Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
xLDz0WPZYc.exe

Overview

General Information

Sample name:xLDz0WPZYc.exe
renamed because original name is a hash value
Original sample name:7cf7ab42508aedf9910b50fafaab9786be8ec80c413387d92f4a1432f66e955b.exe
Analysis ID:1587852
MD5:74e2251dfa1e7fbeb0e4e9ba2f6c56b4
SHA1:468d0612612e0424ea38eb7426d893a5098d245b
SHA256:7cf7ab42508aedf9910b50fafaab9786be8ec80c413387d92f4a1432f66e955b
Tags:exeuser-adrian__luca
Infos:

Detection

GuLoader
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • xLDz0WPZYc.exe (PID: 5536 cmdline: "C:\Users\user\Desktop\xLDz0WPZYc.exe" MD5: 74E2251DFA1E7FBEB0E4E9BA2F6C56B4)
    • xLDz0WPZYc.exe (PID: 7160 cmdline: "C:\Users\user\Desktop\xLDz0WPZYc.exe" MD5: 74E2251DFA1E7FBEB0E4E9BA2F6C56B4)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: xLDz0WPZYc.exe PID: 5536JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2025-01-10T18:36:23.018504+010028032702Potentially Bad Traffic192.168.2.64998966.63.187.3080TCP
    2025-01-10T18:37:44.091339+010028032702Potentially Bad Traffic192.168.2.64998366.63.187.3080TCP
    2025-01-10T18:38:05.590614+010028032702Potentially Bad Traffic192.168.2.64998466.63.187.3080TCP
    2025-01-10T18:38:27.094951+010028032702Potentially Bad Traffic192.168.2.64998766.63.187.3080TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: xLDz0WPZYc.exeVirustotal: Detection: 66%Perma Link
    Source: xLDz0WPZYc.exeReversingLabs: Detection: 55%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: xLDz0WPZYc.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: xLDz0WPZYc.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 1_2_0040547D GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,1_2_0040547D
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 1_2_00405EC1 FindFirstFileA,FindClose,1_2_00405EC1
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 1_2_00402645 FindFirstFileA,1_2_00402645
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 6_2_00402645 FindFirstFileA,6_2_00402645
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 6_2_0040547D GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,6_2_0040547D
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 6_2_00405EC1 FindFirstFileA,FindClose,6_2_00405EC1
    Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.6:49987 -> 66.63.187.30:80
    Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.6:49983 -> 66.63.187.30:80
    Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.6:49984 -> 66.63.187.30:80
    Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.6:49989 -> 66.63.187.30:80
    Source: global trafficHTTP traffic detected: GET /AmDxXYvcZBeoV9.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 66.63.187.30Cache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /AmDxXYvcZBeoV9.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 66.63.187.30Cache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /AmDxXYvcZBeoV9.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 66.63.187.30Cache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /AmDxXYvcZBeoV9.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 66.63.187.30Cache-Control: no-cache
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: global trafficHTTP traffic detected: GET /AmDxXYvcZBeoV9.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 66.63.187.30Cache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /AmDxXYvcZBeoV9.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 66.63.187.30Cache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /AmDxXYvcZBeoV9.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 66.63.187.30Cache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /AmDxXYvcZBeoV9.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 66.63.187.30Cache-Control: no-cache
    Source: xLDz0WPZYc.exe, 00000006.00000002.3451141797.0000000004E39000.00000004.00000020.00020000.00000000.sdmp, xLDz0WPZYc.exe, 00000006.00000002.3451141797.0000000004DE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://66.63.187.30/AmDxXYvcZBeoV9.bin
    Source: xLDz0WPZYc.exe, 00000006.00000002.3451141797.0000000004DE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://66.63.187.30/AmDxXYvcZBeoV9.bin&
    Source: xLDz0WPZYc.exe, 00000006.00000002.3451141797.0000000004E39000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://66.63.187.30/AmDxXYvcZBeoV9.binb
    Source: xLDz0WPZYc.exe, 00000006.00000002.3451141797.0000000004E25000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://66.63.187.30/AmDxXYvcZBeoV9.binheCounterMutex
    Source: xLDz0WPZYc.exe, 00000006.00000002.3451141797.0000000004E25000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://66.63.187.30/AmDxXYvcZBeoV9.binw
    Source: xLDz0WPZYc.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
    Source: xLDz0WPZYc.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 1_2_00404FE4 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,LdrInitializeThunk,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,LdrInitializeThunk,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,SendMessageA,CreatePopupMenu,LdrInitializeThunk,AppendMenuA,GetWindowRect,LdrInitializeThunk,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,LdrInitializeThunk,SetClipboardData,CloseClipboard,1_2_00404FE4
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 1_2_004030B6 EntryPoint,#17,SetErrorMode,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,LdrInitializeThunk,LdrInitializeThunk,GetCurrentProcess,ExitWindowsEx,ExitProcess,1_2_004030B6
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 6_2_004030B6 EntryPoint,#17,SetErrorMode,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,LdrInitializeThunk,LdrInitializeThunk,GetCurrentProcess,ExitWindowsEx,ExitProcess,6_2_004030B6
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 1_2_004048231_2_00404823
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 1_2_004061971_2_00406197
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 6_2_004048236_2_00404823
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 6_2_004061976_2_00406197
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: String function: 004029FD appears 47 times
    Source: xLDz0WPZYc.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: classification engineClassification label: mal68.troj.evad.winEXE@3/12@0/1
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 1_2_004042B1 GetDlgItem,SetWindowTextA,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,LdrInitializeThunk,SetDlgItemTextA,1_2_004042B1
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 1_2_00402036 LdrInitializeThunk,LdrInitializeThunk,CoCreateInstance,MultiByteToWideChar,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,1_2_00402036
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeFile created: C:\Users\user\AppData\Roaming\StuderekammermenneskesJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeFile created: C:\Users\user\AppData\Local\Temp\nsq237A.tmpJump to behavior
    Source: xLDz0WPZYc.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: xLDz0WPZYc.exeVirustotal: Detection: 66%
    Source: xLDz0WPZYc.exeReversingLabs: Detection: 55%
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeFile read: C:\Users\user\Desktop\xLDz0WPZYc.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\xLDz0WPZYc.exe "C:\Users\user\Desktop\xLDz0WPZYc.exe"
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeProcess created: C:\Users\user\Desktop\xLDz0WPZYc.exe "C:\Users\user\Desktop\xLDz0WPZYc.exe"
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeProcess created: C:\Users\user\Desktop\xLDz0WPZYc.exe "C:\Users\user\Desktop\xLDz0WPZYc.exe"Jump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: riched20.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeFile written: C:\Users\user\AppData\Local\Temp\Settings.iniJump to behavior
    Source: xLDz0WPZYc.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Data Obfuscation

    barindex
    Source: Yara matchFile source: Process Memory Space: xLDz0WPZYc.exe PID: 5536, type: MEMORYSTR
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 1_2_00405EE8 GetModuleHandleA,LoadLibraryA,GetProcAddress,1_2_00405EE8
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 1_2_10002D30 push eax; ret 1_2_10002D5E
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeFile created: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeAPI/Special instruction interceptor: Address: 7C1655F
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeAPI/Special instruction interceptor: Address: 469655F
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeRDTSC instruction interceptor: First address: 7BB44AC second address: 7BB44AC instructions: 0x00000000 rdtsc 0x00000002 test bx, ax 0x00000005 test ch, ah 0x00000007 cmp ebx, ecx 0x00000009 jc 00007FE8646B7111h 0x0000000b test ebx, eax 0x0000000d inc ebp 0x0000000e cmp edx, ebx 0x00000010 inc ebx 0x00000011 rdtsc
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeRDTSC instruction interceptor: First address: 46344AC second address: 46344AC instructions: 0x00000000 rdtsc 0x00000002 test bx, ax 0x00000005 test ch, ah 0x00000007 cmp ebx, ecx 0x00000009 jc 00007FE864C18D91h 0x0000000b test ebx, eax 0x0000000d inc ebp 0x0000000e cmp edx, ebx 0x00000010 inc ebx 0x00000011 rdtsc
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exe TID: 3776Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 1_2_0040547D GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,1_2_0040547D
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 1_2_00405EC1 FindFirstFileA,FindClose,1_2_00405EC1
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 1_2_00402645 FindFirstFileA,1_2_00402645
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 6_2_00402645 FindFirstFileA,6_2_00402645
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 6_2_0040547D GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,6_2_0040547D
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 6_2_00405EC1 FindFirstFileA,FindClose,6_2_00405EC1
    Source: xLDz0WPZYc.exe, 00000006.00000002.3451141797.0000000004E3F000.00000004.00000020.00020000.00000000.sdmp, xLDz0WPZYc.exe, 00000006.00000002.3451141797.0000000004DE8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeAPI call chain: ExitProcess graph end nodegraph_1-4367
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeAPI call chain: ExitProcess graph end nodegraph_1-4373
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 1_2_0040584E GetFileAttributesA,LdrInitializeThunk,LdrInitializeThunk,CreateFileA,1_2_0040584E
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 1_2_00405EE8 GetModuleHandleA,LoadLibraryA,GetProcAddress,1_2_00405EE8
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeProcess created: C:\Users\user\Desktop\xLDz0WPZYc.exe "C:\Users\user\Desktop\xLDz0WPZYc.exe"Jump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 1_2_00405BDF GetVersion,LdrInitializeThunk,LdrInitializeThunk,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,1_2_00405BDF
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    11
    Process Injection
    1
    Masquerading
    OS Credential Dumping21
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Virtualization/Sandbox Evasion
    LSASS Memory1
    Virtualization/Sandbox Evasion
    Remote Desktop Protocol1
    Clipboard Data
    1
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
    Process Injection
    Security Account Manager3
    File and Directory Discovery
    SMB/Windows Admin SharesData from Network Shared Drive1
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Deobfuscate/Decode Files or Information
    NTDS23
    System Information Discovery
    Distributed Component Object ModelInput Capture11
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
    Obfuscated Files or Information
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    DLL Side-Loading
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    xLDz0WPZYc.exe67%VirustotalBrowse
    xLDz0WPZYc.exe55%ReversingLabsWin32.Backdoor.Remcos
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://66.63.187.30/AmDxXYvcZBeoV9.binheCounterMutex0%Avira URL Cloudsafe
    http://66.63.187.30/AmDxXYvcZBeoV9.bin&0%Avira URL Cloudsafe
    http://66.63.187.30/AmDxXYvcZBeoV9.binb0%Avira URL Cloudsafe
    http://66.63.187.30/AmDxXYvcZBeoV9.bin0%Avira URL Cloudsafe
    http://66.63.187.30/AmDxXYvcZBeoV9.binw0%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://66.63.187.30/AmDxXYvcZBeoV9.binfalse
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://66.63.187.30/AmDxXYvcZBeoV9.binwxLDz0WPZYc.exe, 00000006.00000002.3451141797.0000000004E25000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://nsis.sf.net/NSIS_ErrorxLDz0WPZYc.exefalse
      high
      http://66.63.187.30/AmDxXYvcZBeoV9.bin&xLDz0WPZYc.exe, 00000006.00000002.3451141797.0000000004DE8000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://nsis.sf.net/NSIS_ErrorErrorxLDz0WPZYc.exefalse
        high
        http://66.63.187.30/AmDxXYvcZBeoV9.binheCounterMutexxLDz0WPZYc.exe, 00000006.00000002.3451141797.0000000004E25000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://66.63.187.30/AmDxXYvcZBeoV9.binbxLDz0WPZYc.exe, 00000006.00000002.3451141797.0000000004E39000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        66.63.187.30
        unknownUnited States
        8100ASN-QUADRANET-GLOBALUSfalse
        Joe Sandbox version:42.0.0 Malachite
        Analysis ID:1587852
        Start date and time:2025-01-10 18:35:33 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 6m 14s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:7
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:xLDz0WPZYc.exe
        renamed because original name is a hash value
        Original Sample Name:7cf7ab42508aedf9910b50fafaab9786be8ec80c413387d92f4a1432f66e955b.exe
        Detection:MAL
        Classification:mal68.troj.evad.winEXE@3/12@0/1
        EGA Information:
        • Successful, ratio: 50%
        HCA Information:
        • Successful, ratio: 90%
        • Number of executed functions: 50
        • Number of non-executed functions: 73
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
        • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.12.23.50
        • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Execution Graph export aborted for target xLDz0WPZYc.exe, PID 7160 because there are no executed function
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        TimeTypeDescription
        12:37:43API Interceptor3x Sleep call for process: xLDz0WPZYc.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        66.63.187.30Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeGet hashmaliciousRemcos, GuLoaderBrowse
        • 66.63.187.30/GrDfwEbxHEuyrsJcDgnTLZ14.bin
        Ref GEC409876 CONSTRUCTION OF MAJLIS PROJECT IN SAADIYAT, ABU DHABI.exeGet hashmaliciousRemcos, GuLoaderBrowse
        • 66.63.187.30/wBWcspgeBmkxYD199.bin
        Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeGet hashmaliciousRemcos, GuLoaderBrowse
        • 66.63.187.30/hpVMAPRZVuaX36.bin
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        ASN-QUADRANET-GLOBALUSvQyKfYxzXB.exeGet hashmaliciousRemcosBrowse
        • 69.174.98.48
        https://zfrmz.com/3GiGYUP4BArW2NBgkPU3Get hashmaliciousUnknownBrowse
        • 45.61.152.125
        gem1.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
        • 66.63.187.173
        armv5l.elfGet hashmaliciousUnknownBrowse
        • 104.237.80.14
        30% Order payment-BLQuote_'PO#385995790.exeGet hashmaliciousAsyncRATBrowse
        • 69.174.100.131
        drop1.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
        • 66.63.187.173
        file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, XWorm, XmrigBrowse
        • 66.63.187.122
        drop1.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
        • 66.63.187.173
        drop1.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
        • 66.63.187.173
        file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
        • 66.63.187.173
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dllPpto.24265.exeGet hashmaliciousFormBook, GuLoaderBrowse
          Ppto.24265.exeGet hashmaliciousFormBook, GuLoaderBrowse
            Ricowell Ind New INQ.bat.exeGet hashmaliciousFormBook, GuLoaderBrowse
              Ricowell Ind New INQ.bat.exeGet hashmaliciousGuLoaderBrowse
                Setup_x86.exeGet hashmaliciousUnknownBrowse
                  ORDER.exeGet hashmaliciousFormBook, GuLoaderBrowse
                    ORDER.exeGet hashmaliciousUnknownBrowse
                      ulACwpUCSU.exeGet hashmaliciousFormBook, GuLoaderBrowse
                        fJuwM4Bwi7.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          ulACwpUCSU.exeGet hashmaliciousGuLoaderBrowse
                            Process:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):52
                            Entropy (8bit):4.725996747697686
                            Encrypted:false
                            SSDEEP:3:HM/xiXWR0AXQQLQIfLBJXmgxv:HHpQkIP2I
                            MD5:87C38DC6EF4616FF016D1CCC1A793086
                            SHA1:AFC6434AAAD4FB1A250AF0D167DAB718DA10B4AF
                            SHA-256:781C527A7A89FDBFA481BF8800E255DC1B69E47B2B68040DC39103C114E31849
                            SHA-512:CC8EF7D9C98FB663C79A4A00FD68344F7AA3DBA27D68B3AEF463C758A74AEBF8190C8A9532FE91BC7DB32E78FF2C48C43230F03DA226F9A9EF288324EFEBF0FE
                            Malicious:false
                            Reputation:low
                            Preview:[Initialize]..First=user32::EnumWindows(i r1 ,i 0)..
                            Process:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.51038309657817
                            Encrypted:false
                            SSDEEP:3:sEMBQEJkJVEjM2Q6XxQoXUn:tKXxvUn
                            MD5:8E2223169ADE668CE3920B01C8AA100E
                            SHA1:EFB2C58919EB2592233E57E3423FF075EE9326C0
                            SHA-256:7D41D2BCC88F004B6D83D76AF072075D082040D7DEF97FEED09A4FC6C33A3176
                            SHA-512:131AC3450AC6351CB7281E1E46ADA18B003CDC6FA5C2B4C8F2279AE3E9A3A80573B645D18F44E6E6C5B7AFD59B0873D098F4E148E595E512DEFA1F37F3B7791D
                            Malicious:false
                            Reputation:low
                            Preview:kernel32::VirtualAlloc(i 0,i 57454592, i 0x3000, i 0x40)p.r1
                            Process:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):56
                            Entropy (8bit):4.24214984251469
                            Encrypted:false
                            SSDEEP:3:sAAEVvjs8QwMj84n:fLby
                            MD5:65F323B491B59FFB602FA78A7FB6859D
                            SHA1:8385C4863F3EBBE6A0CA5C639B1B02F0303CC036
                            SHA-256:BB8F96C8651F7EC6E50C0B761EADD59B821999C3D465E2F068A1B5EA605337A2
                            SHA-512:589770CD1188D2A3AC67FEB447EDB758F9BAA0D34347FA7ED6222EF6A368CCF016513EBF4F08EEFD9BABE903340347C9C5F3CDDC15ACF1152E1701F13773E810
                            Malicious:false
                            Reputation:low
                            Preview:kernel32::ReadFile(i r5, i r1, i 57454592,*i 0, i 0)i.r3
                            Process:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):30
                            Entropy (8bit):4.256564762130954
                            Encrypted:false
                            SSDEEP:3:DyWgLQIfLBJXmgU:mkIP25
                            MD5:F15BFDEBB2DF02D02C8491BDE1B4E9BD
                            SHA1:93BD46F57C3316C27CAD2605DDF81D6C0BDE9301
                            SHA-256:C87F2FF45BB530577FB8856DF1760EDAF1060AE4EE2934B17FDD21B7D116F043
                            SHA-512:1757ED4AE4D47D0C839511C18BE5D75796224D4A3049E2D8853650ACE2C5057C42040DE6450BF90DD4969862E9EBB420CD8A34F8DD9C970779ED2E5459E8F2F1
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            Preview:user32::EnumWindows(i r1 ,i 0)
                            Process:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):11264
                            Entropy (8bit):5.779474184733856
                            Encrypted:false
                            SSDEEP:96:zPDYcJ+nx4vVp76JX7zBlkCg21Fxz4THxtrqw1at0JgwLEjo+OB3yUVCdl/wNj+y:zPtkuWJX7zB3kGwfy0nyUVsxCjOM61u
                            MD5:6F5257C0B8C0EF4D440F4F4FCE85FB1B
                            SHA1:B6AC111DFB0D1FC75AD09C56BDE7830232395785
                            SHA-256:B7CCB923387CC346731471B20FC3DF1EAD13EC8C2E3147353C71BB0BD59BC8B1
                            SHA-512:A3CC27F1EFB52FB8ECDA54A7C36ADA39CEFEABB7B16F2112303EA463B0E1A4D745198D413EEBB3551E012C84A20DCDF4359E511E51BC3F1A60B13F1E3BAD1AA8
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Joe Sandbox View:
                            • Filename: Ppto.24265.exe, Detection: malicious, Browse
                            • Filename: Ppto.24265.exe, Detection: malicious, Browse
                            • Filename: Ricowell Ind New INQ.bat.exe, Detection: malicious, Browse
                            • Filename: Ricowell Ind New INQ.bat.exe, Detection: malicious, Browse
                            • Filename: Setup_x86.exe, Detection: malicious, Browse
                            • Filename: ORDER.exe, Detection: malicious, Browse
                            • Filename: ORDER.exe, Detection: malicious, Browse
                            • Filename: ulACwpUCSU.exe, Detection: malicious, Browse
                            • Filename: fJuwM4Bwi7.exe, Detection: malicious, Browse
                            • Filename: ulACwpUCSU.exe, Detection: malicious, Browse
                            Reputation:moderate, very likely benign file
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......)...m.m.m...k.m.~....j.9..i....l....l.Richm.........................PE..L....\.U...........!.................'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text..._........................... ..`.rdata..S....0......."..............@..@.data...h....@.......&..............@....reloc..b....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):52
                            Entropy (8bit):4.0914493934217315
                            Encrypted:false
                            SSDEEP:3:sBa99k1NoCFOn:KankVg
                            MD5:5D04A35D3950677049C7A0CF17E37125
                            SHA1:CAFDD49A953864F83D387774B39B2657A253470F
                            SHA-256:A9493973DD293917F3EBB932AB255F8CAC40121707548DE100D5969956BB1266
                            SHA-512:C7B1AFD95299C0712BDBC67F9D2714926D6EC9F71909AF615AFFC400D8D2216AB76F6AC35057088836435DE36E919507E1B25BE87B07C911083F964EB67E003B
                            Malicious:false
                            Preview:kernel32::SetFilePointer(i r5, i 1200 , i 0,i 0)i.r3
                            Process:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):74
                            Entropy (8bit):3.9637832956585757
                            Encrypted:false
                            SSDEEP:3:sRQE1wFEt/ijNJyI3dj2+n:aQEGiwh3D
                            MD5:16D513397F3C1F8334E8F3E4FC49828F
                            SHA1:4EE15AFCA81CA6A13AF4E38240099B730D6931F0
                            SHA-256:D3C781A1855C8A70F5ACA88D9E2C92AFFFA80541334731F62CAA9494AA8A0C36
                            SHA-512:4A350B790FDD2FE957E9AB48D5969B217AB19FC7F93F3774F1121A5F140FF9A9EAAA8FA30E06A9EF40AD776E698C2E65A05323C3ADF84271DA1716E75F5183C3
                            Malicious:false
                            Preview:kernel32::CreateFileA(m r4 , i 0x80000000, i 0, p 0, i 4, i 0x80, i 0)i.r5
                            Process:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):443463
                            Entropy (8bit):7.1060208528446225
                            Encrypted:false
                            SSDEEP:6144:6eFLl9ao3Quyw5WWAMSYo6iddXZCQOSKPJMUTr4eTiJpe1rGYySat8HqTVhigC:lFLCgyw5PAMSndVgMUPKUStSG0L
                            MD5:BED600EBCF25FB176F3C33C49032C708
                            SHA1:CCAB1DF83370C5C8C2CFC4C1DC56BEBA0BFD209D
                            SHA-256:BD8BBA41CD2FB016F23D8EFF0AA46B940CF682A3F53E487671C883342DF0F815
                            SHA-512:E38A129C8E0C28EB5D703B9A5B371D6D97BBE1E5C73EE5B865EA7790E1016FA9B2F846D624CA569456D318E1B94C97EFAF4588FF397B7AB632DDEC14E29D9315
                            Malicious:false
                            Preview:.........----........... .........YY.........@..............{{...ii.......t...eeeee.p......1..n.z..........-................55.33........uuuu....SS.a.................OOO.......a..........V..AAA..f...........................c...............qqq...............O...}}.H....l.jjj.>.D..""..[......................:.......55..((.KK................U...........................L....p..W..................................s......................l.[[[......V...__.................;;..........__.....T...D...................k....>>>........................)............--............:....cc.....hhhh....8....!!.............&&&&&&....nnn.|...........'.p......................FFF.U..................)................jjj.......r.............$$$$.................?.................................YY...u.....E..................n.J........--.#......E...--..????..........>>>>>>>..22.......:...h.S...........,.................XXX...................YY.....R....................................Z...`.......... ....o.....
                            Process:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):405493
                            Entropy (8bit):1.246302898520162
                            Encrypted:false
                            SSDEEP:1536:SMSKb0U1bKXTxlJBDh8fwx/hCIFWwF/hAGVFLK:tb0U4XTxBUwdFWwZQ
                            MD5:2D4BB09FC720DBF5FF883C376957C192
                            SHA1:E8633B582A2DE84480838E18A393CB69A0DEA7A5
                            SHA-256:A1DAE3293AFAA57868FA347417F8B4E9B504778267F523510E66A701FDDBD796
                            SHA-512:05F0CA6FDC7546393990D50217D7DD3E29CC41DC19B702678E67BD5EF6AA9C8B4BF67A7D72DA3CD0EEE3C4B968E1F835FA88AFF56018AA4FA29E06D79FD94DD7
                            Malicious:false
                            Preview:...`................U..............^.............}........../.~......................|...............................E.......n...E..Q......#............."..............3.....]........................................................................................................................k.{......................................................j.....>..................G......Q....................................... ......................................................................39.............q.........L.....................................7...........................i...............................W.........g..............................................................+................................................................}....................y...............................................m............................................D......................................................................................................................F.....y..
                            Process:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            File Type:GLS_BINARY_MSB_FIRST
                            Category:dropped
                            Size (bytes):93375
                            Entropy (8bit):4.580946458707374
                            Encrypted:false
                            SSDEEP:1536:Alp+RhDsJsRkvT5g3QrwktSfauVAgTc746z0z/Nrr5:Az+RVRPctUXVAgBTFh
                            MD5:4F5E2D0BABBCEB3EBFF820D6B2C277EB
                            SHA1:ED0ECF48CD9233F66644F9419427A82EB5A10D7D
                            SHA-256:AFAF78A5B733E2A0AD3CC8A5EDEBD9397E91961DE1B61E4ACB987B2B40DE4E50
                            SHA-512:AFC53D79243A7EC1581D42372922A7D03D17FAE79144AA693F6390C92435E090DD2E8AD7D201CFE3E481BF6101465F7AD6ECAB589F5579D1F874AD1961E86BDB
                            Malicious:false
                            Preview:......... ....&&&&.............**........66666........................t.AA.............(....................T.{{..........q..................66................................xx..C......J....??.................................................QQQ.[.......................}}}}.......a.....>...............,,..........T.-....V...........H......3..I...........__..zzzzzz.....W.vv.............................t....!!!!!...'''........H.....................(....W................YYY..........J.................................C.1............n...............................!................ggg.....55........33......rr.?..........................q................. .???..................e......2222..........F.........llll.........i.......................B..........88....................xx.P.r......d....hh.ccc.........?.BB..........GG...$$$..5555............................................................FF......YYY.................OO..q...............T.............e...................................
                            Process:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):268320
                            Entropy (8bit):1.2484153809015175
                            Encrypted:false
                            SSDEEP:768:XRm/UHiPv8+9Qi8nCX5O1RRZnytZfr65hMN59EgukI/8d2VlycdnTd8snimGRk6W:hsnyUIDiM1idzUbj3
                            MD5:E08BB74F72E7A74CA9E1066D0732C60C
                            SHA1:C6A0748FC271905D76A83EE61D2512CCE97C9577
                            SHA-256:8592211ACEAC0B42741D538187B25156E5667D511B754478FF0BE61F664C7867
                            SHA-512:96A2312E03C64B98CCDECB8F557645828880551BF28E9196EC37C4536259876F4BB1EC11E485118B4F6206F2B5897006010DDF4C85E011BDA83DFBDD5BA0FB1A
                            Malicious:false
                            Preview:.........................................>........Y.........................................^.....O....{.............../.........I................4......b.................Z..............,.......L..F......................l.................................E......................................p......&...............2.......................P.......................................................................6...........y(......................................................................K....................................a......................................_....b...~..................N...I..............................L.........B..................................................6..c.r................`b................................_.......................#........................,.........................3...K^..........................................................................H..V.............K..........................................8..............................
                            Process:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):299353
                            Entropy (8bit):1.2515527061732419
                            Encrypted:false
                            SSDEEP:768:IrwdaO+ErGCGiQiWrxVTG+gEquPOuNVN3LDYpiizG4daXq7KvsUj7wK9/JpZY6nU:U8Q1TwxsYS6LTinpUVvDuGT/F
                            MD5:75862CAC4E48811142F0D6BC4C760FD5
                            SHA1:4A862856AC5613B8865FFB5CA3D4BCD377D857A5
                            SHA-256:1370C0CF01285FECFB686F3A8377CF456C5175C1970225CBD83AB9687BD93F7A
                            SHA-512:FE8BDD8B3196826D4C4202689CAE3A2A95B96F4758C1DF532E03894393DEC5D6EA110EB70B7269F14C81EA3E9DEC373BE6BEB06891F73199586C42ABC4273CB5
                            Malicious:false
                            Preview:......................................................................1.B............................1...............................................................................5..................................................................................................................................................I..........................W............................................y..............................................._...........................F..............8........................................4...................................M...........G...............................................1................Z.........j.....................N...................................... ..............................]........./..........................................................ew.......................................6..........................".......2.....................................M...q................................................................
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                            Entropy (8bit):7.980593050511499
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 92.16%
                            • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:xLDz0WPZYc.exe
                            File size:576'325 bytes
                            MD5:74e2251dfa1e7fbeb0e4e9ba2f6c56b4
                            SHA1:468d0612612e0424ea38eb7426d893a5098d245b
                            SHA256:7cf7ab42508aedf9910b50fafaab9786be8ec80c413387d92f4a1432f66e955b
                            SHA512:831efb203b54b2e1dd40466883d4bf782764f14bc7b3ae832960297d97a63265844bf7a8114ef25937db0501c4cff1acdd432b59bbf8965b6bca712a00150187
                            SSDEEP:12288:lCiOsdE13z3jIhfSqc47HPUiJCsBNEeS+qZCmmf8sVyb9yssb:bOWEp30x/7rJueS+aCmmf8sVy6
                            TLSH:1DC423D69AD6D8A3F0E205BE0E779B75C67EE608502C44479BC7ED93BC390827A0E4D1
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1p.:u..iu..iu..i...iw..iu..i...i...id..i!2.i...i...it..iRichu..i........PE..L....\.U.................\...........0.......p....@
                            Icon Hash:3d2e0f95332b3399
                            Entrypoint:0x4030b6
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x55C15CDD [Wed Aug 5 00:46:21 2015 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:e160ef8e55bb9d162da4e266afd9eef3
                            Instruction
                            sub esp, 00000184h
                            push ebx
                            push ebp
                            push esi
                            xor ebx, ebx
                            push edi
                            mov dword ptr [esp+18h], ebx
                            mov dword ptr [esp+10h], 00409190h
                            mov dword ptr [esp+20h], ebx
                            mov byte ptr [esp+14h], 00000020h
                            call dword ptr [00407034h]
                            push 00008001h
                            call dword ptr [0040711Ch]
                            push ebx
                            call dword ptr [0040728Ch]
                            push 00000009h
                            mov dword ptr [00423798h], eax
                            call 00007FE864C0FAB2h
                            mov dword ptr [004236E4h], eax
                            push ebx
                            lea eax, dword ptr [esp+38h]
                            push 00000160h
                            push eax
                            push ebx
                            push 0041EC98h
                            call dword ptr [00407164h]
                            push 00409180h
                            push 00422EE0h
                            call 00007FE864C0F75Ch
                            call dword ptr [00407120h]
                            mov ebp, 00429000h
                            push eax
                            push ebp
                            call 00007FE864C0F74Ah
                            push ebx
                            call dword ptr [00407118h]
                            cmp byte ptr [00429000h], 00000022h
                            mov dword ptr [004236E0h], eax
                            mov eax, ebp
                            jne 00007FE864C0CCCCh
                            mov byte ptr [esp+14h], 00000022h
                            mov eax, 00429001h
                            push dword ptr [esp+14h]
                            push eax
                            call 00007FE864C0F1DAh
                            push eax
                            call dword ptr [00407220h]
                            mov dword ptr [esp+1Ch], eax
                            jmp 00007FE864C0CD85h
                            cmp cl, 00000020h
                            jne 00007FE864C0CCC8h
                            inc eax
                            cmp byte ptr [eax], 00000020h
                            je 00007FE864C0CCBCh
                            Programming Language:
                            • [EXP] VC++ 6.0 SP5 build 8804
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x340000xbc8.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x70000x298.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x5ac00x5c00b2645f74b36b1cbbff66d6cf2b9a61fbFalse0.6638077445652174data6.434017891994297IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x70000x11ce0x1200640f709ec19b4ed0455a4c64e5934d5eFalse0.4520399305555556OpenPGP Secret Key5.23558258677739IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x90000x1a7d80x400135ffaf7e3978322a97c335bc761bdb6False0.609375data4.961292527260562IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .ndata0x240000x100000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x340000xbc80xc002eed50edc1bb3fcae915bfbf8800f6e6False0.4345703125data4.452305564094297IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0x341c00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.42473118279569894
                            RT_DIALOG0x344a80x144dataEnglishUnited States0.5216049382716049
                            RT_DIALOG0x345f00x100dataEnglishUnited States0.5234375
                            RT_DIALOG0x346f00x11cdataEnglishUnited States0.6056338028169014
                            RT_DIALOG0x348100x60dataEnglishUnited States0.7291666666666666
                            RT_GROUP_ICON0x348700x14dataEnglishUnited States1.2
                            RT_MANIFEST0x348880x33fXML 1.0 document, ASCII text, with very long lines (831), with no line terminatorsEnglishUnited States0.5547533092659447
                            DLLImport
                            KERNEL32.dllGetTickCount, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, SearchPathA, GetShortPathNameA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, GetWindowsDirectoryA, GetTempPathA, Sleep, CloseHandle, LoadLibraryA, lstrlenA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, lstrcpyA, lstrcatA, GetSystemDirectoryA, GetVersion, GetProcAddress, GlobalAlloc, CompareFileTime, SetFileTime, ExpandEnvironmentStringsA, lstrcmpiA, lstrcmpA, WaitForSingleObject, GlobalFree, GetExitCodeProcess, GetModuleHandleA, SetErrorMode, GetCommandLineA, LoadLibraryExA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, WriteFile, FindClose, WritePrivateProfileStringA, MultiByteToWideChar, MulDiv, GetPrivateProfileStringA, FreeLibrary
                            USER32.dllCreateWindowExA, EndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, GetDC, SystemParametersInfoA, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, DestroyWindow, CreateDialogParamA, SetTimer, GetDlgItem, wsprintfA, SetForegroundWindow, ShowWindow, IsWindow, LoadImageA, SetWindowLongA, SetClipboardData, EmptyClipboard, OpenClipboard, EndPaint, PostQuitMessage, FindWindowExA, SendMessageTimeoutA, SetWindowTextA
                            GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                            SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA
                            ADVAPI32.dllRegCloseKey, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegEnumValueA, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                            COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                            ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                            VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                            2025-01-10T18:36:23.018504+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.64998966.63.187.3080TCP
                            2025-01-10T18:37:44.091339+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.64998366.63.187.3080TCP
                            2025-01-10T18:38:05.590614+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.64998466.63.187.3080TCP
                            2025-01-10T18:38:27.094951+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.64998766.63.187.3080TCP
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 10, 2025 18:37:22.697081089 CET4998380192.168.2.666.63.187.30
                            Jan 10, 2025 18:37:22.701906919 CET804998366.63.187.30192.168.2.6
                            Jan 10, 2025 18:37:22.701997995 CET4998380192.168.2.666.63.187.30
                            Jan 10, 2025 18:37:22.702819109 CET4998380192.168.2.666.63.187.30
                            Jan 10, 2025 18:37:22.707736969 CET804998366.63.187.30192.168.2.6
                            Jan 10, 2025 18:37:44.091196060 CET804998366.63.187.30192.168.2.6
                            Jan 10, 2025 18:37:44.091339111 CET4998380192.168.2.666.63.187.30
                            Jan 10, 2025 18:37:44.095772028 CET4998380192.168.2.666.63.187.30
                            Jan 10, 2025 18:37:44.100585938 CET804998366.63.187.30192.168.2.6
                            Jan 10, 2025 18:37:44.217087030 CET4998480192.168.2.666.63.187.30
                            Jan 10, 2025 18:37:44.222107887 CET804998466.63.187.30192.168.2.6
                            Jan 10, 2025 18:37:44.222202063 CET4998480192.168.2.666.63.187.30
                            Jan 10, 2025 18:37:44.222398996 CET4998480192.168.2.666.63.187.30
                            Jan 10, 2025 18:37:44.227215052 CET804998466.63.187.30192.168.2.6
                            Jan 10, 2025 18:38:05.590512037 CET804998466.63.187.30192.168.2.6
                            Jan 10, 2025 18:38:05.590614080 CET4998480192.168.2.666.63.187.30
                            Jan 10, 2025 18:38:05.590725899 CET4998480192.168.2.666.63.187.30
                            Jan 10, 2025 18:38:05.595558882 CET804998466.63.187.30192.168.2.6
                            Jan 10, 2025 18:38:05.708128929 CET4998780192.168.2.666.63.187.30
                            Jan 10, 2025 18:38:05.713191032 CET804998766.63.187.30192.168.2.6
                            Jan 10, 2025 18:38:05.713288069 CET4998780192.168.2.666.63.187.30
                            Jan 10, 2025 18:38:05.713380098 CET4998780192.168.2.666.63.187.30
                            Jan 10, 2025 18:38:05.718190908 CET804998766.63.187.30192.168.2.6
                            Jan 10, 2025 18:38:27.093797922 CET804998766.63.187.30192.168.2.6
                            Jan 10, 2025 18:38:27.094950914 CET4998780192.168.2.666.63.187.30
                            Jan 10, 2025 18:38:27.095047951 CET4998780192.168.2.666.63.187.30
                            Jan 10, 2025 18:38:27.099775076 CET804998766.63.187.30192.168.2.6
                            Jan 10, 2025 18:38:27.209642887 CET4998980192.168.2.666.63.187.30
                            Jan 10, 2025 18:38:27.214504004 CET804998966.63.187.30192.168.2.6
                            Jan 10, 2025 18:38:27.214641094 CET4998980192.168.2.666.63.187.30
                            Jan 10, 2025 18:38:27.214823008 CET4998980192.168.2.666.63.187.30
                            Jan 10, 2025 18:38:27.219578028 CET804998966.63.187.30192.168.2.6
                            • 66.63.187.30
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.64998366.63.187.30807160C:\Users\user\Desktop\xLDz0WPZYc.exe
                            TimestampBytes transferredDirectionData
                            Jan 10, 2025 18:37:22.702819109 CET175OUTGET /AmDxXYvcZBeoV9.bin HTTP/1.1
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                            Host: 66.63.187.30
                            Cache-Control: no-cache


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            1192.168.2.64998466.63.187.30807160C:\Users\user\Desktop\xLDz0WPZYc.exe
                            TimestampBytes transferredDirectionData
                            Jan 10, 2025 18:37:44.222398996 CET175OUTGET /AmDxXYvcZBeoV9.bin HTTP/1.1
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                            Host: 66.63.187.30
                            Cache-Control: no-cache


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            2192.168.2.64998766.63.187.30807160C:\Users\user\Desktop\xLDz0WPZYc.exe
                            TimestampBytes transferredDirectionData
                            Jan 10, 2025 18:38:05.713380098 CET175OUTGET /AmDxXYvcZBeoV9.bin HTTP/1.1
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                            Host: 66.63.187.30
                            Cache-Control: no-cache


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            3192.168.2.64998966.63.187.30807160C:\Users\user\Desktop\xLDz0WPZYc.exe
                            TimestampBytes transferredDirectionData
                            Jan 10, 2025 18:38:27.214823008 CET175OUTGET /AmDxXYvcZBeoV9.bin HTTP/1.1
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                            Host: 66.63.187.30
                            Cache-Control: no-cache


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:1
                            Start time:12:36:29
                            Start date:10/01/2025
                            Path:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\xLDz0WPZYc.exe"
                            Imagebase:0x400000
                            File size:576'325 bytes
                            MD5 hash:74E2251DFA1E7FBEB0E4E9BA2F6C56B4
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:6
                            Start time:12:37:12
                            Start date:10/01/2025
                            Path:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\xLDz0WPZYc.exe"
                            Imagebase:0x400000
                            File size:576'325 bytes
                            MD5 hash:74E2251DFA1E7FBEB0E4E9BA2F6C56B4
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:20.1%
                              Dynamic/Decrypted Code Coverage:14.5%
                              Signature Coverage:20.3%
                              Total number of Nodes:1430
                              Total number of Limit Nodes:38
                              execution_graph 4781 4022c0 4782 4022f0 4781->4782 4783 4022c5 4781->4783 4785 4029fd 18 API calls 4782->4785 4792 402b07 4783->4792 4787 4022f7 4785->4787 4786 4022cc 4788 40230d 4786->4788 4789 4029fd 18 API calls 4786->4789 4796 402a3d RegOpenKeyExA 4787->4796 4791 4022dd RegDeleteValueA RegCloseKey 4789->4791 4791->4788 4793 4029fd 18 API calls 4792->4793 4794 402b20 4793->4794 4795 402b2e RegOpenKeyExA 4794->4795 4795->4786 4799 402a68 4796->4799 4803 402ab4 4796->4803 4797 402a8e RegEnumKeyA 4798 402aa0 RegCloseKey 4797->4798 4797->4799 4800 405ee8 3 API calls 4798->4800 4799->4797 4799->4798 4801 402ac5 RegCloseKey 4799->4801 4804 402a3d 3 API calls 4799->4804 4802 402ab0 4800->4802 4801->4803 4802->4803 4805 402ae0 RegDeleteKeyA 4802->4805 4803->4788 4804->4799 4805->4803 4806 4019c0 4807 4029fd 18 API calls 4806->4807 4808 4019c7 4807->4808 4809 4029fd 18 API calls 4808->4809 4810 4019d0 4809->4810 4811 4019d7 lstrcmpiA 4810->4811 4812 4019e9 lstrcmpA 4810->4812 4813 4019dd 4811->4813 4812->4813 4814 402b42 4815 402b51 SetTimer 4814->4815 4816 402b6a 4814->4816 4815->4816 4817 402bbf 4816->4817 4818 402b84 MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 4816->4818 4818->4817 4819 402645 4820 4029fd 18 API calls 4819->4820 4821 40264c FindFirstFileA 4820->4821 4822 40266f 4821->4822 4825 40265f 4821->4825 4827 405b1b wsprintfA 4822->4827 4824 402676 4828 405bbd lstrcpynA 4824->4828 4827->4824 4828->4825 4829 4023c8 4830 402b07 19 API calls 4829->4830 4831 4023d2 4830->4831 4832 4029fd 18 API calls 4831->4832 4833 4023db 4832->4833 4834 402663 4833->4834 4835 4023e5 RegQueryValueExA 4833->4835 4836 402405 4835->4836 4837 40240b RegCloseKey 4835->4837 4836->4837 4840 405b1b wsprintfA 4836->4840 4837->4834 4840->4837 4844 401ccc GetDlgItem GetClientRect 4845 4029fd 18 API calls 4844->4845 4846 401cfc LoadImageA SendMessageA 4845->4846 4847 401d1a DeleteObject 4846->4847 4848 402892 4846->4848 4847->4848 4849 4035cc 4850 4035d7 4849->4850 4851 4035db 4850->4851 4852 4035de GlobalAlloc 4850->4852 4852->4851 4860 1000180d 4861 10001830 4860->4861 4862 10001860 GlobalFree 4861->4862 4863 10001872 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 4861->4863 4862->4863 4864 10001266 2 API calls 4863->4864 4865 100019e3 GlobalFree GlobalFree 4864->4865 4228 1000270f 4229 1000275f 4228->4229 4230 1000271f VirtualProtect 4228->4230 4230->4229 4258 4024d1 4259 4024d6 4258->4259 4260 4024e7 4258->4260 4261 4029e0 18 API calls 4259->4261 4262 4029fd 18 API calls 4260->4262 4265 4024dd 4261->4265 4263 4024ee lstrlenA 4262->4263 4263->4265 4264 402663 4265->4264 4266 40250d WriteFile 4265->4266 4266->4264 4290 4025d3 4291 4025da 4290->4291 4294 40283f 4290->4294 4292 4029e0 18 API calls 4291->4292 4293 4025e5 4292->4293 4295 4025ec SetFilePointer 4293->4295 4295->4294 4296 4025fc 4295->4296 4298 405b1b wsprintfA 4296->4298 4298->4294 4328 4014d6 4329 4029e0 18 API calls 4328->4329 4330 4014dc Sleep 4329->4330 4332 402892 4330->4332 4701 401dd8 4702 4029fd 18 API calls 4701->4702 4703 401dde 4702->4703 4704 4029fd 18 API calls 4703->4704 4705 401de7 4704->4705 4706 4029fd 18 API calls 4705->4706 4707 401df0 4706->4707 4708 4029fd 18 API calls 4707->4708 4709 401df9 4708->4709 4710 401423 25 API calls 4709->4710 4711 401e00 ShellExecuteA 4710->4711 4712 401e2d 4711->4712 4880 1000161a 4881 10001649 4880->4881 4882 10001a5d 18 API calls 4881->4882 4883 10001650 4882->4883 4884 10001663 4883->4884 4885 10001657 4883->4885 4887 1000168a 4884->4887 4888 1000166d 4884->4888 4886 10001266 2 API calls 4885->4886 4894 10001661 4886->4894 4889 10001690 4887->4889 4890 100016b4 4887->4890 4891 100014e2 3 API calls 4888->4891 4892 10001559 3 API calls 4889->4892 4893 100014e2 3 API calls 4890->4893 4895 10001672 4891->4895 4896 10001695 4892->4896 4893->4894 4897 10001559 3 API calls 4895->4897 4898 10001266 2 API calls 4896->4898 4899 10001678 4897->4899 4900 1000169b GlobalFree 4898->4900 4901 10001266 2 API calls 4899->4901 4900->4894 4903 100016af GlobalFree 4900->4903 4902 1000167e GlobalFree 4901->4902 4902->4894 4903->4894 4904 40155b 4905 401577 ShowWindow 4904->4905 4906 40157e 4904->4906 4905->4906 4907 402892 4906->4907 4908 40158c ShowWindow 4906->4908 4908->4907 4909 401edc 4910 4029fd 18 API calls 4909->4910 4911 401ee3 GetFileVersionInfoSizeA 4910->4911 4912 401f5c 4911->4912 4913 401f06 GlobalAlloc 4911->4913 4913->4912 4914 401f1a GetFileVersionInfoA 4913->4914 4914->4912 4915 401f2b VerQueryValueA 4914->4915 4915->4912 4916 401f44 4915->4916 4920 405b1b wsprintfA 4916->4920 4918 401f50 4921 405b1b wsprintfA 4918->4921 4920->4918 4921->4912 4927 4018e3 4928 40191a 4927->4928 4929 4029fd 18 API calls 4928->4929 4930 40191f 4929->4930 4931 40547d 71 API calls 4930->4931 4932 401928 4931->4932 3953 404fe4 3954 405006 GetDlgItem GetDlgItem GetDlgItem 3953->3954 3955 40518f 3953->3955 3999 403ea8 SendMessageA 3954->3999 3957 405197 GetDlgItem CreateThread CloseHandle 3955->3957 3958 4051bf 3955->3958 3957->3958 4013 404f78 OleInitialize 3957->4013 3960 4051ed 3958->3960 3961 4051d5 ShowWindow ShowWindow 3958->3961 3962 40520e 3958->3962 3959 405076 3964 40507d GetClientRect GetSystemMetrics SendMessageA SendMessageA 3959->3964 3963 4051f5 3960->3963 3965 405248 3960->3965 4001 403ea8 SendMessageA 3961->4001 3969 403eda 8 API calls 3962->3969 3967 405221 ShowWindow 3963->3967 3968 4051fd 3963->3968 3970 4050eb 3964->3970 3971 4050cf SendMessageA SendMessageA 3964->3971 3965->3962 3972 405255 SendMessageA 3965->3972 3975 405241 3967->3975 3976 405233 3967->3976 3973 403e4c SendMessageA 3968->3973 3974 40521a 3969->3974 3979 4050f0 SendMessageA 3970->3979 3980 4050fe 3970->3980 3971->3970 3972->3974 3981 40526e CreatePopupMenu 3972->3981 3973->3962 3978 403e4c SendMessageA 3975->3978 4002 404ea6 3976->4002 3978->3965 3979->3980 3983 403e73 19 API calls 3980->3983 3982 405bdf 18 API calls 3981->3982 3984 40527e AppendMenuA 3982->3984 3985 40510e 3983->3985 3986 40529c GetWindowRect 3984->3986 3987 4052af TrackPopupMenu 3984->3987 3988 405117 ShowWindow 3985->3988 3989 40514b GetDlgItem SendMessageA 3985->3989 3986->3987 3987->3974 3991 4052cb 3987->3991 3992 40512d ShowWindow 3988->3992 3994 40513a 3988->3994 3989->3974 3990 405172 SendMessageA SendMessageA 3989->3990 3990->3974 3993 4052ea SendMessageA 3991->3993 3992->3994 3993->3993 3995 405307 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3993->3995 4000 403ea8 SendMessageA 3994->4000 3997 405329 SendMessageA 3995->3997 3997->3997 3998 40534b GlobalUnlock SetClipboardData CloseClipboard 3997->3998 3998->3974 3999->3959 4000->3989 4001->3960 4003 404ec1 4002->4003 4012 404f64 4002->4012 4004 404ede lstrlenA 4003->4004 4005 405bdf 18 API calls 4003->4005 4006 404f07 4004->4006 4007 404eec lstrlenA 4004->4007 4005->4004 4008 404f1a 4006->4008 4009 404f0d SetWindowTextA 4006->4009 4010 404efe lstrcatA 4007->4010 4007->4012 4011 404f20 SendMessageA SendMessageA SendMessageA 4008->4011 4008->4012 4009->4008 4010->4006 4011->4012 4012->3975 4014 403ebf SendMessageA 4013->4014 4016 404f9b 4014->4016 4015 403ebf SendMessageA 4017 404fd4 OleUninitialize 4015->4017 4018 404fc2 4016->4018 4019 401389 2 API calls 4016->4019 4018->4015 4019->4016 4940 4018e6 4941 4029fd 18 API calls 4940->4941 4942 4018ed 4941->4942 4943 4053d1 MessageBoxIndirectA 4942->4943 4944 4018f6 4943->4944 4020 401f68 4021 401f7a 4020->4021 4022 402028 4020->4022 4041 4029fd 4021->4041 4025 401423 25 API calls 4022->4025 4031 402181 4025->4031 4026 4029fd 18 API calls 4027 401f8a 4026->4027 4028 401f92 GetModuleHandleA 4027->4028 4029 401f9f LoadLibraryExA 4027->4029 4028->4029 4030 401faf GetProcAddress 4028->4030 4029->4022 4029->4030 4032 401ffb 4030->4032 4033 401fbe 4030->4033 4036 404ea6 25 API calls 4032->4036 4034 401fc6 4033->4034 4035 401fdd 4033->4035 4089 401423 4034->4089 4047 100016bd 4035->4047 4038 401fce 4036->4038 4038->4031 4039 40201c FreeLibrary 4038->4039 4039->4031 4042 402a09 4041->4042 4043 405bdf 18 API calls 4042->4043 4044 402a2a 4043->4044 4045 401f81 4044->4045 4046 405e28 5 API calls 4044->4046 4045->4026 4046->4045 4048 100016ed 4047->4048 4092 10001a5d 4048->4092 4050 100016f4 4051 1000180a 4050->4051 4052 10001705 4050->4052 4053 1000170c 4050->4053 4051->4038 4141 100021b0 4052->4141 4124 100021fa 4053->4124 4058 10001770 4064 100017b2 4058->4064 4065 10001776 4058->4065 4059 10001752 4154 100023da 4059->4154 4060 10001722 4063 10001728 4060->4063 4069 10001733 4060->4069 4061 1000173b 4074 10001731 4061->4074 4151 10002aa7 4061->4151 4063->4074 4135 100027ec 4063->4135 4067 100023da 11 API calls 4064->4067 4071 10001559 3 API calls 4065->4071 4072 100017a4 4067->4072 4068 10001758 4165 10001559 4068->4165 4145 1000258d 4069->4145 4076 1000178c 4071->4076 4080 100017f9 4072->4080 4176 100023a0 4072->4176 4074->4058 4074->4059 4079 100023da 11 API calls 4076->4079 4078 10001739 4078->4074 4079->4072 4080->4051 4082 10001803 GlobalFree 4080->4082 4082->4051 4086 100017e5 4086->4080 4180 100014e2 wsprintfA 4086->4180 4087 100017de FreeLibrary 4087->4086 4090 404ea6 25 API calls 4089->4090 4091 401431 4090->4091 4091->4038 4183 10001215 GlobalAlloc 4092->4183 4094 10001a81 4184 10001215 GlobalAlloc 4094->4184 4096 10001cbb GlobalFree GlobalFree GlobalFree 4097 10001cd8 4096->4097 4116 10001d22 4096->4116 4099 1000201a 4097->4099 4108 10001ced 4097->4108 4097->4116 4098 10001a8c 4098->4096 4100 10001b60 GlobalAlloc 4098->4100 4102 10001bc9 GlobalFree 4098->4102 4105 10001bab lstrcpyA 4098->4105 4106 10001bb5 lstrcpyA 4098->4106 4111 10001f7a 4098->4111 4098->4116 4118 10001c07 4098->4118 4119 10001e75 GlobalFree 4098->4119 4122 10001224 2 API calls 4098->4122 4190 10001215 GlobalAlloc 4098->4190 4101 1000203c GetModuleHandleA 4099->4101 4099->4116 4100->4098 4103 10002062 4101->4103 4104 1000204d LoadLibraryA 4101->4104 4102->4098 4191 100015a4 GetProcAddress 4103->4191 4104->4103 4104->4116 4105->4106 4106->4098 4108->4116 4187 10001224 4108->4187 4109 10002074 4110 100020b3 4109->4110 4123 1000209d GetProcAddress 4109->4123 4112 100020c0 lstrlenA 4110->4112 4110->4116 4111->4116 4117 10001fbe lstrcpyA 4111->4117 4192 100015a4 GetProcAddress 4112->4192 4116->4050 4117->4116 4118->4098 4185 10001534 GlobalSize GlobalAlloc 4118->4185 4119->4098 4120 100020d9 4120->4116 4122->4098 4123->4110 4133 10002212 4124->4133 4126 10002349 GlobalFree 4129 10001712 4126->4129 4126->4133 4127 100022b9 GlobalAlloc MultiByteToWideChar 4131 10002303 4127->4131 4132 100022e3 GlobalAlloc CLSIDFromString GlobalFree 4127->4132 4128 1000230a lstrlenA 4128->4126 4128->4131 4129->4060 4129->4061 4129->4074 4130 10001224 GlobalAlloc lstrcpynA 4130->4133 4131->4126 4198 10002521 4131->4198 4132->4126 4133->4126 4133->4127 4133->4128 4133->4130 4194 100012ad 4133->4194 4138 100027fe 4135->4138 4136 100028a3 SetFilePointer 4137 100028c1 4136->4137 4139 100029b2 GetLastError 4137->4139 4140 100029bd 4137->4140 4138->4136 4139->4140 4140->4074 4142 100021c0 4141->4142 4143 1000170b 4141->4143 4142->4143 4144 100021d2 GlobalAlloc 4142->4144 4143->4053 4144->4142 4149 100025a9 4145->4149 4146 100025fa GlobalAlloc 4150 1000261c 4146->4150 4147 1000260d 4148 10002612 GlobalSize 4147->4148 4147->4150 4148->4150 4149->4146 4149->4147 4150->4078 4152 10002ab2 4151->4152 4153 10002af2 GlobalFree 4152->4153 4201 10001215 GlobalAlloc 4154->4201 4156 10002473 WideCharToMultiByte 4162 100023e6 4156->4162 4157 1000243a lstrcpynA 4157->4162 4158 1000244b StringFromGUID2 WideCharToMultiByte 4158->4162 4159 10002494 wsprintfA 4159->4162 4160 100024b8 GlobalFree 4160->4162 4161 100024f2 GlobalFree 4161->4068 4162->4156 4162->4157 4162->4158 4162->4159 4162->4160 4162->4161 4163 10001266 2 API calls 4162->4163 4202 100012d1 4162->4202 4163->4162 4206 10001215 GlobalAlloc 4165->4206 4167 1000155f 4168 1000156c lstrcpyA 4167->4168 4170 10001586 4167->4170 4171 100015a0 4168->4171 4170->4171 4172 1000158b wsprintfA 4170->4172 4173 10001266 4171->4173 4172->4171 4174 100012a8 GlobalFree 4173->4174 4175 1000126f GlobalAlloc lstrcpynA 4173->4175 4174->4072 4175->4174 4177 100017c5 4176->4177 4178 100023ae 4176->4178 4177->4086 4177->4087 4178->4177 4179 100023c7 GlobalFree 4178->4179 4179->4178 4181 10001266 2 API calls 4180->4181 4182 10001503 4181->4182 4182->4080 4183->4094 4184->4098 4186 10001552 4185->4186 4186->4118 4193 10001215 GlobalAlloc 4187->4193 4189 10001233 lstrcpynA 4189->4116 4190->4098 4191->4109 4192->4120 4193->4189 4195 100012b4 4194->4195 4196 10001224 2 API calls 4195->4196 4197 100012cf 4196->4197 4197->4133 4199 10002585 4198->4199 4200 1000252f VirtualAlloc 4198->4200 4199->4131 4200->4199 4201->4162 4203 100012f9 4202->4203 4204 100012da 4202->4204 4203->4162 4204->4203 4205 100012e0 lstrcpyA 4204->4205 4205->4203 4206->4167 4945 40426a 4946 4042a0 4945->4946 4947 40427a 4945->4947 4949 403eda 8 API calls 4946->4949 4948 403e73 19 API calls 4947->4948 4950 404287 SetDlgItemTextA 4948->4950 4951 4042ac 4949->4951 4950->4946 4952 40286d SendMessageA 4953 402887 InvalidateRect 4952->4953 4954 402892 4952->4954 4953->4954 4955 4014f0 SetForegroundWindow 4956 402892 4955->4956 4957 401af0 4958 4029fd 18 API calls 4957->4958 4959 401af7 4958->4959 4960 4029e0 18 API calls 4959->4960 4961 401b00 wsprintfA 4960->4961 4962 402892 4961->4962 4963 4019f1 4964 4029fd 18 API calls 4963->4964 4965 4019fa ExpandEnvironmentStringsA 4964->4965 4966 401a0e 4965->4966 4968 401a21 4965->4968 4967 401a13 lstrcmpA 4966->4967 4966->4968 4967->4968 4969 100015b3 4975 100014bb 4969->4975 4971 10001611 GlobalFree 4972 100015cb 4972->4971 4973 100015e6 4972->4973 4974 100015fd VirtualFree 4972->4974 4973->4971 4974->4971 4977 100014c1 4975->4977 4976 100014c7 4976->4972 4977->4976 4978 100014d3 GlobalFree 4977->4978 4978->4972 4979 401c78 4980 4029e0 18 API calls 4979->4980 4981 401c7e IsWindow 4980->4981 4982 4019e1 4981->4982 4990 1000103d 4993 1000101b 4990->4993 4994 100014bb GlobalFree 4993->4994 4995 10001020 4994->4995 4996 10001027 GlobalAlloc 4995->4996 4997 10001024 4995->4997 4996->4997 4998 100014e2 3 API calls 4997->4998 4999 1000103b 4998->4999 5000 4014fe 5001 401506 5000->5001 5003 401519 5000->5003 5002 4029e0 18 API calls 5001->5002 5002->5003 4733 40227f 4734 4029fd 18 API calls 4733->4734 4735 402290 4734->4735 4736 4029fd 18 API calls 4735->4736 4737 402299 4736->4737 4738 4029fd 18 API calls 4737->4738 4739 4022a3 GetPrivateProfileStringA 4738->4739 5004 401000 5005 401037 BeginPaint GetClientRect 5004->5005 5006 40100c DefWindowProcA 5004->5006 5008 4010f3 5005->5008 5009 401179 5006->5009 5010 401073 CreateBrushIndirect FillRect DeleteObject 5008->5010 5011 4010fc 5008->5011 5010->5008 5012 401102 CreateFontIndirectA 5011->5012 5013 401167 EndPaint 5011->5013 5012->5013 5014 401112 6 API calls 5012->5014 5013->5009 5014->5013 5015 404601 5016 404611 5015->5016 5017 40462d 5015->5017 5026 4053b5 GetDlgItemTextA 5016->5026 5019 404660 5017->5019 5020 404633 SHGetPathFromIDListA 5017->5020 5022 40464a SendMessageA 5020->5022 5023 404643 5020->5023 5021 40461e SendMessageA 5021->5017 5022->5019 5024 40140b 2 API calls 5023->5024 5024->5022 5026->5021 5027 402602 5028 402892 5027->5028 5029 402609 5027->5029 5030 40260f FindClose 5029->5030 5030->5028 5031 401705 5032 4029fd 18 API calls 5031->5032 5033 40170c SearchPathA 5032->5033 5034 401727 5033->5034 5036 4027bd 5033->5036 5034->5036 5037 405bbd lstrcpynA 5034->5037 5037->5036 5038 100029c7 5039 100029df 5038->5039 5040 10001534 2 API calls 5039->5040 5041 100029fa 5040->5041 5042 403f87 lstrcpynA lstrlenA 5043 40280a 5044 4029e0 18 API calls 5043->5044 5045 402810 5044->5045 5046 402841 5045->5046 5048 402663 5045->5048 5049 40281e 5045->5049 5047 405bdf 18 API calls 5046->5047 5046->5048 5047->5048 5049->5048 5051 405b1b wsprintfA 5049->5051 5051->5048 5059 40218a 5060 4029fd 18 API calls 5059->5060 5061 402190 5060->5061 5062 4029fd 18 API calls 5061->5062 5063 402199 5062->5063 5064 4029fd 18 API calls 5063->5064 5065 4021a2 5064->5065 5066 405ec1 2 API calls 5065->5066 5067 4021ab 5066->5067 5068 4021bc lstrlenA lstrlenA 5067->5068 5072 4021af 5067->5072 5069 404ea6 25 API calls 5068->5069 5071 4021f8 SHFileOperationA 5069->5071 5070 404ea6 25 API calls 5073 4021b7 5070->5073 5071->5072 5071->5073 5072->5070 5072->5073 5074 40220c 5075 402213 5074->5075 5078 402226 5074->5078 5076 405bdf 18 API calls 5075->5076 5077 402220 5076->5077 5079 4053d1 MessageBoxIndirectA 5077->5079 5079->5078 5080 401490 5081 404ea6 25 API calls 5080->5081 5082 401497 5081->5082 4231 401b11 4232 401b62 4231->4232 4234 401b1e 4231->4234 4233 401b8b GlobalAlloc 4232->4233 4236 401b66 4232->4236 4237 405bdf 18 API calls 4233->4237 4238 401b35 4234->4238 4241 401ba6 4234->4241 4235 405bdf 18 API calls 4239 402220 4235->4239 4246 402226 4236->4246 4252 405bbd lstrcpynA 4236->4252 4237->4241 4250 405bbd lstrcpynA 4238->4250 4253 4053d1 4239->4253 4241->4235 4241->4246 4243 401b78 GlobalFree 4243->4246 4244 401b44 4251 405bbd lstrcpynA 4244->4251 4248 401b53 4257 405bbd lstrcpynA 4248->4257 4250->4244 4251->4248 4252->4243 4254 4053e6 4253->4254 4255 405432 4254->4255 4256 4053fa MessageBoxIndirectA 4254->4256 4255->4246 4256->4255 4257->4246 4324 401595 4325 4029fd 18 API calls 4324->4325 4326 40159c SetFileAttributesA 4325->4326 4327 4015ae 4326->4327 5083 401c95 5084 4029e0 18 API calls 5083->5084 5085 401c9c 5084->5085 5086 4029e0 18 API calls 5085->5086 5087 401ca4 GetDlgItem 5086->5087 5088 4024cb 5087->5088 5089 406197 5093 40601b 5089->5093 5090 406986 5091 4060a5 GlobalAlloc 5091->5090 5091->5093 5092 40609c GlobalFree 5092->5091 5093->5090 5093->5091 5093->5092 5093->5093 5094 406113 GlobalFree 5093->5094 5095 40611c GlobalAlloc 5093->5095 5094->5095 5095->5090 5095->5093 5096 10001058 5098 10001074 5096->5098 5097 100010dc 5098->5097 5099 10001091 5098->5099 5100 100014bb GlobalFree 5098->5100 5101 100014bb GlobalFree 5099->5101 5100->5099 5102 100010a1 5101->5102 5103 100010b1 5102->5103 5104 100010a8 GlobalSize 5102->5104 5105 100010b5 GlobalAlloc 5103->5105 5106 100010c6 5103->5106 5104->5103 5107 100014e2 3 API calls 5105->5107 5108 100010d1 GlobalFree 5106->5108 5107->5106 5108->5097 4713 402519 4714 4029e0 18 API calls 4713->4714 4719 402523 4714->4719 4715 40258d 4716 4058c6 ReadFile 4716->4719 4717 40258f 4722 405b1b wsprintfA 4717->4722 4719->4715 4719->4716 4719->4717 4720 40259f 4719->4720 4720->4715 4721 4025b5 SetFilePointer 4720->4721 4721->4715 4722->4715 5109 404e1a 5110 404e2a 5109->5110 5111 404e3e 5109->5111 5112 404e30 5110->5112 5121 404e87 5110->5121 5113 404e46 IsWindowVisible 5111->5113 5119 404e5d 5111->5119 5115 403ebf SendMessageA 5112->5115 5116 404e53 5113->5116 5113->5121 5114 404e8c CallWindowProcA 5117 404e3a 5114->5117 5115->5117 5122 404771 SendMessageA 5116->5122 5119->5114 5127 4047f1 5119->5127 5121->5114 5123 4047d0 SendMessageA 5122->5123 5124 404794 GetMessagePos ScreenToClient SendMessageA 5122->5124 5125 4047c8 5123->5125 5124->5125 5126 4047cd 5124->5126 5125->5119 5126->5123 5136 405bbd lstrcpynA 5127->5136 5129 404804 5137 405b1b wsprintfA 5129->5137 5131 40480e 5132 40140b 2 API calls 5131->5132 5133 404817 5132->5133 5138 405bbd lstrcpynA 5133->5138 5135 40481e 5135->5121 5136->5129 5137->5131 5138->5135 5139 40261c 5140 402637 5139->5140 5141 40261f 5139->5141 5142 4027bd 5140->5142 5145 405bbd lstrcpynA 5140->5145 5143 40262c FindNextFileA 5141->5143 5143->5140 5145->5142 5146 40231c 5147 402322 5146->5147 5148 4029fd 18 API calls 5147->5148 5149 402334 5148->5149 5150 4029fd 18 API calls 5149->5150 5151 40233e RegCreateKeyExA 5150->5151 5152 402368 5151->5152 5155 402663 5151->5155 5153 402380 5152->5153 5154 4029fd 18 API calls 5152->5154 5157 4029e0 18 API calls 5153->5157 5159 40238c 5153->5159 5156 402379 lstrlenA 5154->5156 5156->5153 5157->5159 5158 4023a7 RegSetValueExA 5161 4023bd RegCloseKey 5158->5161 5159->5158 5160 402e62 37 API calls 5159->5160 5160->5158 5161->5155 3811 4039a0 3812 403af3 3811->3812 3813 4039b8 3811->3813 3815 403b44 3812->3815 3816 403b04 GetDlgItem GetDlgItem 3812->3816 3813->3812 3814 4039c4 3813->3814 3818 4039e2 3814->3818 3819 4039cf SetWindowPos 3814->3819 3817 403b9e 3815->3817 3828 401389 2 API calls 3815->3828 3820 403e73 19 API calls 3816->3820 3873 403aee 3817->3873 3881 403ebf 3817->3881 3823 4039e7 ShowWindow 3818->3823 3824 4039ff 3818->3824 3819->3818 3821 403b2e SetClassLongA 3820->3821 3825 40140b 2 API calls 3821->3825 3823->3824 3826 403a21 3824->3826 3827 403a07 DestroyWindow 3824->3827 3825->3815 3829 403a26 SetWindowLongA 3826->3829 3830 403a37 3826->3830 3836 403dfc 3827->3836 3831 403b76 3828->3831 3829->3873 3833 403ae0 3830->3833 3834 403a43 GetDlgItem 3830->3834 3831->3817 3835 403b7a SendMessageA 3831->3835 3832 403dfe DestroyWindow EndDialog 3832->3836 3918 403eda 3833->3918 3838 403a73 3834->3838 3839 403a56 SendMessageA IsWindowEnabled 3834->3839 3835->3873 3841 403e2d ShowWindow 3836->3841 3836->3873 3837 40140b 2 API calls 3870 403bb0 3837->3870 3843 403a80 3838->3843 3845 403ac7 SendMessageA 3838->3845 3846 403a93 3838->3846 3853 403a78 3838->3853 3839->3838 3839->3873 3841->3873 3843->3845 3843->3853 3845->3833 3848 403ab0 3846->3848 3849 403a9b 3846->3849 3847 403aae 3847->3833 3851 40140b 2 API calls 3848->3851 3912 40140b 3849->3912 3850 403e73 19 API calls 3850->3870 3854 403ab7 3851->3854 3915 403e4c 3853->3915 3854->3833 3854->3853 3856 403c2b GetDlgItem 3857 403c40 3856->3857 3858 403c48 ShowWindow KiUserCallbackDispatcher 3856->3858 3857->3858 3905 403e95 KiUserCallbackDispatcher 3858->3905 3860 403c72 EnableWindow 3863 403c86 3860->3863 3861 403c8b GetSystemMenu EnableMenuItem SendMessageA 3862 403cbb SendMessageA 3861->3862 3861->3863 3862->3863 3863->3861 3906 403ea8 SendMessageA 3863->3906 3907 405bbd lstrcpynA 3863->3907 3866 403ce9 lstrlenA 3867 405bdf 18 API calls 3866->3867 3868 403cfa SetWindowTextA 3867->3868 3908 401389 3868->3908 3870->3832 3870->3837 3870->3850 3871 403d3e DestroyWindow 3870->3871 3870->3873 3884 405bdf 3870->3884 3902 403e73 3870->3902 3871->3836 3872 403d58 CreateDialogParamA 3871->3872 3872->3836 3874 403d8b 3872->3874 3875 403e73 19 API calls 3874->3875 3876 403d96 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3875->3876 3877 401389 2 API calls 3876->3877 3878 403ddc 3877->3878 3878->3873 3879 403de4 ShowWindow 3878->3879 3880 403ebf SendMessageA 3879->3880 3880->3836 3882 403ed7 3881->3882 3883 403ec8 SendMessageA 3881->3883 3882->3870 3883->3882 3890 405bec 3884->3890 3885 405e0f 3886 405e24 3885->3886 3948 405bbd lstrcpynA 3885->3948 3886->3870 3888 405c8d GetVersion 3888->3890 3889 405de6 lstrlenA 3889->3890 3890->3885 3890->3888 3890->3889 3892 405bdf 10 API calls 3890->3892 3895 405d05 GetSystemDirectoryA 3890->3895 3896 405d18 GetWindowsDirectoryA 3890->3896 3898 405bdf 10 API calls 3890->3898 3899 405d8f lstrcatA 3890->3899 3900 405d4c SHGetSpecialFolderLocation 3890->3900 3932 405aa4 RegOpenKeyExA 3890->3932 3937 405e28 3890->3937 3946 405b1b wsprintfA 3890->3946 3947 405bbd lstrcpynA 3890->3947 3892->3889 3895->3890 3896->3890 3898->3890 3899->3890 3900->3890 3901 405d64 SHGetPathFromIDListA CoTaskMemFree 3900->3901 3901->3890 3903 405bdf 18 API calls 3902->3903 3904 403e7e SetDlgItemTextA 3903->3904 3904->3856 3905->3860 3906->3863 3907->3866 3910 401390 3908->3910 3909 4013fe 3909->3870 3910->3909 3911 4013cb MulDiv SendMessageA 3910->3911 3911->3910 3913 401389 2 API calls 3912->3913 3914 401420 3913->3914 3914->3853 3916 403e53 3915->3916 3917 403e59 SendMessageA 3915->3917 3916->3917 3917->3847 3919 403f7b 3918->3919 3920 403ef2 GetWindowLongA 3918->3920 3919->3873 3920->3919 3921 403f03 3920->3921 3922 403f12 GetSysColor 3921->3922 3923 403f15 3921->3923 3922->3923 3924 403f25 SetBkMode 3923->3924 3925 403f1b SetTextColor 3923->3925 3926 403f43 3924->3926 3927 403f3d GetSysColor 3924->3927 3925->3924 3928 403f54 3926->3928 3929 403f4a SetBkColor 3926->3929 3927->3926 3928->3919 3930 403f67 DeleteObject 3928->3930 3931 403f6e CreateBrushIndirect 3928->3931 3929->3928 3930->3931 3931->3919 3933 405b15 3932->3933 3934 405ad7 RegQueryValueExA 3932->3934 3933->3890 3935 405af8 RegCloseKey 3934->3935 3935->3933 3944 405e34 3937->3944 3938 405ea0 CharPrevA 3942 405e9c 3938->3942 3939 405e91 CharNextA 3939->3942 3939->3944 3940 405ebb 3940->3890 3942->3938 3942->3940 3943 405e7f CharNextA 3943->3944 3944->3939 3944->3942 3944->3943 3945 405e8c CharNextA 3944->3945 3949 405678 3944->3949 3945->3939 3946->3890 3947->3890 3948->3886 3950 40567e 3949->3950 3951 405691 3950->3951 3952 405684 CharNextA 3950->3952 3951->3944 3952->3950 5163 100010e0 5172 1000110e 5163->5172 5164 100011c4 GlobalFree 5165 100012ad 2 API calls 5165->5172 5166 100011c3 5166->5164 5167 10001155 GlobalAlloc 5167->5172 5168 100011ea GlobalFree 5168->5172 5169 10001266 2 API calls 5171 100011b1 GlobalFree 5169->5171 5170 100012d1 lstrcpyA 5170->5172 5171->5172 5172->5164 5172->5165 5172->5166 5172->5167 5172->5168 5172->5169 5172->5170 5172->5171 5173 4064a0 5175 40601b 5173->5175 5174 406986 5175->5174 5176 4060a5 GlobalAlloc 5175->5176 5177 40609c GlobalFree 5175->5177 5178 406113 GlobalFree 5175->5178 5179 40611c GlobalAlloc 5175->5179 5176->5174 5176->5175 5177->5176 5178->5179 5179->5174 5179->5175 5180 4016a1 5181 4029fd 18 API calls 5180->5181 5182 4016a7 GetFullPathNameA 5181->5182 5183 4016df 5182->5183 5184 4016be 5182->5184 5185 402892 5183->5185 5186 4016f3 GetShortPathNameA 5183->5186 5184->5183 5187 405ec1 2 API calls 5184->5187 5186->5185 5188 4016cf 5187->5188 5188->5183 5190 405bbd lstrcpynA 5188->5190 5190->5183 5191 10002162 5192 100021c0 5191->5192 5194 100021f6 5191->5194 5193 100021d2 GlobalAlloc 5192->5193 5192->5194 5193->5192 5195 404823 GetDlgItem GetDlgItem 5196 404875 7 API calls 5195->5196 5203 404a8d 5195->5203 5197 404918 DeleteObject 5196->5197 5198 40490b SendMessageA 5196->5198 5199 404921 5197->5199 5198->5197 5201 404958 5199->5201 5202 405bdf 18 API calls 5199->5202 5200 404b71 5205 404c1d 5200->5205 5215 404bca SendMessageA 5200->5215 5238 404a80 5200->5238 5204 403e73 19 API calls 5201->5204 5207 40493a SendMessageA SendMessageA 5202->5207 5203->5200 5206 404afe 5203->5206 5213 404771 5 API calls 5203->5213 5210 40496c 5204->5210 5208 404c27 SendMessageA 5205->5208 5209 404c2f 5205->5209 5206->5200 5212 404b63 SendMessageA 5206->5212 5207->5199 5208->5209 5218 404c41 ImageList_Destroy 5209->5218 5219 404c48 5209->5219 5230 404c58 5209->5230 5214 403e73 19 API calls 5210->5214 5211 403eda 8 API calls 5217 404e13 5211->5217 5212->5200 5213->5206 5220 40497a 5214->5220 5216 404bdf SendMessageA 5215->5216 5215->5238 5226 404bf2 5216->5226 5218->5219 5222 404c51 GlobalFree 5219->5222 5219->5230 5223 404a4e GetWindowLongA SetWindowLongA 5220->5223 5229 4049c9 SendMessageA 5220->5229 5232 404a48 5220->5232 5235 404a05 SendMessageA 5220->5235 5236 404a16 SendMessageA 5220->5236 5221 404dc7 5224 404dd9 ShowWindow GetDlgItem ShowWindow 5221->5224 5221->5238 5222->5230 5225 404a67 5223->5225 5224->5238 5227 404a85 5225->5227 5228 404a6d ShowWindow 5225->5228 5231 404c03 SendMessageA 5226->5231 5247 403ea8 SendMessageA 5227->5247 5246 403ea8 SendMessageA 5228->5246 5229->5220 5230->5221 5237 4047f1 4 API calls 5230->5237 5242 404c93 5230->5242 5231->5205 5232->5223 5232->5225 5235->5220 5236->5220 5237->5242 5238->5211 5239 404d9d InvalidateRect 5239->5221 5240 404db3 5239->5240 5248 40472c 5240->5248 5241 404cc1 SendMessageA 5245 404cd7 5241->5245 5242->5241 5242->5245 5244 404d4b SendMessageA SendMessageA 5244->5245 5245->5239 5245->5244 5246->5238 5247->5203 5251 404667 5248->5251 5250 404741 5250->5221 5252 40467d 5251->5252 5253 405bdf 18 API calls 5252->5253 5254 4046e1 5253->5254 5255 405bdf 18 API calls 5254->5255 5256 4046ec 5255->5256 5257 405bdf 18 API calls 5256->5257 5258 404702 lstrlenA wsprintfA SetDlgItemTextA 5257->5258 5258->5250 5259 401d26 GetDC GetDeviceCaps 5260 4029e0 18 API calls 5259->5260 5261 401d44 MulDiv ReleaseDC 5260->5261 5262 4029e0 18 API calls 5261->5262 5263 401d63 5262->5263 5264 405bdf 18 API calls 5263->5264 5265 401d9c CreateFontIndirectA 5264->5265 5266 4024cb 5265->5266 4207 40172c 4208 4029fd 18 API calls 4207->4208 4209 401733 4208->4209 4213 40587d 4209->4213 4211 40173a 4212 40587d 2 API calls 4211->4212 4212->4211 4214 405888 GetTickCount GetTempFileNameA 4213->4214 4215 4058b9 4214->4215 4216 4058b5 4214->4216 4215->4211 4216->4214 4216->4215 4217 401dac 4225 4029e0 4217->4225 4219 401db2 4220 4029e0 18 API calls 4219->4220 4221 401dbb 4220->4221 4222 401dc2 ShowWindow 4221->4222 4223 401dcd EnableWindow 4221->4223 4224 402892 4222->4224 4223->4224 4226 405bdf 18 API calls 4225->4226 4227 4029f4 4226->4227 4227->4219 5267 401eac 5268 4029fd 18 API calls 5267->5268 5269 401eb3 5268->5269 5270 405ec1 2 API calls 5269->5270 5271 401eb9 5270->5271 5273 401ecb 5271->5273 5274 405b1b wsprintfA 5271->5274 5274->5273 5275 40192d 5276 4029fd 18 API calls 5275->5276 5277 401934 lstrlenA 5276->5277 5278 4024cb 5277->5278 5279 4024af 5280 4029fd 18 API calls 5279->5280 5281 4024b6 5280->5281 5284 40584e GetFileAttributesA CreateFileA 5281->5284 5283 4024c2 5284->5283 5285 401cb0 5286 4029e0 18 API calls 5285->5286 5287 401cc0 SetWindowLongA 5286->5287 5288 402892 5287->5288 5289 401a31 5290 4029e0 18 API calls 5289->5290 5291 401a37 5290->5291 5292 4029e0 18 API calls 5291->5292 5293 4019e1 5292->5293 5294 4042b1 5295 4042dd 5294->5295 5296 4042ee 5294->5296 5355 4053b5 GetDlgItemTextA 5295->5355 5297 4042fa GetDlgItem 5296->5297 5304 404359 5296->5304 5299 40430e 5297->5299 5303 404322 SetWindowTextA 5299->5303 5307 4056e6 4 API calls 5299->5307 5300 40443d 5353 4045e6 5300->5353 5357 4053b5 GetDlgItemTextA 5300->5357 5301 4042e8 5302 405e28 5 API calls 5301->5302 5302->5296 5308 403e73 19 API calls 5303->5308 5304->5300 5309 405bdf 18 API calls 5304->5309 5304->5353 5306 403eda 8 API calls 5311 4045fa 5306->5311 5312 404318 5307->5312 5313 40433e 5308->5313 5314 4043cd SHBrowseForFolderA 5309->5314 5310 40446d 5315 40573b 18 API calls 5310->5315 5312->5303 5319 40564d 3 API calls 5312->5319 5316 403e73 19 API calls 5313->5316 5314->5300 5317 4043e5 CoTaskMemFree 5314->5317 5318 404473 5315->5318 5320 40434c 5316->5320 5321 40564d 3 API calls 5317->5321 5358 405bbd lstrcpynA 5318->5358 5319->5303 5356 403ea8 SendMessageA 5320->5356 5324 4043f2 5321->5324 5326 404429 SetDlgItemTextA 5324->5326 5330 405bdf 18 API calls 5324->5330 5325 404352 5328 405ee8 3 API calls 5325->5328 5326->5300 5327 40448a 5329 405ee8 3 API calls 5327->5329 5328->5304 5338 404492 5329->5338 5331 404411 lstrcmpiA 5330->5331 5331->5326 5333 404422 lstrcatA 5331->5333 5332 4044cc 5359 405bbd lstrcpynA 5332->5359 5333->5326 5335 4044d5 5336 4056e6 4 API calls 5335->5336 5337 4044db GetDiskFreeSpaceA 5336->5337 5340 4044fd MulDiv 5337->5340 5343 404524 5337->5343 5338->5332 5341 405694 2 API calls 5338->5341 5338->5343 5340->5343 5341->5338 5342 404595 5345 4045b8 5342->5345 5347 40140b 2 API calls 5342->5347 5343->5342 5344 40472c 21 API calls 5343->5344 5346 404582 5344->5346 5360 403e95 KiUserCallbackDispatcher 5345->5360 5348 404597 SetDlgItemTextA 5346->5348 5349 404587 5346->5349 5347->5345 5348->5342 5351 404667 21 API calls 5349->5351 5351->5342 5352 4045d4 5352->5353 5361 404246 5352->5361 5353->5306 5355->5301 5356->5325 5357->5310 5358->5327 5359->5335 5360->5352 5362 404254 5361->5362 5363 404259 SendMessageA 5361->5363 5362->5363 5363->5353 4267 401e32 4268 4029fd 18 API calls 4267->4268 4269 401e38 4268->4269 4270 404ea6 25 API calls 4269->4270 4271 401e42 4270->4271 4282 40536c CreateProcessA 4271->4282 4273 401e9e CloseHandle 4277 402663 4273->4277 4274 401e67 WaitForSingleObject 4275 401e48 4274->4275 4276 401e75 GetExitCodeProcess 4274->4276 4275->4273 4275->4274 4275->4277 4285 405f21 4275->4285 4279 401e90 4276->4279 4280 401e87 4276->4280 4279->4273 4289 405b1b wsprintfA 4280->4289 4283 4053ab 4282->4283 4284 40539f CloseHandle 4282->4284 4283->4275 4284->4283 4286 405f3e PeekMessageA 4285->4286 4287 405f34 DispatchMessageA 4286->4287 4288 405f4e 4286->4288 4287->4286 4288->4274 4289->4279 4299 4015b3 4300 4029fd 18 API calls 4299->4300 4301 4015ba 4300->4301 4317 4056e6 CharNextA CharNextA 4301->4317 4303 40160a 4305 401638 4303->4305 4306 40160f 4303->4306 4304 405678 CharNextA 4307 4015d0 CreateDirectoryA 4304->4307 4311 401423 25 API calls 4305->4311 4308 401423 25 API calls 4306->4308 4309 4015e5 GetLastError 4307->4309 4313 4015c2 4307->4313 4310 401616 4308->4310 4312 4015f2 GetFileAttributesA 4309->4312 4309->4313 4323 405bbd lstrcpynA 4310->4323 4316 401630 4311->4316 4312->4313 4313->4303 4313->4304 4315 401621 SetCurrentDirectoryA 4315->4316 4318 405711 4317->4318 4319 405701 4317->4319 4321 405678 CharNextA 4318->4321 4322 405731 4318->4322 4319->4318 4320 40570c CharNextA 4319->4320 4320->4322 4321->4318 4322->4313 4323->4315 4333 4030b6 #17 SetErrorMode OleInitialize 4408 405ee8 GetModuleHandleA 4333->4408 4337 403126 GetCommandLineA 4413 405bbd lstrcpynA 4337->4413 4339 403138 GetModuleHandleA 4340 40314f 4339->4340 4341 405678 CharNextA 4340->4341 4342 403163 CharNextA 4341->4342 4348 403173 4342->4348 4343 40323d 4344 403250 GetTempPathA 4343->4344 4414 403082 4344->4414 4346 403268 4349 4032c2 DeleteFileA 4346->4349 4350 40326c GetWindowsDirectoryA lstrcatA 4346->4350 4347 405678 CharNextA 4347->4348 4348->4343 4348->4347 4353 40323f 4348->4353 4422 402c29 GetTickCount GetModuleFileNameA 4349->4422 4352 403082 11 API calls 4350->4352 4355 403288 4352->4355 4504 405bbd lstrcpynA 4353->4504 4354 4032d6 4362 405678 CharNextA 4354->4362 4391 40335c 4354->4391 4402 40336c 4354->4402 4355->4349 4357 40328c GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4355->4357 4358 403082 11 API calls 4357->4358 4360 4032ba 4358->4360 4360->4349 4360->4402 4364 4032f1 4362->4364 4371 403337 4364->4371 4372 40339b lstrcatA lstrcmpiA 4364->4372 4365 403385 4368 4053d1 MessageBoxIndirectA 4365->4368 4366 403479 4367 40351c ExitProcess 4366->4367 4370 405ee8 3 API calls 4366->4370 4373 403393 ExitProcess 4368->4373 4374 40348c 4370->4374 4505 40573b 4371->4505 4376 4033b7 CreateDirectoryA SetCurrentDirectoryA 4372->4376 4372->4402 4379 405ee8 3 API calls 4374->4379 4377 4033d9 4376->4377 4378 4033ce 4376->4378 4529 405bbd lstrcpynA 4377->4529 4528 405bbd lstrcpynA 4378->4528 4383 403495 4379->4383 4385 405ee8 3 API calls 4383->4385 4387 40349e 4385->4387 4386 403351 4520 405bbd lstrcpynA 4386->4520 4390 4034bc 4387->4390 4396 4034ac GetCurrentProcess 4387->4396 4389 405bdf 18 API calls 4392 403418 DeleteFileA 4389->4392 4393 405ee8 3 API calls 4390->4393 4450 40360e 4391->4450 4394 403425 CopyFileA 4392->4394 4405 4033e7 4392->4405 4395 4034f3 4393->4395 4394->4405 4398 403508 ExitWindowsEx 4395->4398 4401 403515 4395->4401 4396->4390 4397 40346d 4399 405a71 40 API calls 4397->4399 4398->4367 4398->4401 4399->4402 4403 40140b 2 API calls 4401->4403 4521 403534 4402->4521 4403->4367 4404 405bdf 18 API calls 4404->4405 4405->4389 4405->4397 4405->4404 4406 40536c 2 API calls 4405->4406 4407 403459 CloseHandle 4405->4407 4530 405a71 4405->4530 4406->4405 4407->4405 4409 405f04 LoadLibraryA 4408->4409 4410 405f0f GetProcAddress 4408->4410 4409->4410 4411 4030fb SHGetFileInfoA 4409->4411 4410->4411 4412 405bbd lstrcpynA 4411->4412 4412->4337 4413->4339 4415 405e28 5 API calls 4414->4415 4417 40308e 4415->4417 4416 403098 4416->4346 4417->4416 4535 40564d lstrlenA CharPrevA 4417->4535 4420 40587d 2 API calls 4421 4030b4 4420->4421 4421->4346 4538 40584e GetFileAttributesA CreateFileA 4422->4538 4424 402c69 4444 402c79 4424->4444 4539 405bbd lstrcpynA 4424->4539 4426 402c8f 4540 405694 lstrlenA 4426->4540 4430 402ca0 GetFileSize 4431 402cb7 4430->4431 4447 402d9c 4430->4447 4437 402e08 4431->4437 4431->4444 4446 402bc5 6 API calls 4431->4446 4431->4447 4579 403055 4431->4579 4433 402da5 4435 402dd5 GlobalAlloc 4433->4435 4433->4444 4582 40306b SetFilePointer 4433->4582 4556 40306b SetFilePointer 4435->4556 4441 402bc5 6 API calls 4437->4441 4439 402dbe 4442 403055 ReadFile 4439->4442 4440 402df0 4557 402e62 4440->4557 4441->4444 4445 402dc9 4442->4445 4444->4354 4445->4435 4445->4444 4446->4431 4545 402bc5 4447->4545 4449 402e39 SetFilePointer 4449->4444 4451 405ee8 3 API calls 4450->4451 4452 403622 4451->4452 4453 403628 GetUserDefaultUILanguage 4452->4453 4454 40363a 4452->4454 4593 405b1b wsprintfA 4453->4593 4456 405aa4 3 API calls 4454->4456 4458 403665 4456->4458 4457 403638 4594 4038d3 4457->4594 4459 403683 lstrcatA 4458->4459 4460 405aa4 3 API calls 4458->4460 4459->4457 4460->4459 4463 40573b 18 API calls 4464 4036b5 4463->4464 4465 40373e 4464->4465 4467 405aa4 3 API calls 4464->4467 4466 40573b 18 API calls 4465->4466 4468 403744 4466->4468 4469 4036e1 4467->4469 4470 403754 LoadImageA 4468->4470 4473 405bdf 18 API calls 4468->4473 4469->4465 4476 4036fd lstrlenA 4469->4476 4480 405678 CharNextA 4469->4480 4471 4037fa 4470->4471 4472 40377b RegisterClassA 4470->4472 4475 40140b 2 API calls 4471->4475 4474 4037b1 SystemParametersInfoA CreateWindowExA 4472->4474 4503 403804 4472->4503 4473->4470 4474->4471 4479 403800 4475->4479 4477 403731 4476->4477 4478 40370b lstrcmpiA 4476->4478 4482 40564d 3 API calls 4477->4482 4478->4477 4481 40371b GetFileAttributesA 4478->4481 4485 4038d3 19 API calls 4479->4485 4479->4503 4483 4036fb 4480->4483 4484 403727 4481->4484 4486 403737 4482->4486 4483->4476 4484->4477 4487 405694 2 API calls 4484->4487 4488 403811 4485->4488 4603 405bbd lstrcpynA 4486->4603 4487->4477 4490 4038a0 4488->4490 4491 40381d ShowWindow LoadLibraryA 4488->4491 4492 404f78 5 API calls 4490->4492 4493 403843 GetClassInfoA 4491->4493 4494 40383c LoadLibraryA 4491->4494 4495 4038a6 4492->4495 4496 403857 GetClassInfoA RegisterClassA 4493->4496 4497 40386d DialogBoxParamA 4493->4497 4494->4493 4498 4038c2 4495->4498 4499 4038aa 4495->4499 4496->4497 4500 40140b 2 API calls 4497->4500 4501 40140b 2 API calls 4498->4501 4502 40140b 2 API calls 4499->4502 4499->4503 4500->4503 4501->4503 4502->4503 4503->4402 4504->4344 4605 405bbd lstrcpynA 4505->4605 4507 40574c 4508 4056e6 4 API calls 4507->4508 4509 405752 4508->4509 4510 403342 4509->4510 4511 405e28 5 API calls 4509->4511 4510->4402 4519 405bbd lstrcpynA 4510->4519 4517 405762 4511->4517 4512 40578d lstrlenA 4513 405798 4512->4513 4512->4517 4514 40564d 3 API calls 4513->4514 4516 40579d GetFileAttributesA 4514->4516 4516->4510 4517->4510 4517->4512 4518 405694 2 API calls 4517->4518 4606 405ec1 FindFirstFileA 4517->4606 4518->4512 4519->4386 4520->4391 4522 40354c 4521->4522 4523 40353e CloseHandle 4521->4523 4609 403579 4522->4609 4523->4522 4528->4377 4529->4405 4531 405ee8 3 API calls 4530->4531 4532 405a78 4531->4532 4534 405a99 4532->4534 4663 4058f5 lstrcpyA 4532->4663 4534->4405 4536 4030a0 CreateDirectoryA 4535->4536 4537 405667 lstrcatA 4535->4537 4536->4420 4537->4536 4538->4424 4539->4426 4541 4056a1 4540->4541 4542 402c95 4541->4542 4543 4056a6 CharPrevA 4541->4543 4544 405bbd lstrcpynA 4542->4544 4543->4541 4543->4542 4544->4430 4546 402be6 4545->4546 4547 402bce 4545->4547 4550 402bf6 GetTickCount 4546->4550 4551 402bee 4546->4551 4548 402bd7 DestroyWindow 4547->4548 4549 402bde 4547->4549 4548->4549 4549->4433 4553 402c04 CreateDialogParamA ShowWindow 4550->4553 4554 402c27 4550->4554 4552 405f21 2 API calls 4551->4552 4555 402bf4 4552->4555 4553->4554 4554->4433 4555->4433 4556->4440 4559 402e78 4557->4559 4558 402ea3 4561 403055 ReadFile 4558->4561 4559->4558 4590 40306b SetFilePointer 4559->4590 4562 402eae 4561->4562 4563 402ec0 GetTickCount 4562->4563 4564 402fe9 4562->4564 4566 402dfc 4562->4566 4575 402ed3 4563->4575 4565 402fed 4564->4565 4570 403005 4564->4570 4567 403055 ReadFile 4565->4567 4566->4444 4566->4449 4567->4566 4568 403055 ReadFile 4568->4570 4569 403055 ReadFile 4569->4575 4570->4566 4570->4568 4571 403020 WriteFile 4570->4571 4571->4566 4572 403035 4571->4572 4572->4566 4572->4570 4574 402f39 GetTickCount 4574->4575 4575->4566 4575->4569 4575->4574 4576 402f62 MulDiv wsprintfA 4575->4576 4578 402fa0 WriteFile 4575->4578 4583 405fe8 4575->4583 4577 404ea6 25 API calls 4576->4577 4577->4575 4578->4566 4578->4575 4591 4058c6 ReadFile 4579->4591 4582->4439 4584 40600d 4583->4584 4587 406015 4583->4587 4584->4575 4585 4060a5 GlobalAlloc 4585->4584 4585->4587 4586 40609c GlobalFree 4586->4585 4587->4584 4587->4585 4587->4586 4588 406113 GlobalFree 4587->4588 4589 40611c GlobalAlloc 4587->4589 4588->4589 4589->4584 4589->4587 4590->4558 4592 403068 4591->4592 4592->4431 4593->4457 4595 4038e7 4594->4595 4604 405b1b wsprintfA 4595->4604 4597 403958 4598 405bdf 18 API calls 4597->4598 4599 403964 SetWindowTextA 4598->4599 4600 403980 4599->4600 4601 403693 4599->4601 4600->4601 4602 405bdf 18 API calls 4600->4602 4601->4463 4602->4600 4603->4465 4604->4597 4605->4507 4607 405ee2 4606->4607 4608 405ed7 FindClose 4606->4608 4607->4517 4608->4607 4610 403587 4609->4610 4611 403551 4610->4611 4612 40358c FreeLibrary GlobalFree 4610->4612 4613 40547d 4611->4613 4612->4611 4612->4612 4614 40573b 18 API calls 4613->4614 4615 40549d 4614->4615 4616 4054a5 DeleteFileA 4615->4616 4617 4054bc 4615->4617 4645 403375 OleUninitialize 4616->4645 4619 4055ea 4617->4619 4650 405bbd lstrcpynA 4617->4650 4625 405ec1 2 API calls 4619->4625 4619->4645 4620 4054e2 4621 4054f5 4620->4621 4622 4054e8 lstrcatA 4620->4622 4624 405694 2 API calls 4621->4624 4623 4054fb 4622->4623 4626 405509 lstrcatA 4623->4626 4628 405514 lstrlenA FindFirstFileA 4623->4628 4624->4623 4627 40560e 4625->4627 4626->4628 4629 40564d 3 API calls 4627->4629 4627->4645 4628->4619 4648 405538 4628->4648 4630 405618 4629->4630 4632 405435 5 API calls 4630->4632 4631 405678 CharNextA 4631->4648 4633 405624 4632->4633 4634 405628 4633->4634 4635 40563e 4633->4635 4640 404ea6 25 API calls 4634->4640 4634->4645 4638 404ea6 25 API calls 4635->4638 4636 4055c9 FindNextFileA 4639 4055e1 FindClose 4636->4639 4636->4648 4638->4645 4639->4619 4641 405635 4640->4641 4642 405a71 40 API calls 4641->4642 4642->4645 4644 40547d 64 API calls 4644->4648 4645->4365 4645->4366 4646 404ea6 25 API calls 4646->4636 4647 404ea6 25 API calls 4647->4648 4648->4631 4648->4636 4648->4644 4648->4646 4648->4647 4649 405a71 40 API calls 4648->4649 4651 405bbd lstrcpynA 4648->4651 4652 405435 4648->4652 4649->4648 4650->4620 4651->4648 4660 405829 GetFileAttributesA 4652->4660 4655 405462 4655->4648 4656 405450 RemoveDirectoryA 4658 40545e 4656->4658 4657 405458 DeleteFileA 4657->4658 4658->4655 4659 40546e SetFileAttributesA 4658->4659 4659->4655 4661 405441 4660->4661 4662 40583b SetFileAttributesA 4660->4662 4661->4655 4661->4656 4661->4657 4662->4661 4664 405944 GetShortPathNameA 4663->4664 4665 40591e 4663->4665 4667 405959 4664->4667 4668 405a6b 4664->4668 4688 40584e GetFileAttributesA CreateFileA 4665->4688 4667->4668 4670 405961 wsprintfA 4667->4670 4668->4534 4669 405928 CloseHandle GetShortPathNameA 4669->4668 4671 40593c 4669->4671 4672 405bdf 18 API calls 4670->4672 4671->4664 4671->4668 4673 405989 4672->4673 4689 40584e GetFileAttributesA CreateFileA 4673->4689 4675 405996 4675->4668 4676 4059a5 GetFileSize GlobalAlloc 4675->4676 4677 405a64 CloseHandle 4676->4677 4678 4059c7 4676->4678 4677->4668 4679 4058c6 ReadFile 4678->4679 4680 4059cf 4679->4680 4680->4677 4690 4057b3 lstrlenA 4680->4690 4683 4059e6 lstrcpyA 4686 405a08 4683->4686 4684 4059fa 4685 4057b3 4 API calls 4684->4685 4685->4686 4687 405a3f SetFilePointer WriteFile GlobalFree 4686->4687 4687->4677 4688->4669 4689->4675 4691 4057f4 lstrlenA 4690->4691 4692 4057fc 4691->4692 4693 4057cd lstrcmpiA 4691->4693 4692->4683 4692->4684 4693->4692 4694 4057eb CharNextA 4693->4694 4694->4691 5364 402036 5365 4029fd 18 API calls 5364->5365 5366 40203d 5365->5366 5367 4029fd 18 API calls 5366->5367 5368 402047 5367->5368 5369 4029fd 18 API calls 5368->5369 5370 402051 5369->5370 5371 4029fd 18 API calls 5370->5371 5372 40205b 5371->5372 5373 4029fd 18 API calls 5372->5373 5374 402064 5373->5374 5375 40207a CoCreateInstance 5374->5375 5376 4029fd 18 API calls 5374->5376 5379 402099 5375->5379 5380 40214d 5375->5380 5376->5375 5377 401423 25 API calls 5378 402181 5377->5378 5379->5380 5381 40212f MultiByteToWideChar 5379->5381 5380->5377 5380->5378 5381->5380 5389 4014b7 5390 4014bd 5389->5390 5391 401389 2 API calls 5390->5391 5392 4014c5 5391->5392 5393 401bb8 5394 4029e0 18 API calls 5393->5394 5395 401bbf 5394->5395 5396 4029e0 18 API calls 5395->5396 5397 401bc9 5396->5397 5398 401bd9 5397->5398 5399 4029fd 18 API calls 5397->5399 5400 401be9 5398->5400 5401 4029fd 18 API calls 5398->5401 5399->5398 5402 401bf4 5400->5402 5403 401c38 5400->5403 5401->5400 5405 4029e0 18 API calls 5402->5405 5404 4029fd 18 API calls 5403->5404 5406 401c3d 5404->5406 5407 401bf9 5405->5407 5409 4029fd 18 API calls 5406->5409 5408 4029e0 18 API calls 5407->5408 5410 401c02 5408->5410 5411 401c46 FindWindowExA 5409->5411 5412 401c28 SendMessageA 5410->5412 5413 401c0a SendMessageTimeoutA 5410->5413 5414 401c64 5411->5414 5412->5414 5413->5414 5415 40243a 5416 402b07 19 API calls 5415->5416 5417 402444 5416->5417 5418 4029e0 18 API calls 5417->5418 5419 40244d 5418->5419 5420 402470 RegEnumValueA 5419->5420 5421 402464 RegEnumKeyA 5419->5421 5423 402663 5419->5423 5422 402489 RegCloseKey 5420->5422 5420->5423 5421->5422 5422->5423 4723 40223b 4724 402243 4723->4724 4725 402249 4723->4725 4726 4029fd 18 API calls 4724->4726 4727 402259 4725->4727 4728 4029fd 18 API calls 4725->4728 4726->4725 4729 402267 4727->4729 4730 4029fd 18 API calls 4727->4730 4728->4727 4731 4029fd 18 API calls 4729->4731 4730->4729 4732 402270 WritePrivateProfileStringA 4731->4732 5425 403fbc 5427 403fd2 5425->5427 5431 4040de 5425->5431 5426 40414d 5429 404221 5426->5429 5430 404157 GetDlgItem 5426->5430 5428 403e73 19 API calls 5427->5428 5432 404028 5428->5432 5436 403eda 8 API calls 5429->5436 5433 40416d 5430->5433 5434 4041df 5430->5434 5431->5426 5431->5429 5437 404122 GetDlgItem SendMessageA 5431->5437 5435 403e73 19 API calls 5432->5435 5433->5434 5441 404193 6 API calls 5433->5441 5434->5429 5442 4041f1 5434->5442 5439 404035 CheckDlgButton 5435->5439 5440 40421c 5436->5440 5456 403e95 KiUserCallbackDispatcher 5437->5456 5454 403e95 KiUserCallbackDispatcher 5439->5454 5441->5434 5445 4041f7 SendMessageA 5442->5445 5446 404208 5442->5446 5443 404148 5447 404246 SendMessageA 5443->5447 5445->5446 5446->5440 5449 40420e SendMessageA 5446->5449 5447->5426 5448 404053 GetDlgItem 5455 403ea8 SendMessageA 5448->5455 5449->5440 5451 404069 SendMessageA 5452 404090 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5451->5452 5453 404087 GetSysColor 5451->5453 5452->5440 5453->5452 5454->5448 5455->5451 5456->5443 4740 40173f 4741 4029fd 18 API calls 4740->4741 4742 401746 4741->4742 4743 401764 4742->4743 4744 40176c 4742->4744 4779 405bbd lstrcpynA 4743->4779 4780 405bbd lstrcpynA 4744->4780 4747 40176a 4751 405e28 5 API calls 4747->4751 4748 401777 4749 40564d 3 API calls 4748->4749 4750 40177d lstrcatA 4749->4750 4750->4747 4771 401789 4751->4771 4752 405ec1 2 API calls 4752->4771 4753 405829 2 API calls 4753->4771 4755 4017a0 CompareFileTime 4755->4771 4756 401864 4758 404ea6 25 API calls 4756->4758 4757 40183b 4759 404ea6 25 API calls 4757->4759 4777 401850 4757->4777 4760 40186e 4758->4760 4759->4777 4761 402e62 37 API calls 4760->4761 4763 401881 4761->4763 4762 405bbd lstrcpynA 4762->4771 4764 401895 SetFileTime 4763->4764 4766 4018a7 CloseHandle 4763->4766 4764->4766 4765 405bdf 18 API calls 4765->4771 4767 4018b8 4766->4767 4766->4777 4768 4018d0 4767->4768 4769 4018bd 4767->4769 4770 405bdf 18 API calls 4768->4770 4772 405bdf 18 API calls 4769->4772 4774 4018d8 4770->4774 4771->4752 4771->4753 4771->4755 4771->4756 4771->4757 4771->4762 4771->4765 4775 4053d1 MessageBoxIndirectA 4771->4775 4778 40584e GetFileAttributesA CreateFileA 4771->4778 4773 4018c5 lstrcatA 4772->4773 4773->4774 4776 4053d1 MessageBoxIndirectA 4774->4776 4775->4771 4776->4777 4778->4771 4779->4747 4780->4748 5457 40163f 5458 4029fd 18 API calls 5457->5458 5459 401645 5458->5459 5460 405ec1 2 API calls 5459->5460 5461 40164b 5460->5461 5462 40193f 5463 4029e0 18 API calls 5462->5463 5464 401946 5463->5464 5465 4029e0 18 API calls 5464->5465 5466 401950 5465->5466 5467 4029fd 18 API calls 5466->5467 5468 401959 5467->5468 5469 40196c lstrlenA 5468->5469 5470 4019a7 5468->5470 5471 401976 5469->5471 5471->5470 5475 405bbd lstrcpynA 5471->5475 5473 401990 5473->5470 5474 40199d lstrlenA 5473->5474 5474->5470 5475->5473

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 4030b6-40314d #17 SetErrorMode OleInitialize call 405ee8 SHGetFileInfoA call 405bbd GetCommandLineA call 405bbd GetModuleHandleA 7 403159-40316e call 405678 CharNextA 0->7 8 40314f-403154 0->8 11 403233-403237 7->11 8->7 12 403173-403176 11->12 13 40323d 11->13 14 403178-40317c 12->14 15 40317e-403186 12->15 16 403250-40326a GetTempPathA call 403082 13->16 14->14 14->15 17 403188-403189 15->17 18 40318e-403191 15->18 26 4032c2-4032dc DeleteFileA call 402c29 16->26 27 40326c-40328a GetWindowsDirectoryA lstrcatA call 403082 16->27 17->18 20 403223-403230 call 405678 18->20 21 403197-40319b 18->21 20->11 36 403232 20->36 24 4031b3-4031e0 21->24 25 40319d-4031a3 21->25 32 4031e2-4031e8 24->32 33 4031f3-403221 24->33 30 4031a5-4031a7 25->30 31 4031a9 25->31 41 403370-40337f call 403534 OleUninitialize 26->41 42 4032e2-4032e8 26->42 27->26 44 40328c-4032bc GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 403082 27->44 30->24 30->31 31->24 38 4031ea-4031ec 32->38 39 4031ee 32->39 33->20 35 40323f-40324b call 405bbd 33->35 35->16 36->11 38->33 38->39 39->33 55 403385-403395 call 4053d1 ExitProcess 41->55 56 403479-40347f 41->56 46 403360-403367 call 40360e 42->46 47 4032ea-4032f5 call 405678 42->47 44->26 44->41 53 40336c 46->53 59 4032f7-403320 47->59 60 40332b-403335 47->60 53->41 57 403485-4034a2 call 405ee8 * 3 56->57 58 40351c-403524 56->58 89 4034a4-4034a6 57->89 90 4034ec-4034fa call 405ee8 57->90 62 403526 58->62 63 40352a-40352e ExitProcess 58->63 65 403322-403324 59->65 66 403337-403344 call 40573b 60->66 67 40339b-4033b5 lstrcatA lstrcmpiA 60->67 62->63 65->60 70 403326-403329 65->70 66->41 77 403346-40335c call 405bbd * 2 66->77 67->41 72 4033b7-4033cc CreateDirectoryA SetCurrentDirectoryA 67->72 70->60 70->65 73 4033d9-403401 call 405bbd 72->73 74 4033ce-4033d4 call 405bbd 72->74 85 403407-403423 call 405bdf DeleteFileA 73->85 74->73 77->46 95 403464-40346b 85->95 96 403425-403435 CopyFileA 85->96 89->90 94 4034a8-4034aa 89->94 101 403508-403513 ExitWindowsEx 90->101 102 4034fc-403506 90->102 94->90 98 4034ac-4034be GetCurrentProcess 94->98 95->85 99 40346d-403474 call 405a71 95->99 96->95 100 403437-403457 call 405a71 call 405bdf call 40536c 96->100 98->90 107 4034c0-4034e2 98->107 99->41 100->95 117 403459-403460 CloseHandle 100->117 101->58 106 403515-403517 call 40140b 101->106 102->101 102->106 106->58 107->90 117->95
                              APIs
                              • #17.COMCTL32 ref: 004030D7
                              • SetErrorMode.KERNELBASE(00008001), ref: 004030E2
                              • OleInitialize.OLE32(00000000), ref: 004030E9
                                • Part of subcall function 00405EE8: GetModuleHandleA.KERNEL32(?,?,?,004030FB,00000009), ref: 00405EFA
                                • Part of subcall function 00405EE8: LoadLibraryA.KERNELBASE(?,?,?,004030FB,00000009), ref: 00405F05
                                • Part of subcall function 00405EE8: GetProcAddress.KERNEL32(00000000,?), ref: 00405F16
                              • SHGetFileInfoA.SHELL32(0041EC98,00000000,?,?,00000000,00000009), ref: 00403111
                                • Part of subcall function 00405BBD: lstrcpynA.KERNEL32(?,?,00000400,00403126,Slibrighederne Setup,NSIS Error), ref: 00405BCA
                              • GetCommandLineA.KERNEL32(Slibrighederne Setup,NSIS Error), ref: 00403126
                              • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\xLDz0WPZYc.exe",00000000), ref: 00403139
                              • CharNextA.USER32(00000000,"C:\Users\user\Desktop\xLDz0WPZYc.exe",00000020), ref: 00403164
                              • GetTempPathA.KERNELBASE(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 00403261
                              • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 00403272
                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040327E
                              • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403292
                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 0040329A
                              • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 004032AB
                              • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 004032B3
                              • DeleteFileA.KERNELBASE(1033), ref: 004032C7
                              • OleUninitialize.OLE32(?), ref: 00403375
                              • ExitProcess.KERNEL32 ref: 00403395
                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\xLDz0WPZYc.exe",00000000,?), ref: 004033A1
                              • lstrcmpiA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop), ref: 004033AD
                              • CreateDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 004033B9
                              • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 004033C0
                              • DeleteFileA.KERNEL32(0041E898,0041E898,?,00424000,?), ref: 00403419
                              • CopyFileA.KERNEL32(C:\Users\user\Desktop\xLDz0WPZYc.exe,0041E898,?), ref: 0040342D
                              • CloseHandle.KERNEL32(00000000,0041E898,0041E898,?,0041E898,00000000), ref: 0040345A
                              • GetCurrentProcess.KERNEL32(?,?,00000006,00000005,?), ref: 004034B3
                              • ExitWindowsEx.USER32(00000002,80040002), ref: 0040350B
                              • ExitProcess.KERNEL32 ref: 0040352E
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                              • String ID: "$"C:\Users\user\Desktop\xLDz0WPZYc.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Studerekammermenneskes$C:\Users\user\AppData\Roaming\Studerekammermenneskes$C:\Users\user\Desktop$C:\Users\user\Desktop\xLDz0WPZYc.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$Slibrighederne Setup$TEMP$TMP$\Temp$~nsu.tmp
                              • API String ID: 4107622049-2419296709
                              • Opcode ID: 0465aa0a361c9d0fa04965402fa3df5ad1a355ba9c919688d6d4795c9475ec4c
                              • Instruction ID: 19acd6a9e22a62aa3fa635d9352380a3979e711e0520c28b60a65d3217cef685
                              • Opcode Fuzzy Hash: 0465aa0a361c9d0fa04965402fa3df5ad1a355ba9c919688d6d4795c9475ec4c
                              • Instruction Fuzzy Hash: 87B1E370A082516AE7216F755C89B2B7EACEB45306F04057FF581B62D2C77C9E01CB6E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 118 404fe4-405000 119 405006-4050cd GetDlgItem * 3 call 403ea8 call 404744 GetClientRect GetSystemMetrics SendMessageA * 2 118->119 120 40518f-405195 118->120 138 4050eb-4050ee 119->138 139 4050cf-4050e9 SendMessageA * 2 119->139 122 405197-4051b9 GetDlgItem CreateThread CloseHandle 120->122 123 4051bf-4051cb 120->123 122->123 125 4051ed-4051f3 123->125 126 4051cd-4051d3 123->126 130 4051f5-4051fb 125->130 131 405248-40524b 125->131 128 4051d5-4051e8 ShowWindow * 2 call 403ea8 126->128 129 40520e-405215 call 403eda 126->129 128->125 142 40521a-40521e 129->142 135 405221-405231 ShowWindow 130->135 136 4051fd-405209 call 403e4c 130->136 131->129 133 40524d-405253 131->133 133->129 140 405255-405268 SendMessageA 133->140 143 405241-405243 call 403e4c 135->143 144 405233-40523c call 404ea6 135->144 136->129 147 4050f0-4050fc SendMessageA 138->147 148 4050fe-405115 call 403e73 138->148 139->138 149 405365-405367 140->149 150 40526e-40529a CreatePopupMenu call 405bdf AppendMenuA 140->150 143->131 144->143 147->148 157 405117-40512b ShowWindow 148->157 158 40514b-40516c GetDlgItem SendMessageA 148->158 149->142 155 40529c-4052ac GetWindowRect 150->155 156 4052af-4052c5 TrackPopupMenu 150->156 155->156 156->149 160 4052cb-4052e5 156->160 161 40513a 157->161 162 40512d-405138 ShowWindow 157->162 158->149 159 405172-40518a SendMessageA * 2 158->159 159->149 163 4052ea-405305 SendMessageA 160->163 164 405140-405146 call 403ea8 161->164 162->164 163->163 165 405307-405327 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 163->165 164->158 167 405329-405349 SendMessageA 165->167 167->167 168 40534b-40535f GlobalUnlock SetClipboardData CloseClipboard 167->168 168->149
                              APIs
                              • GetDlgItem.USER32(?,00000403), ref: 00405043
                              • GetDlgItem.USER32(?,000003EE), ref: 00405052
                              • GetClientRect.USER32(?,?), ref: 0040508F
                              • GetSystemMetrics.USER32(00000002), ref: 00405096
                              • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004050B7
                              • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004050C8
                              • SendMessageA.USER32(?,00001001,00000000,?), ref: 004050DB
                              • SendMessageA.USER32(?,00001026,00000000,?), ref: 004050E9
                              • SendMessageA.USER32(?,00001024,00000000,?), ref: 004050FC
                              • ShowWindow.USER32(00000000,?,0000001B,?), ref: 0040511E
                              • ShowWindow.USER32(?,?), ref: 00405132
                              • GetDlgItem.USER32(?,000003EC), ref: 00405153
                              • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405163
                              • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 0040517C
                              • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 00405188
                              • GetDlgItem.USER32(?,000003F8), ref: 00405061
                                • Part of subcall function 00403EA8: SendMessageA.USER32(?,?,?,00403CD9), ref: 00403EB6
                              • GetDlgItem.USER32(?,000003EC), ref: 004051A4
                              • CreateThread.KERNELBASE(00000000,00000000,Function_00004F78,00000000), ref: 004051B2
                              • CloseHandle.KERNELBASE(00000000), ref: 004051B9
                              • ShowWindow.USER32(00000000), ref: 004051DC
                              • ShowWindow.USER32(?,?), ref: 004051E3
                              • ShowWindow.USER32(?), ref: 00405229
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040525D
                              • CreatePopupMenu.USER32 ref: 0040526E
                              • AppendMenuA.USER32(00000000,00000000,?,00000000), ref: 00405283
                              • GetWindowRect.USER32(?,000000FF), ref: 004052A3
                              • TrackPopupMenu.USER32(00000000,?,?,?,00000000,?,00000000), ref: 004052BC
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004052F8
                              • OpenClipboard.USER32(00000000), ref: 00405308
                              • EmptyClipboard.USER32 ref: 0040530E
                              • GlobalAlloc.KERNEL32(00000042,?), ref: 00405317
                              • GlobalLock.KERNEL32(00000000), ref: 00405321
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405335
                              • GlobalUnlock.KERNEL32(00000000), ref: 0040534E
                              • SetClipboardData.USER32(?,00000000), ref: 00405359
                              • CloseClipboard.USER32 ref: 0040535F
                              Strings
                              • Slibrighederne Setup: Installing, xrefs: 004052D4
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                              • String ID: Slibrighederne Setup: Installing
                              • API String ID: 590372296-3644997099
                              • Opcode ID: b8267ac34de08bb18752529e459f06683afd16ea86d55fa50f92f6cf035c2f36
                              • Instruction ID: 5eb751775e690fc0911b0246dac1cecdda29a979763143f7b886e47eaa108cfb
                              • Opcode Fuzzy Hash: b8267ac34de08bb18752529e459f06683afd16ea86d55fa50f92f6cf035c2f36
                              • Instruction Fuzzy Hash: 8AA16971900208BFDB219FA0DD89EAE7F79FB08345F10407AFA01B61A0C7B55E519FA9

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 409 405bdf-405bea 410 405bec-405bfb 409->410 411 405bfd-405c12 409->411 410->411 412 405e05-405e09 411->412 413 405c18-405c23 411->413 415 405c35-405c3f 412->415 416 405e0f-405e19 412->416 413->412 414 405c29-405c30 413->414 414->412 415->416 417 405c45-405c4c 415->417 418 405e24-405e25 416->418 419 405e1b-405e1f call 405bbd 416->419 420 405c52-405c87 417->420 421 405df8 417->421 419->418 423 405da2-405da5 420->423 424 405c8d-405c98 GetVersion 420->424 425 405e02-405e04 421->425 426 405dfa-405e00 421->426 429 405dd5-405dd8 423->429 430 405da7-405daa 423->430 427 405cb2 424->427 428 405c9a-405c9e 424->428 425->412 426->412 436 405cb9-405cc0 427->436 428->427 433 405ca0-405ca4 428->433 431 405de6-405df6 lstrlenA 429->431 432 405dda-405de1 call 405bdf 429->432 434 405dba-405dc6 call 405bbd 430->434 435 405dac-405db8 call 405b1b 430->435 431->412 432->431 433->427 439 405ca6-405caa 433->439 443 405dcb-405dd1 434->443 435->443 441 405cc2-405cc4 436->441 442 405cc5-405cc7 436->442 439->427 446 405cac-405cb0 439->446 441->442 444 405d00-405d03 442->444 445 405cc9-405ce4 call 405aa4 442->445 443->431 448 405dd3 443->448 450 405d13-405d16 444->450 451 405d05-405d11 GetSystemDirectoryA 444->451 453 405ce9-405cec 445->453 446->436 452 405d9a-405da0 call 405e28 448->452 455 405d80-405d82 450->455 456 405d18-405d26 GetWindowsDirectoryA 450->456 454 405d84-405d87 451->454 452->431 457 405cf2-405cfb call 405bdf 453->457 458 405d89-405d8d 453->458 454->452 454->458 455->454 459 405d28-405d32 455->459 456->455 457->454 458->452 462 405d8f-405d95 lstrcatA 458->462 464 405d34-405d37 459->464 465 405d4c-405d62 SHGetSpecialFolderLocation 459->465 462->452 464->465 469 405d39-405d40 464->469 466 405d64-405d7b SHGetPathFromIDListA CoTaskMemFree 465->466 467 405d7d 465->467 466->454 466->467 467->455 470 405d48-405d4a 469->470 470->454 470->465
                              APIs
                              • GetVersion.KERNEL32(?,Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll,00000000,00404EDE,Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll,00000000), ref: 00405C90
                              • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 00405D0B
                              • GetWindowsDirectoryA.KERNEL32(Call,00000400), ref: 00405D1E
                              • SHGetSpecialFolderLocation.SHELL32(?,0040E888), ref: 00405D5A
                              • SHGetPathFromIDListA.SHELL32(0040E888,Call), ref: 00405D68
                              • CoTaskMemFree.OLE32(0040E888), ref: 00405D73
                              • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00405D95
                              • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll,00000000,00404EDE,Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll,00000000), ref: 00405DE7
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                              • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                              • API String ID: 900638850-880013877
                              • Opcode ID: 6d1c9af88ffa3db3a0edcf81b4fc072c50c4b8bcf17ecc15cdbe89ff62f1b448
                              • Instruction ID: 05ce3077703b195791b94b96109b54625272672628b9f98d23919b5af99ad588
                              • Opcode Fuzzy Hash: 6d1c9af88ffa3db3a0edcf81b4fc072c50c4b8bcf17ecc15cdbe89ff62f1b448
                              • Instruction Fuzzy Hash: 0A610171A04A05AAEB205F24DC88BBF7BB4EF11304F50813BE941B62D0D27D5982DF8E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 671 40547d-4054a3 call 40573b 674 4054a5-4054b7 DeleteFileA 671->674 675 4054bc-4054c3 671->675 676 405646-40564a 674->676 677 4054c5-4054c7 675->677 678 4054d6-4054e6 call 405bbd 675->678 680 4055f4-4055f9 677->680 681 4054cd-4054d0 677->681 684 4054f5-4054f6 call 405694 678->684 685 4054e8-4054f3 lstrcatA 678->685 680->676 683 4055fb-4055fe 680->683 681->678 681->680 686 405600-405606 683->686 687 405608-405610 call 405ec1 683->687 688 4054fb-4054fe 684->688 685->688 686->676 687->676 694 405612-405626 call 40564d call 405435 687->694 691 405500-405507 688->691 692 405509-40550f lstrcatA 688->692 691->692 695 405514-405532 lstrlenA FindFirstFileA 691->695 692->695 709 405628-40562b 694->709 710 40563e-405641 call 404ea6 694->710 697 405538-40554f call 405678 695->697 698 4055ea-4055ee 695->698 705 405551-405555 697->705 706 40555a-40555d 697->706 698->680 700 4055f0 698->700 700->680 705->706 711 405557 705->711 707 405570-40557e call 405bbd 706->707 708 40555f-405564 706->708 721 405580-405588 707->721 722 405595-4055a0 call 405435 707->722 712 405566-405568 708->712 713 4055c9-4055db FindNextFileA 708->713 709->686 715 40562d-40563c call 404ea6 call 405a71 709->715 710->676 711->706 712->707 717 40556a-40556e 712->717 713->697 719 4055e1-4055e4 FindClose 713->719 715->676 717->707 717->713 719->698 721->713 724 40558a-405593 call 40547d 721->724 731 4055c1-4055c4 call 404ea6 722->731 732 4055a2-4055a5 722->732 724->713 731->713 734 4055a7-4055b7 call 404ea6 call 405a71 732->734 735 4055b9-4055bf 732->735 734->713 735->713
                              APIs
                              • DeleteFileA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,76233410,00000000), ref: 004054A6
                              • lstrcatA.KERNEL32(00420CE0,\*.*,00420CE0,?,?,C:\Users\user\AppData\Local\Temp\,76233410,00000000), ref: 004054EE
                              • lstrcatA.KERNEL32(?,00409014,?,00420CE0,?,?,C:\Users\user\AppData\Local\Temp\,76233410,00000000), ref: 0040550F
                              • lstrlenA.KERNEL32(?,?,00409014,?,00420CE0,?,?,C:\Users\user\AppData\Local\Temp\,76233410,00000000), ref: 00405515
                              • FindFirstFileA.KERNELBASE(00420CE0,?,?,?,00409014,?,00420CE0,?,?,C:\Users\user\AppData\Local\Temp\,76233410,00000000), ref: 00405526
                              • FindNextFileA.KERNELBASE(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004055D3
                              • FindClose.KERNEL32(00000000), ref: 004055E4
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 0040548B
                              • \*.*, xrefs: 004054E8
                              • "C:\Users\user\Desktop\xLDz0WPZYc.exe", xrefs: 0040547D
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                              • String ID: "C:\Users\user\Desktop\xLDz0WPZYc.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                              • API String ID: 2035342205-2723666374
                              • Opcode ID: 2f5cc935bd14faa83787e20be2be6e70cf428fbcf334f354c204533ca760d941
                              • Instruction ID: f67e5f98a1b48f8b06c5baa1d65efce896aecc78963fcddf766b22b57dd7cee7
                              • Opcode Fuzzy Hash: 2f5cc935bd14faa83787e20be2be6e70cf428fbcf334f354c204533ca760d941
                              • Instruction Fuzzy Hash: 1851C070800A04BADF21AB25CC45BAF7AB9DB42314F14417BF444752D6D73C9A82DEAD

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1005 406197-40619c 1006 40620d-40622b 1005->1006 1007 40619e-4061cd 1005->1007 1008 406803-406818 1006->1008 1009 4061d4-4061d8 1007->1009 1010 4061cf-4061d2 1007->1010 1011 406832-406848 1008->1011 1012 40681a-406830 1008->1012 1014 4061e0 1009->1014 1015 4061da-4061de 1009->1015 1013 4061e4-4061e7 1010->1013 1018 40684b-406852 1011->1018 1012->1018 1016 406205-406208 1013->1016 1017 4061e9-4061f2 1013->1017 1014->1013 1015->1013 1021 4063da-4063f8 1016->1021 1019 4061f4 1017->1019 1020 4061f7-406203 1017->1020 1022 406854-406858 1018->1022 1023 406879-406885 1018->1023 1019->1020 1024 40626d-40629b 1020->1024 1027 406410-406422 1021->1027 1028 4063fa-40640e 1021->1028 1025 406a07-406a11 1022->1025 1026 40685e-406876 1022->1026 1034 40601b-406024 1023->1034 1031 4062b7-4062d1 1024->1031 1032 40629d-4062b5 1024->1032 1030 406a1d-406a30 1025->1030 1026->1023 1033 406425-40642f 1027->1033 1028->1033 1037 406a35-406a39 1030->1037 1038 4062d4-4062de 1031->1038 1032->1038 1035 406431 1033->1035 1036 4063d2-4063d8 1033->1036 1039 406a32 1034->1039 1040 40602a 1034->1040 1041 406542-40654f 1035->1041 1042 4063ad-4063b1 1035->1042 1036->1021 1043 406376-406380 1036->1043 1044 4062e4 1038->1044 1045 406255-40625b 1038->1045 1039->1037 1046 406031-406035 1040->1046 1047 406171-406192 1040->1047 1048 4060d6-4060da 1040->1048 1049 406146-40614a 1040->1049 1041->1034 1057 4063b7-4063cf 1042->1057 1058 4069b9-4069c3 1042->1058 1053 4069c5-4069cf 1043->1053 1054 406386-4063a8 1043->1054 1066 4069a1-4069ab 1044->1066 1067 40623a-406252 1044->1067 1055 406261-406267 1045->1055 1056 40630e-406314 1045->1056 1046->1030 1050 40603b-406048 1046->1050 1047->1008 1059 4060e0-4060f9 1048->1059 1060 406986-406990 1048->1060 1051 406150-406164 1049->1051 1052 406995-40699f 1049->1052 1050->1039 1062 40604e-406094 1050->1062 1065 406167-40616f 1051->1065 1052->1030 1053->1030 1054->1041 1055->1024 1063 406372 1055->1063 1056->1063 1064 406316-406334 1056->1064 1057->1036 1058->1030 1068 4060fc-406100 1059->1068 1060->1030 1069 406096-40609a 1062->1069 1070 4060bc-4060be 1062->1070 1063->1043 1071 406336-40634a 1064->1071 1072 40634c-40635e 1064->1072 1065->1047 1065->1049 1066->1030 1067->1045 1068->1048 1073 406102-406108 1068->1073 1074 4060a5-4060b3 GlobalAlloc 1069->1074 1075 40609c-40609f GlobalFree 1069->1075 1077 4060c0-4060ca 1070->1077 1078 4060cc-4060d4 1070->1078 1076 406361-40636b 1071->1076 1072->1076 1079 406132-406144 1073->1079 1080 40610a-406111 1073->1080 1074->1039 1081 4060b9 1074->1081 1075->1074 1076->1056 1082 40636d 1076->1082 1077->1077 1077->1078 1078->1068 1079->1065 1083 406113-406116 GlobalFree 1080->1083 1084 40611c-40612c GlobalAlloc 1080->1084 1081->1070 1086 4062f3-40630b 1082->1086 1087 4069ad-4069b7 1082->1087 1083->1084 1084->1039 1084->1079 1086->1056 1087->1030
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 208b979f7471c67888a02c39f93206778dc1c3e33f97723ffc6ad1ac2506ac0b
                              • Instruction ID: 01902b0c5badf26c21563370f74918c90dc48b9c290b8d647ce642e1aeaa84f8
                              • Opcode Fuzzy Hash: 208b979f7471c67888a02c39f93206778dc1c3e33f97723ffc6ad1ac2506ac0b
                              • Instruction Fuzzy Hash: 99F18671D00229CBDF28CFA8C8946ADBBB0FF45305F25856ED856BB281D7385A96CF44
                              APIs
                              • FindFirstFileA.KERNELBASE(?,00421528,C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp,0040577E,C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp,C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp,C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp,?,?,76233410,0040549D,?,C:\Users\user\AppData\Local\Temp\,76233410), ref: 00405ECC
                              • FindClose.KERNEL32(00000000), ref: 00405ED8
                              Strings
                              • C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp, xrefs: 00405EC1
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID: C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp
                              • API String ID: 2295610775-4135216531
                              • Opcode ID: f7c2684b86b1527493efd370d531fce5aff0e856747922587c11eb9b8a6dacaa
                              • Instruction ID: c8363a8003639f247cd95da1b4b67004b06b28060bca14ca5f7d033ebcfdecfd
                              • Opcode Fuzzy Hash: f7c2684b86b1527493efd370d531fce5aff0e856747922587c11eb9b8a6dacaa
                              • Instruction Fuzzy Hash: 9ED012369194206BC7005B78AC0C85B7A98EF593317608A33B5A5F52F0C7788D528AEA
                              APIs
                              • GetModuleHandleA.KERNEL32(?,?,?,004030FB,00000009), ref: 00405EFA
                              • LoadLibraryA.KERNELBASE(?,?,?,004030FB,00000009), ref: 00405F05
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00405F16
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: AddressHandleLibraryLoadModuleProc
                              • String ID:
                              • API String ID: 310444273-0
                              • Opcode ID: 6a16e0dd3cc6108475a6e7adf37e54332756fcc3f7317002038e5d5bd84af621
                              • Instruction ID: dd30d9296bace99b119292820e2dbffb2fd0b4cb1c2bef09bc496f5d2c6c7741
                              • Opcode Fuzzy Hash: 6a16e0dd3cc6108475a6e7adf37e54332756fcc3f7317002038e5d5bd84af621
                              • Instruction Fuzzy Hash: A6E0C232A08511ABC710AB349C08A6B77A8EFC8650304893EF501F6151D738AC11ABAE
                              APIs
                              • GetFileAttributesA.KERNELBASE(00000003,00402C69,C:\Users\user\Desktop\xLDz0WPZYc.exe,80000000,00000003), ref: 00405852
                              • CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405874
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: File$AttributesCreate
                              • String ID:
                              • API String ID: 415043291-0
                              • Opcode ID: 8e2162a352c9b3d6bf888d6bdf81e716fa6f6f9a74e85dd2386317c2044df056
                              • Instruction ID: 6507fbbaaec62448b9ae143b35cf90270df4f7fb8743d38c88d9b601ce0c16fe
                              • Opcode Fuzzy Hash: 8e2162a352c9b3d6bf888d6bdf81e716fa6f6f9a74e85dd2386317c2044df056
                              • Instruction Fuzzy Hash: 30D09E71658301AFEF098F20DE16F2E7AA2EB84B01F10562CB642940E0D6715C15DB16

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 169 4039a0-4039b2 170 403af3-403b02 169->170 171 4039b8-4039be 169->171 173 403b51-403b66 170->173 174 403b04-403b4c GetDlgItem * 2 call 403e73 SetClassLongA call 40140b 170->174 171->170 172 4039c4-4039cd 171->172 177 4039e2-4039e5 172->177 178 4039cf-4039dc SetWindowPos 172->178 175 403ba6-403bab call 403ebf 173->175 176 403b68-403b6b 173->176 174->173 191 403bb0-403bcb 175->191 181 403b6d-403b78 call 401389 176->181 182 403b9e-403ba0 176->182 184 4039e7-4039f9 ShowWindow 177->184 185 4039ff-403a05 177->185 178->177 181->182 204 403b7a-403b99 SendMessageA 181->204 182->175 190 403e40 182->190 184->185 187 403a21-403a24 185->187 188 403a07-403a1c DestroyWindow 185->188 195 403a26-403a32 SetWindowLongA 187->195 196 403a37-403a3d 187->196 194 403e1d-403e23 188->194 192 403e42-403e49 190->192 198 403bd4-403bda 191->198 199 403bcd-403bcf call 40140b 191->199 194->190 205 403e25-403e2b 194->205 195->192 202 403ae0-403aee call 403eda 196->202 203 403a43-403a54 GetDlgItem 196->203 200 403be0-403beb 198->200 201 403dfe-403e17 DestroyWindow EndDialog 198->201 199->198 200->201 207 403bf1-403c3e call 405bdf call 403e73 * 3 GetDlgItem 200->207 201->194 202->192 208 403a73-403a76 203->208 209 403a56-403a6d SendMessageA IsWindowEnabled 203->209 204->192 205->190 211 403e2d-403e36 ShowWindow 205->211 239 403c40-403c45 207->239 240 403c48-403c84 ShowWindow KiUserCallbackDispatcher call 403e95 EnableWindow 207->240 213 403a78-403a79 208->213 214 403a7b-403a7e 208->214 209->190 209->208 211->190 217 403aa9-403aae call 403e4c 213->217 218 403a80-403a86 214->218 219 403a8c-403a91 214->219 217->202 222 403ac7-403ada SendMessageA 218->222 223 403a88-403a8a 218->223 219->222 224 403a93-403a99 219->224 222->202 223->217 227 403ab0-403ab9 call 40140b 224->227 228 403a9b-403aa1 call 40140b 224->228 227->202 237 403abb-403ac5 227->237 235 403aa7 228->235 235->217 237->235 239->240 243 403c86-403c87 240->243 244 403c89 240->244 245 403c8b-403cb9 GetSystemMenu EnableMenuItem SendMessageA 243->245 244->245 246 403cbb-403ccc SendMessageA 245->246 247 403cce 245->247 248 403cd4-403d0d call 403ea8 call 405bbd lstrlenA call 405bdf SetWindowTextA call 401389 246->248 247->248 248->191 257 403d13-403d15 248->257 257->191 258 403d1b-403d1f 257->258 259 403d21-403d27 258->259 260 403d3e-403d52 DestroyWindow 258->260 259->190 262 403d2d-403d33 259->262 260->194 261 403d58-403d85 CreateDialogParamA 260->261 261->194 264 403d8b-403de2 call 403e73 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 261->264 262->191 263 403d39 262->263 263->190 264->190 269 403de4-403df7 ShowWindow call 403ebf 264->269 271 403dfc 269->271 271->194
                              APIs
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004039DC
                              • ShowWindow.USER32(?), ref: 004039F9
                              • DestroyWindow.USER32 ref: 00403A0D
                              • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403A29
                              • GetDlgItem.USER32(?,?), ref: 00403A4A
                              • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403A5E
                              • IsWindowEnabled.USER32(00000000), ref: 00403A65
                              • GetDlgItem.USER32(?,?), ref: 00403B13
                              • GetDlgItem.USER32(?,00000002), ref: 00403B1D
                              • SetClassLongA.USER32(?,000000F2,?), ref: 00403B37
                              • SendMessageA.USER32(0000040F,00000000,?,?), ref: 00403B88
                              • GetDlgItem.USER32(?,00000003), ref: 00403C2E
                              • ShowWindow.USER32(00000000,?), ref: 00403C4F
                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403C61
                              • EnableWindow.USER32(?,?), ref: 00403C7C
                              • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403C92
                              • EnableMenuItem.USER32(00000000), ref: 00403C99
                              • SendMessageA.USER32(?,?,00000000,?), ref: 00403CB1
                              • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403CC4
                              • lstrlenA.KERNEL32(Slibrighederne Setup: Installing,?,Slibrighederne Setup: Installing,Slibrighederne Setup), ref: 00403CED
                              • SetWindowTextA.USER32(?,Slibrighederne Setup: Installing), ref: 00403CFC
                              • ShowWindow.USER32(?,0000000A), ref: 00403E30
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                              • String ID: Slibrighederne Setup$Slibrighederne Setup: Installing
                              • API String ID: 3282139019-630919896
                              • Opcode ID: c4d288c9213a4ff13c75ca07aa37345a46e4ee7ce1d3a7d01e6124bc117d097b
                              • Instruction ID: 6a308cc8f2d4566e8290075db2a5fe9cea5b682110ca7f7f0817dc9b094a1d3c
                              • Opcode Fuzzy Hash: c4d288c9213a4ff13c75ca07aa37345a46e4ee7ce1d3a7d01e6124bc117d097b
                              • Instruction Fuzzy Hash: 0EC1D271604204BBDB21AF61ED45E2B3E7DFB44706B40053EF641B12E1C779A942AF6E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 272 40360e-403626 call 405ee8 275 403628-403633 GetUserDefaultUILanguage call 405b1b 272->275 276 40363a-40366b call 405aa4 272->276 279 403638 275->279 281 403683-403689 lstrcatA 276->281 282 40366d-40367e call 405aa4 276->282 283 40368e-4036b7 call 4038d3 call 40573b 279->283 281->283 282->281 289 4036bd-4036c2 283->289 290 40373e-403746 call 40573b 283->290 289->290 291 4036c4-4036e8 call 405aa4 289->291 296 403754-403779 LoadImageA 290->296 297 403748-40374f call 405bdf 290->297 291->290 300 4036ea-4036ec 291->300 298 4037fa-403802 call 40140b 296->298 299 40377b-4037ab RegisterClassA 296->299 297->296 313 403804-403807 298->313 314 40380c-403817 call 4038d3 298->314 302 4037b1-4037f5 SystemParametersInfoA CreateWindowExA 299->302 303 4038c9 299->303 305 4036fd-403709 lstrlenA 300->305 306 4036ee-4036fb call 405678 300->306 302->298 310 4038cb-4038d2 303->310 307 403731-403739 call 40564d call 405bbd 305->307 308 40370b-403719 lstrcmpiA 305->308 306->305 307->290 308->307 312 40371b-403725 GetFileAttributesA 308->312 317 403727-403729 312->317 318 40372b-40372c call 405694 312->318 313->310 324 4038a0-4038a1 call 404f78 314->324 325 40381d-40383a ShowWindow LoadLibraryA 314->325 317->307 317->318 318->307 329 4038a6-4038a8 324->329 327 403843-403855 GetClassInfoA 325->327 328 40383c-403841 LoadLibraryA 325->328 330 403857-403867 GetClassInfoA RegisterClassA 327->330 331 40386d-403890 DialogBoxParamA call 40140b 327->331 328->327 332 4038c2-4038c4 call 40140b 329->332 333 4038aa-4038b0 329->333 330->331 337 403895-40389e call 40355e 331->337 332->303 333->313 335 4038b6-4038bd call 40140b 333->335 335->313 337->310
                              APIs
                                • Part of subcall function 00405EE8: GetModuleHandleA.KERNEL32(?,?,?,004030FB,00000009), ref: 00405EFA
                                • Part of subcall function 00405EE8: LoadLibraryA.KERNELBASE(?,?,?,004030FB,00000009), ref: 00405F05
                                • Part of subcall function 00405EE8: GetProcAddress.KERNEL32(00000000,?), ref: 00405F16
                              • GetUserDefaultUILanguage.KERNELBASE(00000002,C:\Users\user\AppData\Local\Temp\,76233410,"C:\Users\user\Desktop\xLDz0WPZYc.exe",00000000), ref: 00403628
                                • Part of subcall function 00405B1B: wsprintfA.USER32 ref: 00405B28
                              • lstrcatA.KERNEL32(1033,Slibrighederne Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Slibrighederne Setup: Installing,00000000,00000002,C:\Users\user\AppData\Local\Temp\,76233410,"C:\Users\user\Desktop\xLDz0WPZYc.exe",00000000), ref: 00403689
                              • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Studerekammermenneskes,1033,Slibrighederne Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Slibrighederne Setup: Installing,00000000,00000002,C:\Users\user\AppData\Local\Temp\), ref: 004036FE
                              • lstrcmpiA.KERNEL32(?,.exe), ref: 00403711
                              • GetFileAttributesA.KERNEL32(Call), ref: 0040371C
                              • LoadImageA.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Studerekammermenneskes), ref: 00403765
                              • RegisterClassA.USER32(00422E80), ref: 004037A2
                              • SystemParametersInfoA.USER32(?,00000000,?,00000000), ref: 004037BA
                              • CreateWindowExA.USER32(?,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 004037EF
                              • ShowWindow.USER32(00000005,00000000), ref: 00403825
                              • LoadLibraryA.KERNELBASE(RichEd20), ref: 00403836
                              • LoadLibraryA.KERNEL32(RichEd32), ref: 00403841
                              • GetClassInfoA.USER32(00000000,RichEdit20A,00422E80), ref: 00403851
                              • GetClassInfoA.USER32(00000000,RichEdit,00422E80), ref: 0040385E
                              • RegisterClassA.USER32(00422E80), ref: 00403867
                              • DialogBoxParamA.USER32(?,00000000,004039A0,00000000), ref: 00403886
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDefaultDialogFileHandleImageLanguageModuleParamParametersProcShowSystemUserlstrcatlstrcmpilstrlenwsprintf
                              • String ID: "C:\Users\user\Desktop\xLDz0WPZYc.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Studerekammermenneskes$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$Slibrighederne Setup: Installing$_Nb
                              • API String ID: 2262724009-1810050061
                              • Opcode ID: 04695480405891d431fb5b182ebd05ffb522bb116bc315d28555dd4449e2f2fa
                              • Instruction ID: a1152651de681702ec182a4452d53c4528d9546a1521c59b1686b62f96f1e611
                              • Opcode Fuzzy Hash: 04695480405891d431fb5b182ebd05ffb522bb116bc315d28555dd4449e2f2fa
                              • Instruction Fuzzy Hash: 966107B16442007FD7206F659D85F2B3AACEB4474AF40457FF840B62E1C7BD6D029A2E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 342 402c29-402c77 GetTickCount GetModuleFileNameA call 40584e 345 402c83-402cb1 call 405bbd call 405694 call 405bbd GetFileSize 342->345 346 402c79-402c7e 342->346 354 402cb7 345->354 355 402d9e-402dac call 402bc5 345->355 347 402e5b-402e5f 346->347 356 402cbc-402cd3 354->356 361 402e01-402e06 355->361 362 402dae-402db1 355->362 358 402cd5 356->358 359 402cd7-402ce0 call 403055 356->359 358->359 368 402ce6-402ced 359->368 369 402e08-402e10 call 402bc5 359->369 361->347 364 402db3-402dcb call 40306b call 403055 362->364 365 402dd5-402dff GlobalAlloc call 40306b call 402e62 362->365 364->361 388 402dcd-402dd3 364->388 365->361 393 402e12-402e23 365->393 372 402d69-402d6d 368->372 373 402cef-402d03 call 405809 368->373 369->361 377 402d77-402d7d 372->377 378 402d6f-402d76 call 402bc5 372->378 373->377 391 402d05-402d0c 373->391 384 402d8c-402d96 377->384 385 402d7f-402d89 call 405f5a 377->385 378->377 384->356 392 402d9c 384->392 385->384 388->361 388->365 391->377 397 402d0e-402d15 391->397 392->355 394 402e25 393->394 395 402e2b-402e30 393->395 394->395 398 402e31-402e37 395->398 397->377 399 402d17-402d1e 397->399 398->398 400 402e39-402e54 SetFilePointer call 405809 398->400 399->377 401 402d20-402d27 399->401 404 402e59 400->404 401->377 403 402d29-402d49 401->403 403->361 405 402d4f-402d53 403->405 404->347 406 402d55-402d59 405->406 407 402d5b-402d63 405->407 406->392 406->407 407->377 408 402d65-402d67 407->408 408->377
                              APIs
                              • GetTickCount.KERNEL32 ref: 00402C3A
                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\xLDz0WPZYc.exe,00000400), ref: 00402C56
                                • Part of subcall function 0040584E: GetFileAttributesA.KERNELBASE(00000003,00402C69,C:\Users\user\Desktop\xLDz0WPZYc.exe,80000000,00000003), ref: 00405852
                                • Part of subcall function 0040584E: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405874
                              • GetFileSize.KERNEL32(00000000,00000000,0042B000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\xLDz0WPZYc.exe,C:\Users\user\Desktop\xLDz0WPZYc.exe,80000000,00000003), ref: 00402CA2
                              Strings
                              • C:\Users\user\Desktop, xrefs: 00402C84, 00402C89, 00402C8F
                              • C:\Users\user\Desktop\xLDz0WPZYc.exe, xrefs: 00402C40, 00402C4F, 00402C63, 00402C83
                              • Null, xrefs: 00402D20
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00402C33
                              • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402E01
                              • "C:\Users\user\Desktop\xLDz0WPZYc.exe", xrefs: 00402C29
                              • soft, xrefs: 00402D17
                              • Error launching installer, xrefs: 00402C79
                              • Inst, xrefs: 00402D0E
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: File$AttributesCountCreateModuleNameSizeTick
                              • String ID: "C:\Users\user\Desktop\xLDz0WPZYc.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\xLDz0WPZYc.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                              • API String ID: 4283519449-1476132107
                              • Opcode ID: 83888f2de956a22d0bc41c9bd18695b65df7ebb646604f4f840fd8a04a0cb393
                              • Instruction ID: f25878a385a50b793721b7c2dc62060375717e7a9e735ffe9872fd5df72a7917
                              • Opcode Fuzzy Hash: 83888f2de956a22d0bc41c9bd18695b65df7ebb646604f4f840fd8a04a0cb393
                              • Instruction Fuzzy Hash: 7651F671A00215ABDB20AF65DE89F9E7BB8EB04315F10413BF904B62D1D7BC9E418B9D
                              APIs
                                • Part of subcall function 10001215: GlobalAlloc.KERNELBASE(?,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                              • GlobalAlloc.KERNELBASE(?,000014A4), ref: 10001B67
                              • lstrcpyA.KERNEL32(00000008,?), ref: 10001BAF
                              • lstrcpyA.KERNEL32(00000408,?), ref: 10001BB9
                              • GlobalFree.KERNEL32(00000000), ref: 10001BCC
                              • GlobalFree.KERNEL32(?), ref: 10001CC4
                              • GlobalFree.KERNEL32(?), ref: 10001CC9
                              • GlobalFree.KERNEL32(?), ref: 10001CCE
                              • GlobalFree.KERNEL32(00000000), ref: 10001E76
                              • lstrcpyA.KERNEL32(?,?), ref: 10001FCA
                              Memory Dump Source
                              • Source File: 00000001.00000002.2625121502.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000001.00000002.2625062639.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2625142717.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2625196327.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_10000000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Global$Free$lstrcpy$Alloc
                              • String ID:
                              • API String ID: 4227406936-0
                              • Opcode ID: 108015169a1f9511be137f3b76d088d284be53ebd3be1ec406ce9b744c5ee79e
                              • Instruction ID: 780798ea066e4ece118e8e5fed0bf18c828ec290136deaf2e43fc5d0554b8685
                              • Opcode Fuzzy Hash: 108015169a1f9511be137f3b76d088d284be53ebd3be1ec406ce9b744c5ee79e
                              • Instruction Fuzzy Hash: 17129971D0424ADFFB20CFA4C8847EEBBF4FB043C4F61852AD5A1A2199DB749A81CB51

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 740 40173f-401762 call 4029fd call 4056ba 745 401764-40176a call 405bbd 740->745 746 40176c-40177e call 405bbd call 40564d lstrcatA 740->746 752 401783-401789 call 405e28 745->752 746->752 756 40178e-401792 752->756 757 401794-40179e call 405ec1 756->757 758 4017c5-4017c8 756->758 766 4017b0-4017c2 757->766 767 4017a0-4017ae CompareFileTime 757->767 760 4017d0-4017ec call 40584e 758->760 761 4017ca-4017cb call 405829 758->761 768 401864-40188d call 404ea6 call 402e62 760->768 769 4017ee-4017f1 760->769 761->760 766->758 767->766 783 401895-4018a1 SetFileTime 768->783 784 40188f-401893 768->784 770 4017f3-401835 call 405bbd * 2 call 405bdf call 405bbd call 4053d1 769->770 771 401846-401850 call 404ea6 769->771 770->756 804 40183b-40183c 770->804 781 401859-40185f 771->781 785 40289b 781->785 787 4018a7-4018b2 CloseHandle 783->787 784->783 784->787 791 40289d-4028a1 785->791 789 402892-402895 787->789 790 4018b8-4018bb 787->790 789->785 793 4018d0-4018d3 call 405bdf 790->793 794 4018bd-4018ce call 405bdf lstrcatA 790->794 799 4018d8-40222b call 4053d1 793->799 794->799 799->791 804->781 806 40183e-40183f 804->806 806->771
                              APIs
                              • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\Studerekammermenneskes,00000000,00000000,00000031), ref: 0040177E
                              • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Studerekammermenneskes,00000000,00000000,00000031), ref: 004017A8
                                • Part of subcall function 00405BBD: lstrcpynA.KERNEL32(?,?,00000400,00403126,Slibrighederne Setup,NSIS Error), ref: 00405BCA
                                • Part of subcall function 00404EA6: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll,00000000,0040E888,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000,?), ref: 00404EDF
                                • Part of subcall function 00404EA6: lstrlenA.KERNEL32(00402F92,Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll,00000000,0040E888,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000), ref: 00404EEF
                                • Part of subcall function 00404EA6: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll,00402F92,00402F92,Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll,00000000,0040E888,00000000), ref: 00404F02
                                • Part of subcall function 00404EA6: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll), ref: 00404F14
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F3A
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F54
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F62
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                              • String ID: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp$C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll$C:\Users\user\AppData\Roaming\Studerekammermenneskes$Call
                              • API String ID: 1941528284-3640656783
                              • Opcode ID: 0dbdba9127f361ca1c3b0cd58f3bcc8fe4d3a2439afdc42ac3f5675bdd0654d3
                              • Instruction ID: 209590ddbc3a68456c4598a6b25cf33bb68440e8bdc93e33a46783fb3c58ae9b
                              • Opcode Fuzzy Hash: 0dbdba9127f361ca1c3b0cd58f3bcc8fe4d3a2439afdc42ac3f5675bdd0654d3
                              • Instruction Fuzzy Hash: 6F41C472900514BADF10BBA9DC46EAF3679EF01368F20823BF512F10E1D77C5A418AAD

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 807 404ea6-404ebb 808 404f71-404f75 807->808 809 404ec1-404ed3 807->809 810 404ed5-404ed9 call 405bdf 809->810 811 404ede-404eea lstrlenA 809->811 810->811 813 404f07-404f0b 811->813 814 404eec-404efc lstrlenA 811->814 815 404f1a-404f1e 813->815 816 404f0d-404f14 SetWindowTextA 813->816 814->808 817 404efe-404f02 lstrcatA 814->817 818 404f20-404f62 SendMessageA * 3 815->818 819 404f64-404f66 815->819 816->815 817->813 818->819 819->808 820 404f68-404f6b 819->820 820->808
                              APIs
                              • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll,00000000,0040E888,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000,?), ref: 00404EDF
                              • lstrlenA.KERNEL32(00402F92,Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll,00000000,0040E888,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000), ref: 00404EEF
                              • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll,00402F92,00402F92,Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll,00000000,0040E888,00000000), ref: 00404F02
                              • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll), ref: 00404F14
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F3A
                              • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F54
                              • SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F62
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                              • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll
                              • API String ID: 2531174081-434592671
                              • Opcode ID: 42d41b05157e019d59a8c95eb738bd9c3ef6bfcc5de6f75fe76b0678c24a36e0
                              • Instruction ID: c9e29023339c79119f92ef6614343089cfde3ac0fe0689c8293f17bbb72fca3e
                              • Opcode Fuzzy Hash: 42d41b05157e019d59a8c95eb738bd9c3ef6bfcc5de6f75fe76b0678c24a36e0
                              • Instruction Fuzzy Hash: D0219DB2900118BEDF119FA5CD849DEBFB9EF44354F14807AF944B6291C3789E418BA8

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 821 402e62-402e76 822 402e78 821->822 823 402e7f-402e87 821->823 822->823 824 402e89 823->824 825 402e8e-402e93 823->825 824->825 826 402ea3-402eb0 call 403055 825->826 827 402e95-402e9e call 40306b 825->827 831 403000 826->831 832 402eb6-402eba 826->832 827->826 835 403002-403003 831->835 833 402ec0-402ee0 GetTickCount call 405fc8 832->833 834 402fe9-402feb 832->834 845 40304b 833->845 847 402ee6-402eee 833->847 838 403040-403044 834->838 839 402fed-402ff0 834->839 837 40304e-403052 835->837 843 403005-40300b 838->843 844 403046 838->844 840 402ff2 839->840 841 402ff5-402ffe call 403055 839->841 840->841 841->831 854 403048 841->854 848 403010-40301e call 403055 843->848 849 40300d 843->849 844->845 845->837 851 402ef0 847->851 852 402ef3-402f01 call 403055 847->852 848->831 858 403020-403033 WriteFile 848->858 849->848 851->852 852->831 859 402f07-402f10 852->859 854->845 860 402fe5-402fe7 858->860 861 403035-403038 858->861 862 402f16-402f33 call 405fe8 859->862 860->835 861->860 863 40303a-40303d 861->863 866 402fe1-402fe3 862->866 867 402f39-402f50 GetTickCount 862->867 863->838 866->835 868 402f52-402f5a 867->868 869 402f95-402f99 867->869 872 402f62-402f8d MulDiv wsprintfA call 404ea6 868->872 873 402f5c-402f60 868->873 870 402fd6-402fd9 869->870 871 402f9b-402f9e 869->871 870->847 877 402fdf 870->877 875 402fa0-402fb2 WriteFile 871->875 876 402fbe-402fc4 871->876 878 402f92 872->878 873->869 873->872 875->860 879 402fb4-402fb7 875->879 880 402fca-402fce 876->880 877->845 878->869 879->860 881 402fb9-402fbc 879->881 880->862 882 402fd4 880->882 881->880 882->845
                              APIs
                              • GetTickCount.KERNEL32 ref: 00402EC0
                              • GetTickCount.KERNEL32 ref: 00402F41
                              • MulDiv.KERNEL32(7FFFFFFF,?,00000020), ref: 00402F6E
                              • wsprintfA.USER32 ref: 00402F7E
                              • WriteFile.KERNELBASE(00000000,00000000,0040E888,00000000,00000000), ref: 00402FAA
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CountTick$FileWritewsprintf
                              • String ID: ... %d%%
                              • API String ID: 4209647438-2449383134
                              • Opcode ID: 5337c28631a73469e3a27c15a5204e9a3d97955436146181da19fe4c8ecc5b92
                              • Instruction ID: 884de2ce8814a110384bf9455658e7085e50030da519773910f3f0b9c7b3960d
                              • Opcode Fuzzy Hash: 5337c28631a73469e3a27c15a5204e9a3d97955436146181da19fe4c8ecc5b92
                              • Instruction Fuzzy Hash: 49519D7190120AABCF10DF65DA08A9F3BB8AB04395F14413BF800B72C0C7789E50DBAA

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 883 401f68-401f74 884 401f7a-401f90 call 4029fd * 2 883->884 885 40202f-402031 883->885 894 401f92-401f9d GetModuleHandleA 884->894 895 401f9f-401fad LoadLibraryExA 884->895 886 40217c-402181 call 401423 885->886 893 402892-4028a1 886->893 894->895 897 401faf-401fbc GetProcAddress 894->897 895->897 898 402028-40202a 895->898 900 401ffb-402000 call 404ea6 897->900 901 401fbe-401fc4 897->901 898->886 906 402005-402008 900->906 902 401fc6-401fd2 call 401423 901->902 903 401fdd-401ff4 call 100016bd 901->903 902->906 913 401fd4-401fdb 902->913 908 401ff6-401ff9 903->908 906->893 909 40200e-402016 call 4035ae 906->909 908->906 909->893 914 40201c-402023 FreeLibrary 909->914 913->906 914->893
                              APIs
                              • GetModuleHandleA.KERNELBASE(00000000,?,?), ref: 00401F93
                                • Part of subcall function 00404EA6: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll,00000000,0040E888,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000,?), ref: 00404EDF
                                • Part of subcall function 00404EA6: lstrlenA.KERNEL32(00402F92,Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll,00000000,0040E888,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000), ref: 00404EEF
                                • Part of subcall function 00404EA6: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll,00402F92,00402F92,Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll,00000000,0040E888,00000000), ref: 00404F02
                                • Part of subcall function 00404EA6: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll), ref: 00404F14
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F3A
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F54
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F62
                              • LoadLibraryExA.KERNELBASE(00000000,?,?,?,?), ref: 00401FA3
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00401FB3
                              • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,?,?,?), ref: 0040201D
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                              • String ID: `7B
                              • API String ID: 2987980305-3208876730
                              • Opcode ID: 3c243abdb5c36fad5ee734dbe8eec7e4aa61dc5a7878ef73d437412801a4ab9d
                              • Instruction ID: aaf5afebff6e040c8f3edcccfb20df8df5b0ecb9331c565b7beb057a01dbb2d2
                              • Opcode Fuzzy Hash: 3c243abdb5c36fad5ee734dbe8eec7e4aa61dc5a7878ef73d437412801a4ab9d
                              • Instruction Fuzzy Hash: 9121F672904211B6CF107FA48E8DA6E39B0AB44318F20823BF600B62D0D7BC4941DA5E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 916 4015b3-4015c6 call 4029fd call 4056e6 921 4015c8-4015e3 call 405678 CreateDirectoryA 916->921 922 40160a-40160d 916->922 929 401600-401608 921->929 930 4015e5-4015f0 GetLastError 921->930 924 401638-402181 call 401423 922->924 925 40160f-40162a call 401423 call 405bbd SetCurrentDirectoryA 922->925 938 402892-4028a1 924->938 925->938 939 401630-401633 925->939 929->921 929->922 933 4015f2-4015fb GetFileAttributesA 930->933 934 4015fd 930->934 933->929 933->934 934->929 939->938
                              APIs
                                • Part of subcall function 004056E6: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp,?,00405752,C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp,C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp,?,?,76233410,0040549D,?,C:\Users\user\AppData\Local\Temp\,76233410,00000000), ref: 004056F4
                                • Part of subcall function 004056E6: CharNextA.USER32(00000000), ref: 004056F9
                                • Part of subcall function 004056E6: CharNextA.USER32(00000000), ref: 0040570D
                              • CreateDirectoryA.KERNELBASE(00000000,?,00000000,?,00000000,?), ref: 004015DB
                              • GetLastError.KERNEL32(?,00000000,?,00000000,?), ref: 004015E5
                              • GetFileAttributesA.KERNELBASE(00000000,?,00000000,?,00000000,?), ref: 004015F3
                              • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Roaming\Studerekammermenneskes,00000000,00000000,?), ref: 00401622
                              Strings
                              • C:\Users\user\AppData\Roaming\Studerekammermenneskes, xrefs: 00401617
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                              • String ID: C:\Users\user\AppData\Roaming\Studerekammermenneskes
                              • API String ID: 3751793516-3794039729
                              • Opcode ID: f854ab14f6af6053e08f1c4cbb34db86543d3dd89544386ccf80d9808bfa3a12
                              • Instruction ID: d075d57f09c15f05164e6e7227da82a4385631acf0310a11cf010d3362af65ee
                              • Opcode Fuzzy Hash: f854ab14f6af6053e08f1c4cbb34db86543d3dd89544386ccf80d9808bfa3a12
                              • Instruction Fuzzy Hash: 5F112531908150AFDB112F755D44E6F37B0EA62366768473BF891B22E2D23C0D42D62E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 942 40587d-405887 943 405888-4058b3 GetTickCount GetTempFileNameA 942->943 944 4058c2-4058c4 943->944 945 4058b5-4058b7 943->945 947 4058bc-4058bf 944->947 945->943 946 4058b9 945->946 946->947
                              APIs
                              • GetTickCount.KERNEL32 ref: 00405891
                              • GetTempFileNameA.KERNELBASE(?,?,00000000,?), ref: 004058AB
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CountFileNameTempTick
                              • String ID: "C:\Users\user\Desktop\xLDz0WPZYc.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                              • API String ID: 1716503409-2503430093
                              • Opcode ID: 53651faf07563a77c89e4d9d04216bb1832e7739a800dcda734853e57c4c3aa5
                              • Instruction ID: 97602d992a1fc3ea541738fe691a17a98ed12bbd3b61733a4c4fd0f0c3479bd5
                              • Opcode Fuzzy Hash: 53651faf07563a77c89e4d9d04216bb1832e7739a800dcda734853e57c4c3aa5
                              • Instruction Fuzzy Hash: B0F05E367482086AEB109A55DC44B9B7B98DB91750F14C02AFD44AA190D6B099548B99

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 948 100016bd-100016f9 call 10001a5d 952 1000180a-1000180c 948->952 953 100016ff-10001703 948->953 954 10001705-1000170b call 100021b0 953->954 955 1000170c-10001719 call 100021fa 953->955 954->955 960 10001749-10001750 955->960 961 1000171b-10001720 955->961 962 10001770-10001774 960->962 963 10001752-1000176e call 100023da call 10001559 call 10001266 GlobalFree 960->963 964 10001722-10001723 961->964 965 1000173b-1000173e 961->965 969 100017b2-100017b8 call 100023da 962->969 970 10001776-100017b0 call 10001559 call 100023da 962->970 986 100017b9-100017bd 963->986 967 10001725-10001726 964->967 968 1000172b-1000172c call 100027ec 964->968 965->960 971 10001740-10001741 call 10002aa7 965->971 975 10001733-10001739 call 1000258d 967->975 976 10001728-10001729 967->976 982 10001731 968->982 969->986 970->986 979 10001746 971->979 985 10001748 975->985 976->960 976->968 979->985 982->979 985->960 991 100017fa-10001801 986->991 992 100017bf-100017cd call 100023a0 986->992 991->952 994 10001803-10001804 GlobalFree 991->994 998 100017e5-100017ec 992->998 999 100017cf-100017d2 992->999 994->952 998->991 1001 100017ee-100017f9 call 100014e2 998->1001 999->998 1000 100017d4-100017dc 999->1000 1000->998 1002 100017de-100017df FreeLibrary 1000->1002 1001->991 1002->998
                              APIs
                                • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC4
                                • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC9
                                • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CCE
                              • GlobalFree.KERNEL32(00000000), ref: 10001768
                              • FreeLibrary.KERNEL32(?), ref: 100017DF
                              • GlobalFree.KERNEL32(00000000), ref: 10001804
                                • Part of subcall function 100021B0: GlobalAlloc.KERNEL32(?,7D8BEC45), ref: 100021E2
                                • Part of subcall function 1000258D: GlobalAlloc.KERNEL32(?,?,?,?,00000000,?,?,?,?,10001739,00000000), ref: 100025FF
                                • Part of subcall function 10001559: lstrcpyA.KERNEL32(00000000,?,00000000,10001695,00000000), ref: 10001572
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2625121502.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000001.00000002.2625062639.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2625142717.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2625196327.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_10000000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc$Librarylstrcpy
                              • String ID:
                              • API String ID: 1791698881-3916222277
                              • Opcode ID: cd3a49c7226bd267e48e570e062e78a21ab1dc0dccc3f926e80528383bd8a00b
                              • Instruction ID: 946e86dc2be410c0748ecba0c1d48508df540d87c222276c6f0f58241c559a10
                              • Opcode Fuzzy Hash: cd3a49c7226bd267e48e570e062e78a21ab1dc0dccc3f926e80528383bd8a00b
                              • Instruction Fuzzy Hash: C5318B79408205DAFB41DF649CC5BCA37ECFB042D5F018465FA0A9A09ADF78A8458A60
                              APIs
                              • lstrlenA.KERNEL32(00000000,00000011), ref: 004024EF
                              • WriteFile.KERNELBASE(00000000,?,C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll,00000000,?,?,00000000,00000011), ref: 0040250E
                              Strings
                              • C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll, xrefs: 004024DD, 00402502
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: FileWritelstrlen
                              • String ID: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll
                              • API String ID: 427699356-1000602805
                              • Opcode ID: 73dde7284d951aafa493d15edd55bc1c51bad9a2407fd8823c25f1a3ec9d0b34
                              • Instruction ID: 4e81b00b1a0a83b1a618d6832a3b29c213d1c25728c37480281a976930c2fc19
                              • Opcode Fuzzy Hash: 73dde7284d951aafa493d15edd55bc1c51bad9a2407fd8823c25f1a3ec9d0b34
                              • Instruction Fuzzy Hash: DEF089B2A14144BFDB40EBA49E49EAB7764DB40308F10443BB141F61C2D6FC5941DB7D
                              APIs
                                • Part of subcall function 00405E28: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\xLDz0WPZYc.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,0040308E,C:\Users\user\AppData\Local\Temp\,76233410,00403268), ref: 00405E80
                                • Part of subcall function 00405E28: CharNextA.USER32(?,?,?,00000000), ref: 00405E8D
                                • Part of subcall function 00405E28: CharNextA.USER32(?,"C:\Users\user\Desktop\xLDz0WPZYc.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,0040308E,C:\Users\user\AppData\Local\Temp\,76233410,00403268), ref: 00405E92
                                • Part of subcall function 00405E28: CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,0040308E,C:\Users\user\AppData\Local\Temp\,76233410,00403268), ref: 00405EA2
                              • CreateDirectoryA.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76233410,00403268), ref: 004030A3
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Char$Next$CreateDirectoryPrev
                              • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                              • API String ID: 4115351271-3512041753
                              • Opcode ID: 389a80ee12a651c87ccad1e400f0b61aee7e0e7ab3a8d76480836320ff4f5ec7
                              • Instruction ID: fee6ec1a5ad4de73206782a352265a6ade63d615f6b53232b42a3ca9793d762f
                              • Opcode Fuzzy Hash: 389a80ee12a651c87ccad1e400f0b61aee7e0e7ab3a8d76480836320ff4f5ec7
                              • Instruction Fuzzy Hash: 2CD09222A4BE3062D55137663C0AFCF054C8F5631AB518077F908740C69A6D9A9249EE
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2395b39049a362c34a27dfb880213796ab4f3997f605305afcf4b88fff478a5b
                              • Instruction ID: 17d8f0c9adc7b2b71efc7957c866aa3859f64222e8b37881b9213324db3bf9cd
                              • Opcode Fuzzy Hash: 2395b39049a362c34a27dfb880213796ab4f3997f605305afcf4b88fff478a5b
                              • Instruction Fuzzy Hash: E0A15171E00228CBDF28CFA8C8447ADBBB1FB44305F15806ED856BB281D7789A96DF44
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e99653bfb7f144ce5dad25bea39bf75b689d07406e35084d2878a8dabe37ac6e
                              • Instruction ID: fc305786e35d93851c8f3c5d9b38f8a429e7909e60618e2c0103eac0a9dc1c25
                              • Opcode Fuzzy Hash: e99653bfb7f144ce5dad25bea39bf75b689d07406e35084d2878a8dabe37ac6e
                              • Instruction Fuzzy Hash: C1913071E00228CBDF28CF98C8547ADBBB1FB44305F15816AD856BB281D7789A96DF44
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fe53a61097b749f1782159a8fc3ae1334c5d5d5e9ac5eec79330ddb7b6ec713b
                              • Instruction ID: 045822fc5ab24079ba69da477224c4b1a41a130b0053ffb1807465ee2ef03bcb
                              • Opcode Fuzzy Hash: fe53a61097b749f1782159a8fc3ae1334c5d5d5e9ac5eec79330ddb7b6ec713b
                              • Instruction Fuzzy Hash: AB814771E00228CFDF24CFA8C8447ADBBB1FB45305F25816AD856BB281D7789A96DF44
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f03dec724b3596635aeae071b0dd6c0542c79984eb544c4ce6f813bf1c132c47
                              • Instruction ID: efdf2bc729d78145ecf5a565514c9258b5bbce2e4cf5113e346d1a35f2b936d2
                              • Opcode Fuzzy Hash: f03dec724b3596635aeae071b0dd6c0542c79984eb544c4ce6f813bf1c132c47
                              • Instruction Fuzzy Hash: AB817771E00228CBDF24DFA8C8447AEBBB0FB45305F15816AD856BB281D7785A96DF44
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b228df2ed3587aaf6c6f9f97010ba9ba02a5f9c90de50599b2abf323e58cb698
                              • Instruction ID: c983b8745f75bf2274a463a9cfcccf5039b1f1987fed19ece7001b5e7d797120
                              • Opcode Fuzzy Hash: b228df2ed3587aaf6c6f9f97010ba9ba02a5f9c90de50599b2abf323e58cb698
                              • Instruction Fuzzy Hash: 3F712371E00228CFDF28CF98C8447ADBBB1FB44305F15806AD856BB281D7789A96DF54
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f482201699af14bb3cd10cc7f775e8512ddaef9db8a966204fce1aae5b262981
                              • Instruction ID: 3e902398f65232741f3d3f2c7f6467c21586f7f50b1ebc0ee674bbd924b4c7fc
                              • Opcode Fuzzy Hash: f482201699af14bb3cd10cc7f775e8512ddaef9db8a966204fce1aae5b262981
                              • Instruction Fuzzy Hash: FA714671E00228CFDF28CF98C8447ADBBB1FB44305F15806AD856BB281D7789A96DF44
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9a381668fc57e9f6ced01437e848a6b2accfb19374870d44d6b2c2291bed7b2e
                              • Instruction ID: 9020e7499a55ede5867a2e11e25a0f248b5ba7faeda0d39cd9abe089b181c94d
                              • Opcode Fuzzy Hash: 9a381668fc57e9f6ced01437e848a6b2accfb19374870d44d6b2c2291bed7b2e
                              • Instruction Fuzzy Hash: C5715671E00229CFEF28CF98C8447ADBBB1FB44305F15806AD856BB281D7789A96DF44
                              APIs
                              • GlobalFree.KERNEL32(00000000), ref: 00401B80
                              • GlobalAlloc.KERNELBASE(?,00000404), ref: 00401B92
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Global$AllocFree
                              • String ID: Call
                              • API String ID: 3394109436-1824292864
                              • Opcode ID: f45d29768a84f2d4e28c8b7b5f276122d77e79353dd615b91f1c8b2f99fc56cc
                              • Instruction ID: c19e8536c9ce0dfe35df53e9a23eb4e19a87b6fb9319daf77eae0ba7aa7f10da
                              • Opcode Fuzzy Hash: f45d29768a84f2d4e28c8b7b5f276122d77e79353dd615b91f1c8b2f99fc56cc
                              • Instruction Fuzzy Hash: E82181B2A04210ABD710ABA48A85A5E72B9DB44314724857BF502F32D1E7BCB9118B5E
                              APIs
                                • Part of subcall function 00404EA6: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll,00000000,0040E888,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000,?), ref: 00404EDF
                                • Part of subcall function 00404EA6: lstrlenA.KERNEL32(00402F92,Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll,00000000,0040E888,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000), ref: 00404EEF
                                • Part of subcall function 00404EA6: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll,00402F92,00402F92,Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll,00000000,0040E888,00000000), ref: 00404F02
                                • Part of subcall function 00404EA6: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp\System.dll), ref: 00404F14
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F3A
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F54
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F62
                                • Part of subcall function 0040536C: CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004214E0,Error launching installer), ref: 00405395
                                • Part of subcall function 0040536C: CloseHandle.KERNEL32(?), ref: 004053A2
                              • WaitForSingleObject.KERNEL32(?,?,00000000,000000EB,00000000), ref: 00401E6C
                              • GetExitCodeProcess.KERNEL32(?,?), ref: 00401E7C
                              • CloseHandle.KERNELBASE(?,00000000,000000EB,00000000), ref: 00401EA1
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcat
                              • String ID:
                              • API String ID: 3521207402-0
                              • Opcode ID: c91ed9de4a6757527867ef949f32f8f167b50b71a157a29d78972e3069497e2b
                              • Instruction ID: 002f7fb6c641edc4c9e1c43034261a5554d3377b2f1f1ae98a311fa9132adf51
                              • Opcode Fuzzy Hash: c91ed9de4a6757527867ef949f32f8f167b50b71a157a29d78972e3069497e2b
                              • Instruction Fuzzy Hash: 21016D71904114FBCF20AFA1DD859AE7B71EB40344F14847BFA01B51E0C37C5A81DBAA
                              APIs
                              • RegOpenKeyExA.KERNELBASE(80000002,00405CE9,00000000,00000002,?,00000002,?,?,00405CE9,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405ACD
                              • RegQueryValueExA.KERNELBASE(?,?,00000000,00405CE9,?,00405CE9), ref: 00405AEE
                              • RegCloseKey.ADVAPI32(?), ref: 00405B0F
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID:
                              • API String ID: 3677997916-0
                              • Opcode ID: a7dc294ab98d1aedf48ab84cf89b8b0d9a3be53888eb2216a8b2e534b80ab0d4
                              • Instruction ID: bd87ec550333214892aadd2865629ce231d6a2c68cbcf8666acf0199ad1a476e
                              • Opcode Fuzzy Hash: a7dc294ab98d1aedf48ab84cf89b8b0d9a3be53888eb2216a8b2e534b80ab0d4
                              • Instruction Fuzzy Hash: 6A01487114020AEFDB22CF64ED44AEB3FACEF14354F004026F905A6260D235E964CBA5
                              APIs
                                • Part of subcall function 00405829: GetFileAttributesA.KERNELBASE(?,?,00405441,?,?,00000000,00405624,?,?,?,?), ref: 0040582E
                                • Part of subcall function 00405829: SetFileAttributesA.KERNELBASE(?,00000000), ref: 00405842
                              • RemoveDirectoryA.KERNEL32(?,?,?,00000000,00405624), ref: 00405450
                              • DeleteFileA.KERNELBASE(?,?,?,00000000,00405624), ref: 00405458
                              • SetFileAttributesA.KERNEL32(?,00000000), ref: 00405470
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: File$Attributes$DeleteDirectoryRemove
                              • String ID:
                              • API String ID: 1655745494-0
                              • Opcode ID: 8fd00ee6eb4cd0b56e1a0eaf7a51cd4f8a8540850b850c2f3b8b5694c02e0256
                              • Instruction ID: 26783d4835885a93a59b83a2bd4b1d6eec4eb66ae6ada20176159b7b217e38af
                              • Opcode Fuzzy Hash: 8fd00ee6eb4cd0b56e1a0eaf7a51cd4f8a8540850b850c2f3b8b5694c02e0256
                              • Instruction Fuzzy Hash: 32E0E532908A9056C2106734AD08BDB2AD9EF86316F05893AF891B11C0C73848868ABB
                              APIs
                              • ShellExecuteA.SHELL32(?,00000000,00000000,00000000,C:\Users\user\AppData\Roaming\Studerekammermenneskes,?), ref: 00401E1E
                              Strings
                              • C:\Users\user\AppData\Roaming\Studerekammermenneskes, xrefs: 00401E09
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: ExecuteShell
                              • String ID: C:\Users\user\AppData\Roaming\Studerekammermenneskes
                              • API String ID: 587946157-3794039729
                              • Opcode ID: 70ca6f181be23fb06d3f60a7a9d57aec4edbef75b7d1a65808c4265d3677d314
                              • Instruction ID: 1a827242e624075fd0b822132d7078b468ceca4fa9ad7d7ba61b9346c8edfaa6
                              • Opcode Fuzzy Hash: 70ca6f181be23fb06d3f60a7a9d57aec4edbef75b7d1a65808c4265d3677d314
                              • Instruction Fuzzy Hash: B4F0F6B3B041047ADB41ABB59E4AE5D2BA4EB41718F240A3BF400F71C2DAFC8841F728
                              APIs
                              • SetFilePointer.KERNELBASE(00000000), ref: 100028AB
                              • GetLastError.KERNEL32 ref: 100029B2
                              Memory Dump Source
                              • Source File: 00000001.00000002.2625121502.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000001.00000002.2625062639.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2625142717.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2625196327.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_10000000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: ErrorFileLastPointer
                              • String ID:
                              • API String ID: 2976181284-0
                              • Opcode ID: 10da2a693ced731503c2d5b3de2f7fe8e431c949d2a6016fe146597bbe82a282
                              • Instruction ID: 2b4501ff186f60f2b29b8b71d76009b37135a14f8b8ad132536a4a21bb517402
                              • Opcode Fuzzy Hash: 10da2a693ced731503c2d5b3de2f7fe8e431c949d2a6016fe146597bbe82a282
                              • Instruction Fuzzy Hash: 9E51A4BA908214DFFB14DF60DCC5B5937A8EB443D4F218429EA08E725DDF38A981CB94
                              APIs
                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                              • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: b1266aa11e643af42e09abacd7039328ff80c1a9d1715c4620ec2c771a0149d8
                              • Instruction ID: debc39b6c0c0c652093bc86d0143b21aa6e0fee53ad258223395c8adf4e96fc0
                              • Opcode Fuzzy Hash: b1266aa11e643af42e09abacd7039328ff80c1a9d1715c4620ec2c771a0149d8
                              • Instruction Fuzzy Hash: 69012831724210ABE7294B789D04B6A3698FB10315F11853BF851F72F1D6B8DC029B5D
                              APIs
                              • ShowWindow.USER32(00000000,00000000,?), ref: 00401DC2
                              • EnableWindow.USER32(00000000,00000000), ref: 00401DCD
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Window$EnableShow
                              • String ID:
                              • API String ID: 1136574915-0
                              • Opcode ID: d72798fdfe0d8bcbd0a18b635dccf75de9a373b64156bf13e72c37387aef51bb
                              • Instruction ID: 2292e0465f89c440c037b44611e353697929a97950b3395032e547bd7800e083
                              • Opcode Fuzzy Hash: d72798fdfe0d8bcbd0a18b635dccf75de9a373b64156bf13e72c37387aef51bb
                              • Instruction Fuzzy Hash: 22E0CD72B04110EBDB10BBB45E4A55E3374DF10359B104437F501F11C1D2B85C40865D
                              APIs
                              • GetFileAttributesA.KERNELBASE(?,?,00405441,?,?,00000000,00405624,?,?,?,?), ref: 0040582E
                              • SetFileAttributesA.KERNELBASE(?,00000000), ref: 00405842
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: AttributesFile
                              • String ID:
                              • API String ID: 3188754299-0
                              • Opcode ID: 9001e84463e5b3d4dd00ca1d2e00f3bb66c1d6c16300b22364f3152d7eb201de
                              • Instruction ID: 288d8d8f9d8fe744cb80d7443cee80a3ea5bd4e337ee5555e0f2e4cd48392136
                              • Opcode Fuzzy Hash: 9001e84463e5b3d4dd00ca1d2e00f3bb66c1d6c16300b22364f3152d7eb201de
                              • Instruction Fuzzy Hash: 2AD0C972908120ABC2102728AD0889BBB55EB542717018B31FC65A22B0C7304C62CAA5
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: wsprintf
                              • String ID:
                              • API String ID: 2111968516-0
                              • Opcode ID: 52d227b069a4f50f4663a99c055d473dfe313c221a454c9b799207d0049fc586
                              • Instruction ID: 38726b43949b5a2518c2c56a8bcba1ba1be011e092181c2ab2ffeedb07cfb521
                              • Opcode Fuzzy Hash: 52d227b069a4f50f4663a99c055d473dfe313c221a454c9b799207d0049fc586
                              • Instruction Fuzzy Hash: EA212B70D05295BECF229F684E681EEBFB09B05304F64407BE490B63C5E1BC9A81CB2D
                              APIs
                              • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 00402274
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: PrivateProfileStringWrite
                              • String ID:
                              • API String ID: 390214022-0
                              • Opcode ID: 9ff6483e56f83e050050973c75d29e7e6846100e3a8c6593062fb544488b0e4d
                              • Instruction ID: 05d4d75dbd01593bae97f630dbecede8c42f44da552b6d0f9ca4defc7305ba5b
                              • Opcode Fuzzy Hash: 9ff6483e56f83e050050973c75d29e7e6846100e3a8c6593062fb544488b0e4d
                              • Instruction Fuzzy Hash: 2FE04F72B001696ADB903AF18F8DD7F21597B84304F15067EF611B62C2D9BC0D81A2B9
                              APIs
                              • SetFilePointer.KERNELBASE(00000000,?,00000000,00000002,?,?), ref: 004025ED
                                • Part of subcall function 00405B1B: wsprintfA.USER32 ref: 00405B28
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: FilePointerwsprintf
                              • String ID:
                              • API String ID: 327478801-0
                              • Opcode ID: 264239d96475cbcc5d4300545bda0f6e18d175a5ecefe532acf18532d7180738
                              • Instruction ID: bd4189dad9187afc7bd613b68c6e414ef86462d36aacf7d26f302923069a669c
                              • Opcode Fuzzy Hash: 264239d96475cbcc5d4300545bda0f6e18d175a5ecefe532acf18532d7180738
                              • Instruction Fuzzy Hash: 32E04FB6A01120BBDB01BBA55E4ADBF7778EB60309B14853BF501F00C1C3BC59019A2E
                              APIs
                              • ReadFile.KERNELBASE(00000000,00000000,?,?,00000000,000000FF,?,00403068,00000000,00000000,00402EAE,000000FF,?,00000000,00000000,00000000), ref: 004058DA
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: d04482319dc3028e4ce08f739f1cf32aeeec85f3b87b0f01a1fec36d148a5575
                              • Instruction ID: 18ab15d3875c8aca8147d786b71a19f163cd1be083ac94134eb356fb97c53e98
                              • Opcode Fuzzy Hash: d04482319dc3028e4ce08f739f1cf32aeeec85f3b87b0f01a1fec36d148a5575
                              • Instruction Fuzzy Hash: 9FE0EC3361425AEFDF10AE659C04AEB7B6CEF05360F008433FD15E2150D231E921EBA9
                              APIs
                              • VirtualProtect.KERNELBASE(1000404C,?,?,1000403C), ref: 1000272D
                              Memory Dump Source
                              • Source File: 00000001.00000002.2625121502.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000001.00000002.2625062639.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2625142717.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2625196327.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_10000000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                              • Instruction ID: 4dab7c069dd6fc30f8915db09394f7f991a1b088a201bba37056324bf7fcc065
                              • Opcode Fuzzy Hash: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                              • Instruction Fuzzy Hash: 98F09BF19092A0DEF360DF688CC47063FE4E3993D5B03852AE358F6269EB7441448B19
                              APIs
                              • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 004022B2
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: PrivateProfileString
                              • String ID:
                              • API String ID: 1096422788-0
                              • Opcode ID: f8d132d461a5c4ed5c76335474cd8e98aaa4b1821b9353edac55918b86fd9ae5
                              • Instruction ID: 1024819f7f1d2ea578916dba6ac29c28ac22902c13986e1de9ff5d702d2d6265
                              • Opcode Fuzzy Hash: f8d132d461a5c4ed5c76335474cd8e98aaa4b1821b9353edac55918b86fd9ae5
                              • Instruction Fuzzy Hash: B9E08671A44209BADB406FA08E09EBD3668BF01710F10013AF9507B0D1EBB88442F72D
                              APIs
                              • SetFileAttributesA.KERNELBASE(00000000,?,?), ref: 004015A0
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: AttributesFile
                              • String ID:
                              • API String ID: 3188754299-0
                              • Opcode ID: c1a4a3283c9bf9659f66a17b5c1bdba59a903c5432fcec64ba6c0d2a491762e4
                              • Instruction ID: 9169326a2aec8439feca5866952fa18bd92df46eb8b4a67c681bb8a0ef40d438
                              • Opcode Fuzzy Hash: c1a4a3283c9bf9659f66a17b5c1bdba59a903c5432fcec64ba6c0d2a491762e4
                              • Instruction Fuzzy Hash: CDD01277B08114E7DB00EBB9AE48A9E73A4FB50325F208637D111F11D0D3B98551EA29
                              APIs
                              • SendMessageA.USER32(00010422,00000000,00000000,00000000), ref: 00403ED1
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: 0196788a60c407a34fa8085170a73220ab74af89f50f0ba942ff060579b96adb
                              • Instruction ID: b3c8485646d9c058ec71e9ab696a48b88cadb806b99eba66945500c977f65eb2
                              • Opcode Fuzzy Hash: 0196788a60c407a34fa8085170a73220ab74af89f50f0ba942ff060579b96adb
                              • Instruction Fuzzy Hash: 1EC04C717442007AEA218F509D49F1777586750701F5544257254A51D0C6B4E410D66D
                              APIs
                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402DF0,?), ref: 00403079
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: FilePointer
                              • String ID:
                              • API String ID: 973152223-0
                              • Opcode ID: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                              • Instruction ID: 49fdcfdf8b1973cd13611e97ba0bfafd8618b6cb304eeeee9131019f9f046fb0
                              • Opcode Fuzzy Hash: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                              • Instruction Fuzzy Hash: 03B01271644200BFDA214F00DF05F057B21A790700F10C030B748380F082712420EB4D
                              APIs
                              • SendMessageA.USER32(?,?,?,00403CD9), ref: 00403EB6
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: b349b1325232fe021fd412571e2c6441d382bb4e6ace6bfca539dacfea62cc2e
                              • Instruction ID: 72d9328d989bd28a4b04e8d0bfc49dcb98a3c5c69b67aa4312834a6063493829
                              • Opcode Fuzzy Hash: b349b1325232fe021fd412571e2c6441d382bb4e6ace6bfca539dacfea62cc2e
                              • Instruction Fuzzy Hash: 54B01235685200BBEE324F00DD0DF497E72F764B02F008034B300240F0C6B300A5DB19
                              APIs
                              • KiUserCallbackDispatcher.NTDLL(?,00403C72), ref: 00403E9F
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CallbackDispatcherUser
                              • String ID:
                              • API String ID: 2492992576-0
                              • Opcode ID: 9d98744450fa71a660f12360689da69116cf16b41945ad655af5f03ec15b630f
                              • Instruction ID: 924e4898ca7b55125a55dbaf25208a334d7a0dcb277bd93e9961852eecaff849
                              • Opcode Fuzzy Hash: 9d98744450fa71a660f12360689da69116cf16b41945ad655af5f03ec15b630f
                              • Instruction Fuzzy Hash: 9BA00176808205ABCB029B60EF09D8ABF62BBA4705B028435E65594174DA325865FF9A
                              APIs
                              • Sleep.KERNELBASE(00000000), ref: 004014E5
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: 2505bb96396968dd077fca102448b2724b96d68f41baa3939dbbddaef1709036
                              • Instruction ID: 8f5234f8cee202cc8b7374a2ab75ea98a04b7977738942e6e00dbb9fbc80be57
                              • Opcode Fuzzy Hash: 2505bb96396968dd077fca102448b2724b96d68f41baa3939dbbddaef1709036
                              • Instruction Fuzzy Hash: AED0C7B7B141006BD750E7B86E8545A73E8F75135A7148833D502E1191D17DC9418519
                              APIs
                              • GlobalAlloc.KERNELBASE(?,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                              Memory Dump Source
                              • Source File: 00000001.00000002.2625121502.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000001.00000002.2625062639.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2625142717.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2625196327.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_10000000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: AllocGlobal
                              • String ID:
                              • API String ID: 3761449716-0
                              • Opcode ID: 6989041179a6ec659f8410a82a3610e1053cc9f4ca9d652552d89decbf4b4a90
                              • Instruction ID: 35b308b173d9b0532f6cde55f5bface33093279d7ce3c78a2cc6db588f634b90
                              • Opcode Fuzzy Hash: 6989041179a6ec659f8410a82a3610e1053cc9f4ca9d652552d89decbf4b4a90
                              • Instruction Fuzzy Hash: 6CA002B1945620DBFE429BE08D9EF1B3B25E748781F01C040E315641BCCA754010DF39
                              APIs
                              • GetDlgItem.USER32(?,000003F9), ref: 0040483B
                              • GetDlgItem.USER32(?,00000408), ref: 00404846
                              • GlobalAlloc.KERNEL32(?,?), ref: 00404890
                              • LoadBitmapA.USER32(0000006E), ref: 004048A3
                              • SetWindowLongA.USER32(?,?,00404E1A), ref: 004048BC
                              • ImageList_Create.COMCTL32(?,?,00000021,00000006,00000000), ref: 004048D0
                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 004048E2
                              • SendMessageA.USER32(?,00001109,00000002), ref: 004048F8
                              • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404904
                              • SendMessageA.USER32(?,0000111B,?,00000000), ref: 00404916
                              • DeleteObject.GDI32(00000000), ref: 00404919
                              • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404944
                              • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404950
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 004049E5
                              • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404A10
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404A24
                              • GetWindowLongA.USER32(?,?), ref: 00404A53
                              • SetWindowLongA.USER32(?,?,00000000), ref: 00404A61
                              • ShowWindow.USER32(?,00000005), ref: 00404A72
                              • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404B6F
                              • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404BD4
                              • SendMessageA.USER32(?,?,00000000,00000000), ref: 00404BE9
                              • SendMessageA.USER32(?,00000420,00000000,?), ref: 00404C0D
                              • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404C2D
                              • ImageList_Destroy.COMCTL32(00000000), ref: 00404C42
                              • GlobalFree.KERNEL32(00000000), ref: 00404C52
                              • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404CCB
                              • SendMessageA.USER32(?,00001102,?,?), ref: 00404D74
                              • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404D83
                              • InvalidateRect.USER32(?,00000000,?), ref: 00404DA3
                              • ShowWindow.USER32(?,00000000), ref: 00404DF1
                              • GetDlgItem.USER32(?,000003FE), ref: 00404DFC
                              • ShowWindow.USER32(00000000), ref: 00404E03
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                              • String ID: $M$N
                              • API String ID: 1638840714-813528018
                              • Opcode ID: 530fea0a5efbac08350800dd6edac4f541af9ecf28185b85d10bd058308ad18e
                              • Instruction ID: e15dc7f2636af8312206252945434afb9f5109210b4da1b7208a5bfe9f4b469d
                              • Opcode Fuzzy Hash: 530fea0a5efbac08350800dd6edac4f541af9ecf28185b85d10bd058308ad18e
                              • Instruction Fuzzy Hash: F30281B0A00209AFDB20DF54DD45AAE7BB5FB84315F10813AF610BA2E1D7789E42DF58
                              APIs
                              • GetDlgItem.USER32(?,000003FB), ref: 00404300
                              • SetWindowTextA.USER32(00000000,?), ref: 0040432A
                              • SHBrowseForFolderA.SHELL32(?,0041F0B0,?), ref: 004043DB
                              • CoTaskMemFree.OLE32(00000000), ref: 004043E6
                              • lstrcmpiA.KERNEL32(Call,Slibrighederne Setup: Installing), ref: 00404418
                              • lstrcatA.KERNEL32(?,Call), ref: 00404424
                              • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404436
                                • Part of subcall function 004053B5: GetDlgItemTextA.USER32(?,?,00000400,0040446D), ref: 004053C8
                                • Part of subcall function 00405E28: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\xLDz0WPZYc.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,0040308E,C:\Users\user\AppData\Local\Temp\,76233410,00403268), ref: 00405E80
                                • Part of subcall function 00405E28: CharNextA.USER32(?,?,?,00000000), ref: 00405E8D
                                • Part of subcall function 00405E28: CharNextA.USER32(?,"C:\Users\user\Desktop\xLDz0WPZYc.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,0040308E,C:\Users\user\AppData\Local\Temp\,76233410,00403268), ref: 00405E92
                                • Part of subcall function 00405E28: CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,0040308E,C:\Users\user\AppData\Local\Temp\,76233410,00403268), ref: 00405EA2
                              • GetDiskFreeSpaceA.KERNEL32(0041ECA8,?,?,0000040F,?,0041ECA8,0041ECA8,?,00000000,0041ECA8,?,?,000003FB,?), ref: 004044F3
                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040450E
                                • Part of subcall function 00404667: lstrlenA.KERNEL32(Slibrighederne Setup: Installing,Slibrighederne Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,00404582,000000DF,00000000,00000400,?), ref: 00404705
                                • Part of subcall function 00404667: wsprintfA.USER32 ref: 0040470D
                                • Part of subcall function 00404667: SetDlgItemTextA.USER32(?,Slibrighederne Setup: Installing), ref: 00404720
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                              • String ID: A$C:\Users\user\AppData\Roaming\Studerekammermenneskes$Call$Slibrighederne Setup: Installing
                              • API String ID: 2624150263-2138775151
                              • Opcode ID: 91bfd2be80532f9d84de11e62587bd6305631a6878a96e32016dec978ead2281
                              • Instruction ID: bbf5d18d822f9ae48c727ed4067559616aa27203017815afcead8a6077e661fe
                              • Opcode Fuzzy Hash: 91bfd2be80532f9d84de11e62587bd6305631a6878a96e32016dec978ead2281
                              • Instruction Fuzzy Hash: 26A172B1900208ABDB11DFA6CD45BAF77B8EF84315F10843BF605B62D1D77C9A418B69
                              APIs
                              • CoCreateInstance.OLE32(00407384,?,?,00407374,?,?,00000045,000000CD,00000002,000000DF,?), ref: 0040208B
                              • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,?,00407374,?,?), ref: 00402143
                              Strings
                              • C:\Users\user\AppData\Roaming\Studerekammermenneskes, xrefs: 004020CB
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: ByteCharCreateInstanceMultiWide
                              • String ID: C:\Users\user\AppData\Roaming\Studerekammermenneskes
                              • API String ID: 123533781-3794039729
                              • Opcode ID: 39794b821fe21fb85c1b2fd3ce7377877cfb5e2fe78928dd9364a207427fc901
                              • Instruction ID: d4c62fdc28843dfc30489809ccaf5da6a3b2e007b03a33f3ec024107d8c1ad9a
                              • Opcode Fuzzy Hash: 39794b821fe21fb85c1b2fd3ce7377877cfb5e2fe78928dd9364a207427fc901
                              • Instruction Fuzzy Hash: 20417D71A00209BFCB00EFA4CE88E9E7BB5BF48314B2042A9F911FB2D0D6799D41DB54
                              APIs
                              • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 00402654
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: FileFindFirst
                              • String ID:
                              • API String ID: 1974802433-0
                              • Opcode ID: e5f9e7987e63e616f1326238460cb69c26cb86f40414b42305070d6d373339f0
                              • Instruction ID: e6850a469ed090b17ef1dde7e6b5e911daaadda975b469663bbec5c58d3b5f53
                              • Opcode Fuzzy Hash: e5f9e7987e63e616f1326238460cb69c26cb86f40414b42305070d6d373339f0
                              • Instruction Fuzzy Hash: B4F0A772604110ABD700E7749A49AEE7778DB51314F6045BBE141E20C1D3B85A41DA2A
                              APIs
                              • CheckDlgButton.USER32(00000000,-0000040A,?), ref: 00404047
                              • GetDlgItem.USER32(00000000,000003E8), ref: 0040405B
                              • SendMessageA.USER32(00000000,0000045B,?,00000000), ref: 00404079
                              • GetSysColor.USER32(?), ref: 0040408A
                              • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404099
                              • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 004040A8
                              • lstrlenA.KERNEL32(?), ref: 004040AB
                              • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004040BA
                              • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004040CF
                              • GetDlgItem.USER32(?,0000040A), ref: 00404131
                              • SendMessageA.USER32(00000000), ref: 00404134
                              • GetDlgItem.USER32(?,000003E8), ref: 0040415F
                              • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040419F
                              • LoadCursorA.USER32(00000000,00007F02), ref: 004041AE
                              • SetCursor.USER32(00000000), ref: 004041B7
                              • ShellExecuteA.SHELL32(0000070B,open,00422680,00000000,00000000,?), ref: 004041CA
                              • LoadCursorA.USER32(00000000,00007F00), ref: 004041D7
                              • SetCursor.USER32(00000000), ref: 004041DA
                              • SendMessageA.USER32(00000111,?,00000000), ref: 00404206
                              • SendMessageA.USER32(?,00000000,00000000), ref: 0040421A
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                              • String ID: Call$N$open
                              • API String ID: 3615053054-2563687911
                              • Opcode ID: 8a9ae112f1df4d10fa1381c7e2026d7722a962e20b7826b4dde34b5403f790f5
                              • Instruction ID: 7c7fff9fd1e172092069843c90e077616bef9326b7299cf1cce5c9f34bd91e75
                              • Opcode Fuzzy Hash: 8a9ae112f1df4d10fa1381c7e2026d7722a962e20b7826b4dde34b5403f790f5
                              • Instruction Fuzzy Hash: 8961E5B1A40209BFEB109F60DD45F6A7B78FB44741F10403AFB05BA2D1C7B8A951CB99
                              APIs
                              • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                              • BeginPaint.USER32(?,?), ref: 00401047
                              • GetClientRect.USER32(?,?), ref: 0040105B
                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                              • DeleteObject.GDI32(?), ref: 004010ED
                              • CreateFontIndirectA.GDI32(?), ref: 00401105
                              • SetBkMode.GDI32(00000000,?), ref: 00401126
                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                              • SelectObject.GDI32(00000000,?), ref: 00401140
                              • DrawTextA.USER32(00000000,Slibrighederne Setup,000000FF,00000010,00000820), ref: 00401156
                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                              • DeleteObject.GDI32(?), ref: 00401165
                              • EndPaint.USER32(?,?), ref: 0040116E
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                              • String ID: F$Slibrighederne Setup
                              • API String ID: 941294808-2379504175
                              • Opcode ID: a90db4dcded700d55ffd4d6edc3f30b5524a69ea874a0a58a5b4fb777f83a2a0
                              • Instruction ID: b42f37c54e1c8f574f2bede5c8fc4b0b0bf13e7bd3a3dea2e6496186089e6917
                              • Opcode Fuzzy Hash: a90db4dcded700d55ffd4d6edc3f30b5524a69ea874a0a58a5b4fb777f83a2a0
                              • Instruction Fuzzy Hash: A8419B71804249AFCB058F94CD459BFBBB9FF44310F00812AF961AA1A0C778EA50DFA5
                              APIs
                              • lstrcpyA.KERNEL32(00421A68,NUL,?,00000000,?,00000000,?,00405A99,?,?,?,0040563C,?,00000000,000000F1,?), ref: 00405905
                              • CloseHandle.KERNEL32(00000000,00000000,00000000,?,?,00000000,?,00405A99,?,?,?,0040563C,?,00000000,000000F1,?), ref: 00405929
                              • GetShortPathNameA.KERNEL32(00000000,00421A68,00000400), ref: 00405932
                                • Part of subcall function 004057B3: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004059E2,00000000,[Rename],00000000,00000000,00000000), ref: 004057C3
                                • Part of subcall function 004057B3: lstrlenA.KERNEL32(004059E2,?,00000000,004059E2,00000000,[Rename],00000000,00000000,00000000), ref: 004057F5
                              • GetShortPathNameA.KERNEL32(?,00421E68,00000400), ref: 0040594F
                              • wsprintfA.USER32 ref: 0040596D
                              • GetFileSize.KERNEL32(00000000,00000000,00421E68,C0000000,?,00421E68,?,?,?,?,?), ref: 004059A8
                              • GlobalAlloc.KERNEL32(?,0000000A), ref: 004059B7
                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 004059EF
                              • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00421668,00000000,-0000000A,00409388,00000000,[Rename],00000000,00000000,00000000), ref: 00405A45
                              • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405A57
                              • GlobalFree.KERNEL32(00000000), ref: 00405A5E
                              • CloseHandle.KERNEL32(00000000), ref: 00405A65
                                • Part of subcall function 0040584E: GetFileAttributesA.KERNELBASE(00000003,00402C69,C:\Users\user\Desktop\xLDz0WPZYc.exe,80000000,00000003), ref: 00405852
                                • Part of subcall function 0040584E: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405874
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                              • String ID: %s=%s$NUL$[Rename]
                              • API String ID: 1265525490-4148678300
                              • Opcode ID: 1c7b9dc5b9d373c95b3dd538fd3a589de0fc08670cd7a038be037713092c8044
                              • Instruction ID: e8cacc7e92f5bf2d1a44c635cad04a40df604100f7174d9fb2de66c5d7927451
                              • Opcode Fuzzy Hash: 1c7b9dc5b9d373c95b3dd538fd3a589de0fc08670cd7a038be037713092c8044
                              • Instruction Fuzzy Hash: 60410171704B19BFD3206B215C89F6B3A5CDB45714F14023ABD01F62D2D67CA8018E7E
                              APIs
                              • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\xLDz0WPZYc.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,0040308E,C:\Users\user\AppData\Local\Temp\,76233410,00403268), ref: 00405E80
                              • CharNextA.USER32(?,?,?,00000000), ref: 00405E8D
                              • CharNextA.USER32(?,"C:\Users\user\Desktop\xLDz0WPZYc.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,0040308E,C:\Users\user\AppData\Local\Temp\,76233410,00403268), ref: 00405E92
                              • CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,0040308E,C:\Users\user\AppData\Local\Temp\,76233410,00403268), ref: 00405EA2
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Char$Next$Prev
                              • String ID: "C:\Users\user\Desktop\xLDz0WPZYc.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                              • API String ID: 589700163-2226672137
                              • Opcode ID: 936ec53846ae3d4c979f0b86072daa16fddb5806f2a9e6e631d156a7122fd3c6
                              • Instruction ID: a4a2cc105071513804232ace241bb9437e981183223a596247e33b0ed04e6b88
                              • Opcode Fuzzy Hash: 936ec53846ae3d4c979f0b86072daa16fddb5806f2a9e6e631d156a7122fd3c6
                              • Instruction Fuzzy Hash: F111C461805B9129FB3217248C44B776F89CB96B60F18047BE5C4B22C3D77C5E428EAD
                              APIs
                              • GetWindowLongA.USER32(?,000000EB), ref: 00403EF7
                              • GetSysColor.USER32(00000000), ref: 00403F13
                              • SetTextColor.GDI32(?,00000000), ref: 00403F1F
                              • SetBkMode.GDI32(?,?), ref: 00403F2B
                              • GetSysColor.USER32(?), ref: 00403F3E
                              • SetBkColor.GDI32(?,?), ref: 00403F4E
                              • DeleteObject.GDI32(?), ref: 00403F68
                              • CreateBrushIndirect.GDI32(?), ref: 00403F72
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                              • String ID:
                              • API String ID: 2320649405-0
                              • Opcode ID: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                              • Instruction ID: d122295a95d7a35518708bb3646b4b032600d4a0088814026e1a2530b61c3467
                              • Opcode Fuzzy Hash: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                              • Instruction Fuzzy Hash: 04218471904705ABC7219F68DD08B4BBFF8AF01715F048A29E996E22E1D738EA44CB55
                              APIs
                              • GlobalFree.KERNEL32(00000000), ref: 1000234A
                                • Part of subcall function 10001224: lstrcpynA.KERNEL32(00000000,?,100012CF,-1000404B,100011AB,-000000A0), ref: 10001234
                              • GlobalAlloc.KERNEL32(?,?), ref: 100022C3
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 100022D8
                              • GlobalAlloc.KERNEL32(?,?), ref: 100022E7
                              • CLSIDFromString.OLE32(00000000,00000000), ref: 100022F4
                              • GlobalFree.KERNEL32(00000000), ref: 100022FB
                              Memory Dump Source
                              • Source File: 00000001.00000002.2625121502.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000001.00000002.2625062639.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2625142717.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2625196327.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_10000000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                              • String ID:
                              • API String ID: 3730416702-0
                              • Opcode ID: 5812f53bea9c9c9f79666072e50bc0f3831b96dbb387c6cf78516ccbd9521935
                              • Instruction ID: fe65b043c70383bd2b49c92c90746d4950a0c6047a38c1932a2dc3020861886a
                              • Opcode Fuzzy Hash: 5812f53bea9c9c9f79666072e50bc0f3831b96dbb387c6cf78516ccbd9521935
                              • Instruction Fuzzy Hash: F6418BB1108711EFF720DFA48884B5BB7F8FF443D1F218929F946D61A9DB34AA448B61
                              APIs
                                • Part of subcall function 10001215: GlobalAlloc.KERNELBASE(?,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                              • GlobalFree.KERNEL32(?), ref: 100024B9
                              • GlobalFree.KERNEL32(00000000), ref: 100024F3
                              Memory Dump Source
                              • Source File: 00000001.00000002.2625121502.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000001.00000002.2625062639.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2625142717.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2625196327.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_10000000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc
                              • String ID:
                              • API String ID: 1780285237-0
                              • Opcode ID: 28705be4039c1f606362c20ff13fdce37c258c5b4734a68cc6567389004174f8
                              • Instruction ID: 82133e1bc6da927614d5bcfc3b496831b4cb396c3e6da136b8b2dca3161aa200
                              • Opcode Fuzzy Hash: 28705be4039c1f606362c20ff13fdce37c258c5b4734a68cc6567389004174f8
                              • Instruction Fuzzy Hash: 75319CB1504251EFF722CF94CCC4C6B7BBDEB852D4B128569FA4193228DB31AC54DB62
                              APIs
                              • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 0040478C
                              • GetMessagePos.USER32 ref: 00404794
                              • ScreenToClient.USER32(?,?), ref: 004047AE
                              • SendMessageA.USER32(?,00001111,00000000,?), ref: 004047C0
                              • SendMessageA.USER32(?,0000110C,00000000,?), ref: 004047E6
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Message$Send$ClientScreen
                              • String ID: f
                              • API String ID: 41195575-1993550816
                              • Opcode ID: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                              • Instruction ID: 7320c3ca21a199b12554e0b126592fdbaa3119cb9dfe1c5a5544a419b0626cb6
                              • Opcode Fuzzy Hash: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                              • Instruction Fuzzy Hash: 7B019275D00218BADB00DB94DC85FFEBBBCAF45711F10412BBA11B71C0C3B465018BA5
                              APIs
                              • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402B5D
                              • MulDiv.KERNEL32(0008CB41,?,0008CB45), ref: 00402B88
                              • wsprintfA.USER32 ref: 00402B98
                              • SetWindowTextA.USER32(?,?), ref: 00402BA8
                              • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BBA
                              Strings
                              • verifying installer: %d%%, xrefs: 00402B92
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Text$ItemTimerWindowwsprintf
                              • String ID: verifying installer: %d%%
                              • API String ID: 1451636040-82062127
                              • Opcode ID: 7c6b42b6a0cc2db989286670b759c7d1809337f1b1d19a01d5db9df498489f5d
                              • Instruction ID: 2a4a5d9d20a729fd9d452e33c08772ea7119627e62a29752c404fbbb79c7976e
                              • Opcode Fuzzy Hash: 7c6b42b6a0cc2db989286670b759c7d1809337f1b1d19a01d5db9df498489f5d
                              • Instruction Fuzzy Hash: 5601F471940209BBDF14AF60DD49EAE3779BB04345F008039FA06B52D0D7B9A955CB59
                              APIs
                              • lstrlenA.KERNEL32(Slibrighederne Setup: Installing,Slibrighederne Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,00404582,000000DF,00000000,00000400,?), ref: 00404705
                              • wsprintfA.USER32 ref: 0040470D
                              • SetDlgItemTextA.USER32(?,Slibrighederne Setup: Installing), ref: 00404720
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: ItemTextlstrlenwsprintf
                              • String ID: %u.%u%s%s$Slibrighederne Setup: Installing
                              • API String ID: 3540041739-771727381
                              • Opcode ID: 2fef8783583e05583b13a3a111104ffe67f6f47bd1d4956f9e9fcfce1648db61
                              • Instruction ID: bb6c02d87b5a590dcf5e60bd08fb8011c89fc701b4454ccbd5a96a7ae09536e5
                              • Opcode Fuzzy Hash: 2fef8783583e05583b13a3a111104ffe67f6f47bd1d4956f9e9fcfce1648db61
                              • Instruction Fuzzy Hash: 6F11E773A041283BDB00666D9C41EAF3298DB82374F250637FA26F71D1F9799C1296E9
                              APIs
                              • RegCreateKeyExA.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040235A
                              • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040237A
                              • RegSetValueExA.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B3
                              • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402490
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CloseCreateValuelstrlen
                              • String ID: C:\Users\user\AppData\Local\Temp\nsu3BC6.tmp
                              • API String ID: 1356686001-2551050244
                              • Opcode ID: ce52fc36f8c1539fe7cd04cfea426f8ee3955a46ddb773dda666e2c71c4fce69
                              • Instruction ID: 3a938b5a8607202095c76e83426e5805640bb3b53fc5f2f09a26eea3e9d8e973
                              • Opcode Fuzzy Hash: ce52fc36f8c1539fe7cd04cfea426f8ee3955a46ddb773dda666e2c71c4fce69
                              • Instruction Fuzzy Hash: 7711A2B1E00118BFEB10AFA4DE49EAF7678FB50358F10413AF905B61D1D7B86D01AA69
                              APIs
                              • SetWindowTextA.USER32(00000000,Slibrighederne Setup), ref: 0040396B
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: TextWindow
                              • String ID: "C:\Users\user\Desktop\xLDz0WPZYc.exe"$1033$Slibrighederne Setup$Slibrighederne Setup: Installing
                              • API String ID: 530164218-3545634653
                              • Opcode ID: 5114115a6ebe5231764a3ce4d605c7881d7ff0c1eb634beed4f1a3f33a5eb945
                              • Instruction ID: 871d24c221ce82b24610d398d310ce84231420a4e1270a2a5acaa8ae42907246
                              • Opcode Fuzzy Hash: 5114115a6ebe5231764a3ce4d605c7881d7ff0c1eb634beed4f1a3f33a5eb945
                              • Instruction Fuzzy Hash: 8511C6B1B046116BCB30DF55DC80A737BADEB85716364813FE802673A0D77DAD039A68
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.2625121502.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000001.00000002.2625062639.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2625142717.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2625196327.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_10000000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: FreeGlobal
                              • String ID:
                              • API String ID: 2979337801-0
                              • Opcode ID: 0c473814e0966ac58776859a9061c1e440c53011a0554eaa903a9fb75293bb16
                              • Instruction ID: 97b6efd1b10b48d7ee9b7c7fbc92de58723c24235f199e6d6d25645bb0e8c5d4
                              • Opcode Fuzzy Hash: 0c473814e0966ac58776859a9061c1e440c53011a0554eaa903a9fb75293bb16
                              • Instruction Fuzzy Hash: DC512532D04159AEFB55DFB488A4AEEBBF6EF453C0F12416AE841B315DCA306E4087D2
                              APIs
                              • RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?), ref: 00402A5E
                              • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402A9A
                              • RegCloseKey.ADVAPI32(?), ref: 00402AA3
                              • RegCloseKey.ADVAPI32(?), ref: 00402AC8
                              • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402AE6
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Close$DeleteEnumOpen
                              • String ID:
                              • API String ID: 1912718029-0
                              • Opcode ID: 82858c02e32d41fd7ca38c30764bbd1566dd555d0b274e926b0c66c461654363
                              • Instruction ID: 7e4692ed1c3e967feaf617caf8b683db29fbfa99fde863b1c96f6eb31ad0523a
                              • Opcode Fuzzy Hash: 82858c02e32d41fd7ca38c30764bbd1566dd555d0b274e926b0c66c461654363
                              • Instruction Fuzzy Hash: C8114C71A00109FFDF21AF90DE49DAB3B7DEB54349B104136FA05B10A0DBB49E51AF69
                              APIs
                              • GetDlgItem.USER32(?), ref: 00401CD0
                              • GetClientRect.USER32(00000000,?), ref: 00401CDD
                              • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401CFE
                              • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D0C
                              • DeleteObject.GDI32(00000000), ref: 00401D1B
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                              • String ID:
                              • API String ID: 1849352358-0
                              • Opcode ID: b00f7ec418890f5e41557f0601765e71715314847e9ee516ccb0e33736116458
                              • Instruction ID: f51ac8410cbf6ce335f498807c5bd2b5625ae864585cec2d5bc31dfd5d98a64c
                              • Opcode Fuzzy Hash: b00f7ec418890f5e41557f0601765e71715314847e9ee516ccb0e33736116458
                              • Instruction Fuzzy Hash: 6DF012B2A05115BFE701EBA4EE89DAF77BCEB44301B109576F501F2191C7789D018B79
                              APIs
                              • GetDC.USER32(?), ref: 00401D29
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D36
                              • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D45
                              • ReleaseDC.USER32(?,00000000), ref: 00401D56
                              • CreateFontIndirectA.GDI32(0040A7B8), ref: 00401DA1
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CapsCreateDeviceFontIndirectRelease
                              • String ID:
                              • API String ID: 3808545654-0
                              • Opcode ID: 6c97ca4c977f86aacd357c2655dec619d2d0312ab6bad79a0316e8acbd74949c
                              • Instruction ID: e98614b17e7a5d10a155c4b6304f3e92ae7defc274e3a3420abb617ebef8a141
                              • Opcode Fuzzy Hash: 6c97ca4c977f86aacd357c2655dec619d2d0312ab6bad79a0316e8acbd74949c
                              • Instruction Fuzzy Hash: E3018671958340AFEB015BB4AE0ABAA3FB4E715705F208439F142B72E2C57854159B2F
                              APIs
                              • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C18
                              • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C30
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$Timeout
                              • String ID: !
                              • API String ID: 1777923405-2657877971
                              • Opcode ID: 5bd36806d10e7675ce8922960c3dd847d1fc55b80fe462cbded294bcfffbeb76
                              • Instruction ID: aec06c1df61e239cd4f76122eecd213935ad84fca4bb147c4325ce067fac4872
                              • Opcode Fuzzy Hash: 5bd36806d10e7675ce8922960c3dd847d1fc55b80fe462cbded294bcfffbeb76
                              • Instruction Fuzzy Hash: B82190B1A44208BFEF41AFB4CE4AAAE7BB5EF40344F14453EF541B61D1D6B89A40D728
                              APIs
                              • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004030A0,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76233410,00403268), ref: 00405653
                              • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004030A0,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76233410,00403268), ref: 0040565C
                              • lstrcatA.KERNEL32(?,00409014), ref: 0040566D
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 0040564D
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CharPrevlstrcatlstrlen
                              • String ID: C:\Users\user\AppData\Local\Temp\
                              • API String ID: 2659869361-3936084776
                              • Opcode ID: 890135f98a5a9138db31eb4b1572133a55ea61a04d2c03425938916b0e2dddc9
                              • Instruction ID: 2c4b20d64583e31d373f24845ccb5b94779d1f5d03349b34bc7780515f720d37
                              • Opcode Fuzzy Hash: 890135f98a5a9138db31eb4b1572133a55ea61a04d2c03425938916b0e2dddc9
                              • Instruction Fuzzy Hash: 17D0A9626059306AE20223269C05E8B3A58CF02315B040423F200B22A2C73C2D418BFE
                              APIs
                              • GetFileVersionInfoSizeA.VERSION(00000000,?,000000EE), ref: 00401EEB
                              • GlobalAlloc.KERNEL32(?,00000000,00000000,?,000000EE), ref: 00401F09
                              • GetFileVersionInfoA.VERSION(?,?,?,00000000), ref: 00401F22
                              • VerQueryValueA.VERSION(?,00409014,?,?,?,?,?,00000000), ref: 00401F3B
                                • Part of subcall function 00405B1B: wsprintfA.USER32 ref: 00405B28
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                              • String ID:
                              • API String ID: 1404258612-0
                              • Opcode ID: d5295571afff2b7ba06b8940d0c237b1bfad39176bc142ff4da2a602cba8f496
                              • Instruction ID: 9b91fbd94c6ee64b88793a3c9b4d2d612c2f555b57ffdd8fee231bc1bbe1e40f
                              • Opcode Fuzzy Hash: d5295571afff2b7ba06b8940d0c237b1bfad39176bc142ff4da2a602cba8f496
                              • Instruction Fuzzy Hash: 37115E71A00108BEDB01EFA5D981DAEBBB9EF04344B20807AF505F21A2D7389E54DB28
                              APIs
                              • CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp,?,00405752,C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp,C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp,?,?,76233410,0040549D,?,C:\Users\user\AppData\Local\Temp\,76233410,00000000), ref: 004056F4
                              • CharNextA.USER32(00000000), ref: 004056F9
                              • CharNextA.USER32(00000000), ref: 0040570D
                              Strings
                              • C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp, xrefs: 004056E7
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CharNext
                              • String ID: C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp
                              • API String ID: 3213498283-4135216531
                              • Opcode ID: ac897d516f17d253cbbc7940845e643e929e97fc7ae9087a1bf94e6a79cb68aa
                              • Instruction ID: e592660a4f44971662af148b318ca823341b0dace15123b29cd69db10dd58be8
                              • Opcode Fuzzy Hash: ac897d516f17d253cbbc7940845e643e929e97fc7ae9087a1bf94e6a79cb68aa
                              • Instruction Fuzzy Hash: F8F09651918F55ABFB3262285C54B775B8CCB95361F144477E680BB2C2C27C4C41EFAA
                              APIs
                              • DestroyWindow.USER32(00000000,00000000,00402DA5,?), ref: 00402BD8
                              • GetTickCount.KERNEL32 ref: 00402BF6
                              • CreateDialogParamA.USER32(0000006F,00000000,00402B42,00000000), ref: 00402C13
                              • ShowWindow.USER32(00000000,00000005), ref: 00402C21
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Window$CountCreateDestroyDialogParamShowTick
                              • String ID:
                              • API String ID: 2102729457-0
                              • Opcode ID: a370bf3714c6657f4aa9727f83cb14b3507f4001cbab91db9230ec4a81342bf5
                              • Instruction ID: 413067c0dd52ceff9b3bae724ffe8751623181a8cae7bdb8b5040e0cc41620bd
                              • Opcode Fuzzy Hash: a370bf3714c6657f4aa9727f83cb14b3507f4001cbab91db9230ec4a81342bf5
                              • Instruction Fuzzy Hash: 43F05E7094A220ABC6216F20BE8CD9F7BBCF704B52B124876F104B12E4D678D8C1DB9C
                              APIs
                              • IsWindowVisible.USER32(?), ref: 00404E49
                              • CallWindowProcA.USER32(?,?,?,?), ref: 00404E9A
                                • Part of subcall function 00403EBF: SendMessageA.USER32(00010422,00000000,00000000,00000000), ref: 00403ED1
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Window$CallMessageProcSendVisible
                              • String ID:
                              • API String ID: 3748168415-3916222277
                              • Opcode ID: ac110b3b9cb7c9f01e5231f91087d53fe1146d3d93b6dd99ce465d5e78f5ea73
                              • Instruction ID: b130d42bb84d5447e475eed3bbf3cd484b2354f0b63da773ba138cf1eceff29e
                              • Opcode Fuzzy Hash: ac110b3b9cb7c9f01e5231f91087d53fe1146d3d93b6dd99ce465d5e78f5ea73
                              • Instruction Fuzzy Hash: CB015EB1500208ABDF219F61DC80AAB3A2AF7C5760F60413BFE04762D1D73A9D51E6E9
                              APIs
                                • Part of subcall function 00405BBD: lstrcpynA.KERNEL32(?,?,00000400,00403126,Slibrighederne Setup,NSIS Error), ref: 00405BCA
                                • Part of subcall function 004056E6: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp,?,00405752,C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp,C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp,?,?,76233410,0040549D,?,C:\Users\user\AppData\Local\Temp\,76233410,00000000), ref: 004056F4
                                • Part of subcall function 004056E6: CharNextA.USER32(00000000), ref: 004056F9
                                • Part of subcall function 004056E6: CharNextA.USER32(00000000), ref: 0040570D
                              • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp,C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp,?,?,76233410,0040549D,?,C:\Users\user\AppData\Local\Temp\,76233410,00000000), ref: 0040578E
                              • GetFileAttributesA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp,C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp,C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp,C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp,C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp,C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp,C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp,?,?,76233410,0040549D,?,C:\Users\user\AppData\Local\Temp\,76233410), ref: 0040579E
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CharNext$AttributesFilelstrcpynlstrlen
                              • String ID: C:\Users\user\AppData\Local\Temp\nsq3EB7.tmp
                              • API String ID: 3248276644-4135216531
                              • Opcode ID: 9a736f538e34e6517b1cfb206b5d1e24f8bbb7c3ea1033a0713caced6fd308ff
                              • Instruction ID: 0bfa87336d0542cea5c484b91c2ff8d9f7cc7eb9e64ccd09754914f330dce399
                              • Opcode Fuzzy Hash: 9a736f538e34e6517b1cfb206b5d1e24f8bbb7c3ea1033a0713caced6fd308ff
                              • Instruction Fuzzy Hash: 75F0A925105E5156C62237365C05E9F1654CD82358F29053BF855B32D1DA7C8943ED7E
                              APIs
                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004214E0,Error launching installer), ref: 00405395
                              • CloseHandle.KERNEL32(?), ref: 004053A2
                              Strings
                              • Error launching installer, xrefs: 0040537F
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CloseCreateHandleProcess
                              • String ID: Error launching installer
                              • API String ID: 3712363035-66219284
                              • Opcode ID: 78f56604072923640aaa3b77c56e1735b9967a1a3caa926f278c393605d87831
                              • Instruction ID: 6a75270a898cf8bf2a78dd2ca891eea3d0b09d4229ae2a6fcbb9112043bcd623
                              • Opcode Fuzzy Hash: 78f56604072923640aaa3b77c56e1735b9967a1a3caa926f278c393605d87831
                              • Instruction Fuzzy Hash: 5EE0BFB4A04209BFFB10EBA4ED45F7B7AADEB10788F408521BD14F2160D778A8108A79
                              APIs
                              • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,76233410,00403551,00403375,?), ref: 00403593
                              • GlobalFree.KERNEL32(006A05A8), ref: 0040359A
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 0040358B
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Free$GlobalLibrary
                              • String ID: C:\Users\user\AppData\Local\Temp\
                              • API String ID: 1100898210-3936084776
                              • Opcode ID: c1f6b4989b579ccb4d1bab47613fbee0e7e5134bf480dcc377e5cd6992e46223
                              • Instruction ID: 1eddd4fff873b62aaaaf221bd6291171136980a6a9d1eb58fe3111f1a180586d
                              • Opcode Fuzzy Hash: c1f6b4989b579ccb4d1bab47613fbee0e7e5134bf480dcc377e5cd6992e46223
                              • Instruction Fuzzy Hash: 26E0C233811020ABC7216F56EC09B9ABB686F48B32F06442AED407B3B0D7746D418FD8
                              APIs
                              • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402C95,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\xLDz0WPZYc.exe,C:\Users\user\Desktop\xLDz0WPZYc.exe,80000000,00000003), ref: 0040569A
                              • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402C95,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\xLDz0WPZYc.exe,C:\Users\user\Desktop\xLDz0WPZYc.exe,80000000,00000003), ref: 004056A8
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CharPrevlstrlen
                              • String ID: C:\Users\user\Desktop
                              • API String ID: 2709904686-3125694417
                              • Opcode ID: c27a981e79bb352b20b7a8c74a9367836393bd04b8b6ccbc39cacac652a51138
                              • Instruction ID: 684961cdd3a6b9df4e479839de86435c839074591af8eb1459d6379f3a08a3e1
                              • Opcode Fuzzy Hash: c27a981e79bb352b20b7a8c74a9367836393bd04b8b6ccbc39cacac652a51138
                              • Instruction Fuzzy Hash: 04D0A772409D701EF30353108C04B8F7A88CF13300F490862E040E2191C37C1C818BBE
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.2625121502.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000001.00000002.2625062639.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2625142717.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000001.00000002.2625196327.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_10000000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc
                              • String ID:
                              • API String ID: 1780285237-0
                              • Opcode ID: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                              • Instruction ID: 5d3a3765e571093bf703368c32e31ec5bfeafbef09712c331e02e9e13643e521
                              • Opcode Fuzzy Hash: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                              • Instruction Fuzzy Hash: 6531ABB1808255AFF715CFA8DC89AEA7FE8EB052C1B164115FA45D726CDB34D910CB24
                              APIs
                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004059E2,00000000,[Rename],00000000,00000000,00000000), ref: 004057C3
                              • lstrcmpiA.KERNEL32(004059E2,00000000), ref: 004057DB
                              • CharNextA.USER32(004059E2,?,00000000,004059E2,00000000,[Rename],00000000,00000000,00000000), ref: 004057EC
                              • lstrlenA.KERNEL32(004059E2,?,00000000,004059E2,00000000,[Rename],00000000,00000000,00000000), ref: 004057F5
                              Memory Dump Source
                              • Source File: 00000001.00000002.2615142457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000001.00000002.2615103351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615173846.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615231830.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2615293344.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: lstrlen$CharNextlstrcmpi
                              • String ID:
                              • API String ID: 190613189-0
                              • Opcode ID: 69516db92ab03ac2bd29524685631cd9f8e4e2de886f88dc1d7fd11a4109c375
                              • Instruction ID: ad6d9dedd63ee89ffd4e190405b35f06ce6ae84d6c36acf6f04f4a95cd08f7cb
                              • Opcode Fuzzy Hash: 69516db92ab03ac2bd29524685631cd9f8e4e2de886f88dc1d7fd11a4109c375
                              • Instruction Fuzzy Hash: 66F0C232604558FFCB12DBA4DD4099EBBA8EF06350B2140B9F800F7210D274EE01ABA9
                              APIs
                              • GetDlgItem.USER32(?,000003F9), ref: 0040483B
                              • GetDlgItem.USER32(?,00000408), ref: 00404846
                              • GlobalAlloc.KERNEL32(?,?), ref: 00404890
                              • LoadBitmapA.USER32(0000006E), ref: 004048A3
                              • SetWindowLongA.USER32(?,?,00404E1A), ref: 004048BC
                              • ImageList_Create.COMCTL32(?,?,00000021,00000006,00000000), ref: 004048D0
                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 004048E2
                              • SendMessageA.USER32(?,00001109,00000002), ref: 004048F8
                              • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404904
                              • SendMessageA.USER32(?,0000111B,?,00000000), ref: 00404916
                              • DeleteObject.GDI32(00000000), ref: 00404919
                              • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404944
                              • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404950
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 004049E5
                              • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404A10
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404A24
                              • GetWindowLongA.USER32(?,?), ref: 00404A53
                              • SetWindowLongA.USER32(?,?,00000000), ref: 00404A61
                              • ShowWindow.USER32(?,00000005), ref: 00404A72
                              • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404B6F
                              • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404BD4
                              • SendMessageA.USER32(?,?,00000000,00000000), ref: 00404BE9
                              • SendMessageA.USER32(?,00000420,00000000,?), ref: 00404C0D
                              • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404C2D
                              • ImageList_Destroy.COMCTL32(?), ref: 00404C42
                              • GlobalFree.KERNEL32(?), ref: 00404C52
                              • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404CCB
                              • SendMessageA.USER32(?,00001102,?,?), ref: 00404D74
                              • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404D83
                              • InvalidateRect.USER32(?,00000000,?), ref: 00404DA3
                              • ShowWindow.USER32(?,00000000), ref: 00404DF1
                              • GetDlgItem.USER32(?,000003FE), ref: 00404DFC
                              • ShowWindow.USER32(00000000), ref: 00404E03
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                              • String ID: $M$N
                              • API String ID: 1638840714-813528018
                              • Opcode ID: 2bac73a8463ad052ddef45fc847bc96a6d0bdbf5e3dded91a25113f7f072d885
                              • Instruction ID: e15dc7f2636af8312206252945434afb9f5109210b4da1b7208a5bfe9f4b469d
                              • Opcode Fuzzy Hash: 2bac73a8463ad052ddef45fc847bc96a6d0bdbf5e3dded91a25113f7f072d885
                              • Instruction Fuzzy Hash: F30281B0A00209AFDB20DF54DD45AAE7BB5FB84315F10813AF610BA2E1D7789E42DF58
                              APIs
                              • #17.COMCTL32 ref: 004030D7
                              • SetErrorMode.KERNEL32(00008001), ref: 004030E2
                              • OleInitialize.OLE32(00000000), ref: 004030E9
                                • Part of subcall function 00405EE8: GetModuleHandleA.KERNEL32(?,?,?,004030FB,00000009), ref: 00405EFA
                                • Part of subcall function 00405EE8: LoadLibraryA.KERNEL32(?,?,?,004030FB,00000009), ref: 00405F05
                                • Part of subcall function 00405EE8: GetProcAddress.KERNEL32(00000000,?), ref: 00405F16
                              • SHGetFileInfoA.SHELL32(0041EC98,00000000,?,?,00000000,00000009), ref: 00403111
                                • Part of subcall function 00405BBD: lstrcpynA.KERNEL32(?,?,00000400,00403126,00422EE0,NSIS Error), ref: 00405BCA
                              • GetCommandLineA.KERNEL32(00422EE0,NSIS Error), ref: 00403126
                              • GetModuleHandleA.KERNEL32(00000000,00429000,00000000), ref: 00403139
                              • CharNextA.USER32(00000000,00429000,00000020), ref: 00403164
                              • GetTempPathA.KERNEL32(00000400,0042A400,00000000,00000020), ref: 00403261
                              • GetWindowsDirectoryA.KERNEL32(0042A400,000003FB), ref: 00403272
                              • lstrcatA.KERNEL32(0042A400,\Temp), ref: 0040327E
                              • GetTempPathA.KERNEL32(000003FC,0042A400,0042A400,\Temp), ref: 00403292
                              • lstrcatA.KERNEL32(0042A400,Low), ref: 0040329A
                              • SetEnvironmentVariableA.KERNEL32(TEMP,0042A400,0042A400,Low), ref: 004032AB
                              • SetEnvironmentVariableA.KERNEL32(TMP,0042A400), ref: 004032B3
                              • DeleteFileA.KERNEL32(0042A000), ref: 004032C7
                              • OleUninitialize.OLE32(?), ref: 00403375
                              • ExitProcess.KERNEL32 ref: 00403395
                              • lstrcatA.KERNEL32(0042A400,~nsu.tmp,00429000,00000000,?), ref: 004033A1
                              • lstrcmpiA.KERNEL32(0042A400,00429C00), ref: 004033AD
                              • CreateDirectoryA.KERNEL32(0042A400,00000000), ref: 004033B9
                              • SetCurrentDirectoryA.KERNEL32(0042A400), ref: 004033C0
                              • DeleteFileA.KERNEL32(0041E898,0041E898,?,00424000,?), ref: 00403419
                              • CopyFileA.KERNEL32(0042AC00,0041E898,?), ref: 0040342D
                              • CloseHandle.KERNEL32(00000000,0041E898,0041E898,?,0041E898,00000000), ref: 0040345A
                              • GetCurrentProcess.KERNEL32(?,?,00000006,00000005,?), ref: 004034B3
                              • ExitWindowsEx.USER32(00000002,80040002), ref: 0040350B
                              • ExitProcess.KERNEL32 ref: 0040352E
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                              • String ID: "$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                              • API String ID: 4107622049-1245305578
                              • Opcode ID: b388abb6f0700d973de48b09ee8961882102ef4dc3b61a6a4565489c61c931a6
                              • Instruction ID: 19acd6a9e22a62aa3fa635d9352380a3979e711e0520c28b60a65d3217cef685
                              • Opcode Fuzzy Hash: b388abb6f0700d973de48b09ee8961882102ef4dc3b61a6a4565489c61c931a6
                              • Instruction Fuzzy Hash: 87B1E370A082516AE7216F755C89B2B7EACEB45306F04057FF581B62D2C77C9E01CB6E
                              APIs
                              • DeleteFileA.KERNEL32(?,?,0042A400,76233410,00000000), ref: 004054A6
                              • lstrcatA.KERNEL32(00420CE0,\*.*,00420CE0,?,?,0042A400,76233410,00000000), ref: 004054EE
                              • lstrcatA.KERNEL32(?,00409014,?,00420CE0,?,?,0042A400,76233410,00000000), ref: 0040550F
                              • lstrlenA.KERNEL32(?,?,00409014,?,00420CE0,?,?,0042A400,76233410,00000000), ref: 00405515
                              • FindFirstFileA.KERNEL32(00420CE0,?,?,?,00409014,?,00420CE0,?,?,0042A400,76233410,00000000), ref: 00405526
                              • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004055D3
                              • FindClose.KERNEL32(00000000), ref: 004055E4
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                              • String ID: \*.*
                              • API String ID: 2035342205-1173974218
                              • Opcode ID: 69f52b3cc5ebe97eecd0483cdb7f98893bb480c3d996df3ac4eaac56146caa8f
                              • Instruction ID: f67e5f98a1b48f8b06c5baa1d65efce896aecc78963fcddf766b22b57dd7cee7
                              • Opcode Fuzzy Hash: 69f52b3cc5ebe97eecd0483cdb7f98893bb480c3d996df3ac4eaac56146caa8f
                              • Instruction Fuzzy Hash: 1851C070800A04BADF21AB25CC45BAF7AB9DB42314F14417BF444752D6D73C9A82DEAD
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 208b979f7471c67888a02c39f93206778dc1c3e33f97723ffc6ad1ac2506ac0b
                              • Instruction ID: 01902b0c5badf26c21563370f74918c90dc48b9c290b8d647ce642e1aeaa84f8
                              • Opcode Fuzzy Hash: 208b979f7471c67888a02c39f93206778dc1c3e33f97723ffc6ad1ac2506ac0b
                              • Instruction Fuzzy Hash: 99F18671D00229CBDF28CFA8C8946ADBBB0FF45305F25856ED856BB281D7385A96CF44
                              APIs
                              • GetDlgItem.USER32(?,00000403), ref: 00405043
                              • GetDlgItem.USER32(?,000003EE), ref: 00405052
                              • GetClientRect.USER32(?,?), ref: 0040508F
                              • GetSystemMetrics.USER32(00000002), ref: 00405096
                              • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004050B7
                              • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004050C8
                              • SendMessageA.USER32(?,00001001,00000000,?), ref: 004050DB
                              • SendMessageA.USER32(?,00001026,00000000,?), ref: 004050E9
                              • SendMessageA.USER32(?,00001024,00000000,?), ref: 004050FC
                              • ShowWindow.USER32(00000000,?,0000001B,?), ref: 0040511E
                              • ShowWindow.USER32(?,?), ref: 00405132
                              • GetDlgItem.USER32(?,000003EC), ref: 00405153
                              • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405163
                              • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 0040517C
                              • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 00405188
                              • GetDlgItem.USER32(?,000003F8), ref: 00405061
                                • Part of subcall function 00403EA8: SendMessageA.USER32(?,?,?,00403CD9), ref: 00403EB6
                              • GetDlgItem.USER32(?,000003EC), ref: 004051A4
                              • CreateThread.KERNEL32(00000000,00000000,Function_00004F78,00000000), ref: 004051B2
                              • CloseHandle.KERNEL32(00000000), ref: 004051B9
                              • ShowWindow.USER32(00000000), ref: 004051DC
                              • ShowWindow.USER32(?,?), ref: 004051E3
                              • ShowWindow.USER32(?), ref: 00405229
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040525D
                              • CreatePopupMenu.USER32 ref: 0040526E
                              • AppendMenuA.USER32(00000000,00000000,?,00000000), ref: 00405283
                              • GetWindowRect.USER32(?,000000FF), ref: 004052A3
                              • TrackPopupMenu.USER32(00000000,?,?,?,00000000,?,00000000), ref: 004052BC
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004052F8
                              • OpenClipboard.USER32(00000000), ref: 00405308
                              • EmptyClipboard.USER32 ref: 0040530E
                              • GlobalAlloc.KERNEL32(00000042,?), ref: 00405317
                              • GlobalLock.KERNEL32(00000000), ref: 00405321
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405335
                              • GlobalUnlock.KERNEL32(00000000), ref: 0040534E
                              • SetClipboardData.USER32(?,00000000), ref: 00405359
                              • CloseClipboard.USER32 ref: 0040535F
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                              • String ID:
                              • API String ID: 590372296-0
                              • Opcode ID: b381ff07accca91b740710533184a9ab3046fb0851b53a6dd09934ff7c98f27d
                              • Instruction ID: 5eb751775e690fc0911b0246dac1cecdda29a979763143f7b886e47eaa108cfb
                              • Opcode Fuzzy Hash: b381ff07accca91b740710533184a9ab3046fb0851b53a6dd09934ff7c98f27d
                              • Instruction Fuzzy Hash: 8AA16971900208BFDB219FA0DD89EAE7F79FB08345F10407AFA01B61A0C7B55E519FA9
                              APIs
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004039DC
                              • ShowWindow.USER32(?), ref: 004039F9
                              • DestroyWindow.USER32 ref: 00403A0D
                              • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403A29
                              • GetDlgItem.USER32(?,?), ref: 00403A4A
                              • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403A5E
                              • IsWindowEnabled.USER32(00000000), ref: 00403A65
                              • GetDlgItem.USER32(?,?), ref: 00403B13
                              • GetDlgItem.USER32(?,00000002), ref: 00403B1D
                              • SetClassLongA.USER32(?,000000F2,?), ref: 00403B37
                              • SendMessageA.USER32(0000040F,00000000,?,?), ref: 00403B88
                              • GetDlgItem.USER32(?,00000003), ref: 00403C2E
                              • ShowWindow.USER32(00000000,?), ref: 00403C4F
                              • EnableWindow.USER32(?,?), ref: 00403C61
                              • EnableWindow.USER32(?,?), ref: 00403C7C
                              • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403C92
                              • EnableMenuItem.USER32(00000000), ref: 00403C99
                              • SendMessageA.USER32(?,?,00000000,?), ref: 00403CB1
                              • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403CC4
                              • lstrlenA.KERNEL32(0041FCD8,?,0041FCD8,00422EE0), ref: 00403CED
                              • SetWindowTextA.USER32(?,0041FCD8), ref: 00403CFC
                              • ShowWindow.USER32(?,0000000A), ref: 00403E30
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                              • String ID:
                              • API String ID: 184305955-0
                              • Opcode ID: 31da440197e13903ab35b5caa29c44a62f565bed6df0edc6ad1ad95b187a0634
                              • Instruction ID: 6a308cc8f2d4566e8290075db2a5fe9cea5b682110ca7f7f0817dc9b094a1d3c
                              • Opcode Fuzzy Hash: 31da440197e13903ab35b5caa29c44a62f565bed6df0edc6ad1ad95b187a0634
                              • Instruction Fuzzy Hash: 0EC1D271604204BBDB21AF61ED45E2B3E7DFB44706B40053EF641B12E1C779A942AF6E
                              APIs
                                • Part of subcall function 00405EE8: GetModuleHandleA.KERNEL32(?,?,?,004030FB,00000009), ref: 00405EFA
                                • Part of subcall function 00405EE8: LoadLibraryA.KERNEL32(?,?,?,004030FB,00000009), ref: 00405F05
                                • Part of subcall function 00405EE8: GetProcAddress.KERNEL32(00000000,?), ref: 00405F16
                              • lstrcatA.KERNEL32(0042A000,0041FCD8,80000001,Control Panel\Desktop\ResourceLocale,00000000,0041FCD8,00000000,00000002,0042A400,76233410,00429000,00000000), ref: 00403689
                              • lstrlenA.KERNEL32(00422680,?,?,?,00422680,00000000,00429400,0042A000,0041FCD8,80000001,Control Panel\Desktop\ResourceLocale,00000000,0041FCD8,00000000,00000002,0042A400), ref: 004036FE
                              • lstrcmpiA.KERNEL32(?,.exe), ref: 00403711
                              • GetFileAttributesA.KERNEL32(00422680), ref: 0040371C
                              • LoadImageA.USER32(00000067,?,00000000,00000000,00008040,00429400), ref: 00403765
                                • Part of subcall function 00405B1B: wsprintfA.USER32 ref: 00405B28
                              • RegisterClassA.USER32(00422E80), ref: 004037A2
                              • SystemParametersInfoA.USER32(?,00000000,?,00000000), ref: 004037BA
                              • CreateWindowExA.USER32(?,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 004037EF
                              • ShowWindow.USER32(00000005,00000000), ref: 00403825
                              • LoadLibraryA.KERNEL32(RichEd20), ref: 00403836
                              • LoadLibraryA.KERNEL32(RichEd32), ref: 00403841
                              • GetClassInfoA.USER32(00000000,RichEdit20A,00422E80), ref: 00403851
                              • GetClassInfoA.USER32(00000000,RichEdit,00422E80), ref: 0040385E
                              • RegisterClassA.USER32(00422E80), ref: 00403867
                              • DialogBoxParamA.USER32(?,00000000,004039A0,00000000), ref: 00403886
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                              • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                              • API String ID: 914957316-2904746566
                              • Opcode ID: 7971d35071aa05ff81dab10e926d659a2f5e0700c3d851db6bb124140eeac98e
                              • Instruction ID: a1152651de681702ec182a4452d53c4528d9546a1521c59b1686b62f96f1e611
                              • Opcode Fuzzy Hash: 7971d35071aa05ff81dab10e926d659a2f5e0700c3d851db6bb124140eeac98e
                              • Instruction Fuzzy Hash: 966107B16442007FD7206F659D85F2B3AACEB4474AF40457FF840B62E1C7BD6D029A2E
                              APIs
                              • CheckDlgButton.USER32(00000000,-0000040A,?), ref: 00404047
                              • GetDlgItem.USER32(00000000,000003E8), ref: 0040405B
                              • SendMessageA.USER32(00000000,0000045B,?,00000000), ref: 00404079
                              • GetSysColor.USER32(?), ref: 0040408A
                              • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404099
                              • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 004040A8
                              • lstrlenA.KERNEL32(?), ref: 004040AB
                              • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004040BA
                              • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004040CF
                              • GetDlgItem.USER32(?,0000040A), ref: 00404131
                              • SendMessageA.USER32(00000000), ref: 00404134
                              • GetDlgItem.USER32(?,000003E8), ref: 0040415F
                              • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040419F
                              • LoadCursorA.USER32(00000000,00007F02), ref: 004041AE
                              • SetCursor.USER32(00000000), ref: 004041B7
                              • ShellExecuteA.SHELL32(0000070B,open,00422680,00000000,00000000,?), ref: 004041CA
                              • LoadCursorA.USER32(00000000,00007F00), ref: 004041D7
                              • SetCursor.USER32(00000000), ref: 004041DA
                              • SendMessageA.USER32(00000111,?,00000000), ref: 00404206
                              • SendMessageA.USER32(?,00000000,00000000), ref: 0040421A
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                              • String ID: N$open
                              • API String ID: 3615053054-904208323
                              • Opcode ID: 8a9ae112f1df4d10fa1381c7e2026d7722a962e20b7826b4dde34b5403f790f5
                              • Instruction ID: 7c7fff9fd1e172092069843c90e077616bef9326b7299cf1cce5c9f34bd91e75
                              • Opcode Fuzzy Hash: 8a9ae112f1df4d10fa1381c7e2026d7722a962e20b7826b4dde34b5403f790f5
                              • Instruction Fuzzy Hash: 8961E5B1A40209BFEB109F60DD45F6A7B78FB44741F10403AFB05BA2D1C7B8A951CB99
                              APIs
                              • lstrcpyA.KERNEL32(00421A68,NUL,?,00000000,?,00000000,?,00405A99,?,?,?,0040563C,?,00000000,000000F1,?), ref: 00405905
                              • CloseHandle.KERNEL32(00000000,00000000,00000000,?,?,00000000,?,00405A99,?,?,?,0040563C,?,00000000,000000F1,?), ref: 00405929
                              • GetShortPathNameA.KERNEL32(00000000,00421A68,00000400), ref: 00405932
                                • Part of subcall function 004057B3: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004059E2,00000000,[Rename],00000000,00000000,00000000), ref: 004057C3
                                • Part of subcall function 004057B3: lstrlenA.KERNEL32(004059E2,?,00000000,004059E2,00000000,[Rename],00000000,00000000,00000000), ref: 004057F5
                              • GetShortPathNameA.KERNEL32(?,00421E68,00000400), ref: 0040594F
                              • wsprintfA.USER32 ref: 0040596D
                              • GetFileSize.KERNEL32(00000000,00000000,00421E68,C0000000,?,00421E68,?,?,?,?,?), ref: 004059A8
                              • GlobalAlloc.KERNEL32(?,0000000A), ref: 004059B7
                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 004059EF
                              • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00421668,00000000,-0000000A,00409388,00000000,[Rename],00000000,00000000,00000000), ref: 00405A45
                              • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405A57
                              • GlobalFree.KERNEL32(00000000), ref: 00405A5E
                              • CloseHandle.KERNEL32(00000000), ref: 00405A65
                                • Part of subcall function 0040584E: GetFileAttributesA.KERNEL32(00000003,00402C69,0042AC00,80000000,00000003), ref: 00405852
                                • Part of subcall function 0040584E: CreateFileA.KERNEL32(?,?,?,00000000,?,00000001,00000000), ref: 00405874
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                              • String ID: %s=%s$NUL$[Rename]
                              • API String ID: 1265525490-4148678300
                              • Opcode ID: 01610d3528054899f1ac5029cf9f41fed3e8ea2be33839406827397d3c09c535
                              • Instruction ID: e8cacc7e92f5bf2d1a44c635cad04a40df604100f7174d9fb2de66c5d7927451
                              • Opcode Fuzzy Hash: 01610d3528054899f1ac5029cf9f41fed3e8ea2be33839406827397d3c09c535
                              • Instruction Fuzzy Hash: 60410171704B19BFD3206B215C89F6B3A5CDB45714F14023ABD01F62D2D67CA8018E7E
                              APIs
                              • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                              • BeginPaint.USER32(?,?), ref: 00401047
                              • GetClientRect.USER32(?,?), ref: 0040105B
                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                              • DeleteObject.GDI32(?), ref: 004010ED
                              • CreateFontIndirectA.GDI32(?), ref: 00401105
                              • SetBkMode.GDI32(00000000,?), ref: 00401126
                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                              • SelectObject.GDI32(00000000,?), ref: 00401140
                              • DrawTextA.USER32(00000000,00422EE0,000000FF,00000010,00000820), ref: 00401156
                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                              • DeleteObject.GDI32(?), ref: 00401165
                              • EndPaint.USER32(?,?), ref: 0040116E
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                              • String ID: F
                              • API String ID: 941294808-1304234792
                              • Opcode ID: a90db4dcded700d55ffd4d6edc3f30b5524a69ea874a0a58a5b4fb777f83a2a0
                              • Instruction ID: b42f37c54e1c8f574f2bede5c8fc4b0b0bf13e7bd3a3dea2e6496186089e6917
                              • Opcode Fuzzy Hash: a90db4dcded700d55ffd4d6edc3f30b5524a69ea874a0a58a5b4fb777f83a2a0
                              • Instruction Fuzzy Hash: A8419B71804249AFCB058F94CD459BFBBB9FF44310F00812AF961AA1A0C778EA50DFA5
                              APIs
                              • GetDlgItem.USER32(?,000003FB), ref: 00404300
                              • SetWindowTextA.USER32(00000000,?), ref: 0040432A
                              • SHBrowseForFolderA.SHELL32(?,0041F0B0,?), ref: 004043DB
                              • CoTaskMemFree.OLE32(00000000), ref: 004043E6
                              • lstrcmpiA.KERNEL32(00422680,0041FCD8), ref: 00404418
                              • lstrcatA.KERNEL32(?,00422680), ref: 00404424
                              • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404436
                                • Part of subcall function 004053B5: GetDlgItemTextA.USER32(?,?,00000400,0040446D), ref: 004053C8
                                • Part of subcall function 00405E28: CharNextA.USER32(?,*?|<>/":,00000000,00429000,0042A400,0042A400,00000000,0040308E,0042A400,76233410,00403268), ref: 00405E80
                                • Part of subcall function 00405E28: CharNextA.USER32(?,?,?,00000000), ref: 00405E8D
                                • Part of subcall function 00405E28: CharNextA.USER32(?,00429000,0042A400,0042A400,00000000,0040308E,0042A400,76233410,00403268), ref: 00405E92
                                • Part of subcall function 00405E28: CharPrevA.USER32(?,?,0042A400,0042A400,00000000,0040308E,0042A400,76233410,00403268), ref: 00405EA2
                              • GetDiskFreeSpaceA.KERNEL32(0041ECA8,?,?,0000040F,?,0041ECA8,0041ECA8,?,00000000,0041ECA8,?,?,000003FB,?), ref: 004044F3
                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040450E
                                • Part of subcall function 00404667: lstrlenA.KERNEL32(0041FCD8,0041FCD8,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,00404582,000000DF,00000000,00000400,?), ref: 00404705
                                • Part of subcall function 00404667: wsprintfA.USER32 ref: 0040470D
                                • Part of subcall function 00404667: SetDlgItemTextA.USER32(?,0041FCD8), ref: 00404720
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                              • String ID: A
                              • API String ID: 2624150263-3554254475
                              • Opcode ID: a4e6f5f74388a77f828b1d624dc2ce04f5575212d3a06206028d13ac6567222f
                              • Instruction ID: bbf5d18d822f9ae48c727ed4067559616aa27203017815afcead8a6077e661fe
                              • Opcode Fuzzy Hash: a4e6f5f74388a77f828b1d624dc2ce04f5575212d3a06206028d13ac6567222f
                              • Instruction Fuzzy Hash: 26A172B1900208ABDB11DFA6CD45BAF77B8EF84315F10843BF605B62D1D77C9A418B69
                              APIs
                              • GetVersion.KERNEL32(?,0041F4B8,00000000,00404EDE,0041F4B8,00000000), ref: 00405C90
                              • GetSystemDirectoryA.KERNEL32(00422680,00000400), ref: 00405D0B
                              • GetWindowsDirectoryA.KERNEL32(00422680,00000400), ref: 00405D1E
                              • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 00405D5A
                              • SHGetPathFromIDListA.SHELL32(?,00422680), ref: 00405D68
                              • CoTaskMemFree.OLE32(?), ref: 00405D73
                              • lstrcatA.KERNEL32(00422680,\Microsoft\Internet Explorer\Quick Launch), ref: 00405D95
                              • lstrlenA.KERNEL32(00422680,?,0041F4B8,00000000,00404EDE,0041F4B8,00000000), ref: 00405DE7
                              Strings
                              • \Microsoft\Internet Explorer\Quick Launch, xrefs: 00405D8F
                              • Software\Microsoft\Windows\CurrentVersion, xrefs: 00405CDA
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                              • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                              • API String ID: 900638850-730719616
                              • Opcode ID: 4fc9a2c1a562770659ff824627d27c8fdf30e9a3a95352a1e28ae8e8292bb4a1
                              • Instruction ID: 05ce3077703b195791b94b96109b54625272672628b9f98d23919b5af99ad588
                              • Opcode Fuzzy Hash: 4fc9a2c1a562770659ff824627d27c8fdf30e9a3a95352a1e28ae8e8292bb4a1
                              • Instruction Fuzzy Hash: 0A610171A04A05AAEB205F24DC88BBF7BB4EF11304F50813BE941B62D0D27D5982DF8E
                              APIs
                              • GetTickCount.KERNEL32 ref: 00402C3A
                              • GetModuleFileNameA.KERNEL32(00000000,0042AC00,00000400), ref: 00402C56
                                • Part of subcall function 0040584E: GetFileAttributesA.KERNEL32(00000003,00402C69,0042AC00,80000000,00000003), ref: 00405852
                                • Part of subcall function 0040584E: CreateFileA.KERNEL32(?,?,?,00000000,?,00000001,00000000), ref: 00405874
                              • GetFileSize.KERNEL32(00000000,00000000,0042B000,00000000,00429C00,00429C00,0042AC00,0042AC00,80000000,00000003), ref: 00402CA2
                              Strings
                              • Error launching installer, xrefs: 00402C79
                              • Inst, xrefs: 00402D0E
                              • soft, xrefs: 00402D17
                              • Null, xrefs: 00402D20
                              • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402E01
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: File$AttributesCountCreateModuleNameSizeTick
                              • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                              • API String ID: 4283519449-1074636621
                              • Opcode ID: d2466c366b40ada891166ae0be508241e2a39c3b047db90d9cb12df27967870f
                              • Instruction ID: f25878a385a50b793721b7c2dc62060375717e7a9e735ffe9872fd5df72a7917
                              • Opcode Fuzzy Hash: d2466c366b40ada891166ae0be508241e2a39c3b047db90d9cb12df27967870f
                              • Instruction Fuzzy Hash: 7651F671A00215ABDB20AF65DE89F9E7BB8EB04315F10413BF904B62D1D7BC9E418B9D
                              APIs
                              • GetTickCount.KERNEL32 ref: 00402EC0
                              • GetTickCount.KERNEL32 ref: 00402F41
                              • MulDiv.KERNEL32(7FFFFFFF,?,00000020), ref: 00402F6E
                              • wsprintfA.USER32 ref: 00402F7E
                              • WriteFile.KERNEL32(00000000,00000000,?,00000000,00000000), ref: 00402FAA
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CountTick$FileWritewsprintf
                              • String ID: ... %d%%
                              • API String ID: 4209647438-2449383134
                              • Opcode ID: a547bbf75e58521e9f16cca8f90ae094bf7d1ef88360610581a7ff50affa0a35
                              • Instruction ID: 884de2ce8814a110384bf9455658e7085e50030da519773910f3f0b9c7b3960d
                              • Opcode Fuzzy Hash: a547bbf75e58521e9f16cca8f90ae094bf7d1ef88360610581a7ff50affa0a35
                              • Instruction Fuzzy Hash: 49519D7190120AABCF10DF65DA08A9F3BB8AB04395F14413BF800B72C0C7789E50DBAA
                              APIs
                              • GetWindowLongA.USER32(?,000000EB), ref: 00403EF7
                              • GetSysColor.USER32(00000000), ref: 00403F13
                              • SetTextColor.GDI32(?,00000000), ref: 00403F1F
                              • SetBkMode.GDI32(?,?), ref: 00403F2B
                              • GetSysColor.USER32(?), ref: 00403F3E
                              • SetBkColor.GDI32(?,?), ref: 00403F4E
                              • DeleteObject.GDI32(?), ref: 00403F68
                              • CreateBrushIndirect.GDI32(?), ref: 00403F72
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                              • String ID:
                              • API String ID: 2320649405-0
                              • Opcode ID: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                              • Instruction ID: d122295a95d7a35518708bb3646b4b032600d4a0088814026e1a2530b61c3467
                              • Opcode Fuzzy Hash: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                              • Instruction Fuzzy Hash: 04218471904705ABC7219F68DD08B4BBFF8AF01715F048A29E996E22E1D738EA44CB55
                              APIs
                              • lstrlenA.KERNEL32(0041F4B8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000,?), ref: 00404EDF
                              • lstrlenA.KERNEL32(00402F92,0041F4B8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000), ref: 00404EEF
                              • lstrcatA.KERNEL32(0041F4B8,00402F92,00402F92,0041F4B8,00000000,?,00000000), ref: 00404F02
                              • SetWindowTextA.USER32(0041F4B8,0041F4B8), ref: 00404F14
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F3A
                              • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F54
                              • SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F62
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                              • String ID:
                              • API String ID: 2531174081-0
                              • Opcode ID: 48123c3549f50a0c2ac230125184ebffb3dcbe2344fee158779a2bcc95f67cce
                              • Instruction ID: c9e29023339c79119f92ef6614343089cfde3ac0fe0689c8293f17bbb72fca3e
                              • Opcode Fuzzy Hash: 48123c3549f50a0c2ac230125184ebffb3dcbe2344fee158779a2bcc95f67cce
                              • Instruction Fuzzy Hash: D0219DB2900118BEDF119FA5CD849DEBFB9EF44354F14807AF944B6291C3789E418BA8
                              APIs
                              • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 0040478C
                              • GetMessagePos.USER32 ref: 00404794
                              • ScreenToClient.USER32(?,?), ref: 004047AE
                              • SendMessageA.USER32(?,00001111,00000000,?), ref: 004047C0
                              • SendMessageA.USER32(?,0000110C,00000000,?), ref: 004047E6
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Message$Send$ClientScreen
                              • String ID: f
                              • API String ID: 41195575-1993550816
                              • Opcode ID: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                              • Instruction ID: 7320c3ca21a199b12554e0b126592fdbaa3119cb9dfe1c5a5544a419b0626cb6
                              • Opcode Fuzzy Hash: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                              • Instruction Fuzzy Hash: 7B019275D00218BADB00DB94DC85FFEBBBCAF45711F10412BBA11B71C0C3B465018BA5
                              APIs
                              • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402B5D
                              • MulDiv.KERNEL32(?,?,?), ref: 00402B88
                              • wsprintfA.USER32 ref: 00402B98
                              • SetWindowTextA.USER32(?,?), ref: 00402BA8
                              • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BBA
                              Strings
                              • verifying installer: %d%%, xrefs: 00402B92
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Text$ItemTimerWindowwsprintf
                              • String ID: verifying installer: %d%%
                              • API String ID: 1451636040-82062127
                              • Opcode ID: d52c56e719e4219fdd43886dfdce69e46e01ec9783aaea218270728fc191bd97
                              • Instruction ID: 2a4a5d9d20a729fd9d452e33c08772ea7119627e62a29752c404fbbb79c7976e
                              • Opcode Fuzzy Hash: d52c56e719e4219fdd43886dfdce69e46e01ec9783aaea218270728fc191bd97
                              • Instruction Fuzzy Hash: 5601F471940209BBDF14AF60DD49EAE3779BB04345F008039FA06B52D0D7B9A955CB59
                              APIs
                              • GetModuleHandleA.KERNEL32(00000000,?,?), ref: 00401F93
                                • Part of subcall function 00404EA6: lstrlenA.KERNEL32(0041F4B8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000,?), ref: 00404EDF
                                • Part of subcall function 00404EA6: lstrlenA.KERNEL32(00402F92,0041F4B8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000), ref: 00404EEF
                                • Part of subcall function 00404EA6: lstrcatA.KERNEL32(0041F4B8,00402F92,00402F92,0041F4B8,00000000,?,00000000), ref: 00404F02
                                • Part of subcall function 00404EA6: SetWindowTextA.USER32(0041F4B8,0041F4B8), ref: 00404F14
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F3A
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F54
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F62
                              • LoadLibraryExA.KERNEL32(00000000,?,?,?,?), ref: 00401FA3
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00401FB3
                              • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,?,?,?), ref: 0040201D
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                              • String ID: `7B
                              • API String ID: 2987980305-3208876730
                              • Opcode ID: 3eeaf95b022f53a32a81041e378aea9a7f1b0ca266dfd8a229483f2181eced64
                              • Instruction ID: aaf5afebff6e040c8f3edcccfb20df8df5b0ecb9331c565b7beb057a01dbb2d2
                              • Opcode Fuzzy Hash: 3eeaf95b022f53a32a81041e378aea9a7f1b0ca266dfd8a229483f2181eced64
                              • Instruction Fuzzy Hash: 9121F672904211B6CF107FA48E8DA6E39B0AB44318F20823BF600B62D0D7BC4941DA5E
                              APIs
                              • CharNextA.USER32(?,*?|<>/":,00000000,00429000,0042A400,0042A400,00000000,0040308E,0042A400,76233410,00403268), ref: 00405E80
                              • CharNextA.USER32(?,?,?,00000000), ref: 00405E8D
                              • CharNextA.USER32(?,00429000,0042A400,0042A400,00000000,0040308E,0042A400,76233410,00403268), ref: 00405E92
                              • CharPrevA.USER32(?,?,0042A400,0042A400,00000000,0040308E,0042A400,76233410,00403268), ref: 00405EA2
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Char$Next$Prev
                              • String ID: *?|<>/":
                              • API String ID: 589700163-165019052
                              • Opcode ID: 936ec53846ae3d4c979f0b86072daa16fddb5806f2a9e6e631d156a7122fd3c6
                              • Instruction ID: a4a2cc105071513804232ace241bb9437e981183223a596247e33b0ed04e6b88
                              • Opcode Fuzzy Hash: 936ec53846ae3d4c979f0b86072daa16fddb5806f2a9e6e631d156a7122fd3c6
                              • Instruction Fuzzy Hash: F111C461805B9129FB3217248C44B776F89CB96B60F18047BE5C4B22C3D77C5E428EAD
                              APIs
                              • lstrcatA.KERNEL32(00000000,00000000,004093B0,00429800,00000000,00000000,00000031), ref: 0040177E
                              • CompareFileTime.KERNEL32(-00000014,?,004093B0,004093B0,00000000,00000000,004093B0,00429800,00000000,00000000,00000031), ref: 004017A8
                                • Part of subcall function 00405BBD: lstrcpynA.KERNEL32(?,?,00000400,00403126,00422EE0,NSIS Error), ref: 00405BCA
                                • Part of subcall function 00404EA6: lstrlenA.KERNEL32(0041F4B8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000,?), ref: 00404EDF
                                • Part of subcall function 00404EA6: lstrlenA.KERNEL32(00402F92,0041F4B8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000), ref: 00404EEF
                                • Part of subcall function 00404EA6: lstrcatA.KERNEL32(0041F4B8,00402F92,00402F92,0041F4B8,00000000,?,00000000), ref: 00404F02
                                • Part of subcall function 00404EA6: SetWindowTextA.USER32(0041F4B8,0041F4B8), ref: 00404F14
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F3A
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F54
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F62
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                              • String ID:
                              • API String ID: 1941528284-0
                              • Opcode ID: 90123a7a23cf7e657b86724a437a277d4c4849d416a3389a651f0a55611c47c9
                              • Instruction ID: 209590ddbc3a68456c4598a6b25cf33bb68440e8bdc93e33a46783fb3c58ae9b
                              • Opcode Fuzzy Hash: 90123a7a23cf7e657b86724a437a277d4c4849d416a3389a651f0a55611c47c9
                              • Instruction Fuzzy Hash: 6F41C472900514BADF10BBA9DC46EAF3679EF01368F20823BF512F10E1D77C5A418AAD
                              APIs
                              • RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?), ref: 00402A5E
                              • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402A9A
                              • RegCloseKey.ADVAPI32(?), ref: 00402AA3
                              • RegCloseKey.ADVAPI32(?), ref: 00402AC8
                              • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402AE6
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Close$DeleteEnumOpen
                              • String ID:
                              • API String ID: 1912718029-0
                              • Opcode ID: 82858c02e32d41fd7ca38c30764bbd1566dd555d0b274e926b0c66c461654363
                              • Instruction ID: 7e4692ed1c3e967feaf617caf8b683db29fbfa99fde863b1c96f6eb31ad0523a
                              • Opcode Fuzzy Hash: 82858c02e32d41fd7ca38c30764bbd1566dd555d0b274e926b0c66c461654363
                              • Instruction Fuzzy Hash: C8114C71A00109FFDF21AF90DE49DAB3B7DEB54349B104136FA05B10A0DBB49E51AF69
                              APIs
                              • GetDlgItem.USER32(?), ref: 00401CD0
                              • GetClientRect.USER32(00000000,?), ref: 00401CDD
                              • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401CFE
                              • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D0C
                              • DeleteObject.GDI32(00000000), ref: 00401D1B
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                              • String ID:
                              • API String ID: 1849352358-0
                              • Opcode ID: 3fa910a29a7471df273f3d5a519cdd9490650a943fe2164337c26205f225f611
                              • Instruction ID: f51ac8410cbf6ce335f498807c5bd2b5625ae864585cec2d5bc31dfd5d98a64c
                              • Opcode Fuzzy Hash: 3fa910a29a7471df273f3d5a519cdd9490650a943fe2164337c26205f225f611
                              • Instruction Fuzzy Hash: 6DF012B2A05115BFE701EBA4EE89DAF77BCEB44301B109576F501F2191C7789D018B79
                              APIs
                              • GetDC.USER32(?), ref: 00401D29
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D36
                              • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D45
                              • ReleaseDC.USER32(?,00000000), ref: 00401D56
                              • CreateFontIndirectA.GDI32(0040A7B8), ref: 00401DA1
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CapsCreateDeviceFontIndirectRelease
                              • String ID:
                              • API String ID: 3808545654-0
                              • Opcode ID: 3e946d73b4ddc9b375eb78bf312b86fbeaf2fbdf02b63083e1009b0eaaac9267
                              • Instruction ID: e98614b17e7a5d10a155c4b6304f3e92ae7defc274e3a3420abb617ebef8a141
                              • Opcode Fuzzy Hash: 3e946d73b4ddc9b375eb78bf312b86fbeaf2fbdf02b63083e1009b0eaaac9267
                              • Instruction Fuzzy Hash: E3018671958340AFEB015BB4AE0ABAA3FB4E715705F208439F142B72E2C57854159B2F
                              APIs
                              • lstrlenA.KERNEL32(0041FCD8,0041FCD8,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,00404582,000000DF,00000000,00000400,?), ref: 00404705
                              • wsprintfA.USER32 ref: 0040470D
                              • SetDlgItemTextA.USER32(?,0041FCD8), ref: 00404720
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: ItemTextlstrlenwsprintf
                              • String ID: %u.%u%s%s
                              • API String ID: 3540041739-3551169577
                              • Opcode ID: fabf217e280f95901e27d13a5b377b8772edee093bc2c09b204756cbdb802f42
                              • Instruction ID: bb6c02d87b5a590dcf5e60bd08fb8011c89fc701b4454ccbd5a96a7ae09536e5
                              • Opcode Fuzzy Hash: fabf217e280f95901e27d13a5b377b8772edee093bc2c09b204756cbdb802f42
                              • Instruction Fuzzy Hash: 6F11E773A041283BDB00666D9C41EAF3298DB82374F250637FA26F71D1F9799C1296E9
                              APIs
                              • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C18
                              • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C30
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$Timeout
                              • String ID: !
                              • API String ID: 1777923405-2657877971
                              • Opcode ID: 5bd36806d10e7675ce8922960c3dd847d1fc55b80fe462cbded294bcfffbeb76
                              • Instruction ID: aec06c1df61e239cd4f76122eecd213935ad84fca4bb147c4325ce067fac4872
                              • Opcode Fuzzy Hash: 5bd36806d10e7675ce8922960c3dd847d1fc55b80fe462cbded294bcfffbeb76
                              • Instruction Fuzzy Hash: B82190B1A44208BFEF41AFB4CE4AAAE7BB5EF40344F14453EF541B61D1D6B89A40D728
                              APIs
                              • RegCreateKeyExA.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040235A
                              • lstrlenA.KERNEL32(00409BB0,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040237A
                              • RegSetValueExA.ADVAPI32(?,?,?,?,00409BB0,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B3
                              • RegCloseKey.ADVAPI32(?,?,?,00409BB0,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402490
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CloseCreateValuelstrlen
                              • String ID:
                              • API String ID: 1356686001-0
                              • Opcode ID: 30e95fe6958c5ecd2dd88e436728e964ee313c43297dab67f14f7c8466dc7e6b
                              • Instruction ID: 3a938b5a8607202095c76e83426e5805640bb3b53fc5f2f09a26eea3e9d8e973
                              • Opcode Fuzzy Hash: 30e95fe6958c5ecd2dd88e436728e964ee313c43297dab67f14f7c8466dc7e6b
                              • Instruction Fuzzy Hash: 7711A2B1E00118BFEB10AFA4DE49EAF7678FB50358F10413AF905B61D1D7B86D01AA69
                              APIs
                                • Part of subcall function 004056E6: CharNextA.USER32(?,?,004210E0,?,00405752,004210E0,004210E0,0042A400,?,76233410,0040549D,?,0042A400,76233410,00000000), ref: 004056F4
                                • Part of subcall function 004056E6: CharNextA.USER32(00000000), ref: 004056F9
                                • Part of subcall function 004056E6: CharNextA.USER32(00000000), ref: 0040570D
                              • CreateDirectoryA.KERNEL32(00000000,?,00000000,?,00000000,?), ref: 004015DB
                              • GetLastError.KERNEL32(?,00000000,?,00000000,?), ref: 004015E5
                              • GetFileAttributesA.KERNEL32(00000000,?,00000000,?,00000000,?), ref: 004015F3
                              • SetCurrentDirectoryA.KERNEL32(00000000,00429800,00000000,00000000,?), ref: 00401622
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                              • String ID:
                              • API String ID: 3751793516-0
                              • Opcode ID: 341913b46653dc02a6b8c0ff5df98e195c602d220a8259587814e8818c9eeb9b
                              • Instruction ID: d075d57f09c15f05164e6e7227da82a4385631acf0310a11cf010d3362af65ee
                              • Opcode Fuzzy Hash: 341913b46653dc02a6b8c0ff5df98e195c602d220a8259587814e8818c9eeb9b
                              • Instruction Fuzzy Hash: 5F112531908150AFDB112F755D44E6F37B0EA62366768473BF891B22E2D23C0D42D62E
                              APIs
                              • GetFileVersionInfoSizeA.VERSION(00000000,?,000000EE), ref: 00401EEB
                              • GlobalAlloc.KERNEL32(?,00000000,00000000,?,000000EE), ref: 00401F09
                              • GetFileVersionInfoA.VERSION(?,?,?,00000000), ref: 00401F22
                              • VerQueryValueA.VERSION(?,00409014,?,?,?,?,?,00000000), ref: 00401F3B
                                • Part of subcall function 00405B1B: wsprintfA.USER32 ref: 00405B28
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                              • String ID:
                              • API String ID: 1404258612-0
                              • Opcode ID: d5295571afff2b7ba06b8940d0c237b1bfad39176bc142ff4da2a602cba8f496
                              • Instruction ID: 9b91fbd94c6ee64b88793a3c9b4d2d612c2f555b57ffdd8fee231bc1bbe1e40f
                              • Opcode Fuzzy Hash: d5295571afff2b7ba06b8940d0c237b1bfad39176bc142ff4da2a602cba8f496
                              • Instruction Fuzzy Hash: 37115E71A00108BEDB01EFA5D981DAEBBB9EF04344B20807AF505F21A2D7389E54DB28
                              APIs
                              • DestroyWindow.USER32(?,00000000,00402DA5,?), ref: 00402BD8
                              • GetTickCount.KERNEL32 ref: 00402BF6
                              • CreateDialogParamA.USER32(0000006F,00000000,00402B42,00000000), ref: 00402C13
                              • ShowWindow.USER32(00000000,00000005), ref: 00402C21
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Window$CountCreateDestroyDialogParamShowTick
                              • String ID:
                              • API String ID: 2102729457-0
                              • Opcode ID: a370bf3714c6657f4aa9727f83cb14b3507f4001cbab91db9230ec4a81342bf5
                              • Instruction ID: 413067c0dd52ceff9b3bae724ffe8751623181a8cae7bdb8b5040e0cc41620bd
                              • Opcode Fuzzy Hash: a370bf3714c6657f4aa9727f83cb14b3507f4001cbab91db9230ec4a81342bf5
                              • Instruction Fuzzy Hash: 43F05E7094A220ABC6216F20BE8CD9F7BBCF704B52B124876F104B12E4D678D8C1DB9C
                              APIs
                              • IsWindowVisible.USER32(?), ref: 00404E49
                              • CallWindowProcA.USER32(?,?,?,?), ref: 00404E9A
                                • Part of subcall function 00403EBF: SendMessageA.USER32(?,00000000,00000000,00000000), ref: 00403ED1
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Window$CallMessageProcSendVisible
                              • String ID:
                              • API String ID: 3748168415-3916222277
                              • Opcode ID: ac110b3b9cb7c9f01e5231f91087d53fe1146d3d93b6dd99ce465d5e78f5ea73
                              • Instruction ID: b130d42bb84d5447e475eed3bbf3cd484b2354f0b63da773ba138cf1eceff29e
                              • Opcode Fuzzy Hash: ac110b3b9cb7c9f01e5231f91087d53fe1146d3d93b6dd99ce465d5e78f5ea73
                              • Instruction Fuzzy Hash: CB015EB1500208ABDF219F61DC80AAB3A2AF7C5760F60413BFE04762D1D73A9D51E6E9
                              APIs
                              • GetTickCount.KERNEL32 ref: 00405891
                              • GetTempFileNameA.KERNEL32(?,?,00000000,?), ref: 004058AB
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CountFileNameTempTick
                              • String ID: nsa
                              • API String ID: 1716503409-2209301699
                              • Opcode ID: 53651faf07563a77c89e4d9d04216bb1832e7739a800dcda734853e57c4c3aa5
                              • Instruction ID: 97602d992a1fc3ea541738fe691a17a98ed12bbd3b61733a4c4fd0f0c3479bd5
                              • Opcode Fuzzy Hash: 53651faf07563a77c89e4d9d04216bb1832e7739a800dcda734853e57c4c3aa5
                              • Instruction Fuzzy Hash: B0F05E367482086AEB109A55DC44B9B7B98DB91750F14C02AFD44AA190D6B099548B99
                              APIs
                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004214E0,Error launching installer), ref: 00405395
                              • CloseHandle.KERNEL32(?), ref: 004053A2
                              Strings
                              • Error launching installer, xrefs: 0040537F
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CloseCreateHandleProcess
                              • String ID: Error launching installer
                              • API String ID: 3712363035-66219284
                              • Opcode ID: 78f56604072923640aaa3b77c56e1735b9967a1a3caa926f278c393605d87831
                              • Instruction ID: 6a75270a898cf8bf2a78dd2ca891eea3d0b09d4229ae2a6fcbb9112043bcd623
                              • Opcode Fuzzy Hash: 78f56604072923640aaa3b77c56e1735b9967a1a3caa926f278c393605d87831
                              • Instruction Fuzzy Hash: 5EE0BFB4A04209BFFB10EBA4ED45F7B7AADEB10788F408521BD14F2160D778A8108A79
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2395b39049a362c34a27dfb880213796ab4f3997f605305afcf4b88fff478a5b
                              • Instruction ID: 17d8f0c9adc7b2b71efc7957c866aa3859f64222e8b37881b9213324db3bf9cd
                              • Opcode Fuzzy Hash: 2395b39049a362c34a27dfb880213796ab4f3997f605305afcf4b88fff478a5b
                              • Instruction Fuzzy Hash: E0A15171E00228CBDF28CFA8C8447ADBBB1FB44305F15806ED856BB281D7789A96DF44
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e99653bfb7f144ce5dad25bea39bf75b689d07406e35084d2878a8dabe37ac6e
                              • Instruction ID: fc305786e35d93851c8f3c5d9b38f8a429e7909e60618e2c0103eac0a9dc1c25
                              • Opcode Fuzzy Hash: e99653bfb7f144ce5dad25bea39bf75b689d07406e35084d2878a8dabe37ac6e
                              • Instruction Fuzzy Hash: C1913071E00228CBDF28CF98C8547ADBBB1FB44305F15816AD856BB281D7789A96DF44
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fe53a61097b749f1782159a8fc3ae1334c5d5d5e9ac5eec79330ddb7b6ec713b
                              • Instruction ID: 045822fc5ab24079ba69da477224c4b1a41a130b0053ffb1807465ee2ef03bcb
                              • Opcode Fuzzy Hash: fe53a61097b749f1782159a8fc3ae1334c5d5d5e9ac5eec79330ddb7b6ec713b
                              • Instruction Fuzzy Hash: AB814771E00228CFDF24CFA8C8447ADBBB1FB45305F25816AD856BB281D7789A96DF44
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f03dec724b3596635aeae071b0dd6c0542c79984eb544c4ce6f813bf1c132c47
                              • Instruction ID: efdf2bc729d78145ecf5a565514c9258b5bbce2e4cf5113e346d1a35f2b936d2
                              • Opcode Fuzzy Hash: f03dec724b3596635aeae071b0dd6c0542c79984eb544c4ce6f813bf1c132c47
                              • Instruction Fuzzy Hash: AB817771E00228CBDF24DFA8C8447AEBBB0FB45305F15816AD856BB281D7785A96DF44
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b228df2ed3587aaf6c6f9f97010ba9ba02a5f9c90de50599b2abf323e58cb698
                              • Instruction ID: c983b8745f75bf2274a463a9cfcccf5039b1f1987fed19ece7001b5e7d797120
                              • Opcode Fuzzy Hash: b228df2ed3587aaf6c6f9f97010ba9ba02a5f9c90de50599b2abf323e58cb698
                              • Instruction Fuzzy Hash: 3F712371E00228CFDF28CF98C8447ADBBB1FB44305F15806AD856BB281D7789A96DF54
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f482201699af14bb3cd10cc7f775e8512ddaef9db8a966204fce1aae5b262981
                              • Instruction ID: 3e902398f65232741f3d3f2c7f6467c21586f7f50b1ebc0ee674bbd924b4c7fc
                              • Opcode Fuzzy Hash: f482201699af14bb3cd10cc7f775e8512ddaef9db8a966204fce1aae5b262981
                              • Instruction Fuzzy Hash: FA714671E00228CFDF28CF98C8447ADBBB1FB44305F15806AD856BB281D7789A96DF44
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9a381668fc57e9f6ced01437e848a6b2accfb19374870d44d6b2c2291bed7b2e
                              • Instruction ID: 9020e7499a55ede5867a2e11e25a0f248b5ba7faeda0d39cd9abe089b181c94d
                              • Opcode Fuzzy Hash: 9a381668fc57e9f6ced01437e848a6b2accfb19374870d44d6b2c2291bed7b2e
                              • Instruction Fuzzy Hash: C5715671E00229CFEF28CF98C8447ADBBB1FB44305F15806AD856BB281D7789A96DF44
                              APIs
                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004059E2,00000000,[Rename],00000000,00000000,00000000), ref: 004057C3
                              • lstrcmpiA.KERNEL32(004059E2,00000000), ref: 004057DB
                              • CharNextA.USER32(004059E2,?,00000000,004059E2,00000000,[Rename],00000000,00000000,00000000), ref: 004057EC
                              • lstrlenA.KERNEL32(004059E2,?,00000000,004059E2,00000000,[Rename],00000000,00000000,00000000), ref: 004057F5
                              Memory Dump Source
                              • Source File: 00000006.00000002.3444790104.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.3444776303.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444809164.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444853351.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000006.00000002.3444874751.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: lstrlen$CharNextlstrcmpi
                              • String ID:
                              • API String ID: 190613189-0
                              • Opcode ID: 69516db92ab03ac2bd29524685631cd9f8e4e2de886f88dc1d7fd11a4109c375
                              • Instruction ID: ad6d9dedd63ee89ffd4e190405b35f06ce6ae84d6c36acf6f04f4a95cd08f7cb
                              • Opcode Fuzzy Hash: 69516db92ab03ac2bd29524685631cd9f8e4e2de886f88dc1d7fd11a4109c375
                              • Instruction Fuzzy Hash: 66F0C232604558FFCB12DBA4DD4099EBBA8EF06350B2140B9F800F7210D274EE01ABA9