5 3747->3748 3750 405ac4 wsprintfA 3748->3750 3750->3744 3035 401f51 3036 401f63 3035->3036 3046 402012 3035->3046 3053 4029f6 3036->3053 3039 401423 25 API calls 3044 402169 3039->3044 3040 4029f6 18 API calls 3041 401f73 3040->3041 3042 401f88 LoadLibraryExA 3041->3042 3043 401f7b GetModuleHandleA 3041->3043 3045 401f98 GetProcAddress 3042->3045 3042->3046 3043->3042 3043->3045 3047 401fe5 3045->3047 3048 401fa8 3045->3048 3046->3039 3049 404f04 25 API calls 3047->3049 3051 401fb8 3048->3051 3059 401423 3048->3059 3049->3051 3051->3044 3052 402006 FreeLibrary 3051->3052 3052->3044 3054 402a02 3053->3054 3055 405b88 18 API calls 3054->3055 3056 402a23 3055->3056 3057 401f6a 3056->3057 3058 405dc8 5 API calls 3056->3058 3057->3040 3058->3057 3060 404f04 25 API calls 3059->3060 3061 401431 3060->3061 3061->3051 3758 404853 GetDlgItem GetDlgItem 3759 4048a7 7 API calls 3758->3759 3766 404ac4 3758->3766 3760 404940 SendMessageA 3759->3760 3761 40494d DeleteObject 3759->3761 3760->3761 3762 404958 3761->3762 3764 40498f 3762->3764 3765 405b88 18 API calls 3762->3765 3763 404bae 3768 404c5d 3763->3768 3773 404ab7 3763->3773 3774 404c07 SendMessageA 3763->3774 3767 403f18 19 API calls 3764->3767 3769 404971 SendMessageA SendMessageA 3765->3769 3766->3763 3793 404b38 3766->3793 3811 4047d3 SendMessageA 3766->3811 3772 4049a3 3767->3772 3770 404c72 3768->3770 3771 404c66 SendMessageA 3768->3771 3769->3762 3782 404c84 ImageList_Destroy 3770->3782 3783 404c8b 3770->3783 3787 404c9b 3770->3787 3771->3770 3778 403f18 19 API calls 3772->3778 3775 403f7f 8 API calls 3773->3775 3774->3773 3780 404c1c SendMessageA 3774->3780 3781 404e4d 3775->3781 3776 404ba0 SendMessageA 3776->3763 3790 4049b1 3778->3790 3779 404e01 3779->3773 3788 404e13 ShowWindow GetDlgItem ShowWindow 3779->3788 3784 404c2f 3780->3784 3782->3783 3785 404c94 GlobalFree 3783->3785 3783->3787 3796 404c40 SendMessageA 3784->3796 3785->3787 3786 404a85 GetWindowLongA SetWindowLongA 3789 404a9e 3786->3789 3787->3779 3795 40140b 2 API calls 3787->3795 3802 404ccd 3787->3802 3788->3773 3791 404aa4 ShowWindow 3789->3791 3792 404abc 3789->3792 3790->3786 3794 404a00 SendMessageA 3790->3794 3797 404a7f 3790->3797 3800 404a3c SendMessageA 3790->3800 3801 404a4d SendMessageA 3790->3801 3809 403f4d SendMessageA 3791->3809 3810 403f4d SendMessageA 3792->3810 3793->3763 3793->3776 3794->3790 3795->3802 3796->3768 3797->3786 3797->3789 3800->3790 3801->3790 3804 404d11 3802->3804 3805 404cfb SendMessageA 3802->3805 3803 404dd7 InvalidateRect 3803->3779 3806 404ded 3803->3806 3804->3803 3808 404d85 SendMessageA SendMessageA 3804->3808 3805->3804 3816 4046f1 3806->3816 3808->3804 3809->3773 3810->3766 3812 404832 SendMessageA 3811->3812 3813 4047f6 GetMessagePos ScreenToClient SendMessageA 3811->3813 3814 40482a 3812->3814 3813->3814 3815 40482f 3813->3815 3814->3793 3815->3812 3817 40470b 3816->3817 3818 405b88 18 API calls 3817->3818 3819 404740 3818->3819 3820 405b88 18 API calls 3819->3820 3821 40474b 3820->3821 3822 405b88 18 API calls 3821->3822 3823 40477c lstrlenA wsprintfA SetDlgItemTextA 3822->3823 3823->3779 3824 404e54 3825 404e62 3824->3825 3826 404e79 3824->3826 3827 404e68 3825->3827 3842 404ee2 3825->3842 3828 404e87 IsWindowVisible 3826->3828 3834 404e9e 3826->3834 3829 403f64 SendMessageA 3827->3829 3831 404e94 3828->3831 3828->3842 3832 404e72 3829->3832 3830 404ee8 CallWindowProcA 3830->3832 3833 4047d3 5 API calls 3831->3833 3833->3834 3834->3830 3843 405b66 lstrcpynA 3834->3843 3836 404ecd 3844 405ac4 wsprintfA 3836->3844 3838 404ed4 3839 40140b 2 API calls 3838->3839 3840 404edb 3839->3840 3845 405b66 lstrcpynA 3840->3845 3842->3830 3843->3836 3844->3838 3845->3842 3846 404356 3847 404394 3846->3847 3848 404387 3846->3848 3850 40439d GetDlgItem 3847->3850 3856 404400 3847->3856 3907 40540b GetDlgItemTextA 3848->3907 3852 4043b1 3850->3852 3851 40438e 3854 405dc8 5 API calls 3851->3854 3855 4043c5 SetWindowTextA 3852->3855 3859 4056ed 4 API calls 3852->3859 3853 4044e4 3904 404670 3853->3904 3909 40540b GetDlgItemTextA 3853->3909 3854->3847 3860 403f18 19 API calls 3855->3860 3856->3853 3861 405b88 18 API calls 3856->3861 3856->3904 3858 403f7f 8 API calls 3866 404684 3858->3866 3867 4043bb 3859->3867 3863 4043e3 3860->3863 3864 404476 SHBrowseForFolderA 3861->3864 3862 404510 3865 40573a 18 API calls 3862->3865 3868 403f18 19 API calls 3863->3868 3864->3853 3869 40448e CoTaskMemFree 3864->3869 3870 404516 3865->3870 3867->3855 3873 405659 3 API calls 3867->3873 3871 4043f1 3868->3871 3872 405659 3 API calls 3869->3872 3910 405b66 lstrcpynA 3870->3910 3908 403f4d SendMessageA 3871->3908 3875 40449b 3872->3875 3873->3855 3878 4044d2 SetDlgItemTextA 3875->3878 3882 405b88 18 API calls 3875->3882 3877 4043f9 3880 405e88 3 API calls 3877->3880 3878->3853 3879 40452d 3881 405e88 3 API calls 3879->3881 3880->3856 3889 404535 3881->3889 3883 4044ba lstrcmpiA 3882->3883 3883->3878 3886 4044cb lstrcatA 3883->3886 3884 40456f 3911 405b66 lstrcpynA 3884->3911 3886->3878 3887 404578 3888 4056ed 4 API calls 3887->3888 3890 40457e GetDiskFreeSpaceA 3888->3890 3889->3884 3893 4056a0 2 API calls 3889->3893 3894 4045c2 3889->3894 3892 4045a0 MulDiv 3890->3892 3890->3894 3892->3894 3893->3889 3895 4046f1 21 API calls 3894->3895 3905 40461f 3894->3905 3896 404611 3895->3896 3899 404621 SetDlgItemTextA 3896->3899 3900 404616 3896->3900 3897 40140b 2 API calls 3901 404642 3897->3901 3899->3905 3903 4046f1 21 API calls 3900->3903 3912 403f3a KiUserCallbackDispatcher 3901->3912 3902 40465e 3902->3904 3906 4042eb SendMessageA 3902->3906 3903->3905 3904->3858 3905->3897 3905->3901 3906->3904 3907->3851 3908->3877 3909->3862 3910->3879 3911->3887 3912->3902 3913 4014d6 3914 4029d9 18 API calls 3913->3914 3915 4014dc Sleep 3914->3915 3917 40288b 3915->3917 3923 4018d8 3924 40190f 3923->3924 3925 4029f6 18 API calls 3924->3925 3926 401914 3925->3926 3927 40548b 68 API calls 3926->3927 3928 40191d 3927->3928 3929 4018db 3930 4029f6 18 API calls 3929->3930 3931 4018e2 3930->3931 3932 405427 MessageBoxIndirectA 3931->3932 3933 4018eb 3932->3933 2929 404060 2930 404076 2929->2930 2938 404183 2929->2938 2958 403f18 2930->2958 2931 4041f2 2932 4042c6 2931->2932 2933 4041fc GetDlgItem 2931->2933 2967 403f7f 2932->2967 2936 404212 2933->2936 2937 404284 2933->2937 2935 4040cc 2940 403f18 19 API calls 2935->2940 2936->2937 2944 404238 6 API calls 2936->2944 2937->2932 2945 404296 2937->2945 2938->2931 2938->2932 2941 4041c7 GetDlgItem SendMessageA 2938->2941 2943 4040d9 CheckDlgButton 2940->2943 2963 403f3a KiUserCallbackDispatcher 2941->2963 2942 4042c1 2961 403f3a KiUserCallbackDispatcher 2943->2961 2944->2937 2948 40429c SendMessageA 2945->2948 2949 4042ad 2945->2949 2948->2949 2949->2942 2953 4042b3 SendMessageA 2949->2953 2950 4041ed 2964 4042eb 2950->2964 2952 4040f7 GetDlgItem 2962 403f4d SendMessageA 2952->2962 2953->2942 2955 40410d SendMessageA 2956 404134 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 2955->2956 2957 40412b GetSysColor 2955->2957 2956->2942 2957->2956 2981 405b88 2958->2981 2961->2952 2962->2955 2963->2950 2965 4042f9 2964->2965 2966 4042fe SendMessageA 2964->2966 2965->2966 2966->2931 2968 403f97 GetWindowLongA 2967->2968 2969 404020 2967->2969 2968->2969 2970 403fa8 2968->2970 2969->2942 2971 403fb7 GetSysColor 2970->2971 2972 403fba 2970->2972 2971->2972 2973 403fc0 SetTextColor 2972->2973 2974 403fca SetBkMode 2972->2974 2973->2974 2975 403fe2 GetSysColor 2974->2975 2976 403fe8 2974->2976 2975->2976 2977 403ff9 2976->2977 2978 403fef SetBkColor 2976->2978 2977->2969 2979 404013 CreateBrushIndirect 2977->2979 2980 40400c DeleteObject 2977->2980 2978->2977 2979->2969 2980->2979 2992 405b95 2981->2992 2982 405daf 2983 403f23 SetDlgItemTextA 2982->2983 3016 405b66 lstrcpynA 2982->3016 2983->2935 2985 405c2d GetVersion 2994 405c3a 2985->2994 2986 405d86 lstrlenA 2986->2992 2987 405b88 10 API calls 2987->2986 2990 405ca5 GetSystemDirectoryA 2990->2994 2992->2982 2992->2985 2992->2986 2992->2987 3005 405dc8 2992->3005 3014 405ac4 wsprintfA 2992->3014 3015 405b66 lstrcpynA 2992->3015 2993 405cb8 GetWindowsDirectoryA 2993->2994 2994->2990 2994->2992 2994->2993 2996 405b88 10 API calls 2994->2996 2997 405d2f lstrcatA 2994->2997 2998 405cec SHGetSpecialFolderLocation 2994->2998 3000 405a4d RegOpenKeyExA 2994->3000 2996->2994 2997->2992 2998->2994 2999 405d04 SHGetPathFromIDListA CoTaskMemFree 2998->2999 2999->2994 3001 405a80 RegQueryValueExA 3000->3001 3002 405abe 3000->3002 3003 405aa1 RegCloseKey 3001->3003 3002->2994 3003->3002 3006 405dd4 3005->3006 3008 405e31 CharNextA 3006->3008 3009 405e3c 3006->3009 3012 405e1f CharNextA 3006->3012 3013 405e2c CharNextA 3006->3013 3017 405684 3006->3017 3007 405e40 CharPrevA 3007->3009 3008->3006 3008->3009 3009->3007 3011 405e5b 3009->3011 3011->2992 3012->3006 3013->3008 3014->2992 3015->2992 3016->2983 3018 40568a 3017->3018 3019 40569d 3018->3019 3020 405690 CharNextA 3018->3020 3019->3006 3020->3018 3934 401ae5 3935 4029f6 18 API calls 3934->3935 3936 401aec 3935->3936 3937 4029d9 18 API calls 3936->3937 3938 401af5 wsprintfA 3937->3938 3939 40288b 3938->3939 3940 402866 SendMessageA 3941 402880 InvalidateRect 3940->3941 3942 40288b 3940->3942 3941->3942 3950 4019e6 3951 4029f6 18 API calls 3950->3951 3952 4019ef ExpandEnvironmentStringsA 3951->3952 3953 401a03 3952->3953 3955 401a16 3952->3955 3954 401a08 lstrcmpA 3953->3954 3953->3955 3954->3955 3956 402267 3957 4029f6 18 API calls 3956->3957 3958 402275 3957->3958 3959 4029f6 18 API calls 3958->3959 3960 40227e 3959->3960 3961 4029f6 18 API calls 3960->3961 3962 402288 GetPrivateProfileStringA 3961->3962 3970 401c6d 3971 4029d9 18 API calls 3970->3971 3972 401c73 IsWindow 3971->3972 3973 4019d6 3972->3973 3974 40366d 3975 403678 3974->3975 3976 40367c 3975->3976 3977 40367f GlobalAlloc 3975->3977 3977->3976 3985 4014f0 SetForegroundWindow 3986 40288b 3985->3986 3987 402172 3988 4029f6 18 API calls 3987->3988 3989 402178 3988->3989 3990 4029f6 18 API calls 3989->3990 3991 402181 3990->3991 3992 4029f6 18 API calls 3991->3992 3993 40218a 3992->3993 3994 405e61 2 API calls 3993->3994 3995 402193 3994->3995 3996 4021a4 lstrlenA lstrlenA 3995->3996 4000 402197 3995->4000 3998 404f04 25 API calls 3996->3998 3997 404f04 25 API calls 4001 40219f 3997->4001 3999 4021e0 SHFileOperationA 3998->3999 3999->4000 3999->4001 4000->3997 4000->4001 4002 4021f4 4003 4021fb 4002->4003 4006 40220e 4002->4006 4004 405b88 18 API calls 4003->4004 4005 402208 4004->4005 4007 405427 MessageBoxIndirectA 4005->4007 4007->4006 4008 4016fa 4009 4029f6 18 API calls 4008->4009 4010 401701 SearchPathA 4009->4010 4011 40171c 4010->4011 4012 4025fb 4013 402602 4012->4013 4014 40288b 4012->4014 4015 402608 FindClose 4013->4015 4015->4014 4016 40267c 4017 4029f6 18 API calls 4016->4017 4019 40268a 4017->4019 4018 4026a0 4021 40581e 2 API calls 4018->4021 4019->4018 4020 4029f6 18 API calls 4019->4020 4020->4018 4022 4026a6 4021->4022 4042 40583d GetFileAttributesA CreateFileA 4022->4042 4024 4026b3 4025 40275c 4024->4025 4026 4026bf GlobalAlloc 4024->4026 4029 402764 DeleteFileA 4025->4029 4030 402777 4025->4030 4027 402753 CloseHandle 4026->4027 4028 4026d8 4026->4028 4027->4025 4043 4031f1 SetFilePointer 4028->4043 4029->4030 4032 4026de 4033 4031bf ReadFile 4032->4033 4034 4026e7 GlobalAlloc 4033->4034 4035 4026f7 4034->4035 4036 40272b WriteFile GlobalFree 4034->4036 4038 402f18 48 API calls 4035->4038 4037 402f18 48 API calls 4036->4037 4039 402750 4037->4039 4041 402704 4038->4041 4039->4027 4040 402722 GlobalFree 4040->4036 4041->4040 4042->4024 4043->4032 4044 40277d 4045 4029d9 18 API calls 4044->4045 4046 402783 4045->4046 4047 4027a7 4046->4047 4048 4027be 4046->4048 4057 40265c 4046->4057 4051 4027bb 4047->4051 4054 4027ac 4047->4054 4049 4027d4 4048->4049 4050 4027c8 4048->4050 4053 405b88 18 API calls 4049->4053 4052 4029d9 18 API calls 4050->4052 4059 405ac4 wsprintfA 4051->4059 4052->4057 4053->4057 4058 405b66 lstrcpynA 4054->4058 4058->4057 4059->4057 4067 4014fe 4068 401506 4067->4068 4070 401519 4067->4070 4069 4029d9 18 API calls 4068->4069 4069->4070 4071 401000 4072 401037 BeginPaint GetClientRect 4071->4072 4073 40100c DefWindowProcA 4071->4073 4074 4010f3 4072->4074 4076 401179 4073->4076 4077 401073 CreateBrushIndirect FillRect DeleteObject 4074->4077 4078 4010fc 4074->4078 4077->4074 4079 401102 CreateFontIndirectA 4078->4079 4080 401167 EndPaint 4078->4080 4079->4080 4081 401112 6 API calls 4079->4081 4080->4076 4081->4080 4082 402303 4083 402309 4082->4083 4084 4029f6 18 API calls 4083->4084 4085 40231b 4084->4085 4086 4029f6 18 API calls 4085->4086 4087 402325 RegCreateKeyExA 4086->4087 4088 40288b 4087->4088 4089 40234f 4087->4089 4090 402367 4089->4090 4091 4029f6 18 API calls 4089->4091 4092 402373 4090->4092 4094 4029d9 18 API calls 4090->4094 4093 402360 lstrlenA 4091->4093 4095 40238e RegSetValueExA 4092->4095 4097 402f18 48 API calls 4092->4097 4093->4090 4094->4092 4096 4023a4 RegCloseKey 4095->4096 4096->4088 4097->4095 4099 402803 4100 4029d9 18 API calls 4099->4100 4101 402809 4100->4101 4102 40283a 4101->4102 4104 402817 4101->4104 4105 40265c 4101->4105 4103 405b88 18 API calls 4102->4103 4102->4105 4103->4105 4104->4105 4107 405ac4 wsprintfA 4104->4107 4107->4105 3352 402506 3361 4029d9 3352->3361 3354 402586 3355 402544 ReadFile 3355->3354 3356 402510 3355->3356 3356->3354 3356->3355 3357 402588 3356->3357 3358 402598 3356->3358 3364 405ac4 wsprintfA 3357->3364 3358->3354 3360 4025ae SetFilePointer 3358->3360 3360->3354 3362 405b88 18 API calls 3361->3362 3363 4029ed 3362->3363 3363->3356 3364->3354 4108 401b06 4109 401b13 4108->4109 4110 401b57 4108->4110 4111 4021fb 4109->4111 4118 401b2a 4109->4118 4112 401b80 GlobalAlloc 4110->4112 4113 401b5b 4110->4113 4115 405b88 18 API calls 4111->4115 4114 405b88 18 API calls 4112->4114 4116 401b9b 4113->4116 4129 405b66 lstrcpynA 4113->4129 4114->4116 4117 402208 4115->4117 4122 405427 MessageBoxIndirectA 4117->4122 4127 405b66 lstrcpynA 4118->4127 4121 401b6d GlobalFree 4121->4116 4122->4116 4123 401b39 4128 405b66 lstrcpynA 4123->4128 4125 401b48 4130 405b66 lstrcpynA 4125->4130 4127->4123 4128->4125 4129->4121 4130->4116 4131 401c8a 4132 4029d9 18 API calls 4131->4132 4133 401c91 4132->4133 4134 4029d9 18 API calls 4133->4134 4135 401c99 GetDlgItem 4134->4135 4136 4024b8 4135->4136 4137 40468b 4138 4046b7 4137->4138 4139 40469b 4137->4139 4140 4046ea 4138->4140 4141 4046bd SHGetPathFromIDListA 4138->4141 4148 40540b GetDlgItemTextA 4139->4148 4143 4046cd 4141->4143 4147 4046d4 SendMessageA 4141->4147 4145 40140b 2 API calls 4143->4145 4144 4046a8 SendMessageA 4144->4138 4145->4147 4147->4140 4148->4144 4149 40430f 4150 404345 4149->4150 4151 40431f 4149->4151 4153 403f7f 8 API calls 4150->4153 4152 403f18 19 API calls 4151->4152 4154 40432c SetDlgItemTextA 4152->4154 4155 404351 4153->4155 4154->4150 3021 401490 3024 404f04 3021->3024 3025 401497 3024->3025 3026 404f1f 3024->3026 3027 404f3c lstrlenA 3026->3027 3028 405b88 18 API calls 3026->3028 3029 404f65 3027->3029 3030 404f4a lstrlenA 3027->3030 3028->3027 3032 404f78 3029->3032 3033 404f6b SetWindowTextA 3029->3033 3030->3025 3031 404f5c lstrcatA 3030->3031 3031->3029 3032->3025 3034 404f7e SendMessageA SendMessageA SendMessageA 3032->3034 3033->3032 3034->3025 4156 402615 4157 402618 4156->4157 4158 402630 4156->4158 4159 402625 FindNextFileA 4157->4159 4159->4158 4160 40266f 4159->4160 4162 405b66 lstrcpynA 4160->4162 4162->4158 4170 401595 4171 4029f6 18 API calls 4170->4171 4172 40159c SetFileAttributesA 4171->4172 4173 4015ae 4172->4173 4174 401d95 4175 4029d9 18 API calls 4174->4175 4176 401d9b 4175->4176 4177 4029d9 18 API calls 4176->4177 4178 401da4 4177->4178 4179 401db6 EnableWindow 4178->4179 4180 401dab ShowWindow 4178->4180 4181 40288b 4179->4181 4180->4181 4182 401e95 4183 4029f6 18 API calls 4182->4183 4184 401e9c 4183->4184 4185 405e61 2 API calls 4184->4185 4186 401ea2 4185->4186 4187 401eb4 4186->4187 4189 405ac4 wsprintfA 4186->4189 4189->4187 4190 401696 4191 4029f6 18 API calls 4190->4191 4192 40169c GetFullPathNameA 4191->4192 4193 4016b3 4192->4193 4199 4016d4 4192->4199 4196 405e61 2 API calls 4193->4196 4193->4199 4194 4016e8 GetShortPathNameA 4195 40288b 4194->4195 4197 4016c4 4196->4197 4197->4199 4200 405b66 lstrcpynA 4197->4200 4199->4194 4199->4195 4200->4199 4201 401d1b GetDC GetDeviceCaps 4202 4029d9 18 API calls 4201->4202 4203 401d37 MulDiv 4202->4203 4204 4029d9 18 API calls 4203->4204 4205 401d4c 4204->4205 4206 405b88 18 API calls 4205->4206 4207 401d85 CreateFontIndirectA 4206->4207 4208 4024b8 4207->4208 4209 401e1b 4210 4029f6 18 API calls 4209->4210 4211 401e21 4210->4211 4212 404f04 25 API calls 4211->4212 4213 401e2b 4212->4213 4214 4053c6 2 API calls 4213->4214 4217 401e31 4214->4217 4215 401e87 CloseHandle 4219 40265c 4215->4219 4216 401e50 WaitForSingleObject 4216->4217 4218 401e5e GetExitCodeProcess 4216->4218 4217->4215 4217->4216 4217->4219 4222 405ec1 2 API calls 4217->4222 4220 401e70 4218->4220 4221 401e79 4218->4221 4224 405ac4 wsprintfA 4220->4224 4221->4215 4222->4216 4224->4221 4225 40249c 4226 4029f6 18 API calls 4225->4226 4227 4024a3 4226->4227 4230 40583d GetFileAttributesA CreateFileA 4227->4230 4229 4024af 4230->4229 4231 402020 4232 4029f6 18 API calls 4231->4232 4233 402027 4232->4233 4234 4029f6 18 API calls 4233->4234 4235 402031 4234->4235 4236 4029f6 18 API calls 4235->4236 4237 40203a 4236->4237 4238 4029f6 18 API calls 4237->4238 4239 402044 4238->4239 4240 4029f6 18 API calls 4239->4240 4242 40204e 4240->4242 4241 402062 CoCreateInstance 4244 402081 4241->4244 4245 402137 4241->4245 4242->4241 4243 4029f6 18 API calls 4242->4243 4243->4241 4244->4245 4248 402116 MultiByteToWideChar 4244->4248 4246 401423 25 API calls 4245->4246 4247 402169 4245->4247 4246->4247 4248->4245 3062 401721 3063 4029f6 18 API calls 3062->3063 3064 401728 3063->3064 3068 40586c 3064->3068 3066 40172f 3067 40586c 2 API calls 3066->3067 3067->3066 3069 405877 GetTickCount GetTempFileNameA 3068->3069 3070 4058a7 3069->3070 3071 4058a3 3069->3071 3070->3066 3071->3069 3071->3070 4249 401922 4250 4029f6 18 API calls 4249->4250 4251 401929 lstrlenA 4250->4251 4252 4024b8 4251->4252 4253 402223 4254 40222b 4253->4254 4257 402231 4253->4257 4255 4029f6 18 API calls 4254->4255 4255->4257 4256 402241 4259 4029f6 18 API calls 4256->4259 4261 40224f 4256->4261 4257->4256 4258 4029f6 18 API calls 4257->4258 4258->4256 4259->4261 4260 4029f6 18 API calls 4262 402258 WritePrivateProfileStringA 4260->4262 4261->4260 4270 401ca5 4271 4029d9 18 API calls 4270->4271 4272 401cb5 SetWindowLongA 4271->4272 4273 40288b 4272->4273 4274 401a26 4275 4029d9 18 API calls 4274->4275 4276 401a2c 4275->4276 4277 4029d9 18 API calls 4276->4277 4278 4019d6 4277->4278 4279 402427 4289 402b00 4279->4289 4281 402431 4282 4029d9 18 API calls 4281->4282 4283 40243a 4282->4283 4284 402451 RegEnumKeyA 4283->4284 4285 40245d RegEnumValueA 4283->4285 4286 40265c 4283->4286 4287 402476 RegCloseKey 4284->4287 4285->4286 4285->4287 4287->4286 4290 4029f6 18 API calls 4289->4290 4291 402b19 4290->4291 4292 402b27 RegOpenKeyExA 4291->4292 4292->4281 4293 4022a7 4294 4022d7 4293->4294 4295 4022ac 4293->4295 4297 4029f6 18 API calls 4294->4297 4296 402b00 19 API calls 4295->4296 4298 4022b3 4296->4298 4299 4022de 4297->4299 4300 4029f6 18 API calls 4298->4300 4303 4022f4 4298->4303 4304 402a36 RegOpenKeyExA 4299->4304 4301 4022c4 RegDeleteValueA RegCloseKey 4300->4301 4301->4303 4308 402a61 4304->4308 4312 402aad 4304->4312 4305 402a87 RegEnumKeyA 4306 402a99 RegCloseKey 4305->4306 4305->4308 4307 405e88 3 API calls 4306->4307 4310 402aa9 4307->4310 4308->4305 4308->4306 4309 402abe RegCloseKey 4308->4309 4311 402a36 3 API calls 4308->4311 4309->4312 4310->4312 4313 402ad9 RegDeleteKeyA 4310->4313 4311->4308 4312->4303 4313->4312 4314 40402c lstrcpynA lstrlenA 3673 401bad 3674 4029d9 18 API calls 3673->3674 3675 401bb4 3674->3675 3676 4029d9 18 API calls 3675->3676 3677 401bbe 3676->3677 3678 401bce 3677->3678 3679 4029f6 18 API calls 3677->3679 3680 401bde 3678->3680 3681 4029f6 18 API calls 3678->3681 3679->3678 3682 401be9 3680->3682 3683 401c2d 3680->3683 3681->3680 3685 4029d9 18 API calls 3682->3685 3684 4029f6 18 API calls 3683->3684 3686 401c32 3684->3686 3687 401bee 3685->3687 3688 4029f6 18 API calls 3686->3688 3689 4029d9 18 API calls 3687->3689 3690 401c3b FindWindowExA 3688->3690 3691 401bf7 3689->3691 3694 401c59 3690->3694 3692 401c1d SendMessageA 3691->3692 3693 401bff SendMessageTimeoutA 3691->3693 3692->3694 3693->3694 4315 4023af 4316 402b00 19 API calls 4315->4316 4317 4023b9 4316->4317 4318 4029f6 18 API calls 4317->4318 4319 4023c2 4318->4319 4320 4023cc RegQueryValueExA 4319->4320 4323 40265c 4319->4323 4321 4023f2 RegCloseKey 4320->4321 4322 4023ec 4320->4322 4321->4323 4322->4321 4326 405ac4 wsprintfA 4322->4326 4326->4321 4327 406131 4328 405fb5 4327->4328 4329 406920 4328->4329 4330 406036 GlobalFree 4328->4330 4331 40603f GlobalAlloc 4328->4331 4332 4060b6 GlobalAlloc 4328->4332 4333 4060ad GlobalFree 4328->4333 4330->4331 4331->4328 4331->4329 4332->4328 4332->4329 4333->4332 3138 4015b3 3139 4029f6 18 API calls 3138->3139 3140 4015ba 3139->3140 3156 4056ed CharNextA CharNextA 3140->3156 3142 40160a 3143 40162d 3142->3143 3144 40160f 3142->3144 3150 401423 25 API calls 3143->3150 3146 401423 25 API calls 3144->3146 3145 405684 CharNextA 3147 4015d0 CreateDirectoryA 3145->3147 3149 401616 3146->3149 3148 4015e5 GetLastError 3147->3148 3152 4015c2 3147->3152 3151 4015f2 GetFileAttributesA 3148->3151 3148->3152 3162 405b66 lstrcpynA 3149->3162 3155 402169 3150->3155 3151->3152 3152->3142 3152->3145 3154 401621 SetCurrentDirectoryA 3154->3155 3157 405707 3156->3157 3161 405713 3156->3161 3158 40570e CharNextA 3157->3158 3157->3161 3159 405730 3158->3159 3159->3152 3160 405684 CharNextA 3160->3161 3161->3159 3161->3160 3162->3154 3163 401734 3164 4029f6 18 API calls 3163->3164 3165 40173b 3164->3165 3166 401761 3165->3166 3167 401759 3165->3167 3218 405b66 lstrcpynA 3166->3218 3217 405b66 lstrcpynA 3167->3217 3170 40175f 3174 405dc8 5 API calls 3170->3174 3171 40176c 3219 405659 lstrlenA CharPrevA 3171->3219 3180 40177e 3174->3180 3178 401795 CompareFileTime 3178->3180 3179 401859 3181 404f04 25 API calls 3179->3181 3180->3178 3180->3179 3183 405b66 lstrcpynA 3180->3183 3190 405b88 18 API calls 3180->3190 3199 401830 3180->3199 3201 40583d GetFileAttributesA CreateFileA 3180->3201 3222 405e61 FindFirstFileA 3180->3222 3225 40581e GetFileAttributesA 3180->3225 3228 405427 3180->3228 3184 401863 3181->3184 3182 404f04 25 API calls 3189 401845 3182->3189 3183->3180 3202 402f18 3184->3202 3187 40188a SetFileTime 3188 40189c CloseHandle 3187->3188 3188->3189 3191 4018ad 3188->3191 3190->3180 3192 4018b2 3191->3192 3193 4018c5 3191->3193 3194 405b88 18 API calls 3192->3194 3195 405b88 18 API calls 3193->3195 3196 4018ba lstrcatA 3194->3196 3197 4018cd 3195->3197 3196->3197 3200 405427 MessageBoxIndirectA 3197->3200 3199->3182 3199->3189 3200->3189 3201->3180 3203 402f45 3202->3203 3204 402f29 SetFilePointer 3202->3204 3232 403043 GetTickCount 3203->3232 3204->3203 3207 402f56 ReadFile 3208 402f76 3207->3208 3212 401876 3207->3212 3209 403043 43 API calls 3208->3209 3208->3212 3210 402f8d 3209->3210 3211 403008 ReadFile 3210->3211 3210->3212 3216 402f9d 3210->3216 3211->3212 3212->3187 3212->3188 3214 402fb8 ReadFile 3214->3212 3214->3216 3215 402fd1 WriteFile 3215->3212 3215->3216 3216->3212 3216->3214 3216->3215 3217->3170 3218->3171 3220 405673 lstrcatA 3219->3220 3221 401772 lstrcatA 3219->3221 3220->3221 3221->3170 3223 405e82 3222->3223 3224 405e77 FindClose 3222->3224 3223->3180 3224->3223 3226 40583a 3225->3226 3227 40582d SetFileAttributesA 3225->3227 3226->3180 3227->3226 3231 40543c 3228->3231 3229 405488 3229->3180 3230 405450 MessageBoxIndirectA 3230->3229 3231->3229 3231->3230 3233 403072 3232->3233 3234 4031ad 3232->3234 3245 4031f1 SetFilePointer 3233->3245 3235 402bd3 33 API calls 3234->3235 3241 402f4e 3235->3241 3237 40307d SetFilePointer 3243 4030a2 3237->3243 3241->3207 3241->3212 3242 403137 WriteFile 3242->3241 3242->3243 3243->3241 3243->3242 3244 40318e SetFilePointer 3243->3244 3246 4031bf ReadFile 3243->3246 3248 402bd3 3243->3248 3262 405f82 3243->3262 3244->3234 3245->3237 3247 4031e0 3246->3247 3247->3243 3249 402be1 3248->3249 3250 402bf9 3248->3250 3253 402bea DestroyWindow 3249->3253 3261 402bf1 3249->3261 3251 402c01 3250->3251 3252 402c09 GetTickCount 3250->3252 3272 405ec1 3251->3272 3255 402c17 3252->3255 3252->3261 3253->3261 3256 402c4c CreateDialogParamA ShowWindow 3255->3256 3257 402c1f 3255->3257 3256->3261 3257->3261 3269 402bb7 3257->3269 3259 402c2d wsprintfA 3260 404f04 25 API calls 3259->3260 3260->3261 3261->3243 3263 405fa7 3262->3263 3264 405faf 3262->3264 3263->3243 3264->3263 3265 406036 GlobalFree 3264->3265 3266 40603f GlobalAlloc 3264->3266 3267 4060b6 GlobalAlloc 3264->3267 3268 4060ad GlobalFree 3264->3268 3265->3266 3266->3263 3266->3264 3267->3263 3267->3264 3268->3267 3270 402bc6 3269->3270 3271 402bc8 MulDiv 3269->3271 3270->3271 3271->3259 3273 405ede PeekMessageA 3272->3273 3274 405ed4 DispatchMessageA 3273->3274 3275 405eee 3273->3275 3274->3273 3275->3261 4334 401634 4335 4029f6 18 API calls 4334->4335 4336 40163a 4335->4336 4337 405e61 2 API calls 4336->4337 4338 401640 4337->4338 4339 401934 4340 4029d9 18 API calls 4339->4340 4341 40193b 4340->4341 4342 4029d9 18 API calls 4341->4342 4343 401945 4342->4343 4344 4029f6 18 API calls 4343->4344 4345 40194e 4344->4345 4346 401961 lstrlenA 4345->4346 4347 40199c 4345->4347 4348 40196b 4346->4348 4348->4347 4352 405b66 lstrcpynA 4348->4352 4350 401985 4350->4347 4351 401992 lstrlenA 4350->4351 4351->4347 4352->4350 4353 4019b5 4354 4029f6 18 API calls 4353->4354 4355 4019bc 4354->4355 4356 4029f6 18 API calls 4355->4356 4357 4019c5 4356->4357 4358 4019cc lstrcmpiA 4357->4358 4359 4019de lstrcmpA 4357->4359 4360 4019d2 4358->4360 4359->4360 4361 4014b7 4362 4014bd 4361->4362 4363 401389 2 API calls 4362->4363 4364 4014c5 4363->4364 4372 402b3b 4373 402b63 4372->4373 4374 402b4a SetTimer 4372->4374 4375 402bb1 4373->4375 4376 402bb7 MulDiv 4373->4376 4374->4373 4377 402b71 wsprintfA SetWindowTextA SetDlgItemTextA 4376->4377 4377->4375 3365 40323c #17 SetErrorMode OleInitialize 3435 405e88 GetModuleHandleA 3365->3435 3369 4032aa GetCommandLineA 3440 405b66 lstrcpynA 3369->3440 3371 4032bc GetModuleHandleA 3372 4032d3 3371->3372 3373 405684 CharNextA 3372->3373 3374 4032e7 CharNextA 3373->3374 3378 4032f4 3374->3378 3375 40335d 3376 403370 GetTempPathA 3375->3376 3441 403208 3376->3441 3378->3375 3382 405684 CharNextA 3378->3382 3386 40335f 3378->3386 3379 403386 3380 4033aa DeleteFileA 3379->3380 3381 40338a GetWindowsDirectoryA lstrcatA 3379->3381 3449 402c72 GetTickCount GetModuleFileNameA 3380->3449 3383 403208 11 API calls 3381->3383 3382->3378 3385 4033a6 3383->3385 3385->3380 3388 403424 3385->3388 3533 405b66 lstrcpynA 3386->3533 3387 4033bb 3387->3388 3390 403414 3387->3390 3393 405684 CharNextA 3387->3393 3550 4035bd 3388->3550 3479 4036af 3390->3479 3395 4033d2 3393->3395 3403 403453 lstrcatA lstrcmpiA 3395->3403 3404 4033ef 3395->3404 3396 403522 3398 4035a5 ExitProcess 3396->3398 3401 405e88 3 API calls 3396->3401 3397 40343d 3399 405427 MessageBoxIndirectA 3397->3399 3400 40344b ExitProcess 3399->3400 3405 403531 3401->3405 3403->3388 3407 40346f CreateDirectoryA SetCurrentDirectoryA 3403->3407 3534 40573a 3404->3534 3408 405e88 3 API calls 3405->3408 3410 403491 3407->3410 3411 403486 3407->3411 3412 40353a 3408->3412 3560 405b66 lstrcpynA 3410->3560 3559 405b66 lstrcpynA 3411->3559 3415 405e88 3 API calls 3412->3415 3417 403543 3415->3417 3418 403591 ExitWindowsEx 3417->3418 3423 403551 GetCurrentProcess 3417->3423 3418->3398 3422 40359e 3418->3422 3419 403409 3549 405b66 lstrcpynA 3419->3549 3421 405b88 18 API calls 3424 4034c1 DeleteFileA 3421->3424 3425 40140b 2 API calls 3422->3425 3427 403561 3423->3427 3426 4034ce CopyFileA 3424->3426 3432 40349f 3424->3432 3425->3398 3426->3432 3427->3418 3428 403516 3429 4058b4 38 API calls 3428->3429 3429->3388 3431 405b88 18 API calls 3431->3432 3432->3421 3432->3428 3432->3431 3434 403502 CloseHandle 3432->3434 3561 4058b4 3432->3561 3587 4053c6 CreateProcessA 3432->3587 3434->3432 3436 405ea4 LoadLibraryA 3435->3436 3437 405eaf GetProcAddress 3435->3437 3436->3437 3438 40327f SHGetFileInfoA 3436->3438 3437->3438 3439 405b66 lstrcpynA 3438->3439 3439->3369 3440->3371 3442 405dc8 5 API calls 3441->3442 3443 403214 3442->3443 3444 40321e 3443->3444 3445 405659 3 API calls 3443->3445 3444->3379 3446 403226 CreateDirectoryA 3445->3446 3447 40586c 2 API calls 3446->3447 3448 40323a 3447->3448 3448->3379 3590 40583d GetFileAttributesA CreateFileA 3449->3590 3451 402cb5 3478 402cc2 3451->3478 3591 405b66 lstrcpynA 3451->3591 3453 402cd8 3592 4056a0 lstrlenA 3453->3592 3457 402ce9 GetFileSize 3458 402dea 3457->3458 3468 402d00 3457->3468 3459 402bd3 33 API calls 3458->3459 3461 402df1 3459->3461 3460 4031bf ReadFile 3460->3468 3462 402e2d GlobalAlloc 3461->3462 3461->3478 3597 4031f1 SetFilePointer 3461->3597 3465 402e44 3462->3465 3463 402e85 3466 402bd3 33 API calls 3463->3466 3471 40586c 2 API calls 3465->3471 3466->3478 3467 402e0e 3469 4031bf ReadFile 3467->3469 3468->3458 3468->3460 3468->3463 3470 402bd3 33 API calls 3468->3470 3468->3478 3472 402e19 3469->3472 3470->3468 3473 402e55 CreateFileA 3471->3473 3472->3462 3472->3478 3474 402e8f 3473->3474 3473->3478 3598 4031f1 SetFilePointer 3474->3598 3476 402e9d 3477 402f18 48 API calls 3476->3477 3477->3478 3478->3387 3480 405e88 3 API calls 3479->3480 3481 4036c3 3480->3481 3482 4036c9 3481->3482 3483 4036db 3481->3483 3608 405ac4 wsprintfA 3482->3608 3484 405a4d 3 API calls 3483->3484 3485 4036fc 3484->3485 3487 40371a lstrcatA 3485->3487 3489 405a4d 3 API calls 3485->3489 3488 4036d9 3487->3488 3599 403978 3488->3599 3489->3487 3492 40573a 18 API calls 3493 40374c 3492->3493 3494 4037d5 3493->3494 3496 405a4d 3 API calls 3493->3496 3495 40573a 18 API calls 3494->3495 3497 4037db 3495->3497 3498 403778 3496->3498 3499 4037eb LoadImageA 3497->3499 3500 405b88 18 API calls 3497->3500 3498->3494 3503 403794 lstrlenA 3498->3503 3506 405684 CharNextA 3498->3506 3501 403816 RegisterClassA 3499->3501 3502 40389f 3499->3502 3500->3499 3504 403852 SystemParametersInfoA CreateWindowExA 3501->3504 3532 4038a9 3501->3532 3505 40140b 2 API calls 3502->3505 3507 4037a2 lstrcmpiA 3503->3507 3508 4037c8 3503->3508 3504->3502 3509 4038a5 3505->3509 3510 403792 3506->3510 3507->3508 3511 4037b2 GetFileAttributesA 3507->3511 3512 405659 3 API calls 3508->3512 3514 403978 19 API calls 3509->3514 3509->3532 3510->3503 3513 4037be 3511->3513 3515 4037ce 3512->3515 3513->3508 3516 4056a0 2 API calls 3513->3516 3517 4038b6 3514->3517 3609 405b66 lstrcpynA 3515->3609 3516->3508 3519 4038c2 ShowWindow LoadLibraryA 3517->3519 3520 403945 3517->3520 3521 4038e1 LoadLibraryA 3519->3521 3522 4038e8 GetClassInfoA 3519->3522 3523 404fd6 5 API calls 3520->3523 3521->3522 3524 403912 DialogBoxParamA 3522->3524 3525 4038fc GetClassInfoA RegisterClassA 3522->3525 3526 40394b 3523->3526 3527 40140b 2 API calls 3524->3527 3525->3524 3528 403967 3526->3528 3529 40394f 3526->3529 3527->3532 3530 40140b 2 API calls 3528->3530 3531 40140b 2 API calls 3529->3531 3529->3532 3530->3532 3531->3532 3532->3388 3533->3376 3611 405b66 lstrcpynA 3534->3611 3536 40574b 3537 4056ed 4 API calls 3536->3537 3538 405751 3537->3538 3539 4033fa 3538->3539 3540 405dc8 5 API calls 3538->3540 3539->3388 3548 405b66 lstrcpynA 3539->3548 3546 405761 3540->3546 3541 40578c lstrlenA 3542 405797 3541->3542 3541->3546 3543 405659 3 API calls 3542->3543 3545 40579c GetFileAttributesA 3543->3545 3544 405e61 2 API calls 3544->3546 3545->3539 3546->3539 3546->3541 3546->3544 3547 4056a0 2 API calls 3546->3547 3547->3541 3548->3419 3549->3390 3551 4035d8 3550->3551 3552 4035ce CloseHandle 3550->3552 3553 4035e2 CloseHandle 3551->3553 3554 4035ec 3551->3554 3552->3551 3553->3554 3612 40361a 3554->3612 3559->3410 3560->3432 3562 405e88 3 API calls 3561->3562 3564 4058bf 3562->3564 3563 40591c GetShortPathNameA 3566 405931 3563->3566 3567 405a11 3563->3567 3564->3563 3564->3567 3659 40583d GetFileAttributesA CreateFileA 3564->3659 3566->3567 3569 405939 wsprintfA 3566->3569 3567->3432 3568 405900 CloseHandle GetShortPathNameA 3568->3567 3570 405914 3568->3570 3571 405b88 18 API calls 3569->3571 3570->3563 3570->3567 3572 405961 3571->3572 3660 40583d GetFileAttributesA CreateFileA 3572->3660 3574 40596e 3574->3567 3575 40597d GetFileSize GlobalAlloc 3574->3575 3576 405a0a CloseHandle 3575->3576 3577 40599b ReadFile 3575->3577 3576->3567 3577->3576 3578 4059af 3577->3578 3578->3576 3661 4057b2 lstrlenA 3578->3661 3581 4059c4 3666 405b66 lstrcpynA 3581->3666 3582 405a1e 3584 4057b2 4 API calls 3582->3584 3585 4059d2 3584->3585 3586 4059e5 SetFilePointer WriteFile GlobalFree 3585->3586 3586->3576 3588 405401 3587->3588 3589 4053f5 CloseHandle 3587->3589 3588->3432 3589->3588 3590->3451 3591->3453 3593 4056ad 3592->3593 3594 4056b2 CharPrevA 3593->3594 3595 402cde 3593->3595 3594->3593 3594->3595 3596 405b66 lstrcpynA 3595->3596 3596->3457 3597->3467 3598->3476 3600 40398c 3599->3600 3610 405ac4 wsprintfA 3600->3610 3602 4039fd 3603 405b88 18 API calls 3602->3603 3604 403a09 SetWindowTextA 3603->3604 3605 40372a 3604->3605 3606 403a25 3604->3606 3605->3492 3606->3605 3607 405b88 18 API calls 3606->3607 3607->3606 3608->3488 3609->3494 3610->3602 3611->3536 3613 403628 3612->3613 3614 4035f1 3613->3614 3615 40362d FreeLibrary GlobalFree 3613->3615 3616 40548b 3614->3616 3615->3614 3615->3615 3617 40573a 18 API calls 3616->3617 3618 40549f 3617->3618 3619 4054a8 DeleteFileA 3618->3619 3620 4054bf 3618->3620 3621 40342d OleUninitialize 3619->3621 3622 4055fe 3620->3622 3657 405b66 lstrcpynA 3620->3657 3621->3396 3621->3397 3622->3621 3629 405e61 2 API calls 3622->3629 3624 4054e9 3625 4054fa 3624->3625 3626 4054ed lstrcatA 3624->3626 3628 4056a0 2 API calls 3625->3628 3627 405500 3626->3627 3630 40550e lstrcatA 3627->3630 3632 405519 lstrlenA FindFirstFileA 3627->3632 3628->3627 3631 405619 3629->3631 3630->3632 3631->3621 3634 405659 3 API calls 3631->3634 3633 4055f4 3632->3633 3654 40553d 3632->3654 3633->3622 3636 405623 3634->3636 3635 405684 CharNextA 3635->3654 3637 40581e 2 API calls 3636->3637 3638 405629 RemoveDirectoryA 3637->3638 3639 405634 3638->3639 3640 40564b 3638->3640 3639->3621 3642 40563a 3639->3642 3643 404f04 25 API calls 3640->3643 3645 404f04 25 API calls 3642->3645 3643->3621 3644 4055d3 FindNextFileA 3646 4055eb FindClose 3644->3646 3644->3654 3647 405642 3645->3647 3646->3633 3648 4058b4 38 API calls 3647->3648 3651 405649 3648->3651 3649 40581e 2 API calls 3652 4055a0 DeleteFileA 3649->3652 3650 40548b 59 API calls 3650->3654 3651->3621 3652->3654 3653 404f04 25 API calls 3653->3644 3654->3635 3654->3644 3654->3649 3654->3650 3654->3653 3655 404f04 25 API calls 3654->3655 3656 4058b4 38 API calls 3654->3656 3658 405b66 lstrcpynA 3654->3658 3655->3654 3656->3654 3657->3624 3658->3654 3659->3568 3660->3574 3662 4057e8 lstrlenA 3661->3662 3663 4057f2 3662->3663 3664 4057c6 lstrcmpiA 3662->3664 3663->3581 3663->3582 3664->3663 3665 4057df CharNextA 3664->3665 3665->3662 3666->3585 4379 40263e 4380 4029f6 18 API calls 4379->4380 4381 402645 FindFirstFileA 4380->4381 4382 402668 4381->4382 4386 402658 4381->4386 4383 40266f 4382->4383 4387 405ac4 wsprintfA 4382->4387 4388 405b66 lstrcpynA 4383->4388 4387->4383 4388->4386 4389 4024be 4390 4024c3 4389->4390 4391 4024d4 4389->4391 4393 4029d9 18 API calls 4390->4393 4392 4029f6 18 API calls 4391->4392 4394 4024db lstrlenA 4392->4394 4395 4024ca 4393->4395 4394->4395 4396 4024fa WriteFile 4395->4396 4397 40265c 4395->4397 4396->4397

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 40323c-4032d1 #17 SetErrorMode OleInitialize call 405e88 SHGetFileInfoA call 405b66 GetCommandLineA call 405b66 GetModuleHandleA 7 4032d3-4032d8 0->7 8 4032dd-4032f2 call 405684 CharNextA 0->8 7->8 11 403357-40335b 8->11 12 4032f4-4032f7 11->12 13 40335d 11->13 14 4032f9-4032fd 12->14 15 4032ff-403307 12->15 16 403370-403388 GetTempPathA call 403208 13->16 14->14 14->15 18 403309-40330a 15->18 19 40330f-403312 15->19 25 4033aa-4033c1 DeleteFileA call 402c72 16->25 26 40338a-4033a8 GetWindowsDirectoryA lstrcatA call 403208 16->26 18->19 20 403314-403318 19->20 21 403347-403354 call 405684 19->21 23 403328-40332e 20->23 24 40331a-403323 20->24 21->11 38 403356 21->38 30 403330-403339 23->30 31 40333e-403345 23->31 24->23 28 403325 24->28 39 403428-403437 call 4035bd OleUninitialize 25->39 40 4033c3-4033c9 25->40 26->25 26->39 28->23 30->31 35 40333b 30->35 31->21 36 40335f-40336b call 405b66 31->36 35->31 36->16 38->11 50 403522-403528 39->50 51 40343d-40344d call 405427 ExitProcess 39->51 42 403418-40341f call 4036af 40->42 43 4033cb-4033d4 call 405684 40->43 48 403424 42->48 54 4033df-4033e1 43->54 48->39 52 4035a5-4035ad 50->52 53 40352a-403547 call 405e88 * 3 50->53 58 4035b3-4035b7 ExitProcess 52->58 59 4035af 52->59 80 403591-40359c ExitWindowsEx 53->80 81 403549-40354b 53->81 60 4033e3-4033ed 54->60 61 4033d6-4033dc 54->61 59->58 62 403453-40346d lstrcatA lstrcmpiA 60->62 63 4033ef-4033fc call 40573a 60->63 61->60 65 4033de 61->65 62->39 67 40346f-403484 CreateDirectoryA SetCurrentDirectoryA 62->67 63->39 73 4033fe-403414 call 405b66 * 2 63->73 65->54 70 403491-4034ab call 405b66 67->70 71 403486-40348c call 405b66 67->71 83 4034b0-4034cc call 405b88 DeleteFileA 70->83 71->70 73->42 80->52 87 40359e-4035a0 call 40140b 80->87 81->80 84 40354d-40354f 81->84 92 40350d-403514 83->92 93 4034ce-4034de CopyFileA 83->93 84->80 88 403551-403563 GetCurrentProcess 84->88 87->52 88->80 97 403565-403587 88->97 92->83 95 403516-40351d call 4058b4 92->95 93->92 96 4034e0-403500 call 4058b4 call 405b88 call 4053c6 93->96 95->39 96->92 107 403502-403509 CloseHandle 96->107 97->80 107->92
                                        APIs
                                        • #17.COMCTL32 ref: 0040325B
                                        • SetErrorMode.KERNEL32(00008001), ref: 00403266
                                        • OleInitialize.OLE32(00000000), ref: 0040326D
                                          • Part of subcall function 00405E88: GetModuleHandleA.KERNEL32(?,?,00000000,0040327F,00000008), ref: 00405E9A
                                          • Part of subcall function 00405E88: LoadLibraryA.KERNEL32(?,?,00000000,0040327F,00000008), ref: 00405EA5
                                          • Part of subcall function 00405E88: GetProcAddress.KERNEL32(00000000,?), ref: 00405EB6
                                        • SHGetFileInfoA.SHELL32(0041F458,00000000,?,00000160,00000000,00000008), ref: 00403295
                                          • Part of subcall function 00405B66: lstrcpynA.KERNEL32(?,?,00000400,004032AA,MusicDevelopments RapidComposer v5 WiN-MAC,NSIS Error), ref: 00405B73
                                        • GetCommandLineA.KERNEL32(MusicDevelopments RapidComposer v5 WiN-MAC,NSIS Error), ref: 004032AA
                                        • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\hca5qDUYZH.exe",00000000), ref: 004032BD
                                        • CharNextA.USER32(00000000,"C:\Users\user\Desktop\hca5qDUYZH.exe",00000020), ref: 004032E8
                                        • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 0040337B
                                        • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 00403390
                                        • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040339C
                                        • DeleteFileA.KERNEL32(1033), ref: 004033AF
                                        • OleUninitialize.OLE32(00000000), ref: 0040342D
                                        • ExitProcess.KERNEL32 ref: 0040344D
                                        • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\hca5qDUYZH.exe",00000000,00000000), ref: 00403459
                                        • lstrcmpiA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop), ref: 00403465
                                        • CreateDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403471
                                        • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 00403478
                                        • DeleteFileA.KERNEL32(0041F058,0041F058,?,00424000,?), ref: 004034C2
                                        • CopyFileA.KERNEL32(C:\Users\user\Desktop\hca5qDUYZH.exe,0041F058,00000001), ref: 004034D6
                                        • CloseHandle.KERNEL32(00000000,0041F058,0041F058,?,0041F058,00000000), ref: 00403503
                                        • GetCurrentProcess.KERNEL32(00000028,?,00000005,00000004,00000003), ref: 00403558
                                        • ExitWindowsEx.USER32(00000002,00000000), ref: 00403594
                                        • ExitProcess.KERNEL32 ref: 004035B7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: File$DirectoryExitHandleProcess$CurrentDeleteModuleWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                        • String ID: /D=$ _?=$"$"C:\Users\user\Desktop\hca5qDUYZH.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\hca5qDUYZH.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$MusicDevelopments RapidComposer v5 WiN-MAC$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp
                                        • API String ID: 2278157092-2405727028
                                        • Opcode ID: b237e16242222b526cfbc7eec5e85b12329012a3d6ce1955aa8a6be5a5dec380
                                        • Instruction ID: d9df3101e86bd055252ea398e1a167ecdf9755d8b7b18b8fa076e16bcd865dbe
                                        • Opcode Fuzzy Hash: b237e16242222b526cfbc7eec5e85b12329012a3d6ce1955aa8a6be5a5dec380
                                        • Instruction Fuzzy Hash: E191D231A087417EE7216F609D49B2B7EACEB01306F44457BF941B61E2C77CAE058B6E

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 108 405042-40505d 109 405063-40512c GetDlgItem * 3 call 403f4d call 4047a6 GetClientRect GetSystemMetrics SendMessageA * 2 108->109 110 4051ee-4051f5 108->110 130 40514a-40514d 109->130 131 40512e-405148 SendMessageA * 2 109->131 112 4051f7-405219 GetDlgItem CreateThread CloseHandle 110->112 113 40521f-40522c 110->113 112->113 115 40524a-405251 113->115 116 40522e-405234 113->116 120 405253-405259 115->120 121 4052a8-4052ac 115->121 118 405236-405245 ShowWindow * 2 call 403f4d 116->118 119 40526c-405275 call 403f7f 116->119 118->115 134 40527a-40527e 119->134 125 405281-405291 ShowWindow 120->125 126 40525b-405267 call 403ef1 120->126 121->119 123 4052ae-4052b1 121->123 123->119 132 4052b3-4052c6 SendMessageA 123->132 128 4052a1-4052a3 call 403ef1 125->128 129 405293-40529c call 404f04 125->129 126->119 128->121 129->128 137 40515d-405174 call 403f18 130->137 138 40514f-40515b SendMessageA 130->138 131->130 139 4052cc-4052ed CreatePopupMenu call 405b88 AppendMenuA 132->139 140 4053bf-4053c1 132->140 147 405176-40518a ShowWindow 137->147 148 4051aa-4051cb GetDlgItem SendMessageA 137->148 138->137 145 405302-405308 139->145 146 4052ef-405300 GetWindowRect 139->146 140->134 150 40530b-405323 TrackPopupMenu 145->150 146->150 151 405199 147->151 152 40518c-405197 ShowWindow 147->152 148->140 149 4051d1-4051e9 SendMessageA * 2 148->149 149->140 150->140 153 405329-405340 150->153 154 40519f-4051a5 call 403f4d 151->154 152->154 155 405345-405360 SendMessageA 153->155 154->148 155->155 157 405362-405382 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 155->157 158 405384-4053a3 SendMessageA 157->158 158->158 159 4053a5-4053b9 GlobalUnlock SetClipboardData CloseClipboard 158->159 159->140
                                        APIs
                                        • GetDlgItem.USER32(?,00000403), ref: 004050A1
                                        • GetDlgItem.USER32(?,000003EE), ref: 004050B0
                                        • GetClientRect.USER32(?,?), ref: 004050ED
                                        • GetSystemMetrics.USER32(00000015), ref: 004050F5
                                        • SendMessageA.USER32(?,0000101B,00000000,00000002), ref: 00405116
                                        • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405127
                                        • SendMessageA.USER32(?,00001001,00000000,00000110), ref: 0040513A
                                        • SendMessageA.USER32(?,00001026,00000000,00000110), ref: 00405148
                                        • SendMessageA.USER32(?,00001024,00000000,?), ref: 0040515B
                                        • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040517D
                                        • ShowWindow.USER32(?,00000008), ref: 00405191
                                        • GetDlgItem.USER32(?,000003EC), ref: 004051B2
                                        • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004051C2
                                        • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004051DB
                                        • SendMessageA.USER32(00000000,00002001,00000000,00000110), ref: 004051E7
                                        • GetDlgItem.USER32(?,000003F8), ref: 004050BF
                                          • Part of subcall function 00403F4D: SendMessageA.USER32(00000028,?,00000001,00403D7E), ref: 00403F5B
                                        • GetDlgItem.USER32(?,000003EC), ref: 00405204
                                        • CreateThread.KERNEL32(00000000,00000000,Function_00004FD6,00000000), ref: 00405212
                                        • CloseHandle.KERNEL32(00000000), ref: 00405219
                                        • ShowWindow.USER32(00000000), ref: 0040523D
                                        • ShowWindow.USER32(000304A2,00000008), ref: 00405242
                                        • ShowWindow.USER32(00000008), ref: 00405289
                                        • SendMessageA.USER32(000304A2,00001004,00000000,00000000), ref: 004052BB
                                        • CreatePopupMenu.USER32 ref: 004052CC
                                        • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004052E1
                                        • GetWindowRect.USER32(000304A2,?), ref: 004052F4
                                        • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405318
                                        • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405353
                                        • OpenClipboard.USER32(00000000), ref: 00405363
                                        • EmptyClipboard.USER32 ref: 00405369
                                        • GlobalAlloc.KERNEL32(00000042,?,?,?,00000000,?,00000000), ref: 00405372
                                        • GlobalLock.KERNEL32(00000000), ref: 0040537C
                                        • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405390
                                        • GlobalUnlock.KERNEL32(00000000), ref: 004053A8
                                        • SetClipboardData.USER32(00000001,00000000), ref: 004053B3
                                        • CloseClipboard.USER32 ref: 004053B9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                        • String ID: 4'R${
                                        • API String ID: 590372296-4133604624
                                        • Opcode ID: 5aa5e299d21103ac010b4f938d0fd54a6532c41be376ce1bb5dd201a3ba19c05
                                        • Instruction ID: b28aa7ce0402c6385ba5b6cd868a6258f1d07b471923b7bae974b2a68da01879
                                        • Opcode Fuzzy Hash: 5aa5e299d21103ac010b4f938d0fd54a6532c41be376ce1bb5dd201a3ba19c05
                                        • Instruction Fuzzy Hash: 34A14870904208FFDB219F60DD89AAE7F79FB08355F00417AFA05BA2A0C7795A41DF69

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 445 40548b-4054a6 call 40573a 448 4054a8-4054ba DeleteFileA 445->448 449 4054bf-4054c9 445->449 450 405653-405656 448->450 451 4054cb-4054cd 449->451 452 4054dd-4054eb call 405b66 449->452 453 4054d3-4054d7 451->453 454 4055fe-405604 451->454 458 4054fa-4054fb call 4056a0 452->458 459 4054ed-4054f8 lstrcatA 452->459 453->452 453->454 454->450 456 405606-405609 454->456 460 405613-40561b call 405e61 456->460 461 40560b-405611 456->461 462 405500-405503 458->462 459->462 460->450 469 40561d-405632 call 405659 call 40581e RemoveDirectoryA 460->469 461->450 465 405505-40550c 462->465 466 40550e-405514 lstrcatA 462->466 465->466 468 405519-405537 lstrlenA FindFirstFileA 465->468 466->468 470 4055f4-4055f8 468->470 471 40553d-405554 call 405684 468->471 481 405634-405638 469->481 482 40564b-40564e call 404f04 469->482 470->454 473 4055fa 470->473 479 405556-40555a 471->479 480 40555f-405562 471->480 473->454 479->480 483 40555c 479->483 484 405564-405569 480->484 485 405575-405583 call 405b66 480->485 481->461 487 40563a-405649 call 404f04 call 4058b4 481->487 482->450 483->480 489 4055d3-4055e5 FindNextFileA 484->489 490 40556b-40556d 484->490 495 405585-40558d 485->495 496 40559a-4055a9 call 40581e DeleteFileA 485->496 487->450 489->471 493 4055eb-4055ee FindClose 489->493 490->485 494 40556f-405573 490->494 493->470 494->485 494->489 495->489 498 40558f-405598 call 40548b 495->498 505 4055cb-4055ce call 404f04 496->505 506 4055ab-4055af 496->506 498->489 505->489 508 4055b1-4055c1 call 404f04 call 4058b4 506->508 509 4055c3-4055c9 506->509 508->489 509->489
                                        APIs
                                        • DeleteFileA.KERNEL32(?,?,"C:\Users\user\Desktop\hca5qDUYZH.exe",75922EE0), ref: 004054A9
                                        • lstrcatA.KERNEL32(004214A8,\*.*,004214A8,?,00000000,?,"C:\Users\user\Desktop\hca5qDUYZH.exe",75922EE0), ref: 004054F3
                                        • lstrcatA.KERNEL32(?,00409010,?,004214A8,?,00000000,?,"C:\Users\user\Desktop\hca5qDUYZH.exe",75922EE0), ref: 00405514
                                        • lstrlenA.KERNEL32(?,?,00409010,?,004214A8,?,00000000,?,"C:\Users\user\Desktop\hca5qDUYZH.exe",75922EE0), ref: 0040551A
                                        • FindFirstFileA.KERNEL32(004214A8,?,?,?,00409010,?,004214A8,?,00000000,?,"C:\Users\user\Desktop\hca5qDUYZH.exe",75922EE0), ref: 0040552B
                                        • FindNextFileA.KERNEL32(?,00000010,000000F2,?), ref: 004055DD
                                        • FindClose.KERNEL32(?), ref: 004055EE
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 0040548B
                                        • \*.*, xrefs: 004054ED
                                        • "C:\Users\user\Desktop\hca5qDUYZH.exe", xrefs: 00405495
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                        • String ID: "C:\Users\user\Desktop\hca5qDUYZH.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                        • API String ID: 2035342205-3953202754
                                        • Opcode ID: 6c8ee5a3fe02bedcc3e1648cc4c34db6c3543f7bd00f265664a9289eb0c65dd6
                                        • Instruction ID: bc429f5d1e1b14784ce7e3564347ec6ed469848bfd5577fff983359c073685a4
                                        • Opcode Fuzzy Hash: 6c8ee5a3fe02bedcc3e1648cc4c34db6c3543f7bd00f265664a9289eb0c65dd6
                                        • Instruction Fuzzy Hash: 0351F331904A447ADB216B218C45BBF3B79CF42728F54847BF905711E2CB3C5A82DE6E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d33a5f9df5361017a2c2cd63e74982cac3414c6cd2676332625b738f25334a08
                                        • Instruction ID: 7fe690cacb8e5da35aefc448adc87e2f65dc6f56ff44dc44b78e187fa59068bd
                                        • Opcode Fuzzy Hash: d33a5f9df5361017a2c2cd63e74982cac3414c6cd2676332625b738f25334a08
                                        • Instruction Fuzzy Hash: 70F16871D00229CBDF28CFA8C8946ADBBB1FF44305F25816ED856BB281D7785A96CF44
                                        APIs
                                        • GetModuleHandleA.KERNEL32(?,?,00000000,0040327F,00000008), ref: 00405E9A
                                        • LoadLibraryA.KERNEL32(?,?,00000000,0040327F,00000008), ref: 00405EA5
                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00405EB6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: AddressHandleLibraryLoadModuleProc
                                        • String ID:
                                        • API String ID: 310444273-0
                                        • Opcode ID: cda0668070076e7cac62d6abfc32be1e4fdfe709f191786036c768239460f4b3
                                        • Instruction ID: 91087f9554edebef2dfdad95906e97f440013226b38390424b9c6ad62026e406
                                        • Opcode Fuzzy Hash: cda0668070076e7cac62d6abfc32be1e4fdfe709f191786036c768239460f4b3
                                        • Instruction Fuzzy Hash: 0FE08C32A08511BBD3115B30ED0896B77A8EA89B41304083EF959F6290D734EC119BFA
                                        APIs
                                        • FindFirstFileA.KERNEL32(?,004224F0,004218A8,0040577D,004218A8,004218A8,00000000,004218A8,004218A8,?,?,75922EE0,0040549F,?,"C:\Users\user\Desktop\hca5qDUYZH.exe",75922EE0), ref: 00405E6C
                                        • FindClose.KERNEL32(00000000), ref: 00405E78
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: Find$CloseFileFirst
                                        • String ID:
                                        • API String ID: 2295610775-0
                                        • Opcode ID: a0d9290738f1f02d4b3743de2211279f78b4a64d0718c2c828088997ee3199ab
                                        • Instruction ID: f2fe444ddfa45285d6a9eb51d657c4c39712a0d2250b7f8498e11f87d01b5aa3
                                        • Opcode Fuzzy Hash: a0d9290738f1f02d4b3743de2211279f78b4a64d0718c2c828088997ee3199ab
                                        • Instruction Fuzzy Hash: 26D012359495206FC7001738AD0C85B7A58EF553347508B32F969F62E0C7B4AD51DAED

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 160 403a45-403a57 161 403b98-403ba7 160->161 162 403a5d-403a63 160->162 164 403bf6-403c0b 161->164 165 403ba9-403bf1 GetDlgItem * 2 call 403f18 SetClassLongA call 40140b 161->165 162->161 163 403a69-403a72 162->163 168 403a74-403a81 SetWindowPos 163->168 169 403a87-403a8a 163->169 166 403c4b-403c50 call 403f64 164->166 167 403c0d-403c10 164->167 165->164 179 403c55-403c70 166->179 171 403c12-403c1d call 401389 167->171 172 403c43-403c45 167->172 168->169 174 403aa4-403aaa 169->174 175 403a8c-403a9e ShowWindow 169->175 171->172 193 403c1f-403c3e SendMessageA 171->193 172->166 178 403ee5 172->178 180 403ac6-403ac9 174->180 181 403aac-403ac1 DestroyWindow 174->181 175->174 186 403ee7-403eee 178->186 184 403c72-403c74 call 40140b 179->184 185 403c79-403c7f 179->185 189 403acb-403ad7 SetWindowLongA 180->189 190 403adc-403ae2 180->190 187 403ec2-403ec8 181->187 184->185 196 403ea3-403ebc DestroyWindow EndDialog 185->196 197 403c85-403c90 185->197 187->178 194 403eca-403ed0 187->194 189->186 191 403b85-403b93 call 403f7f 190->191 192 403ae8-403af9 GetDlgItem 190->192 191->186 198 403b18-403b1b 192->198 199 403afb-403b12 SendMessageA IsWindowEnabled 192->199 193->186 194->178 201 403ed2-403edb ShowWindow 194->201 196->187 197->196 202 403c96-403ce3 call 405b88 call 403f18 * 3 GetDlgItem 197->202 203 403b20-403b23 198->203 204 403b1d-403b1e 198->204 199->178 199->198 201->178 230 403ce5-403cea 202->230 231 403ced-403d29 ShowWindow KiUserCallbackDispatcher call 403f3a KiUserCallbackDispatcher 202->231 208 403b31-403b36 203->208 209 403b25-403b2b 203->209 207 403b4e-403b53 call 403ef1 204->207 207->191 212 403b6c-403b7f SendMessageA 208->212 214 403b38-403b3e 208->214 209->212 213 403b2d-403b2f 209->213 212->191 213->207 218 403b40-403b46 call 40140b 214->218 219 403b55-403b5e call 40140b 214->219 228 403b4c 218->228 219->191 227 403b60-403b6a 219->227 227->228 228->207 230->231 234 403d2b-403d2c 231->234 235 403d2e 231->235 236 403d30-403d5e GetSystemMenu EnableMenuItem SendMessageA 234->236 235->236 237 403d60-403d71 SendMessageA 236->237 238 403d73 236->238 239 403d79-403db2 call 403f4d call 405b66 lstrlenA call 405b88 SetWindowTextA call 401389 237->239 238->239 239->179 248 403db8-403dba 239->248 248->179 249 403dc0-403dc4 248->249 250 403de3-403df7 DestroyWindow 249->250 251 403dc6-403dcc 249->251 250->187 253 403dfd-403e2a CreateDialogParamA 250->253 251->178 252 403dd2-403dd8 251->252 252->179 254 403dde 252->254 253->187 255 403e30-403e87 call 403f18 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 253->255 254->178 255->178 260 403e89-403e9c ShowWindow call 403f64 255->260 262 403ea1 260->262 262->187
                                        APIs
                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403A81
                                        • ShowWindow.USER32(?), ref: 00403A9E
                                        • DestroyWindow.USER32 ref: 00403AB2
                                        • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403ACE
                                        • GetDlgItem.USER32(?,?), ref: 00403AEF
                                        • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403B03
                                        • IsWindowEnabled.USER32(00000000), ref: 00403B0A
                                        • GetDlgItem.USER32(?,00000001), ref: 00403BB8
                                        • GetDlgItem.USER32(?,00000002), ref: 00403BC2
                                        • SetClassLongA.USER32(?,000000F2,?), ref: 00403BDC
                                        • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403C2D
                                        • GetDlgItem.USER32(?,00000003), ref: 00403CD3
                                        • ShowWindow.USER32(00000000,?), ref: 00403CF4
                                        • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403D06
                                        • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403D21
                                        • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403D37
                                        • EnableMenuItem.USER32(00000000), ref: 00403D3E
                                        • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403D56
                                        • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403D69
                                        • lstrlenA.KERNEL32(004204A0,?,004204A0,MusicDevelopments RapidComposer v5 WiN-MAC), ref: 00403D92
                                        • SetWindowTextA.USER32(?,004204A0), ref: 00403DA1
                                        • ShowWindow.USER32(?,0000000A), ref: 00403ED5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: Window$Item$MessageSend$Show$CallbackDispatcherLongMenuUser$ClassDestroyEnableEnabledSystemTextlstrlen
                                        • String ID: 4'R$MusicDevelopments RapidComposer v5 WiN-MAC
                                        • API String ID: 1252290697-257727839
                                        • Opcode ID: 14e7e0a8131732f9e150b36a7fce0cb21c204cb0cec2561e24870ec1d01c69b9
                                        • Instruction ID: 1b558320748e03173a152966608fa9e4bba3452d5179f8dde3fdb5243a6fbb8a
                                        • Opcode Fuzzy Hash: 14e7e0a8131732f9e150b36a7fce0cb21c204cb0cec2561e24870ec1d01c69b9
                                        • Instruction Fuzzy Hash: 21C18071A04204BBDB216F21ED45E2B3E7DEB4970AF40053EF541B12E1C739AA42DB6E

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 263 4036af-4036c7 call 405e88 266 4036c9-4036d9 call 405ac4 263->266 267 4036db-403702 call 405a4d 263->267 276 403725-40374e call 403978 call 40573a 266->276 272 403704-403715 call 405a4d 267->272 273 40371a-403720 lstrcatA 267->273 272->273 273->276 281 403754-403759 276->281 282 4037d5-4037dd call 40573a 276->282 281->282 284 40375b-40377f call 405a4d 281->284 288 4037eb-403810 LoadImageA 282->288 289 4037df-4037e6 call 405b88 282->289 284->282 290 403781-403783 284->290 292 403816-40384c RegisterClassA 288->292 293 40389f-4038a7 call 40140b 288->293 289->288 294 403794-4037a0 lstrlenA 290->294 295 403785-403792 call 405684 290->295 296 403852-40389a SystemParametersInfoA CreateWindowExA 292->296 297 40396e 292->297 306 4038b1-4038bc call 403978 293->306 307 4038a9-4038ac 293->307 301 4037a2-4037b0 lstrcmpiA 294->301 302 4037c8-4037d0 call 405659 call 405b66 294->302 295->294 296->293 299 403970-403977 297->299 301->302 305 4037b2-4037bc GetFileAttributesA 301->305 302->282 309 4037c2-4037c3 call 4056a0 305->309 310 4037be-4037c0 305->310 316 4038c2-4038df ShowWindow LoadLibraryA 306->316 317 403945-403946 call 404fd6 306->317 307->299 309->302 310->302 310->309 318 4038e1-4038e6 LoadLibraryA 316->318 319 4038e8-4038fa GetClassInfoA 316->319 323 40394b-40394d 317->323 318->319 321 403912-403935 DialogBoxParamA call 40140b 319->321 322 4038fc-40390c GetClassInfoA RegisterClassA 319->322 328 40393a-403943 call 4035ff 321->328 322->321 325 403967-403969 call 40140b 323->325 326 40394f-403955 323->326 325->297 326->307 329 40395b-403962 call 40140b 326->329 328->299 329->307
                                        APIs
                                          • Part of subcall function 00405E88: GetModuleHandleA.KERNEL32(?,?,00000000,0040327F,00000008), ref: 00405E9A
                                          • Part of subcall function 00405E88: LoadLibraryA.KERNEL32(?,?,00000000,0040327F,00000008), ref: 00405EA5
                                          • Part of subcall function 00405E88: GetProcAddress.KERNEL32(00000000,?), ref: 00405EB6
                                        • lstrcatA.KERNEL32(1033,004204A0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004204A0,00000000,00000006,"C:\Users\user\Desktop\hca5qDUYZH.exe",00000000,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403720
                                        • lstrlenA.KERNEL32(00422E40,?,?,?,00422E40,00000000,00429400,1033,004204A0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004204A0,00000000,00000006,"C:\Users\user\Desktop\hca5qDUYZH.exe"), ref: 00403795
                                        • lstrcmpiA.KERNEL32(?,.exe), ref: 004037A8
                                        • GetFileAttributesA.KERNEL32(00422E40), ref: 004037B3
                                        • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,00429400), ref: 004037FC
                                          • Part of subcall function 00405AC4: wsprintfA.USER32 ref: 00405AD1
                                        • RegisterClassA.USER32 ref: 00403843
                                        • SystemParametersInfoA.USER32(00000030,00000000,_Nb,00000000), ref: 0040385B
                                        • CreateWindowExA.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403894
                                        • ShowWindow.USER32(00000005,00000000), ref: 004038CA
                                        • LoadLibraryA.KERNEL32(RichEd20), ref: 004038DB
                                        • LoadLibraryA.KERNEL32(RichEd32), ref: 004038E6
                                        • GetClassInfoA.USER32(00000000,RichEdit20A,00423640), ref: 004038F6
                                        • GetClassInfoA.USER32(00000000,RichEdit,00423640), ref: 00403903
                                        • RegisterClassA.USER32(00423640), ref: 0040390C
                                        • DialogBoxParamA.USER32(?,00000000,00403A45,00000000), ref: 0040392B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                        • String ID: "C:\Users\user\Desktop\hca5qDUYZH.exe"$.DEFAULT\Control Panel\International$.exe$1033$@.B$@6B$A.B$C:\Users\user\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                        • API String ID: 914957316-332553273
                                        • Opcode ID: 6186cd0dc7f5b8c4dd386d80bd90aa2821d034a13263318605b4bd1c267fc880
                                        • Instruction ID: 5edcd83abe1923a5ef33726047749e404321c8c293ca1ea02831498dc8d0bb6f
                                        • Opcode Fuzzy Hash: 6186cd0dc7f5b8c4dd386d80bd90aa2821d034a13263318605b4bd1c267fc880
                                        • Instruction Fuzzy Hash: A961A3B16442007FD720AF659D45E2B3AADEB4475AF40457FF940B22E1D77CAD01CA2E

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 334 404060-404070 335 404183-404196 334->335 336 404076-40407e 334->336 337 4041f2-4041f6 335->337 338 404198-4041a1 335->338 339 404080-40408f 336->339 340 404091-404129 call 403f18 * 2 CheckDlgButton call 403f3a GetDlgItem call 403f4d SendMessageA 336->340 341 4042c6-4042cd 337->341 342 4041fc-404210 GetDlgItem 337->342 343 4042d5 338->343 344 4041a7-4041af 338->344 339->340 372 404134-40417e SendMessageA * 2 lstrlenA SendMessageA * 2 340->372 373 40412b-40412e GetSysColor 340->373 341->343 351 4042cf 341->351 348 404212-404219 342->348 349 404284-40428b 342->349 346 4042d8-4042df call 403f7f 343->346 344->343 350 4041b5-4041c1 344->350 357 4042e4-4042e8 346->357 348->349 354 40421b-404236 348->354 349->346 355 40428d-404294 349->355 350->343 356 4041c7-4041ed GetDlgItem SendMessageA call 403f3a call 4042eb 350->356 351->343 354->349 359 404238-404281 SendMessageA LoadCursorA SetCursor ShellExecuteA LoadCursorA SetCursor 354->359 355->346 360 404296-40429a 355->360 356->337 359->349 363 40429c-4042ab SendMessageA 360->363 364 4042ad-4042b1 360->364 363->364 368 4042c1-4042c4 364->368 369 4042b3-4042bf SendMessageA 364->369 368->357 369->368 372->357 373->372
                                        APIs
                                        • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 004040EB
                                        • GetDlgItem.USER32(00000000,000003E8), ref: 004040FF
                                        • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 0040411D
                                        • GetSysColor.USER32(?), ref: 0040412E
                                        • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 0040413D
                                        • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 0040414C
                                        • lstrlenA.KERNEL32(?), ref: 00404156
                                        • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404164
                                        • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 00404173
                                        • GetDlgItem.USER32(?,0000040A), ref: 004041D6
                                        • SendMessageA.USER32(00000000), ref: 004041D9
                                        • GetDlgItem.USER32(?,000003E8), ref: 00404204
                                        • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404244
                                        • LoadCursorA.USER32(00000000,00007F02), ref: 00404253
                                        • SetCursor.USER32(00000000), ref: 0040425C
                                        • ShellExecuteA.SHELL32(0000070B,open,@.B,00000000,00000000,00000001), ref: 0040426F
                                        • LoadCursorA.USER32(00000000,00007F00), ref: 0040427C
                                        • SetCursor.USER32(00000000), ref: 0040427F
                                        • SendMessageA.USER32(00000111,00000001,00000000), ref: 004042AB
                                        • SendMessageA.USER32(00000010,00000000,00000000), ref: 004042BF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                        • String ID: 4'R$@.B$N$open
                                        • API String ID: 3615053054-1261305837
                                        • Opcode ID: e8b988e3949f0b6d91b1b58256fef292242953983a672fd1ea6cb44b2e1e2ed0
                                        • Instruction ID: 7761d7a6ce13443680711406d70bf9c6d022160e69bfd2fffc9b265f6460a43d
                                        • Opcode Fuzzy Hash: e8b988e3949f0b6d91b1b58256fef292242953983a672fd1ea6cb44b2e1e2ed0
                                        • Instruction Fuzzy Hash: 4661B2B1A40209BFEB109F60DC45F6A3B69FB44755F10817AFB04BA2D1C7B8A951CF98

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 374 402c72-402cc0 GetTickCount GetModuleFileNameA call 40583d 377 402cc2-402cc7 374->377 378 402ccc-402cfa call 405b66 call 4056a0 call 405b66 GetFileSize 374->378 379 402f11-402f15 377->379 386 402d00-402d17 378->386 387 402dea-402df8 call 402bd3 378->387 388 402d19 386->388 389 402d1b-402d21 call 4031bf 386->389 393 402ec9-402ece 387->393 394 402dfe-402e01 387->394 388->389 395 402d26-402d28 389->395 393->379 396 402e03-402e14 call 4031f1 call 4031bf 394->396 397 402e2d-402e79 GlobalAlloc call 405f62 call 40586c CreateFileA 394->397 398 402e85-402e8d call 402bd3 395->398 399 402d2e-402d34 395->399 417 402e19-402e1b 396->417 424 402e7b-402e80 397->424 425 402e8f-402ebf call 4031f1 call 402f18 397->425 398->393 402 402db4-402db8 399->402 403 402d36-402d4e call 4057fe 399->403 406 402dc1-402dc7 402->406 407 402dba-402dc0 call 402bd3 402->407 403->406 421 402d50-402d57 403->421 413 402dc9-402dd7 call 405ef4 406->413 414 402dda-402de4 406->414 407->406 413->414 414->386 414->387 417->393 422 402e21-402e27 417->422 421->406 426 402d59-402d60 421->426 422->393 422->397 424->379 434 402ec4-402ec7 425->434 426->406 428 402d62-402d69 426->428 428->406 430 402d6b-402d72 428->430 430->406 432 402d74-402d94 430->432 432->393 433 402d9a-402d9e 432->433 435 402da0-402da4 433->435 436 402da6-402dae 433->436 434->393 437 402ed0-402ee1 434->437 435->387 435->436 436->406 438 402db0-402db2 436->438 439 402ee3 437->439 440 402ee9-402eee 437->440 438->406 439->440 441 402eef-402ef5 440->441 441->441 442 402ef7-402f0f call 4057fe 441->442 442->379
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 00402C86
                                        • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\hca5qDUYZH.exe,00000400), ref: 00402CA2
                                          • Part of subcall function 0040583D: GetFileAttributesA.KERNEL32(00000003,00402CB5,C:\Users\user\Desktop\hca5qDUYZH.exe,80000000,00000003), ref: 00405841
                                          • Part of subcall function 0040583D: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405863
                                        • GetFileSize.KERNEL32(00000000,00000000,0042B000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\hca5qDUYZH.exe,C:\Users\user\Desktop\hca5qDUYZH.exe,80000000,00000003), ref: 00402CEB
                                        • GlobalAlloc.KERNEL32(00000040,00409130), ref: 00402E32
                                        Strings
                                        • Null, xrefs: 00402D6B
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00402C72, 00402E4A
                                        • soft, xrefs: 00402D62
                                        • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402EC9
                                        • C:\Users\user\Desktop, xrefs: 00402CCD, 00402CD2, 00402CD8
                                        • Error launching installer, xrefs: 00402CC2
                                        • "C:\Users\user\Desktop\hca5qDUYZH.exe", xrefs: 00402C7F
                                        • Inst, xrefs: 00402D59
                                        • C:\Users\user\Desktop\hca5qDUYZH.exe, xrefs: 00402C8C, 00402C9B, 00402CAF, 00402CCC
                                        • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402E7B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                        • String ID: "C:\Users\user\Desktop\hca5qDUYZH.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\hca5qDUYZH.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                        • API String ID: 2803837635-4086546383
                                        • Opcode ID: 0cdd48fbc5a4d5c8723b79192c8575744a8c62d839b7521bcc62a74243bb106d
                                        • Instruction ID: 0b72a330c31c6d4d52753dad6a5c3012229d4666e6dae103a7747cbc92612fb8
                                        • Opcode Fuzzy Hash: 0cdd48fbc5a4d5c8723b79192c8575744a8c62d839b7521bcc62a74243bb106d
                                        • Instruction Fuzzy Hash: B761E231A40215ABDB20DF64DE49B9E7BB4EB04315F20407BF904B62D2D7BC9E458B9C

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 514 401734-401757 call 4029f6 call 4056c6 519 401761-401773 call 405b66 call 405659 lstrcatA 514->519 520 401759-40175f call 405b66 514->520 525 401778-40177e call 405dc8 519->525 520->525 530 401783-401787 525->530 531 401789-401793 call 405e61 530->531 532 4017ba-4017bd 530->532 540 4017a5-4017b7 531->540 541 401795-4017a3 CompareFileTime 531->541 533 4017c5-4017e1 call 40583d 532->533 534 4017bf-4017c0 call 40581e 532->534 542 4017e3-4017e6 533->542 543 401859-401882 call 404f04 call 402f18 533->543 534->533 540->532 541->540 544 4017e8-40182a call 405b66 * 2 call 405b88 call 405b66 call 405427 542->544 545 40183b-401845 call 404f04 542->545 557 401884-401888 543->557 558 40188a-401896 SetFileTime 543->558 544->530 577 401830-401831 544->577 555 40184e-401854 545->555 560 402894 555->560 557->558 559 40189c-4018a7 CloseHandle 557->559 558->559 562 40288b-40288e 559->562 563 4018ad-4018b0 559->563 564 402896-40289a 560->564 562->560 566 4018b2-4018c3 call 405b88 lstrcatA 563->566 567 4018c5-4018c8 call 405b88 563->567 573 4018cd-402213 call 405427 566->573 567->573 573->564 581 40265c-402663 573->581 577->555 579 401833-401834 577->579 579->545 581->562
                                        APIs
                                        • lstrcatA.KERNEL32(00000000,00000000,get,00429800,00000000,00000000,00000031), ref: 00401773
                                        • CompareFileTime.KERNEL32(-00000014,?,get,get,00000000,00000000,get,00429800,00000000,00000000,00000031), ref: 0040179D
                                          • Part of subcall function 00405B66: lstrcpynA.KERNEL32(?,?,00000400,004032AA,MusicDevelopments RapidComposer v5 WiN-MAC,NSIS Error), ref: 00405B73
                                          • Part of subcall function 00404F04: lstrlenA.KERNEL32(0041FC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000,?), ref: 00404F3D
                                          • Part of subcall function 00404F04: lstrlenA.KERNEL32(00402C4A,0041FC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000), ref: 00404F4D
                                          • Part of subcall function 00404F04: lstrcatA.KERNEL32(0041FC78,00402C4A,00402C4A,0041FC78,00000000,00000000,00000000), ref: 00404F60
                                          • Part of subcall function 00404F04: SetWindowTextA.USER32(0041FC78,0041FC78), ref: 00404F72
                                          • Part of subcall function 00404F04: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F98
                                          • Part of subcall function 00404F04: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404FB2
                                          • Part of subcall function 00404F04: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404FC0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                        • String ID: C:\Users\user\AppData\Local\Temp\nsj455.tmp\s$get
                                        • API String ID: 1941528284-1242736803
                                        • Opcode ID: 7e13bad854fddeb55fa2929aff0ffc3a5c93114e1649d47e1deeff05be23e6f2
                                        • Instruction ID: ca24b6133afb507e547736dc5ab02d451b7f1a2d30e0a517c5ad6537af4b780a
                                        • Opcode Fuzzy Hash: 7e13bad854fddeb55fa2929aff0ffc3a5c93114e1649d47e1deeff05be23e6f2
                                        • Instruction Fuzzy Hash: 8441C131900515BBCB10BFB5DD46EAF3A79EF01369B24433BF511B11E1D63C9A418AAD

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 582 402f18-402f27 583 402f45-402f50 call 403043 582->583 584 402f29-402f3f SetFilePointer 582->584 587 402f56-402f70 ReadFile 583->587 588 40303c-403040 583->588 584->583 589 402f76-402f79 587->589 590 403039 587->590 589->590 592 402f7f-402f92 call 403043 589->592 591 40303b 590->591 591->588 592->588 595 402f98-402f9b 592->595 596 403008-40300e 595->596 597 402f9d-402fa0 595->597 600 403010 596->600 601 403013-403026 ReadFile 596->601 598 403034-403037 597->598 599 402fa6 597->599 598->588 603 402fab-402fb3 599->603 600->601 601->590 602 403028-403031 601->602 602->598 604 402fb5 603->604 605 402fb8-402fca ReadFile 603->605 604->605 605->590 606 402fcc-402fcf 605->606 606->590 607 402fd1-402fe6 WriteFile 606->607 608 403004-403006 607->608 609 402fe8-402feb 607->609 608->591 609->608 610 402fed-403000 609->610 610->603 611 403002 610->611 611->598
                                        APIs
                                        • SetFilePointer.KERNEL32(00409130,00000000,00000000,00000000,00000000,00000000,?,?,?,00402EC4,000000FF,00000000,00000000,00409130,0000B5E4), ref: 00402F3F
                                        • ReadFile.KERNEL32(00409130,00000004,0000B5E4,00000000,00000004,00000000,00000000,00000000,?,?,?,00402EC4,000000FF,00000000,00000000,00409130), ref: 00402F6C
                                        • ReadFile.KERNEL32(00413040,00004000,0000B5E4,00000000,00409130,?,00402EC4,000000FF,00000000,00000000,00409130,0000B5E4), ref: 00402FC6
                                        • WriteFile.KERNEL32(00000000,00413040,0000B5E4,000000FF,00000000,?,00402EC4,000000FF,00000000,00000000,00409130,0000B5E4), ref: 00402FDE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: File$Read$PointerWrite
                                        • String ID: @0A
                                        • API String ID: 2113905535-1363546919
                                        • Opcode ID: 3fc20a6f8204afd4db5be5275d6ec1a2b538eb21de19a3adc5be7867336c551b
                                        • Instruction ID: f0f891dec1baa82fcb152a6e3a42d02399587e043c2e4755ce28507b82245ee9
                                        • Opcode Fuzzy Hash: 3fc20a6f8204afd4db5be5275d6ec1a2b538eb21de19a3adc5be7867336c551b
                                        • Instruction Fuzzy Hash: 3F315731501249EBDB21CF55DD40A9E7FBCEB843A5F20407AFA05A6190D3789F81DBA9

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 612 404f04-404f19 613 404fcf-404fd3 612->613 614 404f1f-404f31 612->614 615 404f33-404f37 call 405b88 614->615 616 404f3c-404f48 lstrlenA 614->616 615->616 618 404f65-404f69 616->618 619 404f4a-404f5a lstrlenA 616->619 621 404f78-404f7c 618->621 622 404f6b-404f72 SetWindowTextA 618->622 619->613 620 404f5c-404f60 lstrcatA 619->620 620->618 623 404fc2-404fc4 621->623 624 404f7e-404fc0 SendMessageA * 3 621->624 622->621 623->613 625 404fc6-404fc9 623->625 624->623 625->613
                                        APIs
                                        • lstrlenA.KERNEL32(0041FC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000,?), ref: 00404F3D
                                        • lstrlenA.KERNEL32(00402C4A,0041FC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000), ref: 00404F4D
                                        • lstrcatA.KERNEL32(0041FC78,00402C4A,00402C4A,0041FC78,00000000,00000000,00000000), ref: 00404F60
                                        • SetWindowTextA.USER32(0041FC78,0041FC78), ref: 00404F72
                                        • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F98
                                        • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404FB2
                                        • SendMessageA.USER32(?,00001013,?,00000000), ref: 00404FC0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                        • String ID:
                                        • API String ID: 2531174081-0
                                        • Opcode ID: 3060ff48176a0075549dcba78de7f639edbccfa172efc44d831dc49f1ba50047
                                        • Instruction ID: 33d69ec58002f5e3cec48cf4aa7ac502a1da6879986bf9ca4026f821734cd723
                                        • Opcode Fuzzy Hash: 3060ff48176a0075549dcba78de7f639edbccfa172efc44d831dc49f1ba50047
                                        • Instruction Fuzzy Hash: C4219D71A00108BBDF119FA5CD849DEBFB9EB49354F14807AFA04B6290C3389E45CBA8

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 626 402bd3-402bdf 627 402be1-402be8 626->627 628 402bf9-402bff 626->628 631 402bf1-402bf7 627->631 632 402bea-402beb DestroyWindow 627->632 629 402c01-402c07 call 405ec1 628->629 630 402c09-402c15 GetTickCount 628->630 635 402c6f-402c71 629->635 634 402c17-402c1d 630->634 630->635 631->635 632->631 637 402c4c-402c69 CreateDialogParamA ShowWindow 634->637 638 402c1f-402c26 634->638 637->635 638->635 639 402c28-402c45 call 402bb7 wsprintfA call 404f04 638->639 643 402c4a 639->643 643->635
                                        APIs
                                        • DestroyWindow.USER32(00000000,00000000), ref: 00402BEB
                                        • GetTickCount.KERNEL32 ref: 00402C09
                                        • wsprintfA.USER32 ref: 00402C37
                                          • Part of subcall function 00404F04: lstrlenA.KERNEL32(0041FC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000,?), ref: 00404F3D
                                          • Part of subcall function 00404F04: lstrlenA.KERNEL32(00402C4A,0041FC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000), ref: 00404F4D
                                          • Part of subcall function 00404F04: lstrcatA.KERNEL32(0041FC78,00402C4A,00402C4A,0041FC78,00000000,00000000,00000000), ref: 00404F60
                                          • Part of subcall function 00404F04: SetWindowTextA.USER32(0041FC78,0041FC78), ref: 00404F72
                                          • Part of subcall function 00404F04: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F98
                                          • Part of subcall function 00404F04: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404FB2
                                          • Part of subcall function 00404F04: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404FC0
                                        • CreateDialogParamA.USER32(0000006F,00000000,00402B3B,00000000), ref: 00402C5B
                                        • ShowWindow.USER32(00000000,00000005), ref: 00402C69
                                          • Part of subcall function 00402BB7: MulDiv.KERNEL32(00000000,00000064,0000439F), ref: 00402BCC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                        • String ID: ... %d%%
                                        • API String ID: 722711167-2449383134
                                        • Opcode ID: f8ace1eb95c0e61b2c61dafef86db0eeb17deac8452a01d8f5baf0090805ef89
                                        • Instruction ID: c44cf6bb529b7c61e0c77009ed50883557557090b8ffabf6f859222ef57aaf40
                                        • Opcode Fuzzy Hash: f8ace1eb95c0e61b2c61dafef86db0eeb17deac8452a01d8f5baf0090805ef89
                                        • Instruction Fuzzy Hash: C6016170949210EBD7215F61EE4DA9F7B78AB04701B14403BF502B11E5C6BC9A01CBAE

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 644 403043-40306c GetTickCount 645 403072-40309d call 4031f1 SetFilePointer 644->645 646 4031ad-4031b5 call 402bd3 644->646 652 4030a2-4030b4 645->652 651 4031b7-4031bc 646->651 653 4030b6 652->653 654 4030b8-4030c6 call 4031bf 652->654 653->654 657 4030cc-4030d8 654->657 658 40319f-4031a2 654->658 659 4030de-4030e4 657->659 658->651 660 4030e6-4030ec 659->660 661 40310f-40312b call 405f82 659->661 660->661 663 4030ee-403109 call 402bd3 660->663 667 4031a8 661->667 668 40312d-403135 661->668 666 40310e 663->666 666->661 669 4031aa-4031ab 667->669 670 403137-40314d WriteFile 668->670 671 403169-40316f 668->671 669->651 672 4031a4-4031a6 670->672 673 40314f-403153 670->673 671->667 674 403171-403173 671->674 672->669 673->672 675 403155-403161 673->675 674->667 676 403175-403188 674->676 675->659 677 403167 675->677 676->652 678 40318e-40319d SetFilePointer 676->678 677->676 678->646
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 00403058
                                          • Part of subcall function 004031F1: SetFilePointer.KERNEL32(00000000,00000000,00000000,00402E9D,0000B5E4), ref: 004031FF
                                        • SetFilePointer.KERNEL32(00000000,00000000,?,00000000,?,00402F4E,00000004,00000000,00000000,00000000,?,?,?,00402EC4,000000FF,00000000), ref: 0040308B
                                        • WriteFile.KERNEL32(0040B040,0040F3DF,00000000,00000000,00413040,00004000,?,00000000,?,00402F4E,00000004,00000000,00000000,00000000,?,?), ref: 00403145
                                        • SetFilePointer.KERNEL32(00AD6CC1,00000000,00000000,00413040,00004000,?,00000000,?,00402F4E,00000004,00000000,00000000,00000000,?,?), ref: 00403197
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: File$Pointer$CountTickWrite
                                        • String ID: @0A
                                        • API String ID: 2146148272-1363546919
                                        • Opcode ID: c3ab3b2a6ebb8e6cedc02463b91186366695901546e3771a82caeddcf6bda455
                                        • Instruction ID: c862c83604f3b109b9ae356e59bf9e99270c6d64ee518f880403d0392c1b0dc8
                                        • Opcode Fuzzy Hash: c3ab3b2a6ebb8e6cedc02463b91186366695901546e3771a82caeddcf6bda455
                                        • Instruction Fuzzy Hash: 4B41ABB25042029FD710CF29EE4096A7FBDF748356705423BE501BA2E1CB3C6E099B9E

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 679 401f51-401f5d 680 401f63-401f79 call 4029f6 * 2 679->680 681 402019-40201b 679->681 691 401f88-401f96 LoadLibraryExA 680->691 692 401f7b-401f86 GetModuleHandleA 680->692 683 402164-402169 call 401423 681->683 689 40288b-40289a 683->689 694 401f98-401fa6 GetProcAddress 691->694 695 402012-402014 691->695 692->691 692->694 696 401fe5-401fea call 404f04 694->696 697 401fa8-401fae 694->697 695->683 701 401fef-401ff2 696->701 699 401fb0-401fbc call 401423 697->699 700 401fc7-401fdb 697->700 699->701 709 401fbe-401fc5 699->709 703 401fe0-401fe3 700->703 701->689 704 401ff8-402000 call 40364f 701->704 703->701 704->689 710 402006-40200d FreeLibrary 704->710 709->701 710->689
                                        APIs
                                        • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 00401F7C
                                          • Part of subcall function 00404F04: lstrlenA.KERNEL32(0041FC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000,?), ref: 00404F3D
                                          • Part of subcall function 00404F04: lstrlenA.KERNEL32(00402C4A,0041FC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000), ref: 00404F4D
                                          • Part of subcall function 00404F04: lstrcatA.KERNEL32(0041FC78,00402C4A,00402C4A,0041FC78,00000000,00000000,00000000), ref: 00404F60
                                          • Part of subcall function 00404F04: SetWindowTextA.USER32(0041FC78,0041FC78), ref: 00404F72
                                          • Part of subcall function 00404F04: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F98
                                          • Part of subcall function 00404F04: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404FB2
                                          • Part of subcall function 00404F04: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404FC0
                                        • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00401F8C
                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00401F9C
                                        • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 00402007
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                        • String ID: ?B
                                        • API String ID: 2987980305-117478770
                                        • Opcode ID: 8a5e19ada2a0501c23d939e05fc9a3d0d7d0ee5640c0e41b76e5c8575941fe9f
                                        • Instruction ID: 83c29b7dad20212888764ed045f323035a642c1bbb84e8da84d377f5f563bf0e
                                        • Opcode Fuzzy Hash: 8a5e19ada2a0501c23d939e05fc9a3d0d7d0ee5640c0e41b76e5c8575941fe9f
                                        • Instruction Fuzzy Hash: D621EE72D04216EBCF207FA4DE49A6E75B06B44399F204237F511B52E0D77C4D41965E

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 711 40586c-405876 712 405877-4058a1 GetTickCount GetTempFileNameA 711->712 713 4058b0-4058b2 712->713 714 4058a3-4058a5 712->714 716 4058aa-4058ad 713->716 714->712 715 4058a7 714->715 715->716
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 0040587F
                                        • GetTempFileNameA.KERNEL32(?,0061736E,00000000,?), ref: 00405899
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: CountFileNameTempTick
                                        • String ID: "C:\Users\user\Desktop\hca5qDUYZH.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                        • API String ID: 1716503409-180323883
                                        • Opcode ID: fc5e126f8815d4696b9f295c06fae67d9d4e63728d0dbdda5093f58b42bfadad
                                        • Instruction ID: 7bdb262dbebad2fb51735791196b4a750b565e3ebaa120aaaad2cbe3184e43fd
                                        • Opcode Fuzzy Hash: fc5e126f8815d4696b9f295c06fae67d9d4e63728d0dbdda5093f58b42bfadad
                                        • Instruction Fuzzy Hash: B1F0A73734820876E7105E55DC04B9B7F9DDF91760F14C027FE44DA1C0D6B49954C7A5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 717 401bad-401bc5 call 4029d9 * 2 722 401bd1-401bd5 717->722 723 401bc7-401bce call 4029f6 717->723 725 401be1-401be7 722->725 726 401bd7-401bde call 4029f6 722->726 723->722 729 401be9-401bfd call 4029d9 * 2 725->729 730 401c2d-401c53 call 4029f6 * 2 FindWindowExA 725->730 726->725 740 401c1d-401c2b SendMessageA 729->740 741 401bff-401c1b SendMessageTimeoutA 729->741 742 401c59 730->742 740->742 743 401c5c-401c5f 741->743 742->743 744 401c65 743->744 745 40288b-40289a 743->745 744->745
                                        APIs
                                        • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C0D
                                        • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C25
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: MessageSend$Timeout
                                        • String ID: !
                                        • API String ID: 1777923405-2657877971
                                        • Opcode ID: 4c88f05d798f5705ce1e1e18451d2fcf653d7f56610e9d44bad61831beeb824c
                                        • Instruction ID: 67abd366a37910a3fb0c7fe19d632a25016d3899897cc5a5bd850e91adcb6683
                                        • Opcode Fuzzy Hash: 4c88f05d798f5705ce1e1e18451d2fcf653d7f56610e9d44bad61831beeb824c
                                        • Instruction Fuzzy Hash: B721C4B1A44209BFEF01AFB4CE4AAAE7B75EF44344F14053EF602B60D1D6B84980E718
                                        APIs
                                          • Part of subcall function 004056ED: CharNextA.USER32(0040549F,?,004218A8,00000000,00405751,004218A8,004218A8,?,?,75922EE0,0040549F,?,"C:\Users\user\Desktop\hca5qDUYZH.exe",75922EE0), ref: 004056FB
                                          • Part of subcall function 004056ED: CharNextA.USER32(00000000), ref: 00405700
                                          • Part of subcall function 004056ED: CharNextA.USER32(00000000), ref: 0040570F
                                        • CreateDirectoryA.KERNEL32(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015DB
                                        • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015E5
                                        • GetFileAttributesA.KERNEL32(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015F3
                                        • SetCurrentDirectoryA.KERNEL32(00000000,00429800,00000000,00000000,000000F0), ref: 00401622
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                        • String ID:
                                        • API String ID: 3751793516-0
                                        • Opcode ID: 79158bb1b9e0f9446a8291b1140989ad94052719e68ebd3d846b01836d69eb3e
                                        • Instruction ID: c38907cd9fbddcdb820990ab727de55d75fa8bca08f123d111df4852c942a759
                                        • Opcode Fuzzy Hash: 79158bb1b9e0f9446a8291b1140989ad94052719e68ebd3d846b01836d69eb3e
                                        • Instruction Fuzzy Hash: 7E010431D08141AFDB216F751D4497F27B0AA56369728073FF891B22E2C63C0942962E
                                        APIs
                                        • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                        • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID: /R
                                        • API String ID: 3850602802-1934138409
                                        • Opcode ID: 7b8e9ba5108b55dad21e1cb19ef7846daac3b048e1c883625bc8c045044f289d
                                        • Instruction ID: b71ad761f0ea07ecc4e6183a90c0cd8288537aab3e92bb5761005deb6e4a9b1f
                                        • Opcode Fuzzy Hash: 7b8e9ba5108b55dad21e1cb19ef7846daac3b048e1c883625bc8c045044f289d
                                        • Instruction Fuzzy Hash: 20014431B24210ABE7291B388D08B2A32ADE714315F10423FF801F32F0D678DC028B4C
                                        APIs
                                          • Part of subcall function 00405DC8: CharNextA.USER32(?,*?|<>/":,00000000,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\hca5qDUYZH.exe",C:\Users\user\AppData\Local\Temp\,00000000,00403214,C:\Users\user\AppData\Local\Temp\,00000000,00403386), ref: 00405E20
                                          • Part of subcall function 00405DC8: CharNextA.USER32(?,?,?,00000000), ref: 00405E2D
                                          • Part of subcall function 00405DC8: CharNextA.USER32(?,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\hca5qDUYZH.exe",C:\Users\user\AppData\Local\Temp\,00000000,00403214,C:\Users\user\AppData\Local\Temp\,00000000,00403386), ref: 00405E32
                                          • Part of subcall function 00405DC8: CharPrevA.USER32(?,?,"C:\Users\user\Desktop\hca5qDUYZH.exe",C:\Users\user\AppData\Local\Temp\,00000000,00403214,C:\Users\user\AppData\Local\Temp\,00000000,00403386), ref: 00405E42
                                        • CreateDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403386), ref: 00403229
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: Char$Next$CreateDirectoryPrev
                                        • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                                        • API String ID: 4115351271-2030658151
                                        • Opcode ID: abd89e45c2a658b1316b3d4f01b0b3756ccb9227471bfd75c63f163c6189ffd7
                                        • Instruction ID: 28437e5e833f6c5712a3d87292ca06883de7807d6adf700678bf42288e0e849f
                                        • Opcode Fuzzy Hash: abd89e45c2a658b1316b3d4f01b0b3756ccb9227471bfd75c63f163c6189ffd7
                                        • Instruction Fuzzy Hash: 11D0C922656E3032C651363A3C0AFDF091C8F5271AF55847BF908B40D64B6C5A5259EF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b47bfdafb4299acf6df14b1a265fb959f908a42d38d0bc6d60d6342fbb02c28f
                                        • Instruction ID: 319d18918fa2cc3741333e20ed782d5c303dd2f769888eebbc994f2124d7c2e6
                                        • Opcode Fuzzy Hash: b47bfdafb4299acf6df14b1a265fb959f908a42d38d0bc6d60d6342fbb02c28f
                                        • Instruction Fuzzy Hash: 29A15171E00229CBDF28CFA8C8547ADBBB1FF44305F15812AD856BB281D7789A96DF44
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d0b545a720d06a2780d8eb9310de1c164ea8e259f40aa19cdef3f662a7789f4d
                                        • Instruction ID: 868f2ec1f3ea74d7de1394d818727f69d5aca31e92bf34b5737afca42cfaef71
                                        • Opcode Fuzzy Hash: d0b545a720d06a2780d8eb9310de1c164ea8e259f40aa19cdef3f662a7789f4d
                                        • Instruction Fuzzy Hash: 6E913171D00229CBEF28CF98C8547ADBBB1FF44305F15812AD856BB281C7789A9ADF44
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3ca4e82cbd918d9bc6f131d9bc7fd5d61b9600368ad5a57dd77e762cc9babb20
                                        • Instruction ID: e06b97397237a54a8f7c6fae7a0c48c933f493286525731b7b3672fa0d973436
                                        • Opcode Fuzzy Hash: 3ca4e82cbd918d9bc6f131d9bc7fd5d61b9600368ad5a57dd77e762cc9babb20
                                        • Instruction Fuzzy Hash: 678155B1D00229CFDF24CFA8C8447ADBBB1FB44305F25816AD456BB281D7789A96CF54
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c94337aa44be19872a05e7fe324c1f72408cb83bc4afcb37e89916e28dd5cdb7
                                        • Instruction ID: 3ccfc7c80e99de65fa6db0e0edc8679980b1d0ea62cd2807200041591328ae3c
                                        • Opcode Fuzzy Hash: c94337aa44be19872a05e7fe324c1f72408cb83bc4afcb37e89916e28dd5cdb7
                                        • Instruction Fuzzy Hash: D98187B1D00229CBDF24CFA8C8447AEBBB1FB44305F11816AD856BB2C1C7785A96CF44
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 040a7e0d789931a885e98904e34fb369bef72c7c312577bd0d6f252efd828c84
                                        • Instruction ID: 235c9a1f152390887c8e3346b3cf8cf745e7d176c25095dba4735a56a8f4339d
                                        • Opcode Fuzzy Hash: 040a7e0d789931a885e98904e34fb369bef72c7c312577bd0d6f252efd828c84
                                        • Instruction Fuzzy Hash: 80714371D00229CBDF28CFA8C8447ADBBF1FB48305F15806AD846BB281D7395A96DF54
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 55b1e8378e3b2d282ecc9e99db2cbf184c75cfe722202a43e2005f386b139382
                                        • Instruction ID: 067b91939e33353516387f96afd3df60e22fb0a2a23546be1218d687de4ca84d
                                        • Opcode Fuzzy Hash: 55b1e8378e3b2d282ecc9e99db2cbf184c75cfe722202a43e2005f386b139382
                                        • Instruction Fuzzy Hash: 14715371E00229CFEF28CF98C844BADBBB1FB44305F15816AD816BB281C7799996DF54
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c10b0ec6d8a1716373c4594016b158d4b4e2bf5790cbb1f15a9d43b973b4a336
                                        • Instruction ID: fa01dbb36adddbb747bc37ce8d7c8691094d52a97b4972d7f98645f49a39bfe1
                                        • Opcode Fuzzy Hash: c10b0ec6d8a1716373c4594016b158d4b4e2bf5790cbb1f15a9d43b973b4a336
                                        • Instruction Fuzzy Hash: B3715671D00229CBEF28CF98C844BADBBB1FF44305F11816AD856BB281C7795A56DF54
                                        APIs
                                        • ReadFile.KERNEL32(?,?,00000001,?,?,?,00000002), ref: 00402552
                                          • Part of subcall function 00405AC4: wsprintfA.USER32 ref: 00405AD1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: FileReadwsprintf
                                        • String ID:
                                        • API String ID: 3326442220-0
                                        • Opcode ID: f09489efe15c3b80ce99059f114ac931b0952256192e953ec66e22e0d2490737
                                        • Instruction ID: 6cc84ed2bafa7cfa1e138a8cf3ad7e95c15831b5a897215fce06e49f2d1c7330
                                        • Opcode Fuzzy Hash: f09489efe15c3b80ce99059f114ac931b0952256192e953ec66e22e0d2490737
                                        • Instruction Fuzzy Hash: 6821F870D05259BFCF219F648E595EEBBB49B01304F14817BE881B63D2D1BC8A81C72D
                                        APIs
                                        • GetFileAttributesA.KERNEL32(00000003,00402CB5,C:\Users\user\Desktop\hca5qDUYZH.exe,80000000,00000003), ref: 00405841
                                        • CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405863
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: File$AttributesCreate
                                        • String ID:
                                        • API String ID: 415043291-0
                                        • Opcode ID: 6d56aff3fab625e069b8f0f4beb3d6c68df7a2746e2dd21b0a72e0224e52029a
                                        • Instruction ID: 90a47e22fdd321f70bf06df01bfdefa11f3e73682391c7296034eb3a8fe04f39
                                        • Opcode Fuzzy Hash: 6d56aff3fab625e069b8f0f4beb3d6c68df7a2746e2dd21b0a72e0224e52029a
                                        • Instruction Fuzzy Hash: 8CD09E31658301AFEF098F20DD1AF2E7AA2EB84B00F10562CB646940E0D6715815DB16
                                        APIs
                                        • GetFileAttributesA.KERNEL32(?,00405629,?,?,?), ref: 00405822
                                        • SetFileAttributesA.KERNEL32(?,00000000), ref: 00405834
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: AttributesFile
                                        • String ID:
                                        • API String ID: 3188754299-0
                                        • Opcode ID: 499c41a265c8c72c251eb99c81a2d8ea197c0ca55525d81af5d9f53b6a62e1c9
                                        • Instruction ID: 89544605ef234ac14ed66c3b065a2d642d1346908a696065e0ba681aeed38476
                                        • Opcode Fuzzy Hash: 499c41a265c8c72c251eb99c81a2d8ea197c0ca55525d81af5d9f53b6a62e1c9
                                        • Instruction Fuzzy Hash: F8C04CB1808501ABD7056B24EF0D81F7B66EF50325B108B35F5A9E00F0C7355C66DA1A
                                        APIs
                                        • ReadFile.KERNEL32(00409130,00000000,00000000,00000000,00413040,0040B040,004030C4,00413040,00004000,?,00000000,?,00402F4E,00000004,00000000,00000000), ref: 004031D6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: FileRead
                                        • String ID:
                                        • API String ID: 2738559852-0
                                        • Opcode ID: 728267699a9b44ddad9e6e694247195ab13049bac6004c2e56fc09e99b3f0f19
                                        • Instruction ID: 4c5c04567c480c11bae84e94003d2882b37cb3083c3cc1db03504fe221b835f3
                                        • Opcode Fuzzy Hash: 728267699a9b44ddad9e6e694247195ab13049bac6004c2e56fc09e99b3f0f19
                                        • Instruction Fuzzy Hash: DAE08631500119BBCF215E619C00A973B5CEB09362F008033FA04E9190D532DB109BA5
                                        APIs
                                        • SetDlgItemTextA.USER32(?,?,00000000), ref: 00403F32
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: ItemText
                                        • String ID:
                                        • API String ID: 3367045223-0
                                        • Opcode ID: 3e813572aabfc24dd457d3397d8ae2cb884b5dfcfb659632984281e934c33c5c
                                        • Instruction ID: 32956ba5a052c000d200729fffd4f2c944d874cb1110b62223aa4bdd109d9e57
                                        • Opcode Fuzzy Hash: 3e813572aabfc24dd457d3397d8ae2cb884b5dfcfb659632984281e934c33c5c
                                        • Instruction Fuzzy Hash: E4C08C31048200BFD241AB04CC42F1FB3A8EFA0327F00C92EB05CE00D2C634D420CE2A
                                        APIs
                                        • SendMessageA.USER32(00020494,00000000,00000000,00000000), ref: 00403F76
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: 74a19277012f6d931596f598d2f6ffa2ec736fc7041dbb57cfa43a045af561dc
                                        • Instruction ID: 4934297729c285da13a483c37f1bad53b44c21571947472378d90217470b6476
                                        • Opcode Fuzzy Hash: 74a19277012f6d931596f598d2f6ffa2ec736fc7041dbb57cfa43a045af561dc
                                        • Instruction Fuzzy Hash: 6CC04C71B442017AEA209F619D45F177B68A754701F5444657204A51D0C674E510D61D
                                        APIs
                                        • SendMessageA.USER32(00000028,?,00000001,00403D7E), ref: 00403F5B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: 5380ca26047a56ac044db27ec5452a3d407db4c462228856e9187df95d64c5b6
                                        • Instruction ID: 0662716cb4741bc9db58cdf5bc89cb1196afa115b106f7c4ea820954fb206898
                                        • Opcode Fuzzy Hash: 5380ca26047a56ac044db27ec5452a3d407db4c462228856e9187df95d64c5b6
                                        • Instruction Fuzzy Hash: 17B09276685201BADA215B10DE09F457E62E764702F018064B204240B0C6B200A5DB09
                                        APIs
                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00402E9D,0000B5E4), ref: 004031FF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: FilePointer
                                        • String ID:
                                        • API String ID: 973152223-0
                                        • Opcode ID: 2028dafccfaa88a297be93e7ba1f52e009ec02dcd94d5fd44c1761bf2bffe23e
                                        • Instruction ID: eafd0aff1283cdec3023edec91852d87283cefa69c9b21bce59c6677f93a42a7
                                        • Opcode Fuzzy Hash: 2028dafccfaa88a297be93e7ba1f52e009ec02dcd94d5fd44c1761bf2bffe23e
                                        • Instruction Fuzzy Hash: 14B01271644200BFDB214F00DF06F057B21A790701F108030B344380F082712420EB1E
                                        APIs
                                        • KiUserCallbackDispatcher.NTDLL(?,00403D17), ref: 00403F44
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: CallbackDispatcherUser
                                        • String ID:
                                        • API String ID: 2492992576-0
                                        • Opcode ID: 315e157356e8942ef3b8d7e2082c61631171d9164c942d8812de0ab912510814
                                        • Instruction ID: 218003202f2b1835e3bff4e9bf146b8b4f872d9b8cc4e3003fd48478f7f9154f
                                        • Opcode Fuzzy Hash: 315e157356e8942ef3b8d7e2082c61631171d9164c942d8812de0ab912510814
                                        • Instruction Fuzzy Hash: 09A002755051049BCA519B54DE048057A62A754701741C479B24551575C7315461EB6E
                                        APIs
                                        • GetDlgItem.USER32(?,000003F9), ref: 0040486A
                                        • GetDlgItem.USER32(?,00000408), ref: 00404877
                                        • GlobalAlloc.KERNEL32(00000040,00000002), ref: 004048C3
                                        • LoadBitmapA.USER32(0000006E), ref: 004048D6
                                        • SetWindowLongA.USER32(?,000000FC,00404E54), ref: 004048F0
                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404904
                                        • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404918
                                        • SendMessageA.USER32(?,00001109,00000002), ref: 0040492D
                                        • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404939
                                        • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 0040494B
                                        • DeleteObject.GDI32(?), ref: 00404950
                                        • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 0040497B
                                        • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404987
                                        • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404A1C
                                        • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404A47
                                        • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404A5B
                                        • GetWindowLongA.USER32(?,000000F0), ref: 00404A8A
                                        • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404A98
                                        • ShowWindow.USER32(?,00000005), ref: 00404AA9
                                        • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404BAC
                                        • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404C11
                                        • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404C26
                                        • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404C4A
                                        • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404C70
                                        • ImageList_Destroy.COMCTL32(?), ref: 00404C85
                                        • GlobalFree.KERNEL32(?), ref: 00404C95
                                        • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404D05
                                        • SendMessageA.USER32(?,00001102,00000410,?), ref: 00404DAE
                                        • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404DBD
                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00404DDD
                                        • ShowWindow.USER32(?,00000000), ref: 00404E2B
                                        • GetDlgItem.USER32(?,000003FE), ref: 00404E36
                                        • ShowWindow.USER32(00000000), ref: 00404E3D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                        • String ID: $M$N
                                        • API String ID: 1638840714-813528018
                                        • Opcode ID: dede86c728acf6a11cc3ab5fbc78af527f28fbd96654b5baab0c469e43695f01
                                        • Instruction ID: 91af9d563adbb526dddc39620d8b288a2aea1bcbb5731436b9e02a5cfbe7d22d
                                        • Opcode Fuzzy Hash: dede86c728acf6a11cc3ab5fbc78af527f28fbd96654b5baab0c469e43695f01
                                        • Instruction Fuzzy Hash: AB029FB0E00209AFDB21DF54DD45AAE7BB5FB84315F10817AF610BA2E1C7799A42CF58
                                        APIs
                                        • GetDlgItem.USER32(?,000003FB), ref: 004043A2
                                        • SetWindowTextA.USER32(?,?), ref: 004043CF
                                        • SHBrowseForFolderA.SHELL32(?,0041F870,?), ref: 00404484
                                        • CoTaskMemFree.OLE32(00000000), ref: 0040448F
                                        • lstrcmpiA.KERNEL32(00422E40,004204A0), ref: 004044C1
                                        • lstrcatA.KERNEL32(?,00422E40), ref: 004044CD
                                        • SetDlgItemTextA.USER32(?,000003FB,?), ref: 004044DD
                                          • Part of subcall function 0040540B: GetDlgItemTextA.USER32(?,?,00000400,00404510), ref: 0040541E
                                          • Part of subcall function 00405DC8: CharNextA.USER32(?,*?|<>/":,00000000,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\hca5qDUYZH.exe",C:\Users\user\AppData\Local\Temp\,00000000,00403214,C:\Users\user\AppData\Local\Temp\,00000000,00403386), ref: 00405E20
                                          • Part of subcall function 00405DC8: CharNextA.USER32(?,?,?,00000000), ref: 00405E2D
                                          • Part of subcall function 00405DC8: CharNextA.USER32(?,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\hca5qDUYZH.exe",C:\Users\user\AppData\Local\Temp\,00000000,00403214,C:\Users\user\AppData\Local\Temp\,00000000,00403386), ref: 00405E32
                                          • Part of subcall function 00405DC8: CharPrevA.USER32(?,?,"C:\Users\user\Desktop\hca5qDUYZH.exe",C:\Users\user\AppData\Local\Temp\,00000000,00403214,C:\Users\user\AppData\Local\Temp\,00000000,00403386), ref: 00405E42
                                        • GetDiskFreeSpaceA.KERNEL32(0041F468,?,?,0000040F,?,0041F468,0041F468,?,00000000,0041F468,?,?,000003FB,?), ref: 00404596
                                        • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004045B1
                                        • SetDlgItemTextA.USER32(00000000,00000400,0041F458), ref: 0040462A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                        • String ID: 4'R$@.B$A
                                        • API String ID: 2246997448-3575847115
                                        • Opcode ID: 6525314df4a180c9e7b66623ed26d8b7b6bbf618626a18de822d55977fdbc2f3
                                        • Instruction ID: fa341535892c43c3a67d7fcafb17cb6574160925603278dae289bcadb551eaae
                                        • Opcode Fuzzy Hash: 6525314df4a180c9e7b66623ed26d8b7b6bbf618626a18de822d55977fdbc2f3
                                        • Instruction Fuzzy Hash: 2D9170B1900218BBDB11AFA1CD84AAF7BB8EF45314F10847BF704B6291D77C9A41DB59
                                        APIs
                                        • GetVersion.KERNEL32(00000000,0041FC78,00000000,00404F3C,0041FC78,00000000), ref: 00405C30
                                        • GetSystemDirectoryA.KERNEL32(00422E40,00000400), ref: 00405CAB
                                        • GetWindowsDirectoryA.KERNEL32(00422E40,00000400), ref: 00405CBE
                                        • SHGetSpecialFolderLocation.SHELL32(?,00000000), ref: 00405CFA
                                        • SHGetPathFromIDListA.SHELL32(00000000,00422E40), ref: 00405D08
                                        • CoTaskMemFree.OLE32(00000000), ref: 00405D13
                                        • lstrcatA.KERNEL32(00422E40,\Microsoft\Internet Explorer\Quick Launch), ref: 00405D35
                                        • lstrlenA.KERNEL32(00422E40,00000000,0041FC78,00000000,00404F3C,0041FC78,00000000), ref: 00405D87
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                        • String ID: @.B$@.B$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                        • API String ID: 900638850-3135342408
                                        • Opcode ID: 855ce943f005fc76d33ba75c1c33b75b466f9e158227b928842345586457093f
                                        • Instruction ID: 2bb53c71d9fe9ef1e56bc14ab20fd8486271744d1d3ead2cb2ad614034e11287
                                        • Opcode Fuzzy Hash: 855ce943f005fc76d33ba75c1c33b75b466f9e158227b928842345586457093f
                                        • Instruction Fuzzy Hash: D7510131A04A04AAEF205F64DC88B7B3BA4DF55324F14823BE911B62D0D33C59829E4E
                                        APIs
                                        • CoCreateInstance.OLE32(00407384,?,00000001,00407374,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402073
                                        • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,00409368,00000400,?,00000001,00407374,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040212D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: ByteCharCreateInstanceMultiWide
                                        • String ID:
                                        • API String ID: 123533781-0
                                        • Opcode ID: 20f8b56c3263d051d76756f701b26ac218ff209cd135641c8178b13e20f06e8d
                                        • Instruction ID: 0b92ce9401c32f92a97655b67b17bc3e2e7042a2ba93bb40bff56c30807ccd12
                                        • Opcode Fuzzy Hash: 20f8b56c3263d051d76756f701b26ac218ff209cd135641c8178b13e20f06e8d
                                        • Instruction Fuzzy Hash: 94418E75A00205BFCB40DFA4CD88E9E7BBABF48354B204269FA15FB2D1CA799D41CB54
                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 0040264D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: FileFindFirst
                                        • String ID:
                                        • API String ID: 1974802433-0
                                        • Opcode ID: fec3e59c21f88b2afe0d858e3cd58f666a30441cfee8bf2827fa80150cba7d73
                                        • Instruction ID: b3d2387cb92b068db8966d6a1439c3c253679041c8135bb289436d91baf53d0e
                                        • Opcode Fuzzy Hash: fec3e59c21f88b2afe0d858e3cd58f666a30441cfee8bf2827fa80150cba7d73
                                        • Instruction Fuzzy Hash: 42F0A072A04201DBD700EBB49A89AEEB7789B51328F60067BE111F20C1C6B85A459B2E
                                        APIs
                                        • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                        • BeginPaint.USER32(?,?), ref: 00401047
                                        • GetClientRect.USER32(?,?), ref: 0040105B
                                        • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                        • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                        • DeleteObject.GDI32(?), ref: 004010ED
                                        • CreateFontIndirectA.GDI32(?), ref: 00401105
                                        • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                        • SetTextColor.GDI32(00000000,?), ref: 00401130
                                        • SelectObject.GDI32(00000000,?), ref: 00401140
                                        • DrawTextA.USER32(00000000,MusicDevelopments RapidComposer v5 WiN-MAC,000000FF,00000010,00000820), ref: 00401156
                                        • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                        • DeleteObject.GDI32(?), ref: 00401165
                                        • EndPaint.USER32(?,?), ref: 0040116E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                        • String ID: F$MusicDevelopments RapidComposer v5 WiN-MAC
                                        • API String ID: 941294808-200180521
                                        • Opcode ID: 1fa3053a276be56ef7da5d68adfba1d9971bfb9fa2beb597bf2db4fb963a824d
                                        • Instruction ID: 81477e3a2fde3fb3f26aa953fc06e347994717d76cab2c79682594c458f31f57
                                        • Opcode Fuzzy Hash: 1fa3053a276be56ef7da5d68adfba1d9971bfb9fa2beb597bf2db4fb963a824d
                                        • Instruction Fuzzy Hash: 8141BC71804249AFCB058FA4CD459BFBFB9FF44314F00802AF551AA1A0C378EA54DFA5
                                        APIs
                                          • Part of subcall function 00405E88: GetModuleHandleA.KERNEL32(?,?,00000000,0040327F,00000008), ref: 00405E9A
                                          • Part of subcall function 00405E88: LoadLibraryA.KERNEL32(?,?,00000000,0040327F,00000008), ref: 00405EA5
                                          • Part of subcall function 00405E88: GetProcAddress.KERNEL32(00000000,?), ref: 00405EB6
                                        • CloseHandle.KERNEL32(00000000,?,00000000,00000001,00000001,?,00000000,?,?,00405649,?,00000000,000000F1,?), ref: 00405901
                                        • GetShortPathNameA.KERNEL32(?,00422630,00000400), ref: 0040590A
                                        • GetShortPathNameA.KERNEL32(00000000,004220A8,00000400), ref: 00405927
                                        • wsprintfA.USER32 ref: 00405945
                                        • GetFileSize.KERNEL32(00000000,00000000,004220A8,C0000000,00000004,004220A8,?,?,?,00000000,000000F1,?), ref: 00405980
                                        • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,00000000,000000F1,?), ref: 0040598F
                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,000000F1,?), ref: 004059A5
                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,?,00421CA8,00000000,-0000000A,00409350,00000000,[Rename],?,?,00000000,000000F1,?), ref: 004059EB
                                        • WriteFile.KERNEL32(00000000,00000000,?,?,00000000,?,?,00000000,000000F1,?), ref: 004059FD
                                        • GlobalFree.KERNEL32(00000000), ref: 00405A04
                                        • CloseHandle.KERNEL32(00000000,?,?,00000000,000000F1,?), ref: 00405A0B
                                          • Part of subcall function 004057B2: lstrlenA.KERNEL32(00000000,?,00000000,00000000,004059C0,00000000,[Rename],?,?,00000000,000000F1,?), ref: 004057B9
                                          • Part of subcall function 004057B2: lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,004059C0,00000000,[Rename],?,?,00000000,000000F1,?), ref: 004057E9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: File$Handle$CloseGlobalNamePathShortlstrlen$AddressAllocFreeLibraryLoadModulePointerProcReadSizeWritewsprintf
                                        • String ID: %s=%s$0&B$[Rename]
                                        • API String ID: 3772915668-951905037
                                        • Opcode ID: 0c179fa3417d280b53e5d95a4378c92fb06f2b6e7dc6de3d5fc3f6893b1dd3a2
                                        • Instruction ID: 8912a0e40cac8f66f34925055924fb713260e7a12edb00ecfb1cfbef244c1689
                                        • Opcode Fuzzy Hash: 0c179fa3417d280b53e5d95a4378c92fb06f2b6e7dc6de3d5fc3f6893b1dd3a2
                                        • Instruction Fuzzy Hash: D9411332B05B11BBD3216B61AD88F6B3A5CDB84715F140136FE05F22C2E678A801CEBD
                                        APIs
                                        • CharNextA.USER32(?,*?|<>/":,00000000,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\hca5qDUYZH.exe",C:\Users\user\AppData\Local\Temp\,00000000,00403214,C:\Users\user\AppData\Local\Temp\,00000000,00403386), ref: 00405E20
                                        • CharNextA.USER32(?,?,?,00000000), ref: 00405E2D
                                        • CharNextA.USER32(?,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\hca5qDUYZH.exe",C:\Users\user\AppData\Local\Temp\,00000000,00403214,C:\Users\user\AppData\Local\Temp\,00000000,00403386), ref: 00405E32
                                        • CharPrevA.USER32(?,?,"C:\Users\user\Desktop\hca5qDUYZH.exe",C:\Users\user\AppData\Local\Temp\,00000000,00403214,C:\Users\user\AppData\Local\Temp\,00000000,00403386), ref: 00405E42
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: Char$Next$Prev
                                        • String ID: "C:\Users\user\Desktop\hca5qDUYZH.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                        • API String ID: 589700163-7965196
                                        • Opcode ID: d60fa47d96b079028a76cfcdb2d30976ede71f36b1f4f1e1bc9c50cb25bd2be5
                                        • Instruction ID: 3b6179abbfe29fc78842bf11aa846075366cc437f950451d76d565b88bc2b460
                                        • Opcode Fuzzy Hash: d60fa47d96b079028a76cfcdb2d30976ede71f36b1f4f1e1bc9c50cb25bd2be5
                                        • Instruction Fuzzy Hash: A0110861805B9129EB3227284C48BBB7F89CF66754F18447FD8C4722C2C67C5D429FAD
                                        APIs
                                        • GetWindowLongA.USER32(?,000000EB), ref: 00403F9C
                                        • GetSysColor.USER32(00000000), ref: 00403FB8
                                        • SetTextColor.GDI32(?,00000000), ref: 00403FC4
                                        • SetBkMode.GDI32(?,?), ref: 00403FD0
                                        • GetSysColor.USER32(?), ref: 00403FE3
                                        • SetBkColor.GDI32(?,?), ref: 00403FF3
                                        • DeleteObject.GDI32(?), ref: 0040400D
                                        • CreateBrushIndirect.GDI32(?), ref: 00404017
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                        • String ID:
                                        • API String ID: 2320649405-0
                                        • Opcode ID: 54c4c26d0880f537c7164b4e2121e342b47f232b14c6c2566c024284623f766e
                                        • Instruction ID: 4cc26f8bf5fc777f430f8318c3ba194748f169832e683f7fcd21add738ba3f9d
                                        • Opcode Fuzzy Hash: 54c4c26d0880f537c7164b4e2121e342b47f232b14c6c2566c024284623f766e
                                        • Instruction Fuzzy Hash: C221C371904705ABCB209F78DD08B4BBBF8AF40711F048A29F992F26E0C738E904CB55
                                        APIs
                                        • GlobalAlloc.KERNEL32(00000040,0000B600,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 004026D0
                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,000000F0), ref: 004026EC
                                        • GlobalFree.KERNEL32(?), ref: 00402725
                                        • WriteFile.KERNEL32(FFFFFD66,00000000,?,FFFFFD66,?,?,?,?,000000F0), ref: 00402737
                                        • GlobalFree.KERNEL32(00000000), ref: 0040273E
                                        • CloseHandle.KERNEL32(FFFFFD66,?,?,000000F0), ref: 00402756
                                        • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 0040276A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                        • String ID:
                                        • API String ID: 3294113728-0
                                        • Opcode ID: b8defe13902d58a52973a2e3f60156d7c1400e5746f24ef4cd0721e59596b3c4
                                        • Instruction ID: 719c612f4f238206e278f6e296a81204df483451b361404a9b6a09c3536a307a
                                        • Opcode Fuzzy Hash: b8defe13902d58a52973a2e3f60156d7c1400e5746f24ef4cd0721e59596b3c4
                                        • Instruction Fuzzy Hash: F831AD71C00128BBDF216FA4CD89DAE7E79EF08364F10423AF920772E0C6795D419BA8
                                        APIs
                                        • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 004047EE
                                        • GetMessagePos.USER32 ref: 004047F6
                                        • ScreenToClient.USER32(?,?), ref: 00404810
                                        • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404822
                                        • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404848
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: Message$Send$ClientScreen
                                        • String ID: f
                                        • API String ID: 41195575-1993550816
                                        • Opcode ID: 2a5698d5089c35727aab5c3c5da7bcfb0b51a0b1d2cb1bbeaafe9db8233e3477
                                        • Instruction ID: 01d6173a61c3c3b4b037133c9a52f1e04ee3049876a8ff08b59bebc5d15cf036
                                        • Opcode Fuzzy Hash: 2a5698d5089c35727aab5c3c5da7bcfb0b51a0b1d2cb1bbeaafe9db8233e3477
                                        • Instruction Fuzzy Hash: BA018075D40218BADB00DB94CC41BFEBBBCAB55711F10412ABB00B61C0C3B46501CB95
                                        APIs
                                        • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402B56
                                        • wsprintfA.USER32 ref: 00402B8A
                                        • SetWindowTextA.USER32(?,?), ref: 00402B9A
                                        • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BAC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: Text$ItemTimerWindowwsprintf
                                        • String ID: unpacking data: %d%%$verifying installer: %d%%
                                        • API String ID: 1451636040-1158693248
                                        • Opcode ID: a19141f3df1e0a3c8b8c2abcbd515ef60a2dd56e778219f0b9cb34bd20a9fb2d
                                        • Instruction ID: 39266fd7d8b3d51d4259f470751267aa52f8e49dbca779dff7f29341b6a717b4
                                        • Opcode Fuzzy Hash: a19141f3df1e0a3c8b8c2abcbd515ef60a2dd56e778219f0b9cb34bd20a9fb2d
                                        • Instruction Fuzzy Hash: AFF03671900109ABEF255F51DD0ABEE3779FB00305F008036FA05B51D1D7F9AA559F99
                                        APIs
                                        • GetDC.USER32(?), ref: 00401D22
                                        • GetDeviceCaps.GDI32(00000000), ref: 00401D29
                                        • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D38
                                        • CreateFontIndirectA.GDI32(0040AF74), ref: 00401D8A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: CapsCreateDeviceFontIndirect
                                        • String ID: MS Shell Dlg
                                        • API String ID: 3272661963-76309092
                                        • Opcode ID: 2c6a9fd6684e48c72e8170f31dde3613139c4976fc228405473ba1f45ca6ba00
                                        • Instruction ID: d83410998d1654a5337f8c322709d39cf2ce3a8a4f0330bc6585c9693e616625
                                        • Opcode Fuzzy Hash: 2c6a9fd6684e48c72e8170f31dde3613139c4976fc228405473ba1f45ca6ba00
                                        • Instruction Fuzzy Hash: E1F044F1A45342AEE7016770AE0ABA93B649725306F100576F541BA1E2C5BC10149B7F
                                        APIs
                                        • RegOpenKeyExA.ADVAPI32(?,?,00000000,00000000,?), ref: 00402A57
                                        • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402A93
                                        • RegCloseKey.ADVAPI32(?), ref: 00402A9C
                                        • RegCloseKey.ADVAPI32(?), ref: 00402AC1
                                        • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402ADF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: Close$DeleteEnumOpen
                                        • String ID:
                                        • API String ID: 1912718029-0
                                        • Opcode ID: 90165163457562f2d2db0d0e016cf4740f9c141c2854e05e69f214c53397e3bf
                                        • Instruction ID: 3ec7b1818cbfc33efeafaf7017db19c7c479205e5d6f4ff66fb244667a93d6f3
                                        • Opcode Fuzzy Hash: 90165163457562f2d2db0d0e016cf4740f9c141c2854e05e69f214c53397e3bf
                                        • Instruction Fuzzy Hash: 93112971A00009FFDF319F90DE49EAF7B7DEB44385B104436F905A10A0DBB59E51AE69
                                        APIs
                                        • GetDlgItem.USER32(?), ref: 00401CC5
                                        • GetClientRect.USER32(00000000,?), ref: 00401CD2
                                        • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401CF3
                                        • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D01
                                        • DeleteObject.GDI32(00000000), ref: 00401D10
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                        • String ID:
                                        • API String ID: 1849352358-0
                                        • Opcode ID: 70cca8153c69b2e132429069c22b9ddf05dbb7ba62a9a7cfa9b79a9bcebcea9b
                                        • Instruction ID: de7316f9b9f1bcc3f0c1dff9ae5dc63c91f1472c52c052d8cf8a0da7f27950be
                                        • Opcode Fuzzy Hash: 70cca8153c69b2e132429069c22b9ddf05dbb7ba62a9a7cfa9b79a9bcebcea9b
                                        • Instruction Fuzzy Hash: D5F01DB2E04105BFD700EFA4EE89DAFB7BDEB44345B104576F602F2190C6789D018B69
                                        APIs
                                        • lstrlenA.KERNEL32(004204A0,004204A0,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404611,000000DF,0000040F,00000400,00000000), ref: 0040477F
                                        • wsprintfA.USER32 ref: 00404787
                                        • SetDlgItemTextA.USER32(?,004204A0), ref: 0040479A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: ItemTextlstrlenwsprintf
                                        • String ID: %u.%u%s%s
                                        • API String ID: 3540041739-3551169577
                                        • Opcode ID: 900e3a4788bbcdb5831f4eb4ea085b1ecc54347093cfae2cf180548b061950ae
                                        • Instruction ID: e1128f73888b2767c9277aed1687fd20c93e739cc52df1aac9c0a45a5a8dde9d
                                        • Opcode Fuzzy Hash: 900e3a4788bbcdb5831f4eb4ea085b1ecc54347093cfae2cf180548b061950ae
                                        • Instruction Fuzzy Hash: 7311E2736001243BDB10666D9C46EEF3699DBC6335F14423BFA25F61D1E938AC5286A8
                                        APIs
                                        • SetWindowTextA.USER32(00000000,MusicDevelopments RapidComposer v5 WiN-MAC), ref: 00403A10
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: TextWindow
                                        • String ID: 1033$C:\Users\user\AppData\Local\Temp\$MusicDevelopments RapidComposer v5 WiN-MAC
                                        • API String ID: 530164218-40194053
                                        • Opcode ID: defed7287a9455a29b24b67e45bb8aa9d1031aed7a359321573c6b72916d69ed
                                        • Instruction ID: 09623374405f0611f065d620c03919b516a5f167df25bc0d5edc66fe9dc562c0
                                        • Opcode Fuzzy Hash: defed7287a9455a29b24b67e45bb8aa9d1031aed7a359321573c6b72916d69ed
                                        • Instruction Fuzzy Hash: F611C2B1B005109BC730DF15D880A73767DEB84716369413BE94167391C77EAE028E58
                                        APIs
                                        • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004224A8,Error launching installer), ref: 004053EB
                                        • CloseHandle.KERNEL32(?), ref: 004053F8
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 004053C6
                                        • Error launching installer, xrefs: 004053D9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: CloseCreateHandleProcess
                                        • String ID: C:\Users\user\AppData\Local\Temp\$Error launching installer
                                        • API String ID: 3712363035-7751565
                                        • Opcode ID: 3b814a6f076d0ba9038e170a1e0f3647fdefee354992cb10a65e7e77ca0a2381
                                        • Instruction ID: 069b69ca15cd8b990da55ccc95fe3be7356009797bdfa18ab8f6d6c8c96e71ef
                                        • Opcode Fuzzy Hash: 3b814a6f076d0ba9038e170a1e0f3647fdefee354992cb10a65e7e77ca0a2381
                                        • Instruction Fuzzy Hash: A3E0ECB4A00219BFDB00AF64ED49AAB7BBDEB00305F90C522A911E2150D775D8118AB9
                                        APIs
                                        • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403226,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403386), ref: 0040565F
                                        • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403226,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403386), ref: 00405668
                                        • lstrcatA.KERNEL32(?,00409010), ref: 00405679
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405659
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: CharPrevlstrcatlstrlen
                                        • String ID: C:\Users\user\AppData\Local\Temp\
                                        • API String ID: 2659869361-823278215
                                        • Opcode ID: f17b2ccdaa8efd10834e0f4341d4d5b977b2bb6e8559feba5c8cad9ccc1df0ef
                                        • Instruction ID: d5422d5486d5b384c4dcc02911800b35c31fcf4388d9dde419d5dff5703c7688
                                        • Opcode Fuzzy Hash: f17b2ccdaa8efd10834e0f4341d4d5b977b2bb6e8559feba5c8cad9ccc1df0ef
                                        • Instruction Fuzzy Hash: 8BD05272605A202ED2022A258C05E9B7A28CF06311B044866B540B2292C6386D818AEE
                                        APIs
                                        • RegCreateKeyExA.ADVAPI32(00000000,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 00402341
                                        • lstrlenA.KERNEL32(0040A370,00000023,?,?,?,00000000,?,?,?,00000011,00000002), ref: 00402361
                                        • RegSetValueExA.ADVAPI32(?,?,?,?,0040A370,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 0040239A
                                        • RegCloseKey.ADVAPI32(?,?,?,0040A370,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 0040247D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: CloseCreateValuelstrlen
                                        • String ID:
                                        • API String ID: 1356686001-0
                                        • Opcode ID: 271707f578e5353a3fbe2519cc7d62c3cf42ff78cad1b3e4df9531e7eebe3039
                                        • Instruction ID: d7b132d9018d44432a73f3315d2b91b6aa1600c7a927e9fa70905f900517fa5a
                                        • Opcode Fuzzy Hash: 271707f578e5353a3fbe2519cc7d62c3cf42ff78cad1b3e4df9531e7eebe3039
                                        • Instruction Fuzzy Hash: BA1160B1E00209BFEB10AFA0DE49EAF767CFB54398F10413AF905B61D0D7B85D019669
                                        APIs
                                        • GetFileVersionInfoSizeA.VERSION(00000000,?,000000EE), ref: 00401ED4
                                        • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401EF2
                                        • GetFileVersionInfoA.VERSION(?,?,?,00000000), ref: 00401F0B
                                        • VerQueryValueA.VERSION(?,00409010,?,?,?,?,?,00000000), ref: 00401F24
                                          • Part of subcall function 00405AC4: wsprintfA.USER32 ref: 00405AD1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                        • String ID:
                                        • API String ID: 1404258612-0
                                        • Opcode ID: be50ba22476c795dccddfbd46c0b19e6aec7ed87346bdfd2eed6167faf837e67
                                        • Instruction ID: 178fa6cf4330108057832d0c189c0e5a27020503733a18e797ef1cc5e9d7aef6
                                        • Opcode Fuzzy Hash: be50ba22476c795dccddfbd46c0b19e6aec7ed87346bdfd2eed6167faf837e67
                                        • Instruction Fuzzy Hash: 52113A71A00108BEDB01EFA5DD819AEBBB9EB48344B20853AF501F61E1D7389A54DB28
                                        APIs
                                        • IsWindowVisible.USER32(?), ref: 00404E8A
                                        • CallWindowProcA.USER32(?,00000200,?,?), ref: 00404EF8
                                          • Part of subcall function 00403F64: SendMessageA.USER32(00020494,00000000,00000000,00000000), ref: 00403F76
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: Window$CallMessageProcSendVisible
                                        • String ID:
                                        • API String ID: 3748168415-3916222277
                                        • Opcode ID: 1a28ca64547386e1a64dd11c64f6ae458e1df03769ff3acb3952d776ac0a4b66
                                        • Instruction ID: 62f3a1a08e098275047049d4f9968a6b4933f6b7f921e7009373277d82a30415
                                        • Opcode Fuzzy Hash: 1a28ca64547386e1a64dd11c64f6ae458e1df03769ff3acb3952d776ac0a4b66
                                        • Instruction Fuzzy Hash: D1116D71900208BBDB21AF52DC4499B3669FB84369F00803BF6047A2E2C37C5A519BAD
                                        APIs
                                        • lstrlenA.KERNEL32(00000000,00000011), ref: 004024DC
                                        • WriteFile.KERNEL32(00000000,?,C:\Users\user\AppData\Local\Temp\nsj455.tmp\s,00000000,?,?,00000000,00000011), ref: 004024FB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: FileWritelstrlen
                                        • String ID: C:\Users\user\AppData\Local\Temp\nsj455.tmp\s
                                        • API String ID: 427699356-3906525354
                                        • Opcode ID: 02a15bd42c28bed1fb8554f3d16374f042fc662dbffd218bbabce7ee12e12458
                                        • Instruction ID: 2c1f07a632d72534084a5ac00d75746702f795d1104bf50e8da4b719a2e94720
                                        • Opcode Fuzzy Hash: 02a15bd42c28bed1fb8554f3d16374f042fc662dbffd218bbabce7ee12e12458
                                        • Instruction Fuzzy Hash: BCF08972A44245FFD710EBB19E49EAF7668DB00348F14443BB142F51C2D6FC5982976D
                                        APIs
                                        • FreeLibrary.KERNEL32(?,"C:\Users\user\Desktop\hca5qDUYZH.exe",00000000,75922EE0,004035F1,00000000,0040342D,00000000), ref: 00403634
                                        • GlobalFree.KERNEL32(00000000), ref: 0040363B
                                        Strings
                                        • "C:\Users\user\Desktop\hca5qDUYZH.exe", xrefs: 0040362C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: Free$GlobalLibrary
                                        • String ID: "C:\Users\user\Desktop\hca5qDUYZH.exe"
                                        • API String ID: 1100898210-4215438592
                                        • Opcode ID: 594683390acbace1feb38ee5af495b240e475f157c4d409b541952378f73dbd9
                                        • Instruction ID: 07f203a12dc211ea1540440f4769086933c1ddaa55d0411da1bb29b7fd771b51
                                        • Opcode Fuzzy Hash: 594683390acbace1feb38ee5af495b240e475f157c4d409b541952378f73dbd9
                                        • Instruction Fuzzy Hash: 8FE08C32804420ABC6216F55EC0579A7768AB48B22F028536E900BB3A083743C464BDC
                                        APIs
                                        • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402CDE,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\hca5qDUYZH.exe,C:\Users\user\Desktop\hca5qDUYZH.exe,80000000,00000003), ref: 004056A6
                                        • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402CDE,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\hca5qDUYZH.exe,C:\Users\user\Desktop\hca5qDUYZH.exe,80000000,00000003), ref: 004056B4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: CharPrevlstrlen
                                        • String ID: C:\Users\user\Desktop
                                        • API String ID: 2709904686-1246513382
                                        • Opcode ID: 49376fbf8c9c30057c1bc985cc011eea510fd351d3a644e674ee9e82abf7fe19
                                        • Instruction ID: 6658d1b0ab05e5211e75f0b74aef41c49d7b43cb9628f8e009f88ad9fa15a52a
                                        • Opcode Fuzzy Hash: 49376fbf8c9c30057c1bc985cc011eea510fd351d3a644e674ee9e82abf7fe19
                                        • Instruction Fuzzy Hash: C5D0A772409DB02EF30352108C04B8F7A98CF17300F0948A2E440E21D0C27C5C818FFD
                                        APIs
                                        • lstrlenA.KERNEL32(00000000,?,00000000,00000000,004059C0,00000000,[Rename],?,?,00000000,000000F1,?), ref: 004057B9
                                        • lstrcmpiA.KERNEL32(00000000,00000000), ref: 004057D2
                                        • CharNextA.USER32(00000000,?,?,00000000,000000F1,?), ref: 004057E0
                                        • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,004059C0,00000000,[Rename],?,?,00000000,000000F1,?), ref: 004057E9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3301271888.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.3301259328.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301284084.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301296135.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3301343351.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hca5qDUYZH.jbxd
                                        Similarity
                                        • API ID: lstrlen$CharNextlstrcmpi
                                        • String ID:
                                        • API String ID: 190613189-0
                                        • Opcode ID: 0108cf067d6f6d80c8ed850288af8a4b3b9133f156f8bdff26d83f0dd252fb59
                                        • Instruction ID: 042c172281cf084eebf1820456e7eb749b121a10276c912c68532230cfd8689c
                                        • Opcode Fuzzy Hash: 0108cf067d6f6d80c8ed850288af8a4b3b9133f156f8bdff26d83f0dd252fb59
                                        • Instruction Fuzzy Hash: BBF0A736249D51DBC2029B295C44E6FBEA4EF95355F14057EF440F3180D335AC11ABBB