Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
xLDz0WPZYc.exe

Overview

General Information

Sample name:xLDz0WPZYc.exe
renamed because original name is a hash value
Original sample name:7cf7ab42508aedf9910b50fafaab9786be8ec80c413387d92f4a1432f66e955b.exe
Analysis ID:1587852
MD5:74e2251dfa1e7fbeb0e4e9ba2f6c56b4
SHA1:468d0612612e0424ea38eb7426d893a5098d245b
SHA256:7cf7ab42508aedf9910b50fafaab9786be8ec80c413387d92f4a1432f66e955b
Tags:exeuser-adrian__luca
Infos:

Detection

GuLoader
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • xLDz0WPZYc.exe (PID: 1840 cmdline: "C:\Users\user\Desktop\xLDz0WPZYc.exe" MD5: 74E2251DFA1E7FBEB0E4E9BA2F6C56B4)
    • xLDz0WPZYc.exe (PID: 4416 cmdline: "C:\Users\user\Desktop\xLDz0WPZYc.exe" MD5: 74E2251DFA1E7FBEB0E4E9BA2F6C56B4)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: xLDz0WPZYc.exe PID: 1840JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2025-01-10T18:43:23.540346+010028032702Potentially Bad Traffic192.168.2.86277266.63.187.3080TCP
    2025-01-10T18:44:38.985836+010028032702Potentially Bad Traffic192.168.2.86250166.63.187.3080TCP
    2025-01-10T18:45:10.438851+010028032702Potentially Bad Traffic192.168.2.86254566.63.187.3080TCP
    2025-01-10T18:45:41.846520+010028032702Potentially Bad Traffic192.168.2.86274266.63.187.3080TCP
    2025-01-10T18:46:13.238160+010028032702Potentially Bad Traffic192.168.2.86277166.63.187.3080TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: xLDz0WPZYc.exeReversingLabs: Detection: 55%
    Source: xLDz0WPZYc.exeVirustotal: Detection: 66%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: xLDz0WPZYc.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: xLDz0WPZYc.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 0_2_0040547D GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,0_2_0040547D
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 0_2_00405EC1 FindFirstFileA,FindClose,0_2_00405EC1
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 0_2_00402645 FindFirstFileA,0_2_00402645
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 3_2_00402645 FindFirstFileA,3_2_00402645
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 3_2_0040547D GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,3_2_0040547D
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 3_2_00405EC1 FindFirstFileA,FindClose,3_2_00405EC1
    Source: global trafficTCP traffic: 192.168.2.8:62496 -> 162.159.36.2:53
    Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:62501 -> 66.63.187.30:80
    Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:62771 -> 66.63.187.30:80
    Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:62742 -> 66.63.187.30:80
    Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:62545 -> 66.63.187.30:80
    Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:62772 -> 66.63.187.30:80
    Source: unknownDNS traffic detected: query: 18.31.95.13.in-addr.arpa replaycode: Name error (3)
    Source: global trafficHTTP traffic detected: GET /AmDxXYvcZBeoV9.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 66.63.187.30Cache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /AmDxXYvcZBeoV9.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 66.63.187.30Cache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /AmDxXYvcZBeoV9.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 66.63.187.30Cache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /AmDxXYvcZBeoV9.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 66.63.187.30Cache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /AmDxXYvcZBeoV9.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 66.63.187.30Cache-Control: no-cache
    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET /AmDxXYvcZBeoV9.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 66.63.187.30Cache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /AmDxXYvcZBeoV9.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 66.63.187.30Cache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /AmDxXYvcZBeoV9.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 66.63.187.30Cache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /AmDxXYvcZBeoV9.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 66.63.187.30Cache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /AmDxXYvcZBeoV9.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 66.63.187.30Cache-Control: no-cache
    Source: global trafficDNS traffic detected: DNS query: 18.31.95.13.in-addr.arpa
    Source: xLDz0WPZYc.exe, 00000003.00000002.3329411686.0000000004FA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://66.63.187.30/
    Source: xLDz0WPZYc.exe, 00000003.00000002.3329411686.0000000004F58000.00000004.00000020.00020000.00000000.sdmp, xLDz0WPZYc.exe, 00000003.00000002.3329411686.0000000004F92000.00000004.00000020.00020000.00000000.sdmp, xLDz0WPZYc.exe, 00000003.00000002.3329600997.0000000006A50000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://66.63.187.30/AmDxXYvcZBeoV9.bin
    Source: xLDz0WPZYc.exe, 00000003.00000002.3329411686.0000000004F58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://66.63.187.30/AmDxXYvcZBeoV9.binE
    Source: xLDz0WPZYc.exe, 00000003.00000002.3329411686.0000000004F58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://66.63.187.30/AmDxXYvcZBeoV9.binQ
    Source: xLDz0WPZYc.exe, 00000003.00000002.3329411686.0000000004F58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://66.63.187.30/AmDxXYvcZBeoV9.bin_
    Source: xLDz0WPZYc.exe, 00000003.00000002.3329411686.0000000004F58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://66.63.187.30/AmDxXYvcZBeoV9.bing
    Source: xLDz0WPZYc.exe, 00000003.00000002.3329411686.0000000004F92000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://66.63.187.30/AmDxXYvcZBeoV9.binm32
    Source: xLDz0WPZYc.exe, 00000003.00000002.3329411686.0000000004F58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://66.63.187.30/AmDxXYvcZBeoV9.biny
    Source: xLDz0WPZYc.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
    Source: xLDz0WPZYc.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 0_2_00404FE4 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,LdrInitializeThunk,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,LdrInitializeThunk,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,SendMessageA,CreatePopupMenu,LdrInitializeThunk,AppendMenuA,GetWindowRect,LdrInitializeThunk,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,LdrInitializeThunk,SetClipboardData,CloseClipboard,0_2_00404FE4
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 0_2_004030B6 EntryPoint,#17,SetErrorMode,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,LdrInitializeThunk,LdrInitializeThunk,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_004030B6
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 3_2_004030B6 EntryPoint,#17,SetErrorMode,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,LdrInitializeThunk,LdrInitializeThunk,GetCurrentProcess,ExitWindowsEx,ExitProcess,3_2_004030B6
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 0_2_004048230_2_00404823
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 0_2_004061970_2_00406197
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 3_2_004048233_2_00404823
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 3_2_004061973_2_00406197
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: String function: 004029FD appears 47 times
    Source: xLDz0WPZYc.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: classification engineClassification label: mal68.troj.evad.winEXE@3/12@1/1
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 0_2_004042B1 GetDlgItem,SetWindowTextA,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,LdrInitializeThunk,SetDlgItemTextA,0_2_004042B1
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 0_2_00402036 LdrInitializeThunk,LdrInitializeThunk,CoCreateInstance,MultiByteToWideChar,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,0_2_00402036
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeFile created: C:\Users\user\AppData\Roaming\StuderekammermenneskesJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeFile created: C:\Users\user\AppData\Local\Temp\nse61BC.tmpJump to behavior
    Source: xLDz0WPZYc.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: xLDz0WPZYc.exeReversingLabs: Detection: 55%
    Source: xLDz0WPZYc.exeVirustotal: Detection: 66%
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeFile read: C:\Users\user\Desktop\xLDz0WPZYc.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\xLDz0WPZYc.exe "C:\Users\user\Desktop\xLDz0WPZYc.exe"
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeProcess created: C:\Users\user\Desktop\xLDz0WPZYc.exe "C:\Users\user\Desktop\xLDz0WPZYc.exe"
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeProcess created: C:\Users\user\Desktop\xLDz0WPZYc.exe "C:\Users\user\Desktop\xLDz0WPZYc.exe"Jump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: riched20.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeFile written: C:\Users\user\AppData\Local\Temp\Settings.iniJump to behavior
    Source: xLDz0WPZYc.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Data Obfuscation

    barindex
    Source: Yara matchFile source: Process Memory Space: xLDz0WPZYc.exe PID: 1840, type: MEMORYSTR
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 0_2_00405EE8 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405EE8
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 0_2_10002D30 push eax; ret 0_2_10002D5E
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeFile created: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeAPI/Special instruction interceptor: Address: 7B1655F
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeAPI/Special instruction interceptor: Address: 469655F
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeRDTSC instruction interceptor: First address: 7AB44AC second address: 7AB44AC instructions: 0x00000000 rdtsc 0x00000002 test bx, ax 0x00000005 test ch, ah 0x00000007 cmp ebx, ecx 0x00000009 jc 00007F2704766E01h 0x0000000b test ebx, eax 0x0000000d inc ebp 0x0000000e cmp edx, ebx 0x00000010 inc ebx 0x00000011 rdtsc
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeRDTSC instruction interceptor: First address: 46344AC second address: 46344AC instructions: 0x00000000 rdtsc 0x00000002 test bx, ax 0x00000005 test ch, ah 0x00000007 cmp ebx, ecx 0x00000009 jc 00007F270485DFD1h 0x0000000b test ebx, eax 0x0000000d inc ebp 0x0000000e cmp edx, ebx 0x00000010 inc ebx 0x00000011 rdtsc
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 0_2_0040547D GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,0_2_0040547D
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 0_2_00405EC1 FindFirstFileA,FindClose,0_2_00405EC1
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 0_2_00402645 FindFirstFileA,0_2_00402645
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 3_2_00402645 FindFirstFileA,3_2_00402645
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 3_2_0040547D GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,3_2_0040547D
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 3_2_00405EC1 FindFirstFileA,FindClose,3_2_00405EC1
    Source: xLDz0WPZYc.exe, 00000003.00000002.3329411686.0000000004FAD000.00000004.00000020.00020000.00000000.sdmp, xLDz0WPZYc.exe, 00000003.00000002.3329411686.0000000004F58000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: xLDz0WPZYc.exe, 00000003.00000002.3329411686.0000000004FAD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW1r:!
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeAPI call chain: ExitProcess graph end nodegraph_0-4346
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeAPI call chain: ExitProcess graph end nodegraph_0-4509
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 0_2_0040584E GetFileAttributesA,LdrInitializeThunk,LdrInitializeThunk,CreateFileA,0_2_0040584E
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 0_2_00405EE8 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405EE8
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeProcess created: C:\Users\user\Desktop\xLDz0WPZYc.exe "C:\Users\user\Desktop\xLDz0WPZYc.exe"Jump to behavior
    Source: C:\Users\user\Desktop\xLDz0WPZYc.exeCode function: 0_2_00405BDF GetVersion,LdrInitializeThunk,LdrInitializeThunk,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405BDF
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    11
    Process Injection
    1
    Masquerading
    OS Credential Dumping21
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    11
    Process Injection
    LSASS Memory3
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    1
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    Deobfuscate/Decode Files or Information
    Security Account Manager23
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared Drive2
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
    Obfuscated Files or Information
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture12
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    xLDz0WPZYc.exe55%ReversingLabsWin32.Backdoor.Remcos
    xLDz0WPZYc.exe67%VirustotalBrowse
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://66.63.187.30/AmDxXYvcZBeoV9.bin0%Avira URL Cloudsafe
    http://66.63.187.30/AmDxXYvcZBeoV9.bing0%Avira URL Cloudsafe
    http://66.63.187.30/0%Avira URL Cloudsafe
    http://66.63.187.30/AmDxXYvcZBeoV9.bin_0%Avira URL Cloudsafe
    http://66.63.187.30/AmDxXYvcZBeoV9.biny0%Avira URL Cloudsafe
    http://66.63.187.30/AmDxXYvcZBeoV9.binE0%Avira URL Cloudsafe
    http://66.63.187.30/AmDxXYvcZBeoV9.binQ0%Avira URL Cloudsafe
    http://66.63.187.30/AmDxXYvcZBeoV9.binm320%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    18.31.95.13.in-addr.arpa
    unknown
    unknownfalse
      high
      NameMaliciousAntivirus DetectionReputation
      http://66.63.187.30/AmDxXYvcZBeoV9.binfalse
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://66.63.187.30/AmDxXYvcZBeoV9.bingxLDz0WPZYc.exe, 00000003.00000002.3329411686.0000000004F58000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://66.63.187.30/AmDxXYvcZBeoV9.binyxLDz0WPZYc.exe, 00000003.00000002.3329411686.0000000004F58000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://nsis.sf.net/NSIS_ErrorxLDz0WPZYc.exefalse
        high
        http://nsis.sf.net/NSIS_ErrorErrorxLDz0WPZYc.exefalse
          high
          http://66.63.187.30/AmDxXYvcZBeoV9.binExLDz0WPZYc.exe, 00000003.00000002.3329411686.0000000004F58000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://66.63.187.30/AmDxXYvcZBeoV9.bin_xLDz0WPZYc.exe, 00000003.00000002.3329411686.0000000004F58000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://66.63.187.30/AmDxXYvcZBeoV9.binQxLDz0WPZYc.exe, 00000003.00000002.3329411686.0000000004F58000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://66.63.187.30/xLDz0WPZYc.exe, 00000003.00000002.3329411686.0000000004FA7000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://66.63.187.30/AmDxXYvcZBeoV9.binm32xLDz0WPZYc.exe, 00000003.00000002.3329411686.0000000004F92000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          66.63.187.30
          unknownUnited States
          8100ASN-QUADRANET-GLOBALUSfalse
          Joe Sandbox version:42.0.0 Malachite
          Analysis ID:1587852
          Start date and time:2025-01-10 18:42:27 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 7m 24s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Run name:Run with higher sleep bypass
          Number of analysed new started processes analysed:8
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:xLDz0WPZYc.exe
          renamed because original name is a hash value
          Original Sample Name:7cf7ab42508aedf9910b50fafaab9786be8ec80c413387d92f4a1432f66e955b.exe
          Detection:MAL
          Classification:mal68.troj.evad.winEXE@3/12@1/1
          EGA Information:
          • Successful, ratio: 50%
          HCA Information:
          • Successful, ratio: 89%
          • Number of executed functions: 48
          • Number of non-executed functions: 73
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
          • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
          • Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.95.31.18, 13.107.246.45
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Execution Graph export aborted for target xLDz0WPZYc.exe, PID 4416 because there are no executed function
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtOpenKeyEx calls found.
          No simulations
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          66.63.187.30Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeGet hashmaliciousRemcos, GuLoaderBrowse
          • 66.63.187.30/GrDfwEbxHEuyrsJcDgnTLZ14.bin
          Ref GEC409876 CONSTRUCTION OF MAJLIS PROJECT IN SAADIYAT, ABU DHABI.exeGet hashmaliciousRemcos, GuLoaderBrowse
          • 66.63.187.30/wBWcspgeBmkxYD199.bin
          Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeGet hashmaliciousRemcos, GuLoaderBrowse
          • 66.63.187.30/hpVMAPRZVuaX36.bin
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          ASN-QUADRANET-GLOBALUSvQyKfYxzXB.exeGet hashmaliciousRemcosBrowse
          • 69.174.98.48
          https://zfrmz.com/3GiGYUP4BArW2NBgkPU3Get hashmaliciousUnknownBrowse
          • 45.61.152.125
          gem1.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
          • 66.63.187.173
          armv5l.elfGet hashmaliciousUnknownBrowse
          • 104.237.80.14
          30% Order payment-BLQuote_'PO#385995790.exeGet hashmaliciousAsyncRATBrowse
          • 69.174.100.131
          drop1.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
          • 66.63.187.173
          file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, XWorm, XmrigBrowse
          • 66.63.187.122
          drop1.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
          • 66.63.187.173
          drop1.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
          • 66.63.187.173
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dllPpto.24265.exeGet hashmaliciousFormBook, GuLoaderBrowse
            Ppto.24265.exeGet hashmaliciousFormBook, GuLoaderBrowse
              Ricowell Ind New INQ.bat.exeGet hashmaliciousFormBook, GuLoaderBrowse
                Ricowell Ind New INQ.bat.exeGet hashmaliciousGuLoaderBrowse
                  Setup_x86.exeGet hashmaliciousUnknownBrowse
                    ORDER.exeGet hashmaliciousFormBook, GuLoaderBrowse
                      ORDER.exeGet hashmaliciousUnknownBrowse
                        ulACwpUCSU.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          fJuwM4Bwi7.exeGet hashmaliciousFormBook, GuLoaderBrowse
                            Process:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):52
                            Entropy (8bit):4.725996747697686
                            Encrypted:false
                            SSDEEP:3:HM/xiXWR0AXQQLQIfLBJXmgxv:HHpQkIP2I
                            MD5:87C38DC6EF4616FF016D1CCC1A793086
                            SHA1:AFC6434AAAD4FB1A250AF0D167DAB718DA10B4AF
                            SHA-256:781C527A7A89FDBFA481BF8800E255DC1B69E47B2B68040DC39103C114E31849
                            SHA-512:CC8EF7D9C98FB663C79A4A00FD68344F7AA3DBA27D68B3AEF463C758A74AEBF8190C8A9532FE91BC7DB32E78FF2C48C43230F03DA226F9A9EF288324EFEBF0FE
                            Malicious:false
                            Reputation:low
                            Preview:[Initialize]..First=user32::EnumWindows(i r1 ,i 0)..
                            Process:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):52
                            Entropy (8bit):4.0914493934217315
                            Encrypted:false
                            SSDEEP:3:sBa99k1NoCFOn:KankVg
                            MD5:5D04A35D3950677049C7A0CF17E37125
                            SHA1:CAFDD49A953864F83D387774B39B2657A253470F
                            SHA-256:A9493973DD293917F3EBB932AB255F8CAC40121707548DE100D5969956BB1266
                            SHA-512:C7B1AFD95299C0712BDBC67F9D2714926D6EC9F71909AF615AFFC400D8D2216AB76F6AC35057088836435DE36E919507E1B25BE87B07C911083F964EB67E003B
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            Preview:kernel32::SetFilePointer(i r5, i 1200 , i 0,i 0)i.r3
                            Process:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):11264
                            Entropy (8bit):5.779474184733856
                            Encrypted:false
                            SSDEEP:96:zPDYcJ+nx4vVp76JX7zBlkCg21Fxz4THxtrqw1at0JgwLEjo+OB3yUVCdl/wNj+y:zPtkuWJX7zB3kGwfy0nyUVsxCjOM61u
                            MD5:6F5257C0B8C0EF4D440F4F4FCE85FB1B
                            SHA1:B6AC111DFB0D1FC75AD09C56BDE7830232395785
                            SHA-256:B7CCB923387CC346731471B20FC3DF1EAD13EC8C2E3147353C71BB0BD59BC8B1
                            SHA-512:A3CC27F1EFB52FB8ECDA54A7C36ADA39CEFEABB7B16F2112303EA463B0E1A4D745198D413EEBB3551E012C84A20DCDF4359E511E51BC3F1A60B13F1E3BAD1AA8
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Joe Sandbox View:
                            • Filename: Ppto.24265.exe, Detection: malicious, Browse
                            • Filename: Ppto.24265.exe, Detection: malicious, Browse
                            • Filename: Ricowell Ind New INQ.bat.exe, Detection: malicious, Browse
                            • Filename: Ricowell Ind New INQ.bat.exe, Detection: malicious, Browse
                            • Filename: Setup_x86.exe, Detection: malicious, Browse
                            • Filename: ORDER.exe, Detection: malicious, Browse
                            • Filename: ORDER.exe, Detection: malicious, Browse
                            • Filename: ulACwpUCSU.exe, Detection: malicious, Browse
                            • Filename: fJuwM4Bwi7.exe, Detection: malicious, Browse
                            Reputation:moderate, very likely benign file
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......)...m.m.m...k.m.~....j.9..i....l....l.Richm.........................PE..L....\.U...........!.................'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text..._........................... ..`.rdata..S....0......."..............@..@.data...h....@.......&..............@....reloc..b....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.51038309657817
                            Encrypted:false
                            SSDEEP:3:sEMBQEJkJVEjM2Q6XxQoXUn:tKXxvUn
                            MD5:8E2223169ADE668CE3920B01C8AA100E
                            SHA1:EFB2C58919EB2592233E57E3423FF075EE9326C0
                            SHA-256:7D41D2BCC88F004B6D83D76AF072075D082040D7DEF97FEED09A4FC6C33A3176
                            SHA-512:131AC3450AC6351CB7281E1E46ADA18B003CDC6FA5C2B4C8F2279AE3E9A3A80573B645D18F44E6E6C5B7AFD59B0873D098F4E148E595E512DEFA1F37F3B7791D
                            Malicious:false
                            Reputation:low
                            Preview:kernel32::VirtualAlloc(i 0,i 57454592, i 0x3000, i 0x40)p.r1
                            Process:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):74
                            Entropy (8bit):3.9637832956585757
                            Encrypted:false
                            SSDEEP:3:sRQE1wFEt/ijNJyI3dj2+n:aQEGiwh3D
                            MD5:16D513397F3C1F8334E8F3E4FC49828F
                            SHA1:4EE15AFCA81CA6A13AF4E38240099B730D6931F0
                            SHA-256:D3C781A1855C8A70F5ACA88D9E2C92AFFFA80541334731F62CAA9494AA8A0C36
                            SHA-512:4A350B790FDD2FE957E9AB48D5969B217AB19FC7F93F3774F1121A5F140FF9A9EAAA8FA30E06A9EF40AD776E698C2E65A05323C3ADF84271DA1716E75F5183C3
                            Malicious:false
                            Preview:kernel32::CreateFileA(m r4 , i 0x80000000, i 0, p 0, i 4, i 0x80, i 0)i.r5
                            Process:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):30
                            Entropy (8bit):4.256564762130954
                            Encrypted:false
                            SSDEEP:3:DyWgLQIfLBJXmgU:mkIP25
                            MD5:F15BFDEBB2DF02D02C8491BDE1B4E9BD
                            SHA1:93BD46F57C3316C27CAD2605DDF81D6C0BDE9301
                            SHA-256:C87F2FF45BB530577FB8856DF1760EDAF1060AE4EE2934B17FDD21B7D116F043
                            SHA-512:1757ED4AE4D47D0C839511C18BE5D75796224D4A3049E2D8853650ACE2C5057C42040DE6450BF90DD4969862E9EBB420CD8A34F8DD9C970779ED2E5459E8F2F1
                            Malicious:false
                            Preview:user32::EnumWindows(i r1 ,i 0)
                            Process:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):56
                            Entropy (8bit):4.24214984251469
                            Encrypted:false
                            SSDEEP:3:sAAEVvjs8QwMj84n:fLby
                            MD5:65F323B491B59FFB602FA78A7FB6859D
                            SHA1:8385C4863F3EBBE6A0CA5C639B1B02F0303CC036
                            SHA-256:BB8F96C8651F7EC6E50C0B761EADD59B821999C3D465E2F068A1B5EA605337A2
                            SHA-512:589770CD1188D2A3AC67FEB447EDB758F9BAA0D34347FA7ED6222EF6A368CCF016513EBF4F08EEFD9BABE903340347C9C5F3CDDC15ACF1152E1701F13773E810
                            Malicious:false
                            Preview:kernel32::ReadFile(i r5, i r1, i 57454592,*i 0, i 0)i.r3
                            Process:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):443463
                            Entropy (8bit):7.1060208528446225
                            Encrypted:false
                            SSDEEP:6144:6eFLl9ao3Quyw5WWAMSYo6iddXZCQOSKPJMUTr4eTiJpe1rGYySat8HqTVhigC:lFLCgyw5PAMSndVgMUPKUStSG0L
                            MD5:BED600EBCF25FB176F3C33C49032C708
                            SHA1:CCAB1DF83370C5C8C2CFC4C1DC56BEBA0BFD209D
                            SHA-256:BD8BBA41CD2FB016F23D8EFF0AA46B940CF682A3F53E487671C883342DF0F815
                            SHA-512:E38A129C8E0C28EB5D703B9A5B371D6D97BBE1E5C73EE5B865EA7790E1016FA9B2F846D624CA569456D318E1B94C97EFAF4588FF397B7AB632DDEC14E29D9315
                            Malicious:false
                            Preview:.........----........... .........YY.........@..............{{...ii.......t...eeeee.p......1..n.z..........-................55.33........uuuu....SS.a.................OOO.......a..........V..AAA..f...........................c...............qqq...............O...}}.H....l.jjj.>.D..""..[......................:.......55..((.KK................U...........................L....p..W..................................s......................l.[[[......V...__.................;;..........__.....T...D...................k....>>>........................)............--............:....cc.....hhhh....8....!!.............&&&&&&....nnn.|...........'.p......................FFF.U..................)................jjj.......r.............$$$$.................?.................................YY...u.....E..................n.J........--.#......E...--..????..........>>>>>>>..22.......:...h.S...........,.................XXX...................YY.....R....................................Z...`.......... ....o.....
                            Process:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):405493
                            Entropy (8bit):1.246302898520162
                            Encrypted:false
                            SSDEEP:1536:SMSKb0U1bKXTxlJBDh8fwx/hCIFWwF/hAGVFLK:tb0U4XTxBUwdFWwZQ
                            MD5:2D4BB09FC720DBF5FF883C376957C192
                            SHA1:E8633B582A2DE84480838E18A393CB69A0DEA7A5
                            SHA-256:A1DAE3293AFAA57868FA347417F8B4E9B504778267F523510E66A701FDDBD796
                            SHA-512:05F0CA6FDC7546393990D50217D7DD3E29CC41DC19B702678E67BD5EF6AA9C8B4BF67A7D72DA3CD0EEE3C4B968E1F835FA88AFF56018AA4FA29E06D79FD94DD7
                            Malicious:false
                            Preview:...`................U..............^.............}........../.~......................|...............................E.......n...E..Q......#............."..............3.....]........................................................................................................................k.{......................................................j.....>..................G......Q....................................... ......................................................................39.............q.........L.....................................7...........................i...............................W.........g..............................................................+................................................................}....................y...............................................m............................................D......................................................................................................................F.....y..
                            Process:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            File Type:GLS_BINARY_MSB_FIRST
                            Category:dropped
                            Size (bytes):93375
                            Entropy (8bit):4.580946458707374
                            Encrypted:false
                            SSDEEP:1536:Alp+RhDsJsRkvT5g3QrwktSfauVAgTc746z0z/Nrr5:Az+RVRPctUXVAgBTFh
                            MD5:4F5E2D0BABBCEB3EBFF820D6B2C277EB
                            SHA1:ED0ECF48CD9233F66644F9419427A82EB5A10D7D
                            SHA-256:AFAF78A5B733E2A0AD3CC8A5EDEBD9397E91961DE1B61E4ACB987B2B40DE4E50
                            SHA-512:AFC53D79243A7EC1581D42372922A7D03D17FAE79144AA693F6390C92435E090DD2E8AD7D201CFE3E481BF6101465F7AD6ECAB589F5579D1F874AD1961E86BDB
                            Malicious:false
                            Preview:......... ....&&&&.............**........66666........................t.AA.............(....................T.{{..........q..................66................................xx..C......J....??.................................................QQQ.[.......................}}}}.......a.....>...............,,..........T.-....V...........H......3..I...........__..zzzzzz.....W.vv.............................t....!!!!!...'''........H.....................(....W................YYY..........J.................................C.1............n...............................!................ggg.....55........33......rr.?..........................q................. .???..................e......2222..........F.........llll.........i.......................B..........88....................xx.P.r......d....hh.ccc.........?.BB..........GG...$$$..5555............................................................FF......YYY.................OO..q...............T.............e...................................
                            Process:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):268320
                            Entropy (8bit):1.2484153809015175
                            Encrypted:false
                            SSDEEP:768:XRm/UHiPv8+9Qi8nCX5O1RRZnytZfr65hMN59EgukI/8d2VlycdnTd8snimGRk6W:hsnyUIDiM1idzUbj3
                            MD5:E08BB74F72E7A74CA9E1066D0732C60C
                            SHA1:C6A0748FC271905D76A83EE61D2512CCE97C9577
                            SHA-256:8592211ACEAC0B42741D538187B25156E5667D511B754478FF0BE61F664C7867
                            SHA-512:96A2312E03C64B98CCDECB8F557645828880551BF28E9196EC37C4536259876F4BB1EC11E485118B4F6206F2B5897006010DDF4C85E011BDA83DFBDD5BA0FB1A
                            Malicious:false
                            Preview:.........................................>........Y.........................................^.....O....{.............../.........I................4......b.................Z..............,.......L..F......................l.................................E......................................p......&...............2.......................P.......................................................................6...........y(......................................................................K....................................a......................................_....b...~..................N...I..............................L.........B..................................................6..c.r................`b................................_.......................#........................,.........................3...K^..........................................................................H..V.............K..........................................8..............................
                            Process:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):299353
                            Entropy (8bit):1.2515527061732419
                            Encrypted:false
                            SSDEEP:768:IrwdaO+ErGCGiQiWrxVTG+gEquPOuNVN3LDYpiizG4daXq7KvsUj7wK9/JpZY6nU:U8Q1TwxsYS6LTinpUVvDuGT/F
                            MD5:75862CAC4E48811142F0D6BC4C760FD5
                            SHA1:4A862856AC5613B8865FFB5CA3D4BCD377D857A5
                            SHA-256:1370C0CF01285FECFB686F3A8377CF456C5175C1970225CBD83AB9687BD93F7A
                            SHA-512:FE8BDD8B3196826D4C4202689CAE3A2A95B96F4758C1DF532E03894393DEC5D6EA110EB70B7269F14C81EA3E9DEC373BE6BEB06891F73199586C42ABC4273CB5
                            Malicious:false
                            Preview:......................................................................1.B............................1...............................................................................5..................................................................................................................................................I..........................W............................................y..............................................._...........................F..............8........................................4...................................M...........G...............................................1................Z.........j.....................N...................................... ..............................]........./..........................................................ew.......................................6..........................".......2.....................................M...q................................................................
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                            Entropy (8bit):7.980593050511499
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 92.16%
                            • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:xLDz0WPZYc.exe
                            File size:576'325 bytes
                            MD5:74e2251dfa1e7fbeb0e4e9ba2f6c56b4
                            SHA1:468d0612612e0424ea38eb7426d893a5098d245b
                            SHA256:7cf7ab42508aedf9910b50fafaab9786be8ec80c413387d92f4a1432f66e955b
                            SHA512:831efb203b54b2e1dd40466883d4bf782764f14bc7b3ae832960297d97a63265844bf7a8114ef25937db0501c4cff1acdd432b59bbf8965b6bca712a00150187
                            SSDEEP:12288:lCiOsdE13z3jIhfSqc47HPUiJCsBNEeS+qZCmmf8sVyb9yssb:bOWEp30x/7rJueS+aCmmf8sVy6
                            TLSH:1DC423D69AD6D8A3F0E205BE0E779B75C67EE608502C44479BC7ED93BC390827A0E4D1
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1p.:u..iu..iu..i...iw..iu..i...i...id..i!2.i...i...it..iRichu..i........PE..L....\.U.................\...........0.......p....@
                            Icon Hash:3d2e0f95332b3399
                            Entrypoint:0x4030b6
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x55C15CDD [Wed Aug 5 00:46:21 2015 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:e160ef8e55bb9d162da4e266afd9eef3
                            Instruction
                            sub esp, 00000184h
                            push ebx
                            push ebp
                            push esi
                            xor ebx, ebx
                            push edi
                            mov dword ptr [esp+18h], ebx
                            mov dword ptr [esp+10h], 00409190h
                            mov dword ptr [esp+20h], ebx
                            mov byte ptr [esp+14h], 00000020h
                            call dword ptr [00407034h]
                            push 00008001h
                            call dword ptr [0040711Ch]
                            push ebx
                            call dword ptr [0040728Ch]
                            push 00000009h
                            mov dword ptr [00423798h], eax
                            call 00007F270460FE52h
                            mov dword ptr [004236E4h], eax
                            push ebx
                            lea eax, dword ptr [esp+38h]
                            push 00000160h
                            push eax
                            push ebx
                            push 0041EC98h
                            call dword ptr [00407164h]
                            push 00409180h
                            push 00422EE0h
                            call 00007F270460FAFCh
                            call dword ptr [00407120h]
                            mov ebp, 00429000h
                            push eax
                            push ebp
                            call 00007F270460FAEAh
                            push ebx
                            call dword ptr [00407118h]
                            cmp byte ptr [00429000h], 00000022h
                            mov dword ptr [004236E0h], eax
                            mov eax, ebp
                            jne 00007F270460D06Ch
                            mov byte ptr [esp+14h], 00000022h
                            mov eax, 00429001h
                            push dword ptr [esp+14h]
                            push eax
                            call 00007F270460F57Ah
                            push eax
                            call dword ptr [00407220h]
                            mov dword ptr [esp+1Ch], eax
                            jmp 00007F270460D125h
                            cmp cl, 00000020h
                            jne 00007F270460D068h
                            inc eax
                            cmp byte ptr [eax], 00000020h
                            je 00007F270460D05Ch
                            Programming Language:
                            • [EXP] VC++ 6.0 SP5 build 8804
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x340000xbc8.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x70000x298.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x5ac00x5c00b2645f74b36b1cbbff66d6cf2b9a61fbFalse0.6638077445652174data6.434017891994297IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x70000x11ce0x1200640f709ec19b4ed0455a4c64e5934d5eFalse0.4520399305555556OpenPGP Secret Key5.23558258677739IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x90000x1a7d80x400135ffaf7e3978322a97c335bc761bdb6False0.609375data4.961292527260562IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .ndata0x240000x100000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x340000xbc80xc002eed50edc1bb3fcae915bfbf8800f6e6False0.4345703125data4.452305564094297IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0x341c00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.42473118279569894
                            RT_DIALOG0x344a80x144dataEnglishUnited States0.5216049382716049
                            RT_DIALOG0x345f00x100dataEnglishUnited States0.5234375
                            RT_DIALOG0x346f00x11cdataEnglishUnited States0.6056338028169014
                            RT_DIALOG0x348100x60dataEnglishUnited States0.7291666666666666
                            RT_GROUP_ICON0x348700x14dataEnglishUnited States1.2
                            RT_MANIFEST0x348880x33fXML 1.0 document, ASCII text, with very long lines (831), with no line terminatorsEnglishUnited States0.5547533092659447
                            DLLImport
                            KERNEL32.dllGetTickCount, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, SearchPathA, GetShortPathNameA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, GetWindowsDirectoryA, GetTempPathA, Sleep, CloseHandle, LoadLibraryA, lstrlenA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, lstrcpyA, lstrcatA, GetSystemDirectoryA, GetVersion, GetProcAddress, GlobalAlloc, CompareFileTime, SetFileTime, ExpandEnvironmentStringsA, lstrcmpiA, lstrcmpA, WaitForSingleObject, GlobalFree, GetExitCodeProcess, GetModuleHandleA, SetErrorMode, GetCommandLineA, LoadLibraryExA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, WriteFile, FindClose, WritePrivateProfileStringA, MultiByteToWideChar, MulDiv, GetPrivateProfileStringA, FreeLibrary
                            USER32.dllCreateWindowExA, EndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, GetDC, SystemParametersInfoA, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, DestroyWindow, CreateDialogParamA, SetTimer, GetDlgItem, wsprintfA, SetForegroundWindow, ShowWindow, IsWindow, LoadImageA, SetWindowLongA, SetClipboardData, EmptyClipboard, OpenClipboard, EndPaint, PostQuitMessage, FindWindowExA, SendMessageTimeoutA, SetWindowTextA
                            GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                            SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA
                            ADVAPI32.dllRegCloseKey, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegEnumValueA, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                            COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                            ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                            VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                            2025-01-10T18:43:23.540346+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.86277266.63.187.3080TCP
                            2025-01-10T18:44:38.985836+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.86250166.63.187.3080TCP
                            2025-01-10T18:45:10.438851+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.86254566.63.187.3080TCP
                            2025-01-10T18:45:41.846520+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.86274266.63.187.3080TCP
                            2025-01-10T18:46:13.238160+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.86277166.63.187.3080TCP
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 10, 2025 18:43:59.547799110 CET6249653192.168.2.8162.159.36.2
                            Jan 10, 2025 18:43:59.552705050 CET5362496162.159.36.2192.168.2.8
                            Jan 10, 2025 18:43:59.552792072 CET6249653192.168.2.8162.159.36.2
                            Jan 10, 2025 18:43:59.557646036 CET5362496162.159.36.2192.168.2.8
                            Jan 10, 2025 18:44:00.021683931 CET6249653192.168.2.8162.159.36.2
                            Jan 10, 2025 18:44:00.026659012 CET5362496162.159.36.2192.168.2.8
                            Jan 10, 2025 18:44:00.026743889 CET6249653192.168.2.8162.159.36.2
                            Jan 10, 2025 18:44:17.614430904 CET6250180192.168.2.866.63.187.30
                            Jan 10, 2025 18:44:17.619267941 CET806250166.63.187.30192.168.2.8
                            Jan 10, 2025 18:44:17.619333982 CET6250180192.168.2.866.63.187.30
                            Jan 10, 2025 18:44:17.619534016 CET6250180192.168.2.866.63.187.30
                            Jan 10, 2025 18:44:17.624336004 CET806250166.63.187.30192.168.2.8
                            Jan 10, 2025 18:44:38.985685110 CET806250166.63.187.30192.168.2.8
                            Jan 10, 2025 18:44:38.985836029 CET6250180192.168.2.866.63.187.30
                            Jan 10, 2025 18:44:38.986668110 CET6250180192.168.2.866.63.187.30
                            Jan 10, 2025 18:44:38.992228031 CET806250166.63.187.30192.168.2.8
                            Jan 10, 2025 18:44:49.074996948 CET6254580192.168.2.866.63.187.30
                            Jan 10, 2025 18:44:49.079857111 CET806254566.63.187.30192.168.2.8
                            Jan 10, 2025 18:44:49.079916000 CET6254580192.168.2.866.63.187.30
                            Jan 10, 2025 18:44:49.082113028 CET6254580192.168.2.866.63.187.30
                            Jan 10, 2025 18:44:49.086828947 CET806254566.63.187.30192.168.2.8
                            Jan 10, 2025 18:45:10.438780069 CET806254566.63.187.30192.168.2.8
                            Jan 10, 2025 18:45:10.438851118 CET6254580192.168.2.866.63.187.30
                            Jan 10, 2025 18:45:10.438962936 CET6254580192.168.2.866.63.187.30
                            Jan 10, 2025 18:45:10.443759918 CET806254566.63.187.30192.168.2.8
                            Jan 10, 2025 18:45:20.449126005 CET6274280192.168.2.866.63.187.30
                            Jan 10, 2025 18:45:20.454009056 CET806274266.63.187.30192.168.2.8
                            Jan 10, 2025 18:45:20.454103947 CET6274280192.168.2.866.63.187.30
                            Jan 10, 2025 18:45:20.454258919 CET6274280192.168.2.866.63.187.30
                            Jan 10, 2025 18:45:20.459043980 CET806274266.63.187.30192.168.2.8
                            Jan 10, 2025 18:45:41.846345901 CET806274266.63.187.30192.168.2.8
                            Jan 10, 2025 18:45:41.846519947 CET6274280192.168.2.866.63.187.30
                            Jan 10, 2025 18:45:41.846684933 CET6274280192.168.2.866.63.187.30
                            Jan 10, 2025 18:45:41.851526976 CET806274266.63.187.30192.168.2.8
                            Jan 10, 2025 18:45:51.857522011 CET6277180192.168.2.866.63.187.30
                            Jan 10, 2025 18:45:51.862471104 CET806277166.63.187.30192.168.2.8
                            Jan 10, 2025 18:45:51.862560034 CET6277180192.168.2.866.63.187.30
                            Jan 10, 2025 18:45:51.862773895 CET6277180192.168.2.866.63.187.30
                            Jan 10, 2025 18:45:51.867538929 CET806277166.63.187.30192.168.2.8
                            Jan 10, 2025 18:46:13.237919092 CET806277166.63.187.30192.168.2.8
                            Jan 10, 2025 18:46:13.238159895 CET6277180192.168.2.866.63.187.30
                            Jan 10, 2025 18:46:13.238310099 CET6277180192.168.2.866.63.187.30
                            Jan 10, 2025 18:46:13.243401051 CET806277166.63.187.30192.168.2.8
                            Jan 10, 2025 18:46:23.245652914 CET6277280192.168.2.866.63.187.30
                            Jan 10, 2025 18:46:23.250535965 CET806277266.63.187.30192.168.2.8
                            Jan 10, 2025 18:46:23.250636101 CET6277280192.168.2.866.63.187.30
                            Jan 10, 2025 18:46:23.250730991 CET6277280192.168.2.866.63.187.30
                            Jan 10, 2025 18:46:23.258133888 CET806277266.63.187.30192.168.2.8
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 10, 2025 18:43:59.547291994 CET5355791162.159.36.2192.168.2.8
                            Jan 10, 2025 18:44:00.036348104 CET6181153192.168.2.81.1.1.1
                            Jan 10, 2025 18:44:00.044504881 CET53618111.1.1.1192.168.2.8
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Jan 10, 2025 18:44:00.036348104 CET192.168.2.81.1.1.10xe467Standard query (0)18.31.95.13.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Jan 10, 2025 18:44:00.044504881 CET1.1.1.1192.168.2.80xe467Name error (3)18.31.95.13.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                            • 66.63.187.30
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.86250166.63.187.30804416C:\Users\user\Desktop\xLDz0WPZYc.exe
                            TimestampBytes transferredDirectionData
                            Jan 10, 2025 18:44:17.619534016 CET175OUTGET /AmDxXYvcZBeoV9.bin HTTP/1.1
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                            Host: 66.63.187.30
                            Cache-Control: no-cache


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            1192.168.2.86254566.63.187.30804416C:\Users\user\Desktop\xLDz0WPZYc.exe
                            TimestampBytes transferredDirectionData
                            Jan 10, 2025 18:44:49.082113028 CET175OUTGET /AmDxXYvcZBeoV9.bin HTTP/1.1
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                            Host: 66.63.187.30
                            Cache-Control: no-cache


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            2192.168.2.86274266.63.187.30804416C:\Users\user\Desktop\xLDz0WPZYc.exe
                            TimestampBytes transferredDirectionData
                            Jan 10, 2025 18:45:20.454258919 CET175OUTGET /AmDxXYvcZBeoV9.bin HTTP/1.1
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                            Host: 66.63.187.30
                            Cache-Control: no-cache


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            3192.168.2.86277166.63.187.30804416C:\Users\user\Desktop\xLDz0WPZYc.exe
                            TimestampBytes transferredDirectionData
                            Jan 10, 2025 18:45:51.862773895 CET175OUTGET /AmDxXYvcZBeoV9.bin HTTP/1.1
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                            Host: 66.63.187.30
                            Cache-Control: no-cache


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            4192.168.2.86277266.63.187.30804416C:\Users\user\Desktop\xLDz0WPZYc.exe
                            TimestampBytes transferredDirectionData
                            Jan 10, 2025 18:46:23.250730991 CET175OUTGET /AmDxXYvcZBeoV9.bin HTTP/1.1
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                            Host: 66.63.187.30
                            Cache-Control: no-cache


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:12:43:26
                            Start date:10/01/2025
                            Path:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\xLDz0WPZYc.exe"
                            Imagebase:0x400000
                            File size:576'325 bytes
                            MD5 hash:74E2251DFA1E7FBEB0E4E9BA2F6C56B4
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:3
                            Start time:12:44:08
                            Start date:10/01/2025
                            Path:C:\Users\user\Desktop\xLDz0WPZYc.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\xLDz0WPZYc.exe"
                            Imagebase:0x400000
                            File size:576'325 bytes
                            MD5 hash:74E2251DFA1E7FBEB0E4E9BA2F6C56B4
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:19.7%
                              Dynamic/Decrypted Code Coverage:14.6%
                              Signature Coverage:20.3%
                              Total number of Nodes:1429
                              Total number of Limit Nodes:38
                              execution_graph 4764 4022c0 4765 4022f0 4764->4765 4766 4022c5 4764->4766 4768 4029fd 18 API calls 4765->4768 4775 402b07 4766->4775 4770 4022f7 4768->4770 4769 4022cc 4771 40230d 4769->4771 4772 4029fd 18 API calls 4769->4772 4779 402a3d RegOpenKeyExA 4770->4779 4774 4022dd RegDeleteValueA RegCloseKey 4772->4774 4774->4771 4776 4029fd 18 API calls 4775->4776 4777 402b20 4776->4777 4778 402b2e RegOpenKeyExA 4777->4778 4778->4769 4782 402a68 4779->4782 4786 402ab4 4779->4786 4780 402a8e RegEnumKeyA 4781 402aa0 RegCloseKey 4780->4781 4780->4782 4783 405ee8 3 API calls 4781->4783 4782->4780 4782->4781 4784 402ac5 RegCloseKey 4782->4784 4787 402a3d 3 API calls 4782->4787 4785 402ab0 4783->4785 4784->4786 4785->4786 4788 402ae0 RegDeleteKeyA 4785->4788 4786->4771 4787->4782 4788->4786 4789 4019c0 4790 4029fd 18 API calls 4789->4790 4791 4019c7 4790->4791 4792 4029fd 18 API calls 4791->4792 4793 4019d0 4792->4793 4794 4019d7 lstrcmpiA 4793->4794 4795 4019e9 lstrcmpA 4793->4795 4796 4019dd 4794->4796 4795->4796 4797 402b42 4798 402b51 SetTimer 4797->4798 4799 402b6a 4797->4799 4798->4799 4800 402bbf 4799->4800 4801 402b84 MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 4799->4801 4801->4800 4802 402645 4803 4029fd 18 API calls 4802->4803 4804 40264c FindFirstFileA 4803->4804 4805 40266f 4804->4805 4808 40265f 4804->4808 4810 405b1b wsprintfA 4805->4810 4807 402676 4811 405bbd lstrcpynA 4807->4811 4810->4807 4811->4808 4812 4023c8 4813 402b07 19 API calls 4812->4813 4814 4023d2 4813->4814 4815 4029fd 18 API calls 4814->4815 4816 4023db 4815->4816 4817 402663 4816->4817 4818 4023e5 RegQueryValueExA 4816->4818 4819 402405 4818->4819 4820 40240b RegCloseKey 4818->4820 4819->4820 4823 405b1b wsprintfA 4819->4823 4820->4817 4823->4820 4827 401ccc GetDlgItem GetClientRect 4828 4029fd 18 API calls 4827->4828 4829 401cfc LoadImageA SendMessageA 4828->4829 4830 401d1a DeleteObject 4829->4830 4831 402892 4829->4831 4830->4831 4832 4035cc 4833 4035d7 4832->4833 4834 4035db 4833->4834 4835 4035de GlobalAlloc 4833->4835 4835->4834 4843 1000180d 4844 10001830 4843->4844 4845 10001860 GlobalFree 4844->4845 4846 10001872 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 4844->4846 4845->4846 4847 10001266 2 API calls 4846->4847 4848 100019e3 GlobalFree GlobalFree 4847->4848 4228 1000270f 4229 1000275f 4228->4229 4230 1000271f VirtualProtect 4228->4230 4230->4229 4231 4024d1 4232 4024d6 4231->4232 4233 4024e7 4231->4233 4234 4029e0 18 API calls 4232->4234 4235 4029fd 18 API calls 4233->4235 4238 4024dd 4234->4238 4236 4024ee lstrlenA 4235->4236 4236->4238 4237 402663 4238->4237 4239 40250d WriteFile 4238->4239 4239->4237 4269 4025d3 4270 4025da 4269->4270 4273 40283f 4269->4273 4271 4029e0 18 API calls 4270->4271 4272 4025e5 4271->4272 4274 4025ec SetFilePointer 4272->4274 4274->4273 4275 4025fc 4274->4275 4277 405b1b wsprintfA 4275->4277 4277->4273 4307 4014d6 4308 4029e0 18 API calls 4307->4308 4309 4014dc Sleep 4308->4309 4311 402892 4309->4311 4684 401dd8 4685 4029fd 18 API calls 4684->4685 4686 401dde 4685->4686 4687 4029fd 18 API calls 4686->4687 4688 401de7 4687->4688 4689 4029fd 18 API calls 4688->4689 4690 401df0 4689->4690 4691 4029fd 18 API calls 4690->4691 4692 401df9 4691->4692 4693 401423 25 API calls 4692->4693 4694 401e00 ShellExecuteA 4693->4694 4695 401e2d 4694->4695 4863 1000161a 4864 10001649 4863->4864 4865 10001a5d 18 API calls 4864->4865 4866 10001650 4865->4866 4867 10001663 4866->4867 4868 10001657 4866->4868 4870 1000168a 4867->4870 4871 1000166d 4867->4871 4869 10001266 2 API calls 4868->4869 4877 10001661 4869->4877 4872 10001690 4870->4872 4873 100016b4 4870->4873 4874 100014e2 3 API calls 4871->4874 4875 10001559 3 API calls 4872->4875 4876 100014e2 3 API calls 4873->4876 4878 10001672 4874->4878 4879 10001695 4875->4879 4876->4877 4880 10001559 3 API calls 4878->4880 4881 10001266 2 API calls 4879->4881 4882 10001678 4880->4882 4883 1000169b GlobalFree 4881->4883 4884 10001266 2 API calls 4882->4884 4883->4877 4886 100016af GlobalFree 4883->4886 4885 1000167e GlobalFree 4884->4885 4885->4877 4886->4877 4887 40155b 4888 401577 ShowWindow 4887->4888 4889 40157e 4887->4889 4888->4889 4890 402892 4889->4890 4891 40158c ShowWindow 4889->4891 4891->4890 4892 401edc 4893 4029fd 18 API calls 4892->4893 4894 401ee3 GetFileVersionInfoSizeA 4893->4894 4895 401f5c 4894->4895 4896 401f06 GlobalAlloc 4894->4896 4896->4895 4897 401f1a GetFileVersionInfoA 4896->4897 4897->4895 4898 401f2b VerQueryValueA 4897->4898 4898->4895 4899 401f44 4898->4899 4903 405b1b wsprintfA 4899->4903 4901 401f50 4904 405b1b wsprintfA 4901->4904 4903->4901 4904->4895 4910 4018e3 4911 40191a 4910->4911 4912 4029fd 18 API calls 4911->4912 4913 40191f 4912->4913 4914 40547d 71 API calls 4913->4914 4915 401928 4914->4915 3953 404fe4 3954 405006 GetDlgItem GetDlgItem GetDlgItem 3953->3954 3955 40518f 3953->3955 3999 403ea8 SendMessageA 3954->3999 3957 405197 GetDlgItem CreateThread CloseHandle 3955->3957 3958 4051bf 3955->3958 3957->3958 4013 404f78 OleInitialize 3957->4013 3960 4051ed 3958->3960 3961 4051d5 ShowWindow ShowWindow 3958->3961 3962 40520e 3958->3962 3959 405076 3964 40507d GetClientRect GetSystemMetrics SendMessageA SendMessageA 3959->3964 3963 4051f5 3960->3963 3965 405248 3960->3965 4001 403ea8 SendMessageA 3961->4001 3969 403eda 8 API calls 3962->3969 3967 405221 ShowWindow 3963->3967 3968 4051fd 3963->3968 3970 4050eb 3964->3970 3971 4050cf SendMessageA SendMessageA 3964->3971 3965->3962 3972 405255 SendMessageA 3965->3972 3975 405241 3967->3975 3976 405233 3967->3976 3973 403e4c SendMessageA 3968->3973 3974 40521a 3969->3974 3979 4050f0 SendMessageA 3970->3979 3980 4050fe 3970->3980 3971->3970 3972->3974 3981 40526e CreatePopupMenu 3972->3981 3973->3962 3978 403e4c SendMessageA 3975->3978 4002 404ea6 3976->4002 3978->3965 3979->3980 3983 403e73 19 API calls 3980->3983 3982 405bdf 18 API calls 3981->3982 3984 40527e AppendMenuA 3982->3984 3985 40510e 3983->3985 3986 40529c GetWindowRect 3984->3986 3987 4052af TrackPopupMenu 3984->3987 3988 405117 ShowWindow 3985->3988 3989 40514b GetDlgItem SendMessageA 3985->3989 3986->3987 3987->3974 3991 4052cb 3987->3991 3992 40512d ShowWindow 3988->3992 3994 40513a 3988->3994 3989->3974 3990 405172 SendMessageA SendMessageA 3989->3990 3990->3974 3993 4052ea SendMessageA 3991->3993 3992->3994 3993->3993 3995 405307 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3993->3995 4000 403ea8 SendMessageA 3994->4000 3997 405329 SendMessageA 3995->3997 3997->3997 3998 40534b GlobalUnlock SetClipboardData CloseClipboard 3997->3998 3998->3974 3999->3959 4000->3989 4001->3960 4003 404ec1 4002->4003 4012 404f64 4002->4012 4004 404ede lstrlenA 4003->4004 4005 405bdf 18 API calls 4003->4005 4006 404f07 4004->4006 4007 404eec lstrlenA 4004->4007 4005->4004 4008 404f1a 4006->4008 4009 404f0d SetWindowTextA 4006->4009 4010 404efe lstrcatA 4007->4010 4007->4012 4011 404f20 SendMessageA SendMessageA SendMessageA 4008->4011 4008->4012 4009->4008 4010->4006 4011->4012 4012->3975 4014 403ebf SendMessageA 4013->4014 4016 404f9b 4014->4016 4015 403ebf SendMessageA 4017 404fd4 OleUninitialize 4015->4017 4018 404fc2 4016->4018 4019 401389 2 API calls 4016->4019 4018->4015 4019->4016 4923 4018e6 4924 4029fd 18 API calls 4923->4924 4925 4018ed 4924->4925 4926 4053d1 MessageBoxIndirectA 4925->4926 4927 4018f6 4926->4927 4020 401f68 4021 401f7a 4020->4021 4022 402028 4020->4022 4041 4029fd 4021->4041 4025 401423 25 API calls 4022->4025 4031 402181 4025->4031 4026 4029fd 18 API calls 4027 401f8a 4026->4027 4028 401f92 GetModuleHandleA 4027->4028 4029 401f9f LoadLibraryExA 4027->4029 4028->4029 4030 401faf GetProcAddress 4028->4030 4029->4022 4029->4030 4032 401ffb 4030->4032 4033 401fbe 4030->4033 4036 404ea6 25 API calls 4032->4036 4034 401fc6 4033->4034 4035 401fdd 4033->4035 4089 401423 4034->4089 4047 100016bd 4035->4047 4038 401fce 4036->4038 4038->4031 4039 40201c FreeLibrary 4038->4039 4039->4031 4042 402a09 4041->4042 4043 405bdf 18 API calls 4042->4043 4044 402a2a 4043->4044 4045 401f81 4044->4045 4046 405e28 5 API calls 4044->4046 4045->4026 4046->4045 4048 100016ed 4047->4048 4092 10001a5d 4048->4092 4050 100016f4 4051 1000180a 4050->4051 4052 10001705 4050->4052 4053 1000170c 4050->4053 4051->4038 4141 100021b0 4052->4141 4124 100021fa 4053->4124 4058 10001770 4064 100017b2 4058->4064 4065 10001776 4058->4065 4059 10001752 4154 100023da 4059->4154 4060 10001722 4063 10001728 4060->4063 4069 10001733 4060->4069 4061 1000173b 4074 10001731 4061->4074 4151 10002aa7 4061->4151 4063->4074 4135 100027ec 4063->4135 4067 100023da 11 API calls 4064->4067 4071 10001559 3 API calls 4065->4071 4072 100017a4 4067->4072 4068 10001758 4165 10001559 4068->4165 4145 1000258d 4069->4145 4076 1000178c 4071->4076 4080 100017f9 4072->4080 4176 100023a0 4072->4176 4074->4058 4074->4059 4079 100023da 11 API calls 4076->4079 4078 10001739 4078->4074 4079->4072 4080->4051 4082 10001803 GlobalFree 4080->4082 4082->4051 4086 100017e5 4086->4080 4180 100014e2 wsprintfA 4086->4180 4087 100017de FreeLibrary 4087->4086 4090 404ea6 25 API calls 4089->4090 4091 401431 4090->4091 4091->4038 4183 10001215 GlobalAlloc 4092->4183 4094 10001a81 4184 10001215 GlobalAlloc 4094->4184 4096 10001cbb GlobalFree GlobalFree GlobalFree 4097 10001cd8 4096->4097 4116 10001d22 4096->4116 4099 1000201a 4097->4099 4108 10001ced 4097->4108 4097->4116 4098 10001a8c 4098->4096 4100 10001b60 GlobalAlloc 4098->4100 4102 10001bc9 GlobalFree 4098->4102 4105 10001bab lstrcpyA 4098->4105 4106 10001bb5 lstrcpyA 4098->4106 4111 10001f7a 4098->4111 4098->4116 4118 10001c07 4098->4118 4119 10001e75 GlobalFree 4098->4119 4122 10001224 2 API calls 4098->4122 4190 10001215 GlobalAlloc 4098->4190 4101 1000203c GetModuleHandleA 4099->4101 4099->4116 4100->4098 4103 10002062 4101->4103 4104 1000204d LoadLibraryA 4101->4104 4102->4098 4191 100015a4 GetProcAddress 4103->4191 4104->4103 4104->4116 4105->4106 4106->4098 4108->4116 4187 10001224 4108->4187 4109 10002074 4110 100020b3 4109->4110 4123 1000209d GetProcAddress 4109->4123 4112 100020c0 lstrlenA 4110->4112 4110->4116 4111->4116 4117 10001fbe lstrcpyA 4111->4117 4192 100015a4 GetProcAddress 4112->4192 4116->4050 4117->4116 4118->4098 4185 10001534 GlobalSize GlobalAlloc 4118->4185 4119->4098 4120 100020d9 4120->4116 4122->4098 4123->4110 4133 10002212 4124->4133 4126 10002349 GlobalFree 4129 10001712 4126->4129 4126->4133 4127 100022b9 GlobalAlloc MultiByteToWideChar 4131 10002303 4127->4131 4132 100022e3 GlobalAlloc CLSIDFromString GlobalFree 4127->4132 4128 1000230a lstrlenA 4128->4126 4128->4131 4129->4060 4129->4061 4129->4074 4130 10001224 GlobalAlloc lstrcpynA 4130->4133 4131->4126 4198 10002521 4131->4198 4132->4126 4133->4126 4133->4127 4133->4128 4133->4130 4194 100012ad 4133->4194 4138 100027fe 4135->4138 4136 100028a3 SetFilePointer 4137 100028c1 4136->4137 4139 100029b2 GetLastError 4137->4139 4140 100029bd 4137->4140 4138->4136 4139->4140 4140->4074 4142 100021c0 4141->4142 4143 1000170b 4141->4143 4142->4143 4144 100021d2 GlobalAlloc 4142->4144 4143->4053 4144->4142 4149 100025a9 4145->4149 4146 100025fa GlobalAlloc 4150 1000261c 4146->4150 4147 1000260d 4148 10002612 GlobalSize 4147->4148 4147->4150 4148->4150 4149->4146 4149->4147 4150->4078 4152 10002ab2 4151->4152 4153 10002af2 GlobalFree 4152->4153 4201 10001215 GlobalAlloc 4154->4201 4156 10002473 WideCharToMultiByte 4162 100023e6 4156->4162 4157 1000243a lstrcpynA 4157->4162 4158 1000244b StringFromGUID2 WideCharToMultiByte 4158->4162 4159 10002494 wsprintfA 4159->4162 4160 100024b8 GlobalFree 4160->4162 4161 100024f2 GlobalFree 4161->4068 4162->4156 4162->4157 4162->4158 4162->4159 4162->4160 4162->4161 4163 10001266 2 API calls 4162->4163 4202 100012d1 4162->4202 4163->4162 4206 10001215 GlobalAlloc 4165->4206 4167 1000155f 4168 1000156c lstrcpyA 4167->4168 4170 10001586 4167->4170 4171 100015a0 4168->4171 4170->4171 4172 1000158b wsprintfA 4170->4172 4173 10001266 4171->4173 4172->4171 4174 100012a8 GlobalFree 4173->4174 4175 1000126f GlobalAlloc lstrcpynA 4173->4175 4174->4072 4175->4174 4177 100017c5 4176->4177 4178 100023ae 4176->4178 4177->4086 4177->4087 4178->4177 4179 100023c7 GlobalFree 4178->4179 4179->4178 4181 10001266 2 API calls 4180->4181 4182 10001503 4181->4182 4182->4080 4183->4094 4184->4098 4186 10001552 4185->4186 4186->4118 4193 10001215 GlobalAlloc 4187->4193 4189 10001233 lstrcpynA 4189->4116 4190->4098 4191->4109 4192->4120 4193->4189 4195 100012b4 4194->4195 4196 10001224 2 API calls 4195->4196 4197 100012cf 4196->4197 4197->4133 4199 10002585 4198->4199 4200 1000252f VirtualAlloc 4198->4200 4199->4131 4200->4199 4201->4162 4203 100012f9 4202->4203 4204 100012da 4202->4204 4203->4162 4204->4203 4205 100012e0 lstrcpyA 4204->4205 4205->4203 4206->4167 4928 40426a 4929 4042a0 4928->4929 4930 40427a 4928->4930 4932 403eda 8 API calls 4929->4932 4931 403e73 19 API calls 4930->4931 4933 404287 SetDlgItemTextA 4931->4933 4934 4042ac 4932->4934 4933->4929 4935 40286d SendMessageA 4936 402887 InvalidateRect 4935->4936 4937 402892 4935->4937 4936->4937 4938 4014f0 SetForegroundWindow 4939 402892 4938->4939 4940 401af0 4941 4029fd 18 API calls 4940->4941 4942 401af7 4941->4942 4943 4029e0 18 API calls 4942->4943 4944 401b00 wsprintfA 4943->4944 4945 402892 4944->4945 4240 4019f1 4241 4029fd 18 API calls 4240->4241 4242 4019fa ExpandEnvironmentStringsA 4241->4242 4243 401a0e 4242->4243 4245 401a21 4242->4245 4244 401a13 lstrcmpA 4243->4244 4243->4245 4244->4245 4946 100015b3 4952 100014bb 4946->4952 4948 10001611 GlobalFree 4949 100015cb 4949->4948 4950 100015e6 4949->4950 4951 100015fd VirtualFree 4949->4951 4950->4948 4951->4948 4954 100014c1 4952->4954 4953 100014c7 4953->4949 4954->4953 4955 100014d3 GlobalFree 4954->4955 4955->4949 4956 401c78 4957 4029e0 18 API calls 4956->4957 4958 401c7e IsWindow 4957->4958 4959 4019e1 4958->4959 4967 1000103d 4970 1000101b 4967->4970 4971 100014bb GlobalFree 4970->4971 4972 10001020 4971->4972 4973 10001027 GlobalAlloc 4972->4973 4974 10001024 4972->4974 4973->4974 4975 100014e2 3 API calls 4974->4975 4976 1000103b 4975->4976 4977 4014fe 4978 401506 4977->4978 4980 401519 4977->4980 4979 4029e0 18 API calls 4978->4979 4979->4980 4716 40227f 4717 4029fd 18 API calls 4716->4717 4718 402290 4717->4718 4719 4029fd 18 API calls 4718->4719 4720 402299 4719->4720 4721 4029fd 18 API calls 4720->4721 4722 4022a3 GetPrivateProfileStringA 4721->4722 4981 401000 4982 401037 BeginPaint GetClientRect 4981->4982 4983 40100c DefWindowProcA 4981->4983 4985 4010f3 4982->4985 4986 401179 4983->4986 4987 401073 CreateBrushIndirect FillRect DeleteObject 4985->4987 4988 4010fc 4985->4988 4987->4985 4989 401102 CreateFontIndirectA 4988->4989 4990 401167 EndPaint 4988->4990 4989->4990 4991 401112 6 API calls 4989->4991 4990->4986 4991->4990 4992 404601 4993 404611 4992->4993 4994 40462d 4992->4994 5003 4053b5 GetDlgItemTextA 4993->5003 4996 404660 4994->4996 4997 404633 SHGetPathFromIDListA 4994->4997 4999 40464a SendMessageA 4997->4999 5000 404643 4997->5000 4998 40461e SendMessageA 4998->4994 4999->4996 5001 40140b 2 API calls 5000->5001 5001->4999 5003->4998 5004 402602 5005 402892 5004->5005 5006 402609 5004->5006 5007 40260f FindClose 5006->5007 5007->5005 5008 401705 5009 4029fd 18 API calls 5008->5009 5010 40170c SearchPathA 5009->5010 5011 401727 5010->5011 5013 4027bd 5010->5013 5011->5013 5014 405bbd lstrcpynA 5011->5014 5014->5013 5015 100029c7 5016 100029df 5015->5016 5017 10001534 2 API calls 5016->5017 5018 100029fa 5017->5018 5019 403f87 lstrcpynA lstrlenA 5020 40280a 5021 4029e0 18 API calls 5020->5021 5022 402810 5021->5022 5023 402841 5022->5023 5025 402663 5022->5025 5026 40281e 5022->5026 5024 405bdf 18 API calls 5023->5024 5023->5025 5024->5025 5026->5025 5028 405b1b wsprintfA 5026->5028 5028->5025 5036 40218a 5037 4029fd 18 API calls 5036->5037 5038 402190 5037->5038 5039 4029fd 18 API calls 5038->5039 5040 402199 5039->5040 5041 4029fd 18 API calls 5040->5041 5042 4021a2 5041->5042 5043 405ec1 2 API calls 5042->5043 5044 4021ab 5043->5044 5045 4021bc lstrlenA lstrlenA 5044->5045 5049 4021af 5044->5049 5046 404ea6 25 API calls 5045->5046 5048 4021f8 SHFileOperationA 5046->5048 5047 404ea6 25 API calls 5050 4021b7 5047->5050 5048->5049 5048->5050 5049->5047 5049->5050 5051 40220c 5052 402213 5051->5052 5055 402226 5051->5055 5053 405bdf 18 API calls 5052->5053 5054 402220 5053->5054 5056 4053d1 MessageBoxIndirectA 5054->5056 5056->5055 5057 401490 5058 404ea6 25 API calls 5057->5058 5059 401497 5058->5059 5060 401b11 5061 401b62 5060->5061 5063 401b1e 5060->5063 5062 401b8b GlobalAlloc 5061->5062 5065 401b66 5061->5065 5066 405bdf 18 API calls 5062->5066 5067 401b35 5063->5067 5070 401ba6 5063->5070 5064 405bdf 18 API calls 5068 402220 5064->5068 5075 402226 5065->5075 5081 405bbd lstrcpynA 5065->5081 5066->5070 5079 405bbd lstrcpynA 5067->5079 5074 4053d1 MessageBoxIndirectA 5068->5074 5070->5064 5070->5075 5072 401b78 GlobalFree 5072->5075 5073 401b44 5080 405bbd lstrcpynA 5073->5080 5074->5075 5077 401b53 5082 405bbd lstrcpynA 5077->5082 5079->5073 5080->5077 5081->5072 5082->5075 4303 401595 4304 4029fd 18 API calls 4303->4304 4305 40159c SetFileAttributesA 4304->4305 4306 4015ae 4305->4306 5083 401c95 5084 4029e0 18 API calls 5083->5084 5085 401c9c 5084->5085 5086 4029e0 18 API calls 5085->5086 5087 401ca4 GetDlgItem 5086->5087 5088 4024cb 5087->5088 5089 406197 5093 40601b 5089->5093 5090 406986 5091 4060a5 GlobalAlloc 5091->5090 5091->5093 5092 40609c GlobalFree 5092->5091 5093->5090 5093->5091 5093->5092 5093->5093 5094 406113 GlobalFree 5093->5094 5095 40611c GlobalAlloc 5093->5095 5094->5095 5095->5090 5095->5093 5096 10001058 5098 10001074 5096->5098 5097 100010dc 5098->5097 5099 10001091 5098->5099 5100 100014bb GlobalFree 5098->5100 5101 100014bb GlobalFree 5099->5101 5100->5099 5102 100010a1 5101->5102 5103 100010b1 5102->5103 5104 100010a8 GlobalSize 5102->5104 5105 100010b5 GlobalAlloc 5103->5105 5106 100010c6 5103->5106 5104->5103 5107 100014e2 3 API calls 5105->5107 5108 100010d1 GlobalFree 5106->5108 5107->5106 5108->5097 4696 402519 4697 4029e0 18 API calls 4696->4697 4702 402523 4697->4702 4698 40258d 4699 4058c6 ReadFile 4699->4702 4700 40258f 4705 405b1b wsprintfA 4700->4705 4702->4698 4702->4699 4702->4700 4703 40259f 4702->4703 4703->4698 4704 4025b5 SetFilePointer 4703->4704 4704->4698 4705->4698 5109 404e1a 5110 404e2a 5109->5110 5111 404e3e 5109->5111 5112 404e30 5110->5112 5121 404e87 5110->5121 5113 404e46 IsWindowVisible 5111->5113 5119 404e5d 5111->5119 5115 403ebf SendMessageA 5112->5115 5116 404e53 5113->5116 5113->5121 5114 404e8c CallWindowProcA 5117 404e3a 5114->5117 5115->5117 5122 404771 SendMessageA 5116->5122 5119->5114 5127 4047f1 5119->5127 5121->5114 5123 4047d0 SendMessageA 5122->5123 5124 404794 GetMessagePos ScreenToClient SendMessageA 5122->5124 5125 4047c8 5123->5125 5124->5125 5126 4047cd 5124->5126 5125->5119 5126->5123 5136 405bbd lstrcpynA 5127->5136 5129 404804 5137 405b1b wsprintfA 5129->5137 5131 40480e 5132 40140b 2 API calls 5131->5132 5133 404817 5132->5133 5138 405bbd lstrcpynA 5133->5138 5135 40481e 5135->5121 5136->5129 5137->5131 5138->5135 5139 40261c 5140 402637 5139->5140 5141 40261f 5139->5141 5142 4027bd 5140->5142 5145 405bbd lstrcpynA 5140->5145 5143 40262c FindNextFileA 5141->5143 5143->5140 5145->5142 5146 40231c 5147 402322 5146->5147 5148 4029fd 18 API calls 5147->5148 5149 402334 5148->5149 5150 4029fd 18 API calls 5149->5150 5151 40233e RegCreateKeyExA 5150->5151 5152 402368 5151->5152 5155 402663 5151->5155 5153 402380 5152->5153 5154 4029fd 18 API calls 5152->5154 5157 4029e0 18 API calls 5153->5157 5159 40238c 5153->5159 5156 402379 lstrlenA 5154->5156 5156->5153 5157->5159 5158 4023a7 RegSetValueExA 5161 4023bd RegCloseKey 5158->5161 5159->5158 5160 402e62 37 API calls 5159->5160 5160->5158 5161->5155 3811 4039a0 3812 403af3 3811->3812 3813 4039b8 3811->3813 3815 403b44 3812->3815 3816 403b04 GetDlgItem GetDlgItem 3812->3816 3813->3812 3814 4039c4 3813->3814 3818 4039e2 3814->3818 3819 4039cf SetWindowPos 3814->3819 3817 403b9e 3815->3817 3828 401389 2 API calls 3815->3828 3820 403e73 19 API calls 3816->3820 3873 403aee 3817->3873 3881 403ebf 3817->3881 3823 4039e7 ShowWindow 3818->3823 3824 4039ff 3818->3824 3819->3818 3821 403b2e SetClassLongA 3820->3821 3825 40140b 2 API calls 3821->3825 3823->3824 3826 403a21 3824->3826 3827 403a07 DestroyWindow 3824->3827 3825->3815 3829 403a26 SetWindowLongA 3826->3829 3830 403a37 3826->3830 3836 403dfc 3827->3836 3831 403b76 3828->3831 3829->3873 3833 403ae0 3830->3833 3834 403a43 GetDlgItem 3830->3834 3831->3817 3835 403b7a SendMessageA 3831->3835 3832 403dfe DestroyWindow EndDialog 3832->3836 3918 403eda 3833->3918 3838 403a73 3834->3838 3839 403a56 SendMessageA IsWindowEnabled 3834->3839 3835->3873 3841 403e2d ShowWindow 3836->3841 3836->3873 3837 40140b 2 API calls 3870 403bb0 3837->3870 3843 403a80 3838->3843 3845 403ac7 SendMessageA 3838->3845 3846 403a93 3838->3846 3853 403a78 3838->3853 3839->3838 3839->3873 3841->3873 3843->3845 3843->3853 3845->3833 3848 403ab0 3846->3848 3849 403a9b 3846->3849 3847 403aae 3847->3833 3851 40140b 2 API calls 3848->3851 3912 40140b 3849->3912 3850 403e73 19 API calls 3850->3870 3854 403ab7 3851->3854 3915 403e4c 3853->3915 3854->3833 3854->3853 3856 403c2b GetDlgItem 3857 403c40 3856->3857 3858 403c48 ShowWindow KiUserCallbackDispatcher 3856->3858 3857->3858 3905 403e95 KiUserCallbackDispatcher 3858->3905 3860 403c72 EnableWindow 3863 403c86 3860->3863 3861 403c8b GetSystemMenu EnableMenuItem SendMessageA 3862 403cbb SendMessageA 3861->3862 3861->3863 3862->3863 3863->3861 3906 403ea8 SendMessageA 3863->3906 3907 405bbd lstrcpynA 3863->3907 3866 403ce9 lstrlenA 3867 405bdf 18 API calls 3866->3867 3868 403cfa SetWindowTextA 3867->3868 3908 401389 3868->3908 3870->3832 3870->3837 3870->3850 3871 403d3e DestroyWindow 3870->3871 3870->3873 3884 405bdf 3870->3884 3902 403e73 3870->3902 3871->3836 3872 403d58 CreateDialogParamA 3871->3872 3872->3836 3874 403d8b 3872->3874 3875 403e73 19 API calls 3874->3875 3876 403d96 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3875->3876 3877 401389 2 API calls 3876->3877 3878 403ddc 3877->3878 3878->3873 3879 403de4 ShowWindow 3878->3879 3880 403ebf SendMessageA 3879->3880 3880->3836 3882 403ed7 3881->3882 3883 403ec8 SendMessageA 3881->3883 3882->3870 3883->3882 3890 405bec 3884->3890 3885 405e0f 3886 405e24 3885->3886 3948 405bbd lstrcpynA 3885->3948 3886->3870 3888 405c8d GetVersion 3888->3890 3889 405de6 lstrlenA 3889->3890 3890->3885 3890->3888 3890->3889 3892 405bdf 10 API calls 3890->3892 3895 405d05 GetSystemDirectoryA 3890->3895 3896 405d18 GetWindowsDirectoryA 3890->3896 3898 405bdf 10 API calls 3890->3898 3899 405d8f lstrcatA 3890->3899 3900 405d4c SHGetSpecialFolderLocation 3890->3900 3932 405aa4 RegOpenKeyExA 3890->3932 3937 405e28 3890->3937 3946 405b1b wsprintfA 3890->3946 3947 405bbd lstrcpynA 3890->3947 3892->3889 3895->3890 3896->3890 3898->3890 3899->3890 3900->3890 3901 405d64 SHGetPathFromIDListA CoTaskMemFree 3900->3901 3901->3890 3903 405bdf 18 API calls 3902->3903 3904 403e7e SetDlgItemTextA 3903->3904 3904->3856 3905->3860 3906->3863 3907->3866 3910 401390 3908->3910 3909 4013fe 3909->3870 3910->3909 3911 4013cb MulDiv SendMessageA 3910->3911 3911->3910 3913 401389 2 API calls 3912->3913 3914 401420 3913->3914 3914->3853 3916 403e53 3915->3916 3917 403e59 SendMessageA 3915->3917 3916->3917 3917->3847 3919 403f7b 3918->3919 3920 403ef2 GetWindowLongA 3918->3920 3919->3873 3920->3919 3921 403f03 3920->3921 3922 403f12 GetSysColor 3921->3922 3923 403f15 3921->3923 3922->3923 3924 403f25 SetBkMode 3923->3924 3925 403f1b SetTextColor 3923->3925 3926 403f43 3924->3926 3927 403f3d GetSysColor 3924->3927 3925->3924 3928 403f54 3926->3928 3929 403f4a SetBkColor 3926->3929 3927->3926 3928->3919 3930 403f67 DeleteObject 3928->3930 3931 403f6e CreateBrushIndirect 3928->3931 3929->3928 3930->3931 3931->3919 3933 405b15 3932->3933 3934 405ad7 RegQueryValueExA 3932->3934 3933->3890 3935 405af8 RegCloseKey 3934->3935 3935->3933 3944 405e34 3937->3944 3938 405ea0 CharPrevA 3942 405e9c 3938->3942 3939 405e91 CharNextA 3939->3942 3939->3944 3940 405ebb 3940->3890 3942->3938 3942->3940 3943 405e7f CharNextA 3943->3944 3944->3939 3944->3942 3944->3943 3945 405e8c CharNextA 3944->3945 3949 405678 3944->3949 3945->3939 3946->3890 3947->3890 3948->3886 3950 40567e 3949->3950 3951 405691 3950->3951 3952 405684 CharNextA 3950->3952 3951->3944 3952->3950 5163 100010e0 5172 1000110e 5163->5172 5164 100011c4 GlobalFree 5165 100012ad 2 API calls 5165->5172 5166 100011c3 5166->5164 5167 10001155 GlobalAlloc 5167->5172 5168 100011ea GlobalFree 5168->5172 5169 10001266 2 API calls 5171 100011b1 GlobalFree 5169->5171 5170 100012d1 lstrcpyA 5170->5172 5171->5172 5172->5164 5172->5165 5172->5166 5172->5167 5172->5168 5172->5169 5172->5170 5172->5171 5173 4064a0 5175 40601b 5173->5175 5174 406986 5175->5174 5176 4060a5 GlobalAlloc 5175->5176 5177 40609c GlobalFree 5175->5177 5178 406113 GlobalFree 5175->5178 5179 40611c GlobalAlloc 5175->5179 5176->5174 5176->5175 5177->5176 5178->5179 5179->5174 5179->5175 5180 4016a1 5181 4029fd 18 API calls 5180->5181 5182 4016a7 GetFullPathNameA 5181->5182 5183 4016df 5182->5183 5184 4016be 5182->5184 5185 402892 5183->5185 5186 4016f3 GetShortPathNameA 5183->5186 5184->5183 5187 405ec1 2 API calls 5184->5187 5186->5185 5188 4016cf 5187->5188 5188->5183 5190 405bbd lstrcpynA 5188->5190 5190->5183 5191 10002162 5192 100021c0 5191->5192 5194 100021f6 5191->5194 5193 100021d2 GlobalAlloc 5192->5193 5192->5194 5193->5192 5195 404823 GetDlgItem GetDlgItem 5196 404875 7 API calls 5195->5196 5203 404a8d 5195->5203 5197 404918 DeleteObject 5196->5197 5198 40490b SendMessageA 5196->5198 5199 404921 5197->5199 5198->5197 5201 404958 5199->5201 5202 405bdf 18 API calls 5199->5202 5200 404b71 5205 404c1d 5200->5205 5215 404bca SendMessageA 5200->5215 5238 404a80 5200->5238 5204 403e73 19 API calls 5201->5204 5207 40493a SendMessageA SendMessageA 5202->5207 5203->5200 5206 404afe 5203->5206 5213 404771 5 API calls 5203->5213 5210 40496c 5204->5210 5208 404c27 SendMessageA 5205->5208 5209 404c2f 5205->5209 5206->5200 5212 404b63 SendMessageA 5206->5212 5207->5199 5208->5209 5218 404c41 ImageList_Destroy 5209->5218 5219 404c48 5209->5219 5230 404c58 5209->5230 5214 403e73 19 API calls 5210->5214 5211 403eda 8 API calls 5217 404e13 5211->5217 5212->5200 5213->5206 5220 40497a 5214->5220 5216 404bdf SendMessageA 5215->5216 5215->5238 5226 404bf2 5216->5226 5218->5219 5222 404c51 GlobalFree 5219->5222 5219->5230 5223 404a4e GetWindowLongA SetWindowLongA 5220->5223 5229 4049c9 SendMessageA 5220->5229 5232 404a48 5220->5232 5235 404a05 SendMessageA 5220->5235 5236 404a16 SendMessageA 5220->5236 5221 404dc7 5224 404dd9 ShowWindow GetDlgItem ShowWindow 5221->5224 5221->5238 5222->5230 5225 404a67 5223->5225 5224->5238 5227 404a85 5225->5227 5228 404a6d ShowWindow 5225->5228 5231 404c03 SendMessageA 5226->5231 5247 403ea8 SendMessageA 5227->5247 5246 403ea8 SendMessageA 5228->5246 5229->5220 5230->5221 5237 4047f1 4 API calls 5230->5237 5242 404c93 5230->5242 5231->5205 5232->5223 5232->5225 5235->5220 5236->5220 5237->5242 5238->5211 5239 404d9d InvalidateRect 5239->5221 5240 404db3 5239->5240 5248 40472c 5240->5248 5241 404cc1 SendMessageA 5245 404cd7 5241->5245 5242->5241 5242->5245 5244 404d4b SendMessageA SendMessageA 5244->5245 5245->5239 5245->5244 5246->5238 5247->5203 5251 404667 5248->5251 5250 404741 5250->5221 5252 40467d 5251->5252 5253 405bdf 18 API calls 5252->5253 5254 4046e1 5253->5254 5255 405bdf 18 API calls 5254->5255 5256 4046ec 5255->5256 5257 405bdf 18 API calls 5256->5257 5258 404702 lstrlenA wsprintfA SetDlgItemTextA 5257->5258 5258->5250 5259 401d26 GetDC GetDeviceCaps 5260 4029e0 18 API calls 5259->5260 5261 401d44 MulDiv ReleaseDC 5260->5261 5262 4029e0 18 API calls 5261->5262 5263 401d63 5262->5263 5264 405bdf 18 API calls 5263->5264 5265 401d9c CreateFontIndirectA 5264->5265 5266 4024cb 5265->5266 4207 40172c 4208 4029fd 18 API calls 4207->4208 4209 401733 4208->4209 4213 40587d 4209->4213 4211 40173a 4212 40587d 2 API calls 4211->4212 4212->4211 4214 405888 GetTickCount GetTempFileNameA 4213->4214 4215 4058b9 4214->4215 4216 4058b5 4214->4216 4215->4211 4216->4214 4216->4215 4217 401dac 4225 4029e0 4217->4225 4219 401db2 4220 4029e0 18 API calls 4219->4220 4221 401dbb 4220->4221 4222 401dc2 ShowWindow 4221->4222 4223 401dcd EnableWindow 4221->4223 4224 402892 4222->4224 4223->4224 4226 405bdf 18 API calls 4225->4226 4227 4029f4 4226->4227 4227->4219 5267 401eac 5268 4029fd 18 API calls 5267->5268 5269 401eb3 5268->5269 5270 405ec1 2 API calls 5269->5270 5271 401eb9 5270->5271 5273 401ecb 5271->5273 5274 405b1b wsprintfA 5271->5274 5274->5273 5275 40192d 5276 4029fd 18 API calls 5275->5276 5277 401934 lstrlenA 5276->5277 5278 4024cb 5277->5278 5279 4024af 5280 4029fd 18 API calls 5279->5280 5281 4024b6 5280->5281 5284 40584e GetFileAttributesA CreateFileA 5281->5284 5283 4024c2 5284->5283 5285 401cb0 5286 4029e0 18 API calls 5285->5286 5287 401cc0 SetWindowLongA 5286->5287 5288 402892 5287->5288 5289 401a31 5290 4029e0 18 API calls 5289->5290 5291 401a37 5290->5291 5292 4029e0 18 API calls 5291->5292 5293 4019e1 5292->5293 5294 4042b1 5295 4042dd 5294->5295 5296 4042ee 5294->5296 5355 4053b5 GetDlgItemTextA 5295->5355 5297 4042fa GetDlgItem 5296->5297 5304 404359 5296->5304 5299 40430e 5297->5299 5303 404322 SetWindowTextA 5299->5303 5307 4056e6 4 API calls 5299->5307 5300 40443d 5353 4045e6 5300->5353 5357 4053b5 GetDlgItemTextA 5300->5357 5301 4042e8 5302 405e28 5 API calls 5301->5302 5302->5296 5308 403e73 19 API calls 5303->5308 5304->5300 5309 405bdf 18 API calls 5304->5309 5304->5353 5306 403eda 8 API calls 5311 4045fa 5306->5311 5312 404318 5307->5312 5313 40433e 5308->5313 5314 4043cd SHBrowseForFolderA 5309->5314 5310 40446d 5315 40573b 18 API calls 5310->5315 5312->5303 5319 40564d 3 API calls 5312->5319 5316 403e73 19 API calls 5313->5316 5314->5300 5317 4043e5 CoTaskMemFree 5314->5317 5318 404473 5315->5318 5320 40434c 5316->5320 5321 40564d 3 API calls 5317->5321 5358 405bbd lstrcpynA 5318->5358 5319->5303 5356 403ea8 SendMessageA 5320->5356 5324 4043f2 5321->5324 5326 404429 SetDlgItemTextA 5324->5326 5330 405bdf 18 API calls 5324->5330 5325 404352 5328 405ee8 3 API calls 5325->5328 5326->5300 5327 40448a 5329 405ee8 3 API calls 5327->5329 5328->5304 5338 404492 5329->5338 5331 404411 lstrcmpiA 5330->5331 5331->5326 5333 404422 lstrcatA 5331->5333 5332 4044cc 5359 405bbd lstrcpynA 5332->5359 5333->5326 5335 4044d5 5336 4056e6 4 API calls 5335->5336 5337 4044db GetDiskFreeSpaceA 5336->5337 5340 4044fd MulDiv 5337->5340 5343 404524 5337->5343 5338->5332 5341 405694 2 API calls 5338->5341 5338->5343 5340->5343 5341->5338 5342 404595 5345 4045b8 5342->5345 5347 40140b 2 API calls 5342->5347 5343->5342 5344 40472c 21 API calls 5343->5344 5346 404582 5344->5346 5360 403e95 KiUserCallbackDispatcher 5345->5360 5348 404597 SetDlgItemTextA 5346->5348 5349 404587 5346->5349 5347->5345 5348->5342 5351 404667 21 API calls 5349->5351 5351->5342 5352 4045d4 5352->5353 5361 404246 5352->5361 5353->5306 5355->5301 5356->5325 5357->5310 5358->5327 5359->5335 5360->5352 5362 404254 5361->5362 5363 404259 SendMessageA 5361->5363 5362->5363 5363->5353 4246 401e32 4247 4029fd 18 API calls 4246->4247 4248 401e38 4247->4248 4249 404ea6 25 API calls 4248->4249 4250 401e42 4249->4250 4261 40536c CreateProcessA 4250->4261 4252 401e9e CloseHandle 4256 402663 4252->4256 4253 401e67 WaitForSingleObject 4254 401e48 4253->4254 4255 401e75 GetExitCodeProcess 4253->4255 4254->4252 4254->4253 4254->4256 4264 405f21 4254->4264 4258 401e90 4255->4258 4259 401e87 4255->4259 4258->4252 4268 405b1b wsprintfA 4259->4268 4262 4053ab 4261->4262 4263 40539f CloseHandle 4261->4263 4262->4254 4263->4262 4265 405f3e PeekMessageA 4264->4265 4266 405f34 DispatchMessageA 4265->4266 4267 405f4e 4265->4267 4266->4265 4267->4253 4268->4258 4278 4015b3 4279 4029fd 18 API calls 4278->4279 4280 4015ba 4279->4280 4296 4056e6 CharNextA CharNextA 4280->4296 4282 40160a 4284 401638 4282->4284 4285 40160f 4282->4285 4283 405678 CharNextA 4286 4015d0 CreateDirectoryA 4283->4286 4290 401423 25 API calls 4284->4290 4287 401423 25 API calls 4285->4287 4288 4015e5 GetLastError 4286->4288 4292 4015c2 4286->4292 4289 401616 4287->4289 4291 4015f2 GetFileAttributesA 4288->4291 4288->4292 4302 405bbd lstrcpynA 4289->4302 4295 401630 4290->4295 4291->4292 4292->4282 4292->4283 4294 401621 SetCurrentDirectoryA 4294->4295 4297 405711 4296->4297 4298 405701 4296->4298 4300 405678 CharNextA 4297->4300 4301 405731 4297->4301 4298->4297 4299 40570c CharNextA 4298->4299 4299->4301 4300->4297 4301->4292 4302->4294 4312 4030b6 #17 SetErrorMode OleInitialize 4387 405ee8 GetModuleHandleA 4312->4387 4316 403126 GetCommandLineA 4392 405bbd lstrcpynA 4316->4392 4318 403138 GetModuleHandleA 4319 40314f 4318->4319 4320 405678 CharNextA 4319->4320 4321 403163 CharNextA 4320->4321 4327 403173 4321->4327 4322 40323d 4323 403250 GetTempPathA 4322->4323 4393 403082 4323->4393 4325 403268 4328 4032c2 DeleteFileA 4325->4328 4329 40326c GetWindowsDirectoryA lstrcatA 4325->4329 4326 405678 CharNextA 4326->4327 4327->4322 4327->4326 4332 40323f 4327->4332 4401 402c29 GetTickCount GetModuleFileNameA 4328->4401 4331 403082 11 API calls 4329->4331 4334 403288 4331->4334 4483 405bbd lstrcpynA 4332->4483 4333 4032d6 4341 405678 CharNextA 4333->4341 4370 40335c 4333->4370 4381 40336c 4333->4381 4334->4328 4336 40328c GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4334->4336 4337 403082 11 API calls 4336->4337 4339 4032ba 4337->4339 4339->4328 4339->4381 4343 4032f1 4341->4343 4350 403337 4343->4350 4351 40339b lstrcatA lstrcmpiA 4343->4351 4344 403385 4507 4053d1 4344->4507 4345 403479 4346 40351c ExitProcess 4345->4346 4349 405ee8 3 API calls 4345->4349 4353 40348c 4349->4353 4484 40573b 4350->4484 4355 4033b7 CreateDirectoryA SetCurrentDirectoryA 4351->4355 4351->4381 4358 405ee8 3 API calls 4353->4358 4356 4033d9 4355->4356 4357 4033ce 4355->4357 4512 405bbd lstrcpynA 4356->4512 4511 405bbd lstrcpynA 4357->4511 4362 403495 4358->4362 4364 405ee8 3 API calls 4362->4364 4366 40349e 4364->4366 4365 403351 4499 405bbd lstrcpynA 4365->4499 4369 4034bc 4366->4369 4375 4034ac GetCurrentProcess 4366->4375 4368 405bdf 18 API calls 4371 403418 DeleteFileA 4368->4371 4372 405ee8 3 API calls 4369->4372 4429 40360e 4370->4429 4373 403425 CopyFileA 4371->4373 4384 4033e7 4371->4384 4374 4034f3 4372->4374 4373->4384 4377 403508 ExitWindowsEx 4374->4377 4380 403515 4374->4380 4375->4369 4376 40346d 4378 405a71 40 API calls 4376->4378 4377->4346 4377->4380 4378->4381 4382 40140b 2 API calls 4380->4382 4500 403534 4381->4500 4382->4346 4383 405bdf 18 API calls 4383->4384 4384->4368 4384->4376 4384->4383 4385 40536c 2 API calls 4384->4385 4386 403459 CloseHandle 4384->4386 4513 405a71 4384->4513 4385->4384 4386->4384 4388 405f04 LoadLibraryA 4387->4388 4389 405f0f GetProcAddress 4387->4389 4388->4389 4390 4030fb SHGetFileInfoA 4388->4390 4389->4390 4391 405bbd lstrcpynA 4390->4391 4391->4316 4392->4318 4394 405e28 5 API calls 4393->4394 4396 40308e 4394->4396 4395 403098 4395->4325 4396->4395 4518 40564d lstrlenA CharPrevA 4396->4518 4399 40587d 2 API calls 4400 4030b4 4399->4400 4400->4325 4521 40584e GetFileAttributesA CreateFileA 4401->4521 4403 402c69 4423 402c79 4403->4423 4522 405bbd lstrcpynA 4403->4522 4405 402c8f 4523 405694 lstrlenA 4405->4523 4409 402ca0 GetFileSize 4410 402cb7 4409->4410 4426 402d9c 4409->4426 4416 402e08 4410->4416 4410->4423 4425 402bc5 6 API calls 4410->4425 4410->4426 4562 403055 4410->4562 4412 402da5 4414 402dd5 GlobalAlloc 4412->4414 4412->4423 4565 40306b SetFilePointer 4412->4565 4539 40306b SetFilePointer 4414->4539 4420 402bc5 6 API calls 4416->4420 4418 402dbe 4421 403055 ReadFile 4418->4421 4419 402df0 4540 402e62 4419->4540 4420->4423 4424 402dc9 4421->4424 4423->4333 4424->4414 4424->4423 4425->4410 4528 402bc5 4426->4528 4428 402e39 SetFilePointer 4428->4423 4430 405ee8 3 API calls 4429->4430 4431 403622 4430->4431 4432 403628 GetUserDefaultUILanguage 4431->4432 4433 40363a 4431->4433 4576 405b1b wsprintfA 4432->4576 4435 405aa4 3 API calls 4433->4435 4437 403665 4435->4437 4436 403638 4577 4038d3 4436->4577 4438 403683 lstrcatA 4437->4438 4439 405aa4 3 API calls 4437->4439 4438->4436 4439->4438 4442 40573b 18 API calls 4443 4036b5 4442->4443 4444 40373e 4443->4444 4446 405aa4 3 API calls 4443->4446 4445 40573b 18 API calls 4444->4445 4447 403744 4445->4447 4448 4036e1 4446->4448 4449 403754 LoadImageA 4447->4449 4452 405bdf 18 API calls 4447->4452 4448->4444 4455 4036fd lstrlenA 4448->4455 4459 405678 CharNextA 4448->4459 4450 4037fa 4449->4450 4451 40377b RegisterClassA 4449->4451 4454 40140b 2 API calls 4450->4454 4453 4037b1 SystemParametersInfoA CreateWindowExA 4451->4453 4482 403804 4451->4482 4452->4449 4453->4450 4458 403800 4454->4458 4456 403731 4455->4456 4457 40370b lstrcmpiA 4455->4457 4461 40564d 3 API calls 4456->4461 4457->4456 4460 40371b GetFileAttributesA 4457->4460 4464 4038d3 19 API calls 4458->4464 4458->4482 4462 4036fb 4459->4462 4463 403727 4460->4463 4465 403737 4461->4465 4462->4455 4463->4456 4466 405694 2 API calls 4463->4466 4467 403811 4464->4467 4586 405bbd lstrcpynA 4465->4586 4466->4456 4469 4038a0 4467->4469 4470 40381d ShowWindow LoadLibraryA 4467->4470 4471 404f78 5 API calls 4469->4471 4472 403843 GetClassInfoA 4470->4472 4473 40383c LoadLibraryA 4470->4473 4474 4038a6 4471->4474 4475 403857 GetClassInfoA RegisterClassA 4472->4475 4476 40386d DialogBoxParamA 4472->4476 4473->4472 4477 4038c2 4474->4477 4478 4038aa 4474->4478 4475->4476 4479 40140b 2 API calls 4476->4479 4480 40140b 2 API calls 4477->4480 4481 40140b 2 API calls 4478->4481 4478->4482 4479->4482 4480->4482 4481->4482 4482->4381 4483->4323 4588 405bbd lstrcpynA 4484->4588 4486 40574c 4487 4056e6 4 API calls 4486->4487 4488 405752 4487->4488 4489 403342 4488->4489 4490 405e28 5 API calls 4488->4490 4489->4381 4498 405bbd lstrcpynA 4489->4498 4496 405762 4490->4496 4491 40578d lstrlenA 4492 405798 4491->4492 4491->4496 4493 40564d 3 API calls 4492->4493 4495 40579d GetFileAttributesA 4493->4495 4495->4489 4496->4489 4496->4491 4497 405694 2 API calls 4496->4497 4589 405ec1 FindFirstFileA 4496->4589 4497->4491 4498->4365 4499->4370 4501 40354c 4500->4501 4502 40353e CloseHandle 4500->4502 4592 403579 4501->4592 4502->4501 4508 4053e6 4507->4508 4509 403393 ExitProcess 4508->4509 4510 4053fa MessageBoxIndirectA 4508->4510 4510->4509 4511->4356 4512->4384 4514 405ee8 3 API calls 4513->4514 4515 405a78 4514->4515 4517 405a99 4515->4517 4646 4058f5 lstrcpyA 4515->4646 4517->4384 4519 4030a0 CreateDirectoryA 4518->4519 4520 405667 lstrcatA 4518->4520 4519->4399 4520->4519 4521->4403 4522->4405 4524 4056a1 4523->4524 4525 402c95 4524->4525 4526 4056a6 CharPrevA 4524->4526 4527 405bbd lstrcpynA 4525->4527 4526->4524 4526->4525 4527->4409 4529 402be6 4528->4529 4530 402bce 4528->4530 4533 402bf6 GetTickCount 4529->4533 4534 402bee 4529->4534 4531 402bd7 DestroyWindow 4530->4531 4532 402bde 4530->4532 4531->4532 4532->4412 4536 402c04 CreateDialogParamA ShowWindow 4533->4536 4537 402c27 4533->4537 4535 405f21 2 API calls 4534->4535 4538 402bf4 4535->4538 4536->4537 4537->4412 4538->4412 4539->4419 4542 402e78 4540->4542 4541 402ea3 4544 403055 ReadFile 4541->4544 4542->4541 4573 40306b SetFilePointer 4542->4573 4545 402eae 4544->4545 4546 402ec0 GetTickCount 4545->4546 4547 402fe9 4545->4547 4549 402dfc 4545->4549 4558 402ed3 4546->4558 4548 402fed 4547->4548 4553 403005 4547->4553 4550 403055 ReadFile 4548->4550 4549->4423 4549->4428 4550->4549 4551 403055 ReadFile 4551->4553 4552 403055 ReadFile 4552->4558 4553->4549 4553->4551 4554 403020 WriteFile 4553->4554 4554->4549 4555 403035 4554->4555 4555->4549 4555->4553 4557 402f39 GetTickCount 4557->4558 4558->4549 4558->4552 4558->4557 4559 402f62 MulDiv wsprintfA 4558->4559 4561 402fa0 WriteFile 4558->4561 4566 405fe8 4558->4566 4560 404ea6 25 API calls 4559->4560 4560->4558 4561->4549 4561->4558 4574 4058c6 ReadFile 4562->4574 4565->4418 4567 40600d 4566->4567 4570 406015 4566->4570 4567->4558 4568 4060a5 GlobalAlloc 4568->4567 4568->4570 4569 40609c GlobalFree 4569->4568 4570->4567 4570->4568 4570->4569 4571 406113 GlobalFree 4570->4571 4572 40611c GlobalAlloc 4570->4572 4571->4572 4572->4567 4572->4570 4573->4541 4575 403068 4574->4575 4575->4410 4576->4436 4578 4038e7 4577->4578 4587 405b1b wsprintfA 4578->4587 4580 403958 4581 405bdf 18 API calls 4580->4581 4582 403964 SetWindowTextA 4581->4582 4583 403980 4582->4583 4584 403693 4582->4584 4583->4584 4585 405bdf 18 API calls 4583->4585 4584->4442 4585->4583 4586->4444 4587->4580 4588->4486 4590 405ee2 4589->4590 4591 405ed7 FindClose 4589->4591 4590->4496 4591->4590 4593 403587 4592->4593 4594 403551 4593->4594 4595 40358c FreeLibrary GlobalFree 4593->4595 4596 40547d 4594->4596 4595->4594 4595->4595 4597 40573b 18 API calls 4596->4597 4598 40549d 4597->4598 4599 4054a5 DeleteFileA 4598->4599 4600 4054bc 4598->4600 4628 403375 OleUninitialize 4599->4628 4602 4055ea 4600->4602 4633 405bbd lstrcpynA 4600->4633 4608 405ec1 2 API calls 4602->4608 4602->4628 4603 4054e2 4604 4054f5 4603->4604 4605 4054e8 lstrcatA 4603->4605 4607 405694 2 API calls 4604->4607 4606 4054fb 4605->4606 4609 405509 lstrcatA 4606->4609 4611 405514 lstrlenA FindFirstFileA 4606->4611 4607->4606 4610 40560e 4608->4610 4609->4611 4612 40564d 3 API calls 4610->4612 4610->4628 4611->4602 4631 405538 4611->4631 4613 405618 4612->4613 4615 405435 5 API calls 4613->4615 4614 405678 CharNextA 4614->4631 4616 405624 4615->4616 4617 405628 4616->4617 4618 40563e 4616->4618 4623 404ea6 25 API calls 4617->4623 4617->4628 4621 404ea6 25 API calls 4618->4621 4619 4055c9 FindNextFileA 4622 4055e1 FindClose 4619->4622 4619->4631 4621->4628 4622->4602 4624 405635 4623->4624 4625 405a71 40 API calls 4624->4625 4625->4628 4627 40547d 64 API calls 4627->4631 4628->4344 4628->4345 4629 404ea6 25 API calls 4629->4619 4630 404ea6 25 API calls 4630->4631 4631->4614 4631->4619 4631->4627 4631->4629 4631->4630 4632 405a71 40 API calls 4631->4632 4634 405bbd lstrcpynA 4631->4634 4635 405435 4631->4635 4632->4631 4633->4603 4634->4631 4643 405829 GetFileAttributesA 4635->4643 4638 405462 4638->4631 4639 405450 RemoveDirectoryA 4641 40545e 4639->4641 4640 405458 DeleteFileA 4640->4641 4641->4638 4642 40546e SetFileAttributesA 4641->4642 4642->4638 4644 405441 4643->4644 4645 40583b SetFileAttributesA 4643->4645 4644->4638 4644->4639 4644->4640 4645->4644 4647 405944 GetShortPathNameA 4646->4647 4648 40591e 4646->4648 4650 405959 4647->4650 4651 405a6b 4647->4651 4671 40584e GetFileAttributesA CreateFileA 4648->4671 4650->4651 4653 405961 wsprintfA 4650->4653 4651->4517 4652 405928 CloseHandle GetShortPathNameA 4652->4651 4654 40593c 4652->4654 4655 405bdf 18 API calls 4653->4655 4654->4647 4654->4651 4656 405989 4655->4656 4672 40584e GetFileAttributesA CreateFileA 4656->4672 4658 405996 4658->4651 4659 4059a5 GetFileSize GlobalAlloc 4658->4659 4660 405a64 CloseHandle 4659->4660 4661 4059c7 4659->4661 4660->4651 4662 4058c6 ReadFile 4661->4662 4663 4059cf 4662->4663 4663->4660 4673 4057b3 lstrlenA 4663->4673 4666 4059e6 lstrcpyA 4669 405a08 4666->4669 4667 4059fa 4668 4057b3 4 API calls 4667->4668 4668->4669 4670 405a3f SetFilePointer WriteFile GlobalFree 4669->4670 4670->4660 4671->4652 4672->4658 4674 4057f4 lstrlenA 4673->4674 4675 4057fc 4674->4675 4676 4057cd lstrcmpiA 4674->4676 4675->4666 4675->4667 4676->4675 4677 4057eb CharNextA 4676->4677 4677->4674 5364 402036 5365 4029fd 18 API calls 5364->5365 5366 40203d 5365->5366 5367 4029fd 18 API calls 5366->5367 5368 402047 5367->5368 5369 4029fd 18 API calls 5368->5369 5370 402051 5369->5370 5371 4029fd 18 API calls 5370->5371 5372 40205b 5371->5372 5373 4029fd 18 API calls 5372->5373 5374 402064 5373->5374 5375 40207a CoCreateInstance 5374->5375 5376 4029fd 18 API calls 5374->5376 5379 402099 5375->5379 5380 40214d 5375->5380 5376->5375 5377 401423 25 API calls 5378 402181 5377->5378 5379->5380 5381 40212f MultiByteToWideChar 5379->5381 5380->5377 5380->5378 5381->5380 5389 4014b7 5390 4014bd 5389->5390 5391 401389 2 API calls 5390->5391 5392 4014c5 5391->5392 5393 401bb8 5394 4029e0 18 API calls 5393->5394 5395 401bbf 5394->5395 5396 4029e0 18 API calls 5395->5396 5397 401bc9 5396->5397 5398 401bd9 5397->5398 5399 4029fd 18 API calls 5397->5399 5400 401be9 5398->5400 5401 4029fd 18 API calls 5398->5401 5399->5398 5402 401bf4 5400->5402 5403 401c38 5400->5403 5401->5400 5405 4029e0 18 API calls 5402->5405 5404 4029fd 18 API calls 5403->5404 5406 401c3d 5404->5406 5407 401bf9 5405->5407 5409 4029fd 18 API calls 5406->5409 5408 4029e0 18 API calls 5407->5408 5410 401c02 5408->5410 5411 401c46 FindWindowExA 5409->5411 5412 401c28 SendMessageA 5410->5412 5413 401c0a SendMessageTimeoutA 5410->5413 5414 401c64 5411->5414 5412->5414 5413->5414 5415 40243a 5416 402b07 19 API calls 5415->5416 5417 402444 5416->5417 5418 4029e0 18 API calls 5417->5418 5419 40244d 5418->5419 5420 402470 RegEnumValueA 5419->5420 5421 402464 RegEnumKeyA 5419->5421 5423 402663 5419->5423 5422 402489 RegCloseKey 5420->5422 5420->5423 5421->5422 5422->5423 4706 40223b 4707 402243 4706->4707 4708 402249 4706->4708 4709 4029fd 18 API calls 4707->4709 4710 402259 4708->4710 4711 4029fd 18 API calls 4708->4711 4709->4708 4712 402267 4710->4712 4713 4029fd 18 API calls 4710->4713 4711->4710 4714 4029fd 18 API calls 4712->4714 4713->4712 4715 402270 WritePrivateProfileStringA 4714->4715 5425 403fbc 5427 403fd2 5425->5427 5431 4040de 5425->5431 5426 40414d 5429 404221 5426->5429 5430 404157 GetDlgItem 5426->5430 5428 403e73 19 API calls 5427->5428 5432 404028 5428->5432 5436 403eda 8 API calls 5429->5436 5433 40416d 5430->5433 5434 4041df 5430->5434 5431->5426 5431->5429 5437 404122 GetDlgItem SendMessageA 5431->5437 5435 403e73 19 API calls 5432->5435 5433->5434 5441 404193 6 API calls 5433->5441 5434->5429 5442 4041f1 5434->5442 5439 404035 CheckDlgButton 5435->5439 5440 40421c 5436->5440 5456 403e95 KiUserCallbackDispatcher 5437->5456 5454 403e95 KiUserCallbackDispatcher 5439->5454 5441->5434 5445 4041f7 SendMessageA 5442->5445 5446 404208 5442->5446 5443 404148 5447 404246 SendMessageA 5443->5447 5445->5446 5446->5440 5449 40420e SendMessageA 5446->5449 5447->5426 5448 404053 GetDlgItem 5455 403ea8 SendMessageA 5448->5455 5449->5440 5451 404069 SendMessageA 5452 404090 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5451->5452 5453 404087 GetSysColor 5451->5453 5452->5440 5453->5452 5454->5448 5455->5451 5456->5443 4723 40173f 4724 4029fd 18 API calls 4723->4724 4725 401746 4724->4725 4726 401764 4725->4726 4727 40176c 4725->4727 4762 405bbd lstrcpynA 4726->4762 4763 405bbd lstrcpynA 4727->4763 4730 40176a 4734 405e28 5 API calls 4730->4734 4731 401777 4732 40564d 3 API calls 4731->4732 4733 40177d lstrcatA 4732->4733 4733->4730 4754 401789 4734->4754 4735 405ec1 2 API calls 4735->4754 4736 405829 2 API calls 4736->4754 4738 4017a0 CompareFileTime 4738->4754 4739 401864 4741 404ea6 25 API calls 4739->4741 4740 40183b 4742 404ea6 25 API calls 4740->4742 4760 401850 4740->4760 4743 40186e 4741->4743 4742->4760 4744 402e62 37 API calls 4743->4744 4746 401881 4744->4746 4745 405bbd lstrcpynA 4745->4754 4747 401895 SetFileTime 4746->4747 4749 4018a7 CloseHandle 4746->4749 4747->4749 4748 405bdf 18 API calls 4748->4754 4750 4018b8 4749->4750 4749->4760 4751 4018d0 4750->4751 4752 4018bd 4750->4752 4753 405bdf 18 API calls 4751->4753 4755 405bdf 18 API calls 4752->4755 4757 4018d8 4753->4757 4754->4735 4754->4736 4754->4738 4754->4739 4754->4740 4754->4745 4754->4748 4758 4053d1 MessageBoxIndirectA 4754->4758 4761 40584e GetFileAttributesA CreateFileA 4754->4761 4756 4018c5 lstrcatA 4755->4756 4756->4757 4759 4053d1 MessageBoxIndirectA 4757->4759 4758->4754 4759->4760 4761->4754 4762->4730 4763->4731 5457 40163f 5458 4029fd 18 API calls 5457->5458 5459 401645 5458->5459 5460 405ec1 2 API calls 5459->5460 5461 40164b 5460->5461 5462 40193f 5463 4029e0 18 API calls 5462->5463 5464 401946 5463->5464 5465 4029e0 18 API calls 5464->5465 5466 401950 5465->5466 5467 4029fd 18 API calls 5466->5467 5468 401959 5467->5468 5469 40196c lstrlenA 5468->5469 5470 4019a7 5468->5470 5471 401976 5469->5471 5471->5470 5475 405bbd lstrcpynA 5471->5475 5473 401990 5473->5470 5474 40199d lstrlenA 5473->5474 5474->5470 5475->5473

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 4030b6-40314d #17 SetErrorMode OleInitialize call 405ee8 SHGetFileInfoA call 405bbd GetCommandLineA call 405bbd GetModuleHandleA 7 403159-40316e call 405678 CharNextA 0->7 8 40314f-403154 0->8 11 403233-403237 7->11 8->7 12 403173-403176 11->12 13 40323d 11->13 14 403178-40317c 12->14 15 40317e-403186 12->15 16 403250-40326a GetTempPathA call 403082 13->16 14->14 14->15 17 403188-403189 15->17 18 40318e-403191 15->18 26 4032c2-4032dc DeleteFileA call 402c29 16->26 27 40326c-40328a GetWindowsDirectoryA lstrcatA call 403082 16->27 17->18 20 403223-403230 call 405678 18->20 21 403197-40319b 18->21 20->11 36 403232 20->36 24 4031b3-4031e0 21->24 25 40319d-4031a3 21->25 32 4031e2-4031e8 24->32 33 4031f3-403221 24->33 30 4031a5-4031a7 25->30 31 4031a9 25->31 41 403370-40337f call 403534 OleUninitialize 26->41 42 4032e2-4032e8 26->42 27->26 44 40328c-4032bc GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 403082 27->44 30->24 30->31 31->24 38 4031ea-4031ec 32->38 39 4031ee 32->39 33->20 35 40323f-40324b call 405bbd 33->35 35->16 36->11 38->33 38->39 39->33 55 403385-403395 call 4053d1 ExitProcess 41->55 56 403479-40347f 41->56 46 403360-403367 call 40360e 42->46 47 4032ea-4032f5 call 405678 42->47 44->26 44->41 53 40336c 46->53 59 4032f7-403320 47->59 60 40332b-403335 47->60 53->41 57 403485-4034a2 call 405ee8 * 3 56->57 58 40351c-403524 56->58 89 4034a4-4034a6 57->89 90 4034ec-4034fa call 405ee8 57->90 62 403526 58->62 63 40352a-40352e ExitProcess 58->63 65 403322-403324 59->65 66 403337-403344 call 40573b 60->66 67 40339b-4033b5 lstrcatA lstrcmpiA 60->67 62->63 65->60 70 403326-403329 65->70 66->41 77 403346-40335c call 405bbd * 2 66->77 67->41 72 4033b7-4033cc CreateDirectoryA SetCurrentDirectoryA 67->72 70->60 70->65 73 4033d9-403401 call 405bbd 72->73 74 4033ce-4033d4 call 405bbd 72->74 85 403407-403423 call 405bdf DeleteFileA 73->85 74->73 77->46 95 403464-40346b 85->95 96 403425-403435 CopyFileA 85->96 89->90 94 4034a8-4034aa 89->94 101 403508-403513 ExitWindowsEx 90->101 102 4034fc-403506 90->102 94->90 98 4034ac-4034be GetCurrentProcess 94->98 95->85 99 40346d-403474 call 405a71 95->99 96->95 100 403437-403457 call 405a71 call 405bdf call 40536c 96->100 98->90 107 4034c0-4034e2 98->107 99->41 100->95 117 403459-403460 CloseHandle 100->117 101->58 106 403515-403517 call 40140b 101->106 102->101 102->106 106->58 107->90 117->95
                              APIs
                              • #17.COMCTL32 ref: 004030D7
                              • SetErrorMode.KERNELBASE(00008001), ref: 004030E2
                              • OleInitialize.OLE32(00000000), ref: 004030E9
                                • Part of subcall function 00405EE8: GetModuleHandleA.KERNEL32(?,?,?,004030FB,00000009), ref: 00405EFA
                                • Part of subcall function 00405EE8: LoadLibraryA.KERNELBASE(?,?,?,004030FB,00000009), ref: 00405F05
                                • Part of subcall function 00405EE8: GetProcAddress.KERNEL32(00000000,?), ref: 00405F16
                              • SHGetFileInfoA.SHELL32(0041EC98,00000000,?,?,00000000,00000009), ref: 00403111
                                • Part of subcall function 00405BBD: lstrcpynA.KERNEL32(?,?,00000400,00403126,Slibrighederne Setup,NSIS Error), ref: 00405BCA
                              • GetCommandLineA.KERNEL32(Slibrighederne Setup,NSIS Error), ref: 00403126
                              • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\xLDz0WPZYc.exe",00000000), ref: 00403139
                              • CharNextA.USER32(00000000,"C:\Users\user\Desktop\xLDz0WPZYc.exe",00000020), ref: 00403164
                              • GetTempPathA.KERNELBASE(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 00403261
                              • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 00403272
                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040327E
                              • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403292
                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 0040329A
                              • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 004032AB
                              • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 004032B3
                              • DeleteFileA.KERNELBASE(1033), ref: 004032C7
                              • OleUninitialize.OLE32(?), ref: 00403375
                              • ExitProcess.KERNEL32 ref: 00403395
                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\xLDz0WPZYc.exe",00000000,?), ref: 004033A1
                              • lstrcmpiA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop), ref: 004033AD
                              • CreateDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 004033B9
                              • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 004033C0
                              • DeleteFileA.KERNEL32(0041E898,0041E898,?,00424000,?), ref: 00403419
                              • CopyFileA.KERNEL32(C:\Users\user\Desktop\xLDz0WPZYc.exe,0041E898,?), ref: 0040342D
                              • CloseHandle.KERNEL32(00000000,0041E898,0041E898,?,0041E898,00000000), ref: 0040345A
                              • GetCurrentProcess.KERNEL32(?,?,00000006,00000005,?), ref: 004034B3
                              • ExitWindowsEx.USER32(00000002,80040002), ref: 0040350B
                              • ExitProcess.KERNEL32 ref: 0040352E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                              • String ID: "$"C:\Users\user\Desktop\xLDz0WPZYc.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Studerekammermenneskes$C:\Users\user\AppData\Roaming\Studerekammermenneskes$C:\Users\user\Desktop$C:\Users\user\Desktop\xLDz0WPZYc.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$Slibrighederne Setup$TEMP$TMP$\Temp$~nsu.tmp
                              • API String ID: 4107622049-543464678
                              • Opcode ID: 0465aa0a361c9d0fa04965402fa3df5ad1a355ba9c919688d6d4795c9475ec4c
                              • Instruction ID: 19acd6a9e22a62aa3fa635d9352380a3979e711e0520c28b60a65d3217cef685
                              • Opcode Fuzzy Hash: 0465aa0a361c9d0fa04965402fa3df5ad1a355ba9c919688d6d4795c9475ec4c
                              • Instruction Fuzzy Hash: 87B1E370A082516AE7216F755C89B2B7EACEB45306F04057FF581B62D2C77C9E01CB6E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 118 404fe4-405000 119 405006-4050cd GetDlgItem * 3 call 403ea8 call 404744 GetClientRect GetSystemMetrics SendMessageA * 2 118->119 120 40518f-405195 118->120 138 4050eb-4050ee 119->138 139 4050cf-4050e9 SendMessageA * 2 119->139 122 405197-4051b9 GetDlgItem CreateThread CloseHandle 120->122 123 4051bf-4051cb 120->123 122->123 125 4051ed-4051f3 123->125 126 4051cd-4051d3 123->126 130 4051f5-4051fb 125->130 131 405248-40524b 125->131 128 4051d5-4051e8 ShowWindow * 2 call 403ea8 126->128 129 40520e-405215 call 403eda 126->129 128->125 142 40521a-40521e 129->142 135 405221-405231 ShowWindow 130->135 136 4051fd-405209 call 403e4c 130->136 131->129 133 40524d-405253 131->133 133->129 140 405255-405268 SendMessageA 133->140 143 405241-405243 call 403e4c 135->143 144 405233-40523c call 404ea6 135->144 136->129 147 4050f0-4050fc SendMessageA 138->147 148 4050fe-405115 call 403e73 138->148 139->138 149 405365-405367 140->149 150 40526e-40529a CreatePopupMenu call 405bdf AppendMenuA 140->150 143->131 144->143 147->148 157 405117-40512b ShowWindow 148->157 158 40514b-40516c GetDlgItem SendMessageA 148->158 149->142 155 40529c-4052ac GetWindowRect 150->155 156 4052af-4052c5 TrackPopupMenu 150->156 155->156 156->149 160 4052cb-4052e5 156->160 161 40513a 157->161 162 40512d-405138 ShowWindow 157->162 158->149 159 405172-40518a SendMessageA * 2 158->159 159->149 163 4052ea-405305 SendMessageA 160->163 164 405140-405146 call 403ea8 161->164 162->164 163->163 165 405307-405327 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 163->165 164->158 167 405329-405349 SendMessageA 165->167 167->167 168 40534b-40535f GlobalUnlock SetClipboardData CloseClipboard 167->168 168->149
                              APIs
                              • GetDlgItem.USER32(?,00000403), ref: 00405043
                              • GetDlgItem.USER32(?,000003EE), ref: 00405052
                              • GetClientRect.USER32(?,?), ref: 0040508F
                              • GetSystemMetrics.USER32(00000002), ref: 00405096
                              • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004050B7
                              • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004050C8
                              • SendMessageA.USER32(?,00001001,00000000,?), ref: 004050DB
                              • SendMessageA.USER32(?,00001026,00000000,?), ref: 004050E9
                              • SendMessageA.USER32(?,00001024,00000000,?), ref: 004050FC
                              • ShowWindow.USER32(00000000,?,0000001B,?), ref: 0040511E
                              • ShowWindow.USER32(?,?), ref: 00405132
                              • GetDlgItem.USER32(?,000003EC), ref: 00405153
                              • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405163
                              • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 0040517C
                              • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 00405188
                              • GetDlgItem.USER32(?,000003F8), ref: 00405061
                                • Part of subcall function 00403EA8: SendMessageA.USER32(?,?,?,00403CD9), ref: 00403EB6
                              • GetDlgItem.USER32(?,000003EC), ref: 004051A4
                              • CreateThread.KERNELBASE(00000000,00000000,Function_00004F78,00000000), ref: 004051B2
                              • CloseHandle.KERNELBASE(00000000), ref: 004051B9
                              • ShowWindow.USER32(00000000), ref: 004051DC
                              • ShowWindow.USER32(?,?), ref: 004051E3
                              • ShowWindow.USER32(?), ref: 00405229
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040525D
                              • CreatePopupMenu.USER32 ref: 0040526E
                              • AppendMenuA.USER32(00000000,00000000,?,00000000), ref: 00405283
                              • GetWindowRect.USER32(?,000000FF), ref: 004052A3
                              • TrackPopupMenu.USER32(00000000,?,?,?,00000000,?,00000000), ref: 004052BC
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004052F8
                              • OpenClipboard.USER32(00000000), ref: 00405308
                              • EmptyClipboard.USER32 ref: 0040530E
                              • GlobalAlloc.KERNEL32(00000042,?), ref: 00405317
                              • GlobalLock.KERNEL32(00000000), ref: 00405321
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405335
                              • GlobalUnlock.KERNEL32(00000000), ref: 0040534E
                              • SetClipboardData.USER32(?,00000000), ref: 00405359
                              • CloseClipboard.USER32 ref: 0040535F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                              • String ID: Slibrighederne Setup: Installing$liy
                              • API String ID: 590372296-3266460490
                              • Opcode ID: b8267ac34de08bb18752529e459f06683afd16ea86d55fa50f92f6cf035c2f36
                              • Instruction ID: 5eb751775e690fc0911b0246dac1cecdda29a979763143f7b886e47eaa108cfb
                              • Opcode Fuzzy Hash: b8267ac34de08bb18752529e459f06683afd16ea86d55fa50f92f6cf035c2f36
                              • Instruction Fuzzy Hash: 8AA16971900208BFDB219FA0DD89EAE7F79FB08345F10407AFA01B61A0C7B55E519FA9

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 409 405bdf-405bea 410 405bec-405bfb 409->410 411 405bfd-405c12 409->411 410->411 412 405e05-405e09 411->412 413 405c18-405c23 411->413 415 405c35-405c3f 412->415 416 405e0f-405e19 412->416 413->412 414 405c29-405c30 413->414 414->412 415->416 417 405c45-405c4c 415->417 418 405e24-405e25 416->418 419 405e1b-405e1f call 405bbd 416->419 420 405c52-405c87 417->420 421 405df8 417->421 419->418 423 405da2-405da5 420->423 424 405c8d-405c98 GetVersion 420->424 425 405e02-405e04 421->425 426 405dfa-405e00 421->426 429 405dd5-405dd8 423->429 430 405da7-405daa 423->430 427 405cb2 424->427 428 405c9a-405c9e 424->428 425->412 426->412 436 405cb9-405cc0 427->436 428->427 433 405ca0-405ca4 428->433 431 405de6-405df6 lstrlenA 429->431 432 405dda-405de1 call 405bdf 429->432 434 405dba-405dc6 call 405bbd 430->434 435 405dac-405db8 call 405b1b 430->435 431->412 432->431 433->427 439 405ca6-405caa 433->439 443 405dcb-405dd1 434->443 435->443 441 405cc2-405cc4 436->441 442 405cc5-405cc7 436->442 439->427 446 405cac-405cb0 439->446 441->442 444 405d00-405d03 442->444 445 405cc9-405ce4 call 405aa4 442->445 443->431 448 405dd3 443->448 450 405d13-405d16 444->450 451 405d05-405d11 GetSystemDirectoryA 444->451 453 405ce9-405cec 445->453 446->436 452 405d9a-405da0 call 405e28 448->452 455 405d80-405d82 450->455 456 405d18-405d26 GetWindowsDirectoryA 450->456 454 405d84-405d87 451->454 452->431 457 405cf2-405cfb call 405bdf 453->457 458 405d89-405d8d 453->458 454->452 454->458 455->454 459 405d28-405d32 455->459 456->455 457->454 458->452 462 405d8f-405d95 lstrcatA 458->462 464 405d34-405d37 459->464 465 405d4c-405d62 SHGetSpecialFolderLocation 459->465 462->452 464->465 469 405d39-405d40 464->469 466 405d64-405d7b SHGetPathFromIDListA CoTaskMemFree 465->466 467 405d7d 465->467 466->454 466->467 467->455 470 405d48-405d4a 469->470 470->454 470->465
                              APIs
                              • GetVersion.KERNEL32(?,Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll,00000000,00404EDE,Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll,00000000), ref: 00405C90
                              • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 00405D0B
                              • GetWindowsDirectoryA.KERNEL32(Call,00000400), ref: 00405D1E
                              • SHGetSpecialFolderLocation.SHELL32(?,0040E888), ref: 00405D5A
                              • SHGetPathFromIDListA.SHELL32(0040E888,Call), ref: 00405D68
                              • CoTaskMemFree.OLE32(0040E888), ref: 00405D73
                              • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00405D95
                              • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll,00000000,00404EDE,Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll,00000000), ref: 00405DE7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                              • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                              • API String ID: 900638850-2998629967
                              • Opcode ID: 6d1c9af88ffa3db3a0edcf81b4fc072c50c4b8bcf17ecc15cdbe89ff62f1b448
                              • Instruction ID: 05ce3077703b195791b94b96109b54625272672628b9f98d23919b5af99ad588
                              • Opcode Fuzzy Hash: 6d1c9af88ffa3db3a0edcf81b4fc072c50c4b8bcf17ecc15cdbe89ff62f1b448
                              • Instruction Fuzzy Hash: 0A610171A04A05AAEB205F24DC88BBF7BB4EF11304F50813BE941B62D0D27D5982DF8E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 471 40547d-4054a3 call 40573b 474 4054a5-4054b7 DeleteFileA 471->474 475 4054bc-4054c3 471->475 476 405646-40564a 474->476 477 4054c5-4054c7 475->477 478 4054d6-4054e6 call 405bbd 475->478 480 4055f4-4055f9 477->480 481 4054cd-4054d0 477->481 484 4054f5-4054f6 call 405694 478->484 485 4054e8-4054f3 lstrcatA 478->485 480->476 483 4055fb-4055fe 480->483 481->478 481->480 486 405600-405606 483->486 487 405608-405610 call 405ec1 483->487 488 4054fb-4054fe 484->488 485->488 486->476 487->476 494 405612-405626 call 40564d call 405435 487->494 491 405500-405507 488->491 492 405509-40550f lstrcatA 488->492 491->492 495 405514-405532 lstrlenA FindFirstFileA 491->495 492->495 509 405628-40562b 494->509 510 40563e-405641 call 404ea6 494->510 497 405538-40554f call 405678 495->497 498 4055ea-4055ee 495->498 505 405551-405555 497->505 506 40555a-40555d 497->506 498->480 500 4055f0 498->500 500->480 505->506 511 405557 505->511 507 405570-40557e call 405bbd 506->507 508 40555f-405564 506->508 521 405580-405588 507->521 522 405595-4055a0 call 405435 507->522 512 405566-405568 508->512 513 4055c9-4055db FindNextFileA 508->513 509->486 515 40562d-40563c call 404ea6 call 405a71 509->515 510->476 511->506 512->507 517 40556a-40556e 512->517 513->497 519 4055e1-4055e4 FindClose 513->519 515->476 517->507 517->513 519->498 521->513 524 40558a-405593 call 40547d 521->524 531 4055c1-4055c4 call 404ea6 522->531 532 4055a2-4055a5 522->532 524->513 531->513 534 4055a7-4055b7 call 404ea6 call 405a71 532->534 535 4055b9-4055bf 532->535 534->513 535->513
                              APIs
                              • DeleteFileA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,75573410,00000000), ref: 004054A6
                              • lstrcatA.KERNEL32(00420CE0,\*.*,00420CE0,?,?,C:\Users\user\AppData\Local\Temp\,75573410,00000000), ref: 004054EE
                              • lstrcatA.KERNEL32(?,00409014,?,00420CE0,?,?,C:\Users\user\AppData\Local\Temp\,75573410,00000000), ref: 0040550F
                              • lstrlenA.KERNEL32(?,?,00409014,?,00420CE0,?,?,C:\Users\user\AppData\Local\Temp\,75573410,00000000), ref: 00405515
                              • FindFirstFileA.KERNELBASE(00420CE0,?,?,?,00409014,?,00420CE0,?,?,C:\Users\user\AppData\Local\Temp\,75573410,00000000), ref: 00405526
                              • FindNextFileA.KERNELBASE(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004055D3
                              • FindClose.KERNEL32(00000000), ref: 004055E4
                              Strings
                              • \*.*, xrefs: 004054E8
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 0040548B
                              • "C:\Users\user\Desktop\xLDz0WPZYc.exe", xrefs: 0040547D
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                              • String ID: "C:\Users\user\Desktop\xLDz0WPZYc.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                              • API String ID: 2035342205-777657853
                              • Opcode ID: 2f5cc935bd14faa83787e20be2be6e70cf428fbcf334f354c204533ca760d941
                              • Instruction ID: f67e5f98a1b48f8b06c5baa1d65efce896aecc78963fcddf766b22b57dd7cee7
                              • Opcode Fuzzy Hash: 2f5cc935bd14faa83787e20be2be6e70cf428fbcf334f354c204533ca760d941
                              • Instruction Fuzzy Hash: 1851C070800A04BADF21AB25CC45BAF7AB9DB42314F14417BF444752D6D73C9A82DEAD

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 805 406197-40619c 806 40620d-40622b 805->806 807 40619e-4061cd 805->807 808 406803-406818 806->808 809 4061d4-4061d8 807->809 810 4061cf-4061d2 807->810 811 406832-406848 808->811 812 40681a-406830 808->812 814 4061e0 809->814 815 4061da-4061de 809->815 813 4061e4-4061e7 810->813 818 40684b-406852 811->818 812->818 816 406205-406208 813->816 817 4061e9-4061f2 813->817 814->813 815->813 821 4063da-4063f8 816->821 819 4061f4 817->819 820 4061f7-406203 817->820 822 406854-406858 818->822 823 406879-406885 818->823 819->820 824 40626d-40629b 820->824 827 406410-406422 821->827 828 4063fa-40640e 821->828 825 406a07-406a11 822->825 826 40685e-406876 822->826 834 40601b-406024 823->834 831 4062b7-4062d1 824->831 832 40629d-4062b5 824->832 830 406a1d-406a30 825->830 826->823 833 406425-40642f 827->833 828->833 837 406a35-406a39 830->837 838 4062d4-4062de 831->838 832->838 835 406431 833->835 836 4063d2-4063d8 833->836 839 406a32 834->839 840 40602a 834->840 841 406542-40654f 835->841 842 4063ad-4063b1 835->842 836->821 843 406376-406380 836->843 844 4062e4 838->844 845 406255-40625b 838->845 839->837 846 406031-406035 840->846 847 406171-406192 840->847 848 4060d6-4060da 840->848 849 406146-40614a 840->849 841->834 857 4063b7-4063cf 842->857 858 4069b9-4069c3 842->858 853 4069c5-4069cf 843->853 854 406386-4063a8 843->854 866 4069a1-4069ab 844->866 867 40623a-406252 844->867 855 406261-406267 845->855 856 40630e-406314 845->856 846->830 850 40603b-406048 846->850 847->808 859 4060e0-4060f9 848->859 860 406986-406990 848->860 851 406150-406164 849->851 852 406995-40699f 849->852 850->839 862 40604e-406094 850->862 865 406167-40616f 851->865 852->830 853->830 854->841 855->824 863 406372 855->863 856->863 864 406316-406334 856->864 857->836 858->830 868 4060fc-406100 859->868 860->830 869 406096-40609a 862->869 870 4060bc-4060be 862->870 863->843 871 406336-40634a 864->871 872 40634c-40635e 864->872 865->847 865->849 866->830 867->845 868->848 873 406102-406108 868->873 874 4060a5-4060b3 GlobalAlloc 869->874 875 40609c-40609f GlobalFree 869->875 877 4060c0-4060ca 870->877 878 4060cc-4060d4 870->878 876 406361-40636b 871->876 872->876 879 406132-406144 873->879 880 40610a-406111 873->880 874->839 881 4060b9 874->881 875->874 876->856 882 40636d 876->882 877->877 877->878 878->868 879->865 883 406113-406116 GlobalFree 880->883 884 40611c-40612c GlobalAlloc 880->884 881->870 886 4062f3-40630b 882->886 887 4069ad-4069b7 882->887 883->884 884->839 884->879 886->856 887->830
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 208b979f7471c67888a02c39f93206778dc1c3e33f97723ffc6ad1ac2506ac0b
                              • Instruction ID: 01902b0c5badf26c21563370f74918c90dc48b9c290b8d647ce642e1aeaa84f8
                              • Opcode Fuzzy Hash: 208b979f7471c67888a02c39f93206778dc1c3e33f97723ffc6ad1ac2506ac0b
                              • Instruction Fuzzy Hash: 99F18671D00229CBDF28CFA8C8946ADBBB0FF45305F25856ED856BB281D7385A96CF44
                              APIs
                              • FindFirstFileA.KERNELBASE(?,00421528,C:\Users\user\AppData\Local\Temp\nst7960.tmp,0040577E,C:\Users\user\AppData\Local\Temp\nst7960.tmp,C:\Users\user\AppData\Local\Temp\nst7960.tmp,00000000,C:\Users\user\AppData\Local\Temp\nst7960.tmp,C:\Users\user\AppData\Local\Temp\nst7960.tmp,?,?,75573410,0040549D,?,C:\Users\user\AppData\Local\Temp\,75573410), ref: 00405ECC
                              • FindClose.KERNEL32(00000000), ref: 00405ED8
                              Strings
                              • C:\Users\user\AppData\Local\Temp\nst7960.tmp, xrefs: 00405EC1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID: C:\Users\user\AppData\Local\Temp\nst7960.tmp
                              • API String ID: 2295610775-3518439782
                              • Opcode ID: f7c2684b86b1527493efd370d531fce5aff0e856747922587c11eb9b8a6dacaa
                              • Instruction ID: c8363a8003639f247cd95da1b4b67004b06b28060bca14ca5f7d033ebcfdecfd
                              • Opcode Fuzzy Hash: f7c2684b86b1527493efd370d531fce5aff0e856747922587c11eb9b8a6dacaa
                              • Instruction Fuzzy Hash: 9ED012369194206BC7005B78AC0C85B7A98EF593317608A33B5A5F52F0C7788D528AEA
                              APIs
                              • GetModuleHandleA.KERNEL32(?,?,?,004030FB,00000009), ref: 00405EFA
                              • LoadLibraryA.KERNELBASE(?,?,?,004030FB,00000009), ref: 00405F05
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00405F16
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: AddressHandleLibraryLoadModuleProc
                              • String ID:
                              • API String ID: 310444273-0
                              • Opcode ID: 6a16e0dd3cc6108475a6e7adf37e54332756fcc3f7317002038e5d5bd84af621
                              • Instruction ID: dd30d9296bace99b119292820e2dbffb2fd0b4cb1c2bef09bc496f5d2c6c7741
                              • Opcode Fuzzy Hash: 6a16e0dd3cc6108475a6e7adf37e54332756fcc3f7317002038e5d5bd84af621
                              • Instruction Fuzzy Hash: A6E0C232A08511ABC710AB349C08A6B77A8EFC8650304893EF501F6151D738AC11ABAE
                              APIs
                              • GetFileAttributesA.KERNELBASE(00000003,00402C69,C:\Users\user\Desktop\xLDz0WPZYc.exe,80000000,00000003), ref: 00405852
                              • CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405874
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: File$AttributesCreate
                              • String ID:
                              • API String ID: 415043291-0
                              • Opcode ID: 8e2162a352c9b3d6bf888d6bdf81e716fa6f6f9a74e85dd2386317c2044df056
                              • Instruction ID: 6507fbbaaec62448b9ae143b35cf90270df4f7fb8743d38c88d9b601ce0c16fe
                              • Opcode Fuzzy Hash: 8e2162a352c9b3d6bf888d6bdf81e716fa6f6f9a74e85dd2386317c2044df056
                              • Instruction Fuzzy Hash: 30D09E71658301AFEF098F20DE16F2E7AA2EB84B01F10562CB642940E0D6715C15DB16

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 169 4039a0-4039b2 170 403af3-403b02 169->170 171 4039b8-4039be 169->171 173 403b51-403b66 170->173 174 403b04-403b4c GetDlgItem * 2 call 403e73 SetClassLongA call 40140b 170->174 171->170 172 4039c4-4039cd 171->172 177 4039e2-4039e5 172->177 178 4039cf-4039dc SetWindowPos 172->178 175 403ba6-403bab call 403ebf 173->175 176 403b68-403b6b 173->176 174->173 191 403bb0-403bcb 175->191 181 403b6d-403b78 call 401389 176->181 182 403b9e-403ba0 176->182 184 4039e7-4039f9 ShowWindow 177->184 185 4039ff-403a05 177->185 178->177 181->182 204 403b7a-403b99 SendMessageA 181->204 182->175 190 403e40 182->190 184->185 187 403a21-403a24 185->187 188 403a07-403a1c DestroyWindow 185->188 195 403a26-403a32 SetWindowLongA 187->195 196 403a37-403a3d 187->196 194 403e1d-403e23 188->194 192 403e42-403e49 190->192 198 403bd4-403bda 191->198 199 403bcd-403bcf call 40140b 191->199 194->190 205 403e25-403e2b 194->205 195->192 202 403ae0-403aee call 403eda 196->202 203 403a43-403a54 GetDlgItem 196->203 200 403be0-403beb 198->200 201 403dfe-403e17 DestroyWindow EndDialog 198->201 199->198 200->201 207 403bf1-403c3e call 405bdf call 403e73 * 3 GetDlgItem 200->207 201->194 202->192 208 403a73-403a76 203->208 209 403a56-403a6d SendMessageA IsWindowEnabled 203->209 204->192 205->190 211 403e2d-403e36 ShowWindow 205->211 239 403c40-403c45 207->239 240 403c48-403c84 ShowWindow KiUserCallbackDispatcher call 403e95 EnableWindow 207->240 213 403a78-403a79 208->213 214 403a7b-403a7e 208->214 209->190 209->208 211->190 217 403aa9-403aae call 403e4c 213->217 218 403a80-403a86 214->218 219 403a8c-403a91 214->219 217->202 222 403ac7-403ada SendMessageA 218->222 223 403a88-403a8a 218->223 219->222 224 403a93-403a99 219->224 222->202 223->217 227 403ab0-403ab9 call 40140b 224->227 228 403a9b-403aa1 call 40140b 224->228 227->202 237 403abb-403ac5 227->237 235 403aa7 228->235 235->217 237->235 239->240 243 403c86-403c87 240->243 244 403c89 240->244 245 403c8b-403cb9 GetSystemMenu EnableMenuItem SendMessageA 243->245 244->245 246 403cbb-403ccc SendMessageA 245->246 247 403cce 245->247 248 403cd4-403d0d call 403ea8 call 405bbd lstrlenA call 405bdf SetWindowTextA call 401389 246->248 247->248 248->191 257 403d13-403d15 248->257 257->191 258 403d1b-403d1f 257->258 259 403d21-403d27 258->259 260 403d3e-403d52 DestroyWindow 258->260 259->190 262 403d2d-403d33 259->262 260->194 261 403d58-403d85 CreateDialogParamA 260->261 261->194 264 403d8b-403de2 call 403e73 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 261->264 262->191 263 403d39 262->263 263->190 264->190 269 403de4-403df7 ShowWindow call 403ebf 264->269 271 403dfc 269->271 271->194
                              APIs
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004039DC
                              • ShowWindow.USER32(?), ref: 004039F9
                              • DestroyWindow.USER32 ref: 00403A0D
                              • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403A29
                              • GetDlgItem.USER32(?,?), ref: 00403A4A
                              • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403A5E
                              • IsWindowEnabled.USER32(00000000), ref: 00403A65
                              • GetDlgItem.USER32(?,?), ref: 00403B13
                              • GetDlgItem.USER32(?,00000002), ref: 00403B1D
                              • SetClassLongA.USER32(?,000000F2,?), ref: 00403B37
                              • SendMessageA.USER32(0000040F,00000000,?,?), ref: 00403B88
                              • GetDlgItem.USER32(?,00000003), ref: 00403C2E
                              • ShowWindow.USER32(00000000,?), ref: 00403C4F
                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403C61
                              • EnableWindow.USER32(?,?), ref: 00403C7C
                              • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403C92
                              • EnableMenuItem.USER32(00000000), ref: 00403C99
                              • SendMessageA.USER32(?,?,00000000,?), ref: 00403CB1
                              • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403CC4
                              • lstrlenA.KERNEL32(Slibrighederne Setup: Installing,?,Slibrighederne Setup: Installing,Slibrighederne Setup), ref: 00403CED
                              • SetWindowTextA.USER32(?,Slibrighederne Setup: Installing), ref: 00403CFC
                              • ShowWindow.USER32(?,0000000A), ref: 00403E30
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                              • String ID: Slibrighederne Setup$Slibrighederne Setup: Installing$liy
                              • API String ID: 3282139019-4157386169
                              • Opcode ID: c4d288c9213a4ff13c75ca07aa37345a46e4ee7ce1d3a7d01e6124bc117d097b
                              • Instruction ID: 6a308cc8f2d4566e8290075db2a5fe9cea5b682110ca7f7f0817dc9b094a1d3c
                              • Opcode Fuzzy Hash: c4d288c9213a4ff13c75ca07aa37345a46e4ee7ce1d3a7d01e6124bc117d097b
                              • Instruction Fuzzy Hash: 0EC1D271604204BBDB21AF61ED45E2B3E7DFB44706B40053EF641B12E1C779A942AF6E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 272 40360e-403626 call 405ee8 275 403628-403633 GetUserDefaultUILanguage call 405b1b 272->275 276 40363a-40366b call 405aa4 272->276 279 403638 275->279 281 403683-403689 lstrcatA 276->281 282 40366d-40367e call 405aa4 276->282 283 40368e-4036b7 call 4038d3 call 40573b 279->283 281->283 282->281 289 4036bd-4036c2 283->289 290 40373e-403746 call 40573b 283->290 289->290 291 4036c4-4036e8 call 405aa4 289->291 296 403754-403779 LoadImageA 290->296 297 403748-40374f call 405bdf 290->297 291->290 300 4036ea-4036ec 291->300 298 4037fa-403802 call 40140b 296->298 299 40377b-4037ab RegisterClassA 296->299 297->296 313 403804-403807 298->313 314 40380c-403817 call 4038d3 298->314 302 4037b1-4037f5 SystemParametersInfoA CreateWindowExA 299->302 303 4038c9 299->303 305 4036fd-403709 lstrlenA 300->305 306 4036ee-4036fb call 405678 300->306 302->298 310 4038cb-4038d2 303->310 307 403731-403739 call 40564d call 405bbd 305->307 308 40370b-403719 lstrcmpiA 305->308 306->305 307->290 308->307 312 40371b-403725 GetFileAttributesA 308->312 317 403727-403729 312->317 318 40372b-40372c call 405694 312->318 313->310 324 4038a0-4038a1 call 404f78 314->324 325 40381d-40383a ShowWindow LoadLibraryA 314->325 317->307 317->318 318->307 329 4038a6-4038a8 324->329 327 403843-403855 GetClassInfoA 325->327 328 40383c-403841 LoadLibraryA 325->328 330 403857-403867 GetClassInfoA RegisterClassA 327->330 331 40386d-403890 DialogBoxParamA call 40140b 327->331 328->327 332 4038c2-4038c4 call 40140b 329->332 333 4038aa-4038b0 329->333 330->331 337 403895-40389e call 40355e 331->337 332->303 333->313 335 4038b6-4038bd call 40140b 333->335 335->313 337->310
                              APIs
                                • Part of subcall function 00405EE8: GetModuleHandleA.KERNEL32(?,?,?,004030FB,00000009), ref: 00405EFA
                                • Part of subcall function 00405EE8: LoadLibraryA.KERNELBASE(?,?,?,004030FB,00000009), ref: 00405F05
                                • Part of subcall function 00405EE8: GetProcAddress.KERNEL32(00000000,?), ref: 00405F16
                              • GetUserDefaultUILanguage.KERNELBASE(00000002,C:\Users\user\AppData\Local\Temp\,75573410,"C:\Users\user\Desktop\xLDz0WPZYc.exe",00000000), ref: 00403628
                                • Part of subcall function 00405B1B: wsprintfA.USER32 ref: 00405B28
                              • lstrcatA.KERNEL32(1033,Slibrighederne Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Slibrighederne Setup: Installing,00000000,00000002,C:\Users\user\AppData\Local\Temp\,75573410,"C:\Users\user\Desktop\xLDz0WPZYc.exe",00000000), ref: 00403689
                              • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Studerekammermenneskes,1033,Slibrighederne Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Slibrighederne Setup: Installing,00000000,00000002,C:\Users\user\AppData\Local\Temp\), ref: 004036FE
                              • lstrcmpiA.KERNEL32(?,.exe), ref: 00403711
                              • GetFileAttributesA.KERNEL32(Call), ref: 0040371C
                              • LoadImageA.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Studerekammermenneskes), ref: 00403765
                              • RegisterClassA.USER32(00422E80), ref: 004037A2
                              • SystemParametersInfoA.USER32(?,00000000,?,00000000), ref: 004037BA
                              • CreateWindowExA.USER32(?,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 004037EF
                              • ShowWindow.USER32(00000005,00000000), ref: 00403825
                              • LoadLibraryA.KERNELBASE(RichEd20), ref: 00403836
                              • LoadLibraryA.KERNEL32(RichEd32), ref: 00403841
                              • GetClassInfoA.USER32(00000000,RichEdit20A,00422E80), ref: 00403851
                              • GetClassInfoA.USER32(00000000,RichEdit,00422E80), ref: 0040385E
                              • RegisterClassA.USER32(00422E80), ref: 00403867
                              • DialogBoxParamA.USER32(?,00000000,004039A0,00000000), ref: 00403886
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDefaultDialogFileHandleImageLanguageModuleParamParametersProcShowSystemUserlstrcatlstrcmpilstrlenwsprintf
                              • String ID: "C:\Users\user\Desktop\xLDz0WPZYc.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Studerekammermenneskes$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$Slibrighederne Setup: Installing$_Nb
                              • API String ID: 2262724009-1270444294
                              • Opcode ID: 04695480405891d431fb5b182ebd05ffb522bb116bc315d28555dd4449e2f2fa
                              • Instruction ID: a1152651de681702ec182a4452d53c4528d9546a1521c59b1686b62f96f1e611
                              • Opcode Fuzzy Hash: 04695480405891d431fb5b182ebd05ffb522bb116bc315d28555dd4449e2f2fa
                              • Instruction Fuzzy Hash: 966107B16442007FD7206F659D85F2B3AACEB4474AF40457FF840B62E1C7BD6D029A2E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 342 402c29-402c77 GetTickCount GetModuleFileNameA call 40584e 345 402c83-402cb1 call 405bbd call 405694 call 405bbd GetFileSize 342->345 346 402c79-402c7e 342->346 354 402cb7 345->354 355 402d9e-402dac call 402bc5 345->355 347 402e5b-402e5f 346->347 356 402cbc-402cd3 354->356 361 402e01-402e06 355->361 362 402dae-402db1 355->362 358 402cd5 356->358 359 402cd7-402ce0 call 403055 356->359 358->359 368 402ce6-402ced 359->368 369 402e08-402e10 call 402bc5 359->369 361->347 364 402db3-402dcb call 40306b call 403055 362->364 365 402dd5-402dff GlobalAlloc call 40306b call 402e62 362->365 364->361 388 402dcd-402dd3 364->388 365->361 393 402e12-402e23 365->393 372 402d69-402d6d 368->372 373 402cef-402d03 call 405809 368->373 369->361 377 402d77-402d7d 372->377 378 402d6f-402d76 call 402bc5 372->378 373->377 391 402d05-402d0c 373->391 384 402d8c-402d96 377->384 385 402d7f-402d89 call 405f5a 377->385 378->377 384->356 392 402d9c 384->392 385->384 388->361 388->365 391->377 397 402d0e-402d15 391->397 392->355 394 402e25 393->394 395 402e2b-402e30 393->395 394->395 398 402e31-402e37 395->398 397->377 399 402d17-402d1e 397->399 398->398 400 402e39-402e54 SetFilePointer call 405809 398->400 399->377 401 402d20-402d27 399->401 404 402e59 400->404 401->377 403 402d29-402d49 401->403 403->361 405 402d4f-402d53 403->405 404->347 406 402d55-402d59 405->406 407 402d5b-402d63 405->407 406->392 406->407 407->377 408 402d65-402d67 407->408 408->377
                              APIs
                              • GetTickCount.KERNEL32 ref: 00402C3A
                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\xLDz0WPZYc.exe,00000400), ref: 00402C56
                                • Part of subcall function 0040584E: GetFileAttributesA.KERNELBASE(00000003,00402C69,C:\Users\user\Desktop\xLDz0WPZYc.exe,80000000,00000003), ref: 00405852
                                • Part of subcall function 0040584E: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405874
                              • GetFileSize.KERNEL32(00000000,00000000,0042B000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\xLDz0WPZYc.exe,C:\Users\user\Desktop\xLDz0WPZYc.exe,80000000,00000003), ref: 00402CA2
                              Strings
                              • C:\Users\user\Desktop, xrefs: 00402C84, 00402C89, 00402C8F
                              • C:\Users\user\Desktop\xLDz0WPZYc.exe, xrefs: 00402C40, 00402C4F, 00402C63, 00402C83
                              • Inst, xrefs: 00402D0E
                              • Null, xrefs: 00402D20
                              • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402E01
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00402C33
                              • Error launching installer, xrefs: 00402C79
                              • "C:\Users\user\Desktop\xLDz0WPZYc.exe", xrefs: 00402C29
                              • soft, xrefs: 00402D17
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: File$AttributesCountCreateModuleNameSizeTick
                              • String ID: "C:\Users\user\Desktop\xLDz0WPZYc.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\xLDz0WPZYc.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                              • API String ID: 4283519449-2831543835
                              • Opcode ID: 83888f2de956a22d0bc41c9bd18695b65df7ebb646604f4f840fd8a04a0cb393
                              • Instruction ID: f25878a385a50b793721b7c2dc62060375717e7a9e735ffe9872fd5df72a7917
                              • Opcode Fuzzy Hash: 83888f2de956a22d0bc41c9bd18695b65df7ebb646604f4f840fd8a04a0cb393
                              • Instruction Fuzzy Hash: 7651F671A00215ABDB20AF65DE89F9E7BB8EB04315F10413BF904B62D1D7BC9E418B9D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 540 40173f-401762 call 4029fd call 4056ba 545 401764-40176a call 405bbd 540->545 546 40176c-40177e call 405bbd call 40564d lstrcatA 540->546 552 401783-401789 call 405e28 545->552 546->552 556 40178e-401792 552->556 557 401794-40179e call 405ec1 556->557 558 4017c5-4017c8 556->558 566 4017b0-4017c2 557->566 567 4017a0-4017ae CompareFileTime 557->567 560 4017d0-4017ec call 40584e 558->560 561 4017ca-4017cb call 405829 558->561 568 401864-40188d call 404ea6 call 402e62 560->568 569 4017ee-4017f1 560->569 561->560 566->558 567->566 583 401895-4018a1 SetFileTime 568->583 584 40188f-401893 568->584 570 4017f3-401835 call 405bbd * 2 call 405bdf call 405bbd call 4053d1 569->570 571 401846-401850 call 404ea6 569->571 570->556 604 40183b-40183c 570->604 581 401859-40185f 571->581 585 40289b 581->585 587 4018a7-4018b2 CloseHandle 583->587 584->583 584->587 591 40289d-4028a1 585->591 589 402892-402895 587->589 590 4018b8-4018bb 587->590 589->585 593 4018d0-4018d3 call 405bdf 590->593 594 4018bd-4018ce call 405bdf lstrcatA 590->594 599 4018d8-40222b call 4053d1 593->599 594->599 599->591 604->581 606 40183e-40183f 604->606 606->571
                              APIs
                              • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\Studerekammermenneskes,00000000,00000000,00000031), ref: 0040177E
                              • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Studerekammermenneskes,00000000,00000000,00000031), ref: 004017A8
                                • Part of subcall function 00405BBD: lstrcpynA.KERNEL32(?,?,00000400,00403126,Slibrighederne Setup,NSIS Error), ref: 00405BCA
                                • Part of subcall function 00404EA6: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll,00000000,0040E888,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000,?), ref: 00404EDF
                                • Part of subcall function 00404EA6: lstrlenA.KERNEL32(00402F92,Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll,00000000,0040E888,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000), ref: 00404EEF
                                • Part of subcall function 00404EA6: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll,00402F92,00402F92,Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll,00000000,0040E888,00000000), ref: 00404F02
                                • Part of subcall function 00404EA6: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll), ref: 00404F14
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F3A
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F54
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F62
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                              • String ID: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp$C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll$C:\Users\user\AppData\Roaming\Studerekammermenneskes$Call
                              • API String ID: 1941528284-3156494646
                              • Opcode ID: 0dbdba9127f361ca1c3b0cd58f3bcc8fe4d3a2439afdc42ac3f5675bdd0654d3
                              • Instruction ID: 209590ddbc3a68456c4598a6b25cf33bb68440e8bdc93e33a46783fb3c58ae9b
                              • Opcode Fuzzy Hash: 0dbdba9127f361ca1c3b0cd58f3bcc8fe4d3a2439afdc42ac3f5675bdd0654d3
                              • Instruction Fuzzy Hash: 6F41C472900514BADF10BBA9DC46EAF3679EF01368F20823BF512F10E1D77C5A418AAD

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 607 404ea6-404ebb 608 404f71-404f75 607->608 609 404ec1-404ed3 607->609 610 404ed5-404ed9 call 405bdf 609->610 611 404ede-404eea lstrlenA 609->611 610->611 613 404f07-404f0b 611->613 614 404eec-404efc lstrlenA 611->614 615 404f1a-404f1e 613->615 616 404f0d-404f14 SetWindowTextA 613->616 614->608 617 404efe-404f02 lstrcatA 614->617 618 404f20-404f62 SendMessageA * 3 615->618 619 404f64-404f66 615->619 616->615 617->613 618->619 619->608 620 404f68-404f6b 619->620 620->608
                              APIs
                              • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll,00000000,0040E888,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000,?), ref: 00404EDF
                              • lstrlenA.KERNEL32(00402F92,Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll,00000000,0040E888,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000), ref: 00404EEF
                              • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll,00402F92,00402F92,Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll,00000000,0040E888,00000000), ref: 00404F02
                              • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll), ref: 00404F14
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F3A
                              • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F54
                              • SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F62
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                              • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll
                              • API String ID: 2531174081-718370586
                              • Opcode ID: 42d41b05157e019d59a8c95eb738bd9c3ef6bfcc5de6f75fe76b0678c24a36e0
                              • Instruction ID: c9e29023339c79119f92ef6614343089cfde3ac0fe0689c8293f17bbb72fca3e
                              • Opcode Fuzzy Hash: 42d41b05157e019d59a8c95eb738bd9c3ef6bfcc5de6f75fe76b0678c24a36e0
                              • Instruction Fuzzy Hash: D0219DB2900118BEDF119FA5CD849DEBFB9EF44354F14807AF944B6291C3789E418BA8

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 621 402e62-402e76 622 402e78 621->622 623 402e7f-402e87 621->623 622->623 624 402e89 623->624 625 402e8e-402e93 623->625 624->625 626 402ea3-402eb0 call 403055 625->626 627 402e95-402e9e call 40306b 625->627 631 403000 626->631 632 402eb6-402eba 626->632 627->626 635 403002-403003 631->635 633 402ec0-402ee0 GetTickCount call 405fc8 632->633 634 402fe9-402feb 632->634 645 40304b 633->645 647 402ee6-402eee 633->647 638 403040-403044 634->638 639 402fed-402ff0 634->639 637 40304e-403052 635->637 643 403005-40300b 638->643 644 403046 638->644 640 402ff2 639->640 641 402ff5-402ffe call 403055 639->641 640->641 641->631 654 403048 641->654 648 403010-40301e call 403055 643->648 649 40300d 643->649 644->645 645->637 651 402ef0 647->651 652 402ef3-402f01 call 403055 647->652 648->631 658 403020-403033 WriteFile 648->658 649->648 651->652 652->631 659 402f07-402f10 652->659 654->645 660 402fe5-402fe7 658->660 661 403035-403038 658->661 662 402f16-402f33 call 405fe8 659->662 660->635 661->660 663 40303a-40303d 661->663 666 402fe1-402fe3 662->666 667 402f39-402f50 GetTickCount 662->667 663->638 666->635 668 402f52-402f5a 667->668 669 402f95-402f99 667->669 672 402f62-402f8d MulDiv wsprintfA call 404ea6 668->672 673 402f5c-402f60 668->673 670 402fd6-402fd9 669->670 671 402f9b-402f9e 669->671 670->647 677 402fdf 670->677 675 402fa0-402fb2 WriteFile 671->675 676 402fbe-402fc4 671->676 678 402f92 672->678 673->669 673->672 675->660 679 402fb4-402fb7 675->679 680 402fca-402fce 676->680 677->645 678->669 679->660 681 402fb9-402fbc 679->681 680->662 682 402fd4 680->682 681->680 682->645
                              APIs
                              • GetTickCount.KERNEL32 ref: 00402EC0
                              • GetTickCount.KERNEL32 ref: 00402F41
                              • MulDiv.KERNEL32(7FFFFFFF,?,00000020), ref: 00402F6E
                              • wsprintfA.USER32 ref: 00402F7E
                              • WriteFile.KERNELBASE(00000000,00000000,0040E888,00000000,00000000), ref: 00402FAA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CountTick$FileWritewsprintf
                              • String ID: ... %d%%
                              • API String ID: 4209647438-2449383134
                              • Opcode ID: 5337c28631a73469e3a27c15a5204e9a3d97955436146181da19fe4c8ecc5b92
                              • Instruction ID: 884de2ce8814a110384bf9455658e7085e50030da519773910f3f0b9c7b3960d
                              • Opcode Fuzzy Hash: 5337c28631a73469e3a27c15a5204e9a3d97955436146181da19fe4c8ecc5b92
                              • Instruction Fuzzy Hash: 49519D7190120AABCF10DF65DA08A9F3BB8AB04395F14413BF800B72C0C7789E50DBAA

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 683 401f68-401f74 684 401f7a-401f90 call 4029fd * 2 683->684 685 40202f-402031 683->685 694 401f92-401f9d GetModuleHandleA 684->694 695 401f9f-401fad LoadLibraryExA 684->695 686 40217c-402181 call 401423 685->686 693 402892-4028a1 686->693 694->695 697 401faf-401fbc GetProcAddress 694->697 695->697 698 402028-40202a 695->698 700 401ffb-402000 call 404ea6 697->700 701 401fbe-401fc4 697->701 698->686 706 402005-402008 700->706 702 401fc6-401fd2 call 401423 701->702 703 401fdd-401ff4 call 100016bd 701->703 702->706 713 401fd4-401fdb 702->713 708 401ff6-401ff9 703->708 706->693 709 40200e-402016 call 4035ae 706->709 708->706 709->693 714 40201c-402023 FreeLibrary 709->714 713->706 714->693
                              APIs
                              • GetModuleHandleA.KERNELBASE(00000000,?,?), ref: 00401F93
                                • Part of subcall function 00404EA6: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll,00000000,0040E888,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000,?), ref: 00404EDF
                                • Part of subcall function 00404EA6: lstrlenA.KERNEL32(00402F92,Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll,00000000,0040E888,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000), ref: 00404EEF
                                • Part of subcall function 00404EA6: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll,00402F92,00402F92,Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll,00000000,0040E888,00000000), ref: 00404F02
                                • Part of subcall function 00404EA6: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll), ref: 00404F14
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F3A
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F54
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F62
                              • LoadLibraryExA.KERNELBASE(00000000,?,?,?,?), ref: 00401FA3
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00401FB3
                              • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,?,?,?), ref: 0040201D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                              • String ID: `7B
                              • API String ID: 2987980305-3208876730
                              • Opcode ID: 3c243abdb5c36fad5ee734dbe8eec7e4aa61dc5a7878ef73d437412801a4ab9d
                              • Instruction ID: aaf5afebff6e040c8f3edcccfb20df8df5b0ecb9331c565b7beb057a01dbb2d2
                              • Opcode Fuzzy Hash: 3c243abdb5c36fad5ee734dbe8eec7e4aa61dc5a7878ef73d437412801a4ab9d
                              • Instruction Fuzzy Hash: 9121F672904211B6CF107FA48E8DA6E39B0AB44318F20823BF600B62D0D7BC4941DA5E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 716 4015b3-4015c6 call 4029fd call 4056e6 721 4015c8-4015e3 call 405678 CreateDirectoryA 716->721 722 40160a-40160d 716->722 729 401600-401608 721->729 730 4015e5-4015f0 GetLastError 721->730 724 401638-402181 call 401423 722->724 725 40160f-40162a call 401423 call 405bbd SetCurrentDirectoryA 722->725 738 402892-4028a1 724->738 725->738 739 401630-401633 725->739 729->721 729->722 733 4015f2-4015fb GetFileAttributesA 730->733 734 4015fd 730->734 733->729 733->734 734->729 739->738
                              APIs
                                • Part of subcall function 004056E6: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nst7960.tmp,?,00405752,C:\Users\user\AppData\Local\Temp\nst7960.tmp,C:\Users\user\AppData\Local\Temp\nst7960.tmp,?,?,75573410,0040549D,?,C:\Users\user\AppData\Local\Temp\,75573410,00000000), ref: 004056F4
                                • Part of subcall function 004056E6: CharNextA.USER32(00000000), ref: 004056F9
                                • Part of subcall function 004056E6: CharNextA.USER32(00000000), ref: 0040570D
                              • CreateDirectoryA.KERNELBASE(00000000,?,00000000,?,00000000,?), ref: 004015DB
                              • GetLastError.KERNEL32(?,00000000,?,00000000,?), ref: 004015E5
                              • GetFileAttributesA.KERNELBASE(00000000,?,00000000,?,00000000,?), ref: 004015F3
                              • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Roaming\Studerekammermenneskes,00000000,00000000,?), ref: 00401622
                              Strings
                              • C:\Users\user\AppData\Roaming\Studerekammermenneskes, xrefs: 00401617
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                              • String ID: C:\Users\user\AppData\Roaming\Studerekammermenneskes
                              • API String ID: 3751793516-3606720462
                              • Opcode ID: f854ab14f6af6053e08f1c4cbb34db86543d3dd89544386ccf80d9808bfa3a12
                              • Instruction ID: d075d57f09c15f05164e6e7227da82a4385631acf0310a11cf010d3362af65ee
                              • Opcode Fuzzy Hash: f854ab14f6af6053e08f1c4cbb34db86543d3dd89544386ccf80d9808bfa3a12
                              • Instruction Fuzzy Hash: 5F112531908150AFDB112F755D44E6F37B0EA62366768473BF891B22E2D23C0D42D62E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 742 40587d-405887 743 405888-4058b3 GetTickCount GetTempFileNameA 742->743 744 4058c2-4058c4 743->744 745 4058b5-4058b7 743->745 747 4058bc-4058bf 744->747 745->743 746 4058b9 745->746 746->747
                              APIs
                              • GetTickCount.KERNEL32 ref: 00405891
                              • GetTempFileNameA.KERNELBASE(?,?,00000000,?), ref: 004058AB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CountFileNameTempTick
                              • String ID: "C:\Users\user\Desktop\xLDz0WPZYc.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                              • API String ID: 1716503409-1267697555
                              • Opcode ID: 53651faf07563a77c89e4d9d04216bb1832e7739a800dcda734853e57c4c3aa5
                              • Instruction ID: 97602d992a1fc3ea541738fe691a17a98ed12bbd3b61733a4c4fd0f0c3479bd5
                              • Opcode Fuzzy Hash: 53651faf07563a77c89e4d9d04216bb1832e7739a800dcda734853e57c4c3aa5
                              • Instruction Fuzzy Hash: B0F05E367482086AEB109A55DC44B9B7B98DB91750F14C02AFD44AA190D6B099548B99

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 748 100016bd-100016f9 call 10001a5d 752 1000180a-1000180c 748->752 753 100016ff-10001703 748->753 754 10001705-1000170b call 100021b0 753->754 755 1000170c-10001719 call 100021fa 753->755 754->755 760 10001749-10001750 755->760 761 1000171b-10001720 755->761 762 10001770-10001774 760->762 763 10001752-1000176e call 100023da call 10001559 call 10001266 GlobalFree 760->763 764 10001722-10001723 761->764 765 1000173b-1000173e 761->765 769 100017b2-100017b8 call 100023da 762->769 770 10001776-100017b0 call 10001559 call 100023da 762->770 786 100017b9-100017bd 763->786 767 10001725-10001726 764->767 768 1000172b-1000172c call 100027ec 764->768 765->760 771 10001740-10001741 call 10002aa7 765->771 775 10001733-10001739 call 1000258d 767->775 776 10001728-10001729 767->776 782 10001731 768->782 769->786 770->786 779 10001746 771->779 785 10001748 775->785 776->760 776->768 779->785 782->779 785->760 791 100017fa-10001801 786->791 792 100017bf-100017cd call 100023a0 786->792 791->752 794 10001803-10001804 GlobalFree 791->794 798 100017e5-100017ec 792->798 799 100017cf-100017d2 792->799 794->752 798->791 801 100017ee-100017f9 call 100014e2 798->801 799->798 800 100017d4-100017dc 799->800 800->798 802 100017de-100017df FreeLibrary 800->802 801->791 802->798
                              APIs
                                • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC4
                                • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC9
                                • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CCE
                              • GlobalFree.KERNEL32(00000000), ref: 10001768
                              • FreeLibrary.KERNEL32(?), ref: 100017DF
                              • GlobalFree.KERNEL32(00000000), ref: 10001804
                                • Part of subcall function 100021B0: GlobalAlloc.KERNEL32(?,7D8BEC45), ref: 100021E2
                                • Part of subcall function 1000258D: GlobalAlloc.KERNEL32(?,?,?,?,00000000,?,?,?,?,10001739,00000000), ref: 100025FF
                                • Part of subcall function 10001559: lstrcpyA.KERNEL32(00000000,?,00000000,10001695,00000000), ref: 10001572
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1880481343.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.1880446902.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.1880503056.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.1880544481.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc$Librarylstrcpy
                              • String ID:
                              • API String ID: 1791698881-3916222277
                              • Opcode ID: 5c34708dbc5c14fa42f4b7439be41c1509afaedaf37bf6653e8bb29f9fa28a01
                              • Instruction ID: 946e86dc2be410c0748ecba0c1d48508df540d87c222276c6f0f58241c559a10
                              • Opcode Fuzzy Hash: 5c34708dbc5c14fa42f4b7439be41c1509afaedaf37bf6653e8bb29f9fa28a01
                              • Instruction Fuzzy Hash: C5318B79408205DAFB41DF649CC5BCA37ECFB042D5F018465FA0A9A09ADF78A8458A60
                              APIs
                              • lstrlenA.KERNEL32(00000000,00000011), ref: 004024EF
                              • WriteFile.KERNELBASE(00000000,?,C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll,00000000,?,?,00000000,00000011), ref: 0040250E
                              Strings
                              • C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll, xrefs: 004024DD, 00402502
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: FileWritelstrlen
                              • String ID: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll
                              • API String ID: 427699356-4076648629
                              • Opcode ID: 73dde7284d951aafa493d15edd55bc1c51bad9a2407fd8823c25f1a3ec9d0b34
                              • Instruction ID: 4e81b00b1a0a83b1a618d6832a3b29c213d1c25728c37480281a976930c2fc19
                              • Opcode Fuzzy Hash: 73dde7284d951aafa493d15edd55bc1c51bad9a2407fd8823c25f1a3ec9d0b34
                              • Instruction Fuzzy Hash: DEF089B2A14144BFDB40EBA49E49EAB7764DB40308F10443BB141F61C2D6FC5941DB7D
                              APIs
                                • Part of subcall function 00405E28: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\xLDz0WPZYc.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,0040308E,C:\Users\user\AppData\Local\Temp\,75573410,00403268), ref: 00405E80
                                • Part of subcall function 00405E28: CharNextA.USER32(?,?,?,00000000), ref: 00405E8D
                                • Part of subcall function 00405E28: CharNextA.USER32(?,"C:\Users\user\Desktop\xLDz0WPZYc.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,0040308E,C:\Users\user\AppData\Local\Temp\,75573410,00403268), ref: 00405E92
                                • Part of subcall function 00405E28: CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,0040308E,C:\Users\user\AppData\Local\Temp\,75573410,00403268), ref: 00405EA2
                              • CreateDirectoryA.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75573410,00403268), ref: 004030A3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Char$Next$CreateDirectoryPrev
                              • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                              • API String ID: 4115351271-3144792594
                              • Opcode ID: 389a80ee12a651c87ccad1e400f0b61aee7e0e7ab3a8d76480836320ff4f5ec7
                              • Instruction ID: fee6ec1a5ad4de73206782a352265a6ade63d615f6b53232b42a3ca9793d762f
                              • Opcode Fuzzy Hash: 389a80ee12a651c87ccad1e400f0b61aee7e0e7ab3a8d76480836320ff4f5ec7
                              • Instruction Fuzzy Hash: 2CD09222A4BE3062D55137663C0AFCF054C8F5631AB518077F908740C69A6D9A9249EE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2395b39049a362c34a27dfb880213796ab4f3997f605305afcf4b88fff478a5b
                              • Instruction ID: 17d8f0c9adc7b2b71efc7957c866aa3859f64222e8b37881b9213324db3bf9cd
                              • Opcode Fuzzy Hash: 2395b39049a362c34a27dfb880213796ab4f3997f605305afcf4b88fff478a5b
                              • Instruction Fuzzy Hash: E0A15171E00228CBDF28CFA8C8447ADBBB1FB44305F15806ED856BB281D7789A96DF44
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e99653bfb7f144ce5dad25bea39bf75b689d07406e35084d2878a8dabe37ac6e
                              • Instruction ID: fc305786e35d93851c8f3c5d9b38f8a429e7909e60618e2c0103eac0a9dc1c25
                              • Opcode Fuzzy Hash: e99653bfb7f144ce5dad25bea39bf75b689d07406e35084d2878a8dabe37ac6e
                              • Instruction Fuzzy Hash: C1913071E00228CBDF28CF98C8547ADBBB1FB44305F15816AD856BB281D7789A96DF44
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fe53a61097b749f1782159a8fc3ae1334c5d5d5e9ac5eec79330ddb7b6ec713b
                              • Instruction ID: 045822fc5ab24079ba69da477224c4b1a41a130b0053ffb1807465ee2ef03bcb
                              • Opcode Fuzzy Hash: fe53a61097b749f1782159a8fc3ae1334c5d5d5e9ac5eec79330ddb7b6ec713b
                              • Instruction Fuzzy Hash: AB814771E00228CFDF24CFA8C8447ADBBB1FB45305F25816AD856BB281D7789A96DF44
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f03dec724b3596635aeae071b0dd6c0542c79984eb544c4ce6f813bf1c132c47
                              • Instruction ID: efdf2bc729d78145ecf5a565514c9258b5bbce2e4cf5113e346d1a35f2b936d2
                              • Opcode Fuzzy Hash: f03dec724b3596635aeae071b0dd6c0542c79984eb544c4ce6f813bf1c132c47
                              • Instruction Fuzzy Hash: AB817771E00228CBDF24DFA8C8447AEBBB0FB45305F15816AD856BB281D7785A96DF44
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b228df2ed3587aaf6c6f9f97010ba9ba02a5f9c90de50599b2abf323e58cb698
                              • Instruction ID: c983b8745f75bf2274a463a9cfcccf5039b1f1987fed19ece7001b5e7d797120
                              • Opcode Fuzzy Hash: b228df2ed3587aaf6c6f9f97010ba9ba02a5f9c90de50599b2abf323e58cb698
                              • Instruction Fuzzy Hash: 3F712371E00228CFDF28CF98C8447ADBBB1FB44305F15806AD856BB281D7789A96DF54
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f482201699af14bb3cd10cc7f775e8512ddaef9db8a966204fce1aae5b262981
                              • Instruction ID: 3e902398f65232741f3d3f2c7f6467c21586f7f50b1ebc0ee674bbd924b4c7fc
                              • Opcode Fuzzy Hash: f482201699af14bb3cd10cc7f775e8512ddaef9db8a966204fce1aae5b262981
                              • Instruction Fuzzy Hash: FA714671E00228CFDF28CF98C8447ADBBB1FB44305F15806AD856BB281D7789A96DF44
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9a381668fc57e9f6ced01437e848a6b2accfb19374870d44d6b2c2291bed7b2e
                              • Instruction ID: 9020e7499a55ede5867a2e11e25a0f248b5ba7faeda0d39cd9abe089b181c94d
                              • Opcode Fuzzy Hash: 9a381668fc57e9f6ced01437e848a6b2accfb19374870d44d6b2c2291bed7b2e
                              • Instruction Fuzzy Hash: C5715671E00229CFEF28CF98C8447ADBBB1FB44305F15806AD856BB281D7789A96DF44
                              APIs
                                • Part of subcall function 00404EA6: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll,00000000,0040E888,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000,?), ref: 00404EDF
                                • Part of subcall function 00404EA6: lstrlenA.KERNEL32(00402F92,Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll,00000000,0040E888,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000), ref: 00404EEF
                                • Part of subcall function 00404EA6: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll,00402F92,00402F92,Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll,00000000,0040E888,00000000), ref: 00404F02
                                • Part of subcall function 00404EA6: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp\System.dll), ref: 00404F14
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F3A
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F54
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F62
                                • Part of subcall function 0040536C: CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004214E0,Error launching installer), ref: 00405395
                                • Part of subcall function 0040536C: CloseHandle.KERNEL32(?), ref: 004053A2
                              • WaitForSingleObject.KERNEL32(?,?,00000000,000000EB,00000000), ref: 00401E6C
                              • GetExitCodeProcess.KERNEL32(?,?), ref: 00401E7C
                              • CloseHandle.KERNELBASE(?,00000000,000000EB,00000000), ref: 00401EA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcat
                              • String ID:
                              • API String ID: 3521207402-0
                              • Opcode ID: c91ed9de4a6757527867ef949f32f8f167b50b71a157a29d78972e3069497e2b
                              • Instruction ID: 002f7fb6c641edc4c9e1c43034261a5554d3377b2f1f1ae98a311fa9132adf51
                              • Opcode Fuzzy Hash: c91ed9de4a6757527867ef949f32f8f167b50b71a157a29d78972e3069497e2b
                              • Instruction Fuzzy Hash: 21016D71904114FBCF20AFA1DD859AE7B71EB40344F14847BFA01B51E0C37C5A81DBAA
                              APIs
                              • RegOpenKeyExA.KERNELBASE(80000002,00405CE9,00000000,00000002,?,00000002,?,?,00405CE9,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405ACD
                              • RegQueryValueExA.KERNELBASE(?,?,00000000,00405CE9,?,00405CE9), ref: 00405AEE
                              • RegCloseKey.ADVAPI32(?), ref: 00405B0F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID:
                              • API String ID: 3677997916-0
                              • Opcode ID: a7dc294ab98d1aedf48ab84cf89b8b0d9a3be53888eb2216a8b2e534b80ab0d4
                              • Instruction ID: bd87ec550333214892aadd2865629ce231d6a2c68cbcf8666acf0199ad1a476e
                              • Opcode Fuzzy Hash: a7dc294ab98d1aedf48ab84cf89b8b0d9a3be53888eb2216a8b2e534b80ab0d4
                              • Instruction Fuzzy Hash: 6A01487114020AEFDB22CF64ED44AEB3FACEF14354F004026F905A6260D235E964CBA5
                              APIs
                                • Part of subcall function 00405829: GetFileAttributesA.KERNELBASE(?,?,00405441,?,?,00000000,00405624,?,?,?,?), ref: 0040582E
                                • Part of subcall function 00405829: SetFileAttributesA.KERNELBASE(?,00000000), ref: 00405842
                              • RemoveDirectoryA.KERNEL32(?,?,?,00000000,00405624), ref: 00405450
                              • DeleteFileA.KERNELBASE(?,?,?,00000000,00405624), ref: 00405458
                              • SetFileAttributesA.KERNEL32(?,00000000), ref: 00405470
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: File$Attributes$DeleteDirectoryRemove
                              • String ID:
                              • API String ID: 1655745494-0
                              • Opcode ID: 8fd00ee6eb4cd0b56e1a0eaf7a51cd4f8a8540850b850c2f3b8b5694c02e0256
                              • Instruction ID: 26783d4835885a93a59b83a2bd4b1d6eec4eb66ae6ada20176159b7b217e38af
                              • Opcode Fuzzy Hash: 8fd00ee6eb4cd0b56e1a0eaf7a51cd4f8a8540850b850c2f3b8b5694c02e0256
                              • Instruction Fuzzy Hash: 32E0E532908A9056C2106734AD08BDB2AD9EF86316F05893AF891B11C0C73848868ABB
                              APIs
                              • ShellExecuteA.SHELL32(?,00000000,00000000,00000000,C:\Users\user\AppData\Roaming\Studerekammermenneskes,?), ref: 00401E1E
                              Strings
                              • C:\Users\user\AppData\Roaming\Studerekammermenneskes, xrefs: 00401E09
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: ExecuteShell
                              • String ID: C:\Users\user\AppData\Roaming\Studerekammermenneskes
                              • API String ID: 587946157-3606720462
                              • Opcode ID: 70ca6f181be23fb06d3f60a7a9d57aec4edbef75b7d1a65808c4265d3677d314
                              • Instruction ID: 1a827242e624075fd0b822132d7078b468ceca4fa9ad7d7ba61b9346c8edfaa6
                              • Opcode Fuzzy Hash: 70ca6f181be23fb06d3f60a7a9d57aec4edbef75b7d1a65808c4265d3677d314
                              • Instruction Fuzzy Hash: B4F0F6B3B041047ADB41ABB59E4AE5D2BA4EB41718F240A3BF400F71C2DAFC8841F728
                              APIs
                              • SetFilePointer.KERNELBASE(00000000), ref: 100028AB
                              • GetLastError.KERNEL32 ref: 100029B2
                              Memory Dump Source
                              • Source File: 00000000.00000002.1880481343.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.1880446902.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.1880503056.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.1880544481.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: ErrorFileLastPointer
                              • String ID:
                              • API String ID: 2976181284-0
                              • Opcode ID: 10da2a693ced731503c2d5b3de2f7fe8e431c949d2a6016fe146597bbe82a282
                              • Instruction ID: 2b4501ff186f60f2b29b8b71d76009b37135a14f8b8ad132536a4a21bb517402
                              • Opcode Fuzzy Hash: 10da2a693ced731503c2d5b3de2f7fe8e431c949d2a6016fe146597bbe82a282
                              • Instruction Fuzzy Hash: 9E51A4BA908214DFFB14DF60DCC5B5937A8EB443D4F218429EA08E725DDF38A981CB94
                              APIs
                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                              • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: b1266aa11e643af42e09abacd7039328ff80c1a9d1715c4620ec2c771a0149d8
                              • Instruction ID: debc39b6c0c0c652093bc86d0143b21aa6e0fee53ad258223395c8adf4e96fc0
                              • Opcode Fuzzy Hash: b1266aa11e643af42e09abacd7039328ff80c1a9d1715c4620ec2c771a0149d8
                              • Instruction Fuzzy Hash: 69012831724210ABE7294B789D04B6A3698FB10315F11853BF851F72F1D6B8DC029B5D
                              APIs
                              • ExpandEnvironmentStringsA.KERNELBASE(00000000,?,00000400,00000001), ref: 00401A04
                              • lstrcmpA.KERNEL32(?,?,?,00000400,00000001), ref: 00401A17
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: EnvironmentExpandStringslstrcmp
                              • String ID:
                              • API String ID: 1938659011-0
                              • Opcode ID: 237656e7a5223b0fc568df716d08b201413e5858611488689f9afad6102e13d6
                              • Instruction ID: 1cebdbbb507966aa4e04b965186861386515d9572d1459ddf9e42193a25d50de
                              • Opcode Fuzzy Hash: 237656e7a5223b0fc568df716d08b201413e5858611488689f9afad6102e13d6
                              • Instruction Fuzzy Hash: FBF0A772F05201EBCB21DF699D44A9B7FE4EF51350B10803BE545F6190D2788541DF59
                              APIs
                              • ShowWindow.USER32(00000000,00000000,?), ref: 00401DC2
                              • EnableWindow.USER32(00000000,00000000), ref: 00401DCD
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Window$EnableShow
                              • String ID:
                              • API String ID: 1136574915-0
                              • Opcode ID: d72798fdfe0d8bcbd0a18b635dccf75de9a373b64156bf13e72c37387aef51bb
                              • Instruction ID: 2292e0465f89c440c037b44611e353697929a97950b3395032e547bd7800e083
                              • Opcode Fuzzy Hash: d72798fdfe0d8bcbd0a18b635dccf75de9a373b64156bf13e72c37387aef51bb
                              • Instruction Fuzzy Hash: 22E0CD72B04110EBDB10BBB45E4A55E3374DF10359B104437F501F11C1D2B85C40865D
                              APIs
                              • GetFileAttributesA.KERNELBASE(?,?,00405441,?,?,00000000,00405624,?,?,?,?), ref: 0040582E
                              • SetFileAttributesA.KERNELBASE(?,00000000), ref: 00405842
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: AttributesFile
                              • String ID:
                              • API String ID: 3188754299-0
                              • Opcode ID: 9001e84463e5b3d4dd00ca1d2e00f3bb66c1d6c16300b22364f3152d7eb201de
                              • Instruction ID: 288d8d8f9d8fe744cb80d7443cee80a3ea5bd4e337ee5555e0f2e4cd48392136
                              • Opcode Fuzzy Hash: 9001e84463e5b3d4dd00ca1d2e00f3bb66c1d6c16300b22364f3152d7eb201de
                              • Instruction Fuzzy Hash: 2AD0C972908120ABC2102728AD0889BBB55EB542717018B31FC65A22B0C7304C62CAA5
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: wsprintf
                              • String ID:
                              • API String ID: 2111968516-0
                              • Opcode ID: 52d227b069a4f50f4663a99c055d473dfe313c221a454c9b799207d0049fc586
                              • Instruction ID: 38726b43949b5a2518c2c56a8bcba1ba1be011e092181c2ab2ffeedb07cfb521
                              • Opcode Fuzzy Hash: 52d227b069a4f50f4663a99c055d473dfe313c221a454c9b799207d0049fc586
                              • Instruction Fuzzy Hash: EA212B70D05295BECF229F684E681EEBFB09B05304F64407BE490B63C5E1BC9A81CB2D
                              APIs
                              • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 00402274
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: PrivateProfileStringWrite
                              • String ID:
                              • API String ID: 390214022-0
                              • Opcode ID: 9ff6483e56f83e050050973c75d29e7e6846100e3a8c6593062fb544488b0e4d
                              • Instruction ID: 05d4d75dbd01593bae97f630dbecede8c42f44da552b6d0f9ca4defc7305ba5b
                              • Opcode Fuzzy Hash: 9ff6483e56f83e050050973c75d29e7e6846100e3a8c6593062fb544488b0e4d
                              • Instruction Fuzzy Hash: 2FE04F72B001696ADB903AF18F8DD7F21597B84304F15067EF611B62C2D9BC0D81A2B9
                              APIs
                              • SetFilePointer.KERNELBASE(00000000,?,00000000,00000002,?,?), ref: 004025ED
                                • Part of subcall function 00405B1B: wsprintfA.USER32 ref: 00405B28
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: FilePointerwsprintf
                              • String ID:
                              • API String ID: 327478801-0
                              • Opcode ID: 264239d96475cbcc5d4300545bda0f6e18d175a5ecefe532acf18532d7180738
                              • Instruction ID: bd4189dad9187afc7bd613b68c6e414ef86462d36aacf7d26f302923069a669c
                              • Opcode Fuzzy Hash: 264239d96475cbcc5d4300545bda0f6e18d175a5ecefe532acf18532d7180738
                              • Instruction Fuzzy Hash: 32E04FB6A01120BBDB01BBA55E4ADBF7778EB60309B14853BF501F00C1C3BC59019A2E
                              APIs
                              • ReadFile.KERNELBASE(00000000,00000000,?,?,00000000,000000FF,?,00403068,00000000,00000000,00402EAE,000000FF,?,00000000,00000000,00000000), ref: 004058DA
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: d04482319dc3028e4ce08f739f1cf32aeeec85f3b87b0f01a1fec36d148a5575
                              • Instruction ID: 18ab15d3875c8aca8147d786b71a19f163cd1be083ac94134eb356fb97c53e98
                              • Opcode Fuzzy Hash: d04482319dc3028e4ce08f739f1cf32aeeec85f3b87b0f01a1fec36d148a5575
                              • Instruction Fuzzy Hash: 9FE0EC3361425AEFDF10AE659C04AEB7B6CEF05360F008433FD15E2150D231E921EBA9
                              APIs
                              • VirtualProtect.KERNELBASE(1000404C,?,?,1000403C), ref: 1000272D
                              Memory Dump Source
                              • Source File: 00000000.00000002.1880481343.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.1880446902.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.1880503056.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.1880544481.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                              • Instruction ID: 4dab7c069dd6fc30f8915db09394f7f991a1b088a201bba37056324bf7fcc065
                              • Opcode Fuzzy Hash: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                              • Instruction Fuzzy Hash: 98F09BF19092A0DEF360DF688CC47063FE4E3993D5B03852AE358F6269EB7441448B19
                              APIs
                              • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 004022B2
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: PrivateProfileString
                              • String ID:
                              • API String ID: 1096422788-0
                              • Opcode ID: f8d132d461a5c4ed5c76335474cd8e98aaa4b1821b9353edac55918b86fd9ae5
                              • Instruction ID: 1024819f7f1d2ea578916dba6ac29c28ac22902c13986e1de9ff5d702d2d6265
                              • Opcode Fuzzy Hash: f8d132d461a5c4ed5c76335474cd8e98aaa4b1821b9353edac55918b86fd9ae5
                              • Instruction Fuzzy Hash: B9E08671A44209BADB406FA08E09EBD3668BF01710F10013AF9507B0D1EBB88442F72D
                              APIs
                              • SetFileAttributesA.KERNELBASE(00000000,?,?), ref: 004015A0
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: AttributesFile
                              • String ID:
                              • API String ID: 3188754299-0
                              • Opcode ID: c1a4a3283c9bf9659f66a17b5c1bdba59a903c5432fcec64ba6c0d2a491762e4
                              • Instruction ID: 9169326a2aec8439feca5866952fa18bd92df46eb8b4a67c681bb8a0ef40d438
                              • Opcode Fuzzy Hash: c1a4a3283c9bf9659f66a17b5c1bdba59a903c5432fcec64ba6c0d2a491762e4
                              • Instruction Fuzzy Hash: CDD01277B08114E7DB00EBB9AE48A9E73A4FB50325F208637D111F11D0D3B98551EA29
                              APIs
                              • SendMessageA.USER32(00010444,00000000,00000000,00000000), ref: 00403ED1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: 0196788a60c407a34fa8085170a73220ab74af89f50f0ba942ff060579b96adb
                              • Instruction ID: b3c8485646d9c058ec71e9ab696a48b88cadb806b99eba66945500c977f65eb2
                              • Opcode Fuzzy Hash: 0196788a60c407a34fa8085170a73220ab74af89f50f0ba942ff060579b96adb
                              • Instruction Fuzzy Hash: 1EC04C717442007AEA218F509D49F1777586750701F5544257254A51D0C6B4E410D66D
                              APIs
                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402DF0,?), ref: 00403079
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: FilePointer
                              • String ID:
                              • API String ID: 973152223-0
                              • Opcode ID: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                              • Instruction ID: 49fdcfdf8b1973cd13611e97ba0bfafd8618b6cb304eeeee9131019f9f046fb0
                              • Opcode Fuzzy Hash: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                              • Instruction Fuzzy Hash: 03B01271644200BFDA214F00DF05F057B21A790700F10C030B748380F082712420EB4D
                              APIs
                              • SendMessageA.USER32(?,?,?,00403CD9), ref: 00403EB6
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: b349b1325232fe021fd412571e2c6441d382bb4e6ace6bfca539dacfea62cc2e
                              • Instruction ID: 72d9328d989bd28a4b04e8d0bfc49dcb98a3c5c69b67aa4312834a6063493829
                              • Opcode Fuzzy Hash: b349b1325232fe021fd412571e2c6441d382bb4e6ace6bfca539dacfea62cc2e
                              • Instruction Fuzzy Hash: 54B01235685200BBEE324F00DD0DF497E72F764B02F008034B300240F0C6B300A5DB19
                              APIs
                              • KiUserCallbackDispatcher.NTDLL(?,00403C72), ref: 00403E9F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CallbackDispatcherUser
                              • String ID:
                              • API String ID: 2492992576-0
                              • Opcode ID: 9d98744450fa71a660f12360689da69116cf16b41945ad655af5f03ec15b630f
                              • Instruction ID: 924e4898ca7b55125a55dbaf25208a334d7a0dcb277bd93e9961852eecaff849
                              • Opcode Fuzzy Hash: 9d98744450fa71a660f12360689da69116cf16b41945ad655af5f03ec15b630f
                              • Instruction Fuzzy Hash: 9BA00176808205ABCB029B60EF09D8ABF62BBA4705B028435E65594174DA325865FF9A
                              APIs
                              • Sleep.KERNELBASE(00000000), ref: 004014E5
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: 2505bb96396968dd077fca102448b2724b96d68f41baa3939dbbddaef1709036
                              • Instruction ID: 8f5234f8cee202cc8b7374a2ab75ea98a04b7977738942e6e00dbb9fbc80be57
                              • Opcode Fuzzy Hash: 2505bb96396968dd077fca102448b2724b96d68f41baa3939dbbddaef1709036
                              • Instruction Fuzzy Hash: AED0C7B7B141006BD750E7B86E8545A73E8F75135A7148833D502E1191D17DC9418519
                              APIs
                              • GetDlgItem.USER32(?,000003F9), ref: 0040483B
                              • GetDlgItem.USER32(?,00000408), ref: 00404846
                              • GlobalAlloc.KERNEL32(?,?), ref: 00404890
                              • LoadBitmapA.USER32(0000006E), ref: 004048A3
                              • SetWindowLongA.USER32(?,?,00404E1A), ref: 004048BC
                              • ImageList_Create.COMCTL32(?,?,00000021,00000006,00000000), ref: 004048D0
                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 004048E2
                              • SendMessageA.USER32(?,00001109,00000002), ref: 004048F8
                              • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404904
                              • SendMessageA.USER32(?,0000111B,?,00000000), ref: 00404916
                              • DeleteObject.GDI32(00000000), ref: 00404919
                              • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404944
                              • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404950
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 004049E5
                              • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404A10
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404A24
                              • GetWindowLongA.USER32(?,?), ref: 00404A53
                              • SetWindowLongA.USER32(?,?,00000000), ref: 00404A61
                              • ShowWindow.USER32(?,00000005), ref: 00404A72
                              • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404B6F
                              • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404BD4
                              • SendMessageA.USER32(?,?,00000000,00000000), ref: 00404BE9
                              • SendMessageA.USER32(?,00000420,00000000,?), ref: 00404C0D
                              • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404C2D
                              • ImageList_Destroy.COMCTL32(00000000), ref: 00404C42
                              • GlobalFree.KERNEL32(00000000), ref: 00404C52
                              • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404CCB
                              • SendMessageA.USER32(?,00001102,?,?), ref: 00404D74
                              • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404D83
                              • InvalidateRect.USER32(?,00000000,?), ref: 00404DA3
                              • ShowWindow.USER32(?,00000000), ref: 00404DF1
                              • GetDlgItem.USER32(?,000003FE), ref: 00404DFC
                              • ShowWindow.USER32(00000000), ref: 00404E03
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                              • String ID: $M$N
                              • API String ID: 1638840714-813528018
                              • Opcode ID: 530fea0a5efbac08350800dd6edac4f541af9ecf28185b85d10bd058308ad18e
                              • Instruction ID: e15dc7f2636af8312206252945434afb9f5109210b4da1b7208a5bfe9f4b469d
                              • Opcode Fuzzy Hash: 530fea0a5efbac08350800dd6edac4f541af9ecf28185b85d10bd058308ad18e
                              • Instruction Fuzzy Hash: F30281B0A00209AFDB20DF54DD45AAE7BB5FB84315F10813AF610BA2E1D7789E42DF58
                              APIs
                              • GetDlgItem.USER32(?,000003FB), ref: 00404300
                              • SetWindowTextA.USER32(00000000,?), ref: 0040432A
                              • SHBrowseForFolderA.SHELL32(?,0041F0B0,?), ref: 004043DB
                              • CoTaskMemFree.OLE32(00000000), ref: 004043E6
                              • lstrcmpiA.KERNEL32(Call,Slibrighederne Setup: Installing), ref: 00404418
                              • lstrcatA.KERNEL32(?,Call), ref: 00404424
                              • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404436
                                • Part of subcall function 004053B5: GetDlgItemTextA.USER32(?,?,00000400,0040446D), ref: 004053C8
                                • Part of subcall function 00405E28: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\xLDz0WPZYc.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,0040308E,C:\Users\user\AppData\Local\Temp\,75573410,00403268), ref: 00405E80
                                • Part of subcall function 00405E28: CharNextA.USER32(?,?,?,00000000), ref: 00405E8D
                                • Part of subcall function 00405E28: CharNextA.USER32(?,"C:\Users\user\Desktop\xLDz0WPZYc.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,0040308E,C:\Users\user\AppData\Local\Temp\,75573410,00403268), ref: 00405E92
                                • Part of subcall function 00405E28: CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,0040308E,C:\Users\user\AppData\Local\Temp\,75573410,00403268), ref: 00405EA2
                              • GetDiskFreeSpaceA.KERNEL32(0041ECA8,?,?,0000040F,?,0041ECA8,0041ECA8,?,00000000,0041ECA8,?,?,000003FB,?), ref: 004044F3
                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040450E
                                • Part of subcall function 00404667: lstrlenA.KERNEL32(Slibrighederne Setup: Installing,Slibrighederne Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,00404582,000000DF,00000000,00000400,?), ref: 00404705
                                • Part of subcall function 00404667: wsprintfA.USER32 ref: 0040470D
                                • Part of subcall function 00404667: SetDlgItemTextA.USER32(?,Slibrighederne Setup: Installing), ref: 00404720
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                              • String ID: A$C:\Users\user\AppData\Roaming\Studerekammermenneskes$Call$Slibrighederne Setup: Installing$liy
                              • API String ID: 2624150263-860725345
                              • Opcode ID: 91bfd2be80532f9d84de11e62587bd6305631a6878a96e32016dec978ead2281
                              • Instruction ID: bbf5d18d822f9ae48c727ed4067559616aa27203017815afcead8a6077e661fe
                              • Opcode Fuzzy Hash: 91bfd2be80532f9d84de11e62587bd6305631a6878a96e32016dec978ead2281
                              • Instruction Fuzzy Hash: 26A172B1900208ABDB11DFA6CD45BAF77B8EF84315F10843BF605B62D1D77C9A418B69
                              APIs
                              • CoCreateInstance.OLE32(00407384,?,?,00407374,?,?,00000045,000000CD,00000002,000000DF,?), ref: 0040208B
                              • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,?,00407374,?,?), ref: 00402143
                              Strings
                              • C:\Users\user\AppData\Roaming\Studerekammermenneskes, xrefs: 004020CB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: ByteCharCreateInstanceMultiWide
                              • String ID: C:\Users\user\AppData\Roaming\Studerekammermenneskes
                              • API String ID: 123533781-3606720462
                              • Opcode ID: 39794b821fe21fb85c1b2fd3ce7377877cfb5e2fe78928dd9364a207427fc901
                              • Instruction ID: d4c62fdc28843dfc30489809ccaf5da6a3b2e007b03a33f3ec024107d8c1ad9a
                              • Opcode Fuzzy Hash: 39794b821fe21fb85c1b2fd3ce7377877cfb5e2fe78928dd9364a207427fc901
                              • Instruction Fuzzy Hash: 20417D71A00209BFCB00EFA4CE88E9E7BB5BF48314B2042A9F911FB2D0D6799D41DB54
                              APIs
                              • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 00402654
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: FileFindFirst
                              • String ID:
                              • API String ID: 1974802433-0
                              • Opcode ID: e5f9e7987e63e616f1326238460cb69c26cb86f40414b42305070d6d373339f0
                              • Instruction ID: e6850a469ed090b17ef1dde7e6b5e911daaadda975b469663bbec5c58d3b5f53
                              • Opcode Fuzzy Hash: e5f9e7987e63e616f1326238460cb69c26cb86f40414b42305070d6d373339f0
                              • Instruction Fuzzy Hash: B4F0A772604110ABD700E7749A49AEE7778DB51314F6045BBE141E20C1D3B85A41DA2A
                              APIs
                              • CheckDlgButton.USER32(00000000,-0000040A,?), ref: 00404047
                              • GetDlgItem.USER32(00000000,000003E8), ref: 0040405B
                              • SendMessageA.USER32(00000000,0000045B,?,00000000), ref: 00404079
                              • GetSysColor.USER32(?), ref: 0040408A
                              • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404099
                              • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 004040A8
                              • lstrlenA.KERNEL32(?), ref: 004040AB
                              • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004040BA
                              • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004040CF
                              • GetDlgItem.USER32(?,0000040A), ref: 00404131
                              • SendMessageA.USER32(00000000), ref: 00404134
                              • GetDlgItem.USER32(?,000003E8), ref: 0040415F
                              • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040419F
                              • LoadCursorA.USER32(00000000,00007F02), ref: 004041AE
                              • SetCursor.USER32(00000000), ref: 004041B7
                              • ShellExecuteA.SHELL32(0000070B,open,00422680,00000000,00000000,?), ref: 004041CA
                              • LoadCursorA.USER32(00000000,00007F00), ref: 004041D7
                              • SetCursor.USER32(00000000), ref: 004041DA
                              • SendMessageA.USER32(00000111,?,00000000), ref: 00404206
                              • SendMessageA.USER32(?,00000000,00000000), ref: 0040421A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                              • String ID: Call$N$liy$open
                              • API String ID: 3615053054-3381597134
                              • Opcode ID: 8a9ae112f1df4d10fa1381c7e2026d7722a962e20b7826b4dde34b5403f790f5
                              • Instruction ID: 7c7fff9fd1e172092069843c90e077616bef9326b7299cf1cce5c9f34bd91e75
                              • Opcode Fuzzy Hash: 8a9ae112f1df4d10fa1381c7e2026d7722a962e20b7826b4dde34b5403f790f5
                              • Instruction Fuzzy Hash: 8961E5B1A40209BFEB109F60DD45F6A7B78FB44741F10403AFB05BA2D1C7B8A951CB99
                              APIs
                              • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                              • BeginPaint.USER32(?,?), ref: 00401047
                              • GetClientRect.USER32(?,?), ref: 0040105B
                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                              • DeleteObject.GDI32(?), ref: 004010ED
                              • CreateFontIndirectA.GDI32(?), ref: 00401105
                              • SetBkMode.GDI32(00000000,?), ref: 00401126
                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                              • SelectObject.GDI32(00000000,?), ref: 00401140
                              • DrawTextA.USER32(00000000,Slibrighederne Setup,000000FF,00000010,00000820), ref: 00401156
                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                              • DeleteObject.GDI32(?), ref: 00401165
                              • EndPaint.USER32(?,?), ref: 0040116E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                              • String ID: F$Slibrighederne Setup
                              • API String ID: 941294808-2379504175
                              • Opcode ID: a90db4dcded700d55ffd4d6edc3f30b5524a69ea874a0a58a5b4fb777f83a2a0
                              • Instruction ID: b42f37c54e1c8f574f2bede5c8fc4b0b0bf13e7bd3a3dea2e6496186089e6917
                              • Opcode Fuzzy Hash: a90db4dcded700d55ffd4d6edc3f30b5524a69ea874a0a58a5b4fb777f83a2a0
                              • Instruction Fuzzy Hash: A8419B71804249AFCB058F94CD459BFBBB9FF44310F00812AF961AA1A0C778EA50DFA5
                              APIs
                              • lstrcpyA.KERNEL32(00421A68,NUL,?,00000000,?,00000000,?,00405A99,?,?,?,0040563C,?,00000000,000000F1,?), ref: 00405905
                              • CloseHandle.KERNEL32(00000000,00000000,00000000,?,?,00000000,?,00405A99,?,?,?,0040563C,?,00000000,000000F1,?), ref: 00405929
                              • GetShortPathNameA.KERNEL32(00000000,00421A68,00000400), ref: 00405932
                                • Part of subcall function 004057B3: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004059E2,00000000,[Rename],00000000,00000000,00000000), ref: 004057C3
                                • Part of subcall function 004057B3: lstrlenA.KERNEL32(004059E2,?,00000000,004059E2,00000000,[Rename],00000000,00000000,00000000), ref: 004057F5
                              • GetShortPathNameA.KERNEL32(?,00421E68,00000400), ref: 0040594F
                              • wsprintfA.USER32 ref: 0040596D
                              • GetFileSize.KERNEL32(00000000,00000000,00421E68,C0000000,?,00421E68,?,?,?,?,?), ref: 004059A8
                              • GlobalAlloc.KERNEL32(?,0000000A), ref: 004059B7
                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 004059EF
                              • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00421668,00000000,-0000000A,00409388,00000000,[Rename],00000000,00000000,00000000), ref: 00405A45
                              • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405A57
                              • GlobalFree.KERNEL32(00000000), ref: 00405A5E
                              • CloseHandle.KERNEL32(00000000), ref: 00405A65
                                • Part of subcall function 0040584E: GetFileAttributesA.KERNELBASE(00000003,00402C69,C:\Users\user\Desktop\xLDz0WPZYc.exe,80000000,00000003), ref: 00405852
                                • Part of subcall function 0040584E: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405874
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                              • String ID: %s=%s$NUL$[Rename]
                              • API String ID: 1265525490-4148678300
                              • Opcode ID: 1c7b9dc5b9d373c95b3dd538fd3a589de0fc08670cd7a038be037713092c8044
                              • Instruction ID: e8cacc7e92f5bf2d1a44c635cad04a40df604100f7174d9fb2de66c5d7927451
                              • Opcode Fuzzy Hash: 1c7b9dc5b9d373c95b3dd538fd3a589de0fc08670cd7a038be037713092c8044
                              • Instruction Fuzzy Hash: 60410171704B19BFD3206B215C89F6B3A5CDB45714F14023ABD01F62D2D67CA8018E7E
                              APIs
                              • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\xLDz0WPZYc.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,0040308E,C:\Users\user\AppData\Local\Temp\,75573410,00403268), ref: 00405E80
                              • CharNextA.USER32(?,?,?,00000000), ref: 00405E8D
                              • CharNextA.USER32(?,"C:\Users\user\Desktop\xLDz0WPZYc.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,0040308E,C:\Users\user\AppData\Local\Temp\,75573410,00403268), ref: 00405E92
                              • CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,0040308E,C:\Users\user\AppData\Local\Temp\,75573410,00403268), ref: 00405EA2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Char$Next$Prev
                              • String ID: "C:\Users\user\Desktop\xLDz0WPZYc.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                              • API String ID: 589700163-2070423517
                              • Opcode ID: 936ec53846ae3d4c979f0b86072daa16fddb5806f2a9e6e631d156a7122fd3c6
                              • Instruction ID: a4a2cc105071513804232ace241bb9437e981183223a596247e33b0ed04e6b88
                              • Opcode Fuzzy Hash: 936ec53846ae3d4c979f0b86072daa16fddb5806f2a9e6e631d156a7122fd3c6
                              • Instruction Fuzzy Hash: F111C461805B9129FB3217248C44B776F89CB96B60F18047BE5C4B22C3D77C5E428EAD
                              APIs
                              • GetWindowLongA.USER32(?,000000EB), ref: 00403EF7
                              • GetSysColor.USER32(00000000), ref: 00403F13
                              • SetTextColor.GDI32(?,00000000), ref: 00403F1F
                              • SetBkMode.GDI32(?,?), ref: 00403F2B
                              • GetSysColor.USER32(?), ref: 00403F3E
                              • SetBkColor.GDI32(?,?), ref: 00403F4E
                              • DeleteObject.GDI32(?), ref: 00403F68
                              • CreateBrushIndirect.GDI32(?), ref: 00403F72
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                              • String ID:
                              • API String ID: 2320649405-0
                              • Opcode ID: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                              • Instruction ID: d122295a95d7a35518708bb3646b4b032600d4a0088814026e1a2530b61c3467
                              • Opcode Fuzzy Hash: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                              • Instruction Fuzzy Hash: 04218471904705ABC7219F68DD08B4BBFF8AF01715F048A29E996E22E1D738EA44CB55
                              APIs
                              • GlobalFree.KERNEL32(00000000), ref: 1000234A
                                • Part of subcall function 10001224: lstrcpynA.KERNEL32(00000000,?,100012CF,-1000404B,100011AB,-000000A0), ref: 10001234
                              • GlobalAlloc.KERNEL32(?,?), ref: 100022C3
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 100022D8
                              • GlobalAlloc.KERNEL32(?,?), ref: 100022E7
                              • CLSIDFromString.OLE32(00000000,00000000), ref: 100022F4
                              • GlobalFree.KERNEL32(00000000), ref: 100022FB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1880481343.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.1880446902.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.1880503056.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.1880544481.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                              • String ID:
                              • API String ID: 3730416702-0
                              • Opcode ID: 5812f53bea9c9c9f79666072e50bc0f3831b96dbb387c6cf78516ccbd9521935
                              • Instruction ID: fe65b043c70383bd2b49c92c90746d4950a0c6047a38c1932a2dc3020861886a
                              • Opcode Fuzzy Hash: 5812f53bea9c9c9f79666072e50bc0f3831b96dbb387c6cf78516ccbd9521935
                              • Instruction Fuzzy Hash: F6418BB1108711EFF720DFA48884B5BB7F8FF443D1F218929F946D61A9DB34AA448B61
                              APIs
                                • Part of subcall function 10001215: GlobalAlloc.KERNEL32(?,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                              • GlobalFree.KERNEL32(?), ref: 100024B9
                              • GlobalFree.KERNEL32(00000000), ref: 100024F3
                              Memory Dump Source
                              • Source File: 00000000.00000002.1880481343.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.1880446902.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.1880503056.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.1880544481.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc
                              • String ID:
                              • API String ID: 1780285237-0
                              • Opcode ID: 28705be4039c1f606362c20ff13fdce37c258c5b4734a68cc6567389004174f8
                              • Instruction ID: 82133e1bc6da927614d5bcfc3b496831b4cb396c3e6da136b8b2dca3161aa200
                              • Opcode Fuzzy Hash: 28705be4039c1f606362c20ff13fdce37c258c5b4734a68cc6567389004174f8
                              • Instruction Fuzzy Hash: 75319CB1504251EFF722CF94CCC4C6B7BBDEB852D4B128569FA4193228DB31AC54DB62
                              APIs
                              • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 0040478C
                              • GetMessagePos.USER32 ref: 00404794
                              • ScreenToClient.USER32(?,?), ref: 004047AE
                              • SendMessageA.USER32(?,00001111,00000000,?), ref: 004047C0
                              • SendMessageA.USER32(?,0000110C,00000000,?), ref: 004047E6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Message$Send$ClientScreen
                              • String ID: f
                              • API String ID: 41195575-1993550816
                              • Opcode ID: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                              • Instruction ID: 7320c3ca21a199b12554e0b126592fdbaa3119cb9dfe1c5a5544a419b0626cb6
                              • Opcode Fuzzy Hash: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                              • Instruction Fuzzy Hash: 7B019275D00218BADB00DB94DC85FFEBBBCAF45711F10412BBA11B71C0C3B465018BA5
                              APIs
                              • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402B5D
                              • MulDiv.KERNEL32(0008CB41,?,0008CB45), ref: 00402B88
                              • wsprintfA.USER32 ref: 00402B98
                              • SetWindowTextA.USER32(?,?), ref: 00402BA8
                              • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BBA
                              Strings
                              • verifying installer: %d%%, xrefs: 00402B92
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Text$ItemTimerWindowwsprintf
                              • String ID: verifying installer: %d%%
                              • API String ID: 1451636040-82062127
                              • Opcode ID: 7c6b42b6a0cc2db989286670b759c7d1809337f1b1d19a01d5db9df498489f5d
                              • Instruction ID: 2a4a5d9d20a729fd9d452e33c08772ea7119627e62a29752c404fbbb79c7976e
                              • Opcode Fuzzy Hash: 7c6b42b6a0cc2db989286670b759c7d1809337f1b1d19a01d5db9df498489f5d
                              • Instruction Fuzzy Hash: 5601F471940209BBDF14AF60DD49EAE3779BB04345F008039FA06B52D0D7B9A955CB59
                              APIs
                              • lstrlenA.KERNEL32(Slibrighederne Setup: Installing,Slibrighederne Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,00404582,000000DF,00000000,00000400,?), ref: 00404705
                              • wsprintfA.USER32 ref: 0040470D
                              • SetDlgItemTextA.USER32(?,Slibrighederne Setup: Installing), ref: 00404720
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: ItemTextlstrlenwsprintf
                              • String ID: %u.%u%s%s$Slibrighederne Setup: Installing
                              • API String ID: 3540041739-771727381
                              • Opcode ID: 2fef8783583e05583b13a3a111104ffe67f6f47bd1d4956f9e9fcfce1648db61
                              • Instruction ID: bb6c02d87b5a590dcf5e60bd08fb8011c89fc701b4454ccbd5a96a7ae09536e5
                              • Opcode Fuzzy Hash: 2fef8783583e05583b13a3a111104ffe67f6f47bd1d4956f9e9fcfce1648db61
                              • Instruction Fuzzy Hash: 6F11E773A041283BDB00666D9C41EAF3298DB82374F250637FA26F71D1F9799C1296E9
                              APIs
                              • RegCreateKeyExA.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040235A
                              • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsh73EF.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040237A
                              • RegSetValueExA.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsh73EF.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B3
                              • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsh73EF.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402490
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CloseCreateValuelstrlen
                              • String ID: C:\Users\user\AppData\Local\Temp\nsh73EF.tmp
                              • API String ID: 1356686001-3289883981
                              • Opcode ID: ce52fc36f8c1539fe7cd04cfea426f8ee3955a46ddb773dda666e2c71c4fce69
                              • Instruction ID: 3a938b5a8607202095c76e83426e5805640bb3b53fc5f2f09a26eea3e9d8e973
                              • Opcode Fuzzy Hash: ce52fc36f8c1539fe7cd04cfea426f8ee3955a46ddb773dda666e2c71c4fce69
                              • Instruction Fuzzy Hash: 7711A2B1E00118BFEB10AFA4DE49EAF7678FB50358F10413AF905B61D1D7B86D01AA69
                              APIs
                              • SetWindowTextA.USER32(00000000,Slibrighederne Setup), ref: 0040396B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: TextWindow
                              • String ID: "C:\Users\user\Desktop\xLDz0WPZYc.exe"$1033$Slibrighederne Setup$Slibrighederne Setup: Installing
                              • API String ID: 530164218-1143816872
                              • Opcode ID: 5114115a6ebe5231764a3ce4d605c7881d7ff0c1eb634beed4f1a3f33a5eb945
                              • Instruction ID: 871d24c221ce82b24610d398d310ce84231420a4e1270a2a5acaa8ae42907246
                              • Opcode Fuzzy Hash: 5114115a6ebe5231764a3ce4d605c7881d7ff0c1eb634beed4f1a3f33a5eb945
                              • Instruction Fuzzy Hash: 8511C6B1B046116BCB30DF55DC80A737BADEB85716364813FE802673A0D77DAD039A68
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1880481343.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.1880446902.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.1880503056.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.1880544481.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: FreeGlobal
                              • String ID:
                              • API String ID: 2979337801-0
                              • Opcode ID: 0c473814e0966ac58776859a9061c1e440c53011a0554eaa903a9fb75293bb16
                              • Instruction ID: 97b6efd1b10b48d7ee9b7c7fbc92de58723c24235f199e6d6d25645bb0e8c5d4
                              • Opcode Fuzzy Hash: 0c473814e0966ac58776859a9061c1e440c53011a0554eaa903a9fb75293bb16
                              • Instruction Fuzzy Hash: DC512532D04159AEFB55DFB488A4AEEBBF6EF453C0F12416AE841B315DCA306E4087D2
                              APIs
                              • RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?), ref: 00402A5E
                              • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402A9A
                              • RegCloseKey.ADVAPI32(?), ref: 00402AA3
                              • RegCloseKey.ADVAPI32(?), ref: 00402AC8
                              • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402AE6
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Close$DeleteEnumOpen
                              • String ID:
                              • API String ID: 1912718029-0
                              • Opcode ID: 82858c02e32d41fd7ca38c30764bbd1566dd555d0b274e926b0c66c461654363
                              • Instruction ID: 7e4692ed1c3e967feaf617caf8b683db29fbfa99fde863b1c96f6eb31ad0523a
                              • Opcode Fuzzy Hash: 82858c02e32d41fd7ca38c30764bbd1566dd555d0b274e926b0c66c461654363
                              • Instruction Fuzzy Hash: C8114C71A00109FFDF21AF90DE49DAB3B7DEB54349B104136FA05B10A0DBB49E51AF69
                              APIs
                              • GetDlgItem.USER32(?), ref: 00401CD0
                              • GetClientRect.USER32(00000000,?), ref: 00401CDD
                              • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401CFE
                              • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D0C
                              • DeleteObject.GDI32(00000000), ref: 00401D1B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                              • String ID:
                              • API String ID: 1849352358-0
                              • Opcode ID: b00f7ec418890f5e41557f0601765e71715314847e9ee516ccb0e33736116458
                              • Instruction ID: f51ac8410cbf6ce335f498807c5bd2b5625ae864585cec2d5bc31dfd5d98a64c
                              • Opcode Fuzzy Hash: b00f7ec418890f5e41557f0601765e71715314847e9ee516ccb0e33736116458
                              • Instruction Fuzzy Hash: 6DF012B2A05115BFE701EBA4EE89DAF77BCEB44301B109576F501F2191C7789D018B79
                              APIs
                              • GetDC.USER32(?), ref: 00401D29
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D36
                              • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D45
                              • ReleaseDC.USER32(?,00000000), ref: 00401D56
                              • CreateFontIndirectA.GDI32(0040A7B8), ref: 00401DA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CapsCreateDeviceFontIndirectRelease
                              • String ID:
                              • API String ID: 3808545654-0
                              • Opcode ID: 6c97ca4c977f86aacd357c2655dec619d2d0312ab6bad79a0316e8acbd74949c
                              • Instruction ID: e98614b17e7a5d10a155c4b6304f3e92ae7defc274e3a3420abb617ebef8a141
                              • Opcode Fuzzy Hash: 6c97ca4c977f86aacd357c2655dec619d2d0312ab6bad79a0316e8acbd74949c
                              • Instruction Fuzzy Hash: E3018671958340AFEB015BB4AE0ABAA3FB4E715705F208439F142B72E2C57854159B2F
                              APIs
                              • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C18
                              • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C30
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$Timeout
                              • String ID: !
                              • API String ID: 1777923405-2657877971
                              • Opcode ID: 5bd36806d10e7675ce8922960c3dd847d1fc55b80fe462cbded294bcfffbeb76
                              • Instruction ID: aec06c1df61e239cd4f76122eecd213935ad84fca4bb147c4325ce067fac4872
                              • Opcode Fuzzy Hash: 5bd36806d10e7675ce8922960c3dd847d1fc55b80fe462cbded294bcfffbeb76
                              • Instruction Fuzzy Hash: B82190B1A44208BFEF41AFB4CE4AAAE7BB5EF40344F14453EF541B61D1D6B89A40D728
                              APIs
                              • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004030A0,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75573410,00403268), ref: 00405653
                              • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004030A0,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75573410,00403268), ref: 0040565C
                              • lstrcatA.KERNEL32(?,00409014), ref: 0040566D
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 0040564D
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CharPrevlstrcatlstrlen
                              • String ID: C:\Users\user\AppData\Local\Temp\
                              • API String ID: 2659869361-4083868402
                              • Opcode ID: 890135f98a5a9138db31eb4b1572133a55ea61a04d2c03425938916b0e2dddc9
                              • Instruction ID: 2c4b20d64583e31d373f24845ccb5b94779d1f5d03349b34bc7780515f720d37
                              • Opcode Fuzzy Hash: 890135f98a5a9138db31eb4b1572133a55ea61a04d2c03425938916b0e2dddc9
                              • Instruction Fuzzy Hash: 17D0A9626059306AE20223269C05E8B3A58CF02315B040423F200B22A2C73C2D418BFE
                              APIs
                              • GetFileVersionInfoSizeA.VERSION(00000000,?,000000EE), ref: 00401EEB
                              • GlobalAlloc.KERNEL32(?,00000000,00000000,?,000000EE), ref: 00401F09
                              • GetFileVersionInfoA.VERSION(?,?,?,00000000), ref: 00401F22
                              • VerQueryValueA.VERSION(?,00409014,?,?,?,?,?,00000000), ref: 00401F3B
                                • Part of subcall function 00405B1B: wsprintfA.USER32 ref: 00405B28
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                              • String ID:
                              • API String ID: 1404258612-0
                              • Opcode ID: d5295571afff2b7ba06b8940d0c237b1bfad39176bc142ff4da2a602cba8f496
                              • Instruction ID: 9b91fbd94c6ee64b88793a3c9b4d2d612c2f555b57ffdd8fee231bc1bbe1e40f
                              • Opcode Fuzzy Hash: d5295571afff2b7ba06b8940d0c237b1bfad39176bc142ff4da2a602cba8f496
                              • Instruction Fuzzy Hash: 37115E71A00108BEDB01EFA5D981DAEBBB9EF04344B20807AF505F21A2D7389E54DB28
                              APIs
                              • CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nst7960.tmp,?,00405752,C:\Users\user\AppData\Local\Temp\nst7960.tmp,C:\Users\user\AppData\Local\Temp\nst7960.tmp,?,?,75573410,0040549D,?,C:\Users\user\AppData\Local\Temp\,75573410,00000000), ref: 004056F4
                              • CharNextA.USER32(00000000), ref: 004056F9
                              • CharNextA.USER32(00000000), ref: 0040570D
                              Strings
                              • C:\Users\user\AppData\Local\Temp\nst7960.tmp, xrefs: 004056E7
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CharNext
                              • String ID: C:\Users\user\AppData\Local\Temp\nst7960.tmp
                              • API String ID: 3213498283-3518439782
                              • Opcode ID: ac897d516f17d253cbbc7940845e643e929e97fc7ae9087a1bf94e6a79cb68aa
                              • Instruction ID: e592660a4f44971662af148b318ca823341b0dace15123b29cd69db10dd58be8
                              • Opcode Fuzzy Hash: ac897d516f17d253cbbc7940845e643e929e97fc7ae9087a1bf94e6a79cb68aa
                              • Instruction Fuzzy Hash: F8F09651918F55ABFB3262285C54B775B8CCB95361F144477E680BB2C2C27C4C41EFAA
                              APIs
                              • DestroyWindow.USER32(00000000,00000000,00402DA5,?), ref: 00402BD8
                              • GetTickCount.KERNEL32 ref: 00402BF6
                              • CreateDialogParamA.USER32(0000006F,00000000,00402B42,00000000), ref: 00402C13
                              • ShowWindow.USER32(00000000,00000005), ref: 00402C21
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Window$CountCreateDestroyDialogParamShowTick
                              • String ID:
                              • API String ID: 2102729457-0
                              • Opcode ID: a370bf3714c6657f4aa9727f83cb14b3507f4001cbab91db9230ec4a81342bf5
                              • Instruction ID: 413067c0dd52ceff9b3bae724ffe8751623181a8cae7bdb8b5040e0cc41620bd
                              • Opcode Fuzzy Hash: a370bf3714c6657f4aa9727f83cb14b3507f4001cbab91db9230ec4a81342bf5
                              • Instruction Fuzzy Hash: 43F05E7094A220ABC6216F20BE8CD9F7BBCF704B52B124876F104B12E4D678D8C1DB9C
                              APIs
                              • IsWindowVisible.USER32(?), ref: 00404E49
                              • CallWindowProcA.USER32(?,?,?,?), ref: 00404E9A
                                • Part of subcall function 00403EBF: SendMessageA.USER32(00010444,00000000,00000000,00000000), ref: 00403ED1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Window$CallMessageProcSendVisible
                              • String ID:
                              • API String ID: 3748168415-3916222277
                              • Opcode ID: ac110b3b9cb7c9f01e5231f91087d53fe1146d3d93b6dd99ce465d5e78f5ea73
                              • Instruction ID: b130d42bb84d5447e475eed3bbf3cd484b2354f0b63da773ba138cf1eceff29e
                              • Opcode Fuzzy Hash: ac110b3b9cb7c9f01e5231f91087d53fe1146d3d93b6dd99ce465d5e78f5ea73
                              • Instruction Fuzzy Hash: CB015EB1500208ABDF219F61DC80AAB3A2AF7C5760F60413BFE04762D1D73A9D51E6E9
                              APIs
                                • Part of subcall function 00405BBD: lstrcpynA.KERNEL32(?,?,00000400,00403126,Slibrighederne Setup,NSIS Error), ref: 00405BCA
                                • Part of subcall function 004056E6: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nst7960.tmp,?,00405752,C:\Users\user\AppData\Local\Temp\nst7960.tmp,C:\Users\user\AppData\Local\Temp\nst7960.tmp,?,?,75573410,0040549D,?,C:\Users\user\AppData\Local\Temp\,75573410,00000000), ref: 004056F4
                                • Part of subcall function 004056E6: CharNextA.USER32(00000000), ref: 004056F9
                                • Part of subcall function 004056E6: CharNextA.USER32(00000000), ref: 0040570D
                              • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nst7960.tmp,00000000,C:\Users\user\AppData\Local\Temp\nst7960.tmp,C:\Users\user\AppData\Local\Temp\nst7960.tmp,?,?,75573410,0040549D,?,C:\Users\user\AppData\Local\Temp\,75573410,00000000), ref: 0040578E
                              • GetFileAttributesA.KERNEL32(C:\Users\user\AppData\Local\Temp\nst7960.tmp,C:\Users\user\AppData\Local\Temp\nst7960.tmp,C:\Users\user\AppData\Local\Temp\nst7960.tmp,C:\Users\user\AppData\Local\Temp\nst7960.tmp,C:\Users\user\AppData\Local\Temp\nst7960.tmp,C:\Users\user\AppData\Local\Temp\nst7960.tmp,00000000,C:\Users\user\AppData\Local\Temp\nst7960.tmp,C:\Users\user\AppData\Local\Temp\nst7960.tmp,?,?,75573410,0040549D,?,C:\Users\user\AppData\Local\Temp\,75573410), ref: 0040579E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CharNext$AttributesFilelstrcpynlstrlen
                              • String ID: C:\Users\user\AppData\Local\Temp\nst7960.tmp
                              • API String ID: 3248276644-3518439782
                              • Opcode ID: 9a736f538e34e6517b1cfb206b5d1e24f8bbb7c3ea1033a0713caced6fd308ff
                              • Instruction ID: 0bfa87336d0542cea5c484b91c2ff8d9f7cc7eb9e64ccd09754914f330dce399
                              • Opcode Fuzzy Hash: 9a736f538e34e6517b1cfb206b5d1e24f8bbb7c3ea1033a0713caced6fd308ff
                              • Instruction Fuzzy Hash: 75F0A925105E5156C62237365C05E9F1654CD82358F29053BF855B32D1DA7C8943ED7E
                              APIs
                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004214E0,Error launching installer), ref: 00405395
                              • CloseHandle.KERNEL32(?), ref: 004053A2
                              Strings
                              • Error launching installer, xrefs: 0040537F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CloseCreateHandleProcess
                              • String ID: Error launching installer
                              • API String ID: 3712363035-66219284
                              • Opcode ID: 78f56604072923640aaa3b77c56e1735b9967a1a3caa926f278c393605d87831
                              • Instruction ID: 6a75270a898cf8bf2a78dd2ca891eea3d0b09d4229ae2a6fcbb9112043bcd623
                              • Opcode Fuzzy Hash: 78f56604072923640aaa3b77c56e1735b9967a1a3caa926f278c393605d87831
                              • Instruction Fuzzy Hash: 5EE0BFB4A04209BFFB10EBA4ED45F7B7AADEB10788F408521BD14F2160D778A8108A79
                              APIs
                              • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,75573410,00403551,00403375,?), ref: 00403593
                              • GlobalFree.KERNEL32(007CCDD8), ref: 0040359A
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 0040358B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Free$GlobalLibrary
                              • String ID: C:\Users\user\AppData\Local\Temp\
                              • API String ID: 1100898210-4083868402
                              • Opcode ID: c1f6b4989b579ccb4d1bab47613fbee0e7e5134bf480dcc377e5cd6992e46223
                              • Instruction ID: 1eddd4fff873b62aaaaf221bd6291171136980a6a9d1eb58fe3111f1a180586d
                              • Opcode Fuzzy Hash: c1f6b4989b579ccb4d1bab47613fbee0e7e5134bf480dcc377e5cd6992e46223
                              • Instruction Fuzzy Hash: 26E0C233811020ABC7216F56EC09B9ABB686F48B32F06442AED407B3B0D7746D418FD8
                              APIs
                              • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402C95,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\xLDz0WPZYc.exe,C:\Users\user\Desktop\xLDz0WPZYc.exe,80000000,00000003), ref: 0040569A
                              • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402C95,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\xLDz0WPZYc.exe,C:\Users\user\Desktop\xLDz0WPZYc.exe,80000000,00000003), ref: 004056A8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CharPrevlstrlen
                              • String ID: C:\Users\user\Desktop
                              • API String ID: 2709904686-1876063424
                              • Opcode ID: c27a981e79bb352b20b7a8c74a9367836393bd04b8b6ccbc39cacac652a51138
                              • Instruction ID: 684961cdd3a6b9df4e479839de86435c839074591af8eb1459d6379f3a08a3e1
                              • Opcode Fuzzy Hash: c27a981e79bb352b20b7a8c74a9367836393bd04b8b6ccbc39cacac652a51138
                              • Instruction Fuzzy Hash: 04D0A772409D701EF30353108C04B8F7A88CF13300F490862E040E2191C37C1C818BBE
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1880481343.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.1880446902.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.1880503056.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000000.00000002.1880544481.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc
                              • String ID:
                              • API String ID: 1780285237-0
                              • Opcode ID: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                              • Instruction ID: 5d3a3765e571093bf703368c32e31ec5bfeafbef09712c331e02e9e13643e521
                              • Opcode Fuzzy Hash: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                              • Instruction Fuzzy Hash: 6531ABB1808255AFF715CFA8DC89AEA7FE8EB052C1B164115FA45D726CDB34D910CB24
                              APIs
                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004059E2,00000000,[Rename],00000000,00000000,00000000), ref: 004057C3
                              • lstrcmpiA.KERNEL32(004059E2,00000000), ref: 004057DB
                              • CharNextA.USER32(004059E2,?,00000000,004059E2,00000000,[Rename],00000000,00000000,00000000), ref: 004057EC
                              • lstrlenA.KERNEL32(004059E2,?,00000000,004059E2,00000000,[Rename],00000000,00000000,00000000), ref: 004057F5
                              Memory Dump Source
                              • Source File: 00000000.00000002.1872800226.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.1872778734.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873035936.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873387281.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1873886692.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: lstrlen$CharNextlstrcmpi
                              • String ID:
                              • API String ID: 190613189-0
                              • Opcode ID: 69516db92ab03ac2bd29524685631cd9f8e4e2de886f88dc1d7fd11a4109c375
                              • Instruction ID: ad6d9dedd63ee89ffd4e190405b35f06ce6ae84d6c36acf6f04f4a95cd08f7cb
                              • Opcode Fuzzy Hash: 69516db92ab03ac2bd29524685631cd9f8e4e2de886f88dc1d7fd11a4109c375
                              • Instruction Fuzzy Hash: 66F0C232604558FFCB12DBA4DD4099EBBA8EF06350B2140B9F800F7210D274EE01ABA9
                              APIs
                              • GetDlgItem.USER32(?,000003F9), ref: 0040483B
                              • GetDlgItem.USER32(?,00000408), ref: 00404846
                              • GlobalAlloc.KERNEL32(?,?), ref: 00404890
                              • LoadBitmapA.USER32(0000006E), ref: 004048A3
                              • SetWindowLongA.USER32(?,?,00404E1A), ref: 004048BC
                              • ImageList_Create.COMCTL32(?,?,00000021,00000006,00000000), ref: 004048D0
                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 004048E2
                              • SendMessageA.USER32(?,00001109,00000002), ref: 004048F8
                              • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404904
                              • SendMessageA.USER32(?,0000111B,?,00000000), ref: 00404916
                              • DeleteObject.GDI32(00000000), ref: 00404919
                              • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404944
                              • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404950
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 004049E5
                              • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404A10
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404A24
                              • GetWindowLongA.USER32(?,?), ref: 00404A53
                              • SetWindowLongA.USER32(?,?,00000000), ref: 00404A61
                              • ShowWindow.USER32(?,00000005), ref: 00404A72
                              • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404B6F
                              • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404BD4
                              • SendMessageA.USER32(?,?,00000000,00000000), ref: 00404BE9
                              • SendMessageA.USER32(?,00000420,00000000,?), ref: 00404C0D
                              • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404C2D
                              • ImageList_Destroy.COMCTL32(?), ref: 00404C42
                              • GlobalFree.KERNEL32(?), ref: 00404C52
                              • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404CCB
                              • SendMessageA.USER32(?,00001102,?,?), ref: 00404D74
                              • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404D83
                              • InvalidateRect.USER32(?,00000000,?), ref: 00404DA3
                              • ShowWindow.USER32(?,00000000), ref: 00404DF1
                              • GetDlgItem.USER32(?,000003FE), ref: 00404DFC
                              • ShowWindow.USER32(00000000), ref: 00404E03
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                              • String ID: $M$N
                              • API String ID: 1638840714-813528018
                              • Opcode ID: 2bac73a8463ad052ddef45fc847bc96a6d0bdbf5e3dded91a25113f7f072d885
                              • Instruction ID: e15dc7f2636af8312206252945434afb9f5109210b4da1b7208a5bfe9f4b469d
                              • Opcode Fuzzy Hash: 2bac73a8463ad052ddef45fc847bc96a6d0bdbf5e3dded91a25113f7f072d885
                              • Instruction Fuzzy Hash: F30281B0A00209AFDB20DF54DD45AAE7BB5FB84315F10813AF610BA2E1D7789E42DF58
                              APIs
                              • #17.COMCTL32 ref: 004030D7
                              • SetErrorMode.KERNEL32(00008001), ref: 004030E2
                              • OleInitialize.OLE32(00000000), ref: 004030E9
                                • Part of subcall function 00405EE8: GetModuleHandleA.KERNEL32(?,?,?,004030FB,00000009), ref: 00405EFA
                                • Part of subcall function 00405EE8: LoadLibraryA.KERNEL32(?,?,?,004030FB,00000009), ref: 00405F05
                                • Part of subcall function 00405EE8: GetProcAddress.KERNEL32(00000000,?), ref: 00405F16
                              • SHGetFileInfoA.SHELL32(0041EC98,00000000,?,?,00000000,00000009), ref: 00403111
                                • Part of subcall function 00405BBD: lstrcpynA.KERNEL32(?,?,00000400,00403126,00422EE0,NSIS Error), ref: 00405BCA
                              • GetCommandLineA.KERNEL32(00422EE0,NSIS Error), ref: 00403126
                              • GetModuleHandleA.KERNEL32(00000000,00429000,00000000), ref: 00403139
                              • CharNextA.USER32(00000000,00429000,00000020), ref: 00403164
                              • GetTempPathA.KERNEL32(00000400,0042A400,00000000,00000020), ref: 00403261
                              • GetWindowsDirectoryA.KERNEL32(0042A400,000003FB), ref: 00403272
                              • lstrcatA.KERNEL32(0042A400,\Temp), ref: 0040327E
                              • GetTempPathA.KERNEL32(000003FC,0042A400,0042A400,\Temp), ref: 00403292
                              • lstrcatA.KERNEL32(0042A400,Low), ref: 0040329A
                              • SetEnvironmentVariableA.KERNEL32(TEMP,0042A400,0042A400,Low), ref: 004032AB
                              • SetEnvironmentVariableA.KERNEL32(TMP,0042A400), ref: 004032B3
                              • DeleteFileA.KERNEL32(0042A000), ref: 004032C7
                              • OleUninitialize.OLE32(?), ref: 00403375
                              • ExitProcess.KERNEL32 ref: 00403395
                              • lstrcatA.KERNEL32(0042A400,~nsu.tmp,00429000,00000000,?), ref: 004033A1
                              • lstrcmpiA.KERNEL32(0042A400,00429C00), ref: 004033AD
                              • CreateDirectoryA.KERNEL32(0042A400,00000000), ref: 004033B9
                              • SetCurrentDirectoryA.KERNEL32(0042A400), ref: 004033C0
                              • DeleteFileA.KERNEL32(0041E898,0041E898,?,00424000,?), ref: 00403419
                              • CopyFileA.KERNEL32(0042AC00,0041E898,?), ref: 0040342D
                              • CloseHandle.KERNEL32(00000000,0041E898,0041E898,?,0041E898,00000000), ref: 0040345A
                              • GetCurrentProcess.KERNEL32(?,?,00000006,00000005,?), ref: 004034B3
                              • ExitWindowsEx.USER32(00000002,80040002), ref: 0040350B
                              • ExitProcess.KERNEL32 ref: 0040352E
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                              • String ID: "$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                              • API String ID: 4107622049-1245305578
                              • Opcode ID: b388abb6f0700d973de48b09ee8961882102ef4dc3b61a6a4565489c61c931a6
                              • Instruction ID: 19acd6a9e22a62aa3fa635d9352380a3979e711e0520c28b60a65d3217cef685
                              • Opcode Fuzzy Hash: b388abb6f0700d973de48b09ee8961882102ef4dc3b61a6a4565489c61c931a6
                              • Instruction Fuzzy Hash: 87B1E370A082516AE7216F755C89B2B7EACEB45306F04057FF581B62D2C77C9E01CB6E
                              APIs
                              • DeleteFileA.KERNEL32(?,?,0042A400,75573410,00000000), ref: 004054A6
                              • lstrcatA.KERNEL32(00420CE0,\*.*,00420CE0,?,?,0042A400,75573410,00000000), ref: 004054EE
                              • lstrcatA.KERNEL32(?,00409014,?,00420CE0,?,?,0042A400,75573410,00000000), ref: 0040550F
                              • lstrlenA.KERNEL32(?,?,00409014,?,00420CE0,?,?,0042A400,75573410,00000000), ref: 00405515
                              • FindFirstFileA.KERNEL32(00420CE0,?,?,?,00409014,?,00420CE0,?,?,0042A400,75573410,00000000), ref: 00405526
                              • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004055D3
                              • FindClose.KERNEL32(00000000), ref: 004055E4
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                              • String ID: \*.*
                              • API String ID: 2035342205-1173974218
                              • Opcode ID: 69f52b3cc5ebe97eecd0483cdb7f98893bb480c3d996df3ac4eaac56146caa8f
                              • Instruction ID: f67e5f98a1b48f8b06c5baa1d65efce896aecc78963fcddf766b22b57dd7cee7
                              • Opcode Fuzzy Hash: 69f52b3cc5ebe97eecd0483cdb7f98893bb480c3d996df3ac4eaac56146caa8f
                              • Instruction Fuzzy Hash: 1851C070800A04BADF21AB25CC45BAF7AB9DB42314F14417BF444752D6D73C9A82DEAD
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 208b979f7471c67888a02c39f93206778dc1c3e33f97723ffc6ad1ac2506ac0b
                              • Instruction ID: 01902b0c5badf26c21563370f74918c90dc48b9c290b8d647ce642e1aeaa84f8
                              • Opcode Fuzzy Hash: 208b979f7471c67888a02c39f93206778dc1c3e33f97723ffc6ad1ac2506ac0b
                              • Instruction Fuzzy Hash: 99F18671D00229CBDF28CFA8C8946ADBBB0FF45305F25856ED856BB281D7385A96CF44
                              APIs
                              • GetDlgItem.USER32(?,00000403), ref: 00405043
                              • GetDlgItem.USER32(?,000003EE), ref: 00405052
                              • GetClientRect.USER32(?,?), ref: 0040508F
                              • GetSystemMetrics.USER32(00000002), ref: 00405096
                              • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004050B7
                              • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004050C8
                              • SendMessageA.USER32(?,00001001,00000000,?), ref: 004050DB
                              • SendMessageA.USER32(?,00001026,00000000,?), ref: 004050E9
                              • SendMessageA.USER32(?,00001024,00000000,?), ref: 004050FC
                              • ShowWindow.USER32(00000000,?,0000001B,?), ref: 0040511E
                              • ShowWindow.USER32(?,?), ref: 00405132
                              • GetDlgItem.USER32(?,000003EC), ref: 00405153
                              • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405163
                              • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 0040517C
                              • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 00405188
                              • GetDlgItem.USER32(?,000003F8), ref: 00405061
                                • Part of subcall function 00403EA8: SendMessageA.USER32(?,?,?,00403CD9), ref: 00403EB6
                              • GetDlgItem.USER32(?,000003EC), ref: 004051A4
                              • CreateThread.KERNEL32(00000000,00000000,Function_00004F78,00000000), ref: 004051B2
                              • CloseHandle.KERNEL32(00000000), ref: 004051B9
                              • ShowWindow.USER32(00000000), ref: 004051DC
                              • ShowWindow.USER32(?,?), ref: 004051E3
                              • ShowWindow.USER32(?), ref: 00405229
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040525D
                              • CreatePopupMenu.USER32 ref: 0040526E
                              • AppendMenuA.USER32(00000000,00000000,?,00000000), ref: 00405283
                              • GetWindowRect.USER32(?,000000FF), ref: 004052A3
                              • TrackPopupMenu.USER32(00000000,?,?,?,00000000,?,00000000), ref: 004052BC
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004052F8
                              • OpenClipboard.USER32(00000000), ref: 00405308
                              • EmptyClipboard.USER32 ref: 0040530E
                              • GlobalAlloc.KERNEL32(00000042,?), ref: 00405317
                              • GlobalLock.KERNEL32(00000000), ref: 00405321
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405335
                              • GlobalUnlock.KERNEL32(00000000), ref: 0040534E
                              • SetClipboardData.USER32(?,00000000), ref: 00405359
                              • CloseClipboard.USER32 ref: 0040535F
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                              • String ID:
                              • API String ID: 590372296-0
                              • Opcode ID: b381ff07accca91b740710533184a9ab3046fb0851b53a6dd09934ff7c98f27d
                              • Instruction ID: 5eb751775e690fc0911b0246dac1cecdda29a979763143f7b886e47eaa108cfb
                              • Opcode Fuzzy Hash: b381ff07accca91b740710533184a9ab3046fb0851b53a6dd09934ff7c98f27d
                              • Instruction Fuzzy Hash: 8AA16971900208BFDB219FA0DD89EAE7F79FB08345F10407AFA01B61A0C7B55E519FA9
                              APIs
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004039DC
                              • ShowWindow.USER32(?), ref: 004039F9
                              • DestroyWindow.USER32 ref: 00403A0D
                              • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403A29
                              • GetDlgItem.USER32(?,?), ref: 00403A4A
                              • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403A5E
                              • IsWindowEnabled.USER32(00000000), ref: 00403A65
                              • GetDlgItem.USER32(?,?), ref: 00403B13
                              • GetDlgItem.USER32(?,00000002), ref: 00403B1D
                              • SetClassLongA.USER32(?,000000F2,?), ref: 00403B37
                              • SendMessageA.USER32(0000040F,00000000,?,?), ref: 00403B88
                              • GetDlgItem.USER32(?,00000003), ref: 00403C2E
                              • ShowWindow.USER32(00000000,?), ref: 00403C4F
                              • EnableWindow.USER32(?,?), ref: 00403C61
                              • EnableWindow.USER32(?,?), ref: 00403C7C
                              • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403C92
                              • EnableMenuItem.USER32(00000000), ref: 00403C99
                              • SendMessageA.USER32(?,?,00000000,?), ref: 00403CB1
                              • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403CC4
                              • lstrlenA.KERNEL32(0041FCD8,?,0041FCD8,00422EE0), ref: 00403CED
                              • SetWindowTextA.USER32(?,0041FCD8), ref: 00403CFC
                              • ShowWindow.USER32(?,0000000A), ref: 00403E30
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                              • String ID:
                              • API String ID: 184305955-0
                              • Opcode ID: 31da440197e13903ab35b5caa29c44a62f565bed6df0edc6ad1ad95b187a0634
                              • Instruction ID: 6a308cc8f2d4566e8290075db2a5fe9cea5b682110ca7f7f0817dc9b094a1d3c
                              • Opcode Fuzzy Hash: 31da440197e13903ab35b5caa29c44a62f565bed6df0edc6ad1ad95b187a0634
                              • Instruction Fuzzy Hash: 0EC1D271604204BBDB21AF61ED45E2B3E7DFB44706B40053EF641B12E1C779A942AF6E
                              APIs
                                • Part of subcall function 00405EE8: GetModuleHandleA.KERNEL32(?,?,?,004030FB,00000009), ref: 00405EFA
                                • Part of subcall function 00405EE8: LoadLibraryA.KERNEL32(?,?,?,004030FB,00000009), ref: 00405F05
                                • Part of subcall function 00405EE8: GetProcAddress.KERNEL32(00000000,?), ref: 00405F16
                              • lstrcatA.KERNEL32(0042A000,0041FCD8,80000001,Control Panel\Desktop\ResourceLocale,00000000,0041FCD8,00000000,00000002,0042A400,75573410,00429000,00000000), ref: 00403689
                              • lstrlenA.KERNEL32(00422680,?,?,?,00422680,00000000,00429400,0042A000,0041FCD8,80000001,Control Panel\Desktop\ResourceLocale,00000000,0041FCD8,00000000,00000002,0042A400), ref: 004036FE
                              • lstrcmpiA.KERNEL32(?,.exe), ref: 00403711
                              • GetFileAttributesA.KERNEL32(00422680), ref: 0040371C
                              • LoadImageA.USER32(00000067,?,00000000,00000000,00008040,00429400), ref: 00403765
                                • Part of subcall function 00405B1B: wsprintfA.USER32 ref: 00405B28
                              • RegisterClassA.USER32(00422E80), ref: 004037A2
                              • SystemParametersInfoA.USER32(?,00000000,?,00000000), ref: 004037BA
                              • CreateWindowExA.USER32(?,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 004037EF
                              • ShowWindow.USER32(00000005,00000000), ref: 00403825
                              • LoadLibraryA.KERNEL32(RichEd20), ref: 00403836
                              • LoadLibraryA.KERNEL32(RichEd32), ref: 00403841
                              • GetClassInfoA.USER32(00000000,RichEdit20A,00422E80), ref: 00403851
                              • GetClassInfoA.USER32(00000000,RichEdit,00422E80), ref: 0040385E
                              • RegisterClassA.USER32(00422E80), ref: 00403867
                              • DialogBoxParamA.USER32(?,00000000,004039A0,00000000), ref: 00403886
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                              • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                              • API String ID: 914957316-2904746566
                              • Opcode ID: 7971d35071aa05ff81dab10e926d659a2f5e0700c3d851db6bb124140eeac98e
                              • Instruction ID: a1152651de681702ec182a4452d53c4528d9546a1521c59b1686b62f96f1e611
                              • Opcode Fuzzy Hash: 7971d35071aa05ff81dab10e926d659a2f5e0700c3d851db6bb124140eeac98e
                              • Instruction Fuzzy Hash: 966107B16442007FD7206F659D85F2B3AACEB4474AF40457FF840B62E1C7BD6D029A2E
                              APIs
                              • CheckDlgButton.USER32(00000000,-0000040A,?), ref: 00404047
                              • GetDlgItem.USER32(00000000,000003E8), ref: 0040405B
                              • SendMessageA.USER32(00000000,0000045B,?,00000000), ref: 00404079
                              • GetSysColor.USER32(?), ref: 0040408A
                              • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404099
                              • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 004040A8
                              • lstrlenA.KERNEL32(?), ref: 004040AB
                              • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004040BA
                              • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004040CF
                              • GetDlgItem.USER32(?,0000040A), ref: 00404131
                              • SendMessageA.USER32(00000000), ref: 00404134
                              • GetDlgItem.USER32(?,000003E8), ref: 0040415F
                              • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040419F
                              • LoadCursorA.USER32(00000000,00007F02), ref: 004041AE
                              • SetCursor.USER32(00000000), ref: 004041B7
                              • ShellExecuteA.SHELL32(0000070B,open,00422680,00000000,00000000,?), ref: 004041CA
                              • LoadCursorA.USER32(00000000,00007F00), ref: 004041D7
                              • SetCursor.USER32(00000000), ref: 004041DA
                              • SendMessageA.USER32(00000111,?,00000000), ref: 00404206
                              • SendMessageA.USER32(?,00000000,00000000), ref: 0040421A
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                              • String ID: N$open
                              • API String ID: 3615053054-904208323
                              • Opcode ID: 8a9ae112f1df4d10fa1381c7e2026d7722a962e20b7826b4dde34b5403f790f5
                              • Instruction ID: 7c7fff9fd1e172092069843c90e077616bef9326b7299cf1cce5c9f34bd91e75
                              • Opcode Fuzzy Hash: 8a9ae112f1df4d10fa1381c7e2026d7722a962e20b7826b4dde34b5403f790f5
                              • Instruction Fuzzy Hash: 8961E5B1A40209BFEB109F60DD45F6A7B78FB44741F10403AFB05BA2D1C7B8A951CB99
                              APIs
                              • lstrcpyA.KERNEL32(00421A68,NUL,?,00000000,?,00000000,?,00405A99,?,?,?,0040563C,?,00000000,000000F1,?), ref: 00405905
                              • CloseHandle.KERNEL32(00000000,00000000,00000000,?,?,00000000,?,00405A99,?,?,?,0040563C,?,00000000,000000F1,?), ref: 00405929
                              • GetShortPathNameA.KERNEL32(00000000,00421A68,00000400), ref: 00405932
                                • Part of subcall function 004057B3: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004059E2,00000000,[Rename],00000000,00000000,00000000), ref: 004057C3
                                • Part of subcall function 004057B3: lstrlenA.KERNEL32(004059E2,?,00000000,004059E2,00000000,[Rename],00000000,00000000,00000000), ref: 004057F5
                              • GetShortPathNameA.KERNEL32(?,00421E68,00000400), ref: 0040594F
                              • wsprintfA.USER32 ref: 0040596D
                              • GetFileSize.KERNEL32(00000000,00000000,00421E68,C0000000,?,00421E68,?,?,?,?,?), ref: 004059A8
                              • GlobalAlloc.KERNEL32(?,0000000A), ref: 004059B7
                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 004059EF
                              • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00421668,00000000,-0000000A,00409388,00000000,[Rename],00000000,00000000,00000000), ref: 00405A45
                              • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405A57
                              • GlobalFree.KERNEL32(00000000), ref: 00405A5E
                              • CloseHandle.KERNEL32(00000000), ref: 00405A65
                                • Part of subcall function 0040584E: GetFileAttributesA.KERNEL32(00000003,00402C69,0042AC00,80000000,00000003), ref: 00405852
                                • Part of subcall function 0040584E: CreateFileA.KERNEL32(?,?,?,00000000,?,00000001,00000000), ref: 00405874
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                              • String ID: %s=%s$NUL$[Rename]
                              • API String ID: 1265525490-4148678300
                              • Opcode ID: 01610d3528054899f1ac5029cf9f41fed3e8ea2be33839406827397d3c09c535
                              • Instruction ID: e8cacc7e92f5bf2d1a44c635cad04a40df604100f7174d9fb2de66c5d7927451
                              • Opcode Fuzzy Hash: 01610d3528054899f1ac5029cf9f41fed3e8ea2be33839406827397d3c09c535
                              • Instruction Fuzzy Hash: 60410171704B19BFD3206B215C89F6B3A5CDB45714F14023ABD01F62D2D67CA8018E7E
                              APIs
                              • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                              • BeginPaint.USER32(?,?), ref: 00401047
                              • GetClientRect.USER32(?,?), ref: 0040105B
                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                              • DeleteObject.GDI32(?), ref: 004010ED
                              • CreateFontIndirectA.GDI32(?), ref: 00401105
                              • SetBkMode.GDI32(00000000,?), ref: 00401126
                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                              • SelectObject.GDI32(00000000,?), ref: 00401140
                              • DrawTextA.USER32(00000000,00422EE0,000000FF,00000010,00000820), ref: 00401156
                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                              • DeleteObject.GDI32(?), ref: 00401165
                              • EndPaint.USER32(?,?), ref: 0040116E
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                              • String ID: F
                              • API String ID: 941294808-1304234792
                              • Opcode ID: a90db4dcded700d55ffd4d6edc3f30b5524a69ea874a0a58a5b4fb777f83a2a0
                              • Instruction ID: b42f37c54e1c8f574f2bede5c8fc4b0b0bf13e7bd3a3dea2e6496186089e6917
                              • Opcode Fuzzy Hash: a90db4dcded700d55ffd4d6edc3f30b5524a69ea874a0a58a5b4fb777f83a2a0
                              • Instruction Fuzzy Hash: A8419B71804249AFCB058F94CD459BFBBB9FF44310F00812AF961AA1A0C778EA50DFA5
                              APIs
                              • GetDlgItem.USER32(?,000003FB), ref: 00404300
                              • SetWindowTextA.USER32(00000000,?), ref: 0040432A
                              • SHBrowseForFolderA.SHELL32(?,0041F0B0,?), ref: 004043DB
                              • CoTaskMemFree.OLE32(00000000), ref: 004043E6
                              • lstrcmpiA.KERNEL32(00422680,0041FCD8), ref: 00404418
                              • lstrcatA.KERNEL32(?,00422680), ref: 00404424
                              • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404436
                                • Part of subcall function 004053B5: GetDlgItemTextA.USER32(?,?,00000400,0040446D), ref: 004053C8
                                • Part of subcall function 00405E28: CharNextA.USER32(?,*?|<>/":,00000000,00429000,0042A400,0042A400,00000000,0040308E,0042A400,75573410,00403268), ref: 00405E80
                                • Part of subcall function 00405E28: CharNextA.USER32(?,?,?,00000000), ref: 00405E8D
                                • Part of subcall function 00405E28: CharNextA.USER32(?,00429000,0042A400,0042A400,00000000,0040308E,0042A400,75573410,00403268), ref: 00405E92
                                • Part of subcall function 00405E28: CharPrevA.USER32(?,?,0042A400,0042A400,00000000,0040308E,0042A400,75573410,00403268), ref: 00405EA2
                              • GetDiskFreeSpaceA.KERNEL32(0041ECA8,?,?,0000040F,?,0041ECA8,0041ECA8,?,00000000,0041ECA8,?,?,000003FB,?), ref: 004044F3
                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040450E
                                • Part of subcall function 00404667: lstrlenA.KERNEL32(0041FCD8,0041FCD8,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,00404582,000000DF,00000000,00000400,?), ref: 00404705
                                • Part of subcall function 00404667: wsprintfA.USER32 ref: 0040470D
                                • Part of subcall function 00404667: SetDlgItemTextA.USER32(?,0041FCD8), ref: 00404720
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                              • String ID: A
                              • API String ID: 2624150263-3554254475
                              • Opcode ID: a4e6f5f74388a77f828b1d624dc2ce04f5575212d3a06206028d13ac6567222f
                              • Instruction ID: bbf5d18d822f9ae48c727ed4067559616aa27203017815afcead8a6077e661fe
                              • Opcode Fuzzy Hash: a4e6f5f74388a77f828b1d624dc2ce04f5575212d3a06206028d13ac6567222f
                              • Instruction Fuzzy Hash: 26A172B1900208ABDB11DFA6CD45BAF77B8EF84315F10843BF605B62D1D77C9A418B69
                              APIs
                              • GetVersion.KERNEL32(?,0041F4B8,00000000,00404EDE,0041F4B8,00000000), ref: 00405C90
                              • GetSystemDirectoryA.KERNEL32(00422680,00000400), ref: 00405D0B
                              • GetWindowsDirectoryA.KERNEL32(00422680,00000400), ref: 00405D1E
                              • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 00405D5A
                              • SHGetPathFromIDListA.SHELL32(?,00422680), ref: 00405D68
                              • CoTaskMemFree.OLE32(?), ref: 00405D73
                              • lstrcatA.KERNEL32(00422680,\Microsoft\Internet Explorer\Quick Launch), ref: 00405D95
                              • lstrlenA.KERNEL32(00422680,?,0041F4B8,00000000,00404EDE,0041F4B8,00000000), ref: 00405DE7
                              Strings
                              • Software\Microsoft\Windows\CurrentVersion, xrefs: 00405CDA
                              • \Microsoft\Internet Explorer\Quick Launch, xrefs: 00405D8F
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                              • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                              • API String ID: 900638850-730719616
                              • Opcode ID: 4fc9a2c1a562770659ff824627d27c8fdf30e9a3a95352a1e28ae8e8292bb4a1
                              • Instruction ID: 05ce3077703b195791b94b96109b54625272672628b9f98d23919b5af99ad588
                              • Opcode Fuzzy Hash: 4fc9a2c1a562770659ff824627d27c8fdf30e9a3a95352a1e28ae8e8292bb4a1
                              • Instruction Fuzzy Hash: 0A610171A04A05AAEB205F24DC88BBF7BB4EF11304F50813BE941B62D0D27D5982DF8E
                              APIs
                              • GetTickCount.KERNEL32 ref: 00402C3A
                              • GetModuleFileNameA.KERNEL32(00000000,0042AC00,00000400), ref: 00402C56
                                • Part of subcall function 0040584E: GetFileAttributesA.KERNEL32(00000003,00402C69,0042AC00,80000000,00000003), ref: 00405852
                                • Part of subcall function 0040584E: CreateFileA.KERNEL32(?,?,?,00000000,?,00000001,00000000), ref: 00405874
                              • GetFileSize.KERNEL32(00000000,00000000,0042B000,00000000,00429C00,00429C00,0042AC00,0042AC00,80000000,00000003), ref: 00402CA2
                              Strings
                              • soft, xrefs: 00402D17
                              • Inst, xrefs: 00402D0E
                              • Null, xrefs: 00402D20
                              • Error launching installer, xrefs: 00402C79
                              • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402E01
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: File$AttributesCountCreateModuleNameSizeTick
                              • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                              • API String ID: 4283519449-1074636621
                              • Opcode ID: d2466c366b40ada891166ae0be508241e2a39c3b047db90d9cb12df27967870f
                              • Instruction ID: f25878a385a50b793721b7c2dc62060375717e7a9e735ffe9872fd5df72a7917
                              • Opcode Fuzzy Hash: d2466c366b40ada891166ae0be508241e2a39c3b047db90d9cb12df27967870f
                              • Instruction Fuzzy Hash: 7651F671A00215ABDB20AF65DE89F9E7BB8EB04315F10413BF904B62D1D7BC9E418B9D
                              APIs
                              • GetTickCount.KERNEL32 ref: 00402EC0
                              • GetTickCount.KERNEL32 ref: 00402F41
                              • MulDiv.KERNEL32(7FFFFFFF,?,00000020), ref: 00402F6E
                              • wsprintfA.USER32 ref: 00402F7E
                              • WriteFile.KERNEL32(00000000,00000000,?,00000000,00000000), ref: 00402FAA
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CountTick$FileWritewsprintf
                              • String ID: ... %d%%
                              • API String ID: 4209647438-2449383134
                              • Opcode ID: a547bbf75e58521e9f16cca8f90ae094bf7d1ef88360610581a7ff50affa0a35
                              • Instruction ID: 884de2ce8814a110384bf9455658e7085e50030da519773910f3f0b9c7b3960d
                              • Opcode Fuzzy Hash: a547bbf75e58521e9f16cca8f90ae094bf7d1ef88360610581a7ff50affa0a35
                              • Instruction Fuzzy Hash: 49519D7190120AABCF10DF65DA08A9F3BB8AB04395F14413BF800B72C0C7789E50DBAA
                              APIs
                              • GetWindowLongA.USER32(?,000000EB), ref: 00403EF7
                              • GetSysColor.USER32(00000000), ref: 00403F13
                              • SetTextColor.GDI32(?,00000000), ref: 00403F1F
                              • SetBkMode.GDI32(?,?), ref: 00403F2B
                              • GetSysColor.USER32(?), ref: 00403F3E
                              • SetBkColor.GDI32(?,?), ref: 00403F4E
                              • DeleteObject.GDI32(?), ref: 00403F68
                              • CreateBrushIndirect.GDI32(?), ref: 00403F72
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                              • String ID:
                              • API String ID: 2320649405-0
                              • Opcode ID: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                              • Instruction ID: d122295a95d7a35518708bb3646b4b032600d4a0088814026e1a2530b61c3467
                              • Opcode Fuzzy Hash: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                              • Instruction Fuzzy Hash: 04218471904705ABC7219F68DD08B4BBFF8AF01715F048A29E996E22E1D738EA44CB55
                              APIs
                              • lstrlenA.KERNEL32(0041F4B8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000,?), ref: 00404EDF
                              • lstrlenA.KERNEL32(00402F92,0041F4B8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000), ref: 00404EEF
                              • lstrcatA.KERNEL32(0041F4B8,00402F92,00402F92,0041F4B8,00000000,?,00000000), ref: 00404F02
                              • SetWindowTextA.USER32(0041F4B8,0041F4B8), ref: 00404F14
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F3A
                              • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F54
                              • SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F62
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                              • String ID:
                              • API String ID: 2531174081-0
                              • Opcode ID: 48123c3549f50a0c2ac230125184ebffb3dcbe2344fee158779a2bcc95f67cce
                              • Instruction ID: c9e29023339c79119f92ef6614343089cfde3ac0fe0689c8293f17bbb72fca3e
                              • Opcode Fuzzy Hash: 48123c3549f50a0c2ac230125184ebffb3dcbe2344fee158779a2bcc95f67cce
                              • Instruction Fuzzy Hash: D0219DB2900118BEDF119FA5CD849DEBFB9EF44354F14807AF944B6291C3789E418BA8
                              APIs
                              • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 0040478C
                              • GetMessagePos.USER32 ref: 00404794
                              • ScreenToClient.USER32(?,?), ref: 004047AE
                              • SendMessageA.USER32(?,00001111,00000000,?), ref: 004047C0
                              • SendMessageA.USER32(?,0000110C,00000000,?), ref: 004047E6
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Message$Send$ClientScreen
                              • String ID: f
                              • API String ID: 41195575-1993550816
                              • Opcode ID: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                              • Instruction ID: 7320c3ca21a199b12554e0b126592fdbaa3119cb9dfe1c5a5544a419b0626cb6
                              • Opcode Fuzzy Hash: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                              • Instruction Fuzzy Hash: 7B019275D00218BADB00DB94DC85FFEBBBCAF45711F10412BBA11B71C0C3B465018BA5
                              APIs
                              • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402B5D
                              • MulDiv.KERNEL32(?,?,?), ref: 00402B88
                              • wsprintfA.USER32 ref: 00402B98
                              • SetWindowTextA.USER32(?,?), ref: 00402BA8
                              • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BBA
                              Strings
                              • verifying installer: %d%%, xrefs: 00402B92
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Text$ItemTimerWindowwsprintf
                              • String ID: verifying installer: %d%%
                              • API String ID: 1451636040-82062127
                              • Opcode ID: d52c56e719e4219fdd43886dfdce69e46e01ec9783aaea218270728fc191bd97
                              • Instruction ID: 2a4a5d9d20a729fd9d452e33c08772ea7119627e62a29752c404fbbb79c7976e
                              • Opcode Fuzzy Hash: d52c56e719e4219fdd43886dfdce69e46e01ec9783aaea218270728fc191bd97
                              • Instruction Fuzzy Hash: 5601F471940209BBDF14AF60DD49EAE3779BB04345F008039FA06B52D0D7B9A955CB59
                              APIs
                              • GetModuleHandleA.KERNEL32(00000000,?,?), ref: 00401F93
                                • Part of subcall function 00404EA6: lstrlenA.KERNEL32(0041F4B8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000,?), ref: 00404EDF
                                • Part of subcall function 00404EA6: lstrlenA.KERNEL32(00402F92,0041F4B8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000), ref: 00404EEF
                                • Part of subcall function 00404EA6: lstrcatA.KERNEL32(0041F4B8,00402F92,00402F92,0041F4B8,00000000,?,00000000), ref: 00404F02
                                • Part of subcall function 00404EA6: SetWindowTextA.USER32(0041F4B8,0041F4B8), ref: 00404F14
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F3A
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F54
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F62
                              • LoadLibraryExA.KERNEL32(00000000,?,?,?,?), ref: 00401FA3
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00401FB3
                              • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,?,?,?), ref: 0040201D
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                              • String ID: `7B
                              • API String ID: 2987980305-3208876730
                              • Opcode ID: 3eeaf95b022f53a32a81041e378aea9a7f1b0ca266dfd8a229483f2181eced64
                              • Instruction ID: aaf5afebff6e040c8f3edcccfb20df8df5b0ecb9331c565b7beb057a01dbb2d2
                              • Opcode Fuzzy Hash: 3eeaf95b022f53a32a81041e378aea9a7f1b0ca266dfd8a229483f2181eced64
                              • Instruction Fuzzy Hash: 9121F672904211B6CF107FA48E8DA6E39B0AB44318F20823BF600B62D0D7BC4941DA5E
                              APIs
                              • CharNextA.USER32(?,*?|<>/":,00000000,00429000,0042A400,0042A400,00000000,0040308E,0042A400,75573410,00403268), ref: 00405E80
                              • CharNextA.USER32(?,?,?,00000000), ref: 00405E8D
                              • CharNextA.USER32(?,00429000,0042A400,0042A400,00000000,0040308E,0042A400,75573410,00403268), ref: 00405E92
                              • CharPrevA.USER32(?,?,0042A400,0042A400,00000000,0040308E,0042A400,75573410,00403268), ref: 00405EA2
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Char$Next$Prev
                              • String ID: *?|<>/":
                              • API String ID: 589700163-165019052
                              • Opcode ID: 936ec53846ae3d4c979f0b86072daa16fddb5806f2a9e6e631d156a7122fd3c6
                              • Instruction ID: a4a2cc105071513804232ace241bb9437e981183223a596247e33b0ed04e6b88
                              • Opcode Fuzzy Hash: 936ec53846ae3d4c979f0b86072daa16fddb5806f2a9e6e631d156a7122fd3c6
                              • Instruction Fuzzy Hash: F111C461805B9129FB3217248C44B776F89CB96B60F18047BE5C4B22C3D77C5E428EAD
                              APIs
                              • lstrcatA.KERNEL32(00000000,00000000,004093B0,00429800,00000000,00000000,00000031), ref: 0040177E
                              • CompareFileTime.KERNEL32(-00000014,?,004093B0,004093B0,00000000,00000000,004093B0,00429800,00000000,00000000,00000031), ref: 004017A8
                                • Part of subcall function 00405BBD: lstrcpynA.KERNEL32(?,?,00000400,00403126,00422EE0,NSIS Error), ref: 00405BCA
                                • Part of subcall function 00404EA6: lstrlenA.KERNEL32(0041F4B8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000,?), ref: 00404EDF
                                • Part of subcall function 00404EA6: lstrlenA.KERNEL32(00402F92,0041F4B8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00402F92,00000000), ref: 00404EEF
                                • Part of subcall function 00404EA6: lstrcatA.KERNEL32(0041F4B8,00402F92,00402F92,0041F4B8,00000000,?,00000000), ref: 00404F02
                                • Part of subcall function 00404EA6: SetWindowTextA.USER32(0041F4B8,0041F4B8), ref: 00404F14
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F3A
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F54
                                • Part of subcall function 00404EA6: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F62
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                              • String ID:
                              • API String ID: 1941528284-0
                              • Opcode ID: 90123a7a23cf7e657b86724a437a277d4c4849d416a3389a651f0a55611c47c9
                              • Instruction ID: 209590ddbc3a68456c4598a6b25cf33bb68440e8bdc93e33a46783fb3c58ae9b
                              • Opcode Fuzzy Hash: 90123a7a23cf7e657b86724a437a277d4c4849d416a3389a651f0a55611c47c9
                              • Instruction Fuzzy Hash: 6F41C472900514BADF10BBA9DC46EAF3679EF01368F20823BF512F10E1D77C5A418AAD
                              APIs
                              • RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?), ref: 00402A5E
                              • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402A9A
                              • RegCloseKey.ADVAPI32(?), ref: 00402AA3
                              • RegCloseKey.ADVAPI32(?), ref: 00402AC8
                              • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402AE6
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Close$DeleteEnumOpen
                              • String ID:
                              • API String ID: 1912718029-0
                              • Opcode ID: 82858c02e32d41fd7ca38c30764bbd1566dd555d0b274e926b0c66c461654363
                              • Instruction ID: 7e4692ed1c3e967feaf617caf8b683db29fbfa99fde863b1c96f6eb31ad0523a
                              • Opcode Fuzzy Hash: 82858c02e32d41fd7ca38c30764bbd1566dd555d0b274e926b0c66c461654363
                              • Instruction Fuzzy Hash: C8114C71A00109FFDF21AF90DE49DAB3B7DEB54349B104136FA05B10A0DBB49E51AF69
                              APIs
                              • GetDlgItem.USER32(?), ref: 00401CD0
                              • GetClientRect.USER32(00000000,?), ref: 00401CDD
                              • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401CFE
                              • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D0C
                              • DeleteObject.GDI32(00000000), ref: 00401D1B
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                              • String ID:
                              • API String ID: 1849352358-0
                              • Opcode ID: 3fa910a29a7471df273f3d5a519cdd9490650a943fe2164337c26205f225f611
                              • Instruction ID: f51ac8410cbf6ce335f498807c5bd2b5625ae864585cec2d5bc31dfd5d98a64c
                              • Opcode Fuzzy Hash: 3fa910a29a7471df273f3d5a519cdd9490650a943fe2164337c26205f225f611
                              • Instruction Fuzzy Hash: 6DF012B2A05115BFE701EBA4EE89DAF77BCEB44301B109576F501F2191C7789D018B79
                              APIs
                              • GetDC.USER32(?), ref: 00401D29
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D36
                              • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D45
                              • ReleaseDC.USER32(?,00000000), ref: 00401D56
                              • CreateFontIndirectA.GDI32(0040A7B8), ref: 00401DA1
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CapsCreateDeviceFontIndirectRelease
                              • String ID:
                              • API String ID: 3808545654-0
                              • Opcode ID: 3e946d73b4ddc9b375eb78bf312b86fbeaf2fbdf02b63083e1009b0eaaac9267
                              • Instruction ID: e98614b17e7a5d10a155c4b6304f3e92ae7defc274e3a3420abb617ebef8a141
                              • Opcode Fuzzy Hash: 3e946d73b4ddc9b375eb78bf312b86fbeaf2fbdf02b63083e1009b0eaaac9267
                              • Instruction Fuzzy Hash: E3018671958340AFEB015BB4AE0ABAA3FB4E715705F208439F142B72E2C57854159B2F
                              APIs
                              • lstrlenA.KERNEL32(0041FCD8,0041FCD8,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,00404582,000000DF,00000000,00000400,?), ref: 00404705
                              • wsprintfA.USER32 ref: 0040470D
                              • SetDlgItemTextA.USER32(?,0041FCD8), ref: 00404720
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: ItemTextlstrlenwsprintf
                              • String ID: %u.%u%s%s
                              • API String ID: 3540041739-3551169577
                              • Opcode ID: fabf217e280f95901e27d13a5b377b8772edee093bc2c09b204756cbdb802f42
                              • Instruction ID: bb6c02d87b5a590dcf5e60bd08fb8011c89fc701b4454ccbd5a96a7ae09536e5
                              • Opcode Fuzzy Hash: fabf217e280f95901e27d13a5b377b8772edee093bc2c09b204756cbdb802f42
                              • Instruction Fuzzy Hash: 6F11E773A041283BDB00666D9C41EAF3298DB82374F250637FA26F71D1F9799C1296E9
                              APIs
                              • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C18
                              • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C30
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: MessageSend$Timeout
                              • String ID: !
                              • API String ID: 1777923405-2657877971
                              • Opcode ID: 5bd36806d10e7675ce8922960c3dd847d1fc55b80fe462cbded294bcfffbeb76
                              • Instruction ID: aec06c1df61e239cd4f76122eecd213935ad84fca4bb147c4325ce067fac4872
                              • Opcode Fuzzy Hash: 5bd36806d10e7675ce8922960c3dd847d1fc55b80fe462cbded294bcfffbeb76
                              • Instruction Fuzzy Hash: B82190B1A44208BFEF41AFB4CE4AAAE7BB5EF40344F14453EF541B61D1D6B89A40D728
                              APIs
                              • RegCreateKeyExA.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040235A
                              • lstrlenA.KERNEL32(00409BB0,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040237A
                              • RegSetValueExA.ADVAPI32(?,?,?,?,00409BB0,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B3
                              • RegCloseKey.ADVAPI32(?,?,?,00409BB0,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402490
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CloseCreateValuelstrlen
                              • String ID:
                              • API String ID: 1356686001-0
                              • Opcode ID: 30e95fe6958c5ecd2dd88e436728e964ee313c43297dab67f14f7c8466dc7e6b
                              • Instruction ID: 3a938b5a8607202095c76e83426e5805640bb3b53fc5f2f09a26eea3e9d8e973
                              • Opcode Fuzzy Hash: 30e95fe6958c5ecd2dd88e436728e964ee313c43297dab67f14f7c8466dc7e6b
                              • Instruction Fuzzy Hash: 7711A2B1E00118BFEB10AFA4DE49EAF7678FB50358F10413AF905B61D1D7B86D01AA69
                              APIs
                                • Part of subcall function 004056E6: CharNextA.USER32(?,?,004210E0,?,00405752,004210E0,004210E0,0042A400,?,75573410,0040549D,?,0042A400,75573410,00000000), ref: 004056F4
                                • Part of subcall function 004056E6: CharNextA.USER32(00000000), ref: 004056F9
                                • Part of subcall function 004056E6: CharNextA.USER32(00000000), ref: 0040570D
                              • CreateDirectoryA.KERNEL32(00000000,?,00000000,?,00000000,?), ref: 004015DB
                              • GetLastError.KERNEL32(?,00000000,?,00000000,?), ref: 004015E5
                              • GetFileAttributesA.KERNEL32(00000000,?,00000000,?,00000000,?), ref: 004015F3
                              • SetCurrentDirectoryA.KERNEL32(00000000,00429800,00000000,00000000,?), ref: 00401622
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                              • String ID:
                              • API String ID: 3751793516-0
                              • Opcode ID: 341913b46653dc02a6b8c0ff5df98e195c602d220a8259587814e8818c9eeb9b
                              • Instruction ID: d075d57f09c15f05164e6e7227da82a4385631acf0310a11cf010d3362af65ee
                              • Opcode Fuzzy Hash: 341913b46653dc02a6b8c0ff5df98e195c602d220a8259587814e8818c9eeb9b
                              • Instruction Fuzzy Hash: 5F112531908150AFDB112F755D44E6F37B0EA62366768473BF891B22E2D23C0D42D62E
                              APIs
                              • GetFileVersionInfoSizeA.VERSION(00000000,?,000000EE), ref: 00401EEB
                              • GlobalAlloc.KERNEL32(?,00000000,00000000,?,000000EE), ref: 00401F09
                              • GetFileVersionInfoA.VERSION(?,?,?,00000000), ref: 00401F22
                              • VerQueryValueA.VERSION(?,00409014,?,?,?,?,?,00000000), ref: 00401F3B
                                • Part of subcall function 00405B1B: wsprintfA.USER32 ref: 00405B28
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                              • String ID:
                              • API String ID: 1404258612-0
                              • Opcode ID: d5295571afff2b7ba06b8940d0c237b1bfad39176bc142ff4da2a602cba8f496
                              • Instruction ID: 9b91fbd94c6ee64b88793a3c9b4d2d612c2f555b57ffdd8fee231bc1bbe1e40f
                              • Opcode Fuzzy Hash: d5295571afff2b7ba06b8940d0c237b1bfad39176bc142ff4da2a602cba8f496
                              • Instruction Fuzzy Hash: 37115E71A00108BEDB01EFA5D981DAEBBB9EF04344B20807AF505F21A2D7389E54DB28
                              APIs
                              • DestroyWindow.USER32(?,00000000,00402DA5,?), ref: 00402BD8
                              • GetTickCount.KERNEL32 ref: 00402BF6
                              • CreateDialogParamA.USER32(0000006F,00000000,00402B42,00000000), ref: 00402C13
                              • ShowWindow.USER32(00000000,00000005), ref: 00402C21
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Window$CountCreateDestroyDialogParamShowTick
                              • String ID:
                              • API String ID: 2102729457-0
                              • Opcode ID: a370bf3714c6657f4aa9727f83cb14b3507f4001cbab91db9230ec4a81342bf5
                              • Instruction ID: 413067c0dd52ceff9b3bae724ffe8751623181a8cae7bdb8b5040e0cc41620bd
                              • Opcode Fuzzy Hash: a370bf3714c6657f4aa9727f83cb14b3507f4001cbab91db9230ec4a81342bf5
                              • Instruction Fuzzy Hash: 43F05E7094A220ABC6216F20BE8CD9F7BBCF704B52B124876F104B12E4D678D8C1DB9C
                              APIs
                              • IsWindowVisible.USER32(?), ref: 00404E49
                              • CallWindowProcA.USER32(?,?,?,?), ref: 00404E9A
                                • Part of subcall function 00403EBF: SendMessageA.USER32(?,00000000,00000000,00000000), ref: 00403ED1
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: Window$CallMessageProcSendVisible
                              • String ID:
                              • API String ID: 3748168415-3916222277
                              • Opcode ID: ac110b3b9cb7c9f01e5231f91087d53fe1146d3d93b6dd99ce465d5e78f5ea73
                              • Instruction ID: b130d42bb84d5447e475eed3bbf3cd484b2354f0b63da773ba138cf1eceff29e
                              • Opcode Fuzzy Hash: ac110b3b9cb7c9f01e5231f91087d53fe1146d3d93b6dd99ce465d5e78f5ea73
                              • Instruction Fuzzy Hash: CB015EB1500208ABDF219F61DC80AAB3A2AF7C5760F60413BFE04762D1D73A9D51E6E9
                              APIs
                              • GetTickCount.KERNEL32 ref: 00405891
                              • GetTempFileNameA.KERNEL32(?,?,00000000,?), ref: 004058AB
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CountFileNameTempTick
                              • String ID: nsa
                              • API String ID: 1716503409-2209301699
                              • Opcode ID: 53651faf07563a77c89e4d9d04216bb1832e7739a800dcda734853e57c4c3aa5
                              • Instruction ID: 97602d992a1fc3ea541738fe691a17a98ed12bbd3b61733a4c4fd0f0c3479bd5
                              • Opcode Fuzzy Hash: 53651faf07563a77c89e4d9d04216bb1832e7739a800dcda734853e57c4c3aa5
                              • Instruction Fuzzy Hash: B0F05E367482086AEB109A55DC44B9B7B98DB91750F14C02AFD44AA190D6B099548B99
                              APIs
                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004214E0,Error launching installer), ref: 00405395
                              • CloseHandle.KERNEL32(?), ref: 004053A2
                              Strings
                              • Error launching installer, xrefs: 0040537F
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: CloseCreateHandleProcess
                              • String ID: Error launching installer
                              • API String ID: 3712363035-66219284
                              • Opcode ID: 78f56604072923640aaa3b77c56e1735b9967a1a3caa926f278c393605d87831
                              • Instruction ID: 6a75270a898cf8bf2a78dd2ca891eea3d0b09d4229ae2a6fcbb9112043bcd623
                              • Opcode Fuzzy Hash: 78f56604072923640aaa3b77c56e1735b9967a1a3caa926f278c393605d87831
                              • Instruction Fuzzy Hash: 5EE0BFB4A04209BFFB10EBA4ED45F7B7AADEB10788F408521BD14F2160D778A8108A79
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2395b39049a362c34a27dfb880213796ab4f3997f605305afcf4b88fff478a5b
                              • Instruction ID: 17d8f0c9adc7b2b71efc7957c866aa3859f64222e8b37881b9213324db3bf9cd
                              • Opcode Fuzzy Hash: 2395b39049a362c34a27dfb880213796ab4f3997f605305afcf4b88fff478a5b
                              • Instruction Fuzzy Hash: E0A15171E00228CBDF28CFA8C8447ADBBB1FB44305F15806ED856BB281D7789A96DF44
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e99653bfb7f144ce5dad25bea39bf75b689d07406e35084d2878a8dabe37ac6e
                              • Instruction ID: fc305786e35d93851c8f3c5d9b38f8a429e7909e60618e2c0103eac0a9dc1c25
                              • Opcode Fuzzy Hash: e99653bfb7f144ce5dad25bea39bf75b689d07406e35084d2878a8dabe37ac6e
                              • Instruction Fuzzy Hash: C1913071E00228CBDF28CF98C8547ADBBB1FB44305F15816AD856BB281D7789A96DF44
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fe53a61097b749f1782159a8fc3ae1334c5d5d5e9ac5eec79330ddb7b6ec713b
                              • Instruction ID: 045822fc5ab24079ba69da477224c4b1a41a130b0053ffb1807465ee2ef03bcb
                              • Opcode Fuzzy Hash: fe53a61097b749f1782159a8fc3ae1334c5d5d5e9ac5eec79330ddb7b6ec713b
                              • Instruction Fuzzy Hash: AB814771E00228CFDF24CFA8C8447ADBBB1FB45305F25816AD856BB281D7789A96DF44
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f03dec724b3596635aeae071b0dd6c0542c79984eb544c4ce6f813bf1c132c47
                              • Instruction ID: efdf2bc729d78145ecf5a565514c9258b5bbce2e4cf5113e346d1a35f2b936d2
                              • Opcode Fuzzy Hash: f03dec724b3596635aeae071b0dd6c0542c79984eb544c4ce6f813bf1c132c47
                              • Instruction Fuzzy Hash: AB817771E00228CBDF24DFA8C8447AEBBB0FB45305F15816AD856BB281D7785A96DF44
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b228df2ed3587aaf6c6f9f97010ba9ba02a5f9c90de50599b2abf323e58cb698
                              • Instruction ID: c983b8745f75bf2274a463a9cfcccf5039b1f1987fed19ece7001b5e7d797120
                              • Opcode Fuzzy Hash: b228df2ed3587aaf6c6f9f97010ba9ba02a5f9c90de50599b2abf323e58cb698
                              • Instruction Fuzzy Hash: 3F712371E00228CFDF28CF98C8447ADBBB1FB44305F15806AD856BB281D7789A96DF54
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f482201699af14bb3cd10cc7f775e8512ddaef9db8a966204fce1aae5b262981
                              • Instruction ID: 3e902398f65232741f3d3f2c7f6467c21586f7f50b1ebc0ee674bbd924b4c7fc
                              • Opcode Fuzzy Hash: f482201699af14bb3cd10cc7f775e8512ddaef9db8a966204fce1aae5b262981
                              • Instruction Fuzzy Hash: FA714671E00228CFDF28CF98C8447ADBBB1FB44305F15806AD856BB281D7789A96DF44
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9a381668fc57e9f6ced01437e848a6b2accfb19374870d44d6b2c2291bed7b2e
                              • Instruction ID: 9020e7499a55ede5867a2e11e25a0f248b5ba7faeda0d39cd9abe089b181c94d
                              • Opcode Fuzzy Hash: 9a381668fc57e9f6ced01437e848a6b2accfb19374870d44d6b2c2291bed7b2e
                              • Instruction Fuzzy Hash: C5715671E00229CFEF28CF98C8447ADBBB1FB44305F15806AD856BB281D7789A96DF44
                              APIs
                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004059E2,00000000,[Rename],00000000,00000000,00000000), ref: 004057C3
                              • lstrcmpiA.KERNEL32(004059E2,00000000), ref: 004057DB
                              • CharNextA.USER32(004059E2,?,00000000,004059E2,00000000,[Rename],00000000,00000000,00000000), ref: 004057EC
                              • lstrlenA.KERNEL32(004059E2,?,00000000,004059E2,00000000,[Rename],00000000,00000000,00000000), ref: 004057F5
                              Memory Dump Source
                              • Source File: 00000003.00000002.3325956783.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.3325936769.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325971791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3325986474.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.3326004955.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_xLDz0WPZYc.jbxd
                              Similarity
                              • API ID: lstrlen$CharNextlstrcmpi
                              • String ID:
                              • API String ID: 190613189-0
                              • Opcode ID: 69516db92ab03ac2bd29524685631cd9f8e4e2de886f88dc1d7fd11a4109c375
                              • Instruction ID: ad6d9dedd63ee89ffd4e190405b35f06ce6ae84d6c36acf6f04f4a95cd08f7cb
                              • Opcode Fuzzy Hash: 69516db92ab03ac2bd29524685631cd9f8e4e2de886f88dc1d7fd11a4109c375
                              • Instruction Fuzzy Hash: 66F0C232604558FFCB12DBA4DD4099EBBA8EF06350B2140B9F800F7210D274EE01ABA9