Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FSCaptureSetup107.exe

Overview

General Information

Sample name:FSCaptureSetup107.exe
Analysis ID:1527895
MD5:28627a37983f5dc8e00d9c03c7b2dec6
SHA1:dcfdb2464c29de44c6df1c1c0f5cf4a5342cfadb
SHA256:762463fe496836bc1e6c6a58703f45182575b29494753df3145cd5c563e07f8c
Infos:

Detection

Score:4
Range:0 - 100
Whitelisted:false
Confidence:60%

Compliance

Score:49
Range:0 - 100

Signatures

Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to shutdown / reboot the system
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • FSCaptureSetup107.exe (PID: 5284 cmdline: "C:\Users\user\Desktop\FSCaptureSetup107.exe" MD5: 28627A37983F5DC8E00D9C03C7B2DEC6)
  • FSCapture.exe (PID: 5960 cmdline: "C:\Program Files (x86)\FastStone Capture\FSCapture.exe" MD5: D5AC941C445B6EB907D0B96D84F15FE7)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Program Files (x86)\FastStone Capture\FSCPlugin06.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    C:\Program Files (x86)\FastStone Capture\FSCPlugin04.dllJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      C:\Users\user\AppData\Local\Temp\nsk6323.tmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
        No Sigma rule has matched
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        There are no malicious signatures, click here to show all signatures.

        Compliance

        barindex
        Source: FSCaptureSetup107.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeWindow detected: < &BackI &AgreeCancelwww.FastStone.org www.FastStone.orgLicense AgreementPlease review the license terms before installing FastStone Capture 10.7.Press Page Down to see the rest of the agreement.Please read the following terms and conditions carefully before using FastStone Capture. Use of FastStone Capture indicates you accept the terms of this license agreement and warranty.1. Disclaimer of WarrantyFastStone Capture (this software) is provided "as-is" and without warranty of any kind express implied or otherwise including without limitation any warranty of merchantability or fitness for a particular purpose. In no event shall the author of this software be held liable for data loss damages loss of profits or any other kind of loss while using or misusing this software.2. LicenseFastStone Capture is shareware. You may try it free for 30 days. Once this 30-day period has expired you must either purchase a license to use this software or uninstall it from your computer promptly.3. Restrictions on Use FastStone Capture must not be decompiled disassembled reverse engineered or otherwise modified. Copyright (C) 2024 FastStone Corporation. All rights reserved.If you accept the terms of the agreement click I Agree to continue. You must accept the agreement to install FastStone Capture 10.7.
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\Program Files (x86)\FastStone Capture\LicenseAgreement.txtJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\Program Files (x86)\FastStone Capture\LicenseAgreement.txtJump to behavior
        Source: FSCaptureSetup107.exeStatic PE information: certificate valid
        Source: FSCaptureSetup107.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Binary string: C:\Users\hesha\Desktop\FSCPlugin07_V1_035\FastStone.Ocr\obj\Release\FSCPlugin07.pdb source: FSCaptureSetup107.exe, 00000000.00000002.2338865430.00000000026E2000.00000004.00000020.00020000.00000000.sdmp, FSCPlugin07.exe.0.dr
        Source: Binary string: C:\Users\hesha\Desktop\FSCPlugin07_V1_035\FastStone.Ocr\obj\Release\FSCPlugin07.pdbxP source: FSCaptureSetup107.exe, 00000000.00000002.2338865430.00000000026E2000.00000004.00000020.00020000.00000000.sdmp, FSCPlugin07.exe.0.dr
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeCode function: 0_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405D74
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeCode function: 0_2_0040699E FindFirstFileW,FindClose,0_2_0040699E
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B
        Source: FSRecorder.exe.0.drString found in binary or memory: http://avisynth.org
        Source: FSCaptureSetup107.exe, FSCrossHair.exe.0.dr, FSCPlugin07.exe.0.dr, FSCPlugin06.exe.0.dr, FSRecorder.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
        Source: FSCaptureSetup107.exe, 00000000.00000002.2338865430.00000000026E2000.00000004.00000020.00020000.00000000.sdmp, FSCrossHair.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
        Source: FSCaptureSetup107.exe, 00000000.00000002.2338865430.00000000026E2000.00000004.00000020.00020000.00000000.sdmp, FSCrossHair.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
        Source: FSCaptureSetup107.exe, FSCPlugin07.exe.0.dr, FSCPlugin06.exe.0.dr, FSRecorder.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
        Source: FSCaptureSetup107.exe, FSCrossHair.exe.0.dr, FSCPlugin07.exe.0.dr, FSCPlugin06.exe.0.dr, FSRecorder.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
        Source: FSCaptureSetup107.exe, FSCrossHair.exe.0.dr, FSCPlugin07.exe.0.dr, FSCPlugin06.exe.0.dr, FSRecorder.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
        Source: FSCaptureSetup107.exe, FSCrossHair.exe.0.dr, FSCPlugin07.exe.0.dr, FSCPlugin06.exe.0.dr, FSRecorder.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
        Source: FSCaptureSetup107.exe, 00000000.00000002.2338865430.00000000026E2000.00000004.00000020.00020000.00000000.sdmp, FSCrossHair.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
        Source: FSCaptureSetup107.exe, FSCPlugin07.exe.0.dr, FSCPlugin06.exe.0.dr, FSRecorder.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
        Source: FSCaptureSetup107.exe, FSCrossHair.exe.0.dr, FSCPlugin07.exe.0.dr, FSCPlugin06.exe.0.dr, FSRecorder.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
        Source: FSRecorder.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
        Source: FSCaptureSetup107.exe, 00000000.00000002.2338865430.00000000026E2000.00000004.00000020.00020000.00000000.sdmp, FSCrossHair.exe.0.drString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
        Source: FSCaptureSetup107.exe, 00000000.00000002.2338865430.00000000026E2000.00000004.00000020.00020000.00000000.sdmp, FSCrossHair.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
        Source: FSCaptureSetup107.exe, FSCPlugin07.exe.0.dr, FSCPlugin06.exe.0.dr, FSRecorder.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
        Source: FSCaptureSetup107.exe, 00000000.00000002.2338865430.00000000026E2000.00000004.00000020.00020000.00000000.sdmp, FSCrossHair.exe.0.drString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0J
        Source: FSCaptureSetup107.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: FSCaptureSetup107.exe, FSCPlugin07.exe.0.dr, FSCPlugin06.exe.0.dr, FSRecorder.exe.0.drString found in binary or memory: http://ocsp.digicert.com0
        Source: FSCaptureSetup107.exe, FSCrossHair.exe.0.dr, FSCPlugin07.exe.0.dr, FSCPlugin06.exe.0.dr, FSRecorder.exe.0.drString found in binary or memory: http://ocsp.digicert.com0A
        Source: FSCaptureSetup107.exe, FSCrossHair.exe.0.dr, FSCPlugin07.exe.0.dr, FSCPlugin06.exe.0.dr, FSRecorder.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
        Source: FSCaptureSetup107.exe, 00000000.00000002.2338865430.00000000026E2000.00000004.00000020.00020000.00000000.sdmp, FSCrossHair.exe.0.drString found in binary or memory: http://ocsp.digicert.com0H
        Source: FSCaptureSetup107.exe, 00000000.00000002.2338865430.00000000026E2000.00000004.00000020.00020000.00000000.sdmp, FSCrossHair.exe.0.drString found in binary or memory: http://ocsp.digicert.com0I
        Source: FSCaptureSetup107.exe, FSCrossHair.exe.0.dr, FSCPlugin07.exe.0.dr, FSCPlugin06.exe.0.dr, FSRecorder.exe.0.drString found in binary or memory: http://ocsp.digicert.com0X
        Source: FSRecorder.exe.0.drString found in binary or memory: http://sourceforge.net/projects/gplmpgdec/
        Source: FSRecorder.exe.0.drString found in binary or memory: http://www.axis.com/techsup/software/amc/index.htm
        Source: FSRecorder.exe.0.drString found in binary or memory: http://www.datastead.com/WMScriptWriter
        Source: FSRecorder.exe.0.drString found in binary or memory: http://www.datastead.com/WMScriptWriterU
        Source: FSRecorder.exe.0.drString found in binary or memory: http://www.datastead.com/_download/WMFDist11.zip
        Source: FSCaptureSetup107.exe, FSCrossHair.exe.0.dr, FSCPlugin07.exe.0.dr, FSCPlugin06.exe.0.dr, FSRecorder.exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
        Source: FSCaptureSetup107.exe, 00000000.00000002.2338865430.00000000026E2000.00000004.00000020.00020000.00000000.sdmp, FSCrossHair.exe.0.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
        Source: FSCaptureSetup107.exe, 00000000.00000002.2337132344.00000000004FF000.00000004.00000020.00020000.00000000.sdmp, FSCaptureSetup107.exe, 00000000.00000003.2335936709.00000000004FD000.00000004.00000020.00020000.00000000.sdmp, Website.url.0.drString found in binary or memory: http://www.faststone.org
        Source: FSCapture.exe, 00000004.00000000.2325806470.0000000000711000.00000020.00000001.01000000.0000000B.sdmpString found in binary or memory: http://www.faststone.org/
        Source: FSCapture.exe, 00000004.00000000.2325806470.0000000000711000.00000020.00000001.01000000.0000000B.sdmpString found in binary or memory: http://www.faststone.org/FSCTutorial.htm
        Source: FSCapture.exe, 00000004.00000000.2325806470.0000000000711000.00000020.00000001.01000000.0000000B.sdmpString found in binary or memory: http://www.faststone.org/FSCTutorial.htmU
        Source: FSCapture.exe, 00000004.00000000.2325806470.0000000000711000.00000020.00000001.01000000.0000000B.sdmpString found in binary or memory: http://www.faststone.org/U
        Source: FSRecorder.exe.0.drString found in binary or memory: http://www.matroska.org/
        Source: FSCapture.exe, 00000004.00000000.2325806470.0000000000711000.00000020.00000001.01000000.0000000B.sdmpString found in binary or memory: https://www.faststone.org/order.htm
        Source: FSCapture.exe, 00000004.00000000.2325806470.0000000000711000.00000020.00000001.01000000.0000000B.sdmpString found in binary or memory: https://www.faststone.org/order.htmU
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeCode function: 0_2_00405809 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405809
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,CoUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403640
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeCode function: 0_2_00406D5F0_2_00406D5F
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_077DFB4F4_2_077DFB4F
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_077DE3C84_2_077DE3C8
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_077D6A594_2_077D6A59
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_077DAE474_2_077DAE47
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_077D1A304_2_077D1A30
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_077DEAC04_2_077DEAC0
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_077D4A854_2_077D4A85
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_077DDE844_2_077DDE84
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_077DD9404_2_077DD940
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100230304_2_10023030
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1003F0504_2_1003F050
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100070704_2_10007070
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1001C0D64_2_1001C0D6
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1001C0D84_2_1001C0D8
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100161904_2_10016190
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100131A04_2_100131A0
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100451A04_2_100451A0
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100221D04_2_100221D0
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100212004_2_10021200
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100372004_2_10037200
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100642344_2_10064234
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100162704_2_10016270
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100202704_2_10020270
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1004A2804_2_1004A280
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1001E2994_2_1001E299
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1001F2B04_2_1001F2B0
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100073304_2_10007330
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100163404_2_10016340
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1004E3404_2_1004E340
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100014304_2_10001430
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100225074_2_10022507
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100225094_2_10022509
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1002152C4_2_1002152C
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100335304_2_10033530
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100475404_2_10047540
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1001F5C44_2_1001F5C4
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1001F5C64_2_1001F5C6
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1001B5E04_2_1001B5E0
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100076204_2_10007620
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1003D6504_2_1003D650
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100426804_2_10042680
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1001C7104_2_1001C710
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100137304_2_10013730
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100667324_2_10066732
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100077384_2_10007738
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100647784_2_10064778
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1001D7804_2_1001D780
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100117E04_2_100117E0
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100237F04_2_100237F0
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100338004_2_10033800
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1000D8404_2_1000D840
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1001B8584_2_1001B858
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100338B94_2_100338B9
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1005D8E04_2_1005D8E0
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100348F04_2_100348F0
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100059504_2_10005950
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1001C96C4_2_1001C96C
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_100489B04_2_100489B0
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_10021A004_2_10021A00
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_10042A104_2_10042A10
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_10020A304_2_10020A30
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_10006A904_2_10006A90
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1001FA904_2_1001FA90
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_10058AD04_2_10058AD0
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_10023AF64_2_10023AF6
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_10023AF44_2_10023AF4
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1005EB194_2_1005EB19
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_10011C804_2_10011C80
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_10048CB04_2_10048CB0
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_10051CC04_2_10051CC0
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_10063CF04_2_10063CF0
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1003DD304_2_1003DD30
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_10020D364_2_10020D36
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_10020D344_2_10020D34
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1001AD704_2_1001AD70
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1001FDA44_2_1001FDA4
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1001FDA64_2_1001FDA6
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_10005E094_2_10005E09
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1001BE604_2_1001BE60
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_10064E704_2_10064E70
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_10065EC64_2_10065EC6
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_10007EF04_2_10007EF0
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1004AF104_2_1004AF10
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1001CF404_2_1001CF40
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1001AFD64_2_1001AFD6
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1001AFD84_2_1001AFD8
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1001DFF04_2_1001DFF0
        Source: FSCPlugin03.dll.0.drStatic PE information: Number of sections : 11 > 10
        Source: FSCPlugin02.dll.0.drStatic PE information: Number of sections : 11 > 10
        Source: FSCaptureSetup107.exe, 00000000.00000002.2338865430.00000000026E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameX vs FSCaptureSetup107.exe
        Source: FSCaptureSetup107.exe, 00000000.00000002.2338865430.00000000026E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFSCPlugin07.exe8 vs FSCaptureSetup107.exe
        Source: FSCaptureSetup107.exe, 00000000.00000002.2338865430.00000000026E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelibwebp.dllB vs FSCaptureSetup107.exe
        Source: FSCaptureSetup107.exe, 00000000.00000002.2338865430.00000000026E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelibsharpyuv.dllB vs FSCaptureSetup107.exe
        Source: FSCaptureSetup107.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: classification engineClassification label: clean4.winEXE@2/50@0/0
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,CoUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403640
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeCode function: 0_2_00404AB5 GetDlgItem,SetWindowTextW,SHAutoComplete,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceExW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404AB5
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeCode function: 0_2_004021AA CoCreateInstance,0_2_004021AA
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\Program Files (x86)\FastStone CaptureJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\Users\Public\Desktop\FastStone Capture.lnkJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeMutant created: \Sessions\1\BaseNamedObjects\FSCapture
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\Users\user\AppData\Local\Temp\nsf6303.tmpJump to behavior
        Source: Yara matchFile source: C:\Program Files (x86)\FastStone Capture\FSCPlugin06.exe, type: DROPPED
        Source: Yara matchFile source: C:\Program Files (x86)\FastStone Capture\FSCPlugin04.dll, type: DROPPED
        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\nsk6323.tmp, type: DROPPED
        Source: FSCaptureSetup107.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile read: C:\Users\user\Desktop\FSCaptureSetup107.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\FSCaptureSetup107.exe "C:\Users\user\Desktop\FSCaptureSetup107.exe"
        Source: unknownProcess created: C:\Program Files (x86)\FastStone Capture\FSCapture.exe "C:\Program Files (x86)\FastStone Capture\FSCapture.exe"
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: oleacc.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: linkinfo.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: ntshrui.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: cscapi.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: sxs.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: version.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: msimg32.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: avifil32.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: msvfw32.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: msacm32.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: winmmbase.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: winmmbase.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: olepro32.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: libwebp.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: libsharpyuv.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: windowscodecs.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: mscms.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: coloradapterclient.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: icm32.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: dataexchange.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: d3d11.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: dcomp.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: dxgi.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: twinapi.appcore.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
        Source: Visit www.FastStone.org.lnk.0.drLNK file: ..\..\..\..\..\..\Program Files (x86)\FastStone Capture\Website.url
        Source: Uninstall FastStone Capture.lnk.0.drLNK file: ..\..\..\..\..\..\Program Files (x86)\FastStone Capture\uninst.exe
        Source: FastStone Capture.lnk.0.drLNK file: ..\..\..\..\..\..\Program Files (x86)\FastStone Capture\FSCapture.exe
        Source: FastStone Capture.lnk0.0.drLNK file: ..\..\..\Program Files (x86)\FastStone Capture\FSCapture.exe
        Source: FastStone Capture Help.lnk.0.drLNK file: ..\..\..\..\..\..\Program Files (x86)\FastStone Capture\FSCaptureHelp.chm
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile written: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\ioSpecial.iniJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeAutomated click: Next >
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeAutomated click: I Agree
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeAutomated click: Install
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeWindow detected: < &BackI &AgreeCancelwww.FastStone.org www.FastStone.orgLicense AgreementPlease review the license terms before installing FastStone Capture 10.7.Press Page Down to see the rest of the agreement.Please read the following terms and conditions carefully before using FastStone Capture. Use of FastStone Capture indicates you accept the terms of this license agreement and warranty.1. Disclaimer of WarrantyFastStone Capture (this software) is provided "as-is" and without warranty of any kind express implied or otherwise including without limitation any warranty of merchantability or fitness for a particular purpose. In no event shall the author of this software be held liable for data loss damages loss of profits or any other kind of loss while using or misusing this software.2. LicenseFastStone Capture is shareware. You may try it free for 30 days. Once this 30-day period has expired you must either purchase a license to use this software or uninstall it from your computer promptly.3. Restrictions on Use FastStone Capture must not be decompiled disassembled reverse engineered or otherwise modified. Copyright (C) 2024 FastStone Corporation. All rights reserved.If you accept the terms of the agreement click I Agree to continue. You must accept the agreement to install FastStone Capture 10.7.
        Source: FSCaptureSetup107.exeStatic PE information: certificate valid
        Source: FSCaptureSetup107.exeStatic file information: File size 9173144 > 1048576
        Source: FSCaptureSetup107.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Binary string: C:\Users\hesha\Desktop\FSCPlugin07_V1_035\FastStone.Ocr\obj\Release\FSCPlugin07.pdb source: FSCaptureSetup107.exe, 00000000.00000002.2338865430.00000000026E2000.00000004.00000020.00020000.00000000.sdmp, FSCPlugin07.exe.0.dr
        Source: Binary string: C:\Users\hesha\Desktop\FSCPlugin07_V1_035\FastStone.Ocr\obj\Release\FSCPlugin07.pdbxP source: FSCaptureSetup107.exe, 00000000.00000002.2338865430.00000000026E2000.00000004.00000020.00020000.00000000.sdmp, FSCPlugin07.exe.0.dr
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_077D9915 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,4_2_077D9915
        Source: FSCPlugin01.dll.0.drStatic PE information: real checksum: 0x5a4c2 should be: 0x540ce
        Source: System.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x3d68
        Source: FSCIcon.db.0.drStatic PE information: real checksum: 0x0 should be: 0xf25e
        Source: InstallOptions.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x7de9
        Source: FSCPlugin02.dll.0.drStatic PE information: section name: .didata
        Source: FSCPlugin03.dll.0.drStatic PE information: section name: .didata
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_077D5091 push ecx; ret 4_2_077D50A4
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1005CDC5 push ecx; ret 4_2_1005CDD8
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_0076C300 push 0076C32Ch; ret 4_2_0076C324
        Source: libsharpyuv.dll.0.drStatic PE information: section name: .text entropy: 6.81310369329101
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\InstallOptions.dllJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\Program Files (x86)\FastStone Capture\FSCrossHair.exeJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\Program Files (x86)\FastStone Capture\libwebp.dllJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\Program Files (x86)\FastStone Capture\FSCPlugin06.exeJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\Program Files (x86)\FastStone Capture\FSCPlugin04.dllJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\Program Files (x86)\FastStone Capture\FSRecorder.exeJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\Program Files (x86)\FastStone Capture\libsharpyuv.dllJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\Program Files (x86)\FastStone Capture\FSFocus.exeJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\Program Files (x86)\FastStone Capture\FSCPlugin02.dllJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\ShellExecAsUser.dllJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\Program Files (x86)\FastStone Capture\FSCPlugin07.exeJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\Program Files (x86)\FastStone Capture\FSCPlugin01.dllJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\Program Files (x86)\FastStone Capture\FSCapture.exeJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\Program Files (x86)\FastStone Capture\uninst.exeJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\Program Files (x86)\FastStone Capture\FSCIcon.dbJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\Program Files (x86)\FastStone Capture\FSCPlugin05.dllJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\Program Files (x86)\FastStone Capture\FSCPlugin03.dllJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\Program Files (x86)\FastStone Capture\FSCIcon.dbJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\Program Files (x86)\FastStone Capture\LicenseAgreement.txtJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\Program Files (x86)\FastStone Capture\LicenseAgreement.txtJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\FastStone CaptureJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\FastStone Capture\FastStone Capture.lnkJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\FastStone Capture\FastStone Capture Help.lnkJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\FastStone Capture\Visit www.FastStone.org.lnkJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\FastStone Capture\Uninstall FastStone Capture.lnkJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeDropped PE file which has not been started: C:\Program Files (x86)\FastStone Capture\FSCrossHair.exeJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\InstallOptions.dllJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeDropped PE file which has not been started: C:\Program Files (x86)\FastStone Capture\FSCPlugin06.exeJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeDropped PE file which has not been started: C:\Program Files (x86)\FastStone Capture\FSRecorder.exeJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeDropped PE file which has not been started: C:\Program Files (x86)\FastStone Capture\FSCPlugin04.dllJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeDropped PE file which has not been started: C:\Program Files (x86)\FastStone Capture\FSFocus.exeJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeDropped PE file which has not been started: C:\Program Files (x86)\FastStone Capture\FSCPlugin02.dllJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\ShellExecAsUser.dllJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeDropped PE file which has not been started: C:\Program Files (x86)\FastStone Capture\FSCPlugin07.exeJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeDropped PE file which has not been started: C:\Program Files (x86)\FastStone Capture\FSCPlugin01.dllJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeDropped PE file which has not been started: C:\Program Files (x86)\FastStone Capture\uninst.exeJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeDropped PE file which has not been started: C:\Program Files (x86)\FastStone Capture\FSCIcon.dbJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeDropped PE file which has not been started: C:\Program Files (x86)\FastStone Capture\FSCPlugin05.dllJump to dropped file
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeDropped PE file which has not been started: C:\Program Files (x86)\FastStone Capture\FSCPlugin03.dllJump to dropped file
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeAPI coverage: 0.3 %
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile Volume queried: C:\Program Files (x86) FullSizeInformationJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeFile Volume queried: C:\Program Files (x86) FullSizeInformationJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeCode function: 0_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405D74
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeCode function: 0_2_0040699E FindFirstFileW,FindClose,0_2_0040699E
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeAPI call chain: ExitProcess graph end nodegraph_0-3489
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_077D92A5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_077D92A5
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_077D9915 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,4_2_077D9915
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_077D92A5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_077D92A5
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_077D8DEF _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_077D8DEF
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_077DCDAA __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_077DCDAA
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_1005D0E5 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_1005D0E5
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_10059BFE IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_10059BFE
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_10065C74 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,RtlUnwind,4_2_10065C74
        Source: FSCapture.exe, 00000004.00000000.2325806470.0000000000711000.00000020.00000001.01000000.0000000B.sdmpBinary or memory string: TrayNotifyWndShell_TrayWndU
        Source: FSCapture.exe, 00000004.00000000.2325806470.0000000000711000.00000020.00000001.01000000.0000000B.sdmp, FSCrossHair.exe.0.dr, FSRecorder.exe.0.drBinary or memory string: Shell_TrayWnd
        Source: FSCapture.exe, 00000004.00000000.2325806470.0000000000711000.00000020.00000001.01000000.0000000B.sdmp, FSRecorder.exe.0.drBinary or memory string: SHELL_TRAYWND
        Source: FSCapture.exe, 00000004.00000000.2325806470.0000000000711000.00000020.00000001.01000000.0000000B.sdmpBinary or memory string: Shell_TrayWndtooltips_class32SV
        Source: FSCapture.exe, 00000004.00000000.2325806470.0000000000711000.00000020.00000001.01000000.0000000B.sdmp, FSCrossHair.exe.0.dr, FSRecorder.exe.0.drBinary or memory string: Shell_TrayWndU
        Source: FSCapture.exe, 00000004.00000000.2325806470.0000000000711000.00000020.00000001.01000000.0000000B.sdmp, FSRecorder.exe.0.drBinary or memory string: PROGMAN
        Source: FSCapture.exe, 00000004.00000000.2325806470.0000000000711000.00000020.00000001.01000000.0000000B.sdmp, FSRecorder.exe.0.drBinary or memory string: SHELL_TRAYWNDU
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: GetLocaleInfoA,4_2_077DF93C
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: GetLocaleInfoA,4_2_100664E8
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\FastStone Capture\FSCapture.exeCode function: 4_2_077D8CDB GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,4_2_077D8CDB
        Source: C:\Users\user\Desktop\FSCaptureSetup107.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,CoUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403640
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Native API
        1
        Registry Run Keys / Startup Folder
        1
        Access Token Manipulation
        12
        Masquerading
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        1
        Encrypted Channel
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault AccountsScheduled Task/Job1
        DLL Side-Loading
        2
        Process Injection
        1
        Access Token Manipulation
        LSASS Memory1
        Security Software Discovery
        Remote Desktop Protocol1
        Clipboard Data
        Junk DataExfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
        Registry Run Keys / Startup Folder
        2
        Process Injection
        Security Account Manager1
        Process Discovery
        SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
        DLL Side-Loading
        2
        Obfuscated Files or Information
        NTDS3
        File and Directory Discovery
        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Software Packing
        LSA Secrets25
        System Information Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        DLL Side-Loading
        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        FSCaptureSetup107.exe4%ReversingLabs
        SourceDetectionScannerLabelLink
        C:\Program Files (x86)\FastStone Capture\FSCIcon.db0%ReversingLabs
        C:\Program Files (x86)\FastStone Capture\FSCPlugin01.dll0%ReversingLabs
        C:\Program Files (x86)\FastStone Capture\FSCPlugin02.dll0%ReversingLabs
        C:\Program Files (x86)\FastStone Capture\FSCPlugin03.dll0%ReversingLabs
        C:\Program Files (x86)\FastStone Capture\FSCPlugin04.dll0%ReversingLabs
        C:\Program Files (x86)\FastStone Capture\FSCPlugin05.dll0%ReversingLabs
        C:\Program Files (x86)\FastStone Capture\FSCPlugin06.exe0%ReversingLabs
        C:\Program Files (x86)\FastStone Capture\FSCPlugin07.exe0%ReversingLabs
        C:\Program Files (x86)\FastStone Capture\FSCapture.exe0%ReversingLabs
        C:\Program Files (x86)\FastStone Capture\FSCrossHair.exe0%ReversingLabs
        C:\Program Files (x86)\FastStone Capture\FSFocus.exe0%ReversingLabs
        C:\Program Files (x86)\FastStone Capture\FSRecorder.exe0%ReversingLabs
        C:\Program Files (x86)\FastStone Capture\libsharpyuv.dll0%ReversingLabs
        C:\Program Files (x86)\FastStone Capture\libwebp.dll0%ReversingLabs
        C:\Program Files (x86)\FastStone Capture\uninst.exe0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\nsf6353.tmp\InstallOptions.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\nsf6353.tmp\ShellExecAsUser.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\nsf6353.tmp\System.dll0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
        No contacted domains info
        NameSourceMaliciousAntivirus DetectionReputation
        http://www.datastead.com/WMScriptWriterUFSRecorder.exe.0.drfalse
          unknown
          http://www.faststone.orgFSCaptureSetup107.exe, 00000000.00000002.2337132344.00000000004FF000.00000004.00000020.00020000.00000000.sdmp, FSCaptureSetup107.exe, 00000000.00000003.2335936709.00000000004FD000.00000004.00000020.00020000.00000000.sdmp, Website.url.0.drfalse
            unknown
            http://www.datastead.com/_download/WMFDist11.zipFSRecorder.exe.0.drfalse
              unknown
              http://www.faststone.org/FSCTutorial.htmUFSCapture.exe, 00000004.00000000.2325806470.0000000000711000.00000020.00000001.01000000.0000000B.sdmpfalse
                unknown
                http://www.faststone.org/FSCTutorial.htmFSCapture.exe, 00000004.00000000.2325806470.0000000000711000.00000020.00000001.01000000.0000000B.sdmpfalse
                  unknown
                  https://www.faststone.org/order.htmUFSCapture.exe, 00000004.00000000.2325806470.0000000000711000.00000020.00000001.01000000.0000000B.sdmpfalse
                    unknown
                    http://www.axis.com/techsup/software/amc/index.htmFSRecorder.exe.0.drfalse
                      unknown
                      http://www.matroska.org/FSRecorder.exe.0.drfalse
                        unknown
                        http://sourceforge.net/projects/gplmpgdec/FSRecorder.exe.0.drfalse
                          unknown
                          http://nsis.sf.net/NSIS_ErrorErrorFSCaptureSetup107.exefalse
                          • URL Reputation: safe
                          unknown
                          https://www.faststone.org/order.htmFSCapture.exe, 00000004.00000000.2325806470.0000000000711000.00000020.00000001.01000000.0000000B.sdmpfalse
                            unknown
                            http://www.faststone.org/FSCapture.exe, 00000004.00000000.2325806470.0000000000711000.00000020.00000001.01000000.0000000B.sdmpfalse
                              unknown
                              http://www.datastead.com/WMScriptWriterFSRecorder.exe.0.drfalse
                                unknown
                                http://avisynth.orgFSRecorder.exe.0.drfalse
                                  unknown
                                  http://www.faststone.org/UFSCapture.exe, 00000004.00000000.2325806470.0000000000711000.00000020.00000001.01000000.0000000B.sdmpfalse
                                    unknown
                                    No contacted IP infos
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1527895
                                    Start date and time:2024-10-07 10:59:22 +02:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 6m 35s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:7
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:FSCaptureSetup107.exe
                                    Detection:CLEAN
                                    Classification:clean4.winEXE@2/50@0/0
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 100%
                                    • Number of executed functions: 65
                                    • Number of non-executed functions: 90
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                    • Excluded domains from analysis (whitelisted): www.bing.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • VT rate limit hit for: FSCaptureSetup107.exe
                                    TimeTypeDescription
                                    05:00:49API Interceptor2x Sleep call for process: FSCapture.exe modified
                                    No context
                                    No context
                                    No context
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    C:\Program Files (x86)\FastStone Capture\FSCIcon.dbfaststone-capture_voLss-1.exeGet hashmaliciousPureLog StealerBrowse
                                      faststone-capture_voLss-1.exeGet hashmaliciousPureLog StealerBrowse
                                        C:\Program Files (x86)\FastStone Capture\FSCPlugin01.dllfaststone-capture_voLss-1.exeGet hashmaliciousPureLog StealerBrowse
                                          faststone-capture_voLss-1.exeGet hashmaliciousPureLog StealerBrowse
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):2022
                                            Entropy (8bit):3.7043669932880423
                                            Encrypted:false
                                            SSDEEP:48:wflLV+HAj/7lIimIldNaq2WgS4xCWMa++zPDh:wNx+Ho7GimStL4xCz0zrh
                                            MD5:107FBA7548488E7B2442556BE048D5C2
                                            SHA1:8FFD3008E3929C5503F5F7BC4B3126D5E444AD4E
                                            SHA-256:232A42E5CEF0478141B49A6BE9DA1F0F0C7C10B76F3C7B72EB9D91222AAC034D
                                            SHA-512:62FCE847420A4AC40A1BAE163E41E04A621D14775E5E2E7DC3A0A63FFC1EF100F1A92014E7DE7307C0F98A6C34210012A4A3992B2AE99D4AF4D34520BFB6BF7D
                                            Malicious:false
                                            Reputation:low
                                            Preview:..M.a.n.y. .t.h.a.n.k.s. .t.o. .t.h.e. .f.o.l.l.o.w.i.n.g. .t.r.a.n.s.l.a.t.o.r.s.:. .........B.r.a.z.i.l.i.a.n. .P.o.r.t.u.g.u.e.s.e. .-. .t.r.a.n.s.l.a.t.e.d. .b.y. .A.l.d.i.n.e.y. .O.l.i.v.e.i.r.a.....B.u.l.g.a.r.i.a.n. .-. .t.r.a.n.s.l.a.t.e.d. .b.y. ...5.>.@.3.8. ..... .&.2.5.B.0.=.>.2.....C.h.i.n.e.s.e. .(.S.i.m.p.l.i.f.i.e.d.). .-. .t.r.a.n.s.l.a.t.e.d. .b.y. ..n.....C.h.i.n.e.s.e. .(.T.r.a.d.i.t.i.o.n.a.l.). .-. .t.r.a.n.s.l.a.t.e.d. .b.y. .H.S.M.....C.z.e.c.h. .-. .t.r.a.n.s.l.a.t.e.d. .b.y. .T.Y.a.s...k. .J.i.Y.......D.u.t.c.h. .-. .t.r.a.n.s.l.a.t.e.d. .b.y. .A.l.b.e.r.t. .H.a.n.s.e.n. .&. .J.a.a.p. .K.r.a.m.e.r.....F.r.e.n.c.h. .-. .t.r.a.n.s.l.a.t.e.d. .b.y. .C.o.l.o.k. .w.w.w...c.o.l.o.k.-.t.r.a.d.u.c.t.i.o.n.s...c.o.m.....G.e.r.m.a.n. .-. .t.r.a.n.s.l.a.t.e.d. .b.y. .W.i.n.f.r.i.e.d. .G...n...l.e.r. .w...g.a.e.n.s.s.l.e.r.@.g.m.x...d.e.....H.u.n.g.a.r.i.a.n. .-. .t.r.a.n.s.l.a.t.e.d. .b.y. .Z.i.t.y.i.'.s. .T.r.a.n.s.l.a.t.o.r. .T.e.a.m.....I.t.a.l.i.a.n. .-. .t.r.a.n.s.
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):749154
                                            Entropy (8bit):7.924075690289188
                                            Encrypted:false
                                            SSDEEP:12288:fZXeDKBnzkX0lrYlEIEYBzRZCfWI8pjTmqapHpvAkbl03rx7Qns1VUzuvtIsLL72:YQ4kUQGV3I8V+pIqurKsbFtIg74/T
                                            MD5:8F23FAE255FF499A0EE3B2A34DCB402E
                                            SHA1:10A40CF783D16BACBC7FCC9D9D13425AAC7D6362
                                            SHA-256:0A0B62E6F5F3B7824EEC81CA33740B6B16D73E2093505AC191F0CD75E4931CA0
                                            SHA-512:6EB259269C8AF00C7174DED2E04246BA07F0D48A8CDD9158A97C38A7D5D55B8C3ACE4ADDB7A08C3B3A6A26F5489B38F6802DA8C79522A2251A5565AB75AD92F2
                                            Malicious:false
                                            Reputation:low
                                            Preview:k......0...o....#..$9..;K...]...r.........+..........................[....7...P...j.........................S..jk......K...........P........"..:;...g.....................J....-...[..j|..|..............E...~...j...sE...]..qt.....|...M...........R....8..>O...f......8.......]........F..Oh..|...~...>...0..._.......O&.../...8...@...I...R..r[...e...n......:...*...............-...O.......<........$...+...4...D...b...i.........`...............n.......\...{.......<........9..T^..vp......................=...Z...............S...........d*...6..@E...S...a...PNG........IHDR..............>a.....pHYs..........+......tEXtSoftware.Adobe ImageReadyq.e<....IDATx...V.I....@...*...{.#..>...#..>.w.......FYw.....'X.a5........{.v'3./...$3I.7U.U......'.W...p?............QY..J.....*......y_.$..PY.Rq..[...R........J.G.q........R.Ex..(..m%.rA..?.../Z9.}.`....(..o+.........x....].....$.........X...'9-. '.n. .w......Y..@P.e.. .....!x...@..(V.s......&...8.....)).p.\0..~..w+..@B..(..,:....(.t.
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):39936
                                            Entropy (8bit):3.0334915512311196
                                            Encrypted:false
                                            SSDEEP:96:nPtA/dChd6kwoSJNAngD+PLKIoyNSjcWTvR0MHm////////////IXDlw2RjbGS7f:ni0hd5HUUtoyIjcWTOMHhxAivM3
                                            MD5:E4DD6134F0DA16B24F9DF1BBA0969F55
                                            SHA1:4CED9E445246FCD570E42ACC85BCE4F89AE4736D
                                            SHA-256:3CC8478F1DE6BA82347702F74A0A413105189C26238123C6DE21635D751FFD80
                                            SHA-512:E19495DFA70A803FBDD6C974A17C26277809BF251C0DA7BB81BD12E6F44B35E5F34F7944C2BB2B823F85AB0B7048A7D3761D52CA793249B168984D93E9C90E58
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Joe Sandbox View:
                                            • Filename: faststone-capture_voLss-1.exe, Detection: malicious, Browse
                                            • Filename: faststone-capture_voLss-1.exe, Detection: malicious, Browse
                                            Reputation:low
                                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..................................... ....@..........................................................................@.......`.......................P......................................................................................CODE................................ ..`DATA......... ......................@...BSS..........0...........................idata.......@......................@....reloc.......P......................@..P.rsrc........`......................@..P....................................@..P........................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):326856
                                            Entropy (8bit):6.507303143563013
                                            Encrypted:false
                                            SSDEEP:6144:Iu/M8/CrMeIS4iB7ncZzPnRGpk2WQvg1+i/X5NKP5NCs/lwaj2Qy:l/Anc1x2Wj5NKPqs92Qy
                                            MD5:F421919DA3CB7C44B086210D4D797D7A
                                            SHA1:CDCA33C63F6FAE255A6F64BDCA62BD8DBC7032DC
                                            SHA-256:CF66F927D6D3EBC77D93567C25C9577803E5FB64201755D7773257C4C3ED5D2B
                                            SHA-512:BB98BFDBEA713AE19DA38CB3CFAA4F2C54A5AF2C9ADC8A80EEA415F45EB07005307733589FCF54F407A090E5E6C228FAC3FF654F4AA71CB861265D6B41A01472
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Joe Sandbox View:
                                            • Filename: faststone-capture_voLss-1.exe, Detection: malicious, Browse
                                            • Filename: faststone-capture_voLss-1.exe, Detection: malicious, Browse
                                            Reputation:low
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........5...f...f...f..f...f.{.f...f...f...f..f...f..f...f..f...f..f...f:..f...f..f...f...ft..fc..f...f...f...f~..f...fF..f...fRich...f................PE..L...J.%N...........!.....P...................`............................................... ... .................`4../...@........p...........................:...................................................`...............................text....J.......P.................. ..`.rdata.......`.......`..............@..@.data........@... ...@..............@....CRT.........`.......`..............@....rsrc........p... ...p..............@..@.reloc..&@.......P..................@..B........................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                            Category:dropped
                                            Size (bytes):3687568
                                            Entropy (8bit):5.966246760152598
                                            Encrypted:false
                                            SSDEEP:49152:IhFXzHdg+4U90CBP+uKC7kqzDLS0l1W4D1T:+dbUC
                                            MD5:A3101ADDC099361A751198614972D5FA
                                            SHA1:9379EC77C520C19CD698369AEF6ACDC4E32EE10D
                                            SHA-256:4EF58566D20EAE8ED18177DA8FCABBC55A5585CC5CC51806EF86E136291AC1F1
                                            SHA-512:A0AE4A9BF7BA7AF8B539CEB77ACA1F21C27A6AC6B418737559263E2C5084568E9A821E7C8101CF7E1DA5F00A677CFAC528185BF31E0C67BF76A1D4174DA70F37
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win64..$7........................................................................................................................................PE..d.....\e..........".......-..(........,.......@..............................p9.......8...`..........@............... ...............p3.......3.|@....8.......6.......8..&....3..n............................3.(...................8.3.H....P3.J....................text.....-.......-................. ..`.data.................-.............@....bss.........02..........................idata..|@....3..B....2.............@....didata.J....P3......J2.............@....edata.......p3......`2.............@..@.tls..........3..........................rdata..m.....3......b2.............@..@.reloc...n....3..p...d2.............@..B.pdata........6.......4.............@..@.rsrc.........8......x7.............@..@.............p9.......8.............@..@
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):2274448
                                            Entropy (8bit):6.65325844717495
                                            Encrypted:false
                                            SSDEEP:24576:x1+Sus1HRBOcDtwCpFf4fMaJj8C7hkEcw32Ig1BJS/AcOWdg0DZMK0jwUAHxala:NJzVAjj8uo1nSocOsDZMoDHxk
                                            MD5:FC610B497818BCB5249E72410AED5162
                                            SHA1:3DA9E3FEF84300FBDA10FDC9E97250D1FB4367A2
                                            SHA-256:FB8C862B1E2C2F423DDE036B9D77F241951674DC5E6EE51954F2B37E19BCA378
                                            SHA-512:4F23BEA8BA7BF51DCE14437FE5209B3B3209C1D6D7F8912FA91FA734A98CB92BED129CDEE8EBFDDFD22FCF42D90B5944E5D64E026FF531527B705664FAB8B3E4
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....\e.........."......x..........0.............@..........................`#.....T~#...@......@...........................`...0...."..............."..&..........................................................lh...............................text....[.......\.................. ..`.itext.......p.......`.............. ..`.data....W.......X...|..............@....bss....Dl...............................idata...0...`...2..................@....didata.............................@....edata..............................@..@.tls....T................................rdata..]...........................@..@.reloc..............................@..B.rsrc.........".......!.............@..@.............`#.......".............@..@................
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):1648520
                                            Entropy (8bit):6.611277014754512
                                            Encrypted:false
                                            SSDEEP:24576:r+L+R2nWVAu3td0VpXRwylIjLVt0sA7GIdmuTFgke8KR6DdgO3I3q4Pj3HCMo:wI3LEhBsDV89Y7XCMo
                                            MD5:3D936F0507E9BE6F4AEDE56BF440F42C
                                            SHA1:CFFFCE39FB24978BA87D550AA9729FD0776B4FCC
                                            SHA-256:99C55D9B65D38C22DD84FC96DE55A29008E564B92AE97D9B3B31BBDD31D78A01
                                            SHA-512:C913E2FD6B2E4242727322E14750DFF8911C8CD5FB3713DB8BB9F83E22C2247C39CB1A9B1FD4D768A11B47755DD1CFCD8C5F1D06F9FFF724554C50B6A2B50006
                                            Malicious:false
                                            Yara Hits:
                                            • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Program Files (x86)\FastStone Capture\FSCPlugin04.dll, Author: Joe Security
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................H..........PU.......`....@......................................@......@...........................@...2.......................).......%..................................................................................CODE.....G.......H.................. ..`DATA.....W...`...X...L..............@...BSS......z...............................idata...2...@...4..................@....tls....$................................rdata..............................@..P.reloc...%.......&..................@..P.rsrc...............................@..P....................................@..P........................................................................................................................................
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):120456
                                            Entropy (8bit):6.439927806022288
                                            Encrypted:false
                                            SSDEEP:3072:yuJnXnJMBIrVDtuUFAWoULBRmBrv8qKxs:yYXfpxuUFZDBR8h
                                            MD5:70C3F6892684641080C6FFE2F32B9BDA
                                            SHA1:CBB401C44A17E85E54E73B0C716CD5E819FF6421
                                            SHA-256:3D2877A8D739F682FB5323C00D568483F8C878C6AC745DE5F0D0CAA7FFA3788A
                                            SHA-512:D1341D4E190EA4109A15A99E4119B2559C0D330DF43AB2ED6605F454E9F7012FD42FA75DDE9A8290C366FBF50B4D44D36548E35568BC510B974FA4CFE47F7F30
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........Q..[Q..[Q..[>.@[D..[>.t[9..[X.M[\..[Q..['..[X.][U..[>.u[...[>.q[S..[>.E[P..[>.D[P..[>.C[P..[RichQ..[........PE..L....%8d...........!..... ..........om.......0......................................4$....@..........................w......|o..P........................&...........1...............................X..@............0..x............................text............ .................. ..`.rdata...H...0...J...$..............@..@.data....3...........n..............@....rsrc...............................@..@.reloc.. $.......&..................@..B........................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):2869128
                                            Entropy (8bit):6.587584991339312
                                            Encrypted:false
                                            SSDEEP:49152:LGcGi7xkdj0xGjEEBSNI+1oeuX4KQxUjB30yM5RTbT4XN:KcVkZ9Buoeo4ajB30XiXN
                                            MD5:3DFF39A3EDA72F6360CEDCBB5F324C67
                                            SHA1:035B5F7CF78276F61EDC89180C21B623A236B449
                                            SHA-256:D1A175B774962E38E37C40A8DA1F6CED0D0FCD8E5A5667EFEBC94F26C2FB1C76
                                            SHA-512:3504988ED204572B41B85400294E3E4B98022CB1958EDF9A07F79BF3701DEAC34E1E701457BD65759B8F988A91B3159575B8BC04301D0161C4C38026EA70CD55
                                            Malicious:false
                                            Yara Hits:
                                            • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Program Files (x86)\FastStone Capture\FSCPlugin06.exe, Author: Joe Security
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................t%..&......$.%.......%...@...........................,.......,...@......@............................'..4....)...............+..)....(.l.............................(.....................................................CODE.....r%......t%................. ..`DATA.........%......x%.............@...BSS.......... '.......'..................idata...4....'..6....'.............@....tls....$.....'......8'..................rdata........(......8'.............@..P.reloc..l.....(......:'.............@..P.rsrc.........).......(.............@..P..............,.......+.............@..P........................................................................................................................................
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Category:dropped
                                            Size (bytes):26504
                                            Entropy (8bit):6.539209436879084
                                            Encrypted:false
                                            SSDEEP:384:gGSRg3LRNHTitQa6anmoNsaaU9JGnKUDzE6/L8+IYix6wEtiyAM+o/8E9VF0Nyg0:gp2LROLqX/ATYixpFyAMxkEWC
                                            MD5:E3EF14ED122068DAE0AEEF89DB996513
                                            SHA1:32CE0BEE51FB8FF7E02C7917CB06D72DABDD0FCB
                                            SHA-256:FE43D2A447EACBDA956728AD75B85C4743D406389C0354F3D81BBB0DFB4A7D44
                                            SHA-512:FED0BD0CFC1F5272A62CCFB6B8127B272D10D942D2DD8505EA61685B50426AA5C167117060A627F19649A672721F824018DFDA1B610EBE740694EAF7445E9371
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...|..f.........."...0..2...........P... ...`....@.. ...............................@....`.................................PP..O....`..(............>...)...........O............................................... ............... ..H............text....0... ...2.................. ..`.rsrc...(....`.......4..............@..@.reloc...............<..............@..B.................P......H.......h4..............`N................................................(....*.~....-.r...p.....(....o....s.........~....*.~....*.......*..0..........rU..p.(....(......9.......rW..p(....9......i.1l.....ro..p(....,D(....o.....+".o .....o!...ru..p.o"...(#...($....o%...-....,..o&....*.r}..p(....,...i.2.......(....o'.......((...($.....&..*.......K..y...................0..7.........()...}.......}.......}......|......(...+..|....(+...*..{....*..0..R........{......E........c...;..
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):7563656
                                            Entropy (8bit):6.870770305666163
                                            Encrypted:false
                                            SSDEEP:196608:7SyDtyDnxB+yKtRlR6dqHXJ7YPcwD4YSqObJdmr2tKjmSIS:7NyDxBnY6BEwDaqOO2tAmSIS
                                            MD5:D5AC941C445B6EB907D0B96D84F15FE7
                                            SHA1:F3351699F44612579EA2646001DF954B3AA85A3B
                                            SHA-256:1A8499B56435991CB6B042919B6D79357E913C14B9CBBC1089525D77F9FDB2EE
                                            SHA-512:EEBEF0DB392B714D6F9BB950C11F136C80E81C38292347C9A99721A7B1D5AE129E8B4833A904B1340C259BE3C9617EEAA3D23A40B070D8C5628671D60FF6C48D
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................LN...$.....HRN......`N...@..........................0t.......t...@......@............................P..@....T..............@s..)...0Q..J........................... Q.....................................................CODE....<JN......LN................. ..`DATA.........`N......PN.............@...BSS.......... P.......P..................idata...@....P..B....P.............@....tls....0.....Q......HP..................rdata....... Q......HP.............@..P.reloc...J...0Q..L...JP.............@..P.rsrc.........T.......S.............@..P.............0t......@s.............@..P........................................................................................................................................
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:MS Windows HtmlHelp Data
                                            Category:dropped
                                            Size (bytes):176729
                                            Entropy (8bit):7.916956322771971
                                            Encrypted:false
                                            SSDEEP:3072:rKrOuOmioe0Z/FnSgNf+YVvhNIJC5KH/CNQ4GJXDd1E0M:r2OuOmu0e4f+YhhVrxKLE0M
                                            MD5:EE9541FC0234AAE432DB2985B4ABB709
                                            SHA1:C89BE531F7FD37D5F04A68C9D3F2D36DF96C0428
                                            SHA-256:4815A94312EA9218C5B1E502F53A83719B20415FFDD3F6BBC285F772A8558256
                                            SHA-512:03A46A6E997BDF9613922B842C0B2EFDCA39A0670B7113ADEFF4C696318FFFDC1FBD46857CD90AB826E0289452E13C364BB03A6127069CB9EE5D77F7327E0B04
                                            Malicious:false
                                            Preview:ITSF....`.......e.R........|.{.......".....|.{......."..`...............x.......T.......................Y...............ITSP....T...........................................j..].!......."..T...............PMGL................./..../#IDXHDR...t.../#ITBITS..../#STRINGS...^.'./#SYSTEM..n.5./#TOPICS...t.@./#URLSTR...D.../#URLTBL...4.../$FIftiMain..../$OBJINST...5.?./$WWAssociativeLinks/..../$WWAssociativeLinks/Property...1../$WWKeywordLinks/..../$WWKeywordLinks/BTree...9.L./$WWKeywordLinks/Data......./$WWKeywordLinks/Map....../$WWKeywordLinks/Property.... ./ActiveWindow.gif...;.M./CaptureButtons.gif...#.../CapturePanel.gif...8..g./CapturePanel.htm..p.../CaptureSmallBar.gif...E.../CloseButton.gif...D.a./CloseTabButton.gif...3.../ContactUs.htm...o.c./CutVideo.gif...N.{./DragCursorShape.gif......./DrawVideoButton.gif...v.I./Editor.htm...R.&./EditVideoButton.gif...w.0./EditVideoFile.htm...5.^./FastStoneLogo.gif...!.../Features.htm...x.y./FixRegion.gif...~.Y./Freehand.gif...#.f./FSCAnnotation.gi
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):646792
                                            Entropy (8bit):6.622561341110581
                                            Encrypted:false
                                            SSDEEP:12288:hIRXXg5ro19GsHuRwX6ZLs+O3EoKhjkiYkKhtmfCllQtpP/Z63iwwoZRr:hI+oGZRwqZLPO6jkiUf3lUP/Z63iwwoT
                                            MD5:EFFB23AB4ECE53D5E07C8C0437D86BBE
                                            SHA1:B695BDA41C3B115375025B6A11E6E2CFE740EAEE
                                            SHA-256:C0BCB458D844158F42F8BE4DA7187008115F849FF25D85AA00FA8637869EDE2F
                                            SHA-512:CABFFD4A53524A681DB07784F5C8517545F730ABEC1ADF5C79DA4A91A61295EEC266313FF631C1CDF2389C564C2D448A7B323A6122674617BA130E7F9B0A9F16
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................x...<...................@.......................... ...................@...............................(.......^...............&... ..T...................................................................................CODE.....v.......x.................. ..`DATA.................|..............@...BSS......................................idata...(.......*..................@....tls....$................................rdata..............................@..P.reloc..T.... ......................@..P.rsrc....^.......^...Z..............@..P............. ......................@..P........................................................................................................................................
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):651912
                                            Entropy (8bit):6.630178927904243
                                            Encrypted:false
                                            SSDEEP:12288:9IuPNeBhqk/28pUgna9ref4+/dFPfwCXrUhgIZXu8C6Z:9IkeBVpRna98dlzeu8b
                                            MD5:97AA518D2A3B2AD63573128C7E10E6C5
                                            SHA1:88CD0BC2496025A7979393807DCC089BA09BD9E8
                                            SHA-256:493B2B08ECADD1895C4FCFE0FFD9C7B2B4F5B276CCD494846E0CB35DE004AD91
                                            SHA-512:1A77895B740191CCDFCB3377528EF1B907BC138297D5EEA7BCEFA23D65EBCBCC11F29EBA70151C570928ECA099C2C87A1AE1D94226A19DBB0C2EE459AC371256
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................:......|.............@..........................0......x............@...............................(.......^...............&...0............................... ......................................................CODE....,........................... ..`DATA....P...........................@...BSS......................................idata...(.......*..................@....tls....$................................rdata....... ......................@..P.reloc.......0......................@..P.rsrc....^.......^...n..............@..P.............0......................@..P........................................................................................................................................
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:PNG image data, 210 x 55, 8-bit/color RGBA, non-interlaced
                                            Category:dropped
                                            Size (bytes):16493
                                            Entropy (8bit):7.970089956405633
                                            Encrypted:false
                                            SSDEEP:384:UaHshj5NpHFgERfllmpvRxNL0ldMRVTPcP1VWyg+ag:9GzCERtliJxNL0ERVDAVpag
                                            MD5:D03A70C659C1B548EE2076D3E937CEE6
                                            SHA1:296DFEFAE326199D39E2B21280D3CE2315F8C5C2
                                            SHA-256:15DA9D859193790BC08AAA1C88CB61E318FC8E90D8D37D72A5884A028887A898
                                            SHA-512:0B23D90EFF56642DB7E96A475FE350CA555C5CEDD118FE01A8224B0E85FA908AC4B06AFFBAFA91E0B7A760F9780C9D8683EC773E2CA7935F15D7DCC412B69FA9
                                            Malicious:false
                                            Preview:.PNG........IHDR.......7.....y..s....gAMA....|.Q.... cHRM..z%..............u0...`..:....o......?.IDATx.b...?..022.H.......c..'...b..R.D3.....@..M..p$....@.;...E....P..'53.'..P6r........H46?.2.(.aa...!...l..._.....0.{..C||.E.H......F.X.v.( ....#.....,G..5SUUm....3.3..%.ht}.....?0Q0......}.Z...N...../.H".K.o....#(..2..u.....utt...~CN......kii.Drrr....=...5H.(\...&....._.>v...999g.... .....g..wn.AICC#...s...... .p.H,.~...f.{VVVP..k......fB...3.;wN.(t..?1@"m(f"..6{.l577.|NN.........a...?.P._...o.Q&!!...C~Pa.........3.,LA4....i...j...$.....f..;w>.*....T...?6w.3G...=..a..>|.......@.........W...........L .O.>1.9r...."@!a.D&...C%.`...fl...Swtt,........[.lac....T.r..K........l.1..,p......._.|.+.fL.`.g.....d.... ,,,....'.......P.."..k6..?_...HHH..N`..y.f|...d....V#.#..08@.P).....\c.%.....3.2.....o..%.. ........%..D..W766..6.b@~...;8,.?....@a&.U.*(`M/X.d..(....Q...VP}.....;.W.\ax....p...gPWWgPVVf.f.P......(3...VVVN...Nc.d..H.2o.I....hW....eZ`...;G... .
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):5863304
                                            Entropy (8bit):6.582730492890511
                                            Encrypted:false
                                            SSDEEP:98304:IeTs99ujC8vUZJFdIabS8b4Y24Lm/W71mRGfggzzM72X:I/XujC8MLFdIaO8k34LmpyggM72X
                                            MD5:86725CB7E49416271CA85E1D856F3054
                                            SHA1:A3502C78ABD19FDED5248A3AC1C2C7947BACF396
                                            SHA-256:9116FDB5078190544BCC39F8DF793D23ED3262333EA5600FC1B8BC6FA07E46DF
                                            SHA-512:674C9F793685FE6945F052FB8C597E6F60A10DCB97DBA03565E75FB7DE7CD53446CDA9AC188F1389CEB4ABEA7B2479D35DD477518D30D3602FD0026992CF1169
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..................B..d......@.B.......C...@..........................PZ.......Y...@......@...........................`E.xA....H..............NY..)....E...............................E.....................................................CODE......B.......B................. ..`DATA..........C.......B.............@...BSS.....i.....D.......D..................idata..xA...`E..B....D.............@....tls....0.....E.......D..................rdata........E.......D.............@..P.reloc........E.......D.............@..P.rsrc.........H.......G.............@..P.............PZ......NY.............@..P........................................................................................................................................
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):208511
                                            Entropy (8bit):5.620716068879169
                                            Encrypted:false
                                            SSDEEP:3072:jjevRI50115sxnOIdO7YljePuqQIQ9Ausbk2Nr7rCg9kKVBp/7Yto:jaiVr4KoZ
                                            MD5:CC760999D7474C52255929889C66CA5C
                                            SHA1:4F4D3A6AEB374B464EE7036B1E69229A134B5738
                                            SHA-256:04F909824B08317EEFC33F448ABDE06B1D50372AF502501E61B94961BD7A538D
                                            SHA-512:42AC01E1CF16CA2F28950DEB78654A63FAE3EE7B4CEB17EEAD72F71907F670AC39D97CAA4C5DB4CDA3484C28245ACD7A6E534BCAC7727B29E6360AB6CB971F9B
                                            Malicious:false
                                            Preview:........L.......TAboutWindow............AboutWindow......About....sQ.N....Label3..'...Copyright (C) %1% FastStone Corporation ...HrCg@b.g ... .%.1.%. .F.a.s.t.S.t.o.n.e. .C.o.r.p.o.r.a.t.i.o.n.....Label2......Web Site:.....[.eQ..z......Label4......Support Email:..../e.c...{......LblWebsite......www.FastStone.org........LblEmail......support@FastStone.org........Label5......Translated by:....o..NIl.S......Label6......Translator's name.....n.....BntHome......Visit Home Page.......;Nu.....BntPurchase......Buy Now.....zsS-.pN....BntClose......Close....sQ.....VersionLabel......Version %1%....Hr,g:. .%.1.%.....RegisterToText......Unregistered Trial Version....*g.l.Q.(uHr................MyStringCollection.S01......Single-User License....US(u7b...S......MyStringCollection.S02..,...Family License that covers up to 5 computers.....[.^...S..../e.c5.*N...Y......MyStringCollection.S03......Educational Site License....Ye..:g.g.z.p...S......MyStringCollection.S04......Educational Worldwide Licens
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):209129
                                            Entropy (8bit):5.627456769442713
                                            Encrypted:false
                                            SSDEEP:3072:QEhGzK5G7Fh605YGK6GDftCIa27zLDzI0POkrH4iazqlGjBgxr8FIEHHL4:n75bx1x2HM
                                            MD5:8751416A2E09ACDAACB2EDECCFF0EF67
                                            SHA1:3146782E5C90DF46A7A0AFBC3C1FED49032F54B5
                                            SHA-256:58EB9056EB56801457352F7153AD44BED539C37E2808DA151001155034AA1773
                                            SHA-512:A32E3D982BDD7B4AA879BF62EE26558962756B109DE20CA8D0DBD16A08CD76DA9B27E9D8ED2B72D160B6995E9F4BAE37D5CAA9DDDE64C33C7688C010B669A2EF
                                            Malicious:false
                                            Preview:........L.......TAboutWindow............AboutWindow......About......e....Label3..'...Copyright (C) %1% FastStone Corporation ...Hr.k@b.g ... .%.1.%. .F.a.s.t.S.t.o.n.e. .C.o.r.p.o.r.a.t.i.o.n.....Label2......Web Site:.....}.z:.....Label4......Support Email:..../e.c..P[...N:.....LblWebsite......www.FastStone.org........LblEmail......support@FastStone.org........Label5......Translated by:....-N.e..o.:.....Label6......Translator's name....H.S.M.....BntHome......Visit Home Page.....b*.........BntPurchase......Buy Now.....zsS........BntClose......Close...........VersionLabel......Version %1%....Hr,g .%.1.%.....RegisterToText......Unregistered Trial Version....*g;..Qf.(uHr................MyStringCollection.S01......Single-User License.....U.O(u..1..SI.....MyStringCollection.S02..,...Family License that covers up to 5 computers.....[.^1..SI. .(./e.c.g.Y .5. ..S..f.).....MyStringCollection.S03......Educational Site License....Ye.._j.i.z.1..SI.....MyStringCollection.S04......Educational Worl
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):287753
                                            Entropy (8bit):4.41441990168391
                                            Encrypted:false
                                            SSDEEP:3072:5Ogq/rhkCe/spdGX6e2VhrDQmyY+qh1w81D2chrwGqm0AfJS66J4Ym6sf2SKQVXU:2XxXYQaQgDgi
                                            MD5:EED09EC6F80153A98E52CE2A1DDE6549
                                            SHA1:59902A655F70AFDFA00FA58C58B3F293766A229C
                                            SHA-256:488AFC4127E2440FBAF5616B7D0479519B62FC1786A741889A97357E93536E8C
                                            SHA-512:B37720A95FD8C6D969EFEDF0572F3493017E4D06BBCF5396CF36541C8B17AF9C21BA5107F9CD1DE5C9EBE81CA30B0F50B73A84815AD83448AC2EF2C37E488691
                                            Malicious:false
                                            Preview:........L.......TAboutWindowj...........AboutWindow......About....O.v.e.r.....Label3..'...Copyright (C) %1% FastStone Corporation'...C.o.p.y.r.i.g.h.t. .(.C.). .%.1.%. .F.a.s.t.S.t.o.n.e. .C.o.r.p.o.r.a.t.i.o.n.....Label2......Web Site:....W.e.b.s.i.t.e.:.....Label4......Support Email:....S.u.p.p.o.r.t. .e.-.m.a.i.l.:.....LblWebsite......www.FastStone.org........LblEmail......support@FastStone.org........Label5......Translated by:....V.e.r.t.a.a.l.d. .d.o.o.r.:.....Label6......Translator's name....A.l.b.e.r.t. .H.a.n.s.e.n. .e.n. .J.a.a.p. .K.r.a.m.e.r.....BntHome......Visit Home Page....B.e.z.o.e.k. .h.o.m.e.p.a.g.i.n.a.....BntPurchase......Buy Now....K.o.o.p. .n.u.....BntClose......Close....S.l.u.i.t.e.n.....VersionLabel......Version %1%....V.e.r.s.i.e. .%.1.%.....RegisterToText......Unregistered Trial Version....O.n.g.e.r.e.g.i.s.t.r.e.e.r.d.e. .d.e.m.o.v.e.r.s.i.e.................MyStringCollection.S01......Single-User License....S.i.n.g.l.e.-.u.s.e.r. .L.i.c.e.n.t.i.e.....MyString
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):306159
                                            Entropy (8bit):4.362139594009469
                                            Encrypted:false
                                            SSDEEP:1536:JT2QirCjZeMlxk0x1y2Z9LI7yxnTjGIWvUVWClRXVuOCpAXK0DcYX0xX7pnGhpdb:d2FwzxAkE6mIa2VypAXK0DuLpEpdV9
                                            MD5:0246C3E9497F63F11E122E30F235361A
                                            SHA1:28F1445CC038FD92B9CE88F6A58B314F2207C5F7
                                            SHA-256:4CE1B7D56E34BD43E0D895CA81A41DF1435FBD35EA06031C93610314F76B7048
                                            SHA-512:1BA5976107562F1D4BA0889C8E05BFD73C3D2EA4BBD3D621294897E22656CC8C80901DFDEFA6EFF172672665D8CA9B2C4F32445664ABECEA491FE222EB2F1C6B
                                            Malicious:false
                                            Preview:........L.......TAboutWindow............AboutWindow......About....A. .p.r.o.p.o.s.....Label3..'...Copyright (C) %1% FastStone Corporation'...C.o.p.y.r.i.g.h.t. .(.C.). .%.1.%. .F.a.s.t.S.t.o.n.e. .C.o.r.p.o.r.a.t.i.o.n.....Label2......Web Site:....S.i.t.e. .W.e.b.:.....Label4......Support Email:....E.n.v.o.y.e.r. .u.n. .e.m.a.i.l.:.....LblWebsite......www.FastStone.org........LblEmail......support@FastStone.org........Label5......Translated by:....T.r.a.d.u.i.t. .p.a.r.:.....Label6......Translator's name!...C.o.l.o.k. .-. .w.w.w...c.o.l.o.k.-.t.r.a.d.u.c.t.i.o.n.s...c.o.m.....BntHome......Visit Home Page....P.a.g.e. .d.'.a.c.c.u.e.i.l.....BntPurchase......Buy Now....A.c.h.e.t.e.r. .m.a.i.n.t.e.n.a.n.t.....BntClose......Close....F.e.r.m.e.r.....VersionLabel......Version %1%....V.e.r.s.i.o.n. .%.1.%.....RegisterToText......Unregistered Trial Version....V.e.r.s.i.o.n. .d.'.e.s.s.a.i. .n.o.n. .e.n.r.e.g.i.s.t.r...e.................MyStringCollection.S01......Single-User License....L.i.c.e.
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):298809
                                            Entropy (8bit):4.414228832456031
                                            Encrypted:false
                                            SSDEEP:3072:QVVqx/R0BHw6kT5hRyJIbwbVC4nIYS9V+QC4VkSk+aMv1XyqAWPY5aTsNQEh1KeR:sVwiNUGQb0q6
                                            MD5:BD34FDCC1444D9DA2E1AC8BDAAA82A93
                                            SHA1:A99E80DAFC175E64E02F75F35EE7F3D3AAB9E3D1
                                            SHA-256:A9F6C0BDBA563F87AA1C66A814564DFC985624707BDE7E8776B17785F82B6A95
                                            SHA-512:DD6EE4B635AE3528CD75E1DC6CCF854F18A2F1B007D804BE9B7DD7A94BA97AFCC0D6AAF8EFD7786F2381866406A1D0D78BAA7886F8C232E9334B5B8F8A5ADD10
                                            Malicious:false
                                            Preview:........L.......TAboutWindow............AboutWindow......About......b.e.r.....Label3..'...Copyright (C) %1% FastStone Corporation'...C.o.p.y.r.i.g.h.t. .(.C.). .%.1.%. .F.a.s.t.S.t.o.n.e. .C.o.r.p.o.r.a.t.i.o.n.....Label2......Web Site:....I.n.t.e.r.n.e.t.-.S.e.i.t.e.:.....Label4......Support Email:....S.u.p.p.o.r.t. .E.-.M.a.i.l.:.....LblWebsite......www.FastStone.org........LblEmail......support@FastStone.org........Label5......Translated by:....D.e.u.t.s.c.h.e. ...b.e.r.s.e.t.z.u.n.g.:.....Label6......Translator's name#...W.i.n.f.r.i.e.d. .G...n...l.e.r. .w...g.a.e.n.s.s.l.e.r.@.g.m.x...d.e.....BntHome......Visit Home Page....H.o.m.e. .P.a.g.e.....BntPurchase......Buy Now....J.e.t.z.t. .k.a.u.f.e.n.....BntClose......Close....S.c.h.l.i.e...e.n.....VersionLabel......Version %1%....V.e.r.s.i.o.n. .%.1.%.....RegisterToText......Unregistered Trial Version....N.i.c.h.t. .r.e.g.i.s.t.r.i.e.r.t.e. .T.e.s.t.v.e.r.s.i.o.n.................MyStringCollection.S01......Single-User License....E.i.
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):298185
                                            Entropy (8bit):4.35766713960632
                                            Encrypted:false
                                            SSDEEP:3072:155O9ryG/k8mkvNR70m8qVZHfGaf4Is1Gb08TvPaCdYIstC:T5iI8mvm8i3QIZ08TvYIZ
                                            MD5:90F47C7F9EDFCDC15C9B3E761C9EE997
                                            SHA1:26F1BBD0D6991E9A5E37CECE74E15E0E922D8AE7
                                            SHA-256:931A2367A2E6830D66CC0EBB0E9D5E8CE84FC5F0187DFD8C83B95F80F1F28374
                                            SHA-512:9D6EA643427C4527095189BFE13E9124DB49E6818030AA5B415A0ED8E07E752EE5E0116395683C63F58624EA61F895AE64A1A240E629C49DA6FB1799D1DA0A77
                                            Malicious:false
                                            Preview:........L.......TAboutWindow............AboutWindow......About....I.n.f.o. .p.r.o.g.r.a.m.m.a.....Label3..'...Copyright (C) %1% FastStone Corporation'...C.o.p.y.r.i.g.h.t. .(.C.). .%.1.%. .F.a.s.t.S.t.o.n.e. .C.o.r.p.o.r.a.t.i.o.n.....Label2......Web Site:....S.i.t.o. .w.e.b.:.....Label4......Support Email:....E.m.a.i.l. .s.u.p.p.o.r.t.o.:.....LblWebsite......www.FastStone.org........LblEmail......support@FastStone.org........Label5......Translated by:....T.r.a.d.o.t.t.o. .d.a.:.....Label6......Translator's name....R.o.b.e.r.t.o. .B... .(.v... .1.9...1.2...2.0.2.3.).....BntHome......Visit Home Page....V.i.s.i.t.a. .s.i.t.o. .w.e.b. .p.r.o.g.r.a.m.m.a.....BntPurchase......Buy Now....A.c.q.u.i.s.t.a.....BntClose......Close....C.h.i.u.d.i.....VersionLabel......Version %1%....V.e.r.s.i.o.n.e. .%.1.%.....RegisterToText......Unregistered Trial Version ...V.e.r.s.i.o.n.e. .d.i. .p.r.o.v.a. .n.o.n. .r.e.g.i.s.t.r.a.t.a.................MyStringCollection.S01......Single-User License....L.i.c.e.
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):292075
                                            Entropy (8bit):4.5497947965231065
                                            Encrypted:false
                                            SSDEEP:3072:Vl8diIXbDnEjuAo/alByUS5MSIG7mqeFZawP:QAjro/anym7H
                                            MD5:A6E5E213287A9C8D3B17C47C9F51CC87
                                            SHA1:BC2001F6C0970C6FA4FE3F3155CFB07BE3121F71
                                            SHA-256:D8E9EBF1957B77C78AD2511C57DF242A91CAAADDE7ECDD9EAC9AE359EF9FB7C2
                                            SHA-512:B856BB745B1B93A27C801A3E8D38BFF5C0D1F00F98E778346D1AB87887FD719319D42BBF0EBD156D1EB979D5C82835983693F013CD971CC3B0EB7F5784D26DB2
                                            Malicious:false
                                            Preview:........L.......TAboutWindow............AboutWindow......About....O. .p.r.o.g.r.a.m.i.e.....Label3..'...Copyright (C) %1% FastStone Corporation-...P.r.a.w.a. .a.u.t.o.r.s.k.i.e. .(.C.). .%.1.%. .F.a.s.t.S.t.o.n.e. .C.o.r.p.o.r.a.t.i.o.n.....Label2......Web Site:....S.t.r.o.n.a. .W.e.b.:.....Label4......Support Email:....W.s.p.a.r.c.i.e. .E.m.a.i.l.:.....LblWebsite......www.FastStone.org........LblEmail......support@FastStone.org........Label5......Translated by:....T.B.u.m.a.c.z.e.n.i.e.:.....Label6......Translator's name....M.a.c.i.e.j. .K.u.l.e.j.....BntHome......Visit Home Page....O.d.w.i.e.d.z. .s.t.r.o.n... .d.o.m.o.w.......BntPurchase......Buy Now....K.u.p. .t.e.r.a.z.....BntClose......Close....Z.a.m.k.n.i.j.....VersionLabel......Version %1%....W.e.r.s.j.a. .%.1.%.....RegisterToText......Unregistered Trial Version ...N.i.e.z.a.r.e.j.e.s.t.r.o.w.a.n.a. .w.e.r.s.j.a. .t.e.s.t.o.w.a.................MyStringCollection.S01......Single-User License....L.i.c.e.n.c.j.a. .u.|.y.t.k.o.w.n.
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):287337
                                            Entropy (8bit):5.084769712386656
                                            Encrypted:false
                                            SSDEEP:3072:Y68baSA5X5Hu0lZAljh76AdqGSAh4Ojok+:IN0sjHqiW
                                            MD5:4D22416774EDEB268FAA292667C2355C
                                            SHA1:23A5E47CD15D135F4F6D15B89062867A41612D21
                                            SHA-256:990243CD9B361EFF4A4765360D25A2369D5DB0B9C70A878A836D6457D948227A
                                            SHA-512:781D1B429266EFD59F06C6B1DD9A8426D3468EF36E5DED7A3DADDF74CB459682F8F5BF0D68E26CFA76EEF08EFC5988B977C32ECA7B4871D7ACD2C68BC3F2C2FB
                                            Malicious:false
                                            Preview:........L.......TAboutWindow............AboutWindow......About...... .?.@.>.3.@.0.<.<.5.....Label3..'...Copyright (C) %1% FastStone Corporation+.....2.B.>.@.A.:.8.5. .?.@.0.2.0. ... .%.1.%. .F.a.s.t.S.t.o.n.e. .C.o.r.p.o.r.a.t.i.o.n.....Label2......Web Site:....!.0.9.B.:.....Label4......Support Email:......>.G.B.0. .?.>.4.4.5.@.6.:.8.:.....LblWebsite......www.FastStone.org........LblEmail......support@FastStone.org........Label5......Translated by:......5.@.5.2.>.4.:.....Label6......Translator's name).....<... ...@.>.E.8.=. .(.e.r.o.d.i.m.@.m.a.i.l...r.u.).,. ..... .$.5.4.>.@.5.=.:.>.....BntHome......Visit Home Page......>.<.0.H.=.O.O. .A.B.@.0.=.8.F.0.....BntPurchase......Buy Now......C.?.8.B.L.....BntClose......Close......0.:.@.K.B.L.....VersionLabel......Version %1%......5.@.A.8.O. .%.1.%.....RegisterToText......Unregistered Trial Version#.....5.7.0.@.5.3.8.A.B.@.8.@.>.2.0.=.=.0.O. .?.@.>.1.=.0.O. .2.5.@.A.8.O.................MyStringCollection.S01......Single-User License......4.=.
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):307951
                                            Entropy (8bit):4.348845877617973
                                            Encrypted:false
                                            SSDEEP:3072:ti+IFWdHeM4c5SYYmSw+VbaqK7Oyw1uCUzFc+hm2y7fa8iUob/HbE8LKGcTZaM7b:ti+IB0YmSDbYw1u91m2yWLK1ZaMf
                                            MD5:DB6281DFCDD5E027D405362B94A5E89D
                                            SHA1:F879471662E0C2ABF937BF3B5EED73A10A03400B
                                            SHA-256:E83D3420658244CC0CC067D4E8F462C03DA4EA04255E525A38FFE78A77E21591
                                            SHA-512:A9BBE3155A19EA471E355452F7E0E5A769E4ACB3B62F4C1DDFDD289FB0683730600CA0F10F2C97A93D2CEC3F3DE05802CF3982F7E65E63BB5CAB75D55676FFED
                                            Malicious:false
                                            Preview:........L.......TAboutWindow............AboutWindow......About....A.c.e.r.c.a. .d.e.....Label3..'...Copyright (C) %1% FastStone Corporation'...C.o.p.y.r.i.g.h.t. .(.C.). .%.1.%. .F.a.s.t.S.t.o.n.e. .C.o.r.p.o.r.a.t.i.o.n.....Label2......Web Site:....S.i.t.i.o. .w.e.b.:.....Label4......Support Email:....E.m.a.i.l. .d.e. .s.o.p.o.r.t.e.:.....LblWebsite......www.FastStone.org........LblEmail......support@FastStone.org........Label5......Translated by:....T.r.a.d.u.c.i.d.o. .p.o.r.:.....Label6......Translator's name....A.i.t.o.r. .M.......BntHome......Visit Home Page....P...g.i.n.a. .w.e.b. .p.r.i.n.c.i.p.a.l.....BntPurchase......Buy Now....C.o.m.p.r.a.r. .a.h.o.r.a.....BntClose......Close....C.e.r.r.a.r.....VersionLabel......Version %1%....V.e.r.s.i...n. .%.1.%.....RegisterToText......Unregistered Trial Version....V.e.r.s.i...n. .d.e. .p.r.u.e.b.a. .n.o. .r.e.g.i.s.t.r.a.d.a.................MyStringCollection.S01......Single-User License....L.i.c.e.n.c.i.a. .d.e. .u.n. .s.o.l.o. .u.s.u.a.
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):299307
                                            Entropy (8bit):4.529750204459055
                                            Encrypted:false
                                            SSDEEP:3072:lfjLd5ks8kKfRD1bcgR9qTFTLDByE4n6TdhnZmlkn+WjUVeHo5y4EuIXlkOFLmOz:IWjUVeHo5y4FRfsPpuhtv+
                                            MD5:E95134798E06DB4E1E52BC5DC7A49B77
                                            SHA1:872FA05CC614C429289540F3434CB65E2607CEB7
                                            SHA-256:88713CB53CB6E879A8B6408644BF500AB488A3DAD4F01A412EC98C9F8EE1A3FC
                                            SHA-512:766D1BD91FDE0FB90DED2A706DD2482109F2F26CCCEFBB21FDFFD31EDD08D085D54576858D4F3DD4B0BC27F3C1112FDD95BF8A38119C303380019E5B36F171C3
                                            Malicious:false
                                            Preview:........L.......TAboutWindow............AboutWindow......About....N...v.j.e.g.y.....Label3..'...Copyright (C) %1% FastStone Corporation)...S.z.e.r.z.Q.i. .j.o.g. .(.C.). .%.1.%. .F.a.s.t.S.t.o.n.e. .C.o.r.p.o.r.a.t.i.o.n.....Label2......Web Site:....W.e.b.o.l.d.a.l.:.....Label4......Support Email:......g.y.f...l.s.z.o.l.g...l.a.t.:.....LblWebsite......www.FastStone.org........LblEmail......support@FastStone.org........Label5......Translated by:....F.o.r.d...t...:.....Label6......Translator's name....Z.i.t.y.i.'.s. .T.r.a.n.s.l.a.t.o.r. .T.e.a.m.....BntHome......Visit Home Page....W.e.b.o.l.d.a.l. .f.e.l.k.e.r.e.s...s.e.....BntPurchase......Buy Now....V...s...r.l...s.....BntClose......Close....B.e.z...r...s.....VersionLabel......Version %1%....V.e.r.z.i...:. .%.1.%.....RegisterToText......Unregistered Trial Version....R.e.g.i.s.z.t.r...l.a.t.l.a.n. .p.r...b.a.v.e.r.z.i...................MyStringCollection.S01......Single-User License....E.g.y.f.e.l.h.a.s.z.n...l...s. .l.i.c.e.n.c.....My
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):222445
                                            Entropy (8bit):5.641112659354512
                                            Encrypted:false
                                            SSDEEP:3072:fIHMLiOdP9mbmTvL20ripqXL7gXTKMqMS+G+wMd+QtA464nM6TAkXTMqHoZRitc:Z+jkMdVTjMqAF
                                            MD5:7931DD3115D08D00D7A765FA7CE30DE5
                                            SHA1:22D5BA1C5F1AD0FA5ECBE231B82A8C9C59754CB9
                                            SHA-256:F6BC47A9A2A1263EEF4AFFB4DC27594B3DD08C245C66B710BB7F0EBF794CCA45
                                            SHA-512:2B0A639DC5D5B62991CC62891F55AA329EB3851A114D726B86245DF6EE3D1A3D7041AB0958534B1C6555FDEC6A70F164FF93031046708B2CCDDD500ED2996CA9
                                            Malicious:false
                                            Preview:........L.......TAboutWindow*...........AboutWindow......About...............Label3..'...Copyright (C) %1% FastStone Corporation'...C.o.p.y.r.i.g.h.t. .(.C.). .%.1.%. .F.a.s.t.S.t.o.n.e. .C.o.r.p.o.r.a.t.i.o.n.....Label2......Web Site:....H..t...:.....Label4......Support Email:....0. .....:.....LblWebsite......www.FastStone.org........LblEmail......support@FastStone.org........Label5......Translated by:.........:.....Label6......Translator's name.............BntHome......Visit Home Page....H..t... .).8.....BntPurchase......Buy Now........ .l......BntClose......Close.....0.....VersionLabel......Version %1%........ .%.1.%.....RegisterToText......Unregistered Trial Version....D..]. .......................MyStringCollection.S01......Single-User License.....|. ...... .|.t. .......MyStringCollection.S02..,...Family License that covers up to 5 computers....\... .5...X. .....0... ........ ...q. .|.t. .......MyStringCollection.S03......Educational Site License....P.!.. ...t.. .|.t.
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):281187
                                            Entropy (8bit):4.5969337407860955
                                            Encrypted:false
                                            SSDEEP:3072:Es0TFO00rfnFBWrJa058R/G7QBhUQILMnCbVDb3rOJO0pReH3OzQTLZ38Vczg235:1rq00beU0OZue
                                            MD5:42803A06471EEF21A74B0ABF298045C9
                                            SHA1:C501D41B91F1039441D3AE947038272C6FFE901F
                                            SHA-256:44573027139C04EDC2C506427900B91261410EDD3B40067F39C33A68DB2BD87A
                                            SHA-512:CB423C8E43594F27985A1B380B769FCA76631B34DEF0B29287E3715AA2E8E83A909282EB0ED4CC7F0CE81BC373FCE71A655CA94DCB95CED20A7A23D23796C661
                                            Malicious:false
                                            Preview:........L.......TAboutWindow............AboutWindow......About....O. .p.r.o.g.r.a.m.u.....Label3..'...Copyright (C) %1% FastStone Corporation'...C.o.p.y.r.i.g.h.t. .(.C.). .%.1.%. .F.a.s.t.S.t.o.n.e. .C.o.r.p.o.r.a.t.i.o.n.....Label2......Web Site:....D.o.m.o.v.s.k... .s.t.r...n.k.a.:.....Label4......Support Email:....E.m.a.i.l. .p.o.d.p.o.r.y.:.....LblWebsite......www.FastStone.org........LblEmail......support@FastStone.org........Label5......Translated by:....P.Y.e.k.l.a.d.a.t.e.l.:.....Label6......Translator's name....T.Y.a.s...k. .J.i.Y.......BntHome......Visit Home Page....N.a.v.a.t...v.i.t. .d.o.m.o.v.s.k.o.u. .s.t.r...n.k.u.....BntPurchase......Buy Now....K.o.u.p.i.t. .n.y.n.......BntClose......Close....Z.a.v.Y...t.....VersionLabel......Version %1%....V.e.r.z.e. .%.1.%.....RegisterToText......Unregistered Trial Version....N.e.r.e.g.i.s.t.r.o.v.a.n... .z.k.u.a.e.b.n... .v.e.r.z.e.................MyStringCollection.S01......Single-User License....L.i.c.e.n.c.e. .p.r.o. .j.e.d.n.o.
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):285949
                                            Entropy (8bit):4.46474682172852
                                            Encrypted:false
                                            SSDEEP:3072:DiufPpIQOF2TKleELRK5TXDELgDTAYh0adSyGpt8jPUhveNgm/sX+Bg:DtlSpY72V
                                            MD5:47269D776F98B5AF251476542EA8BC35
                                            SHA1:9BBA10DAADB3E396C142ED730773763FE3AED7AB
                                            SHA-256:9C57304F183D9992A71423597350F312CA954B3BE7549F4EA22C6961D70E20DD
                                            SHA-512:104BC221FFBD79670CFF0AEDB7B778780BF97896FA3B3A4436045FA6C71EEF4A1510CEF3CDA37C24D85CBF89CB91AE5C805F5A212E56FAF045238C4C0FA31BB2
                                            Malicious:false
                                            Preview:........L.......TAboutWindow>...........AboutWindow......About....O.m.....Label3..'...Copyright (C) %1% FastStone Corporation'...C.o.p.y.r.i.g.h.t. .(.C.). .%.1.%. .F.a.s.t.S.t.o.n.e. .C.o.r.p.o.r.a.t.i.o.n.....Label2......Web Site:....H.e.m.s.i.d.a.:.....Label4......Support Email:....E.-.p.o.s.t. .f...r. .s.u.p.p.o.r.t.:.....LblWebsite......www.FastStone.org........LblEmail......support@FastStone.org........Label5......Translated by:......v.e.r.s.a.t.t. .a.v.:.....Label6......Translator's name....G...r.a.n.....BntHome......Visit Home Page....B.e.s...k. .h.e.m.s.i.d.a.n.....BntPurchase......Buy Now....K...p. .n.u.....BntClose......Close....S.t...n.g.....VersionLabel......Version %1%....V.e.r.s.i.o.n. .%.1.%.....RegisterToText......Unregistered Trial Version....O.r.e.g.i.s.t.r.e.r.a.d. .t.e.s.t.v.e.r.s.i.o.n.................MyStringCollection.S01......Single-User License....E.n.a.n.v...n.d.a.r.l.i.c.e.n.s.....MyStringCollection.S02..,...Family License that covers up to 5 computers+...F.
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):288439
                                            Entropy (8bit):5.084924661347102
                                            Encrypted:false
                                            SSDEEP:3072:lCPodg0A9DvuRj6Jg+JO0ErxULF3ayeUlEk:9uCYO0wMNp
                                            MD5:429BE29D82949F0CAB1C591936F4E06C
                                            SHA1:FA0318110D426237E632653AF60E7B3D093292C1
                                            SHA-256:499D76FE0E79FEA2C1288C960CE2543E65FC5C6F295875557C70631DC6342D86
                                            SHA-512:A596F9787B663C5608CE00623248F30F554074396DCFC740D68E7271D213B447D7F93B5C953FC082A46E2565E401BEF0EDA4AFE9E8E8F0E1D83DF9BE77EA3C84
                                            Malicious:false
                                            Preview:........L.......TAboutWindow............AboutWindow......About......@.>. .?.@.>.3.@.0.<.C.....Label3..'...Copyright (C) %1% FastStone Corporation'...C.o.p.y.r.i.g.h.t. .(.C.). .%.1.%. .F.a.s.t.S.t.o.n.e. .C.o.r.p.o.r.a.t.i.o.n.....Label2......Web Site:......5.1.A.0.9.B.:.....Label4......Support Email:......;... .?.>.H.B.0. .?.V.4.B.@.8.<.:.8.:.....LblWebsite......www.FastStone.org........LblEmail......support@FastStone.org........Label5......Translated by:......5.@.5.:.;.0.4.:.....Label6......Translator's name......2.3.5.=.V.9. ...V.@.>.H.=.8.G.5.=.:.>.....BntHome......Visit Home Page......>.<.0.H.=.O. .A.B.>.@.V.=.:.0.....BntPurchase......Buy Now......C.?.8.B.8. .=.5.3.0.9.=.>.....BntClose......Close......0.:.@.8.B.8.....VersionLabel......Version %1%......5.@.A.V.O. .%.1.%.....RegisterToText......Unregistered Trial Version......5.7.0.@.5.T.A.B.@.>.2.0.=.0. .2.8.?.@.>.1.=.0. .2.5.@.A.V.O.................MyStringCollection.S01......Single-User License......V.F.5.=.7.V.O. .4.;.O. .>.4.=.
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):286837
                                            Entropy (8bit):5.08354792237096
                                            Encrypted:false
                                            SSDEEP:3072:vy8uSh91u689tbCijgDY8nF8rC/coedjp7khomqznSCtudPrpNdn/RaBugUi:kWOp7rAJ0
                                            MD5:5BFB37398A8739D751266A216A070F66
                                            SHA1:61412B871A07F07F9B1D0598B03F45DE5055762B
                                            SHA-256:6654E2CD70E94C0DF6D400A1A311EF2048473C3FECD61C6D76288E0B11F6E77F
                                            SHA-512:4A535F6941AE344233A071B3A5E04473F77B24C82EC21778D405019A8DC39F78B516F594AC29D5D878595A07137A6AD021CC214C97201FE5DF3BF5405B28502D
                                            Malicious:false
                                            Preview:........L.......TAboutWindow............AboutWindow......About......B.=.>.A.=.>.....Label3..'...Copyright (C) %1% FastStone Corporation'...C.o.p.y.r.i.g.h.t. .(.C.). .%.1.%. .F.a.s.t.S.t.o.n.e. .C.o.r.p.o.r.a.t.i.o.n.....Label2......Web Site:....#.5.1. .!.0.9.B.:.....Label4......Support Email:......>.4.4.@.J.6.:.0. .E.m.a.i.l.:.....LblWebsite......www.FastStone.org........LblEmail......support@FastStone.org........Label5......Translated by:......@.5.2.5.4.5.=.>. .>.B.:.....Label6......Translator's name......5.>.@.3.8. ..... .&.2.5.B.0.=.>.2.....BntHome......Visit Home Page......>.A.5.B.8. ...>.<.0.H.=.0. .!.B.@.0.=.8.F.0.....BntPurchase......Buy Now......C.?.8. .!.5.3.0.....BntClose......Close......0.B.2.>.@.8.....VersionLabel......Version %1%......5.@.A.8.O. .%.1.%.....RegisterToText......Unregistered Trial Version......5.@.5.3.8.A.B.@.8.@.0.=.0. ...@.>.1.=.0. ...5.@.A.8.O.................MyStringCollection.S01......Single-User License......4.=.>.;.8.G.5.=. ...>.B.@.5.1.8.B.5.;.A.:.8.
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):225967
                                            Entropy (8bit):5.62856445840315
                                            Encrypted:false
                                            SSDEEP:3072:yUXQNADvhPuuS82K9eH5UWidjOHLP6lC0KGTCNLY+3Ozey4WijhHJvfN7BZy9:OPqWKKT3u+NC4W0fNU
                                            MD5:C6DDC92D5448E304A3734E167AA27F3A
                                            SHA1:7CCCF975C5190654CB1D1264B53CEE8F5BC5A863
                                            SHA-256:95110C36EA1E06E3F74E6E6BC6BEB94AF32D867CD4AB364D90F53773FB5AFD08
                                            SHA-512:3615EFED949845901AAA37E848B212A7EF0D3E31AAA11896C53BA074AC0F9CED73F7341CE6F4FEEA5D61E4B137177D4A8133E9A74A780DB830AEFDC5862125BC
                                            Malicious:false
                                            Preview:........L.......TAboutWindowD...........AboutWindow......About.......T.`1X....Label3..'...Copyright (C) %1% FastStone Corporation'...C.o.p.y.r.i.g.h.t. .(.C.). .%.1.%. .F.a.s.t.S.t.o.n.e. .C.o.r.p.o.r.a.t.i.o.n.....Label2......Web Site:.....0.0.0.0.0.0:.....Label4......Support Email:.....0.0.0.0.0.0.0:.....LblWebsite......www.FastStone.org........LblEmail......support@FastStone.org........Label5......Translated by:......3..c.O:.....Label6......Translator's name....N.g.u.y.e.n. .M.i.n.h. .H.i.e.u.....BntHome......Visit Home Page.....0.0.0.0.0.0x0....BntPurchase......Buy Now.....0.0.0.0.0.0..eQ....BntClose......Close....B}.N....VersionLabel......Version %1%.....0.0.0.0.0 .%.1.%.....RegisterToText......Unregistered Trial Version.....0.0.0.0.0*g.S._f.(uHr................MyStringCollection.S01......Single-User License.....P.N(u.0.0.0.0.0....MyStringCollection.S02..,...Family License that covers up to 5 computers.....g'Y.z+g5..S~0g0.[.e(u.0.0.0.0.0....MyStringCollection.S03......Educational
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):298779
                                            Entropy (8bit):4.404260012828611
                                            Encrypted:false
                                            SSDEEP:3072:oy7pQA4QiFWF4AEl8qSC84aQpW1ZaMondC07EpBTh2lipBbJ4IDboeq:o35Al1e
                                            MD5:518EABDCA3C23F2CD40987C15C3184E5
                                            SHA1:733367184D305AECB1EB8062F8E9E4B3155BB42C
                                            SHA-256:F19692D21D4E7232AA14A1E8653B594E77DAA0F512227843FAA334511F183E26
                                            SHA-512:15E48CD882D06930D103DA38FBC8967E2B0DF13E7A88B5DF6F8E5AB3EF5C347830A9817574C34C8F8949F6C5220C6C38070FCE42E97B495A2DBF8E0F8D5558E4
                                            Malicious:false
                                            Preview:........L.......TAboutWindow............AboutWindow......About....S.o.b.r.e.....Label3..'...Copyright (C) %1% FastStone Corporation'...C.o.p.y.r.i.g.h.t. .(.C.). .%.1.%. .F.a.s.t.S.t.o.n.e. .C.o.r.p.o.r.a.t.i.o.n.....Label2......Web Site:....S.i.t.e. .n.a. .W.e.b.:.....Label4......Support Email:....E.-.m.a.i.l. .d.e. .S.u.p.o.r.t.e.:.....LblWebsite......www.FastStone.org........LblEmail......support@FastStone.org........Label5......Translated by:....T.r.a.d.u.z.i.d.o. .p.o.r.:.....Label6......Translator's name....A.l.d.i.n.e.y. .O.l.i.v.e.i.r.a.....BntHome......Visit Home Page....V.i.s.i.t.a.r. .a. .H.o.m.e. .P.a.g.e.....BntPurchase......Buy Now....C.o.m.p.r.a.r. .A.g.o.r.a.....BntClose......Close....F.e.c.h.a.r.....VersionLabel......Version %1%....V.e.r.s...o. .%.1.%.....RegisterToText......Unregistered Trial Version....V.e.r.s...o. .d.e. .T.e.s.t.e. .N...o. .R.e.g.i.s.t.r.a.d.a.................MyStringCollection.S01......Single-User License....L.i.c.e.n...a. .d.e. .U.s.u...r.i.o. ...
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:MS Windows HtmlHelp Data
                                            Category:dropped
                                            Size (bytes):299443
                                            Entropy (8bit):7.9635098115442915
                                            Encrypted:false
                                            SSDEEP:6144:mbJ0F6V3McbEG1RugYA9gHaSfgj/5avUjjzY9/k6ex3Mh0O5qw:o0i3MpA9g6SI7YUjjc9yx3MJh
                                            MD5:DB2FA7AF15BFF26038A8F9002E295A40
                                            SHA1:65B9F52E56D4F7535C01E2DBAD9EA5622ACFCF2F
                                            SHA-256:50AF8EF32BFB634E6508BEF4D6B1E8740023FF32305FA969F36AED7AE55AED35
                                            SHA-512:34E9C7F1E0EE734F17668EAE9332A866E8EFABF7CE81394EE8BDDA788E1581F4A9323A7FB566EA24D5590CDE27F29F9206656990E46FF6967085BB4FD9350419
                                            Malicious:false
                                            Preview:ITSF....`........s.8.......|.{.......".....|.{......."..`...............x.......T.......................................ITSP....T...........................................j..].!......."..T...............PMGL'................/..../#IDXHDR...e.../#ITBITS..../#STRINGS...O.c./#SYSTEM....5./#TOPICS...e.@./#URLSTR...5.../#URLTBL...%.../$FIftiMain..../$OBJINST...J.../$WWAssociativeLinks/..../$WWAssociativeLinks/Property...F../$WWKeywordLinks/..../$WWKeywordLinks/BTree...N.L./$WWKeywordLinks/Data......./$WWKeywordLinks/Map....../$WWKeywordLinks/Property...& ./ActiveWindow.gif....j./CaptureButtons.gif......./CapturePanel.gif...y..../CapturePanel.htm....L./CaptureSmallBar.gif...C.../CloseButton.gif.....a./CloseTabButton.gif......./ContactUs.htm...h.W./CutVideo.gif...j.../DelayCapture.gif...U.K./DragCursorShape.gif...R.../DrawVideoButton.gif.....*./Editor.htm...?.'./EditVideoButton.gif...f.../EditVideoFile.htm.....?./FastStoneLogo.gif...b.../Features.htm...f.q./FixRegion.gif...>."./Freehand.gif.
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1026
                                            Entropy (8bit):4.539411659056302
                                            Encrypted:false
                                            SSDEEP:24:9HE4Qt3+Ri45l+3mMIRW0QgbEL8JhQm46EWLR1gmcEy:udt3+Ri45l+WJoTH4J2mGWd1+Z
                                            MD5:2372C82DB2B5977877CA02FD643DFC10
                                            SHA1:BDFA3C625E3620CF2CA9DFB349FD73EC0EDDA645
                                            SHA-256:E468C5223B0E36710B0430A8F664B434DEC2A3B058603AF3282EDDBE62A996F6
                                            SHA-512:8269DAE425E15CCEE965CAE401B3BDB6398D13F2B63CA3040CE1B0845CD874994820DE0D850578099F1AE25C3A27AB9F2456D2ED044CF92506A309A133E03153
                                            Malicious:false
                                            Preview:Please read the following terms and conditions carefully before using FastStone Capture. Use of FastStone Capture indicates you accept the terms of this license agreement and warranty.....1. Disclaimer of Warranty....FastStone Capture (this software) is provided "as-is" and without warranty of any kind, express, implied or otherwise, including without limitation, any warranty of merchantability or fitness for a particular purpose. ....In no event shall the author of this software be held liable for data loss, damages, loss of profits or any other kind of loss while using or misusing this software.....2. License....FastStone Capture is shareware. You may try it free for 30 days. Once this 30-day period has expired, you must either purchase a license to use this software, or uninstall it from your computer promptly.....3. Restrictions on Use ....FastStone Capture must not be decompiled, disassembled, reverse engineered or otherwise modified. ......Copyright (C) 2024 FastStone Corporation
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:MS Windows 95 Internet shortcut text (URL=<http://www.faststone.org>), ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):50
                                            Entropy (8bit):4.448367439558377
                                            Encrypted:false
                                            SSDEEP:3:HRAbABGQYm/0S4YWW7orvn:HRYFVm/r4YFo7n
                                            MD5:FC1E05873C9D464E374366092FC226A3
                                            SHA1:D58AFD89E33A709E20BCEEF81DCB2FC88A05C4AF
                                            SHA-256:34C6F429648B294039A085097E6485BFB4F19F1CE43654534C4119E7DB6CD797
                                            SHA-512:129C49E17AAE96603CDC0A0C2B9644ED46C9E3DF285FCFE325ED882335BF1CA160C4B9D42C254267BDA69C679D668E6E1DAC1518B6222D1800249F0602F5B947
                                            Malicious:false
                                            Preview:[InternetShortcut]..URL=http://www.faststone.org..
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):106640
                                            Entropy (8bit):6.818161398972172
                                            Encrypted:false
                                            SSDEEP:1536:/ZZZg5wwcuBil+UaTJwb6Y2FadNyPLxbuvtmgMbFuQh5gRbbbbbbbGUvy+yx:DDkjtqwIAg0FuQh5g0Uv
                                            MD5:0CE639618B3E361EFA1B09CF8FFE3D95
                                            SHA1:A1A08B5914A16772CCD9D699D938115E1618D424
                                            SHA-256:D34FB573DBB827161A4FFB22A6F06F8AC30778CCC5C8B173950B9D49BA2795C2
                                            SHA-512:249D12F438CF25C42A1ECC3F0BBF10E985DD88C7E5F3137C757EF5E6614D33FC3916675F32481B7BB448464CA37BB5E20B088D7E0BCCBF17525F07D42969A976
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........;6..ZXN.ZXN.ZXN.#N.ZXN.ZYN.ZXN...N.ZXN...N.ZXN...N.ZXN...N.ZXN...N.ZXN...N.ZXNRich.ZXN........PE..L......e...........!.................C..............................................|Z.............................. h.......b..(.......8............z...&..........................................._..@............................................text............................... ..`.rdata...X.......Z..................@..@.data....6...p.......P..............@....rsrc...8............d..............@..@.reloc...............h..............@..B........................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):503440
                                            Entropy (8bit):6.790981016396434
                                            Encrypted:false
                                            SSDEEP:6144:kee+bf9cK2+k5NkwaFmMNf6HMdeI3aji2ek+OKHepZwgL7SCr+Sf9EAOmDGPnc:q8Me6IA1ek+/SVEU+
                                            MD5:EF19B06FF151B46589DE08CDD17F5282
                                            SHA1:BA552C68FB231615731CFAEF3703FEAACA7B5794
                                            SHA-256:56A31BF39A191303F1B4D8766F481B974D35F3E39EB9525D8E4E88989F7B6F0D
                                            SHA-512:C87CDED8B3E7D954785534764C7665D08A5B4E30A8E1F8C4ED3D017BB9C27C64944C9C3C95BB0832B6B17C3EE86412BA23F4CA215FCDCD792002E5E64E02F2AD
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........q.|.../.../.../../.../.BZ/.../.BK/.../.BM/.../.../.../.B]/.../.BL/.../.BJ/.../.BO/.../Rich.../........PE..L......e...........!.....^...<...............p.......................................................................J.......C..<....... ................&......L....................................@..@............p..,............................text...D].......^.................. ..`.rdata.......p.......b..............@..@.data....(...`.......H..............@....rsrc... ............\..............@..@.reloc...'.......(...`..............@..B................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                            Category:dropped
                                            Size (bytes):86264
                                            Entropy (8bit):7.106001835624037
                                            Encrypted:false
                                            SSDEEP:1536:rmsAYBdTU9fEAIS2PEtuo83hvVVZ+L8hRKPy6PTZ7xxB:qfY/TU9fE9PEtuh+fy6PTZF
                                            MD5:83BC9466FA5B28383A14C226D792896A
                                            SHA1:7504F83E247DF1CFFC4B29BF61660EA9CF25A4A9
                                            SHA-256:4EF87F73E6B7A7DA6745DA4F9B304BE375B9EBCF2341D366565D40F5FABEC77B
                                            SHA-512:D2211C52BCCAFFEF54E2AC45FED86454799D1C4658B7CC517E7AA6E8848F8F0396492B5005E428122049B8066E3D9943CCEB5EF2468FC1660CDB80ED0D2E6214
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................h...*......@6............@..................................x....@.............................................(...........p'...)...........................................................................................text...vf.......h.................. ..`.rdata...............l..............@..@.data...x...........................@....ndata... ...............................rsrc...(........0..................@..@................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Fri May 17 21:58:50 2024, mtime=Mon Oct 7 08:00:34 2024, atime=Fri May 17 21:58:50 2024, length=176729, window=hide
                                            Category:dropped
                                            Size (bytes):1186
                                            Entropy (8bit):4.631282139390456
                                            Encrypted:false
                                            SSDEEP:24:8mYlGP6EtdOEB7eFGJwAA8yWdQVJ4dL/oUUl7qygm:8mYlGPttdOAi4pA8Td+GdL/9byg
                                            MD5:E4E19CF1D06CA94661C36337DCD0B2EF
                                            SHA1:35BD2964F63A9178A7310DBB7F22FE55D3A41F9A
                                            SHA-256:A58A772F4CD1D256AD0D716BE777BDBC8F48BC0A1DD0B38F0E74F31AAEBBD3F3
                                            SHA-512:4B8ED4DC7715DF69AF1A05A9B678E1359E88129AE6FCC1F6E59B32A02F8BCFA07476B52231125A852D4FF2C82F0A939757D87FFEB2AB4EB9F4DA0C8FEA31DC0E
                                            Malicious:false
                                            Preview:L..................F.... .........."..^...........Y............................P.O. .:i.....+00.../C:\.....................1.....GY.H..PROGRA~2.........O.IGY.H....................V.........P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....l.1.....GY.H..FASTST~1..T......GY.HGY.H...........................3..F.a.s.t.S.t.o.n.e. .C.a.p.t.u.r.e.....p.2.Y....XY. .FSCAPT~1.CHM..T......XY.GY.H..............................F.S.C.a.p.t.u.r.e.H.e.l.p...c.h.m.......i...............-.......h...........c........C:\Program Files (x86)\FastStone Capture\FSCaptureHelp.chm..I.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.F.a.s.t.S.t.o.n.e. .C.a.p.t.u.r.e.\.F.S.C.a.p.t.u.r.e.H.e.l.p...c.h.m.(.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.F.a.s.t.S.t.o.n.e. .C.a.p.t.u.r.e.........*................@Z|...K.J.........`.......X.......172892...........hT..CrF.f4... .E|2=.b...,...W..hT..CrF.f4... .E|2=.b...,...W..............1SPS.XF.L8C....
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Tue Aug 20 23:18:26 2024, mtime=Mon Oct 7 08:00:32 2024, atime=Tue Aug 20 23:18:26 2024, length=7563656, window=hide
                                            Category:dropped
                                            Size (bytes):1166
                                            Entropy (8bit):4.620172167775995
                                            Encrypted:false
                                            SSDEEP:24:8mxRuH46EtdOEBucOUUAk81UdQVOgdL/oUUlnqygm:8mxRuH4ttdOAu5Qk8Kd+OgdL/9nyg
                                            MD5:E47563E0521E7CD09C71F30FE4148EB2
                                            SHA1:5746B853BE57193AD7610DFBF3CFB7466DDE9294
                                            SHA-256:31048B149FC77727839B540647E36C3F429A1ECCA236D4E2616DEC3559555A2F
                                            SHA-512:9A7DE3DBA93EC70998A007D4AB65A99D2D2BC7360E2C47270E9FE86F1475B512895F1A7BC4EB1EC24F1015044CE2CA13E40477A9AE5A8F7E6B1C825593963918
                                            Malicious:false
                                            Preview:L..................F.... ......._.....]........_....is..........................P.O. .:i.....+00.../C:\.....................1.....GY.H..PROGRA~2.........O.IGY.H....................V.........P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....l.1.....GY.H..FASTST~1..T......GY.HGY.H...........................3..F.a.s.t.S.t.o.n.e. .C.a.p.t.u.r.e.....h.2..is..YM. .FSCAPT~1.EXE..L.......YM.GY.H..............................F.S.C.a.p.t.u.r.e...e.x.e.......e...............-.......d...........c........C:\Program Files (x86)\FastStone Capture\FSCapture.exe..E.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.F.a.s.t.S.t.o.n.e. .C.a.p.t.u.r.e.\.F.S.C.a.p.t.u.r.e...e.x.e.(.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.F.a.s.t.S.t.o.n.e. .C.a.p.t.u.r.e.........*................@Z|...K.J.........`.......X.......172892...........hT..CrF.f4... .@|2=.b...,...W..hT..CrF.f4... .@|2=.b...,...W..............1SPS.XF.L8C....&.m.q............/..
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Tue Aug 20 23:36:40 2024, mtime=Mon Oct 7 08:00:34 2024, atime=Tue Aug 20 23:36:40 2024, length=86264, window=hide
                                            Category:dropped
                                            Size (bytes):1149
                                            Entropy (8bit):4.622070953552665
                                            Encrypted:false
                                            SSDEEP:24:8meTYf6EtdOEgVPR8ADcdCGgdL/oUUl/qygm:8mZttdOlVPR7DcdCGgdL/9nyg
                                            MD5:371919597AB41E2BFA7B9BF59E738960
                                            SHA1:9212A1574D8E5EBE8912D520B69BDEAB828CED7C
                                            SHA-256:BF6B7E2ADB081AFF4C26E8B9DF968D2B017B56A0393C56C8EE5CB44F125B3BF1
                                            SHA-512:19F7BF73D91E0C500DB137258914C64F824F7AC2A7817B9DEA1BB2932B7C34153B4CEAC30A3136591AA98AE7DD889E2F3FE0E3F60E88337E2DC0906DCCC8F6D3
                                            Malicious:false
                                            Preview:L..................F.... ......0b....$.^.......0b....P...........................P.O. .:i.....+00.../C:\.....................1.....GY.H..PROGRA~2.........O.IGY.H....................V.........P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....l.1.....GY.H..FASTST~1..T......GY.HGY.H............................}.F.a.s.t.S.t.o.n.e. .C.a.p.t.u.r.e.....`.2..P...Y.. .uninst.exe..F.......Y..GY.H....!.........................u.n.i.n.s.t...e.x.e.......b...............-.......a...........c........C:\Program Files (x86)\FastStone Capture\uninst.exe..B.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.F.a.s.t.S.t.o.n.e. .C.a.p.t.u.r.e.\.u.n.i.n.s.t...e.x.e.(.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.F.a.s.t.S.t.o.n.e. .C.a.p.t.u.r.e.........*................@Z|...K.J.........`.......X.......172892...........hT..CrF.f4... .J|2=.b...,...W..hT..CrF.f4... .J|2=.b...,...W..............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Mon Oct 7 08:00:35 2024, mtime=Mon Oct 7 08:00:35 2024, atime=Mon Oct 7 08:00:35 2024, length=50, window=hide
                                            Category:dropped
                                            Size (bytes):1154
                                            Entropy (8bit):4.594823221399007
                                            Encrypted:false
                                            SSDEEP:24:8mE/6EtdOEBVUubAKQrd6CdL/oUUlHqygm:8mQttdOABMKQrd6CdL/93yg
                                            MD5:6A3CCFE69685308213004BE9A25B7932
                                            SHA1:F28C847D2074DA3D5E8A19472CCA8D140A7B1460
                                            SHA-256:07F608EA42ED8FD05C82A08FAFB06CFD095DF3F8093563B962D5DE022BB460EE
                                            SHA-512:9AE55746FB2468C9EBD9A3E593FED165C9B11B67764E17CA7A82456410D08E655F61B7239D8446E738F48E6FD4B2899A56208EAA0B5C5BF7B1E9598CE71AF7E9
                                            Malicious:false
                                            Preview:L..................F.... ...G.._....G.._....G.._....2............................P.O. .:i.....+00.../C:\.....................1.....GY.H..PROGRA~2.........O.IGY.H....................V.........P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....l.1.....GY.H..FASTST~1..T......GY.HGY.H...........................3..F.a.s.t.S.t.o.n.e. .C.a.p.t.u.r.e.....b.2.2...GY.H .Website.url.H......GY.HGY.H....X.......................}.W.e.b.s.i.t.e...u.r.l.......c...............-.......b...........c........C:\Program Files (x86)\FastStone Capture\Website.url..C.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.F.a.s.t.S.t.o.n.e. .C.a.p.t.u.r.e.\.W.e.b.s.i.t.e...u.r.l.(.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.F.a.s.t.S.t.o.n.e. .C.a.p.t.u.r.e.........*................@Z|...K.J.........`.......X.......172892...........hT..CrF.f4... .H|2=.b...,...W..hT..CrF.f4... .H|2=.b...,...W..............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Tue Aug 20 23:18:26 2024, mtime=Mon Oct 7 08:00:35 2024, atime=Tue Aug 20 23:18:26 2024, length=7563656, window=hide
                                            Category:dropped
                                            Size (bytes):1148
                                            Entropy (8bit):4.6376238162703665
                                            Encrypted:false
                                            SSDEEP:24:8mx+46EtdOEBucOUUAk81RdQVOgdL/oUUlnqygm:8mx+4ttdOAu5Qk8fd+OgdL/9nyg
                                            MD5:E55FF78CE489A03302829FD09F6DE135
                                            SHA1:36083C821B2F413C36A0C1FCA9B8B0943E0C0311
                                            SHA-256:71DA05C757C034CEA473650219927AD23B3053BF0C90287EB162249119AF468B
                                            SHA-512:88BAAB8C8647F9504C4C675124EE7E15C8D62EB1AD558281A3B35DAD332241E352388AD219F5372B42A3B2E7119E0E3CD7910B535E0F9D78C3C094C4BC0BA3FC
                                            Malicious:false
                                            Preview:L..................F.... ......._...z.._........_....is..........................P.O. .:i.....+00.../C:\.....................1.....GY.H..PROGRA~2.........O.IGY.H....................V.........P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....l.1.....GY.H..FASTST~1..T......GY.HGY.H...........................3..F.a.s.t.S.t.o.n.e. .C.a.p.t.u.r.e.....h.2..is..YM. .FSCAPT~1.EXE..L.......YM.GY.H..............................F.S.C.a.p.t.u.r.e...e.x.e.......e...............-.......d...........c........C:\Program Files (x86)\FastStone Capture\FSCapture.exe..<.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.F.a.s.t.S.t.o.n.e. .C.a.p.t.u.r.e.\.F.S.C.a.p.t.u.r.e...e.x.e.(.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.F.a.s.t.S.t.o.n.e. .C.a.p.t.u.r.e.........*................@Z|...K.J.........`.......X.......172892...........hT..CrF.f4... .@|2=.b...,...W..hT..CrF.f4... .@|2=.b...,...W..............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):15872
                                            Entropy (8bit):5.471852540236525
                                            Encrypted:false
                                            SSDEEP:384:EXsC43tPegZ3eBaRwCPOYY7nNYXC06/Yosa:EXJTgZ3eBTCmrnNA5p
                                            MD5:ECE25721125D55AA26CDFE019C871476
                                            SHA1:B87685AE482553823BF95E73E790DE48DC0C11BA
                                            SHA-256:C7FEF6457989D97FECC0616A69947927DA9D8C493F7905DC8475C748F044F3CF
                                            SHA-512:4E384735D03C943F5EB3396BB3A9CB42C9D8A5479FE2871DE5B8BC18DB4BBD6E2C5F8FD71B6840512A7249E12A1C63E0E760417E4BAA3DC30F51375588410480
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......N.px.q.+.q.+.q.+.q.+[q.+.~C+.q.+^R.+.q.+^R/+.q.+.w.+.q.+.Q.+.q.+Rich.q.+........PE..L....Oa...........!.........`.......+.......0............................................@..........................8......X1..................................X....................................................0..X............................text............................... ..`.rdata..G....0......."..............@..@.data...DL...@.......,..............@....rsrc................6..............@..@.reloc..x............8..............@..B........................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):44032
                                            Entropy (8bit):5.825224158327635
                                            Encrypted:false
                                            SSDEEP:768:SA49ATJ9ONLkh9J5lDYDzG8yVAf7hiJFkkAqnTEDlV4vihdk:SA4CJ9OFpXf0AfNiTkIMrhdk
                                            MD5:552CBA3C6C9987E01BE178E1EE22D36B
                                            SHA1:4C0AB0127453B0B53AEB27E407859BCCB229EA1B
                                            SHA-256:1F17E4D5FFE7B2C9A396EE9932AC5198F0C050241E5F9CCD3A56E576613D8A29
                                            SHA-512:9BCF47B62CA8FFA578751008CAE523D279CDB1699FD916754491899C31ACE99F18007ED0E2CBE9902ABF132D516259B5FB283379D2FEAD37C76B19E2E835E95A
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......L..\.j...j...j....n..j....[..j....o.Jj....F..j....V..j...j..nj..\I...j....j..j....^..j....X..j..Rich.j..........PE..L....z.[...........!.....V...R......T........p............................................@.........................0...V............................................................................................p...............................text....U.......V.................. ..`.rdata...0...p...2...Z..............@..@.data...............................@....rsrc...............................@..@.reloc..f...........................@..B........................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):12288
                                            Entropy (8bit):5.814115788739565
                                            Encrypted:false
                                            SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
                                            MD5:CFF85C549D536F651D4FB8387F1976F2
                                            SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
                                            SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
                                            SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1362
                                            Entropy (8bit):3.6739774731888986
                                            Encrypted:false
                                            SSDEEP:24:Q+sxvtSSAD5ylSjqWCs7y6PaGk9nUvO6k8l6yCxG/wCk6ZEcbYpPm8aH65OESC+d:rsx9AQSjqQtaGq8l6Jwgg/8aNEo
                                            MD5:34A7D2A7AF0A88E8363F46E5BA8DBDF9
                                            SHA1:0141380A908310D2BFDF09A38F4A5C7191175874
                                            SHA-256:C010E479C847960AE3EF4B9C1E4ED67E0E5A40D82B2199749012584AB65C189D
                                            SHA-512:BFF2104C25B7CA3093E1AFD7731B8EA84C5A2D94AEBD7F90E9E911AD3C11873FDD66F1D9E0D6AECF4CDF20B25D820EB60615B5011127DA91C8145AC2F7FFA6D1
                                            Malicious:false
                                            Preview:..[.S.e.t.t.i.n.g.s.].....R.e.c.t.=.1.0.4.4.....N.u.m.F.i.e.l.d.s.=.4.....R.T.L.=.0.....N.e.x.t.B.u.t.t.o.n.T.e.x.t.=.&.F.i.n.i.s.h.....C.a.n.c.e.l.E.n.a.b.l.e.d.=.....S.t.a.t.e.=.0.....[.F.i.e.l.d. .1.].....T.y.p.e.=.b.i.t.m.a.p.....L.e.f.t.=.0.....R.i.g.h.t.=.1.0.9.....T.o.p.=.0.....B.o.t.t.o.m.=.1.9.3.....F.l.a.g.s.=.R.E.S.I.Z.E.T.O.F.I.T.....T.e.x.t.=.C.:.\.U.s.e.r.s.\.a.l.f.o.n.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.n.s.f.6.3.5.3...t.m.p.\.m.o.d.e.r.n.-.w.i.z.a.r.d...b.m.p.....H.W.N.D.=.3.2.8.7.5.8.....[.F.i.e.l.d. .2.].....T.y.p.e.=.l.a.b.e.l.....L.e.f.t.=.1.2.0.....R.i.g.h.t.=.3.1.5.....T.o.p.=.1.0.....T.e.x.t.=.C.o.m.p.l.e.t.i.n.g. .F.a.s.t.S.t.o.n.e. .C.a.p.t.u.r.e. .1.0...7. .S.e.t.u.p.....B.o.t.t.o.m.=.3.8.....H.W.N.D.=.1.3.2.1.6.6.....[.F.i.e.l.d. .3.].....T.y.p.e.=.l.a.b.e.l.....L.e.f.t.=.1.2.0.....R.i.g.h.t.=.3.1.5.....T.o.p.=.4.5.....B.o.t.t.o.m.=.8.5.....T.e.x.t.=.F.a.s.t.S.t.o.n.e. .C.a.p.t.u.r.e. .1.0...7. .h.a.s. .b.e.e.n. .i.n.s.t.a.l.l.e.d. .o.n. .y.o.u.r. .c.o.
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:PC bitmap, Windows 3.x format, 164 x 314 x 4, image size 26376, resolution 2834 x 2834 px/m, cbSize 26494, bits offset 118
                                            Category:dropped
                                            Size (bytes):26494
                                            Entropy (8bit):1.9568109962493656
                                            Encrypted:false
                                            SSDEEP:24:Qwika6aSaaDaVYoG6abuJsnZs5GhI11BayNXPcDrSsUWcSphsWwlEWqCl6aHAX2x:Qoi47a5G8SddzKFIcsOz3Xz
                                            MD5:CBE40FD2B1EC96DAEDC65DA172D90022
                                            SHA1:366C216220AA4329DFF6C485FD0E9B0F4F0A7944
                                            SHA-256:3AD2DC318056D0A2024AF1804EA741146CFC18CC404649A44610CBF8B2056CF2
                                            SHA-512:62990CB16E37B6B4EFF6AB03571C3A82DCAA21A1D393C3CB01D81F62287777FB0B4B27F8852B5FA71BC975FEAB5BAA486D33F2C58660210E115DE7E2BD34EA63
                                            Malicious:false
                                            Preview:BM~g......v...(.......:............g..................................................................................DDD@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDD@@@@@@..DDD....DDDDDD........................................DDDDDDDDDD....DDDDDDDDD........DD@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDD@@@@DDDDDDDDDD@@@@@@D..DD....DDDDDDD......................................DDDDDDDDDD....DDDDDDDDDD......D..D@@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDDD@@@@@DDD..D.....DDDDDD......................................DDDDDDDDD.....DDDDDDDDD......DDD..@@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDDD@@@@@@DDDD.......DDDDDD.....................................DDDDDDDDDD....DDDDDDDDDD.....DDDDD..@@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDD@@@@@@DDDDDD.......DDDDDD....................................DDDDDDDDD....DDDDDDDDDD......DDDDDD..@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
                                            Process:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):32544867
                                            Entropy (8bit):6.641357634400061
                                            Encrypted:false
                                            SSDEEP:393216:0NyDxBnY6BEwDaqOO2tAmSIbejC8MsaO8spyg372iQdbGEsKKhIkDUogGf:VZ5p2tAmlejX7xfKKNXf
                                            MD5:C27BCBE5BEC8D7934E99409F7C488115
                                            SHA1:E5161EBBAFE61B18CB73A9CFDB02E67F889A8D22
                                            SHA-256:59DD410C628ECCD245E06C78CAC3FBAF892D8C3B155C750BDBFF10584D19A259
                                            SHA-512:918475FF4355404EF00EDD5042C1B6992F0B89E2EBC612E7DFD12CA8141C5CD571443627A01ABB6D415E7B02FC4C5C1149736E2B1951E73B334599330F86E698
                                            Malicious:false
                                            Yara Hits:
                                            • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Local\Temp\nsk6323.tmp, Author: Joe Security
                                            Preview:L.......,...................h...T^.......t..............................................................F.......(...........$...................................................................................................................................................................................................C...............................................f.......D...I...M.......#.......................%...............g.......N...S...T.......#.......................................j.......U...Z...[.......#...............................................................................................................g...............#...................................................N.......v{..................................................................................................................................................................................................................................................................................................
                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                            Entropy (8bit):7.999592105471024
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:FSCaptureSetup107.exe
                                            File size:9'173'144 bytes
                                            MD5:28627a37983f5dc8e00d9c03c7b2dec6
                                            SHA1:dcfdb2464c29de44c6df1c1c0f5cf4a5342cfadb
                                            SHA256:762463fe496836bc1e6c6a58703f45182575b29494753df3145cd5c563e07f8c
                                            SHA512:78b25654eb1a3bc4a8912363dcf9d29c43228b0d8f55c8650c3c5995f950bcff25c3c7a38da07a589d1f95f08c8703b97bb7f4f7bcae697d9bcd2f98d1c7d79b
                                            SSDEEP:196608:L7yoYklb5pQI7m0XROHSUwwP9295bYiB+Y4NMQXIld:L7LD95pQIrEvJP9295bRB+Y4od
                                            TLSH:2D963348A4130C9CEE223135CD21560E6FA93B8177F6EE7737610F2DB411958BE94BEA
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................h...*.....
                                            Icon Hash:3d2e0f95332b3399
                                            Entrypoint:0x403640
                                            Entrypoint Section:.text
                                            Digitally signed:true
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x614F9B1F [Sat Sep 25 21:56:47 2021 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:61259b55b8912888e90f516ca08dc514
                                            Signature Valid:true
                                            Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                            Signature Validation Error:The operation completed successfully
                                            Error Number:0
                                            Not Before, Not After
                                            • 15/12/2023 01:00:00 13/02/2027 00:59:59
                                            Subject Chain
                                            • CN=FastStone Corporation, O=FastStone Corporation, L=Calgary, S=Alberta, C=CA, SERIALNUMBER=2023017896, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.2=Alberta, OID.1.3.6.1.4.1.311.60.2.1.3=CA
                                            Version:3
                                            Thumbprint MD5:AB94EFC876100EC3D079F9D89BD41FAC
                                            Thumbprint SHA-1:BA12BAAAC329C2CF0196B8BE73D529CFD13C621D
                                            Thumbprint SHA-256:90FDFFC9FAB65412F1BB5CBCD27B874F48E448DD088BC700EBF2E49C39505962
                                            Serial:0B617EE9ED189A94423BE7BB7564F0BF
                                            Instruction
                                            push ebp
                                            mov ebp, esp
                                            sub esp, 000003F4h
                                            push ebx
                                            push esi
                                            push edi
                                            push 00000020h
                                            pop edi
                                            xor ebx, ebx
                                            push 00008001h
                                            mov dword ptr [ebp-14h], ebx
                                            mov dword ptr [ebp-04h], 0040A230h
                                            mov dword ptr [ebp-10h], ebx
                                            call dword ptr [004080C8h]
                                            mov esi, dword ptr [004080CCh]
                                            lea eax, dword ptr [ebp-00000140h]
                                            push eax
                                            mov dword ptr [ebp-0000012Ch], ebx
                                            mov dword ptr [ebp-2Ch], ebx
                                            mov dword ptr [ebp-28h], ebx
                                            mov dword ptr [ebp-00000140h], 0000011Ch
                                            call esi
                                            test eax, eax
                                            jne 00007F069C4FD17Ah
                                            lea eax, dword ptr [ebp-00000140h]
                                            mov dword ptr [ebp-00000140h], 00000114h
                                            push eax
                                            call esi
                                            mov ax, word ptr [ebp-0000012Ch]
                                            mov ecx, dword ptr [ebp-00000112h]
                                            sub ax, 00000053h
                                            add ecx, FFFFFFD0h
                                            neg ax
                                            sbb eax, eax
                                            mov byte ptr [ebp-26h], 00000004h
                                            not eax
                                            and eax, ecx
                                            mov word ptr [ebp-2Ch], ax
                                            cmp dword ptr [ebp-0000013Ch], 0Ah
                                            jnc 00007F069C4FD14Ah
                                            and word ptr [ebp-00000132h], 0000h
                                            mov eax, dword ptr [ebp-00000134h]
                                            movzx ecx, byte ptr [ebp-00000138h]
                                            mov dword ptr [0042A318h], eax
                                            xor eax, eax
                                            mov ah, byte ptr [ebp-0000013Ch]
                                            movzx eax, ax
                                            or eax, ecx
                                            xor ecx, ecx
                                            mov ch, byte ptr [ebp-2Ch]
                                            movzx ecx, cx
                                            shl eax, 10h
                                            or eax, ecx
                                            Programming Language:
                                            • [EXP] VC++ 6.0 SP5 build 8804
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x3d0000x2e28.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x8bcf100x2988
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x66760x68006f5abe9eeda26ee84b3c1ed1a6c82001False0.6568134014423077data6.4174599871908855IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0x80000x139a0x14008c5edfd8ff9cc0135e197611be38ca18False0.4498046875data5.141066817170598IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0xa0000x203780x6004b2421975c21b032f7ea000f5e7f9fbfFalse0.509765625data4.110582127654237IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .ndata0x2b0000x120000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0x3d0000x2e280x30006cc7344ca24af0ae995c058bd4b01acfFalse0.2158203125data3.6865643644558053IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_ICON0x3d6280x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.42473118279569894
                                            RT_ICON0x3d9100x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.3952702702702703
                                            RT_DIALOG0x3da380xb4dataEnglishUnited States0.6111111111111112
                                            RT_DIALOG0x3daf00x120dataEnglishUnited States0.5138888888888888
                                            RT_DIALOG0x3dc100x202dataEnglishUnited States0.4085603112840467
                                            RT_DIALOG0x3de180xf8dataEnglishUnited States0.6290322580645161
                                            RT_DIALOG0x3df100xeedataEnglishUnited States0.6302521008403361
                                            RT_DIALOG0x3e0000xa0dataEnglishUnited States0.6
                                            RT_DIALOG0x3e0a00x10cdataEnglishUnited States0.5111940298507462
                                            RT_DIALOG0x3e1b00x1eedataEnglishUnited States0.3866396761133603
                                            RT_DIALOG0x3e3a00xe4dataEnglishUnited States0.6359649122807017
                                            RT_DIALOG0x3e4880xdadataEnglishUnited States0.6467889908256881
                                            RT_DIALOG0x3e5680xa4dataEnglishUnited States0.6158536585365854
                                            RT_DIALOG0x3e6100x110dataEnglishUnited States0.5183823529411765
                                            RT_DIALOG0x3e7200x1f2dataEnglishUnited States0.39759036144578314
                                            RT_DIALOG0x3e9180xe8dataEnglishUnited States0.6508620689655172
                                            RT_DIALOG0x3ea000xdedataEnglishUnited States0.6621621621621622
                                            RT_DIALOG0x3eae00xa0dataEnglishUnited States0.60625
                                            RT_DIALOG0x3eb800x10cdataEnglishUnited States0.5111940298507462
                                            RT_DIALOG0x3ec900x1eedataEnglishUnited States0.38866396761133604
                                            RT_DIALOG0x3ee800xe4dataEnglishUnited States0.6447368421052632
                                            RT_DIALOG0x3ef680xdadataEnglishUnited States0.6513761467889908
                                            RT_DIALOG0x3f0480xacdataEnglishUnited States0.6337209302325582
                                            RT_DIALOG0x3f0f80x118dataEnglishUnited States0.5321428571428571
                                            RT_DIALOG0x3f2100x1fadataEnglishUnited States0.40118577075098816
                                            RT_DIALOG0x3f4100xf0dataEnglishUnited States0.6666666666666666
                                            RT_DIALOG0x3f5000xe6dataEnglishUnited States0.6652173913043479
                                            RT_GROUP_ICON0x3f5e80x22dataEnglishUnited States0.9705882352941176
                                            RT_VERSION0x3f6100x324dataEnglishUnited States0.417910447761194
                                            RT_MANIFEST0x3f9380x4ecXML 1.0 document, ASCII text, with very long lines (1260), with no line terminatorsEnglishUnited States0.4857142857142857
                                            DLLImport
                                            ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                                            SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                                            ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                                            COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                                            USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                                            GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                                            KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                                            Language of compilation systemCountry where language is spokenMap
                                            EnglishUnited States
                                            No network behavior found

                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:05:00:22
                                            Start date:07/10/2024
                                            Path:C:\Users\user\Desktop\FSCaptureSetup107.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\FSCaptureSetup107.exe"
                                            Imagebase:0x400000
                                            File size:9'173'144 bytes
                                            MD5 hash:28627A37983F5DC8E00D9C03C7B2DEC6
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:low
                                            Has exited:true

                                            Target ID:4
                                            Start time:05:00:41
                                            Start date:07/10/2024
                                            Path:C:\Program Files (x86)\FastStone Capture\FSCapture.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Program Files (x86)\FastStone Capture\FSCapture.exe"
                                            Imagebase:0x710000
                                            File size:7'563'656 bytes
                                            MD5 hash:D5AC941C445B6EB907D0B96D84F15FE7
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:Borland Delphi
                                            Antivirus matches:
                                            • Detection: 0%, ReversingLabs
                                            Reputation:low
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:28.4%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:16.6%
                                              Total number of Nodes:1392
                                              Total number of Limit Nodes:48
                                              execution_graph 3233 403640 SetErrorMode GetVersionExW 3234 403692 GetVersionExW 3233->3234 3235 4036ca 3233->3235 3234->3235 3236 403723 3235->3236 3237 406a35 5 API calls 3235->3237 3323 4069c5 GetSystemDirectoryW 3236->3323 3237->3236 3239 403739 lstrlenA 3239->3236 3240 403749 3239->3240 3326 406a35 GetModuleHandleA 3240->3326 3243 406a35 5 API calls 3244 403757 3243->3244 3245 406a35 5 API calls 3244->3245 3246 403763 #17 OleInitialize SHGetFileInfoW 3245->3246 3332 406668 lstrcpynW 3246->3332 3249 4037b0 GetCommandLineW 3333 406668 lstrcpynW 3249->3333 3251 4037c2 3334 405f64 3251->3334 3254 4038f7 3255 40390b GetTempPathW 3254->3255 3338 40360f 3255->3338 3257 403923 3259 403927 GetWindowsDirectoryW lstrcatW 3257->3259 3260 40397d DeleteFileW 3257->3260 3258 405f64 CharNextW 3262 4037f9 3258->3262 3263 40360f 12 API calls 3259->3263 3348 4030d0 GetTickCount GetModuleFileNameW 3260->3348 3262->3254 3262->3258 3267 4038f9 3262->3267 3265 403943 3263->3265 3264 403990 3268 403b6c ExitProcess CoUninitialize 3264->3268 3270 403a45 3264->3270 3277 405f64 CharNextW 3264->3277 3265->3260 3266 403947 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3265->3266 3269 40360f 12 API calls 3266->3269 3434 406668 lstrcpynW 3267->3434 3272 403b91 3268->3272 3273 403b7c 3268->3273 3276 403975 3269->3276 3378 403d17 3270->3378 3274 403b99 GetCurrentProcess OpenProcessToken 3272->3274 3275 403c0f ExitProcess 3272->3275 3488 405cc8 3273->3488 3280 403bb0 LookupPrivilegeValueW AdjustTokenPrivileges 3274->3280 3281 403bdf 3274->3281 3276->3260 3276->3268 3292 4039b2 3277->3292 3280->3281 3285 406a35 5 API calls 3281->3285 3282 403a54 3282->3268 3288 403be6 3285->3288 3286 403a1b 3435 40603f 3286->3435 3287 403a5c 3451 405c33 3287->3451 3290 403bfb ExitWindowsEx 3288->3290 3294 403c08 3288->3294 3290->3275 3290->3294 3292->3286 3292->3287 3492 40140b 3294->3492 3297 403a72 lstrcatW 3298 403a7d lstrcatW lstrcmpiW 3297->3298 3298->3282 3299 403a9d 3298->3299 3301 403aa2 3299->3301 3302 403aa9 3299->3302 3454 405b99 CreateDirectoryW 3301->3454 3459 405c16 CreateDirectoryW 3302->3459 3303 403a3a 3450 406668 lstrcpynW 3303->3450 3308 403aae SetCurrentDirectoryW 3309 403ac0 3308->3309 3310 403acb 3308->3310 3462 406668 lstrcpynW 3309->3462 3463 406668 lstrcpynW 3310->3463 3315 403b19 CopyFileW 3319 403ad8 3315->3319 3316 403b63 3318 406428 36 API calls 3316->3318 3318->3282 3319->3316 3320 4066a5 17 API calls 3319->3320 3322 403b4d CloseHandle 3319->3322 3464 4066a5 3319->3464 3481 406428 MoveFileExW 3319->3481 3485 405c4b CreateProcessW 3319->3485 3320->3319 3322->3319 3324 4069e7 wsprintfW LoadLibraryExW 3323->3324 3324->3239 3327 406a51 3326->3327 3328 406a5b GetProcAddress 3326->3328 3329 4069c5 3 API calls 3327->3329 3330 403750 3328->3330 3331 406a57 3329->3331 3330->3243 3331->3328 3331->3330 3332->3249 3333->3251 3335 405f6a 3334->3335 3336 4037e8 CharNextW 3335->3336 3337 405f71 CharNextW 3335->3337 3336->3262 3337->3335 3495 4068ef 3338->3495 3340 403625 3340->3257 3341 40361b 3341->3340 3504 405f37 lstrlenW CharPrevW 3341->3504 3344 405c16 2 API calls 3345 403633 3344->3345 3507 406187 3345->3507 3511 406158 GetFileAttributesW CreateFileW 3348->3511 3350 403113 3377 403120 3350->3377 3512 406668 lstrcpynW 3350->3512 3352 403136 3513 405f83 lstrlenW 3352->3513 3356 403147 GetFileSize 3357 403241 3356->3357 3376 40315e 3356->3376 3518 40302e 3357->3518 3361 403286 GlobalAlloc 3364 40329d 3361->3364 3363 4032de 3365 40302e 32 API calls 3363->3365 3368 406187 2 API calls 3364->3368 3365->3377 3366 403267 3367 4035e2 ReadFile 3366->3367 3369 403272 3367->3369 3371 4032ae CreateFileW 3368->3371 3369->3361 3369->3377 3370 40302e 32 API calls 3370->3376 3372 4032e8 3371->3372 3371->3377 3533 4035f8 SetFilePointer 3372->3533 3374 4032f6 3534 403371 3374->3534 3376->3357 3376->3363 3376->3370 3376->3377 3549 4035e2 3376->3549 3377->3264 3379 406a35 5 API calls 3378->3379 3380 403d2b 3379->3380 3381 403d31 3380->3381 3382 403d43 3380->3382 3616 4065af wsprintfW 3381->3616 3383 406536 3 API calls 3382->3383 3384 403d73 3383->3384 3386 403d92 lstrcatW 3384->3386 3388 406536 3 API calls 3384->3388 3387 403d41 3386->3387 3596 403fed 3387->3596 3388->3386 3391 40603f 18 API calls 3392 403dc4 3391->3392 3393 403e58 3392->3393 3604 406536 3392->3604 3394 40603f 18 API calls 3393->3394 3396 403e5e 3394->3396 3397 403e6e LoadImageW 3396->3397 3398 4066a5 17 API calls 3396->3398 3399 403f14 3397->3399 3400 403e95 RegisterClassW 3397->3400 3398->3397 3404 40140b 2 API calls 3399->3404 3403 403ecb SystemParametersInfoW CreateWindowExW 3400->3403 3433 403f1e 3400->3433 3401 403e17 lstrlenW 3406 403e25 lstrcmpiW 3401->3406 3407 403e4b 3401->3407 3403->3399 3408 403f1a 3404->3408 3405 405f64 CharNextW 3409 403e14 3405->3409 3406->3407 3410 403e35 GetFileAttributesW 3406->3410 3411 405f37 3 API calls 3407->3411 3413 403fed 18 API calls 3408->3413 3408->3433 3409->3401 3412 403e41 3410->3412 3414 403e51 3411->3414 3412->3407 3415 405f83 2 API calls 3412->3415 3416 403f2b 3413->3416 3617 406668 lstrcpynW 3414->3617 3415->3407 3418 403f37 ShowWindow 3416->3418 3419 403fba 3416->3419 3420 4069c5 3 API calls 3418->3420 3609 40579d OleInitialize 3419->3609 3422 403f4f 3420->3422 3424 403f5d GetClassInfoW 3422->3424 3427 4069c5 3 API calls 3422->3427 3423 403fc0 3425 403fc4 3423->3425 3426 403fdc 3423->3426 3429 403f71 GetClassInfoW RegisterClassW 3424->3429 3430 403f87 DialogBoxParamW 3424->3430 3431 40140b 2 API calls 3425->3431 3425->3433 3428 40140b 2 API calls 3426->3428 3427->3424 3428->3433 3429->3430 3432 40140b 2 API calls 3430->3432 3431->3433 3432->3433 3433->3282 3434->3255 3633 406668 lstrcpynW 3435->3633 3437 406050 3634 405fe2 CharNextW CharNextW 3437->3634 3440 403a27 3440->3268 3449 406668 lstrcpynW 3440->3449 3441 4068ef 5 API calls 3447 406066 3441->3447 3442 406097 lstrlenW 3443 4060a2 3442->3443 3442->3447 3444 405f37 3 API calls 3443->3444 3446 4060a7 GetFileAttributesW 3444->3446 3446->3440 3447->3440 3447->3442 3448 405f83 2 API calls 3447->3448 3640 40699e FindFirstFileW 3447->3640 3448->3442 3449->3303 3450->3270 3452 406a35 5 API calls 3451->3452 3453 403a61 lstrcatW 3452->3453 3453->3297 3453->3298 3455 405bea GetLastError 3454->3455 3456 403aa7 3454->3456 3455->3456 3457 405bf9 SetFileSecurityW 3455->3457 3456->3308 3457->3456 3458 405c0f GetLastError 3457->3458 3458->3456 3460 405c2a GetLastError 3459->3460 3461 405c26 3459->3461 3460->3461 3461->3308 3462->3310 3463->3319 3475 4066b2 3464->3475 3465 4068d5 3466 403b0d DeleteFileW 3465->3466 3645 406668 lstrcpynW 3465->3645 3466->3315 3466->3319 3468 4068a3 lstrlenW 3468->3475 3470 406536 3 API calls 3470->3475 3471 4066a5 10 API calls 3471->3468 3472 4067ba GetSystemDirectoryW 3472->3475 3474 4067cd GetWindowsDirectoryW 3474->3475 3475->3465 3475->3468 3475->3470 3475->3471 3475->3472 3475->3474 3476 4066a5 10 API calls 3475->3476 3477 406844 lstrcatW 3475->3477 3478 4068ef 5 API calls 3475->3478 3479 4067fc SHGetSpecialFolderLocation 3475->3479 3643 4065af wsprintfW 3475->3643 3644 406668 lstrcpynW 3475->3644 3476->3475 3477->3475 3478->3475 3479->3475 3480 406814 SHGetPathFromIDListW CoTaskMemFree 3479->3480 3480->3475 3482 406449 3481->3482 3483 40643c 3481->3483 3482->3319 3646 4062ae 3483->3646 3486 405c8a 3485->3486 3487 405c7e CloseHandle 3485->3487 3486->3319 3487->3486 3491 405cdd 3488->3491 3489 403b89 ExitProcess 3490 405cf1 MessageBoxIndirectW 3490->3489 3491->3489 3491->3490 3493 401389 2 API calls 3492->3493 3494 401420 3493->3494 3494->3275 3501 4068fc 3495->3501 3496 406972 3497 406977 CharPrevW 3496->3497 3500 406998 3496->3500 3497->3496 3498 406965 CharNextW 3498->3496 3498->3501 3499 405f64 CharNextW 3499->3501 3500->3341 3501->3496 3501->3498 3501->3499 3502 406951 CharNextW 3501->3502 3503 406960 CharNextW 3501->3503 3502->3501 3503->3498 3505 405f53 lstrcatW 3504->3505 3506 40362d 3504->3506 3505->3506 3506->3344 3508 406194 GetTickCount GetTempFileNameW 3507->3508 3509 40363e 3508->3509 3510 4061ca 3508->3510 3509->3257 3510->3508 3510->3509 3511->3350 3512->3352 3514 405f91 3513->3514 3515 40313c 3514->3515 3516 405f97 CharPrevW 3514->3516 3517 406668 lstrcpynW 3515->3517 3516->3514 3516->3515 3517->3356 3519 403057 3518->3519 3520 40303f 3518->3520 3522 403067 GetTickCount 3519->3522 3523 40305f 3519->3523 3521 403048 DestroyWindow 3520->3521 3526 40304f 3520->3526 3521->3526 3525 403075 3522->3525 3522->3526 3553 406a71 3523->3553 3527 4030aa CreateDialogParamW ShowWindow 3525->3527 3528 40307d 3525->3528 3526->3361 3526->3377 3552 4035f8 SetFilePointer 3526->3552 3527->3526 3528->3526 3557 403012 3528->3557 3530 40308b wsprintfW 3560 4056ca 3530->3560 3533->3374 3535 403380 SetFilePointer 3534->3535 3536 40339c 3534->3536 3535->3536 3571 403479 GetTickCount 3536->3571 3541 403479 42 API calls 3542 4033d3 3541->3542 3543 40343f ReadFile 3542->3543 3547 4033e2 3542->3547 3548 403439 3542->3548 3543->3548 3545 4061db ReadFile 3545->3547 3547->3545 3547->3548 3586 40620a WriteFile 3547->3586 3548->3377 3550 4061db ReadFile 3549->3550 3551 4035f5 3550->3551 3551->3376 3552->3366 3554 406a8e PeekMessageW 3553->3554 3555 406a84 DispatchMessageW 3554->3555 3556 406a9e 3554->3556 3555->3554 3556->3526 3558 403021 3557->3558 3559 403023 MulDiv 3557->3559 3558->3559 3559->3530 3561 4056e5 3560->3561 3562 4030a8 3560->3562 3563 405701 lstrlenW 3561->3563 3564 4066a5 17 API calls 3561->3564 3562->3526 3565 40572a 3563->3565 3566 40570f lstrlenW 3563->3566 3564->3563 3567 405730 SetWindowTextW 3565->3567 3568 40573d 3565->3568 3566->3562 3569 405721 lstrcatW 3566->3569 3567->3568 3568->3562 3570 405743 SendMessageW SendMessageW SendMessageW 3568->3570 3569->3565 3570->3562 3572 4035d1 3571->3572 3573 4034a7 3571->3573 3574 40302e 32 API calls 3572->3574 3588 4035f8 SetFilePointer 3573->3588 3581 4033a3 3574->3581 3576 4034b2 SetFilePointer 3580 4034d7 3576->3580 3577 4035e2 ReadFile 3577->3580 3579 40302e 32 API calls 3579->3580 3580->3577 3580->3579 3580->3581 3582 40620a WriteFile 3580->3582 3583 4035b2 SetFilePointer 3580->3583 3589 406bb0 3580->3589 3581->3548 3584 4061db ReadFile 3581->3584 3582->3580 3583->3572 3585 4033bc 3584->3585 3585->3541 3585->3548 3587 406228 3586->3587 3587->3547 3588->3576 3590 406bd5 3589->3590 3591 406bdd 3589->3591 3590->3580 3591->3590 3592 406c64 GlobalFree 3591->3592 3593 406c6d GlobalAlloc 3591->3593 3594 406ce4 GlobalAlloc 3591->3594 3595 406cdb GlobalFree 3591->3595 3592->3593 3593->3590 3593->3591 3594->3590 3594->3591 3595->3594 3597 404001 3596->3597 3618 4065af wsprintfW 3597->3618 3599 404072 3619 4040a6 3599->3619 3601 403da2 3601->3391 3602 404077 3602->3601 3603 4066a5 17 API calls 3602->3603 3603->3602 3622 4064d5 3604->3622 3607 403df6 3607->3393 3607->3401 3607->3405 3608 40656a RegQueryValueExW RegCloseKey 3608->3607 3626 404610 3609->3626 3611 4057e7 3612 404610 SendMessageW 3611->3612 3614 4057f9 CoUninitialize 3612->3614 3613 4057c0 3613->3611 3629 401389 3613->3629 3614->3423 3616->3387 3617->3393 3618->3599 3620 4066a5 17 API calls 3619->3620 3621 4040b4 SetWindowTextW 3620->3621 3621->3602 3623 4064e4 3622->3623 3624 4064e8 3623->3624 3625 4064ed RegOpenKeyExW 3623->3625 3624->3607 3624->3608 3625->3624 3627 404628 3626->3627 3628 404619 SendMessageW 3626->3628 3627->3613 3628->3627 3631 401390 3629->3631 3630 4013fe 3630->3613 3631->3630 3632 4013cb MulDiv SendMessageW 3631->3632 3632->3631 3633->3437 3636 406011 3634->3636 3637 405fff 3634->3637 3635 406035 3635->3440 3635->3441 3636->3635 3639 405f64 CharNextW 3636->3639 3637->3636 3638 40600c CharNextW 3637->3638 3638->3635 3639->3636 3641 4069b4 FindClose 3640->3641 3642 4069bf 3640->3642 3641->3642 3642->3447 3643->3475 3644->3475 3645->3466 3647 406304 GetShortPathNameW 3646->3647 3648 4062de 3646->3648 3650 406423 3647->3650 3651 406319 3647->3651 3673 406158 GetFileAttributesW CreateFileW 3648->3673 3650->3482 3651->3650 3653 406321 wsprintfA 3651->3653 3652 4062e8 CloseHandle GetShortPathNameW 3652->3650 3654 4062fc 3652->3654 3655 4066a5 17 API calls 3653->3655 3654->3647 3654->3650 3656 406349 3655->3656 3674 406158 GetFileAttributesW CreateFileW 3656->3674 3658 406356 3658->3650 3659 406365 GetFileSize GlobalAlloc 3658->3659 3660 406387 3659->3660 3661 40641c CloseHandle 3659->3661 3662 4061db ReadFile 3660->3662 3661->3650 3663 40638f 3662->3663 3663->3661 3675 4060bd lstrlenA 3663->3675 3666 4063a6 lstrcpyA 3669 4063c8 3666->3669 3667 4063ba 3668 4060bd 4 API calls 3667->3668 3668->3669 3670 4063ff SetFilePointer 3669->3670 3671 40620a WriteFile 3670->3671 3672 406415 GlobalFree 3671->3672 3672->3661 3673->3652 3674->3658 3676 4060fe lstrlenA 3675->3676 3677 4060d7 lstrcmpiA 3676->3677 3679 406106 3676->3679 3678 4060f5 CharNextA 3677->3678 3677->3679 3678->3676 3679->3666 3679->3667 3680 4015c1 3699 402da6 3680->3699 3683 405fe2 4 API calls 3695 4015d1 3683->3695 3684 401631 3685 401663 3684->3685 3686 401636 3684->3686 3690 401423 24 API calls 3685->3690 3705 401423 3686->3705 3687 405f64 CharNextW 3687->3695 3696 40165b 3690->3696 3692 405c16 2 API calls 3692->3695 3693 405c33 5 API calls 3693->3695 3694 40164a SetCurrentDirectoryW 3694->3696 3695->3684 3695->3687 3695->3692 3695->3693 3697 401617 GetFileAttributesW 3695->3697 3698 405b99 4 API calls 3695->3698 3697->3695 3698->3695 3700 402db2 3699->3700 3701 4066a5 17 API calls 3700->3701 3702 402dd3 3701->3702 3703 4015c8 3702->3703 3704 4068ef 5 API calls 3702->3704 3703->3683 3704->3703 3706 4056ca 24 API calls 3705->3706 3707 401431 3706->3707 3708 406668 lstrcpynW 3707->3708 3708->3694 3709 401941 3710 401943 3709->3710 3711 402da6 17 API calls 3710->3711 3712 401948 3711->3712 3715 405d74 3712->3715 3716 40603f 18 API calls 3715->3716 3717 405d94 3716->3717 3718 405d9c DeleteFileW 3717->3718 3719 405db3 3717->3719 3723 401951 3718->3723 3720 405ed3 3719->3720 3751 406668 lstrcpynW 3719->3751 3720->3723 3727 40699e 2 API calls 3720->3727 3722 405dd9 3724 405dec 3722->3724 3725 405ddf lstrcatW 3722->3725 3726 405f83 2 API calls 3724->3726 3728 405df2 3725->3728 3726->3728 3730 405ef8 3727->3730 3729 405e02 lstrcatW 3728->3729 3731 405e0d lstrlenW FindFirstFileW 3728->3731 3729->3731 3730->3723 3732 405f37 3 API calls 3730->3732 3731->3720 3749 405e2f 3731->3749 3733 405f02 3732->3733 3735 405d2c 5 API calls 3733->3735 3734 405eb6 FindNextFileW 3738 405ecc FindClose 3734->3738 3734->3749 3737 405f0e 3735->3737 3739 405f12 3737->3739 3740 405f28 3737->3740 3738->3720 3739->3723 3743 4056ca 24 API calls 3739->3743 3742 4056ca 24 API calls 3740->3742 3742->3723 3745 405f1f 3743->3745 3744 405d74 60 API calls 3744->3749 3747 406428 36 API calls 3745->3747 3746 4056ca 24 API calls 3746->3734 3747->3723 3748 4056ca 24 API calls 3748->3749 3749->3734 3749->3744 3749->3746 3749->3748 3750 406428 36 API calls 3749->3750 3752 406668 lstrcpynW 3749->3752 3753 405d2c 3749->3753 3750->3749 3751->3722 3752->3749 3761 406133 GetFileAttributesW 3753->3761 3756 405d47 RemoveDirectoryW 3759 405d55 3756->3759 3757 405d4f DeleteFileW 3757->3759 3758 405d59 3758->3749 3759->3758 3760 405d65 SetFileAttributesW 3759->3760 3760->3758 3762 405d38 3761->3762 3763 406145 SetFileAttributesW 3761->3763 3762->3756 3762->3757 3762->3758 3763->3762 3764 401c43 3786 402d84 3764->3786 3766 401c4a 3767 402d84 17 API calls 3766->3767 3768 401c57 3767->3768 3769 402da6 17 API calls 3768->3769 3770 401c6c 3768->3770 3769->3770 3771 401c7c 3770->3771 3772 402da6 17 API calls 3770->3772 3773 401cd3 3771->3773 3774 401c87 3771->3774 3772->3771 3776 402da6 17 API calls 3773->3776 3775 402d84 17 API calls 3774->3775 3778 401c8c 3775->3778 3777 401cd8 3776->3777 3779 402da6 17 API calls 3777->3779 3780 402d84 17 API calls 3778->3780 3781 401ce1 FindWindowExW 3779->3781 3782 401c98 3780->3782 3785 401d03 3781->3785 3783 401cc3 SendMessageW 3782->3783 3784 401ca5 SendMessageTimeoutW 3782->3784 3783->3785 3784->3785 3787 4066a5 17 API calls 3786->3787 3788 402d99 3787->3788 3788->3766 4241 4028c4 4242 4028ca 4241->4242 4243 4028d2 FindClose 4242->4243 4244 402c2a 4242->4244 4243->4244 3847 4040c5 3848 4040dd 3847->3848 3849 40423e 3847->3849 3848->3849 3850 4040e9 3848->3850 3851 40424f GetDlgItem GetDlgItem 3849->3851 3856 40428f 3849->3856 3853 4040f4 SetWindowPos 3850->3853 3854 404107 3850->3854 3855 4045c4 18 API calls 3851->3855 3852 4042e9 3857 404610 SendMessageW 3852->3857 3865 404239 3852->3865 3853->3854 3858 404110 ShowWindow 3854->3858 3859 404152 3854->3859 3860 404279 SetClassLongW 3855->3860 3856->3852 3864 401389 2 API calls 3856->3864 3887 4042fb 3857->3887 3866 404130 GetWindowLongW 3858->3866 3867 4041fc 3858->3867 3861 404171 3859->3861 3862 40415a DestroyWindow 3859->3862 3863 40140b 2 API calls 3860->3863 3869 404176 SetWindowLongW 3861->3869 3870 404187 3861->3870 3868 40454d 3862->3868 3863->3856 3871 4042c1 3864->3871 3866->3867 3873 404149 ShowWindow 3866->3873 3872 40462b 8 API calls 3867->3872 3868->3865 3880 40457e ShowWindow 3868->3880 3869->3865 3870->3867 3874 404193 GetDlgItem 3870->3874 3871->3852 3875 4042c5 SendMessageW 3871->3875 3872->3865 3873->3859 3878 4041c1 3874->3878 3879 4041a4 SendMessageW IsWindowEnabled 3874->3879 3875->3865 3876 40140b 2 API calls 3876->3887 3877 40454f DestroyWindow KiUserCallbackDispatcher 3877->3868 3882 4041ce 3878->3882 3885 404215 SendMessageW 3878->3885 3886 4041e1 3878->3886 3892 4041c6 3878->3892 3879->3865 3879->3878 3880->3865 3881 4066a5 17 API calls 3881->3887 3882->3885 3882->3892 3884 4045c4 18 API calls 3884->3887 3885->3867 3888 4041e9 3886->3888 3889 4041fe 3886->3889 3887->3865 3887->3876 3887->3877 3887->3881 3887->3884 3893 4045c4 18 API calls 3887->3893 3909 40448f DestroyWindow 3887->3909 3891 40140b 2 API calls 3888->3891 3890 40140b 2 API calls 3889->3890 3890->3892 3891->3892 3892->3867 3921 40459d 3892->3921 3894 404376 GetDlgItem 3893->3894 3895 404393 ShowWindow KiUserCallbackDispatcher 3894->3895 3896 40438b 3894->3896 3918 4045e6 KiUserCallbackDispatcher 3895->3918 3896->3895 3898 4043bd KiUserCallbackDispatcher 3903 4043d1 3898->3903 3899 4043d6 GetSystemMenu EnableMenuItem SendMessageW 3900 404406 SendMessageW 3899->3900 3899->3903 3900->3903 3902 4040a6 18 API calls 3902->3903 3903->3899 3903->3902 3919 4045f9 SendMessageW 3903->3919 3920 406668 lstrcpynW 3903->3920 3905 404435 lstrlenW 3906 4066a5 17 API calls 3905->3906 3907 40444b SetWindowTextW 3906->3907 3908 401389 2 API calls 3907->3908 3908->3887 3909->3868 3910 4044a9 CreateDialogParamW 3909->3910 3910->3868 3911 4044dc 3910->3911 3912 4045c4 18 API calls 3911->3912 3913 4044e7 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3912->3913 3914 401389 2 API calls 3913->3914 3915 40452d 3914->3915 3915->3865 3916 404535 ShowWindow 3915->3916 3917 404610 SendMessageW 3916->3917 3917->3868 3918->3898 3919->3903 3920->3905 3922 4045a4 3921->3922 3923 4045aa SendMessageW 3921->3923 3922->3923 3923->3867 4248 4016cc 4249 402da6 17 API calls 4248->4249 4250 4016d2 GetFullPathNameW 4249->4250 4251 4016ec 4250->4251 4257 40170e 4250->4257 4253 40699e 2 API calls 4251->4253 4251->4257 4252 401723 GetShortPathNameW 4254 402c2a 4252->4254 4255 4016fe 4253->4255 4255->4257 4258 406668 lstrcpynW 4255->4258 4257->4252 4257->4254 4258->4257 4259 401e4e GetDC 4260 402d84 17 API calls 4259->4260 4261 401e60 GetDeviceCaps MulDiv ReleaseDC 4260->4261 4262 402d84 17 API calls 4261->4262 4263 401e91 4262->4263 4264 4066a5 17 API calls 4263->4264 4265 401ece CreateFontIndirectW 4264->4265 4266 402638 4265->4266 4266->4266 4267 402950 4268 402da6 17 API calls 4267->4268 4270 40295c 4268->4270 4269 402972 4272 406133 2 API calls 4269->4272 4270->4269 4271 402da6 17 API calls 4270->4271 4271->4269 4273 402978 4272->4273 4295 406158 GetFileAttributesW CreateFileW 4273->4295 4275 402985 4276 402a3b 4275->4276 4277 4029a0 GlobalAlloc 4275->4277 4278 402a23 4275->4278 4279 402a42 DeleteFileW 4276->4279 4280 402a55 4276->4280 4277->4278 4281 4029b9 4277->4281 4282 403371 44 API calls 4278->4282 4279->4280 4296 4035f8 SetFilePointer 4281->4296 4284 402a30 CloseHandle 4282->4284 4284->4276 4285 4029bf 4286 4035e2 ReadFile 4285->4286 4287 4029c8 GlobalAlloc 4286->4287 4288 4029d8 4287->4288 4289 402a0c 4287->4289 4290 403371 44 API calls 4288->4290 4291 40620a WriteFile 4289->4291 4294 4029e5 4290->4294 4292 402a18 GlobalFree 4291->4292 4292->4278 4293 402a03 GlobalFree 4293->4289 4294->4293 4295->4275 4296->4285 4304 403cd5 4305 403ce0 4304->4305 4306 403ce4 4305->4306 4307 403ce7 GlobalAlloc 4305->4307 4307->4306 4308 401956 4309 402da6 17 API calls 4308->4309 4310 40195d lstrlenW 4309->4310 4311 402638 4310->4311 4312 4014d7 4313 402d84 17 API calls 4312->4313 4314 4014dd Sleep 4313->4314 4316 402c2a 4314->4316 4171 4020d8 4172 4020ea 4171->4172 4182 40219c 4171->4182 4173 402da6 17 API calls 4172->4173 4174 4020f1 4173->4174 4176 402da6 17 API calls 4174->4176 4175 401423 24 API calls 4178 4022f6 4175->4178 4177 4020fa 4176->4177 4179 402110 LoadLibraryExW 4177->4179 4180 402102 GetModuleHandleW 4177->4180 4181 402121 4179->4181 4179->4182 4180->4179 4180->4181 4191 406aa4 4181->4191 4182->4175 4185 402132 4188 401423 24 API calls 4185->4188 4189 402142 4185->4189 4186 40216b 4187 4056ca 24 API calls 4186->4187 4187->4189 4188->4189 4189->4178 4190 40218e FreeLibrary 4189->4190 4190->4178 4196 40668a WideCharToMultiByte 4191->4196 4193 406ac1 4194 406ac8 GetProcAddress 4193->4194 4195 40212c 4193->4195 4194->4195 4195->4185 4195->4186 4196->4193 4317 402b59 4318 402b60 4317->4318 4319 402bab 4317->4319 4321 402ba9 4318->4321 4323 402d84 17 API calls 4318->4323 4320 406a35 5 API calls 4319->4320 4322 402bb2 4320->4322 4324 402da6 17 API calls 4322->4324 4325 402b6e 4323->4325 4326 402bbb 4324->4326 4327 402d84 17 API calls 4325->4327 4326->4321 4328 402bbf IIDFromString 4326->4328 4330 402b7a 4327->4330 4328->4321 4329 402bce 4328->4329 4329->4321 4335 406668 lstrcpynW 4329->4335 4334 4065af wsprintfW 4330->4334 4333 402beb CoTaskMemFree 4333->4321 4334->4321 4335->4333 4336 402a5b 4337 402d84 17 API calls 4336->4337 4338 402a61 4337->4338 4339 402aa4 4338->4339 4340 402a88 4338->4340 4345 40292e 4338->4345 4342 402abe 4339->4342 4343 402aae 4339->4343 4341 402a8d 4340->4341 4349 402a9e 4340->4349 4350 406668 lstrcpynW 4341->4350 4344 4066a5 17 API calls 4342->4344 4346 402d84 17 API calls 4343->4346 4344->4349 4346->4349 4349->4345 4351 4065af wsprintfW 4349->4351 4350->4345 4351->4345 4220 40175c 4221 402da6 17 API calls 4220->4221 4222 401763 4221->4222 4223 406187 2 API calls 4222->4223 4224 40176a 4223->4224 4225 406187 2 API calls 4224->4225 4225->4224 4352 401d5d 4353 402d84 17 API calls 4352->4353 4354 401d6e SetWindowLongW 4353->4354 4355 402c2a 4354->4355 4226 401ede 4227 402d84 17 API calls 4226->4227 4228 401ee4 4227->4228 4229 402d84 17 API calls 4228->4229 4230 401ef0 4229->4230 4231 401f07 EnableWindow 4230->4231 4232 401efc ShowWindow 4230->4232 4233 402c2a 4231->4233 4232->4233 4356 4028de 4357 4028e6 4356->4357 4358 4028ea FindNextFileW 4357->4358 4361 4028fc 4357->4361 4359 402943 4358->4359 4358->4361 4362 406668 lstrcpynW 4359->4362 4362->4361 4363 406d5f 4369 406be3 4363->4369 4364 40754e 4365 406c64 GlobalFree 4366 406c6d GlobalAlloc 4365->4366 4366->4364 4366->4369 4367 406ce4 GlobalAlloc 4367->4364 4367->4369 4368 406cdb GlobalFree 4368->4367 4369->4364 4369->4365 4369->4366 4369->4367 4369->4368 4370 401563 4371 402ba4 4370->4371 4374 4065af wsprintfW 4371->4374 4373 402ba9 4374->4373 4375 401968 4376 402d84 17 API calls 4375->4376 4377 40196f 4376->4377 4378 402d84 17 API calls 4377->4378 4379 40197c 4378->4379 4380 402da6 17 API calls 4379->4380 4381 401993 lstrlenW 4380->4381 4383 4019a4 4381->4383 4382 4019e5 4383->4382 4387 406668 lstrcpynW 4383->4387 4385 4019d5 4385->4382 4386 4019da lstrlenW 4385->4386 4386->4382 4387->4385 4395 40166a 4396 402da6 17 API calls 4395->4396 4397 401670 4396->4397 4398 40699e 2 API calls 4397->4398 4399 401676 4398->4399 4400 402aeb 4401 402d84 17 API calls 4400->4401 4402 402af1 4401->4402 4403 4066a5 17 API calls 4402->4403 4404 40292e 4402->4404 4403->4404 4405 4026ec 4406 402d84 17 API calls 4405->4406 4412 4026fb 4406->4412 4407 402745 ReadFile 4407->4412 4414 402838 4407->4414 4408 4061db ReadFile 4408->4412 4409 402785 MultiByteToWideChar 4409->4412 4410 40283a 4427 4065af wsprintfW 4410->4427 4412->4407 4412->4408 4412->4409 4412->4410 4412->4414 4415 4027ab SetFilePointer MultiByteToWideChar 4412->4415 4416 40284b 4412->4416 4418 406239 SetFilePointer 4412->4418 4415->4412 4416->4414 4417 40286c SetFilePointer 4416->4417 4417->4414 4419 406255 4418->4419 4422 40626d 4418->4422 4420 4061db ReadFile 4419->4420 4421 406261 4420->4421 4421->4422 4423 406276 SetFilePointer 4421->4423 4424 40629e SetFilePointer 4421->4424 4422->4412 4423->4424 4425 406281 4423->4425 4424->4422 4426 40620a WriteFile 4425->4426 4426->4422 4427->4414 4428 404a6e 4429 404aa4 4428->4429 4430 404a7e 4428->4430 4432 40462b 8 API calls 4429->4432 4431 4045c4 18 API calls 4430->4431 4433 404a8b SetDlgItemTextW 4431->4433 4434 404ab0 4432->4434 4433->4429 4030 40176f 4031 402da6 17 API calls 4030->4031 4032 401776 4031->4032 4033 401796 4032->4033 4034 40179e 4032->4034 4069 406668 lstrcpynW 4033->4069 4070 406668 lstrcpynW 4034->4070 4037 40179c 4041 4068ef 5 API calls 4037->4041 4038 4017a9 4039 405f37 3 API calls 4038->4039 4040 4017af lstrcatW 4039->4040 4040->4037 4061 4017bb 4041->4061 4042 40699e 2 API calls 4042->4061 4043 406133 2 API calls 4043->4061 4045 4017cd CompareFileTime 4045->4061 4046 40188d 4048 4056ca 24 API calls 4046->4048 4047 401864 4049 4056ca 24 API calls 4047->4049 4057 401879 4047->4057 4050 401897 4048->4050 4049->4057 4051 403371 44 API calls 4050->4051 4052 4018aa 4051->4052 4053 4018be SetFileTime 4052->4053 4054 4018d0 CloseHandle 4052->4054 4053->4054 4056 4018e1 4054->4056 4054->4057 4055 4066a5 17 API calls 4055->4061 4059 4018e6 4056->4059 4060 4018f9 4056->4060 4058 406668 lstrcpynW 4058->4061 4062 4066a5 17 API calls 4059->4062 4063 4066a5 17 API calls 4060->4063 4061->4042 4061->4043 4061->4045 4061->4046 4061->4047 4061->4055 4061->4058 4064 405cc8 MessageBoxIndirectW 4061->4064 4068 406158 GetFileAttributesW CreateFileW 4061->4068 4065 4018ee lstrcatW 4062->4065 4066 401901 4063->4066 4064->4061 4065->4066 4067 405cc8 MessageBoxIndirectW 4066->4067 4067->4057 4068->4061 4069->4037 4070->4038 4435 401a72 4436 402d84 17 API calls 4435->4436 4437 401a7b 4436->4437 4438 402d84 17 API calls 4437->4438 4439 401a20 4438->4439 4440 401573 4441 401583 ShowWindow 4440->4441 4442 40158c 4440->4442 4441->4442 4443 402c2a 4442->4443 4444 40159a ShowWindow 4442->4444 4444->4443 4081 4023f4 4082 402da6 17 API calls 4081->4082 4083 402403 4082->4083 4084 402da6 17 API calls 4083->4084 4085 40240c 4084->4085 4086 402da6 17 API calls 4085->4086 4087 402416 GetPrivateProfileStringW 4086->4087 4445 4014f5 SetForegroundWindow 4446 402c2a 4445->4446 4447 401ff6 4448 402da6 17 API calls 4447->4448 4449 401ffd 4448->4449 4450 40699e 2 API calls 4449->4450 4451 402003 4450->4451 4452 402014 4451->4452 4454 4065af wsprintfW 4451->4454 4454->4452 4455 401b77 4456 402da6 17 API calls 4455->4456 4457 401b7e 4456->4457 4458 402d84 17 API calls 4457->4458 4459 401b87 wsprintfW 4458->4459 4460 402c2a 4459->4460 4461 4046fa lstrcpynW lstrlenW 4462 40167b 4463 402da6 17 API calls 4462->4463 4464 401682 4463->4464 4465 402da6 17 API calls 4464->4465 4466 40168b 4465->4466 4467 402da6 17 API calls 4466->4467 4468 401694 MoveFileW 4467->4468 4469 4016a0 4468->4469 4470 4016a7 4468->4470 4472 401423 24 API calls 4469->4472 4471 40699e 2 API calls 4470->4471 4474 4022f6 4470->4474 4473 4016b6 4471->4473 4472->4474 4473->4474 4475 406428 36 API calls 4473->4475 4475->4469 4483 4019ff 4484 402da6 17 API calls 4483->4484 4485 401a06 4484->4485 4486 402da6 17 API calls 4485->4486 4487 401a0f 4486->4487 4488 401a16 lstrcmpiW 4487->4488 4489 401a28 lstrcmpW 4487->4489 4490 401a1c 4488->4490 4489->4490 4491 4022ff 4492 402da6 17 API calls 4491->4492 4493 402305 4492->4493 4494 402da6 17 API calls 4493->4494 4495 40230e 4494->4495 4496 402da6 17 API calls 4495->4496 4497 402317 4496->4497 4498 40699e 2 API calls 4497->4498 4499 402320 4498->4499 4500 402331 lstrlenW lstrlenW 4499->4500 4504 402324 4499->4504 4502 4056ca 24 API calls 4500->4502 4501 4056ca 24 API calls 4505 40232c 4501->4505 4503 40236f SHFileOperationW 4502->4503 4503->4504 4503->4505 4504->4501 4504->4505 4506 401000 4507 401037 BeginPaint GetClientRect 4506->4507 4508 40100c DefWindowProcW 4506->4508 4510 4010f3 4507->4510 4511 401179 4508->4511 4512 401073 CreateBrushIndirect FillRect DeleteObject 4510->4512 4513 4010fc 4510->4513 4512->4510 4514 401102 CreateFontIndirectW 4513->4514 4515 401167 EndPaint 4513->4515 4514->4515 4516 401112 6 API calls 4514->4516 4515->4511 4516->4515 4517 401d81 4518 401d94 GetDlgItem 4517->4518 4519 401d87 4517->4519 4521 401d8e 4518->4521 4520 402d84 17 API calls 4519->4520 4520->4521 4522 401dd5 GetClientRect LoadImageW SendMessageW 4521->4522 4523 402da6 17 API calls 4521->4523 4525 401e33 4522->4525 4527 401e3f 4522->4527 4523->4522 4526 401e38 DeleteObject 4525->4526 4525->4527 4526->4527 3789 404783 3790 40479b 3789->3790 3794 4048b5 3789->3794 3820 4045c4 3790->3820 3791 40491f 3792 4049e9 3791->3792 3793 404929 GetDlgItem 3791->3793 3832 40462b 3792->3832 3796 4049aa 3793->3796 3797 404943 3793->3797 3794->3791 3794->3792 3798 4048f0 GetDlgItem SendMessageW 3794->3798 3796->3792 3803 4049bc 3796->3803 3797->3796 3802 404969 SendMessageW LoadCursorW SetCursor 3797->3802 3825 4045e6 KiUserCallbackDispatcher 3798->3825 3799 404802 3805 4045c4 18 API calls 3799->3805 3801 4049e4 3829 404a32 3802->3829 3807 4049d2 3803->3807 3808 4049c2 SendMessageW 3803->3808 3810 40480f CheckDlgButton 3805->3810 3807->3801 3812 4049d8 SendMessageW 3807->3812 3808->3807 3809 40491a 3826 404a0e 3809->3826 3823 4045e6 KiUserCallbackDispatcher 3810->3823 3812->3801 3815 40482d GetDlgItem 3824 4045f9 SendMessageW 3815->3824 3817 404843 SendMessageW 3818 404860 GetSysColor 3817->3818 3819 404869 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 3817->3819 3818->3819 3819->3801 3821 4066a5 17 API calls 3820->3821 3822 4045cf SetDlgItemTextW 3821->3822 3822->3799 3823->3815 3824->3817 3825->3809 3827 404a21 SendMessageW 3826->3827 3828 404a1c 3826->3828 3827->3791 3828->3827 3846 405c8e ShellExecuteExW 3829->3846 3831 404998 LoadCursorW SetCursor 3831->3796 3833 4046ee 3832->3833 3834 404643 GetWindowLongW 3832->3834 3833->3801 3834->3833 3835 404658 3834->3835 3835->3833 3836 404685 GetSysColor 3835->3836 3837 404688 3835->3837 3836->3837 3838 404698 SetBkMode 3837->3838 3839 40468e SetTextColor 3837->3839 3840 4046b0 GetSysColor 3838->3840 3841 4046b6 3838->3841 3839->3838 3840->3841 3842 4046c7 3841->3842 3843 4046bd SetBkColor 3841->3843 3842->3833 3844 4046e1 CreateBrushIndirect 3842->3844 3845 4046da DeleteObject 3842->3845 3843->3842 3844->3833 3845->3844 3846->3831 4528 401503 4529 40150b 4528->4529 4531 40151e 4528->4531 4530 402d84 17 API calls 4529->4530 4530->4531 4532 402383 4533 40238a 4532->4533 4535 40239d 4532->4535 4534 4066a5 17 API calls 4533->4534 4536 402397 4534->4536 4537 405cc8 MessageBoxIndirectW 4536->4537 4537->4535 3924 402c05 SendMessageW 3925 402c2a 3924->3925 3926 402c1f InvalidateRect 3924->3926 3926->3925 3940 405809 3941 4059b3 3940->3941 3942 40582a GetDlgItem GetDlgItem GetDlgItem 3940->3942 3944 4059e4 3941->3944 3945 4059bc GetDlgItem CreateThread CloseHandle 3941->3945 3985 4045f9 SendMessageW 3942->3985 3947 405a0f 3944->3947 3948 405a34 3944->3948 3949 4059fb ShowWindow ShowWindow 3944->3949 3945->3944 3988 40579d 5 API calls 3945->3988 3946 40589a 3951 4058a1 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3946->3951 3950 405a6f 3947->3950 3953 405a23 3947->3953 3954 405a49 ShowWindow 3947->3954 3955 40462b 8 API calls 3948->3955 3987 4045f9 SendMessageW 3949->3987 3950->3948 3960 405a7d SendMessageW 3950->3960 3958 4058f3 SendMessageW SendMessageW 3951->3958 3959 40590f 3951->3959 3961 40459d SendMessageW 3953->3961 3956 405a69 3954->3956 3957 405a5b 3954->3957 3966 405a42 3955->3966 3963 40459d SendMessageW 3956->3963 3962 4056ca 24 API calls 3957->3962 3958->3959 3964 405922 3959->3964 3965 405914 SendMessageW 3959->3965 3960->3966 3967 405a96 CreatePopupMenu 3960->3967 3961->3948 3962->3956 3963->3950 3969 4045c4 18 API calls 3964->3969 3965->3964 3968 4066a5 17 API calls 3967->3968 3970 405aa6 AppendMenuW 3968->3970 3971 405932 3969->3971 3972 405ac3 GetWindowRect 3970->3972 3973 405ad6 TrackPopupMenu 3970->3973 3974 40593b ShowWindow 3971->3974 3975 40596f GetDlgItem SendMessageW 3971->3975 3972->3973 3973->3966 3977 405af1 3973->3977 3978 405951 ShowWindow 3974->3978 3979 40595e 3974->3979 3975->3966 3976 405996 SendMessageW SendMessageW 3975->3976 3976->3966 3980 405b0d SendMessageW 3977->3980 3978->3979 3986 4045f9 SendMessageW 3979->3986 3980->3980 3981 405b2a OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3980->3981 3983 405b4f SendMessageW 3981->3983 3983->3983 3984 405b78 GlobalUnlock SetClipboardData CloseClipboard 3983->3984 3984->3966 3985->3946 3986->3975 3987->3947 3989 40248a 3990 402da6 17 API calls 3989->3990 3991 40249c 3990->3991 3992 402da6 17 API calls 3991->3992 3993 4024a6 3992->3993 4006 402e36 3993->4006 3996 40292e 3997 4024de 3998 4024ea 3997->3998 4001 402d84 17 API calls 3997->4001 4002 402509 RegSetValueExW 3998->4002 4003 403371 44 API calls 3998->4003 3999 402da6 17 API calls 4000 4024d4 lstrlenW 3999->4000 4000->3997 4001->3998 4004 40251f RegCloseKey 4002->4004 4003->4002 4004->3996 4007 402e51 4006->4007 4010 406503 4007->4010 4011 406512 4010->4011 4012 4024b6 4011->4012 4013 40651d RegCreateKeyExW 4011->4013 4012->3996 4012->3997 4012->3999 4013->4012 4538 404e0b 4539 404e37 4538->4539 4540 404e1b 4538->4540 4542 404e6a 4539->4542 4543 404e3d SHGetPathFromIDListW 4539->4543 4549 405cac GetDlgItemTextW 4540->4549 4544 404e54 SendMessageW 4543->4544 4545 404e4d 4543->4545 4544->4542 4547 40140b 2 API calls 4545->4547 4546 404e28 SendMessageW 4546->4539 4547->4544 4549->4546 4550 40290b 4551 402da6 17 API calls 4550->4551 4552 402912 FindFirstFileW 4551->4552 4553 40293a 4552->4553 4557 402925 4552->4557 4558 4065af wsprintfW 4553->4558 4555 402943 4559 406668 lstrcpynW 4555->4559 4558->4555 4559->4557 4560 40190c 4561 401943 4560->4561 4562 402da6 17 API calls 4561->4562 4563 401948 4562->4563 4564 405d74 67 API calls 4563->4564 4565 401951 4564->4565 4566 40190f 4567 402da6 17 API calls 4566->4567 4568 401916 4567->4568 4569 405cc8 MessageBoxIndirectW 4568->4569 4570 40191f 4569->4570 4571 401491 4572 4056ca 24 API calls 4571->4572 4573 401498 4572->4573 4574 402891 4575 402898 4574->4575 4581 402ba9 4574->4581 4576 402d84 17 API calls 4575->4576 4577 40289f 4576->4577 4578 4028ae SetFilePointer 4577->4578 4579 4028be 4578->4579 4578->4581 4582 4065af wsprintfW 4579->4582 4582->4581 4583 401f12 4584 402da6 17 API calls 4583->4584 4585 401f18 4584->4585 4586 402da6 17 API calls 4585->4586 4587 401f21 4586->4587 4588 402da6 17 API calls 4587->4588 4589 401f2a 4588->4589 4590 402da6 17 API calls 4589->4590 4591 401f33 4590->4591 4592 401423 24 API calls 4591->4592 4593 401f3a 4592->4593 4600 405c8e ShellExecuteExW 4593->4600 4595 401f82 4598 40292e 4595->4598 4601 406ae0 WaitForSingleObject 4595->4601 4597 401f9f CloseHandle 4597->4598 4600->4595 4602 406afa 4601->4602 4603 406b0c GetExitCodeProcess 4602->4603 4604 406a71 2 API calls 4602->4604 4603->4597 4605 406b01 WaitForSingleObject 4604->4605 4605->4602 4606 402f93 4607 402fa5 SetTimer 4606->4607 4608 402fbe 4606->4608 4607->4608 4609 40300c 4608->4609 4610 403012 MulDiv 4608->4610 4611 402fcc wsprintfW SetWindowTextW SetDlgItemTextW 4610->4611 4611->4609 4627 401d17 4628 402d84 17 API calls 4627->4628 4629 401d1d IsWindow 4628->4629 4630 401a20 4629->4630 4197 401b9b 4198 401bec 4197->4198 4201 401ba8 4197->4201 4199 401bf1 4198->4199 4200 401c16 GlobalAlloc 4198->4200 4210 40239d 4199->4210 4218 406668 lstrcpynW 4199->4218 4203 4066a5 17 API calls 4200->4203 4202 401c31 4201->4202 4207 401bbf 4201->4207 4204 4066a5 17 API calls 4202->4204 4202->4210 4203->4202 4206 402397 4204->4206 4211 405cc8 MessageBoxIndirectW 4206->4211 4216 406668 lstrcpynW 4207->4216 4208 401c03 GlobalFree 4208->4210 4211->4210 4212 401bce 4217 406668 lstrcpynW 4212->4217 4214 401bdd 4219 406668 lstrcpynW 4214->4219 4216->4212 4217->4214 4218->4208 4219->4210 4631 40261c 4632 402da6 17 API calls 4631->4632 4633 402623 4632->4633 4636 406158 GetFileAttributesW CreateFileW 4633->4636 4635 40262f 4636->4635 4644 40149e 4645 4014ac PostQuitMessage 4644->4645 4646 40239d 4644->4646 4645->4646 4647 40259e 4657 402de6 4647->4657 4650 402d84 17 API calls 4651 4025b1 4650->4651 4652 4025d9 RegEnumValueW 4651->4652 4653 4025cd RegEnumKeyW 4651->4653 4654 40292e 4651->4654 4655 4025ee RegCloseKey 4652->4655 4653->4655 4655->4654 4658 402da6 17 API calls 4657->4658 4659 402dfd 4658->4659 4660 4064d5 RegOpenKeyExW 4659->4660 4661 4025a8 4660->4661 4661->4650 4662 4015a3 4663 402da6 17 API calls 4662->4663 4664 4015aa SetFileAttributesW 4663->4664 4665 4015bc 4664->4665 4666 401fa4 4667 402da6 17 API calls 4666->4667 4668 401faa 4667->4668 4669 4056ca 24 API calls 4668->4669 4670 401fb4 4669->4670 4671 405c4b 2 API calls 4670->4671 4672 401fba 4671->4672 4673 401fdd CloseHandle 4672->4673 4675 40292e 4672->4675 4676 406ae0 5 API calls 4672->4676 4673->4675 4677 401fcf 4676->4677 4677->4673 4679 4065af wsprintfW 4677->4679 4679->4673 3927 403c25 3928 403c40 3927->3928 3929 403c36 CloseHandle 3927->3929 3930 403c54 3928->3930 3931 403c4a CloseHandle 3928->3931 3929->3928 3936 403c82 3930->3936 3931->3930 3934 405d74 67 API calls 3935 403c65 3934->3935 3937 403c90 3936->3937 3938 403c59 3937->3938 3939 403c95 FreeLibrary GlobalFree 3937->3939 3938->3934 3939->3938 3939->3939 4014 4021aa 4015 402da6 17 API calls 4014->4015 4016 4021b1 4015->4016 4017 402da6 17 API calls 4016->4017 4018 4021bb 4017->4018 4019 402da6 17 API calls 4018->4019 4020 4021c5 4019->4020 4021 402da6 17 API calls 4020->4021 4022 4021cf 4021->4022 4023 402da6 17 API calls 4022->4023 4024 4021d9 4023->4024 4025 402218 CoCreateInstance 4024->4025 4026 402da6 17 API calls 4024->4026 4029 402237 4025->4029 4026->4025 4027 401423 24 API calls 4028 4022f6 4027->4028 4029->4027 4029->4028 4680 40202a 4681 402da6 17 API calls 4680->4681 4682 402031 4681->4682 4683 406a35 5 API calls 4682->4683 4684 402040 4683->4684 4685 40205c GlobalAlloc 4684->4685 4686 4020cc 4684->4686 4685->4686 4687 402070 4685->4687 4688 406a35 5 API calls 4687->4688 4689 402077 4688->4689 4690 406a35 5 API calls 4689->4690 4691 402081 4690->4691 4691->4686 4695 4065af wsprintfW 4691->4695 4693 4020ba 4696 4065af wsprintfW 4693->4696 4695->4693 4696->4686 4697 40252a 4698 402de6 17 API calls 4697->4698 4699 402534 4698->4699 4700 402da6 17 API calls 4699->4700 4701 40253d 4700->4701 4702 402548 RegQueryValueExW 4701->4702 4705 40292e 4701->4705 4703 40256e RegCloseKey 4702->4703 4704 402568 4702->4704 4703->4705 4704->4703 4708 4065af wsprintfW 4704->4708 4708->4703 4716 401a30 4717 402da6 17 API calls 4716->4717 4718 401a39 ExpandEnvironmentStringsW 4717->4718 4719 401a60 4718->4719 4720 401a4d 4718->4720 4720->4719 4721 401a52 lstrcmpW 4720->4721 4721->4719 4722 405031 GetDlgItem GetDlgItem 4723 405083 7 API calls 4722->4723 4724 4052a8 4722->4724 4725 40512a DeleteObject 4723->4725 4726 40511d SendMessageW 4723->4726 4729 40538a 4724->4729 4756 405317 4724->4756 4776 404f7f SendMessageW 4724->4776 4727 405133 4725->4727 4726->4725 4728 40516a 4727->4728 4732 4066a5 17 API calls 4727->4732 4730 4045c4 18 API calls 4728->4730 4731 405436 4729->4731 4735 40529b 4729->4735 4741 4053e3 SendMessageW 4729->4741 4734 40517e 4730->4734 4736 405440 SendMessageW 4731->4736 4737 405448 4731->4737 4733 40514c SendMessageW SendMessageW 4732->4733 4733->4727 4740 4045c4 18 API calls 4734->4740 4738 40462b 8 API calls 4735->4738 4736->4737 4744 405461 4737->4744 4745 40545a ImageList_Destroy 4737->4745 4752 405471 4737->4752 4743 405637 4738->4743 4757 40518f 4740->4757 4741->4735 4747 4053f8 SendMessageW 4741->4747 4742 40537c SendMessageW 4742->4729 4748 40546a GlobalFree 4744->4748 4744->4752 4745->4744 4746 4055eb 4746->4735 4753 4055fd ShowWindow GetDlgItem ShowWindow 4746->4753 4750 40540b 4747->4750 4748->4752 4749 40526a GetWindowLongW SetWindowLongW 4751 405283 4749->4751 4761 40541c SendMessageW 4750->4761 4754 4052a0 4751->4754 4755 405288 ShowWindow 4751->4755 4752->4746 4769 4054ac 4752->4769 4781 404fff 4752->4781 4753->4735 4775 4045f9 SendMessageW 4754->4775 4774 4045f9 SendMessageW 4755->4774 4756->4729 4756->4742 4757->4749 4760 4051e2 SendMessageW 4757->4760 4762 405265 4757->4762 4763 405220 SendMessageW 4757->4763 4764 405234 SendMessageW 4757->4764 4760->4757 4761->4731 4762->4749 4762->4751 4763->4757 4764->4757 4766 4055b6 4767 4055c1 InvalidateRect 4766->4767 4770 4055cd 4766->4770 4767->4770 4768 4054da SendMessageW 4772 4054f0 4768->4772 4769->4768 4769->4772 4770->4746 4773 404f3a 20 API calls 4770->4773 4771 405564 SendMessageW SendMessageW 4771->4772 4772->4766 4772->4771 4773->4746 4774->4735 4775->4724 4777 404fa2 GetMessagePos ScreenToClient SendMessageW 4776->4777 4778 404fde SendMessageW 4776->4778 4779 404fd6 4777->4779 4780 404fdb 4777->4780 4778->4779 4779->4756 4780->4778 4790 406668 lstrcpynW 4781->4790 4783 405012 4791 4065af wsprintfW 4783->4791 4785 40501c 4786 40140b 2 API calls 4785->4786 4787 405025 4786->4787 4792 406668 lstrcpynW 4787->4792 4789 40502c 4789->4769 4790->4783 4791->4785 4792->4789 4071 4023b2 4072 4023c0 4071->4072 4073 4023ba 4071->4073 4074 4023ce 4072->4074 4076 402da6 17 API calls 4072->4076 4075 402da6 17 API calls 4073->4075 4077 402da6 17 API calls 4074->4077 4079 4023dc 4074->4079 4075->4072 4076->4074 4077->4079 4078 402da6 17 API calls 4080 4023e5 WritePrivateProfileStringW 4078->4080 4079->4078 4798 404734 lstrlenW 4799 404753 4798->4799 4800 404755 WideCharToMultiByte 4798->4800 4799->4800 4801 402434 4802 402467 4801->4802 4803 40243c 4801->4803 4805 402da6 17 API calls 4802->4805 4804 402de6 17 API calls 4803->4804 4806 402443 4804->4806 4807 40246e 4805->4807 4809 402da6 17 API calls 4806->4809 4811 40247b 4806->4811 4812 402e64 4807->4812 4810 402454 RegDeleteValueW RegCloseKey 4809->4810 4810->4811 4813 402e78 4812->4813 4815 402e71 4812->4815 4813->4815 4816 402ea9 4813->4816 4815->4811 4817 4064d5 RegOpenKeyExW 4816->4817 4818 402ed7 4817->4818 4819 402ee7 RegEnumValueW 4818->4819 4823 402f0a 4818->4823 4827 402f81 4818->4827 4820 402f71 RegCloseKey 4819->4820 4819->4823 4820->4827 4821 402f46 RegEnumKeyW 4822 402f4f RegCloseKey 4821->4822 4821->4823 4824 406a35 5 API calls 4822->4824 4823->4820 4823->4821 4823->4822 4825 402ea9 6 API calls 4823->4825 4826 402f5f 4824->4826 4825->4823 4826->4827 4828 402f63 RegDeleteKeyW 4826->4828 4827->4815 4828->4827 4088 404ab5 4089 404ae1 4088->4089 4090 404af2 4088->4090 4168 405cac GetDlgItemTextW 4089->4168 4091 404afe GetDlgItem 4090->4091 4098 404b6a 4090->4098 4094 404b12 4091->4094 4093 404aec 4096 4068ef 5 API calls 4093->4096 4097 404b26 SetWindowTextW 4094->4097 4101 405fe2 4 API calls 4094->4101 4095 404c41 4151 404df0 4095->4151 4155 405cac GetDlgItemTextW 4095->4155 4096->4090 4104 4045c4 18 API calls 4097->4104 4098->4095 4102 4066a5 17 API calls 4098->4102 4098->4151 4100 40462b 8 API calls 4105 404e04 4100->4105 4106 404b1c 4101->4106 4107 404bd1 SHBrowseForFolderW 4102->4107 4103 404c71 4108 40603f 18 API calls 4103->4108 4109 404b42 4104->4109 4106->4097 4113 405f37 3 API calls 4106->4113 4107->4095 4110 404be9 CoTaskMemFree 4107->4110 4111 404c77 4108->4111 4112 4045c4 18 API calls 4109->4112 4114 405f37 3 API calls 4110->4114 4156 406668 lstrcpynW 4111->4156 4115 404b50 4112->4115 4113->4097 4118 404bf6 4114->4118 4154 4045f9 SendMessageW 4115->4154 4119 404c2d SetDlgItemTextW 4118->4119 4124 4066a5 17 API calls 4118->4124 4119->4095 4120 404c8e 4122 406a35 5 API calls 4120->4122 4121 404b56 4123 406a35 5 API calls 4121->4123 4132 404c95 4122->4132 4125 404b5d 4123->4125 4126 404c15 lstrcmpiW 4124->4126 4128 404b65 SHAutoComplete 4125->4128 4125->4151 4126->4119 4129 404c26 lstrcatW 4126->4129 4127 404cd6 4169 406668 lstrcpynW 4127->4169 4128->4098 4129->4119 4130 404ca4 GetDiskFreeSpaceExW 4130->4132 4140 404d2e 4130->4140 4132->4127 4132->4130 4135 405f83 2 API calls 4132->4135 4133 404cdd 4134 405fe2 4 API calls 4133->4134 4136 404ce3 4134->4136 4135->4132 4137 404ce9 4136->4137 4138 404cec GetDiskFreeSpaceW 4136->4138 4137->4138 4139 404d07 MulDiv 4138->4139 4138->4140 4139->4140 4150 404d9f 4140->4150 4157 404f3a 4140->4157 4142 40140b 2 API calls 4143 404dc2 4142->4143 4170 4045e6 KiUserCallbackDispatcher 4143->4170 4145 404da1 SetDlgItemTextW 4145->4150 4146 404d91 4160 404e71 4146->4160 4149 404dde 4149->4151 4152 404deb 4149->4152 4150->4142 4150->4143 4151->4100 4153 404a0e SendMessageW 4152->4153 4153->4151 4154->4121 4155->4103 4156->4120 4158 404e71 20 API calls 4157->4158 4159 404d8c 4158->4159 4159->4145 4159->4146 4161 404e8a 4160->4161 4162 4066a5 17 API calls 4161->4162 4163 404eee 4162->4163 4164 4066a5 17 API calls 4163->4164 4165 404ef9 4164->4165 4166 4066a5 17 API calls 4165->4166 4167 404f0f lstrlenW wsprintfW SetDlgItemTextW 4166->4167 4167->4150 4168->4093 4169->4133 4170->4149 4829 401735 4830 402da6 17 API calls 4829->4830 4831 40173c SearchPathW 4830->4831 4832 401757 4831->4832 4833 401d38 4834 402d84 17 API calls 4833->4834 4835 401d3f 4834->4835 4836 402d84 17 API calls 4835->4836 4837 401d4b GetDlgItem 4836->4837 4838 402638 4837->4838 4839 4014b8 4840 4014be 4839->4840 4841 401389 2 API calls 4840->4841 4842 4014c6 4841->4842 4843 40563e 4844 405662 4843->4844 4845 40564e 4843->4845 4848 40566a IsWindowVisible 4844->4848 4854 405681 4844->4854 4846 405654 4845->4846 4847 4056ab 4845->4847 4850 404610 SendMessageW 4846->4850 4849 4056b0 CallWindowProcW 4847->4849 4848->4847 4851 405677 4848->4851 4852 40565e 4849->4852 4850->4852 4853 404f7f 5 API calls 4851->4853 4853->4854 4854->4849 4855 404fff 4 API calls 4854->4855 4855->4847 4856 40263e 4857 402652 4856->4857 4858 40266d 4856->4858 4859 402d84 17 API calls 4857->4859 4860 402672 4858->4860 4861 40269d 4858->4861 4870 402659 4859->4870 4863 402da6 17 API calls 4860->4863 4862 402da6 17 API calls 4861->4862 4865 4026a4 lstrlenW 4862->4865 4864 402679 4863->4864 4873 40668a WideCharToMultiByte 4864->4873 4865->4870 4867 40268d lstrlenA 4867->4870 4868 4026e7 4869 4026d1 4869->4868 4871 40620a WriteFile 4869->4871 4870->4868 4870->4869 4872 406239 5 API calls 4870->4872 4871->4868 4872->4869 4873->4867

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 403640-403690 SetErrorMode GetVersionExW 1 403692-4036c6 GetVersionExW 0->1 2 4036ca-4036d1 0->2 1->2 3 4036d3 2->3 4 4036db-40371b 2->4 3->4 5 40371d-403725 call 406a35 4->5 6 40372e 4->6 5->6 11 403727 5->11 8 403733-403747 call 4069c5 lstrlenA 6->8 13 403749-403765 call 406a35 * 3 8->13 11->6 20 403776-4037d8 #17 OleInitialize SHGetFileInfoW call 406668 GetCommandLineW call 406668 13->20 21 403767-40376d 13->21 28 4037e1-4037f4 call 405f64 CharNextW 20->28 29 4037da-4037dc 20->29 21->20 25 40376f 21->25 25->20 32 4038eb-4038f1 28->32 29->28 33 4038f7 32->33 34 4037f9-4037ff 32->34 37 40390b-403925 GetTempPathW call 40360f 33->37 35 403801-403806 34->35 36 403808-40380e 34->36 35->35 35->36 38 403810-403814 36->38 39 403815-403819 36->39 47 403927-403945 GetWindowsDirectoryW lstrcatW call 40360f 37->47 48 40397d-403995 DeleteFileW call 4030d0 37->48 38->39 41 4038d9-4038e7 call 405f64 39->41 42 40381f-403825 39->42 41->32 58 4038e9-4038ea 41->58 45 403827-40382e 42->45 46 40383f-403878 42->46 51 403830-403833 45->51 52 403835 45->52 53 403894-4038ce 46->53 54 40387a-40387f 46->54 47->48 62 403947-403977 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40360f 47->62 64 40399b-4039a1 48->64 65 403b6c-403b7a ExitProcess CoUninitialize 48->65 51->46 51->52 52->46 56 4038d0-4038d4 53->56 57 4038d6-4038d8 53->57 54->53 60 403881-403889 54->60 56->57 63 4038f9-403906 call 406668 56->63 57->41 58->32 66 403890 60->66 67 40388b-40388e 60->67 62->48 62->65 63->37 69 4039a7-4039ba call 405f64 64->69 70 403a48-403a4f call 403d17 64->70 72 403b91-403b97 65->72 73 403b7c-403b8b call 405cc8 ExitProcess 65->73 66->53 67->53 67->66 88 403a0c-403a19 69->88 89 4039bc-4039f1 69->89 83 403a54-403a57 70->83 74 403b99-403bae GetCurrentProcess OpenProcessToken 72->74 75 403c0f-403c17 72->75 80 403bb0-403bd9 LookupPrivilegeValueW AdjustTokenPrivileges 74->80 81 403bdf-403bed call 406a35 74->81 84 403c19 75->84 85 403c1c-403c1f ExitProcess 75->85 80->81 95 403bfb-403c06 ExitWindowsEx 81->95 96 403bef-403bf9 81->96 83->65 84->85 90 403a1b-403a29 call 40603f 88->90 91 403a5c-403a70 call 405c33 lstrcatW 88->91 93 4039f3-4039f7 89->93 90->65 104 403a2f-403a45 call 406668 * 2 90->104 107 403a72-403a78 lstrcatW 91->107 108 403a7d-403a97 lstrcatW lstrcmpiW 91->108 98 403a00-403a08 93->98 99 4039f9-4039fe 93->99 95->75 101 403c08-403c0a call 40140b 95->101 96->95 96->101 98->93 103 403a0a 98->103 99->98 99->103 101->75 103->88 104->70 107->108 109 403b6a 108->109 110 403a9d-403aa0 108->110 109->65 112 403aa2-403aa7 call 405b99 110->112 113 403aa9 call 405c16 110->113 119 403aae-403abe SetCurrentDirectoryW 112->119 113->119 121 403ac0-403ac6 call 406668 119->121 122 403acb-403af7 call 406668 119->122 121->122 126 403afc-403b17 call 4066a5 DeleteFileW 122->126 129 403b57-403b61 126->129 130 403b19-403b29 CopyFileW 126->130 129->126 132 403b63-403b65 call 406428 129->132 130->129 131 403b2b-403b4b call 406428 call 4066a5 call 405c4b 130->131 131->129 140 403b4d-403b54 CloseHandle 131->140 132->109 140->129
                                              APIs
                                              • SetErrorMode.KERNELBASE(00008001), ref: 00403663
                                              • GetVersionExW.KERNEL32(?), ref: 0040368C
                                              • GetVersionExW.KERNEL32(0000011C), ref: 004036A3
                                              • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 0040373A
                                              • #17.COMCTL32(00000007,00000009,0000000B), ref: 00403776
                                              • OleInitialize.OLE32(00000000), ref: 0040377D
                                              • SHGetFileInfoW.SHELL32(00421708,00000000,?,000002B4,00000000), ref: 0040379B
                                              • GetCommandLineW.KERNEL32(00429260,NSIS Error), ref: 004037B0
                                              • CharNextW.USER32(00000000,"C:\Users\user\Desktop\FSCaptureSetup107.exe",00000020,"C:\Users\user\Desktop\FSCaptureSetup107.exe",00000000), ref: 004037E9
                                              • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,?), ref: 0040391C
                                              • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040392D
                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403939
                                              • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040394D
                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403955
                                              • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403966
                                              • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 0040396E
                                              • DeleteFileW.KERNELBASE(1033), ref: 00403982
                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\FSCaptureSetup107.exe",00000000,?), ref: 00403A69
                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A328,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\FSCaptureSetup107.exe",00000000,?), ref: 00403A78
                                                • Part of subcall function 00405C16: CreateDirectoryW.KERNELBASE(?,00000000,00403633,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00405C1C
                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\FSCaptureSetup107.exe",00000000,?), ref: 00403A83
                                              • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\FSCaptureSetup107.exe",00000000,?), ref: 00403A8F
                                              • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403AAF
                                              • DeleteFileW.KERNEL32(00420F08,00420F08,?,success,?), ref: 00403B0E
                                              • CopyFileW.KERNEL32(C:\Users\user\Desktop\FSCaptureSetup107.exe,00420F08,00000001), ref: 00403B21
                                              • CloseHandle.KERNEL32(00000000,00420F08,00420F08,?,00420F08,00000000), ref: 00403B4E
                                              • ExitProcess.KERNEL32(?), ref: 00403B6C
                                              • CoUninitialize.COMBASE(?), ref: 00403B71
                                              • ExitProcess.KERNEL32 ref: 00403B8B
                                              • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403B9F
                                              • OpenProcessToken.ADVAPI32(00000000), ref: 00403BA6
                                              • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403BBA
                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403BD9
                                              • ExitWindowsEx.USER32(00000002,80040002), ref: 00403BFE
                                              • ExitProcess.KERNEL32 ref: 00403C1F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: Processlstrcat$ExitFile$Directory$CurrentDeleteEnvironmentPathTempTokenVariableVersionWindows$AdjustCharCloseCommandCopyCreateErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrlen
                                              • String ID: "C:\Users\user\Desktop\FSCaptureSetup107.exe"$.tmp$1033$C:\Program Files (x86)\FastStone Capture$C:\Program Files (x86)\FastStone Capture$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\FSCaptureSetup107.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$success$~nsu
                                              • API String ID: 2292928366-3313118889
                                              • Opcode ID: ed5248a912319d130effd7f05a4d843c659f0a5d51aace41cf0d3086d1e01474
                                              • Instruction ID: d56582c8b11bee4b9d4e83ad1f604629a9588d533935b381636b20c84fba3529
                                              • Opcode Fuzzy Hash: ed5248a912319d130effd7f05a4d843c659f0a5d51aace41cf0d3086d1e01474
                                              • Instruction Fuzzy Hash: D4E1F471A00214AADB20AFB58D45A6E3EB8EB05709F50847FF945B32D1DB7C8A41CB6D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 141 405809-405824 142 4059b3-4059ba 141->142 143 40582a-4058f1 GetDlgItem * 3 call 4045f9 call 404f52 GetClientRect GetSystemMetrics SendMessageW * 2 141->143 145 4059e4-4059f1 142->145 146 4059bc-4059de GetDlgItem CreateThread CloseHandle 142->146 163 4058f3-40590d SendMessageW * 2 143->163 164 40590f-405912 143->164 148 4059f3-4059f9 145->148 149 405a0f-405a19 145->149 146->145 151 405a34-405a3d call 40462b 148->151 152 4059fb-405a0a ShowWindow * 2 call 4045f9 148->152 153 405a1b-405a21 149->153 154 405a6f-405a73 149->154 167 405a42-405a46 151->167 152->149 158 405a23-405a2f call 40459d 153->158 159 405a49-405a59 ShowWindow 153->159 154->151 156 405a75-405a7b 154->156 156->151 165 405a7d-405a90 SendMessageW 156->165 158->151 161 405a69-405a6a call 40459d 159->161 162 405a5b-405a64 call 4056ca 159->162 161->154 162->161 163->164 170 405922-405939 call 4045c4 164->170 171 405914-405920 SendMessageW 164->171 172 405b92-405b94 165->172 173 405a96-405ac1 CreatePopupMenu call 4066a5 AppendMenuW 165->173 180 40593b-40594f ShowWindow 170->180 181 40596f-405990 GetDlgItem SendMessageW 170->181 171->170 172->167 178 405ac3-405ad3 GetWindowRect 173->178 179 405ad6-405aeb TrackPopupMenu 173->179 178->179 179->172 183 405af1-405b08 179->183 184 405951-40595c ShowWindow 180->184 185 40595e 180->185 181->172 182 405996-4059ae SendMessageW * 2 181->182 182->172 186 405b0d-405b28 SendMessageW 183->186 187 405964-40596a call 4045f9 184->187 185->187 186->186 188 405b2a-405b4d OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 186->188 187->181 190 405b4f-405b76 SendMessageW 188->190 190->190 191 405b78-405b8c GlobalUnlock SetClipboardData CloseClipboard 190->191 191->172
                                              APIs
                                              • GetDlgItem.USER32(?,00000403), ref: 00405867
                                              • GetDlgItem.USER32(?,000003EE), ref: 00405876
                                              • GetClientRect.USER32(?,?), ref: 004058B3
                                              • GetSystemMetrics.USER32(00000002), ref: 004058BA
                                              • SendMessageW.USER32(?,00001061,00000000,?), ref: 004058DB
                                              • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004058EC
                                              • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004058FF
                                              • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040590D
                                              • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405920
                                              • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405942
                                              • ShowWindow.USER32(?,00000008), ref: 00405956
                                              • GetDlgItem.USER32(?,000003EC), ref: 00405977
                                              • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405987
                                              • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004059A0
                                              • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004059AC
                                              • GetDlgItem.USER32(?,000003F8), ref: 00405885
                                                • Part of subcall function 004045F9: SendMessageW.USER32(00000028,?,00000001,00404424), ref: 00404607
                                              • GetDlgItem.USER32(?,000003EC), ref: 004059C9
                                              • CreateThread.KERNELBASE(00000000,00000000,Function_0000579D,00000000), ref: 004059D7
                                              • CloseHandle.KERNELBASE(00000000), ref: 004059DE
                                              • ShowWindow.USER32(00000000), ref: 00405A02
                                              • ShowWindow.USER32(?,00000008), ref: 00405A07
                                              • ShowWindow.USER32(00000008), ref: 00405A51
                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405A85
                                              • CreatePopupMenu.USER32 ref: 00405A96
                                              • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405AAA
                                              • GetWindowRect.USER32(?,?), ref: 00405ACA
                                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405AE3
                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B1B
                                              • OpenClipboard.USER32(00000000), ref: 00405B2B
                                              • EmptyClipboard.USER32 ref: 00405B31
                                              • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405B3D
                                              • GlobalLock.KERNEL32(00000000), ref: 00405B47
                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B5B
                                              • GlobalUnlock.KERNEL32(00000000), ref: 00405B7B
                                              • SetClipboardData.USER32(0000000D,00000000), ref: 00405B86
                                              • CloseClipboard.USER32 ref: 00405B8C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                              • String ID: H7B${$|!Q
                                              • API String ID: 590372296-799588519
                                              • Opcode ID: 153ff5dc364a6c7c2e50f1b489f7107bf33a64f1d0900c26a8f10ec1720b826b
                                              • Instruction ID: d0bbb34d81c2c7a38b5cdb5171fa906e4f4201ee6cbe22cb0b3272b57562556b
                                              • Opcode Fuzzy Hash: 153ff5dc364a6c7c2e50f1b489f7107bf33a64f1d0900c26a8f10ec1720b826b
                                              • Instruction Fuzzy Hash: D8B137B0900608FFDF119FA0DD89AAE7B79FB08354F00417AFA45A61A0CB755E52DF68

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 417 404ab5-404adf 418 404ae1-404aed call 405cac call 4068ef 417->418 419 404af2-404afc 417->419 418->419 420 404b6a-404b71 419->420 421 404afe-404b14 GetDlgItem call 405fae 419->421 425 404b77-404b80 420->425 426 404c48-404c4f 420->426 433 404b26-404b5f SetWindowTextW call 4045c4 * 2 call 4045f9 call 406a35 421->433 434 404b16-404b1e call 405fe2 421->434 429 404b82-404b8d 425->429 430 404b9a-404b9f 425->430 431 404c51-404c58 426->431 432 404c5e-404c79 call 405cac call 40603f 426->432 435 404b93 429->435 436 404df6-404e08 call 40462b 429->436 430->426 437 404ba5-404be7 call 4066a5 SHBrowseForFolderW 430->437 431->432 431->436 456 404c82-404c9a call 406668 call 406a35 432->456 457 404c7b 432->457 433->436 475 404b65-404b68 SHAutoComplete 433->475 434->433 449 404b20-404b21 call 405f37 434->449 435->430 450 404c41 437->450 451 404be9-404c03 CoTaskMemFree call 405f37 437->451 449->433 450->426 462 404c05-404c0b 451->462 463 404c2d-404c3f SetDlgItemTextW 451->463 473 404cd6-404ce7 call 406668 call 405fe2 456->473 474 404c9c-404ca2 456->474 457->456 462->463 466 404c0d-404c24 call 4066a5 lstrcmpiW 462->466 463->426 466->463 476 404c26-404c28 lstrcatW 466->476 489 404ce9 473->489 490 404cec-404d05 GetDiskFreeSpaceW 473->490 474->473 477 404ca4-404cb6 GetDiskFreeSpaceExW 474->477 475->420 476->463 479 404cb8-404cba 477->479 480 404d2e-404d48 477->480 483 404cbc 479->483 484 404cbf-404cd4 call 405f83 479->484 482 404d4a 480->482 486 404d4f-404d59 call 404f52 482->486 483->484 484->473 484->477 495 404d74-404d7d 486->495 496 404d5b-404d62 486->496 489->490 490->482 493 404d07-404d2c MulDiv 490->493 493->486 498 404daf-404db9 495->498 499 404d7f-404d8f call 404f3a 495->499 496->495 497 404d64 496->497 502 404d66-404d6b 497->502 503 404d6d 497->503 500 404dc5-404dcb 498->500 501 404dbb-404dc2 call 40140b 498->501 509 404da1-404daa SetDlgItemTextW 499->509 510 404d91-404d9a call 404e71 499->510 506 404dd0-404de1 call 4045e6 500->506 507 404dcd 500->507 501->500 502->495 502->503 503->495 516 404df0 506->516 517 404de3-404de9 506->517 507->506 509->498 515 404d9f 510->515 515->498 516->436 517->516 518 404deb call 404a0e 517->518 518->516
                                              APIs
                                              • GetDlgItem.USER32(?,000003FB), ref: 00404B04
                                              • SetWindowTextW.USER32(00000000,?), ref: 00404B2E
                                              • SHAutoComplete.SHLWAPI(00000000,00000001,00000008,00000000,?,00000014,?,?,00000001,?), ref: 00404B68
                                              • SHBrowseForFolderW.SHELL32(?), ref: 00404BDF
                                              • CoTaskMemFree.OLE32(00000000), ref: 00404BEA
                                              • lstrcmpiW.KERNEL32(Remove folder: ,00423748,00000000,?,?), ref: 00404C1C
                                              • lstrcatW.KERNEL32(?,Remove folder: ), ref: 00404C28
                                              • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404C3A
                                                • Part of subcall function 00405CAC: GetDlgItemTextW.USER32(?,?,00000400,00404C71), ref: 00405CBF
                                                • Part of subcall function 004068EF: CharNextW.USER32(?,*?|<>/":,00000000,00000000,75923420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406952
                                                • Part of subcall function 004068EF: CharNextW.USER32(?,?,?,00000000,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406961
                                                • Part of subcall function 004068EF: CharNextW.USER32(?,00000000,75923420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406966
                                                • Part of subcall function 004068EF: CharPrevW.USER32(?,?,75923420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406979
                                              • GetDiskFreeSpaceExW.KERNELBASE(00421718,?,?,?,00000001,00421718,?,?,000003FB,?), ref: 00404CB1
                                              • GetDiskFreeSpaceW.KERNEL32(00421718,?,?,0000040F,?,00421718,00421718,?,00000001,00421718,?,?,000003FB,?), ref: 00404CFD
                                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404D18
                                                • Part of subcall function 00404E71: lstrlenW.KERNEL32(00423748,00423748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F12
                                                • Part of subcall function 00404E71: wsprintfW.USER32 ref: 00404F1B
                                                • Part of subcall function 00404E71: SetDlgItemTextW.USER32(?,00423748), ref: 00404F2E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: CharItemText$FreeNext$DiskSpace$AutoBrowseCompleteFolderPrevTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                              • String ID: A$C:\Program Files (x86)\FastStone Capture$H7B$Remove folder: $success$|!Q
                                              • API String ID: 4039761011-4119755730
                                              • Opcode ID: 8fe5d6185855569599b0147f93014e69bfe7dcd8b72b59fe1028842fc76bdad0
                                              • Instruction ID: 9155a42c54a3203d4d9709c494e168d8d926bd307d67cbb08bf4d9f42020e7e3
                                              • Opcode Fuzzy Hash: 8fe5d6185855569599b0147f93014e69bfe7dcd8b72b59fe1028842fc76bdad0
                                              • Instruction Fuzzy Hash: 94A171F1900219ABDB11EFA5CD41AAFB7B8EF84315F11843BF601B62D1D77C8A418B69

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 651 405d74-405d9a call 40603f 654 405db3-405dba 651->654 655 405d9c-405dae DeleteFileW 651->655 657 405dbc-405dbe 654->657 658 405dcd-405ddd call 406668 654->658 656 405f30-405f34 655->656 659 405dc4-405dc7 657->659 660 405ede-405ee3 657->660 666 405dec-405ded call 405f83 658->666 667 405ddf-405dea lstrcatW 658->667 659->658 659->660 660->656 662 405ee5-405ee8 660->662 664 405ef2-405efa call 40699e 662->664 665 405eea-405ef0 662->665 664->656 675 405efc-405f10 call 405f37 call 405d2c 664->675 665->656 670 405df2-405df6 666->670 667->670 671 405e02-405e08 lstrcatW 670->671 672 405df8-405e00 670->672 674 405e0d-405e29 lstrlenW FindFirstFileW 671->674 672->671 672->674 676 405ed3-405ed7 674->676 677 405e2f-405e37 674->677 691 405f12-405f15 675->691 692 405f28-405f2b call 4056ca 675->692 676->660 682 405ed9 676->682 679 405e57-405e6b call 406668 677->679 680 405e39-405e41 677->680 693 405e82-405e8d call 405d2c 679->693 694 405e6d-405e75 679->694 683 405e43-405e4b 680->683 684 405eb6-405ec6 FindNextFileW 680->684 682->660 683->679 687 405e4d-405e55 683->687 684->677 690 405ecc-405ecd FindClose 684->690 687->679 687->684 690->676 691->665 697 405f17-405f26 call 4056ca call 406428 691->697 692->656 702 405eae-405eb1 call 4056ca 693->702 703 405e8f-405e92 693->703 694->684 698 405e77-405e80 call 405d74 694->698 697->656 698->684 702->684 706 405e94-405ea4 call 4056ca call 406428 703->706 707 405ea6-405eac 703->707 706->684 707->684
                                              APIs
                                              • DeleteFileW.KERNELBASE(?,?,75923420,75922EE0,00000000), ref: 00405D9D
                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsf6353.tmp\*.*,\*.*,C:\Users\user\AppData\Local\Temp\nsf6353.tmp\*.*,?,?,75923420,75922EE0,00000000), ref: 00405DE5
                                              • lstrcatW.KERNEL32(?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsf6353.tmp\*.*,?,?,75923420,75922EE0,00000000), ref: 00405E08
                                              • lstrlenW.KERNEL32(?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsf6353.tmp\*.*,?,?,75923420,75922EE0,00000000), ref: 00405E0E
                                              • FindFirstFileW.KERNELBASE(C:\Users\user\AppData\Local\Temp\nsf6353.tmp\*.*,?,?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsf6353.tmp\*.*,?,?,75923420,75922EE0,00000000), ref: 00405E1E
                                              • FindNextFileW.KERNELBASE(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405EBE
                                              • FindClose.KERNEL32(00000000), ref: 00405ECD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                              • String ID: .$.$C:\Users\user\AppData\Local\Temp\nsf6353.tmp\*.*$\*.*
                                              • API String ID: 2035342205-1041090185
                                              • Opcode ID: 474154096caf6e50bc49cf7df5fd00662d051eb5e935454ecd5fbb37efa04323
                                              • Instruction ID: 3801e3340fbbb9c460ab277ab089a7ece50ce31247a5b640c745bca9484d7288
                                              • Opcode Fuzzy Hash: 474154096caf6e50bc49cf7df5fd00662d051eb5e935454ecd5fbb37efa04323
                                              • Instruction Fuzzy Hash: 46410330800A15AADB21AB61CC49BBF7678EF41715F50413FF881711D1DB7C4A82CEAE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6ae840c17bc4cb012e3c6e2f9739eb08ea49decd14d2b7f73774d31e5ba5825a
                                              • Instruction ID: 02c1e40b0c9780dd067322b7733c474732bd0f187a49f53fd7fd3c108ee94619
                                              • Opcode Fuzzy Hash: 6ae840c17bc4cb012e3c6e2f9739eb08ea49decd14d2b7f73774d31e5ba5825a
                                              • Instruction Fuzzy Hash: 7CF15570D04229CBDF28CFA8C8946ADBBB0FF44305F24816ED456BB281D7386A86DF45
                                              APIs
                                              • CoCreateInstance.OLE32(004084E4,?,00000001,004084D4,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402229
                                              Strings
                                              • C:\Program Files (x86)\FastStone Capture, xrefs: 00402269
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: CreateInstance
                                              • String ID: C:\Program Files (x86)\FastStone Capture
                                              • API String ID: 542301482-2214226362
                                              • Opcode ID: 4e8b9e8d9efc1323b126c51a2f9450484e7b2217165b473e9f4f1a567a0bf10e
                                              • Instruction ID: f110e38d5ccd8909b9e85e2ea6b1342c5fae2602ce40754bea02e3b472428d32
                                              • Opcode Fuzzy Hash: 4e8b9e8d9efc1323b126c51a2f9450484e7b2217165b473e9f4f1a567a0bf10e
                                              • Instruction Fuzzy Hash: BC411771A00209EFCF40DFE4C989E9D7BB5BF49304B20456AF505EB2D1DB799981CB94
                                              APIs
                                              • FindFirstFileW.KERNELBASE(75923420,00426798,00425F50,00406088,00425F50,00425F50,00000000,00425F50,00425F50,75923420,?,75922EE0,00405D94,?,75923420,75922EE0), ref: 004069A9
                                              • FindClose.KERNEL32(00000000), ref: 004069B5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: Find$CloseFileFirst
                                              • String ID:
                                              • API String ID: 2295610775-0
                                              • Opcode ID: 1093b80bdde5f117a2aeaff90f04fc035896fcf98737a4a628a8a679d5dfa397
                                              • Instruction ID: 0ca7534fdffec89160a31ceabb6ef5ff718bfc83d1618d69d17f9e635378cbc3
                                              • Opcode Fuzzy Hash: 1093b80bdde5f117a2aeaff90f04fc035896fcf98737a4a628a8a679d5dfa397
                                              • Instruction Fuzzy Hash: 5ED012B15192205FC34057387E0C84B7A989F563317268A36B4AAF11E0CB348C3297AC

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 192 4040c5-4040d7 193 4040dd-4040e3 192->193 194 40423e-40424d 192->194 193->194 195 4040e9-4040f2 193->195 196 40429c-4042b1 194->196 197 40424f-404297 GetDlgItem * 2 call 4045c4 SetClassLongW call 40140b 194->197 200 4040f4-404101 SetWindowPos 195->200 201 404107-40410e 195->201 198 4042f1-4042f6 call 404610 196->198 199 4042b3-4042b6 196->199 197->196 214 4042fb-404316 198->214 203 4042b8-4042c3 call 401389 199->203 204 4042e9-4042eb 199->204 200->201 206 404110-40412a ShowWindow 201->206 207 404152-404158 201->207 203->204 228 4042c5-4042e4 SendMessageW 203->228 204->198 213 404591 204->213 215 404130-404143 GetWindowLongW 206->215 216 40422b-404239 call 40462b 206->216 209 404171-404174 207->209 210 40415a-40416c DestroyWindow 207->210 220 404176-404182 SetWindowLongW 209->220 221 404187-40418d 209->221 217 40456e-404574 210->217 219 404593-40459a 213->219 224 404318-40431a call 40140b 214->224 225 40431f-404325 214->225 215->216 226 404149-40414c ShowWindow 215->226 216->219 217->213 231 404576-40457c 217->231 220->219 221->216 227 404193-4041a2 GetDlgItem 221->227 224->225 232 40432b-404336 225->232 233 40454f-404568 DestroyWindow KiUserCallbackDispatcher 225->233 226->207 235 4041c1-4041c4 227->235 236 4041a4-4041bb SendMessageW IsWindowEnabled 227->236 228->219 231->213 237 40457e-404587 ShowWindow 231->237 232->233 234 40433c-404389 call 4066a5 call 4045c4 * 3 GetDlgItem 232->234 233->217 264 404393-4043cf ShowWindow KiUserCallbackDispatcher call 4045e6 KiUserCallbackDispatcher 234->264 265 40438b-404390 234->265 239 4041c6-4041c7 235->239 240 4041c9-4041cc 235->240 236->213 236->235 237->213 242 4041f7-4041fc call 40459d 239->242 243 4041da-4041df 240->243 244 4041ce-4041d4 240->244 242->216 247 404215-404225 SendMessageW 243->247 249 4041e1-4041e7 243->249 244->247 248 4041d6-4041d8 244->248 247->216 248->242 252 4041e9-4041ef call 40140b 249->252 253 4041fe-404207 call 40140b 249->253 260 4041f5 252->260 253->216 262 404209-404213 253->262 260->242 262->260 268 4043d1-4043d2 264->268 269 4043d4 264->269 265->264 270 4043d6-404404 GetSystemMenu EnableMenuItem SendMessageW 268->270 269->270 271 404406-404417 SendMessageW 270->271 272 404419 270->272 273 40441f-40445e call 4045f9 call 4040a6 call 406668 lstrlenW call 4066a5 SetWindowTextW call 401389 271->273 272->273 273->214 284 404464-404466 273->284 284->214 285 40446c-404470 284->285 286 404472-404478 285->286 287 40448f-4044a3 DestroyWindow 285->287 286->213 288 40447e-404484 286->288 287->217 289 4044a9-4044d6 CreateDialogParamW 287->289 288->214 290 40448a 288->290 289->217 291 4044dc-404533 call 4045c4 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 289->291 290->213 291->213 296 404535-404548 ShowWindow call 404610 291->296 298 40454d 296->298 298->217
                                              APIs
                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00404101
                                              • ShowWindow.USER32(?), ref: 00404121
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00404133
                                              • ShowWindow.USER32(?,00000004), ref: 0040414C
                                              • DestroyWindow.USER32 ref: 00404160
                                              • SetWindowLongW.USER32(?,00000000,00000000), ref: 00404179
                                              • GetDlgItem.USER32(?,?), ref: 00404198
                                              • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004041AC
                                              • IsWindowEnabled.USER32(00000000), ref: 004041B3
                                              • GetDlgItem.USER32(?,00000001), ref: 0040425E
                                              • GetDlgItem.USER32(?,00000002), ref: 00404268
                                              • SetClassLongW.USER32(?,000000F2,?), ref: 00404282
                                              • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004042D3
                                              • GetDlgItem.USER32(?,00000003), ref: 00404379
                                              • ShowWindow.USER32(00000000,?), ref: 0040439A
                                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004043AC
                                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004043C7
                                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004043DD
                                              • EnableMenuItem.USER32(00000000), ref: 004043E4
                                              • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004043FC
                                              • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040440F
                                              • lstrlenW.KERNEL32(00423748,?,00423748,00000000), ref: 00404439
                                              • SetWindowTextW.USER32(?,00423748), ref: 0040444D
                                              • ShowWindow.USER32(?,0000000A), ref: 00404581
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: Window$Item$MessageSendShow$Long$CallbackDispatcherMenuUser$ClassDestroyEnableEnabledSystemTextlstrlen
                                              • String ID: H7B$|!Q
                                              • API String ID: 3964124867-864814464
                                              • Opcode ID: 2f4dad2f818047668635e16f952da299a81014d83ff1599baf972819d0fbfd0c
                                              • Instruction ID: 1d4a55fced449df2e2a9dfc159c1061f424388fbea236c5341ec002980a30b6c
                                              • Opcode Fuzzy Hash: 2f4dad2f818047668635e16f952da299a81014d83ff1599baf972819d0fbfd0c
                                              • Instruction Fuzzy Hash: C0C1C2B1600604FBDB216F61EE85E2A3B78EB85745F40097EF781B51F0CB3958529B2E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 299 403d17-403d2f call 406a35 302 403d31-403d41 call 4065af 299->302 303 403d43-403d7a call 406536 299->303 312 403d9d-403dc6 call 403fed call 40603f 302->312 308 403d92-403d98 lstrcatW 303->308 309 403d7c-403d8d call 406536 303->309 308->312 309->308 317 403e58-403e60 call 40603f 312->317 318 403dcc-403dd1 312->318 324 403e62-403e69 call 4066a5 317->324 325 403e6e-403e93 LoadImageW 317->325 318->317 320 403dd7-403df1 call 406536 318->320 323 403df6-403dff 320->323 323->317 326 403e01-403e05 323->326 324->325 328 403f14-403f1c call 40140b 325->328 329 403e95-403ec5 RegisterClassW 325->329 330 403e17-403e23 lstrlenW 326->330 331 403e07-403e14 call 405f64 326->331 342 403f26-403f31 call 403fed 328->342 343 403f1e-403f21 328->343 332 403fe3 329->332 333 403ecb-403f0f SystemParametersInfoW CreateWindowExW 329->333 337 403e25-403e33 lstrcmpiW 330->337 338 403e4b-403e53 call 405f37 call 406668 330->338 331->330 336 403fe5-403fec 332->336 333->328 337->338 341 403e35-403e3f GetFileAttributesW 337->341 338->317 345 403e41-403e43 341->345 346 403e45-403e46 call 405f83 341->346 352 403f37-403f51 ShowWindow call 4069c5 342->352 353 403fba-403fbb call 40579d 342->353 343->336 345->338 345->346 346->338 358 403f53-403f58 call 4069c5 352->358 359 403f5d-403f6f GetClassInfoW 352->359 357 403fc0-403fc2 353->357 360 403fc4-403fca 357->360 361 403fdc-403fde call 40140b 357->361 358->359 364 403f71-403f81 GetClassInfoW RegisterClassW 359->364 365 403f87-403faa DialogBoxParamW call 40140b 359->365 360->343 366 403fd0-403fd7 call 40140b 360->366 361->332 364->365 370 403faf-403fb8 call 403c67 365->370 366->343 370->336
                                              APIs
                                                • Part of subcall function 00406A35: GetModuleHandleA.KERNEL32(?,00000020,?,00403750,0000000B), ref: 00406A47
                                                • Part of subcall function 00406A35: GetProcAddress.KERNEL32(00000000,?), ref: 00406A62
                                              • lstrcatW.KERNEL32(1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000,00000002,75923420,C:\Users\user\AppData\Local\Temp\,?,00000000,?), ref: 00403D98
                                              • lstrlenW.KERNEL32(Remove folder: ,?,?,?,Remove folder: ,00000000,C:\Program Files (x86)\FastStone Capture,1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000,00000002,75923420), ref: 00403E18
                                              • lstrcmpiW.KERNEL32(?,.exe,Remove folder: ,?,?,?,Remove folder: ,00000000,C:\Program Files (x86)\FastStone Capture,1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000), ref: 00403E2B
                                              • GetFileAttributesW.KERNEL32(Remove folder: ,?,00000000,?), ref: 00403E36
                                              • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Program Files (x86)\FastStone Capture), ref: 00403E7F
                                                • Part of subcall function 004065AF: wsprintfW.USER32 ref: 004065BC
                                              • RegisterClassW.USER32(00429200), ref: 00403EBC
                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403ED4
                                              • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403F09
                                              • ShowWindow.USER32(00000005,00000000,?,00000000,?), ref: 00403F3F
                                              • GetClassInfoW.USER32(00000000,RichEdit20W,00429200), ref: 00403F6B
                                              • GetClassInfoW.USER32(00000000,RichEdit,00429200), ref: 00403F78
                                              • RegisterClassW.USER32(00429200), ref: 00403F81
                                              • DialogBoxParamW.USER32(?,00000000,004040C5,00000000), ref: 00403FA0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                              • String ID: .DEFAULT\Control Panel\International$.exe$1033$C:\Program Files (x86)\FastStone Capture$C:\Users\user\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$H7B$Remove folder: $RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                              • API String ID: 1975747703-3023262966
                                              • Opcode ID: 78a63079156de9a95659751e2075cee6996798d0e51b0c114acce594fd97feca
                                              • Instruction ID: e235badc60aeba35c86cf297cd954ec43a22164425911800af60bc979c7621a1
                                              • Opcode Fuzzy Hash: 78a63079156de9a95659751e2075cee6996798d0e51b0c114acce594fd97feca
                                              • Instruction Fuzzy Hash: E661D570640201BAD730AF66AD45E2B3A7CEB84B49F40457FF945B22E1DB3D5911CA3D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 373 404783-404795 374 4048b5-4048c2 373->374 375 40479b-4047a3 373->375 376 4048c4-4048cd 374->376 377 40491f-404923 374->377 378 4047a5-4047b4 375->378 379 4047b6-4047da 375->379 380 4048d3-4048d9 376->380 381 4049f8 376->381 384 4049e9-4049f0 377->384 385 404929-404941 GetDlgItem 377->385 378->379 382 4047e3-40485e call 4045c4 * 2 CheckDlgButton call 4045e6 GetDlgItem call 4045f9 SendMessageW 379->382 383 4047dc 379->383 380->381 386 4048df-4048ea 380->386 389 4049fb-404a02 call 40462b 381->389 415 404860-404863 GetSysColor 382->415 416 404869-4048b0 SendMessageW * 2 lstrlenW SendMessageW * 2 382->416 383->382 384->381 388 4049f2 384->388 390 404943-40494a 385->390 391 4049aa-4049b1 385->391 386->381 394 4048f0-40491a GetDlgItem SendMessageW call 4045e6 call 404a0e 386->394 388->381 397 404a07-404a0b 389->397 390->391 392 40494c-404967 390->392 391->389 393 4049b3-4049ba 391->393 392->391 398 404969-4049a7 SendMessageW LoadCursorW SetCursor call 404a32 LoadCursorW SetCursor 392->398 393->389 399 4049bc-4049c0 393->399 394->377 398->391 403 4049d2-4049d6 399->403 404 4049c2-4049d0 SendMessageW 399->404 408 4049e4-4049e7 403->408 409 4049d8-4049e2 SendMessageW 403->409 404->403 408->397 409->408 415->416 416->397
                                              APIs
                                              • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404821
                                              • GetDlgItem.USER32(?,000003E8), ref: 00404835
                                              • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404852
                                              • GetSysColor.USER32(?), ref: 00404863
                                              • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404871
                                              • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040487F
                                              • lstrlenW.KERNEL32(?), ref: 00404884
                                              • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404891
                                              • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004048A6
                                              • GetDlgItem.USER32(?,0000040A), ref: 004048FF
                                              • SendMessageW.USER32(00000000), ref: 00404906
                                              • GetDlgItem.USER32(?,000003E8), ref: 00404931
                                              • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404974
                                              • LoadCursorW.USER32(00000000,00007F02), ref: 00404982
                                              • SetCursor.USER32(00000000), ref: 00404985
                                              • LoadCursorW.USER32(00000000,00007F00), ref: 0040499E
                                              • SetCursor.USER32(00000000), ref: 004049A1
                                              • SendMessageW.USER32(00000111,00000001,00000000), ref: 004049D0
                                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 004049E2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                              • String ID: N$Remove folder: $|!Q
                                              • API String ID: 3103080414-4179745596
                                              • Opcode ID: 7b7ce6e7f04c0852b245e81234b58653da2c4cab9b10fb98097c13f3cf17b06e
                                              • Instruction ID: 690b4d321b533a2a97605fa3f7bb2423a24794fe1ec6c961d913f822d5f12d1b
                                              • Opcode Fuzzy Hash: 7b7ce6e7f04c0852b245e81234b58653da2c4cab9b10fb98097c13f3cf17b06e
                                              • Instruction Fuzzy Hash: AB6181F1900209FFDB109F61CD85A6A7B69FB84304F00813AF705B62E0C7799951DFA9

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 520 4030d0-40311e GetTickCount GetModuleFileNameW call 406158 523 403120-403125 520->523 524 40312a-403158 call 406668 call 405f83 call 406668 GetFileSize 520->524 525 40336a-40336e 523->525 532 403243-403251 call 40302e 524->532 533 40315e 524->533 539 403322-403327 532->539 540 403257-40325a 532->540 535 403163-40317a 533->535 537 40317c 535->537 538 40317e-403187 call 4035e2 535->538 537->538 546 40318d-403194 538->546 547 4032de-4032e6 call 40302e 538->547 539->525 542 403286-4032d2 GlobalAlloc call 406b90 call 406187 CreateFileW 540->542 543 40325c-403274 call 4035f8 call 4035e2 540->543 571 4032d4-4032d9 542->571 572 4032e8-403318 call 4035f8 call 403371 542->572 543->539 566 40327a-403280 543->566 551 403210-403214 546->551 552 403196-4031aa call 406113 546->552 547->539 556 403216-40321d call 40302e 551->556 557 40321e-403224 551->557 552->557 569 4031ac-4031b3 552->569 556->557 562 403233-40323b 557->562 563 403226-403230 call 406b22 557->563 562->535 570 403241 562->570 563->562 566->539 566->542 569->557 575 4031b5-4031bc 569->575 570->532 571->525 581 40331d-403320 572->581 575->557 577 4031be-4031c5 575->577 577->557 578 4031c7-4031ce 577->578 578->557 580 4031d0-4031f0 578->580 580->539 582 4031f6-4031fa 580->582 581->539 583 403329-40333a 581->583 584 403202-40320a 582->584 585 4031fc-403200 582->585 586 403342-403347 583->586 587 40333c 583->587 584->557 588 40320c-40320e 584->588 585->570 585->584 589 403348-40334e 586->589 587->586 588->557 589->589 590 403350-403368 call 406113 589->590 590->525
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 004030E4
                                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\FSCaptureSetup107.exe,00000400), ref: 00403100
                                                • Part of subcall function 00406158: GetFileAttributesW.KERNELBASE(00000003,00403113,C:\Users\user\Desktop\FSCaptureSetup107.exe,80000000,00000003), ref: 0040615C
                                                • Part of subcall function 00406158: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040617E
                                              • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\FSCaptureSetup107.exe,C:\Users\user\Desktop\FSCaptureSetup107.exe,80000000,00000003), ref: 00403149
                                              • GlobalAlloc.KERNELBASE(00000040,?), ref: 0040328B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                              • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\FSCaptureSetup107.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                              • API String ID: 2803837635-31469039
                                              • Opcode ID: 0724999653b3e73eed60d379075ff5ac069807c872a81a0186dc1bcbf61f2663
                                              • Instruction ID: 6a7077609e6cbe8902eef3654a796be60faa9129f620d49927b75729aeb44cd1
                                              • Opcode Fuzzy Hash: 0724999653b3e73eed60d379075ff5ac069807c872a81a0186dc1bcbf61f2663
                                              • Instruction Fuzzy Hash: 74710271A40204ABDB20DFB5DD85B9E3AACAB04315F21457FF901B72D2CB789E418B6D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 593 4066a5-4066b0 594 4066b2-4066c1 593->594 595 4066c3-4066d9 593->595 594->595 596 4066f1-4066fa 595->596 597 4066db-4066e8 595->597 599 406700 596->599 600 4068d5-4068e0 596->600 597->596 598 4066ea-4066ed 597->598 598->596 601 406705-406712 599->601 602 4068e2-4068e6 call 406668 600->602 603 4068eb-4068ec 600->603 601->600 604 406718-406721 601->604 602->603 606 4068b3 604->606 607 406727-406764 604->607 610 4068c1-4068c4 606->610 611 4068b5-4068bf 606->611 608 406857-40685c 607->608 609 40676a-406771 607->609 615 40685e-406864 608->615 616 40688f-406894 608->616 612 406773-406775 609->612 613 406776-406778 609->613 614 4068c6-4068cf 610->614 611->614 612->613 617 4067b5-4067b8 613->617 618 40677a-406798 call 406536 613->618 614->600 621 406702 614->621 622 406874-406880 call 406668 615->622 623 406866-406872 call 4065af 615->623 619 4068a3-4068b1 lstrlenW 616->619 620 406896-40689e call 4066a5 616->620 627 4067c8-4067cb 617->627 628 4067ba-4067c6 GetSystemDirectoryW 617->628 631 40679d-4067a1 618->631 619->614 620->619 621->601 630 406885-40688b 622->630 623->630 633 406834-406836 627->633 634 4067cd-4067db GetWindowsDirectoryW 627->634 632 406838-40683c 628->632 630->619 636 40688d 630->636 638 4067a7-4067b0 call 4066a5 631->638 639 40683e-406842 631->639 632->639 640 40684f-406855 call 4068ef 632->640 633->632 637 4067dd-4067e5 633->637 634->633 636->640 644 4067e7-4067f0 637->644 645 4067fc-406812 SHGetSpecialFolderLocation 637->645 638->632 639->640 642 406844-40684a lstrcatW 639->642 640->619 642->640 650 4067f8-4067fa 644->650 646 406830 645->646 647 406814-40682e SHGetPathFromIDListW CoTaskMemFree 645->647 646->633 647->632 647->646 650->632 650->645
                                              APIs
                                              • GetSystemDirectoryW.KERNEL32(Remove folder: ,00000400), ref: 004067C0
                                              • GetWindowsDirectoryW.KERNEL32(Remove folder: ,00000400,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,?,00405701,Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,00000000,00000000,00000000,00000000), ref: 004067D3
                                              • lstrcatW.KERNEL32(Remove folder: ,\Microsoft\Internet Explorer\Quick Launch), ref: 0040684A
                                              • lstrlenW.KERNEL32(Remove folder: ,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,?,00405701,Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,00000000), ref: 004068A4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: Directory$SystemWindowslstrcatlstrlen
                                              • String ID: Remove folder: $Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$success
                                              • API String ID: 4260037668-1758713299
                                              • Opcode ID: a56a8a4d956183f5ceef7ff9e42496adb417aa599aaeb911d527621cdebcfcc9
                                              • Instruction ID: 414c90a3e727c3679fd522760d05a71ccfd37451a898d0680c6fb4b4ce958948
                                              • Opcode Fuzzy Hash: a56a8a4d956183f5ceef7ff9e42496adb417aa599aaeb911d527621cdebcfcc9
                                              • Instruction Fuzzy Hash: CD61E172A02115EBDB20AF64CD40BAA37A5EF10314F22C13EE946B62D0DB3D49A1CB5D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 715 40176f-401794 call 402da6 call 405fae 720 401796-40179c call 406668 715->720 721 40179e-4017b0 call 406668 call 405f37 lstrcatW 715->721 726 4017b5-4017b6 call 4068ef 720->726 721->726 730 4017bb-4017bf 726->730 731 4017c1-4017cb call 40699e 730->731 732 4017f2-4017f5 730->732 739 4017dd-4017ef 731->739 740 4017cd-4017db CompareFileTime 731->740 733 4017f7-4017f8 call 406133 732->733 734 4017fd-401819 call 406158 732->734 733->734 742 40181b-40181e 734->742 743 40188d-4018b6 call 4056ca call 403371 734->743 739->732 740->739 744 401820-40185e call 406668 * 2 call 4066a5 call 406668 call 405cc8 742->744 745 40186f-401879 call 4056ca 742->745 755 4018b8-4018bc 743->755 756 4018be-4018ca SetFileTime 743->756 744->730 777 401864-401865 744->777 757 401882-401888 745->757 755->756 759 4018d0-4018db CloseHandle 755->759 756->759 760 402c33 757->760 762 4018e1-4018e4 759->762 763 402c2a-402c2d 759->763 764 402c35-402c39 760->764 767 4018e6-4018f7 call 4066a5 lstrcatW 762->767 768 4018f9-4018fc call 4066a5 762->768 763->760 774 401901-4023a2 call 405cc8 767->774 768->774 774->763 774->764 777->757 779 401867-401868 777->779 779->745
                                              APIs
                                              • lstrcatW.KERNEL32(00000000,00000000,ShellExecAsUser,C:\Program Files (x86)\FastStone Capture,?,?,00000031), ref: 004017B0
                                              • CompareFileTime.KERNEL32(-00000014,?,ShellExecAsUser,ShellExecAsUser,00000000,00000000,ShellExecAsUser,C:\Program Files (x86)\FastStone Capture,?,?,00000031), ref: 004017D5
                                                • Part of subcall function 00406668: lstrcpynW.KERNEL32(?,?,00000400,004037B0,00429260,NSIS Error), ref: 00406675
                                                • Part of subcall function 004056CA: lstrlenW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                                                • Part of subcall function 004056CA: lstrlenW.KERNEL32(004030A8,Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                                                • Part of subcall function 004056CA: lstrcatW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,004030A8,004030A8,Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,00000000,00000000,00000000), ref: 00405725
                                                • Part of subcall function 004056CA: SetWindowTextW.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\), ref: 00405737
                                                • Part of subcall function 004056CA: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                                                • Part of subcall function 004056CA: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                                                • Part of subcall function 004056CA: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                              • String ID: C:\Program Files (x86)\FastStone Capture$C:\Users\user\AppData\Local\Temp\nsf6353.tmp$C:\Users\user\AppData\Local\Temp\nsf6353.tmp\ShellExecAsUser.dll$ShellExecAsUser
                                              • API String ID: 1941528284-1219136727
                                              • Opcode ID: ae146eaacdef0e831c8dd449aef3ef234919e16d41b91f58e4b486bba6a2989e
                                              • Instruction ID: 87dd38174d63fc88252c3cacf76d35d2aef1a13c6195c1d88e2760da23471212
                                              • Opcode Fuzzy Hash: ae146eaacdef0e831c8dd449aef3ef234919e16d41b91f58e4b486bba6a2989e
                                              • Instruction Fuzzy Hash: DE41B771500205BACF10BBB5CD85DAE7A75EF45328B20473FF422B21E1D63D89619A2E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 781 4056ca-4056df 782 4056e5-4056f6 781->782 783 405796-40579a 781->783 784 405701-40570d lstrlenW 782->784 785 4056f8-4056fc call 4066a5 782->785 787 40572a-40572e 784->787 788 40570f-40571f lstrlenW 784->788 785->784 789 405730-405737 SetWindowTextW 787->789 790 40573d-405741 787->790 788->783 791 405721-405725 lstrcatW 788->791 789->790 792 405743-405785 SendMessageW * 3 790->792 793 405787-405789 790->793 791->787 792->793 793->783 794 40578b-40578e 793->794 794->783
                                              APIs
                                              • lstrlenW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                                              • lstrlenW.KERNEL32(004030A8,Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                                              • lstrcatW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,004030A8,004030A8,Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,00000000,00000000,00000000), ref: 00405725
                                              • SetWindowTextW.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\), ref: 00405737
                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                                              • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                                              • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                                                • Part of subcall function 004066A5: lstrcatW.KERNEL32(Remove folder: ,\Microsoft\Internet Explorer\Quick Launch), ref: 0040684A
                                                • Part of subcall function 004066A5: lstrlenW.KERNEL32(Remove folder: ,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,?,00405701,Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,00000000), ref: 004068A4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: MessageSendlstrlen$lstrcat$TextWindow
                                              • String ID: Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\
                                              • API String ID: 1495540970-2867763728
                                              • Opcode ID: da0887550f177a20a5adca650a80eb3065253b4758cf57a6ba66e38fd01475e6
                                              • Instruction ID: 7f52a71d89202be05388d2ae90ba5930d13dcc1e6093ad3ff4eaa481a322a782
                                              • Opcode Fuzzy Hash: da0887550f177a20a5adca650a80eb3065253b4758cf57a6ba66e38fd01475e6
                                              • Instruction Fuzzy Hash: C6217A71900518FACB119FA5DD84A8EBFB8EB45360F10857AF904B62A0D67A4A509F68

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 795 4069c5-4069e5 GetSystemDirectoryW 796 4069e7 795->796 797 4069e9-4069eb 795->797 796->797 798 4069fc-4069fe 797->798 799 4069ed-4069f6 797->799 801 4069ff-406a32 wsprintfW LoadLibraryExW 798->801 799->798 800 4069f8-4069fa 799->800 800->801
                                              APIs
                                              • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004069DC
                                              • wsprintfW.USER32 ref: 00406A17
                                              • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A2B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: DirectoryLibraryLoadSystemwsprintf
                                              • String ID: %s%S.dll$UXTHEME$\
                                              • API String ID: 2200240437-1946221925
                                              • Opcode ID: 63130bafcb32548bd4340548baa3f8658423137b3882cd96386db367ad08b740
                                              • Instruction ID: e2ac2e7087162e0187f8b4d6776822ec24d6e31928394cf94a41c199a4feb156
                                              • Opcode Fuzzy Hash: 63130bafcb32548bd4340548baa3f8658423137b3882cd96386db367ad08b740
                                              • Instruction Fuzzy Hash: 3AF096B154121DA7DB14AB68DD0EF9B366CAB00705F11447EA646F20E0EB7CDA68CB98

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 802 404e71-404e88 803 404e95-404ea0 802->803 804 404e8a-404e93 802->804 806 404ea2-404ea7 803->806 807 404ea8-404eae 803->807 805 404ee3-404f37 call 4066a5 * 3 lstrlenW wsprintfW SetDlgItemTextW 804->805 806->807 808 404eb0-404eb4 807->808 809 404eb5-404ebb 807->809 808->809 811 404eca-404ee1 809->811 812 404ebd-404ec8 809->812 811->805 812->811
                                              APIs
                                              • lstrlenW.KERNEL32(00423748,00423748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F12
                                              • wsprintfW.USER32 ref: 00404F1B
                                              • SetDlgItemTextW.USER32(?,00423748), ref: 00404F2E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: ItemTextlstrlenwsprintf
                                              • String ID: %u.%u%s%s$H7B
                                              • API String ID: 3540041739-107966168
                                              • Opcode ID: 2edccdcb36c72f9bdce7a586f7ca7ee262dfb9f9a49697097ea36a1117f17e36
                                              • Instruction ID: 20619224473e8c08b4fba53027c62ddcf1c3fef784a2ba69f514aa474de30786
                                              • Opcode Fuzzy Hash: 2edccdcb36c72f9bdce7a586f7ca7ee262dfb9f9a49697097ea36a1117f17e36
                                              • Instruction Fuzzy Hash: 1A11D8736041283BDB00A5ADDC45E9F3298AB81338F150637FA26F61D1EA79882182E8

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 818 405b99-405be4 CreateDirectoryW 819 405be6-405be8 818->819 820 405bea-405bf7 GetLastError 818->820 821 405c11-405c13 819->821 820->821 822 405bf9-405c0d SetFileSecurityW 820->822 822->819 823 405c0f GetLastError 822->823 823->821
                                              APIs
                                              • CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405BDC
                                              • GetLastError.KERNEL32 ref: 00405BF0
                                              • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405C05
                                              • GetLastError.KERNEL32 ref: 00405C0F
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405BBF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: ErrorLast$CreateDirectoryFileSecurity
                                              • String ID: C:\Users\user\AppData\Local\Temp\
                                              • API String ID: 3449924974-823278215
                                              • Opcode ID: 4d8c721838b8a92ea27708fe49d100345a2f80ebd1be40878b53e15a1b169c58
                                              • Instruction ID: 886f74eda6482ab63e8fe18d08a652fea41827dc0a526659a7d7b5e138c44e4e
                                              • Opcode Fuzzy Hash: 4d8c721838b8a92ea27708fe49d100345a2f80ebd1be40878b53e15a1b169c58
                                              • Instruction Fuzzy Hash: 95010871D04219EAEF009FA1CD44BEFBBB8EF14314F04403ADA44B6180E7789648CB99

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 824 401c43-401c63 call 402d84 * 2 829 401c65-401c6c call 402da6 824->829 830 401c6f-401c73 824->830 829->830 832 401c75-401c7c call 402da6 830->832 833 401c7f-401c85 830->833 832->833 836 401cd3-401cfd call 402da6 * 2 FindWindowExW 833->836 837 401c87-401ca3 call 402d84 * 2 833->837 847 401d03 836->847 848 401cc3-401cd1 SendMessageW 837->848 849 401ca5-401cc1 SendMessageTimeoutW 837->849 850 401d06-401d09 847->850 848->847 849->850 851 402c2a-402c39 850->851 852 401d0f 850->852 852->851
                                              APIs
                                              • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB3
                                              • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CCB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: MessageSend$Timeout
                                              • String ID: !
                                              • API String ID: 1777923405-2657877971
                                              • Opcode ID: b183ccb6ab3284ced798d12f720e161a9248df31e23c89b80f307d5b894ef539
                                              • Instruction ID: e1c20d37316975b9b94706f7b3abd8da4b7b3b5136eece5bd2aa3cbae88a6c19
                                              • Opcode Fuzzy Hash: b183ccb6ab3284ced798d12f720e161a9248df31e23c89b80f307d5b894ef539
                                              • Instruction Fuzzy Hash: 28219E7190420AEFEF05AFA4D94AAAE7BB4FF44304F14453EF601B61D0D7B88941CB98
                                              APIs
                                              • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsf6353.tmp,00000023,00000011,00000002), ref: 004024D5
                                              • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsf6353.tmp,00000000,00000011,00000002), ref: 00402515
                                              • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsf6353.tmp,00000000,00000011,00000002), ref: 004025FD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: CloseValuelstrlen
                                              • String ID: C:\Users\user\AppData\Local\Temp\nsf6353.tmp
                                              • API String ID: 2655323295-1243876532
                                              • Opcode ID: ccbced7c383fe36513b27ab0f3831983de96ef15fa0590e398bf5cccbf7e4235
                                              • Instruction ID: a516967871aadb8e7373f7254d3c24ec0cdbd982f2b4049ed7d94b0996b6da2b
                                              • Opcode Fuzzy Hash: ccbced7c383fe36513b27ab0f3831983de96ef15fa0590e398bf5cccbf7e4235
                                              • Instruction Fuzzy Hash: 4011AF71E00108BEEF10AFA1CE49EAEB6B8EB44354F11443AF404B61C1DBB98D409658
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 004061A5
                                              • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,?,0040363E,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 004061C0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: CountFileNameTempTick
                                              • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                              • API String ID: 1716503409-44229769
                                              • Opcode ID: 6315ab6e6f8253ba2c88c9b6803a176270f8621abb800126aa0f3c3b7b9ef66c
                                              • Instruction ID: 21b676f9b33da427d45e0b2d6905a63b6509bf3d89a4e990effff8b21c6fdcbe
                                              • Opcode Fuzzy Hash: 6315ab6e6f8253ba2c88c9b6803a176270f8621abb800126aa0f3c3b7b9ef66c
                                              • Instruction Fuzzy Hash: C3F09076700214BFEB008F59DD05E9AB7BCEBA1710F11803AEE05EB180E6B0A9648768
                                              APIs
                                              • CloseHandle.KERNEL32(FFFFFFFF,C:\Users\user\AppData\Local\Temp\,00403B71,?), ref: 00403C37
                                              • CloseHandle.KERNEL32(FFFFFFFF,C:\Users\user\AppData\Local\Temp\,00403B71,?), ref: 00403C4B
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00403C2A
                                              • C:\Users\user\AppData\Local\Temp\nsf6353.tmp\, xrefs: 00403C5B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: CloseHandle
                                              • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsf6353.tmp\
                                              • API String ID: 2962429428-3831294090
                                              • Opcode ID: 3450910aa3eb4a83e9339ad550daa728f038e8843dee50fd20da138f79135bda
                                              • Instruction ID: ab9e488bef71b432d29da19662b82269d7b8f1628316f3e3d8f7e3aa77a32ace
                                              • Opcode Fuzzy Hash: 3450910aa3eb4a83e9339ad550daa728f038e8843dee50fd20da138f79135bda
                                              • Instruction Fuzzy Hash: 3BE0863244471496E5246F7DAF4D9853B285F413357248726F178F60F0C7389A9B4A9D
                                              APIs
                                                • Part of subcall function 00405FE2: CharNextW.USER32(?,?,00425F50,?,00406056,00425F50,00425F50,75923420,?,75922EE0,00405D94,?,75923420,75922EE0,00000000), ref: 00405FF0
                                                • Part of subcall function 00405FE2: CharNextW.USER32(00000000), ref: 00405FF5
                                                • Part of subcall function 00405FE2: CharNextW.USER32(00000000), ref: 0040600D
                                              • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                                                • Part of subcall function 00405B99: CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405BDC
                                              • SetCurrentDirectoryW.KERNELBASE(?,C:\Program Files (x86)\FastStone Capture,?,00000000,000000F0), ref: 0040164D
                                              Strings
                                              • C:\Program Files (x86)\FastStone Capture, xrefs: 00401640
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                              • String ID: C:\Program Files (x86)\FastStone Capture
                                              • API String ID: 1892508949-2214226362
                                              • Opcode ID: ff9909915b16c23767ee925164981e8f632181fd0fe0b495a8c7e415af322c96
                                              • Instruction ID: a0118e7b9b939ef3ea3e51add98df8039a5aa70d3b8e99a19be4f9c31e9f39fe
                                              • Opcode Fuzzy Hash: ff9909915b16c23767ee925164981e8f632181fd0fe0b495a8c7e415af322c96
                                              • Instruction Fuzzy Hash: 04112231508105EBCF30AFA0CD4099E36A0EF15329B28493BF901B22F1DB3E4982DB5E
                                              APIs
                                                • Part of subcall function 00406668: lstrcpynW.KERNEL32(?,?,00000400,004037B0,00429260,NSIS Error), ref: 00406675
                                                • Part of subcall function 00405FE2: CharNextW.USER32(?,?,00425F50,?,00406056,00425F50,00425F50,75923420,?,75922EE0,00405D94,?,75923420,75922EE0,00000000), ref: 00405FF0
                                                • Part of subcall function 00405FE2: CharNextW.USER32(00000000), ref: 00405FF5
                                                • Part of subcall function 00405FE2: CharNextW.USER32(00000000), ref: 0040600D
                                              • lstrlenW.KERNEL32(00425F50,00000000,00425F50,00425F50,75923420,?,75922EE0,00405D94,?,75923420,75922EE0,00000000), ref: 00406098
                                              • GetFileAttributesW.KERNELBASE(00425F50,00425F50,00425F50,00425F50,00425F50,00425F50,00000000,00425F50,00425F50,75923420,?,75922EE0,00405D94,?,75923420,75922EE0), ref: 004060A8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                              • String ID: P_B
                                              • API String ID: 3248276644-906794629
                                              • Opcode ID: 900e3a3aedd828ccf636743a116f58552bc6887dcb5d3e9637a901da882d1290
                                              • Instruction ID: df110f430b83b9381375b5fd3fa67f6c4419d4890c6468873e0fced3c2676832
                                              • Opcode Fuzzy Hash: 900e3a3aedd828ccf636743a116f58552bc6887dcb5d3e9637a901da882d1290
                                              • Instruction Fuzzy Hash: 0DF07826144A1216E622B23A0C05BAF05098F82354B07063FFC93B22E1DF3C8973C43E
                                              APIs
                                              • RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,?,00000800,00000000,?,00000000,?,?,Remove folder: ,?,?,0040679D,80000002), ref: 0040657C
                                              • RegCloseKey.KERNELBASE(?,?,0040679D,80000002,Software\Microsoft\Windows\CurrentVersion,Remove folder: ,Remove folder: ,Remove folder: ,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\), ref: 00406587
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: CloseQueryValue
                                              • String ID: Remove folder:
                                              • API String ID: 3356406503-1958208860
                                              • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                              • Instruction ID: 52dd0fe420a7c1e2827d1a164217834099ee72e945ce70567094b216899e5676
                                              • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                              • Instruction Fuzzy Hash: C4017C72500209FADF21CF51DD09EDB3BA8EF54364F01803AFD1AA2190D738D964DBA4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9f3cc98df1e3ecd253cf91825a4064c55af45d063240f038e3dc270cc3f81a7c
                                              • Instruction ID: 10cc2cc0f2c892254e5285b7a8bac4c216a70fda8fb68dfa7c3680dd08f727d3
                                              • Opcode Fuzzy Hash: 9f3cc98df1e3ecd253cf91825a4064c55af45d063240f038e3dc270cc3f81a7c
                                              • Instruction Fuzzy Hash: 55A15571E04228DBDF28CFA8C8547ADBBB1FF44305F10842AD856BB281D778A986DF45
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 97748a737734167d5846b9d8dd4738ada3f75d0b833fdafa89234df63502b4a5
                                              • Instruction ID: d49815ad38d406b3cd0a1a90ea7be1526168d9e39684835ffa6a026ef1ef4849
                                              • Opcode Fuzzy Hash: 97748a737734167d5846b9d8dd4738ada3f75d0b833fdafa89234df63502b4a5
                                              • Instruction Fuzzy Hash: 91913270D04228DBEF28CF98C8547ADBBB1FF44305F14816AD856BB281D778A986DF45
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 93c083d05bcdf6195ca23c2a54f1652f9efbc2f2339d63ff2f761c89645e7c92
                                              • Instruction ID: 0a676f48c9952aad729ccf503b6a86ce95496029d8c73069f89f3073be052f6e
                                              • Opcode Fuzzy Hash: 93c083d05bcdf6195ca23c2a54f1652f9efbc2f2339d63ff2f761c89645e7c92
                                              • Instruction Fuzzy Hash: C3813471D08228DFDF24CFA8C8847ADBBB1FB44305F24816AD456BB281D778A986DF05
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 42fe04b556333c9da529a864bcd0db0a91825228453d2ef5331aa29539740558
                                              • Instruction ID: 41bbaa2e3590000dceee7c9791d291245bc26db239967492cd44d063337b5de0
                                              • Opcode Fuzzy Hash: 42fe04b556333c9da529a864bcd0db0a91825228453d2ef5331aa29539740558
                                              • Instruction Fuzzy Hash: 3E814831D08228DBEF28CFA8C8447ADBBB1FF44305F14816AD856B7281D778A986DF45
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7ccf24f4e081119859c9f0e48baaaa1d38e3934f3a3b1d8a87677b84cb71901f
                                              • Instruction ID: 4a3513360c1d1cc4287bdabe5afcaa460628bed3c0d7ae87261646ca99be8a9f
                                              • Opcode Fuzzy Hash: 7ccf24f4e081119859c9f0e48baaaa1d38e3934f3a3b1d8a87677b84cb71901f
                                              • Instruction Fuzzy Hash: 0D711271D04228DBEF28CF98C9947ADBBF1FB44305F14806AD856B7280D738A986DF05
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c68610f165bc536a6a66ce61bc987e677a2aaa57ebbfa987bd426c3fc0f92c56
                                              • Instruction ID: aecab3f40db1f9fc07a3dc9ea3777efa7aa3d7dc23f88bc09ddd959c6243594a
                                              • Opcode Fuzzy Hash: c68610f165bc536a6a66ce61bc987e677a2aaa57ebbfa987bd426c3fc0f92c56
                                              • Instruction Fuzzy Hash: 2B711571D04228DBEF28CF98C8547ADBBB1FF44305F14806AD856BB281D778A986DF05
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b33066b9a67caffcdb2859c2a3d237c195f810e8b6f417b46283b98aba377de3
                                              • Instruction ID: 947ff9f4813c08031b822263453b6bbc7859602ae013fffc9a74d3363ad91bbb
                                              • Opcode Fuzzy Hash: b33066b9a67caffcdb2859c2a3d237c195f810e8b6f417b46283b98aba377de3
                                              • Instruction Fuzzy Hash: FE713471E04228DBEF28CF98C8547ADBBB1FF44305F15806AD856BB281C778A986DF45
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 0040348D
                                                • Part of subcall function 004035F8: SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032F6,?), ref: 00403606
                                              • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,004033A3,00000004,00000000,00000000,?,?,0040331D,000000FF,00000000,00000000,?,?), ref: 004034C0
                                              • SetFilePointer.KERNELBASE(01F09863,00000000,00000000,00414EF0,00004000,?,00000000,004033A3,00000004,00000000,00000000,?,?,0040331D,000000FF,00000000), ref: 004035BB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: FilePointer$CountTick
                                              • String ID:
                                              • API String ID: 1092082344-0
                                              • Opcode ID: 3ac154d52ea9800dffc85ef1316eb03f3be91f57b238af8bcd161a90f23d8065
                                              • Instruction ID: 4a0f782daef8a724a5dada35133bb9654e3c612a62d69fcdf17392b9264be50a
                                              • Opcode Fuzzy Hash: 3ac154d52ea9800dffc85ef1316eb03f3be91f57b238af8bcd161a90f23d8065
                                              • Instruction Fuzzy Hash: 3A31AEB2650205EFC7209F29EE848263BADF70475A755023BE900B22F1C7B59D42DB9D
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00402103
                                                • Part of subcall function 004056CA: lstrlenW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                                                • Part of subcall function 004056CA: lstrlenW.KERNEL32(004030A8,Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                                                • Part of subcall function 004056CA: lstrcatW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,004030A8,004030A8,Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,00000000,00000000,00000000), ref: 00405725
                                                • Part of subcall function 004056CA: SetWindowTextW.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\), ref: 00405737
                                                • Part of subcall function 004056CA: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                                                • Part of subcall function 004056CA: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                                                • Part of subcall function 004056CA: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                                              • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00402114
                                              • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 00402191
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                              • String ID:
                                              • API String ID: 334405425-0
                                              • Opcode ID: 49624561057d65463e648c025d3924b1173f5861ada87d1c47d5b8f7605275f5
                                              • Instruction ID: 1e7e134340f86907485d462c64894228b35b3344cd4f3d252167f9901203d809
                                              • Opcode Fuzzy Hash: 49624561057d65463e648c025d3924b1173f5861ada87d1c47d5b8f7605275f5
                                              • Instruction Fuzzy Hash: C521C231904104FADF11AFA5CF48A9D7A70BF48354F60413BF605B91E0DBBD8A929A5D
                                              APIs
                                              • GlobalFree.KERNEL32(00000000), ref: 00401C0B
                                              • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401C1D
                                                • Part of subcall function 004066A5: lstrcatW.KERNEL32(Remove folder: ,\Microsoft\Internet Explorer\Quick Launch), ref: 0040684A
                                                • Part of subcall function 004066A5: lstrlenW.KERNEL32(Remove folder: ,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,?,00405701,Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,00000000), ref: 004068A4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: Global$AllocFreelstrcatlstrlen
                                              • String ID: ShellExecAsUser
                                              • API String ID: 3292104215-4107788475
                                              • Opcode ID: 4319b31a17754bffce461f57a5489b402a00cd847fb6eeae40cdae925115eaf0
                                              • Instruction ID: d74cddccbdd50a14e5bf5e3e63826a63b2a65df0fd836753f00777670cd3b466
                                              • Opcode Fuzzy Hash: 4319b31a17754bffce461f57a5489b402a00cd847fb6eeae40cdae925115eaf0
                                              • Instruction Fuzzy Hash: 5321D872904210DBDB20EFA4DEC4E5E73A4AB047157150A3BF542F72D0D6BD9C518BAD
                                              APIs
                                                • Part of subcall function 00406133: GetFileAttributesW.KERNELBASE(?,?,00405D38,?,?,00000000,00405F0E,?,?,?,?), ref: 00406138
                                                • Part of subcall function 00406133: SetFileAttributesW.KERNELBASE(?,00000000), ref: 0040614C
                                              • RemoveDirectoryW.KERNELBASE(?,?,?,00000000,00405F0E), ref: 00405D47
                                              • DeleteFileW.KERNELBASE(?,?,?,00000000,00405F0E), ref: 00405D4F
                                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405D67
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: File$Attributes$DeleteDirectoryRemove
                                              • String ID:
                                              • API String ID: 1655745494-0
                                              • Opcode ID: 80ad4dccc83bd5cfbcd7ef077da852fe0cb096cb549a199170c52783d075929e
                                              • Instruction ID: f7500ddcb6900c42920b0fa7cdf939b3a50fd8fb6693fff67202f671924a8b23
                                              • Opcode Fuzzy Hash: 80ad4dccc83bd5cfbcd7ef077da852fe0cb096cb549a199170c52783d075929e
                                              • Instruction Fuzzy Hash: 6DE0E531218A9156C3207734AD0CB5B2A98EF86314F09893FF5A2B11E0D77885078AAD
                                              APIs
                                              • SendMessageW.USER32(00000408,?,00000000,004041FC), ref: 004045BB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID: x
                                              • API String ID: 3850602802-2363233923
                                              • Opcode ID: a4e2778218c9fdeab8ae4952123a6e605dd424a78c20075fb3486bdcc909a4f1
                                              • Instruction ID: 271d720e87c3080f9bc4c684b425461430c88a900e0fa794081ec75d4c8aeb56
                                              • Opcode Fuzzy Hash: a4e2778218c9fdeab8ae4952123a6e605dd424a78c20075fb3486bdcc909a4f1
                                              • Instruction Fuzzy Hash: 58C01271646200FBCB208B00EE00F067A21B7A4B02F2088B9FB81240B48A314822DB2D
                                              APIs
                                              • SetFilePointer.KERNELBASE(?,00000000,00000000,00000000,00000000,?,?,0040331D,000000FF,00000000,00000000,?,?), ref: 00403396
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: FilePointer
                                              • String ID:
                                              • API String ID: 973152223-0
                                              • Opcode ID: b1bf35b654f0c361909532a2badc84153f12731a676864620281ad9f652e4f28
                                              • Instruction ID: 963a71f16df831595788c30304fa9cedbf2cad19eb63879c1ada4fe15c9ed8fa
                                              • Opcode Fuzzy Hash: b1bf35b654f0c361909532a2badc84153f12731a676864620281ad9f652e4f28
                                              • Instruction Fuzzy Hash: 93319F70200219EFDB129F65ED84E9A3FA8FF00355B10443AF905EA1A1D778CE51DBA9
                                              APIs
                                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                              • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: 09e122a9c5ca6d14e20a0c17f6d9bb0c47d9e5f073d0cae9cf8d248ab6fa9320
                                              • Instruction ID: af17251ef12b8b272b5eaf8d1bef107274ce64b6e67bb2dd4604cf2723900e86
                                              • Opcode Fuzzy Hash: 09e122a9c5ca6d14e20a0c17f6d9bb0c47d9e5f073d0cae9cf8d248ab6fa9320
                                              • Instruction Fuzzy Hash: 6F012831724220EBEB295B389D05B6A3698E710714F10857FF855F76F1E678CC029B6D
                                              APIs
                                              • OleInitialize.OLE32(00000000), ref: 004057AD
                                                • Part of subcall function 00404610: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404622
                                              • CoUninitialize.COMBASE(00000404,00000000,?,00000000,?), ref: 004057F9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: InitializeMessageSendUninitialize
                                              • String ID:
                                              • API String ID: 2896919175-0
                                              • Opcode ID: b14588aebbadd05bc97f1dd14ffe2b6982532d9bfcd69c4411fdff16e8679f7d
                                              • Instruction ID: 683c9d360a8619809caff371317e20043972a5eac84f98be19084c03997f3dfe
                                              • Opcode Fuzzy Hash: b14588aebbadd05bc97f1dd14ffe2b6982532d9bfcd69c4411fdff16e8679f7d
                                              • Instruction Fuzzy Hash: 84F09072600600CBD6215B54AD01B17B764EB84304F45447FFF89732F0DB7A48529A6E
                                              APIs
                                              • ShowWindow.USER32(00000000,00000000), ref: 00401EFC
                                              • EnableWindow.USER32(00000000,00000000), ref: 00401F07
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: Window$EnableShow
                                              • String ID:
                                              • API String ID: 1136574915-0
                                              • Opcode ID: d682e64da976263d74778dcd61bd470f9ad8341d2b96c4d867934af8fae03e48
                                              • Instruction ID: 74d914ea4967392a65d1c9fdd8f91c6329c2dde8704c14122971abf6b6e16597
                                              • Opcode Fuzzy Hash: d682e64da976263d74778dcd61bd470f9ad8341d2b96c4d867934af8fae03e48
                                              • Instruction Fuzzy Hash: 14E0D872908201CFE705EBA4EE485AD73F0EF40315710097FE401F11D0DBB54C00862D
                                              APIs
                                              • GetModuleHandleA.KERNEL32(?,00000020,?,00403750,0000000B), ref: 00406A47
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00406A62
                                                • Part of subcall function 004069C5: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004069DC
                                                • Part of subcall function 004069C5: wsprintfW.USER32 ref: 00406A17
                                                • Part of subcall function 004069C5: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A2B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                              • String ID:
                                              • API String ID: 2547128583-0
                                              • Opcode ID: a89557e88259ac32882439a66efe2bded2b7fe37332f597cb2162f61758b0433
                                              • Instruction ID: 0464b4a7853edb7079d0776797c383171681067eb8499b99987f1e8ea9f8efb8
                                              • Opcode Fuzzy Hash: a89557e88259ac32882439a66efe2bded2b7fe37332f597cb2162f61758b0433
                                              • Instruction Fuzzy Hash: E0E086727042106AD210A6745D08D3773E8ABC6711307883EF557F2040D738DC359A79
                                              APIs
                                              • SendMessageW.USER32(?,0000000B,00000001), ref: 00402C14
                                              • InvalidateRect.USER32(?), ref: 00402C24
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: InvalidateMessageRectSend
                                              • String ID:
                                              • API String ID: 909852535-0
                                              • Opcode ID: f432a0a30971dc187192fe2491b4b63328d533872b60b8ab23492fb2b34197a6
                                              • Instruction ID: c061831bd97a7b49b699665abee3b6b910fafb94a2d14f64d6e35fdc86e4b588
                                              • Opcode Fuzzy Hash: f432a0a30971dc187192fe2491b4b63328d533872b60b8ab23492fb2b34197a6
                                              • Instruction Fuzzy Hash: 36E08C72700408FFEB11CBA4EE84DAEB7B9FB40315F00007AF502A00A0D7300D51CA28
                                              APIs
                                              • FreeLibrary.KERNELBASE(?,75923420,00000000,75922EE0,00403C59,C:\Users\user\AppData\Local\Temp\,00403B71,?), ref: 00403C9C
                                              • GlobalFree.KERNEL32(?), ref: 00403CA3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: Free$GlobalLibrary
                                              • String ID:
                                              • API String ID: 1100898210-0
                                              • Opcode ID: e868f33ba05eeb96666b2da3448a48ed76ae7177416a2bb01e196352cb617163
                                              • Instruction ID: 1b4b668df254a36c82b8f96f79c5ae0e05fb6c29bd97d86a5de4613e9375b038
                                              • Opcode Fuzzy Hash: e868f33ba05eeb96666b2da3448a48ed76ae7177416a2bb01e196352cb617163
                                              • Instruction Fuzzy Hash: 0AE08C335052205BD6211F55EA0875A7768AF94B26F06006AE980BB26087781C424BC8
                                              APIs
                                              • GetFileAttributesW.KERNELBASE(00000003,00403113,C:\Users\user\Desktop\FSCaptureSetup107.exe,80000000,00000003), ref: 0040615C
                                              • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040617E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: File$AttributesCreate
                                              • String ID:
                                              • API String ID: 415043291-0
                                              • Opcode ID: bc48b18717e6d0ecb647aea7fc0ab07bebcbb2e2e3a0bd9572a83b91cd6509df
                                              • Instruction ID: 0e1b57c135d9ed337dcee0f1630d7a3ffd6699826ab823f4ff8c6da5104765b0
                                              • Opcode Fuzzy Hash: bc48b18717e6d0ecb647aea7fc0ab07bebcbb2e2e3a0bd9572a83b91cd6509df
                                              • Instruction Fuzzy Hash: DCD09E71254201AFEF0D8F20DF16F2E7AA2EB94B04F11952CB682940E1DAB15C15AB19
                                              APIs
                                              • GetFileAttributesW.KERNELBASE(?,?,00405D38,?,?,00000000,00405F0E,?,?,?,?), ref: 00406138
                                              • SetFileAttributesW.KERNELBASE(?,00000000), ref: 0040614C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: AttributesFile
                                              • String ID:
                                              • API String ID: 3188754299-0
                                              • Opcode ID: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                              • Instruction ID: 3e6336b5c460747e2e1e0fbe3c4db8defb42c0044e1a92967a1d29a512d2a4bc
                                              • Opcode Fuzzy Hash: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                              • Instruction Fuzzy Hash: 73D0C972514130ABC2102728AE0889ABB56EB64271B014A35F9A5A62B0CB304C628A98
                                              APIs
                                              • CreateDirectoryW.KERNELBASE(?,00000000,00403633,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00405C1C
                                              • GetLastError.KERNEL32 ref: 00405C2A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: CreateDirectoryErrorLast
                                              • String ID:
                                              • API String ID: 1375471231-0
                                              • Opcode ID: 3d774f31bfc7c5d70b6f8c035fc875d1b29c99f0800ffc9da4ab7b914865a185
                                              • Instruction ID: 66e62c5d6c7775ff4cea72667941029308d228c48495a605f612c1d2d9e1fc74
                                              • Opcode Fuzzy Hash: 3d774f31bfc7c5d70b6f8c035fc875d1b29c99f0800ffc9da4ab7b914865a185
                                              • Instruction Fuzzy Hash: FBC04C31218605AEE7605B219F0CB177A94DB50741F114839E186F40A0DA788455D92D
                                              APIs
                                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004023E9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: PrivateProfileStringWrite
                                              • String ID:
                                              • API String ID: 390214022-0
                                              • Opcode ID: 498f41ba95d1dc934bc83887be66b3af98def7cf3aba53834c7129a1bd888199
                                              • Instruction ID: de4cb5ca612a6b97b91745c8380e1d92b079ec7b797fcdaf288f77766e75fad7
                                              • Opcode Fuzzy Hash: 498f41ba95d1dc934bc83887be66b3af98def7cf3aba53834c7129a1bd888199
                                              • Instruction Fuzzy Hash: FAE04F31900124BBDF603AB11F8DEAE205C6FC6744B18013EF911BA1C2E9FC8C4146AD
                                              APIs
                                              • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E57,00000000,?,?), ref: 0040652C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: f0170b29b94a961cdf0cc122a920c286c7e5b726b195fdee8f598fb45efbb6e4
                                              • Instruction ID: 390987c888b9fe28ccc3a202ccefe0e129b8fdbaba7b34d45eb5723cdb444700
                                              • Opcode Fuzzy Hash: f0170b29b94a961cdf0cc122a920c286c7e5b726b195fdee8f598fb45efbb6e4
                                              • Instruction Fuzzy Hash: C1E0ECB2010109BEEF099F90EC0ADBB372DEB04704F41492EF907E4091E6B5AE70AA34
                                              APIs
                                              • WriteFile.KERNELBASE(?,00000000,00000000,00000000,00000000,00413D82,0040CEF0,00403579,0040CEF0,00413D82,00414EF0,00004000,?,00000000,004033A3,00000004), ref: 0040621E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: FileWrite
                                              • String ID:
                                              • API String ID: 3934441357-0
                                              • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                              • Instruction ID: 398385dbb58ca0a44fa402a726e0ab0b2131cea3ae709c8a1b666252059dd88a
                                              • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                              • Instruction Fuzzy Hash: F6E08632141129EBCF10AE548C00EEB375CFB01350F014476F955E3040D330E93087A5
                                              APIs
                                              • ReadFile.KERNELBASE(?,00000000,00000000,00000000,00000000,00414EF0,0040CEF0,004035F5,?,?,004034F9,00414EF0,00004000,?,00000000,004033A3), ref: 004061EF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: FileRead
                                              • String ID:
                                              • API String ID: 2738559852-0
                                              • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                              • Instruction ID: 689b8facb1381159ac92aeccc4703b7db47ce2620db9a14c340ec3ef8a35c8b1
                                              • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                              • Instruction Fuzzy Hash: C1E0863250021AABDF10AE518C04AEB375CEB01360F014477F922E2150D230E82187E8
                                              APIs
                                              • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402425
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: PrivateProfileString
                                              • String ID:
                                              • API String ID: 1096422788-0
                                              • Opcode ID: 7d71ac8ddd31db18f378b319f763d6172168bca54096192b0f97eaa7b6b6bd09
                                              • Instruction ID: 209997e2e20356d43fdb77e3237b303e11e03b8f2c16ee2f2baf27e4b220ec87
                                              • Opcode Fuzzy Hash: 7d71ac8ddd31db18f378b319f763d6172168bca54096192b0f97eaa7b6b6bd09
                                              • Instruction Fuzzy Hash: 05E01A30C00229FADB10AFA0CD09EAD3668BF41340F14052AF510AA0D1E7F889409789
                                              APIs
                                              • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,?,?,?,00406563,?,00000000,?,?,Remove folder: ,?), ref: 004064F9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: Open
                                              • String ID:
                                              • API String ID: 71445658-0
                                              • Opcode ID: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                                              • Instruction ID: 5036765eb4ab6e58186d81024f5778724aa2024cd81e2e1d5ca813995cf5404a
                                              • Opcode Fuzzy Hash: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                                              • Instruction Fuzzy Hash: BAD0123210020DBBDF115F90AD01FAB375DAB08310F018426FE06A4092D775D534A728
                                              APIs
                                                • Part of subcall function 004066A5: lstrcatW.KERNEL32(Remove folder: ,\Microsoft\Internet Explorer\Quick Launch), ref: 0040684A
                                                • Part of subcall function 004066A5: lstrlenW.KERNEL32(Remove folder: ,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,?,00405701,Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,00000000), ref: 004068A4
                                              • SetDlgItemTextW.USER32(?,?,00000000), ref: 004045DE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: ItemTextlstrcatlstrlen
                                              • String ID:
                                              • API String ID: 281422827-0
                                              • Opcode ID: 73b3e70f26523695344aa313222f8106b15ff01fe64d2e6c86eba35ea0453547
                                              • Instruction ID: ac81fd1055ba0297197cac3df011722fda0f302089e5b839fe348bc6695a069d
                                              • Opcode Fuzzy Hash: 73b3e70f26523695344aa313222f8106b15ff01fe64d2e6c86eba35ea0453547
                                              • Instruction Fuzzy Hash: 77C04C7554C300BFE641A755CC42F1FB799EF94319F04C92EB19DE11D1C63984309A2A
                                              APIs
                                              • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404622
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: 8557fc69485774ba4641c6a2d2b4437b1a5152abf7221d5f63999a85994ee7b6
                                              • Instruction ID: 1d0f09303225af8c469e983b8f6ba21d59f3f36861eec243a4bc5be8392dea83
                                              • Opcode Fuzzy Hash: 8557fc69485774ba4641c6a2d2b4437b1a5152abf7221d5f63999a85994ee7b6
                                              • Instruction Fuzzy Hash: 9EC09B71741700FBDE209B509F45F077794A754701F154979B741F60E0D775D410D62D
                                              APIs
                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032F6,?), ref: 00403606
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: FilePointer
                                              • String ID:
                                              • API String ID: 973152223-0
                                              • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                              • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
                                              • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                              • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
                                              APIs
                                              • SendMessageW.USER32(00000028,?,00000001,00404424), ref: 00404607
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: 70666cfd2db8a5712e0e3ed728d50a5e19955e25533eceda6abdc0f56bdf790a
                                              • Instruction ID: 26063d6d883ff380d2e1d7f9fe2b9d631bf033e6200e0a233fd0d302f8c02db7
                                              • Opcode Fuzzy Hash: 70666cfd2db8a5712e0e3ed728d50a5e19955e25533eceda6abdc0f56bdf790a
                                              • Instruction Fuzzy Hash: 5BB01235286A00FBDE614B00DE09F457E62F764B01F048078F741240F0CAB300B5DF19
                                              APIs
                                              • KiUserCallbackDispatcher.NTDLL(?,004043BD), ref: 004045F0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: CallbackDispatcherUser
                                              • String ID:
                                              • API String ID: 2492992576-0
                                              • Opcode ID: b9cabee76f1705efe6df0b682491f715d60f75bd340f366a7093c5de42737780
                                              • Instruction ID: 97f05af551d2e904d84950d91e3a9b28448307360fbef328a82585e9573e9e03
                                              • Opcode Fuzzy Hash: b9cabee76f1705efe6df0b682491f715d60f75bd340f366a7093c5de42737780
                                              • Instruction Fuzzy Hash: DBA001B6604500ABDE129F61EF09D0ABB72EBA4B02B418579A28590034CA365961FB1D
                                              APIs
                                              • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: FileFindFirst
                                              • String ID:
                                              • API String ID: 1974802433-0
                                              • Opcode ID: 81649c9ef60b362743358cc04841f69d280dec374dabcafdd230337d8cd45dd0
                                              • Instruction ID: b84bdfeecc4e8c0803ac0e71b8711fc90ef1d688bdc4be786e729a17b55638d3
                                              • Opcode Fuzzy Hash: 81649c9ef60b362743358cc04841f69d280dec374dabcafdd230337d8cd45dd0
                                              • Instruction Fuzzy Hash: 47F05E71A04105EBDB01DBB4EE49AAEB378EF14314F60457BE101F21D0E7B88E529B29
                                              APIs
                                              • GetDlgItem.USER32(?,000003F9), ref: 00405049
                                              • GetDlgItem.USER32(?,00000408), ref: 00405054
                                              • GlobalAlloc.KERNEL32(00000040,?), ref: 0040509E
                                              • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 004050B5
                                              • SetWindowLongW.USER32(?,000000FC,0040563E), ref: 004050CE
                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 004050E2
                                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 004050F4
                                              • SendMessageW.USER32(?,00001109,00000002), ref: 0040510A
                                              • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405116
                                              • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405128
                                              • DeleteObject.GDI32(00000000), ref: 0040512B
                                              • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405156
                                              • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405162
                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 004051FD
                                              • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040522D
                                                • Part of subcall function 004045F9: SendMessageW.USER32(00000028,?,00000001,00404424), ref: 00404607
                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405241
                                              • GetWindowLongW.USER32(?,000000F0), ref: 0040526F
                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0040527D
                                              • ShowWindow.USER32(?,00000005), ref: 0040528D
                                              • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405388
                                              • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004053ED
                                              • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405402
                                              • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405426
                                              • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405446
                                              • ImageList_Destroy.COMCTL32(?), ref: 0040545B
                                              • GlobalFree.KERNEL32(?), ref: 0040546B
                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004054E4
                                              • SendMessageW.USER32(?,00001102,?,?), ref: 0040558D
                                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040559C
                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 004055C7
                                              • ShowWindow.USER32(?,00000000), ref: 00405615
                                              • GetDlgItem.USER32(?,000003FE), ref: 00405620
                                              • ShowWindow.USER32(00000000), ref: 00405627
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                              • String ID: $M$N
                                              • API String ID: 2564846305-813528018
                                              • Opcode ID: 950969970af6d10ef62121ad67a768569704eb6391eae900e1ce4f9d1827afee
                                              • Instruction ID: a1eb65f7683e17450fca8d4cb4c1055b074660be5b1b810df034ff690b7f681c
                                              • Opcode Fuzzy Hash: 950969970af6d10ef62121ad67a768569704eb6391eae900e1ce4f9d1827afee
                                              • Instruction Fuzzy Hash: 2A025CB0900609EFDF20DF65CD45AAE7BB5FB44315F10817AEA10BA2E1D7798A52CF18
                                              APIs
                                              • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406449,?,?), ref: 004062E9
                                              • GetShortPathNameW.KERNEL32(?,00426DE8,00000400), ref: 004062F2
                                                • Part of subcall function 004060BD: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060CD
                                                • Part of subcall function 004060BD: lstrlenA.KERNEL32(00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060FF
                                              • GetShortPathNameW.KERNEL32(?,004275E8,00000400), ref: 0040630F
                                              • wsprintfA.USER32 ref: 0040632D
                                              • GetFileSize.KERNEL32(00000000,00000000,004275E8,C0000000,00000004,004275E8,?,?,?,?,?), ref: 00406368
                                              • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406377
                                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004063AF
                                              • SetFilePointer.KERNEL32(0040A5B0,00000000,00000000,00000000,00000000,004269E8,00000000,-0000000A,0040A5B0,00000000,[Rename],00000000,00000000,00000000), ref: 00406405
                                              • GlobalFree.KERNEL32(00000000), ref: 00406416
                                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0040641D
                                                • Part of subcall function 00406158: GetFileAttributesW.KERNELBASE(00000003,00403113,C:\Users\user\Desktop\FSCaptureSetup107.exe,80000000,00000003), ref: 0040615C
                                                • Part of subcall function 00406158: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040617E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                              • String ID: %ls=%ls$[Rename]$mB$uB$uB
                                              • API String ID: 2171350718-2295842750
                                              • Opcode ID: 07ea5d3dd502240bf86d0c298f94c43ad2335bec49c481c59c36197298e6ebad
                                              • Instruction ID: df9b4e9fb9d32bd4c250032a1d399944af7a2e4c2f0bdec2b7d3959d12e60cc8
                                              • Opcode Fuzzy Hash: 07ea5d3dd502240bf86d0c298f94c43ad2335bec49c481c59c36197298e6ebad
                                              • Instruction Fuzzy Hash: B8314331200315BBD2206B619D49F5B3AACEF85704F16003BFD02FA2C2EA7DD82186BD
                                              APIs
                                              • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                              • BeginPaint.USER32(?,?), ref: 00401047
                                              • GetClientRect.USER32(?,?), ref: 0040105B
                                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                              • DeleteObject.GDI32(?), ref: 004010ED
                                              • CreateFontIndirectW.GDI32(?), ref: 00401105
                                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                              • SelectObject.GDI32(00000000,?), ref: 00401140
                                              • DrawTextW.USER32(00000000,00429260,000000FF,00000010,00000820), ref: 00401156
                                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                              • DeleteObject.GDI32(?), ref: 00401165
                                              • EndPaint.USER32(?,?), ref: 0040116E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                              • String ID: F
                                              • API String ID: 941294808-1304234792
                                              • Opcode ID: 8da9fae8b34351ceae2931000ebd9f39a308799c7d87b7a6dbcfe72b45b7384c
                                              • Instruction ID: e2f9fea5dfd6f059ba8eeb08e8d10ac227d01a2162b8a260283931f50cd0bfbf
                                              • Opcode Fuzzy Hash: 8da9fae8b34351ceae2931000ebd9f39a308799c7d87b7a6dbcfe72b45b7384c
                                              • Instruction Fuzzy Hash: 33418B71800209EFCF058FA5DE459AF7BB9FF45315F00802AF991AA2A0C7349A55DFA4
                                              APIs
                                              • GetWindowLongW.USER32(?,000000EB), ref: 00404648
                                              • GetSysColor.USER32(00000000), ref: 00404686
                                              • SetTextColor.GDI32(?,00000000), ref: 00404692
                                              • SetBkMode.GDI32(?,?), ref: 0040469E
                                              • GetSysColor.USER32(?), ref: 004046B1
                                              • SetBkColor.GDI32(?,?), ref: 004046C1
                                              • DeleteObject.GDI32(?), ref: 004046DB
                                              • CreateBrushIndirect.GDI32(?), ref: 004046E5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                              • String ID:
                                              • API String ID: 2320649405-0
                                              • Opcode ID: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                              • Instruction ID: e78b8cc9c8042372c9a7340b9b8aa9b23ded286a9f8ddc7240a2e2d8bd1f46c0
                                              • Opcode Fuzzy Hash: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                              • Instruction Fuzzy Hash: DE2197715007049FC7309F28D908B5BBBF8AF42714F008D2EE992A22E1D739D944DB58
                                              APIs
                                              • ReadFile.KERNEL32(?,?,?,?), ref: 00402758
                                              • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402793
                                              • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027B6
                                              • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027CC
                                                • Part of subcall function 00406239: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 0040624F
                                              • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 00402878
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: File$Pointer$ByteCharMultiWide$Read
                                              • String ID: 9
                                              • API String ID: 163830602-2366072709
                                              • Opcode ID: c494a9c5f1831dca55446a6dfc25bb45b63b896379fbbdb0ec38153142a3ac1c
                                              • Instruction ID: 581cf2785626502de532f206a1de9da9d9b8d20bcd24121b7f7bd1133decb9a2
                                              • Opcode Fuzzy Hash: c494a9c5f1831dca55446a6dfc25bb45b63b896379fbbdb0ec38153142a3ac1c
                                              • Instruction Fuzzy Hash: CE51FB75D00219AADF20EF95CA88AAEBB75FF04304F50417BE541B62D4D7B49D82CB58
                                              APIs
                                              • CharNextW.USER32(?,*?|<>/":,00000000,00000000,75923420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406952
                                              • CharNextW.USER32(?,?,?,00000000,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406961
                                              • CharNextW.USER32(?,00000000,75923420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406966
                                              • CharPrevW.USER32(?,?,75923420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406979
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: Char$Next$Prev
                                              • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\
                                              • API String ID: 589700163-1201062745
                                              • Opcode ID: 4a25a2118415850d7bb15acf585ec7f7b5de772317bec8c7d00468289de3f440
                                              • Instruction ID: d28fb8c2eefe6f61a155ceb01790bbf8b21f4710aa7989e54d8eeb8481a577c9
                                              • Opcode Fuzzy Hash: 4a25a2118415850d7bb15acf585ec7f7b5de772317bec8c7d00468289de3f440
                                              • Instruction Fuzzy Hash: 2611089580061295DB303B18CC40BB762F8AF99B50F12403FE98A776C1E77C4C9286BD
                                              APIs
                                              • DestroyWindow.USER32(00000000,00000000), ref: 00403049
                                              • GetTickCount.KERNEL32 ref: 00403067
                                              • wsprintfW.USER32 ref: 00403095
                                                • Part of subcall function 004056CA: lstrlenW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                                                • Part of subcall function 004056CA: lstrlenW.KERNEL32(004030A8,Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                                                • Part of subcall function 004056CA: lstrcatW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,004030A8,004030A8,Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,00000000,00000000,00000000), ref: 00405725
                                                • Part of subcall function 004056CA: SetWindowTextW.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\), ref: 00405737
                                                • Part of subcall function 004056CA: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                                                • Part of subcall function 004056CA: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                                                • Part of subcall function 004056CA: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                                              • CreateDialogParamW.USER32(0000006F,00000000,00402F93,00000000), ref: 004030B9
                                              • ShowWindow.USER32(00000000,00000005), ref: 004030C7
                                                • Part of subcall function 00403012: MulDiv.KERNEL32(00000000,00000064,00006E92), ref: 00403027
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                              • String ID: ... %d%%
                                              • API String ID: 722711167-2449383134
                                              • Opcode ID: eb5829c7fffbc7bf65dde30d15e1f0a96a9438333430517d581b7dc81546266b
                                              • Instruction ID: 5af6bf9b0b70cf9307c1258d0e5a667b07be53d22b58a3258066d7aee54b172b
                                              • Opcode Fuzzy Hash: eb5829c7fffbc7bf65dde30d15e1f0a96a9438333430517d581b7dc81546266b
                                              • Instruction Fuzzy Hash: E8018E70553614DBC7317F60AE08A5A3EACAB00F06F54457AF841B21E9DAB84645CBAE
                                              APIs
                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404F9A
                                              • GetMessagePos.USER32 ref: 00404FA2
                                              • ScreenToClient.USER32(?,?), ref: 00404FBC
                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404FCE
                                              • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404FF4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: Message$Send$ClientScreen
                                              • String ID: f
                                              • API String ID: 41195575-1993550816
                                              • Opcode ID: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                              • Instruction ID: ce4c7d6d39dceca23aa6ebdb29af7737867007859e7bede0b388bd4d525dd41f
                                              • Opcode Fuzzy Hash: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                              • Instruction Fuzzy Hash: 3C014C71940219BADB00DBA4DD85BFEBBB8AF54711F10012BBB50B61C0D6B49A058BA5
                                              APIs
                                              • GetDC.USER32(?), ref: 00401E51
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E6B
                                              • MulDiv.KERNEL32(00000000,00000000), ref: 00401E73
                                              • ReleaseDC.USER32(?,00000000), ref: 00401E84
                                                • Part of subcall function 004066A5: lstrcatW.KERNEL32(Remove folder: ,\Microsoft\Internet Explorer\Quick Launch), ref: 0040684A
                                                • Part of subcall function 004066A5: lstrlenW.KERNEL32(Remove folder: ,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,?,00405701,Remove folder: C:\Users\user\AppData\Local\Temp\nsf6353.tmp\,00000000), ref: 004068A4
                                              • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401ED3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: CapsCreateDeviceFontIndirectReleaselstrcatlstrlen
                                              • String ID: MS Shell Dlg
                                              • API String ID: 2584051700-76309092
                                              • Opcode ID: e128970cf71a0b284ce18b21917758e509e5717976d06807f88455f58f814df6
                                              • Instruction ID: b9cc094806d22c325402cb6ccb5f5134c2025175c414775df3ff87de861ccae2
                                              • Opcode Fuzzy Hash: e128970cf71a0b284ce18b21917758e509e5717976d06807f88455f58f814df6
                                              • Instruction Fuzzy Hash: 8401B571900241EFEB005BB4EE89A9A3FB0AB15301F208939F541B71D2C6B904459BED
                                              APIs
                                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB1
                                              • wsprintfW.USER32 ref: 00402FE5
                                              • SetWindowTextW.USER32(?,?), ref: 00402FF5
                                              • SetDlgItemTextW.USER32(?,00000406,?), ref: 00403007
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: Text$ItemTimerWindowwsprintf
                                              • String ID: unpacking data: %d%%$verifying installer: %d%%
                                              • API String ID: 1451636040-1158693248
                                              • Opcode ID: b65fa6b26e28fa793ab4966251e07a6fe500b79f9b1e2f9c66e5bc42e84335f7
                                              • Instruction ID: 34ad84b97f90b05cf42cbebec4ee1aaae98efe268bf46a139428006d78f28757
                                              • Opcode Fuzzy Hash: b65fa6b26e28fa793ab4966251e07a6fe500b79f9b1e2f9c66e5bc42e84335f7
                                              • Instruction Fuzzy Hash: 25F0497050020DABEF246F60DD49BEA3B69FB00309F00803AFA05B51D0DFBD9A559F59
                                              APIs
                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B1
                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029CD
                                              • GlobalFree.KERNEL32(?), ref: 00402A06
                                              • GlobalFree.KERNEL32(00000000), ref: 00402A19
                                              • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A35
                                              • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A48
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: Global$AllocFree$CloseDeleteFileHandle
                                              • String ID:
                                              • API String ID: 2667972263-0
                                              • Opcode ID: cc682eb677fc0cdddcbf9664361c627099a0f91e8e9c012db3e8b517a211182c
                                              • Instruction ID: 78b93316678d616cb595922dcd62a83f4062aa2fb33f08fb70827f98fa9650ab
                                              • Opcode Fuzzy Hash: cc682eb677fc0cdddcbf9664361c627099a0f91e8e9c012db3e8b517a211182c
                                              • Instruction Fuzzy Hash: E131B171D00124BBCF216FA9CE89D9EBE79AF09364F10023AF461762E1CB794D429B58
                                              APIs
                                              • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402EFD
                                              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F49
                                              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F52
                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F69
                                              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F74
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: CloseEnum$DeleteValue
                                              • String ID:
                                              • API String ID: 1354259210-0
                                              • Opcode ID: 2f5760c81b9bdb573da93a40119b3bcbbfe2770e9a6cbc48a05e82d61b54c679
                                              • Instruction ID: 37c7ba0f9c491dd7f389852fcb35a119484072d927876f68e32cbd91f0a54eef
                                              • Opcode Fuzzy Hash: 2f5760c81b9bdb573da93a40119b3bcbbfe2770e9a6cbc48a05e82d61b54c679
                                              • Instruction Fuzzy Hash: 6D216B7150010ABBDF11AF94CE89EEF7B7DEB50384F110076F909B21E0D7B49E54AA68
                                              APIs
                                              • GetDlgItem.USER32(?,?), ref: 00401D9A
                                              • GetClientRect.USER32(?,?), ref: 00401DE5
                                              • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E15
                                              • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E29
                                              • DeleteObject.GDI32(00000000), ref: 00401E39
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                              • String ID:
                                              • API String ID: 1849352358-0
                                              • Opcode ID: 100b3177012869429c2005611ce111630833f28d1ab152a2d5a2575cfc39775b
                                              • Instruction ID: 4d725fdcf847a80329c23b38d7164c003567f542edd6fcacfb34c9ebeef40da9
                                              • Opcode Fuzzy Hash: 100b3177012869429c2005611ce111630833f28d1ab152a2d5a2575cfc39775b
                                              • Instruction Fuzzy Hash: 67212672904119AFCB05CBA4DE45AEEBBB5EF08304F14003AF945F62A0CB389951DB98
                                              APIs
                                              • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040362D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00405F3D
                                              • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040362D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00405F47
                                              • lstrcatW.KERNEL32(?,0040A014), ref: 00405F59
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F37
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: CharPrevlstrcatlstrlen
                                              • String ID: C:\Users\user\AppData\Local\Temp\
                                              • API String ID: 2659869361-823278215
                                              • Opcode ID: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                                              • Instruction ID: 9007417a49851ea4d61da9c71e51c63d156abd36d345156a737e00ee84923012
                                              • Opcode Fuzzy Hash: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                                              • Instruction Fuzzy Hash: 59D05E611019246AC111AB548D04DDB63ACAE85304742046AF601B60A0CB7E196287ED
                                              APIs
                                              • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsf6353.tmp\ShellExecAsUser.dll), ref: 00402695
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: lstrlen
                                              • String ID: C:\Users\user\AppData\Local\Temp\nsf6353.tmp$C:\Users\user\AppData\Local\Temp\nsf6353.tmp\ShellExecAsUser.dll
                                              • API String ID: 1659193697-191493504
                                              • Opcode ID: 8c6554b53cfcec5e2f07c2cef93b4325bcb2464f26661cdf6029d648463e49ea
                                              • Instruction ID: f1e3379d491753f9d96dc3c217618d2e64da59e9cc8309568291ba5d2d488428
                                              • Opcode Fuzzy Hash: 8c6554b53cfcec5e2f07c2cef93b4325bcb2464f26661cdf6029d648463e49ea
                                              • Instruction Fuzzy Hash: D511C472A00205EBCB10BBB18E4AA9E76619F44758F21483FE402B61C1DAFD8891965F
                                              APIs
                                              • IsWindowVisible.USER32(?), ref: 0040566D
                                              • CallWindowProcW.USER32(?,?,?,?), ref: 004056BE
                                                • Part of subcall function 00404610: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404622
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: Window$CallMessageProcSendVisible
                                              • String ID:
                                              • API String ID: 3748168415-3916222277
                                              • Opcode ID: a73dc4e993bde12ea44745026bd4b5676165c6f206d332bc9731ab0fc1b08652
                                              • Instruction ID: 537e1cae7e4c88fb21f4f8cfd237bdd46b0b38e99f2a5e053ca6ba0093d9a5c8
                                              • Opcode Fuzzy Hash: a73dc4e993bde12ea44745026bd4b5676165c6f206d332bc9731ab0fc1b08652
                                              • Instruction Fuzzy Hash: 4401B171200608AFEF205F11DD84A6B3A35EB84361F904837FA08752E0D77F8D929E6D
                                              APIs
                                              • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,0040313C,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\FSCaptureSetup107.exe,C:\Users\user\Desktop\FSCaptureSetup107.exe,80000000,00000003), ref: 00405F89
                                              • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,0040313C,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\FSCaptureSetup107.exe,C:\Users\user\Desktop\FSCaptureSetup107.exe,80000000,00000003), ref: 00405F99
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: CharPrevlstrlen
                                              • String ID: C:\Users\user\Desktop
                                              • API String ID: 2709904686-1246513382
                                              • Opcode ID: 176def5b2db9ef34a9f22db2929791273b03e08e07d7b66f37effa829582f156
                                              • Instruction ID: bd974b3f77e4b05eb9372a1ad14375fba7b947cfa10dd8d614d5bb7090e452f7
                                              • Opcode Fuzzy Hash: 176def5b2db9ef34a9f22db2929791273b03e08e07d7b66f37effa829582f156
                                              • Instruction Fuzzy Hash: 6CD05EB2401D219EC3126B04DC00D9F63ACEF51301B4A4866E441AB1A0DB7C5D9186A9
                                              APIs
                                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060CD
                                              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 004060E5
                                              • CharNextA.USER32(00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060F6
                                              • lstrlenA.KERNEL32(00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060FF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2336496055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2336466395.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336540152.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336579015.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2336854413.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_FSCaptureSetup107.jbxd
                                              Similarity
                                              • API ID: lstrlen$CharNextlstrcmpi
                                              • String ID:
                                              • API String ID: 190613189-0
                                              • Opcode ID: 4f145c51a58837bd7eda372618efc6ab74ada67201017ca859b4805a40dfc06b
                                              • Instruction ID: 2f06b96f93541eceebcae48a9adfe7aedd37cb678349478f8cad11de2473fd3e
                                              • Opcode Fuzzy Hash: 4f145c51a58837bd7eda372618efc6ab74ada67201017ca859b4805a40dfc06b
                                              • Instruction Fuzzy Hash: 0BF0F631104054FFDB12DFA4CD00D9EBBA8EF06350B2640BAE841FB321D674DE11A798

                                              Execution Graph

                                              Execution Coverage:0.2%
                                              Dynamic/Decrypted Code Coverage:49.2%
                                              Signature Coverage:0.8%
                                              Total number of Nodes:120
                                              Total number of Limit Nodes:4
                                              execution_graph 36819 1005b105 36820 1005b115 36819->36820 36821 1005b110 36819->36821 36825 1005b00f 36820->36825 36833 100601de GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 36821->36833 36824 1005b123 36826 1005b01b __freefls@4 36825->36826 36830 1005b0b8 __freefls@4 36826->36830 36831 1005b068 ___DllMainCRTStartup 36826->36831 36834 1005aeda 36826->36834 36828 1005b098 36829 1005aeda __CRT_INIT@12 156 API calls 36828->36829 36828->36830 36829->36830 36830->36824 36831->36828 36831->36830 36832 1005aeda __CRT_INIT@12 156 API calls 36831->36832 36832->36828 36833->36820 36835 1005af65 36834->36835 36836 1005aee9 36834->36836 36838 1005af9c 36835->36838 36839 1005af6b 36835->36839 36883 1005dea6 HeapCreate 36836->36883 36840 1005afa1 36838->36840 36841 1005affa 36838->36841 36843 1005aef4 36839->36843 36846 1005af86 36839->36846 36894 1005cba3 67 API calls _doexit 36839->36894 36898 1005c268 8 API calls __decode_pointer 36840->36898 36841->36843 36903 1005c59f 79 API calls 2 library calls 36841->36903 36843->36831 36845 1005aefb 36885 1005c60d 78 API calls 8 library calls 36845->36885 36846->36843 36895 1005fcd4 68 API calls __freefls@4 36846->36895 36847 1005afa6 36899 1005d03c 67 API calls __calloc_impl 36847->36899 36853 1005afb2 36853->36843 36900 1005c1cd 6 API calls __crt_waiting_on_module_handle 36853->36900 36854 1005af04 36886 1005ded6 VirtualFree HeapFree HeapFree HeapDestroy 36854->36886 36855 1005af00 __RTC_Initialize 36855->36854 36862 1005af10 GetCommandLineA 36855->36862 36856 1005af90 36896 1005c2b9 70 API calls 2 library calls 36856->36896 36860 1005af09 36860->36843 36861 1005af95 36897 1005ded6 VirtualFree HeapFree HeapFree HeapDestroy 36861->36897 36887 10060055 76 API calls 3 library calls 36862->36887 36863 1005afd0 36869 1005afd7 36863->36869 36870 1005afee 36863->36870 36866 1005af20 36888 1005fa80 72 API calls 3 library calls 36866->36888 36868 1005af2a 36871 1005af2e 36868->36871 36890 1005ff9a 112 API calls 3 library calls 36868->36890 36901 1005c2f6 67 API calls 5 library calls 36869->36901 36902 1005a339 67 API calls 6 library calls 36870->36902 36889 1005c2b9 70 API calls 2 library calls 36871->36889 36876 1005afde GetCurrentThreadId 36876->36843 36877 1005af3a 36878 1005af4e 36877->36878 36891 1005fd22 111 API calls 6 library calls 36877->36891 36878->36860 36893 1005fcd4 68 API calls __freefls@4 36878->36893 36881 1005af43 36881->36878 36892 1005c9dc 74 API calls 5 library calls 36881->36892 36884 1005aeef 36883->36884 36884->36843 36884->36845 36885->36855 36886->36860 36887->36866 36888->36868 36889->36854 36890->36877 36891->36881 36892->36878 36893->36871 36894->36846 36895->36856 36896->36861 36897->36843 36898->36847 36899->36853 36900->36863 36901->36876 36902->36860 36903->36843 36904 77d43b5 36905 77d43c5 36904->36905 36906 77d43c0 36904->36906 36910 77d42bf 36905->36910 36918 77d8cdb GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 36906->36918 36909 77d43d3 36911 77d42cb __ioinit 36910->36911 36913 77d4368 __ioinit 36911->36913 36914 77d4318 ___DllMainCRTStartup 36911->36914 36919 77d418a 36911->36919 36913->36909 36914->36913 36915 77d4348 36914->36915 36917 77d418a __CRT_INIT@12 154 API calls 36914->36917 36915->36913 36916 77d418a __CRT_INIT@12 154 API calls 36915->36916 36916->36913 36917->36915 36918->36905 36920 77d4199 36919->36920 36921 77d4215 36919->36921 36968 77d523c HeapCreate 36920->36968 36923 77d424c 36921->36923 36931 77d421b 36921->36931 36924 77d42aa 36923->36924 36925 77d4251 36923->36925 36929 77d41a4 36924->36929 36987 77d8122 78 API calls 2 library calls 36924->36987 36982 77d7e08 8 API calls __decode_pointer 36925->36982 36928 77d41ab 36970 77d8190 75 API calls 8 library calls 36928->36970 36929->36914 36930 77d4236 36930->36929 36980 77d8650 67 API calls ___convertcp 36930->36980 36931->36929 36931->36930 36979 77d5596 66 API calls _doexit 36931->36979 36933 77d4256 36983 77d8362 66 API calls __calloc_impl 36933->36983 36937 77d41b0 __RTC_Initialize 36940 77d41b4 36937->36940 36945 77d41c0 GetCommandLineA 36937->36945 36939 77d4262 36939->36929 36984 77d7d8d 6 API calls __crt_waiting_on_module_handle 36939->36984 36971 77d526c VirtualFree HeapFree HeapFree HeapDestroy 36940->36971 36941 77d4240 36981 77d7e3c 7 API calls __decode_pointer 36941->36981 36972 77d89d1 76 API calls 3 library calls 36945->36972 36947 77d41b9 36947->36929 36950 77d4280 36954 77d429e 36950->36954 36955 77d4287 36950->36955 36951 77d41d0 36973 77d83fc 71 API calls 2 library calls 36951->36973 36953 77d41da 36957 77d41de 36953->36957 36975 77d8916 111 API calls 3 library calls 36953->36975 36986 77d389d 66 API calls 7 library calls 36954->36986 36985 77d7e79 66 API calls 5 library calls 36955->36985 36974 77d7e3c 7 API calls __decode_pointer 36957->36974 36959 77d428e GetCurrentThreadId 36959->36929 36962 77d41ea 36963 77d41fe 36962->36963 36976 77d869e 110 API calls 6 library calls 36962->36976 36963->36947 36978 77d8650 67 API calls ___convertcp 36963->36978 36966 77d41f3 36966->36963 36977 77d53cf 74 API calls 5 library calls 36966->36977 36969 77d419f 36968->36969 36969->36928 36969->36929 36970->36937 36971->36947 36972->36951 36973->36953 36975->36962 36976->36966 36977->36963 36978->36957 36979->36930 36980->36941 36982->36933 36983->36939 36984->36950 36985->36959 36986->36947 36987->36929

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 77d523c-77d525e HeapCreate 1 77d5260-77d5261 0->1 2 77d5262-77d526b 0->2
                                              APIs
                                              • HeapCreate.KERNELBASE(00000000,00001000,00000000,?,077D419F,00000001,?,?,?,077D4318,?,?,?,077E6030,0000000C,077D43D3), ref: 077D5251
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393297664.00000000077D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 077D0000, based on PE: true
                                              • Associated: 00000004.00000002.3393280485.00000000077D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393330091.00000000077E1000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393352921.00000000077E7000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393370689.00000000077E8000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393389082.00000000077E9000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393406651.00000000077EB000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_77d0000_FSCapture.jbxd
                                              Similarity
                                              • API ID: CreateHeap
                                              • String ID:
                                              • API String ID: 10892065-0
                                              • Opcode ID: 0e7f6d0a46ae9e56dae0a5300bc4edcc59edce43b566f097fd47835910376a97
                                              • Instruction ID: 7947ec3d27d608d49b91464ff236fc22dec30db7f63378ead07fa2505b0c734b
                                              • Opcode Fuzzy Hash: 0e7f6d0a46ae9e56dae0a5300bc4edcc59edce43b566f097fd47835910376a97
                                              • Instruction Fuzzy Hash: FCD05E76954349DBDF005F74680AB623BEC938C6D5F15C836F90CCA150F678D560C900

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 3 1005dea6-1005dec8 HeapCreate 4 1005decc-1005ded5 3->4 5 1005deca-1005decb 3->5
                                              APIs
                                              • HeapCreate.KERNELBASE(00000000,00001000,00000000,?,1005AEEF,00000001,?,?,?,1005B068,?,?,?,10074150,0000000C,1005B123), ref: 1005DEBB
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: CreateHeap
                                              • String ID:
                                              • API String ID: 10892065-0
                                              • Opcode ID: 735fb80c808726fb600b7528066a7df35ee7ea53d6a4c649e5dcde6238633a11
                                              • Instruction ID: 8dfb91ae570739790c816bb2e1dda111b62e5bb18bd715a04582d98cca31d61a
                                              • Opcode Fuzzy Hash: 735fb80c808726fb600b7528066a7df35ee7ea53d6a4c649e5dcde6238633a11
                                              • Instruction Fuzzy Hash: 5BD05E329A03559EF710AF709C497233BDCE784799F084536F94CD6160F574C980D650

                                              Control-flow Graph

                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3389880451.000000000076C000.00000020.00000001.01000000.0000000B.sdmp, Offset: 0076C000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_76c000_FSCapture.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7ef5c717b336019f4170949ce05a1710a435065059c3ef29e005e1d0ff0c6b5a
                                              • Instruction ID: bef145573693023861790f066d1f2f181686abb9bcbc3e87aad5b7cce37bf63a
                                              • Opcode Fuzzy Hash: 7ef5c717b336019f4170949ce05a1710a435065059c3ef29e005e1d0ff0c6b5a
                                              • Instruction Fuzzy Hash: 77512A74B10205EFDB10EFA8C996AAEB7B5FF49700F5144A4F901A77A1CB39AD41CB50

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 267 76c9a4-76c9d9 268 76c9df-76c9eb call 76c734 267->268 271 76ca0e-76ca16 268->271 272 76c9ed-76ca09 268->272 273 76ca21-76ca36 271->273 274 76ca18-76ca1c call 76d1f8 271->274 272->271 274->273
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3389880451.000000000076C000.00000020.00000001.01000000.0000000B.sdmp, Offset: 0076C000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_76c000_FSCapture.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b01cdab7c3a0c4810512813d753864d155dd449fb76f1e4487b3c9a4d76ee78e
                                              • Instruction ID: 9809c2982ca54d95d3363318baded4d673839ac7977b5a9bac38df17c5f28572
                                              • Opcode Fuzzy Hash: b01cdab7c3a0c4810512813d753864d155dd449fb76f1e4487b3c9a4d76ee78e
                                              • Instruction Fuzzy Hash: 0201CC70210208AFDB15EFACDD81AAA37FDEB09300B9044A0FD44C7292DA79EC419B90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 280 76ca49-76cab7 call 76c73c call 76c918 * 2 289 76cabd-76cad5 280->289
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3389880451.000000000076C000.00000020.00000001.01000000.0000000B.sdmp, Offset: 0076C000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_76c000_FSCapture.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3dfbd01d0c66457f1beeae8932f1ea4fe977684b603a95db0e5f8f577e2eaa63
                                              • Instruction ID: c1242d9f43c4d8cbbd0ef9e4fbb88f62bbf0e8f2b1968c643ad15bc11f0fa4ed
                                              • Opcode Fuzzy Hash: 3dfbd01d0c66457f1beeae8932f1ea4fe977684b603a95db0e5f8f577e2eaa63
                                              • Instruction Fuzzy Hash: 94012D70A10608EFDB06EFA8D85286EB7F9EB4970079284A5F801E3761D6786E00DB54

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 304 76d03b-76d043 305 76d048-76d04e call 76d160 304->305 307 76d053 305->307
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3389880451.000000000076C000.00000020.00000001.01000000.0000000B.sdmp, Offset: 0076C000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_76c000_FSCapture.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 315bfb93e07e5c621ddb273d6e0335617357a7006b5ef222bdb93c19f43c5e81
                                              • Instruction ID: 8ea4508e67ecff9763956f8eaf474668c082b864ac711aa1f94f1c1dababbeac
                                              • Opcode Fuzzy Hash: 315bfb93e07e5c621ddb273d6e0335617357a7006b5ef222bdb93c19f43c5e81
                                              • Instruction Fuzzy Hash: 03C02B75B1C208DFA718CB84E40242C73F0E7C8320BB140F1E80093240C6395D018508

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 308 76d059 call 76d160 311 76d053 308->311
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3389880451.000000000076C000.00000020.00000001.01000000.0000000B.sdmp, Offset: 0076C000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_76c000_FSCapture.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1dfa533c8135af29c9923ffd3d82fef57fa725cf1decd71ba63591a6ce210cb5
                                              • Instruction ID: dfe4f364c766a868bce5b2dfeb9d2ae997444083a35250f18c8b00943ea3c6ba
                                              • Opcode Fuzzy Hash: 1dfa533c8135af29c9923ffd3d82fef57fa725cf1decd71ba63591a6ce210cb5
                                              • Instruction Fuzzy Hash: 47B00234F1414CE78F24D795C55585D77716B85310FA145D0584663115867D5E455540

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 312 76c73c-76c740 313 76c747 312->313 314 76c742 call 76c9a4 312->314 314->313
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3389880451.000000000076C000.00000020.00000001.01000000.0000000B.sdmp, Offset: 0076C000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_76c000_FSCapture.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: cbaef350a031b0f30ea73a90b24e8774050fcc671b9a2ea6f4c83847aafd68f8
                                              • Instruction ID: 0e9b711aacc6cdd48f8b0dc5c9a4c62fdfb8ef129deb08c538e778335052d4f7
                                              • Opcode Fuzzy Hash: cbaef350a031b0f30ea73a90b24e8774050fcc671b9a2ea6f4c83847aafd68f8
                                              • Instruction Fuzzy Hash: 3AA00224810204CDDB97669A844A77431546F50325FC5B094D8C2098924BBC5448CE16
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: _memset
                                              • String ID: $`
                                              • API String ID: 2102423945-2069241612
                                              • Opcode ID: 57a5f1e5baab0a65e52a6123cc5f8729c428fea9b7a39412b9a0e8449ba4de70
                                              • Instruction ID: e4dc857d105607d2b205f713aadfbeb6f1f12d4c7ebf97a5af00b084650b19ce
                                              • Opcode Fuzzy Hash: 57a5f1e5baab0a65e52a6123cc5f8729c428fea9b7a39412b9a0e8449ba4de70
                                              • Instruction Fuzzy Hash: 3AD1A375D287825BE711CB38D882BABF7A4BFEA244F00DB1EB9D4A2501E7709644C791
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: _memset
                                              • String ID: $`
                                              • API String ID: 2102423945-2069241612
                                              • Opcode ID: ccd9499090af09c85c04ec9fcdce32d70e66f4838ceecefe8fe831ae5d51b1dd
                                              • Instruction ID: f909171aaf54837c8d4177ea7f0f542c6b82b8bd7d832a495eab585f6e80004f
                                              • Opcode Fuzzy Hash: ccd9499090af09c85c04ec9fcdce32d70e66f4838ceecefe8fe831ae5d51b1dd
                                              • Instruction Fuzzy Hash: 40D1A675D287865BE311CB38D882BABF7A4FFEA244F009B1EB9D472501E770A644C791
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: _memset
                                              • String ID: $`
                                              • API String ID: 2102423945-2069241612
                                              • Opcode ID: 559a11ae3c362d57d20c4b2f77cf23b2b867b9e3afda963b3244522fca701c95
                                              • Instruction ID: 8b308d0ea5d6410fcdff0544da820f75256ba29b7dd258b56083f009eca2d96f
                                              • Opcode Fuzzy Hash: 559a11ae3c362d57d20c4b2f77cf23b2b867b9e3afda963b3244522fca701c95
                                              • Instruction Fuzzy Hash: FAD1B375D287825BE311CB38D882BABF7A4BFEA244F00DB1EB9D4B2501E7709644C791
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: _memset
                                              • String ID: $`
                                              • API String ID: 2102423945-2069241612
                                              • Opcode ID: 8240b824b76b6e7e043e9d9b77cc4b9726abde0e0f70c5d2921ee51842823a00
                                              • Instruction ID: 1a17436abc254abaf7b1250ad2183e49d63d0b39834bf5d18dbbae975391660a
                                              • Opcode Fuzzy Hash: 8240b824b76b6e7e043e9d9b77cc4b9726abde0e0f70c5d2921ee51842823a00
                                              • Instruction Fuzzy Hash: 08D1A675D287865BE311CB38D882BABF7A4FFEA244F009B1EB9D472501E770A644C791
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: _memset
                                              • String ID: $@
                                              • API String ID: 2102423945-1077428164
                                              • Opcode ID: 6c55a1752f4a56a0111544179d296faa80b4bfe61d411f1f329c6262af8b801c
                                              • Instruction ID: a46a56116740031f42a158213e9a38b88f21a0d11e0112c91194021a809ed74a
                                              • Opcode Fuzzy Hash: 6c55a1752f4a56a0111544179d296faa80b4bfe61d411f1f329c6262af8b801c
                                              • Instruction Fuzzy Hash: 7ED1B575D287825BE311CB39D882AABF7A4FFEA244F00DB1EB8D4B2511E7309644C791
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: _memset
                                              • String ID: $@
                                              • API String ID: 2102423945-1077428164
                                              • Opcode ID: 73b9f25d1614c113d866a7efcdb9099228939aa956b54bb9cd6dc1be725492a1
                                              • Instruction ID: 180bca3fa0391e14ae0d945cc8ee57e797c3becee5dbdaf8617eea16931955d0
                                              • Opcode Fuzzy Hash: 73b9f25d1614c113d866a7efcdb9099228939aa956b54bb9cd6dc1be725492a1
                                              • Instruction Fuzzy Hash: 59D1A475D287825BE311CB39D882AABF7A4AFEA244F00DB1EB8D4B2511E7309644C791
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: _memset
                                              • String ID:
                                              • API String ID: 2102423945-3916222277
                                              • Opcode ID: 93c18c4b91f60976479a1f22aa3a31f06d51aae6008522914339c599d1eff7d8
                                              • Instruction ID: 976ca29b1e4bad2d6155b7328af1084c43cf2bece24350da8ae42022591f3596
                                              • Opcode Fuzzy Hash: 93c18c4b91f60976479a1f22aa3a31f06d51aae6008522914339c599d1eff7d8
                                              • Instruction Fuzzy Hash: 06D1B475D287825BE311CB39D882BABF7A4FFEA244F00CB1EB9D4A2501E7709644C791
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: _memset
                                              • String ID:
                                              • API String ID: 2102423945-3916222277
                                              • Opcode ID: a2020f5417437e3846193ad97c6e2fe11a9b6d97a36c2db749b5ba489b519138
                                              • Instruction ID: 582062d1836a380d1efa821823b8e23e6d7197cd242db275f85e3d8367547a6e
                                              • Opcode Fuzzy Hash: a2020f5417437e3846193ad97c6e2fe11a9b6d97a36c2db749b5ba489b519138
                                              • Instruction Fuzzy Hash: 3AD1B475D287825BE315CB38D882BABF7A4FFEA244F00DB1EB9D4A2501E7709644C791
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: _memset
                                              • String ID:
                                              • API String ID: 2102423945-3916222277
                                              • Opcode ID: 0bc5dd8a0b52b174a2ea33ebce6a8409cf94bc04ce12d263c7c37217de5aea30
                                              • Instruction ID: 6b35d4e15ad5c3b53856fa4a9715e3374019100b05862a130d6858b3051d5170
                                              • Opcode Fuzzy Hash: 0bc5dd8a0b52b174a2ea33ebce6a8409cf94bc04ce12d263c7c37217de5aea30
                                              • Instruction Fuzzy Hash: 08D1A675D287865BE311CB39D882BABF7A4FFEA244F008B1EB9D4B2511E7309644C791
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: _memset
                                              • String ID:
                                              • API String ID: 2102423945-3916222277
                                              • Opcode ID: 5125cc39c5fe8cf838cf7d79d1e8fe6699f3a5e0c08d14157584c7396ac3350b
                                              • Instruction ID: c9b4fd9b5ace96e0969d18c2aa68e0e90a90df6d376a53d8d71422e4bd6730ee
                                              • Opcode Fuzzy Hash: 5125cc39c5fe8cf838cf7d79d1e8fe6699f3a5e0c08d14157584c7396ac3350b
                                              • Instruction Fuzzy Hash: 5BD1B475D287825BE311CB39D882AABF7A4FFEA244F00CB1EB9D4B2501E7709644C791
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: _memset
                                              • String ID:
                                              • API String ID: 2102423945-3916222277
                                              • Opcode ID: cc71c4c9972543f725f88c73b527772ead329f60a62df9e11a385c9af2e7c437
                                              • Instruction ID: 10edc3b494adee164b47742f9288fd3f3504a71bfcc4378bd05705179f66db09
                                              • Opcode Fuzzy Hash: cc71c4c9972543f725f88c73b527772ead329f60a62df9e11a385c9af2e7c437
                                              • Instruction Fuzzy Hash: 46D1B375D287825BE315CB38D882AABF7A4FFEA244F00DB1EB9D4B2501E7709644C791
                                              APIs
                                              • IsDebuggerPresent.KERNEL32 ref: 077DCB85
                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 077DCB9A
                                              • UnhandledExceptionFilter.KERNEL32(077E55E0), ref: 077DCBA5
                                              • GetCurrentProcess.KERNEL32(C0000409), ref: 077DCBC1
                                              • TerminateProcess.KERNEL32(00000000), ref: 077DCBC8
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393297664.00000000077D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 077D0000, based on PE: true
                                              • Associated: 00000004.00000002.3393280485.00000000077D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393330091.00000000077E1000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393352921.00000000077E7000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393370689.00000000077E8000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393389082.00000000077E9000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393406651.00000000077EB000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_77d0000_FSCapture.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                              • String ID:
                                              • API String ID: 2579439406-0
                                              • Opcode ID: 1f3785a3e5edbdee1f619e1c7cea4d2faf9d3835f502ebf6b95a395a3db1a07e
                                              • Instruction ID: ae5142d95d08fe868162a15141e436a3ea55869f59af28e90489033e001fbf0c
                                              • Opcode Fuzzy Hash: 1f3785a3e5edbdee1f619e1c7cea4d2faf9d3835f502ebf6b95a395a3db1a07e
                                              • Instruction Fuzzy Hash: EF21E2B5901205DFCF01DF18F5866683BB8FB8C390F52C519E408AE220E77E59A4CF55
                                              APIs
                                              • IsDebuggerPresent.KERNEL32 ref: 1005C107
                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 1005C11C
                                              • UnhandledExceptionFilter.KERNEL32(1006E238), ref: 1005C127
                                              • GetCurrentProcess.KERNEL32(C0000409), ref: 1005C143
                                              • TerminateProcess.KERNEL32(00000000), ref: 1005C14A
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                              • String ID:
                                              • API String ID: 2579439406-0
                                              • Opcode ID: 021af7e6aabf4a09eaaba2b27c593ae070e37e0c42dcc935f8711d2c64f30ffd
                                              • Instruction ID: ff92cdb9e8717ca309287b10ada1cee81ed65535f766f53986b20397a673cce2
                                              • Opcode Fuzzy Hash: 021af7e6aabf4a09eaaba2b27c593ae070e37e0c42dcc935f8711d2c64f30ffd
                                              • Instruction Fuzzy Hash: 3021BBB4917324DFF741DF28DD89A457BA1FB48380F00925AE68CA6270E7B869C4CF25
                                              APIs
                                              • GetLocaleInfoA.KERNEL32(?,00001004,?,00000006,?,?,00000001,?,00000000,00000001,00000000), ref: 077DF960
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393297664.00000000077D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 077D0000, based on PE: true
                                              • Associated: 00000004.00000002.3393280485.00000000077D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393330091.00000000077E1000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393352921.00000000077E7000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393370689.00000000077E8000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393389082.00000000077E9000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393406651.00000000077EB000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_77d0000_FSCapture.jbxd
                                              Similarity
                                              • API ID: InfoLocale
                                              • String ID:
                                              • API String ID: 2299586839-0
                                              • Opcode ID: 3bf44e456b75d66c24867060e7e7b06486653a80da6ccfa3dbe277d7ddd6838f
                                              • Instruction ID: 6d97822a5e7574ce292f813a88b89168c7c7d857958e432165cf9ad79ca97f5c
                                              • Opcode Fuzzy Hash: 3bf44e456b75d66c24867060e7e7b06486653a80da6ccfa3dbe277d7ddd6838f
                                              • Instruction Fuzzy Hash: 7FF06570A0424CBFDB00DBB4D805FAE7BF9AB49368F504155E526DA1C0EA70DA148651
                                              APIs
                                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,10074190,0000000C,1005C431,00000000,00000000,?,1005D008,?,00000001,?,?,1005D339,00000018,10074220,0000000C), ref: 1005C308
                                              • __crt_waiting_on_module_handle.LIBCMT ref: 1005C313
                                                • Part of subcall function 1005C8ED: Sleep.KERNEL32(000003E8,00000000,?,1005C21C,KERNEL32.DLL,?,1005E14D,?,1005E23D,10032967,10074240,0000000C,1005A313,?,10032967,00000000), ref: 1005C8F9
                                                • Part of subcall function 1005C8ED: GetModuleHandleW.KERNEL32(?,?,1005C21C,KERNEL32.DLL,?,1005E14D,?,1005E23D,10032967,10074240,0000000C,1005A313,?,10032967,00000000,?), ref: 1005C902
                                              • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 1005C33C
                                              • GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 1005C34C
                                              • __lock.LIBCMT ref: 1005C36E
                                              • InterlockedIncrement.KERNEL32(10076510), ref: 1005C37B
                                              • __lock.LIBCMT ref: 1005C38F
                                              • ___addlocaleref.LIBCMT ref: 1005C3AD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                                              • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                                              • API String ID: 1028249917-2843748187
                                              • Opcode ID: e69a2f76c7e2a554b66a8e610c509ed1dda9de9e168b4c8e7e941f2ce9dde25a
                                              • Instruction ID: 12526df81ac830b0d5f979ae89d843a525f5f20704940d33c15e3091131b1393
                                              • Opcode Fuzzy Hash: e69a2f76c7e2a554b66a8e610c509ed1dda9de9e168b4c8e7e941f2ce9dde25a
                                              • Instruction Fuzzy Hash: DB11AF75800749EEE710DF75CC41F4ABBE5EF04310F108A1AE49AE72A1DB74AA44DF65
                                              APIs
                                              • WebPSafeMalloc.LIBWEBP(?,00000000,0000000C), ref: 100345F7
                                              • _memset.LIBCMT ref: 10034698
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: MallocSafe_memset
                                              • String ID:
                                              • API String ID: 1319453872-0
                                              • Opcode ID: 7b8b60c72749a277e559c6951ce262d366b25dd8b9e59b4f0af50b196b4a1e21
                                              • Instruction ID: cfe82ad5ad41359a3269638befb738efe5f0163018189e3eb14d833a593b0478
                                              • Opcode Fuzzy Hash: 7b8b60c72749a277e559c6951ce262d366b25dd8b9e59b4f0af50b196b4a1e21
                                              • Instruction Fuzzy Hash: D6D1CDB8A04702CFC311DF14D58468ABBA1FF81351F23896CD69A9E242EB35F469CF55
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393297664.00000000077D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 077D0000, based on PE: true
                                              • Associated: 00000004.00000002.3393280485.00000000077D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393330091.00000000077E1000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393352921.00000000077E7000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393370689.00000000077E8000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393389082.00000000077E9000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393406651.00000000077EB000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_77d0000_FSCapture.jbxd
                                              Similarity
                                              • API ID: __floor_pentium4
                                              • String ID:
                                              • API String ID: 4168288129-0
                                              • Opcode ID: ddf7e0967022ea40929928ab7b403c6beeec7cf249550130ff3680c308a86922
                                              • Instruction ID: 1e6660a442d00fbc2023bac973f2732e3d1a5d72d04b37e2c6090cb443dd7908
                                              • Opcode Fuzzy Hash: ddf7e0967022ea40929928ab7b403c6beeec7cf249550130ff3680c308a86922
                                              • Instruction Fuzzy Hash: 568126B1A09705DBD7006F61E04A45ABBF8FF84790F928D5CE0C1A2164EB308974CF87
                                              APIs
                                              • VP8CheckSignature.LIBWEBP(?,?,00000000,?,?,?,?,1000B014,00000000,?), ref: 1000689B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: CheckSignature
                                              • String ID: Bad code word$Frame not displayable.$Not a key frame.$bad partition length$cannot parse filter header$cannot parse partitions$cannot parse picture header$cannot parse segment header
                                              • API String ID: 572727604-1584564319
                                              • Opcode ID: db3645ff7df56713291ac16f903761a4c4de11b1f985a4c76dda64ba599c9a27
                                              • Instruction ID: 6dad7c240748b97a9885d49da9054b3874ff7dd263315a257db88db6ffcdc25f
                                              • Opcode Fuzzy Hash: db3645ff7df56713291ac16f903761a4c4de11b1f985a4c76dda64ba599c9a27
                                              • Instruction Fuzzy Hash: 1F918DB66052845EEB00CF28EC407DE7BD6EF84396F24816BF9098A247E777D249C790
                                              APIs
                                              • EnterCriticalSection.KERNEL32 ref: 10032706
                                              • ReleaseSemaphore.KERNEL32(?,00000001,00000000), ref: 1003271A
                                              • LeaveCriticalSection.KERNEL32 ref: 10032721
                                              • WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000), ref: 1003272F
                                              • ReleaseSemaphore.KERNEL32(?,00000001,00000000), ref: 10032739
                                              • EnterCriticalSection.KERNEL32 ref: 1003273C
                                              • LeaveCriticalSection.KERNEL32 ref: 10032774
                                              • WaitForSingleObjectEx.KERNEL32(?,00000000,00000000), ref: 10032782
                                              • SetEvent.KERNEL32(?), ref: 1003278C
                                              • WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000), ref: 1003279A
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: CriticalSection$ObjectSingleWait$EnterLeaveReleaseSemaphore$Event
                                              • String ID:
                                              • API String ID: 1696004078-0
                                              • Opcode ID: c89da078e126cf4d1949e73a9a55d7b14c87c93db1cacb1959db1ec7001819e8
                                              • Instruction ID: 2560856507387ed1bc77269c15dbabe32accd84933b11910d0af241e19af748d
                                              • Opcode Fuzzy Hash: c89da078e126cf4d1949e73a9a55d7b14c87c93db1cacb1959db1ec7001819e8
                                              • Instruction Fuzzy Hash: 0D215C71208311ABE221DB64CC84F5BB3E9FF89365F108A18F1559B2D0D7B5E845CBA4
                                              APIs
                                              • WebPSafeCalloc.LIBWEBP(00000001,00000000,000008AC,?,?,00000003,?), ref: 1004BBE4
                                              • WebPGetWorkerInterface.LIBWEBP(?,00000003,?), ref: 1004BC40
                                              • WebPPictureInitInternal.LIBWEBP(?,0000020F,?,?,?,00000003,?), ref: 1004BC73
                                              • WebPPictureView.LIBWEBP(?,00000000,00000000,?,00000003,?,?,?,?,?,?,?,?,?,?,00000003), ref: 1004BDD1
                                              • WebPSafeCalloc.LIBWEBP(00000001,00000000,000008AC,?,?,?,00000000,00000000,?,00000003,?), ref: 1004BE2E
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: CallocPictureSafe$InitInterfaceInternalViewWorker
                                              • String ID:
                                              • API String ID: 28409060-0
                                              • Opcode ID: 212fd127f59814b15d671d10df388ebe8085d422b646f8574dbd27661c3013aa
                                              • Instruction ID: 268e8073bd406199c22482bf578f813369c71772a531da731b44359d7844b6c9
                                              • Opcode Fuzzy Hash: 212fd127f59814b15d671d10df388ebe8085d422b646f8574dbd27661c3013aa
                                              • Instruction Fuzzy Hash: 6AE18AB59043058BDB24CF24C881A9FB7E5EFC8300F15493DED899B242E734EA49CB96
                                              APIs
                                              • WebPPictureInitInternal.LIBWEBP(?,0000020F), ref: 10041218
                                              • WebPPictureInitInternal.LIBWEBP(?,0000020F), ref: 10041235
                                                • Part of subcall function 1003E180: _memset.LIBCMT ref: 1003E1A4
                                              • WebPPictureView.LIBWEBP(?,00000000,00000000,?,?,?), ref: 10041257
                                              • WebPPictureView.LIBWEBP(?,00000000,00000000,?,?,?), ref: 10041279
                                              • WebPPictureYUVAToARGB.LIBWEBP(00000000), ref: 10041295
                                              • WebPPictureYUVAToARGB.LIBWEBP(00000000), ref: 100412B7
                                              • WebPPlaneDistortion.LIBWEBP(?,?,?,?,?,?,00000004,?,?,?), ref: 10041314
                                              • WebPPictureFree.LIBWEBP(?), ref: 10041386
                                              • WebPPictureFree.LIBWEBP(?,?), ref: 10041393
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: Picture$FreeInitInternalView$DistortionPlane_memset
                                              • String ID:
                                              • API String ID: 2995558887-0
                                              • Opcode ID: c30f515a5f622a8513e6d49c865f310ad7afc744113f854de2834fadf7e119e1
                                              • Instruction ID: 1465e613384ff3bbed9487ec903aa788e88ef673f2ac71a456f5d3960417b9f1
                                              • Opcode Fuzzy Hash: c30f515a5f622a8513e6d49c865f310ad7afc744113f854de2834fadf7e119e1
                                              • Instruction Fuzzy Hash: D751ABB5A043459BD720DF51DC81BEBB7E8EFC4795F10492CF988C6281E770E914C6A6
                                              APIs
                                              • WebPSafeCalloc.LIBWEBP(00000001,00000000,00000028), ref: 100327E4
                                              • InitializeCriticalSection.KERNEL32(00000000), ref: 100327FA
                                                • Part of subcall function 10032420: CreateSemaphoreA.KERNEL32(00000000,00000000,00000001,00000000), ref: 1003242F
                                                • Part of subcall function 10032420: CreateSemaphoreA.KERNEL32(00000000,00000000,00000001,00000000), ref: 1003243B
                                                • Part of subcall function 10032420: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 10032448
                                              • DeleteCriticalSection.KERNEL32(00000000), ref: 1003280F
                                              • EnterCriticalSection.KERNEL32(00000000), ref: 10032817
                                              • LeaveCriticalSection.KERNEL32(00000000), ref: 10032861
                                              • DeleteCriticalSection.KERNEL32(00000000), ref: 1003286C
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: CriticalSection$Create$DeleteSemaphore$CallocEnterEventInitializeLeaveSafe
                                              • String ID:
                                              • API String ID: 2566476724-0
                                              • Opcode ID: ec51417fbf7ba88cd9bebc47ed62dfcdc6a8b7bf274d81a785006e9fb8c420e3
                                              • Instruction ID: 24fee2e2940300cba8b149af008ff571cecda373172db7bb3f89e08599db873e
                                              • Opcode Fuzzy Hash: ec51417fbf7ba88cd9bebc47ed62dfcdc6a8b7bf274d81a785006e9fb8c420e3
                                              • Instruction Fuzzy Hash: 7521D876A42316AFFB21DF659C86B8B3698EF00752F014436FD05AE181DFB4DC41C6A5
                                              APIs
                                              • EnterCriticalSection.KERNEL32 ref: 100324F5
                                              • ReleaseSemaphore.KERNEL32(?,00000001,00000000), ref: 10032518
                                              • LeaveCriticalSection.KERNEL32 ref: 1003251F
                                              • WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000), ref: 10032529
                                              • ReleaseSemaphore.KERNEL32(?,00000001,00000000), ref: 10032537
                                              • EnterCriticalSection.KERNEL32 ref: 1003253A
                                              • LeaveCriticalSection.KERNEL32 ref: 10032555
                                              • LeaveCriticalSection.KERNEL32 ref: 10032565
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: CriticalSection$Leave$EnterReleaseSemaphore$ObjectSingleWait
                                              • String ID:
                                              • API String ID: 684405992-0
                                              • Opcode ID: 7e091b306be25a828145dae03c98d0547940ccfe0641c80d35e2938e57e5ff70
                                              • Instruction ID: 732001523a60a14ee13f0df6ce31a08f3005b52b9ed6669b7bc0eef99b3390af
                                              • Opcode Fuzzy Hash: 7e091b306be25a828145dae03c98d0547940ccfe0641c80d35e2938e57e5ff70
                                              • Instruction Fuzzy Hash: 2E118232201711AFD221DB19EC80F5BF3E9FF85762F514605F5049B291D771F942CAA4
                                              APIs
                                              • ___set_flsgetvalue.LIBCMT ref: 1005A0B3
                                                • Part of subcall function 1005C268: TlsGetValue.KERNEL32(?,1005C3F4,?,1005D008,?,00000001,?,?,1005D339,00000018,10074220,0000000C,1005D3CA,?,10032958), ref: 1005C271
                                                • Part of subcall function 1005C268: __decode_pointer.LIBCMT ref: 1005C283
                                                • Part of subcall function 1005C268: TlsSetValue.KERNEL32(00000000,1005D008,?,00000001,?,?,1005D339,00000018,10074220,0000000C,1005D3CA,?,10032958,?,1005E1E6,00000004), ref: 1005C292
                                              • ___fls_getvalue@4.LIBCMT ref: 1005A0BE
                                                • Part of subcall function 1005C248: TlsGetValue.KERNEL32(?,?,1005A0C3,00000000), ref: 1005C256
                                              • ___fls_setvalue@8.LIBCMT ref: 1005A0D1
                                                • Part of subcall function 1005C29C: __decode_pointer.LIBCMT ref: 1005C2AD
                                              • GetLastError.KERNEL32(00000000,?,00000000), ref: 1005A0DA
                                              • ExitThread.KERNEL32 ref: 1005A0E1
                                              • GetCurrentThreadId.KERNEL32 ref: 1005A0E7
                                              • __freefls@4.LIBCMT ref: 1005A107
                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 1005A11A
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: Value$CurrentThread__decode_pointer$ErrorExitImageLastNonwritable___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                              • String ID:
                                              • API String ID: 1925773019-0
                                              • Opcode ID: af643f2ce37463a8239eb2980d8b209e422e8a271c6bcb0304e183a45164ac8a
                                              • Instruction ID: f0279da8dba53748bae2c380103fca596247eef982db8b716a80329882c31206
                                              • Opcode Fuzzy Hash: af643f2ce37463a8239eb2980d8b209e422e8a271c6bcb0304e183a45164ac8a
                                              • Instruction Fuzzy Hash: D4016238410795AFD704DBA1CC49D5D3BE9EF46354F118654F8048B252DB34E8C9CBA5
                                              APIs
                                              • _memset.LIBCMT ref: 1004A036
                                              • WebPSafeMalloc.LIBWEBP(00000039,00000000,00000010,?,00000000,00000030), ref: 1004A04F
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: MallocSafe_memset
                                              • String ID:
                                              • API String ID: 1319453872-0
                                              • Opcode ID: 10f7fd73760f901654671f25b73292092988869e825fd61b8ac255e07dc66cc5
                                              • Instruction ID: 0f5c17c53e4e2cf040a394a8b8ad54be5fdd9783ed2e6dd1c940eb26ccb9a721
                                              • Opcode Fuzzy Hash: 10f7fd73760f901654671f25b73292092988869e825fd61b8ac255e07dc66cc5
                                              • Instruction Fuzzy Hash: 0261A1B56083006FD210DB69CC81F6FB3E9EFC9640F11492CF988D7252EA31ED418BA6
                                              APIs
                                              • WebPSafeCalloc.LIBWEBP(00000000,?,00000003), ref: 1004966E
                                              • WebPSafeMalloc.LIBWEBP(00000001,00000000,?), ref: 100496C8
                                              • WebPSafeMalloc.LIBWEBP(00000000,?,?,?,00000003,00000000,00000010), ref: 100496E6
                                              • _memset.LIBCMT ref: 100497E4
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: Safe$Malloc$Calloc_memset
                                              • String ID:
                                              • API String ID: 229908273-0
                                              • Opcode ID: 6ba9cca52439c3123ee9122759ef15c6881b156b638a1efb5792b5e72a2710f5
                                              • Instruction ID: 8759daa886a2391aa9aa6c3686fc48a4d92511cdb57f7dbd2bd3eee3b1bfe56e
                                              • Opcode Fuzzy Hash: 6ba9cca52439c3123ee9122759ef15c6881b156b638a1efb5792b5e72a2710f5
                                              • Instruction Fuzzy Hash: 3B618BB5A04312AFD310CF68C881A6BB7E9EBC4744F154A2DF985DB342D671E905CBA1
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4c9ce25ce57ab2f8d8ad1611a870e2deccc83bbf2b5f2addaaeff4975aa67845
                                              • Instruction ID: 365f859c645e7268e44279f10fadeb8aa38b4fd2e9b39ec6976a5b077753f48e
                                              • Opcode Fuzzy Hash: 4c9ce25ce57ab2f8d8ad1611a870e2deccc83bbf2b5f2addaaeff4975aa67845
                                              • Instruction Fuzzy Hash: 2D5109B6E0075A6BE791CA21BC05B8B72D4EF40399F220839E841D1141FB74F965CADB
                                              APIs
                                              • GetStartupInfoA.KERNEL32(?), ref: 1005FA95
                                              • __calloc_crt.LIBCMT ref: 1005FAA8
                                                • Part of subcall function 1005D03C: __calloc_impl.LIBCMT ref: 1005D04D
                                                • Part of subcall function 1005D03C: Sleep.KERNEL32(00000000,10032967,?), ref: 1005D064
                                              • __calloc_crt.LIBCMT ref: 1005FB36
                                              • GetFileType.KERNEL32(00000040,?,?,?,1005B068,?,?,?,10074150,0000000C,1005B123,?), ref: 1005FBBF
                                              • GetStdHandle.KERNEL32(-000000F6,?,?,?,1005B068,?,?,?,10074150,0000000C,1005B123,?), ref: 1005FC49
                                              • GetFileType.KERNEL32(00000000,?,?,?,1005B068,?,?,?,10074150,0000000C,1005B123,?), ref: 1005FC5B
                                              • SetHandleCount.KERNEL32 ref: 1005FCB3
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: FileHandleType__calloc_crt$CountInfoSleepStartup__calloc_impl
                                              • String ID:
                                              • API String ID: 74660793-0
                                              • Opcode ID: c271c4de8132c5704054306413ab45356845747c58c680477308f9e9f5d5be27
                                              • Instruction ID: 83df2694437e95960e40664e7c7cb7967fb77505e744815597aa9c6c5d9e4caa
                                              • Opcode Fuzzy Hash: c271c4de8132c5704054306413ab45356845747c58c680477308f9e9f5d5be27
                                              • Instruction Fuzzy Hash: EC711371804759CEE710CB68CA84B697FE0EF06370F26476DD8A69B2E2D778D849CB11
                                              APIs
                                                • Part of subcall function 100324E0: EnterCriticalSection.KERNEL32 ref: 100324F5
                                                • Part of subcall function 100324E0: ReleaseSemaphore.KERNEL32(?,00000001,00000000), ref: 10032518
                                                • Part of subcall function 100324E0: LeaveCriticalSection.KERNEL32 ref: 1003251F
                                                • Part of subcall function 100324E0: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000), ref: 10032529
                                                • Part of subcall function 100324E0: ReleaseSemaphore.KERNEL32(?,00000001,00000000), ref: 10032537
                                                • Part of subcall function 100324E0: EnterCriticalSection.KERNEL32 ref: 1003253A
                                                • Part of subcall function 100324E0: LeaveCriticalSection.KERNEL32 ref: 10032555
                                              • WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000), ref: 10032612
                                              • CloseHandle.KERNEL32(?), ref: 10032623
                                              • DeleteCriticalSection.KERNEL32 ref: 10032626
                                              • CloseHandle.KERNEL32(?), ref: 10032630
                                              • CloseHandle.KERNEL32(?), ref: 10032636
                                              • CloseHandle.KERNEL32(?), ref: 1003263C
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: CriticalSection$CloseHandle$EnterLeaveObjectReleaseSemaphoreSingleWait$Delete
                                              • String ID:
                                              • API String ID: 3483831534-0
                                              • Opcode ID: 010e6a33ae73bf0945f61f0a90c48ea5424974deba126afa4a1a8e7d8d5c725d
                                              • Instruction ID: 7dbd73fd2756a6ffe14797905de3fd5bbac8aa217678330838db084c77b6f8b5
                                              • Opcode Fuzzy Hash: 010e6a33ae73bf0945f61f0a90c48ea5424974deba126afa4a1a8e7d8d5c725d
                                              • Instruction Fuzzy Hash: 61F09072100714BFE221AF659C85F4BB3ACFF88725F114A1AF9096B291D674F801CAB4
                                              APIs
                                              • WebPSafeCalloc.LIBWEBP(00000118,?,00000004,?,?,?,?,?,?,?,?,?,1000A1C3,?,?,?), ref: 100085B5
                                                • Part of subcall function 1000A100: _memset.LIBCMT ref: 1000A2F0
                                              • WebPSafeMalloc.LIBWEBP(?,?,00000004,?,?,?,?,?,?,?,?,?), ref: 100084E9
                                              • _memset.LIBCMT ref: 10008527
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: Safe_memset$CallocMalloc
                                              • String ID:
                                              • API String ID: 1974006931-0
                                              • Opcode ID: 81b71ac0fff69917a3e76a2ad874eeea0b53e9f8e0de0b0a85406ed1afbfb655
                                              • Instruction ID: e7282f893bf22dcf38f9aaddd36c59fe4e705665b7645dfc78c061857c48d60b
                                              • Opcode Fuzzy Hash: 81b71ac0fff69917a3e76a2ad874eeea0b53e9f8e0de0b0a85406ed1afbfb655
                                              • Instruction Fuzzy Hash: 85D19B75A087529FE304CF28C88175BB7E5FB88384F11492DF9888B349E775EA45CB92
                                              APIs
                                              • WebPPictureAlloc.LIBWEBP(?,?), ref: 10041931
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: AllocPicture
                                              • String ID:
                                              • API String ID: 3635584439-0
                                              • Opcode ID: 1738a7174341d6857ffc230c1d7690a844d975f5eb2756b4fb8aae9071addef2
                                              • Instruction ID: bfc1c8ea836457d70317f1d11ae6547896aa99cacd2cc4ac5ab1b85530fc7e10
                                              • Opcode Fuzzy Hash: 1738a7174341d6857ffc230c1d7690a844d975f5eb2756b4fb8aae9071addef2
                                              • Instruction Fuzzy Hash: D18190B57042056BD704DE59EC81FAB73E9EBC8354F108A2DFE49C7282EA31ED0587A5
                                              APIs
                                              • WebPPictureAlloc.LIBWEBP(?,?), ref: 100416B3
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: AllocPicture
                                              • String ID:
                                              • API String ID: 3635584439-0
                                              • Opcode ID: 8e8a7bb614388794462d9d2a7850c2877dfb722896c83da31ecf65a45bb7a51c
                                              • Instruction ID: 7a9a06683f214ef56b7768d6b37289c50b9795c89b704b434286b945ff225095
                                              • Opcode Fuzzy Hash: 8e8a7bb614388794462d9d2a7850c2877dfb722896c83da31ecf65a45bb7a51c
                                              • Instruction Fuzzy Hash: 385154B6604205AFCB04CF59DC81E9BB3E9EBC8310F198669FD58CB245E630F915CBA5
                                              APIs
                                              • WebPSafeMalloc.LIBWEBP(?,?,00000004), ref: 100347E9
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: MallocSafe
                                              • String ID:
                                              • API String ID: 2976254555-0
                                              • Opcode ID: 70c92ace227f2b7325756e9dd7ac4af11b8e871ca89ac4188bc5a38782938346
                                              • Instruction ID: 9436539a8a47f44dc3a755b71ae017ca96848b00ff8a4f70418250bbacd722fb
                                              • Opcode Fuzzy Hash: 70c92ace227f2b7325756e9dd7ac4af11b8e871ca89ac4188bc5a38782938346
                                              • Instruction Fuzzy Hash: 9E51C0B8A08202DFC311CF20D58078A7BA4FF82355F37889CD6995E245E732E425CF55
                                              APIs
                                              • WebPPictureAlloc.LIBWEBP(?,?), ref: 100413E6
                                                • Part of subcall function 1003E630: WebPPictureFree.LIBWEBP(?), ref: 1003E63A
                                              • WebPCopyPlane.LIBWEBP(?,?,?,?,?,?), ref: 1004141A
                                              • WebPCopyPlane.LIBWEBP(?,?,?,?,?,?,?,?,?,?,?,?), ref: 1004143D
                                              • WebPCopyPlane.LIBWEBP(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 10041460
                                              • WebPCopyPlane.LIBWEBP(?,?,?,?,?,?), ref: 10041484
                                              • WebPCopyPlane.LIBWEBP(?,?,?,?,?,?), ref: 100414B8
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: CopyPlane$Picture$AllocFree
                                              • String ID:
                                              • API String ID: 4017657513-0
                                              • Opcode ID: bd1937b0bef50f7e274e96849421e453e31fc440cf4deace5360f4d3e9832a9f
                                              • Instruction ID: d23130a91ab93c57ab1d8fce40b1e99d016c1ef0bfc172e1e368a82f336c5d22
                                              • Opcode Fuzzy Hash: bd1937b0bef50f7e274e96849421e453e31fc440cf4deace5360f4d3e9832a9f
                                              • Instruction Fuzzy Hash: 043109B5200105AFDB48CF58DCC1EA773ADEB88315B198659BD498B34ADA34FC51CAA4
                                              APIs
                                              • ___set_flsgetvalue.LIBCMT ref: 1005A161
                                              • __calloc_crt.LIBCMT ref: 1005A16D
                                              • __getptd.LIBCMT ref: 1005A17A
                                              • CreateThread.KERNEL32(?,?,1005A0AD,00000000,?,?), ref: 1005A1B1
                                              • GetLastError.KERNEL32(?,?,?,?,?,?,00000000), ref: 1005A1BB
                                              • __dosmaperr.LIBCMT ref: 1005A1D3
                                                • Part of subcall function 1005CFAE: __getptd_noexit.LIBCMT ref: 1005CFAE
                                                • Part of subcall function 1005D20D: __decode_pointer.LIBCMT ref: 1005D218
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__decode_pointer__dosmaperr__getptd__getptd_noexit
                                              • String ID:
                                              • API String ID: 1803633139-0
                                              • Opcode ID: 9b4d246db71785e21dad813a121c0c0569e9801e1acb6cc22046c45fd11a20d2
                                              • Instruction ID: 29449978f18a22f62837ac41b491c82337d59a729dd2b1c773fcc0e60cb2e0ab
                                              • Opcode Fuzzy Hash: 9b4d246db71785e21dad813a121c0c0569e9801e1acb6cc22046c45fd11a20d2
                                              • Instruction Fuzzy Hash: 1711E376504719EFDB10EFA4CC82C8F7BE5EF05360F21452AF505D2191EB31A9899BA4
                                              APIs
                                              • CreateSemaphoreA.KERNEL32(00000000,00000000,00000001,00000000), ref: 1003242F
                                              • CreateSemaphoreA.KERNEL32(00000000,00000000,00000001,00000000), ref: 1003243B
                                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 10032448
                                              • CloseHandle.KERNEL32 ref: 1003246C
                                              • CloseHandle.KERNEL32(?), ref: 10032472
                                              • CloseHandle.KERNEL32(?), ref: 10032478
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: CloseCreateHandle$Semaphore$Event
                                              • String ID:
                                              • API String ID: 1779580104-0
                                              • Opcode ID: b81e3938595183dd2ea2ed055db92a0101dd1e2fc5d9806a4dfa63aa45074491
                                              • Instruction ID: 2a4c4648349e298eaf41583137ee27e37180e7016b1f71b6321bb376e7b3e557
                                              • Opcode Fuzzy Hash: b81e3938595183dd2ea2ed055db92a0101dd1e2fc5d9806a4dfa63aa45074491
                                              • Instruction Fuzzy Hash: E9F01D31790301AAF6709B69DC56F06B2E5AF88B01F214819F2599B5D0D6F5F480CA14
                                              APIs
                                              Strings
                                              • no memory during frame initialization., xrefs: 1000318A
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: _memset$MallocSafe
                                              • String ID: no memory during frame initialization.
                                              • API String ID: 1594756895-1605158098
                                              • Opcode ID: b8ced9f54a7b75c4cb07e1084b953435d5e91b845e2606bd24da0e69f7fcfbc0
                                              • Instruction ID: acffb436e00f20ea25b5f040c8e429025991b0a1d913a51de6b1cf148bafd0f8
                                              • Opcode Fuzzy Hash: b8ced9f54a7b75c4cb07e1084b953435d5e91b845e2606bd24da0e69f7fcfbc0
                                              • Instruction Fuzzy Hash: 13815CB1A047018FE318CF39C88179BB7E6FBC8354F09892EE4AA87255DB74B5458B51
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: _memset
                                              • String ID:
                                              • API String ID: 2102423945-0
                                              • Opcode ID: c8a2636cd03794d8c1ab1453ba11427147ea63a6b1a48a194a87faaafa7a7ee6
                                              • Instruction ID: 56857b5e5c0371ec4218856578926faa9efad9a0299a8871cebbb9242ced0529
                                              • Opcode Fuzzy Hash: c8a2636cd03794d8c1ab1453ba11427147ea63a6b1a48a194a87faaafa7a7ee6
                                              • Instruction Fuzzy Hash: C8F11670A087029BD716EF15E58869FB7E0FBC5384F328D2DE5C592250EB358969CF82
                                              APIs
                                              • WebPSafeMalloc.LIBWEBP(00040000,00000000,00000004), ref: 10036237
                                              • _memset.LIBCMT ref: 1003627A
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: MallocSafe_memset
                                              • String ID:
                                              • API String ID: 1319453872-0
                                              • Opcode ID: 272e3f07acd293cdfb48b1be55c46f249da7d36baf715e8e6b19462be5d8e60f
                                              • Instruction ID: 5ecdf8fa65e879c30311a5da439d79863df8e6efb6c9b5108ae06815b8c20602
                                              • Opcode Fuzzy Hash: 272e3f07acd293cdfb48b1be55c46f249da7d36baf715e8e6b19462be5d8e60f
                                              • Instruction Fuzzy Hash: 3CF179716083029FC719CF28D890A5AB7E6EFC8344F15892DF9868B355D371EA46CB82
                                              APIs
                                              • WebPSafeMalloc.LIBWEBP(?,?,00000004), ref: 1003C2A5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: MallocSafe
                                              • String ID:
                                              • API String ID: 2976254555-0
                                              • Opcode ID: e341610a57274014662d058a4995683572cedd27edb47f5c5df2a58b639a5261
                                              • Instruction ID: 69b3eae586ea385734feeb5aeca6c7dc4dccc11e0c23a6ce9d3a36a32174d8b2
                                              • Opcode Fuzzy Hash: e341610a57274014662d058a4995683572cedd27edb47f5c5df2a58b639a5261
                                              • Instruction Fuzzy Hash: ADE156B460830ADFC705CF19C484A5ABBF1FF89345F258A2DE8959B341D731E965CB82
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c44e12b18da8a4448c26557a7fdc7d618da86287a05d70a7dc318f724396a0d6
                                              • Instruction ID: f643697f330d72e2860250e3268f7eb679f085c562a9c88932abc8e1f597f9f3
                                              • Opcode Fuzzy Hash: c44e12b18da8a4448c26557a7fdc7d618da86287a05d70a7dc318f724396a0d6
                                              • Instruction Fuzzy Hash: 5AC1A8B56043849BFB21CF20CC81FE63BA4EB45308F094669EE895F186DF74664DC761
                                              APIs
                                              • WebPCopyPlane.LIBWEBP(5D5F04C4,5EC68B5B,5D5F04C4,5EC68B5B,24448DF0,74E85048,?,00000000,1000B5DD,?,?), ref: 10001B1E
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: CopyPlane
                                              • String ID:
                                              • API String ID: 248045760-0
                                              • Opcode ID: f8b5cc2c85e8a36c6fee82d95ea1e6eb4cfb471e8b0a7697612413ca75bd976d
                                              • Instruction ID: 5dff8c07933219e565e6c1c9bbfb2d5bec2b89d16f7d137d069ec56e940eb6c1
                                              • Opcode Fuzzy Hash: f8b5cc2c85e8a36c6fee82d95ea1e6eb4cfb471e8b0a7697612413ca75bd976d
                                              • Instruction Fuzzy Hash: 22411BB5200902AF9265CB6DE980D67F3F9FB8C2507158A0AF55AC7A54E730FC51CBA0
                                              APIs
                                                • Part of subcall function 10031410: _memset.LIBCMT ref: 10031458
                                              • WebPSafeMalloc.LIBWEBP(00000001,00000000,00000010,?,?,?,00000000,00000000,?), ref: 10031894
                                              • WebPSafeMalloc.LIBWEBP(00000000,?,00000004,?,?,?,?,?,00000000,00000000,?), ref: 100318B2
                                              • WebPSafeMalloc.LIBWEBP(?,00000002,00000002,?,?,?,00000000,00000000,?), ref: 1003191A
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: MallocSafe$_memset
                                              • String ID:
                                              • API String ID: 2803130383-0
                                              • Opcode ID: f564b432df7a29338023231ae309029b7aaa4b76db37751c66f8da1aac44a3a8
                                              • Instruction ID: 8e01b7148017c202623ce846fe61901acaf0b73be91cb26370ee73774f3412c3
                                              • Opcode Fuzzy Hash: f564b432df7a29338023231ae309029b7aaa4b76db37751c66f8da1aac44a3a8
                                              • Instruction Fuzzy Hash: B83160B5A003016FD221DF59C881BABB3F9FB89710F05892DFA489B242D775F84587E5
                                              APIs
                                              • WebPConfigInitInternal.LIBWEBP(?,00000000,?,0000020F), ref: 1003E6A0
                                              • _memset.LIBCMT ref: 1003E6BD
                                              • WebPEncode.LIBWEBP(?,?), ref: 1003E75B
                                              • WebPPictureFree.LIBWEBP(?), ref: 1003E775
                                              • WebPMemoryWriterClear.LIBWEBP(?), ref: 1003E787
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: ClearConfigEncodeFreeInitInternalMemoryPictureWriter_memset
                                              • String ID:
                                              • API String ID: 265483114-0
                                              • Opcode ID: 7acd576da8c905c688307ca26847a859fb2061c496bcdec7ab1e56d2236180df
                                              • Instruction ID: 257716179f5a44115cd30c9c061a6dafbdc2eae86cc777fd629b1c617c9764ed
                                              • Opcode Fuzzy Hash: 7acd576da8c905c688307ca26847a859fb2061c496bcdec7ab1e56d2236180df
                                              • Instruction Fuzzy Hash: 6E3140B55083809FE361CF54D985B9BB7E4EFC8745F404E1DF5888A281E775E908CB52
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: _memset
                                              • String ID:
                                              • API String ID: 2102423945-0
                                              • Opcode ID: ae7b7e30378d7648794ab40508840ef11d64ef6c1b01581b66c46403e5986418
                                              • Instruction ID: be14201cc4491b7fdbcb494fc888ebf960feaadea7e74db1eeb200c65c719e0c
                                              • Opcode Fuzzy Hash: ae7b7e30378d7648794ab40508840ef11d64ef6c1b01581b66c46403e5986418
                                              • Instruction Fuzzy Hash: 6F116DBA500B08AFD224DFB4D881AD7B3B8FF45340F054A0EE25A0B102DB35F555CBA1
                                              APIs
                                              • __getptd.LIBCMT ref: 077D9F4F
                                                • Part of subcall function 077D7FD9: __getptd_noexit.LIBCMT ref: 077D7FDC
                                                • Part of subcall function 077D7FD9: __amsg_exit.LIBCMT ref: 077D7FE9
                                              • __amsg_exit.LIBCMT ref: 077D9F6F
                                              • __lock.LIBCMT ref: 077D9F7F
                                              • InterlockedDecrement.KERNEL32(?), ref: 077D9F9C
                                              • InterlockedIncrement.KERNEL32(078C1668), ref: 077D9FC7
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393297664.00000000077D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 077D0000, based on PE: true
                                              • Associated: 00000004.00000002.3393280485.00000000077D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393330091.00000000077E1000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393352921.00000000077E7000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393370689.00000000077E8000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393389082.00000000077E9000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393406651.00000000077EB000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_77d0000_FSCapture.jbxd
                                              Similarity
                                              • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                              • String ID:
                                              • API String ID: 4271482742-0
                                              • Opcode ID: 5cd3ffbb998bab2818edb46a5a36228f8b0b7f957d9ff784033c83d7649ffa1f
                                              • Instruction ID: b3daa07f89a3828a9bb3c919c55284b5072976cf9910f4885ffc2b0a2b5316f2
                                              • Opcode Fuzzy Hash: 5cd3ffbb998bab2818edb46a5a36228f8b0b7f957d9ff784033c83d7649ffa1f
                                              • Instruction Fuzzy Hash: 7E01ADF1A00712EBCB25ABB4944A79D7BB0EB087E0F044515EA14AB290C738BD51CFD2
                                              APIs
                                              • __getptd.LIBCMT ref: 100604DF
                                                • Part of subcall function 1005C456: __getptd_noexit.LIBCMT ref: 1005C459
                                                • Part of subcall function 1005C456: __amsg_exit.LIBCMT ref: 1005C466
                                              • __amsg_exit.LIBCMT ref: 100604FF
                                              • __lock.LIBCMT ref: 1006050F
                                              • InterlockedDecrement.KERNEL32(?), ref: 1006052C
                                              • InterlockedIncrement.KERNEL32(07841668), ref: 10060557
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                              • String ID:
                                              • API String ID: 4271482742-0
                                              • Opcode ID: 05094d616dc56bac4cc1f4d3239fb68dee6974fc4e59e3cf8fd1970942778717
                                              • Instruction ID: ae6aa9d4fc8e83163b767d0afabfa64a435f6ca516d177f0604983e7ea31df38
                                              • Opcode Fuzzy Hash: 05094d616dc56bac4cc1f4d3239fb68dee6974fc4e59e3cf8fd1970942778717
                                              • Instruction Fuzzy Hash: 9601C036A41A21EFE751DB658C45B8FB7B5EB04760F010205F856A7291EB387D81CFE1
                                              APIs
                                              • __lock.LIBCMT ref: 077D38BB
                                                • Part of subcall function 077D4554: __mtinitlocknum.LIBCMT ref: 077D456A
                                                • Part of subcall function 077D4554: __amsg_exit.LIBCMT ref: 077D4576
                                                • Part of subcall function 077D4554: EnterCriticalSection.KERNEL32(?,?,?,077DC79F,00000004,077E6240,0000000C,077D8378,00000001,?,00000000,00000000,00000000,?,077D7F8B,00000001), ref: 077D457E
                                              • ___sbh_find_block.LIBCMT ref: 077D38C6
                                              • ___sbh_free_block.LIBCMT ref: 077D38D5
                                              • HeapFree.KERNEL32(00000000,00000001,077E6010,0000000C,077D4535,00000000,077E6050,0000000C,077D456F,00000001,?,?,077DC79F,00000004,077E6240,0000000C), ref: 077D3905
                                              • GetLastError.KERNEL32(?,077DC79F,00000004,077E6240,0000000C,077D8378,00000001,?,00000000,00000000,00000000,?,077D7F8B,00000001,00000214), ref: 077D3916
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393297664.00000000077D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 077D0000, based on PE: true
                                              • Associated: 00000004.00000002.3393280485.00000000077D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393330091.00000000077E1000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393352921.00000000077E7000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393370689.00000000077E8000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393389082.00000000077E9000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393406651.00000000077EB000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_77d0000_FSCapture.jbxd
                                              Similarity
                                              • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                              • String ID:
                                              • API String ID: 2714421763-0
                                              • Opcode ID: ef823b305bae02e36ec220d74726e317d7ac2a5e3e5a7de85aa677bf00a00c84
                                              • Instruction ID: 5bc04ba7a9f9857eb2f0210020962933633655bcba2c623c59519b983cbe5e09
                                              • Opcode Fuzzy Hash: ef823b305bae02e36ec220d74726e317d7ac2a5e3e5a7de85aa677bf00a00c84
                                              • Instruction Fuzzy Hash: 930167F1901346DBDF207F70980EF5D7BB4AF053E9F154529E515AA090DF388D508A57
                                              APIs
                                              • __lock.LIBCMT ref: 1005A357
                                                • Part of subcall function 1005D3AF: __mtinitlocknum.LIBCMT ref: 1005D3C5
                                                • Part of subcall function 1005D3AF: __amsg_exit.LIBCMT ref: 1005D3D1
                                                • Part of subcall function 1005D3AF: EnterCriticalSection.KERNEL32(10032958,10032958,?,1005E1E6,00000004,10074240,0000000C,1005A313,?,10032967,00000000,?,?,00000000,10032967,?), ref: 1005D3D9
                                              • ___sbh_find_block.LIBCMT ref: 1005A362
                                              • ___sbh_free_block.LIBCMT ref: 1005A371
                                              • HeapFree.KERNEL32(00000000,?,10074130,Function_0005A339,1005C447,00000000,?,1005D008,?,00000001,?,?,1005D339,00000018,10074220,0000000C), ref: 1005A3A1
                                              • GetLastError.KERNEL32(?,1005D008,?,00000001,?,?,1005D339,00000018,10074220,0000000C,1005D3CA,?,10032958,?,1005E1E6,00000004), ref: 1005A3B2
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                              • String ID:
                                              • API String ID: 2714421763-0
                                              • Opcode ID: 6914052f842f42e21be7bcb99ad71f6379c4cfd254a255a3157980634192e041
                                              • Instruction ID: 056efe86ca25bad3ec9aeb655d41facfe1a78a49170f40d0c5fcc5fb62cc701c
                                              • Opcode Fuzzy Hash: 6914052f842f42e21be7bcb99ad71f6379c4cfd254a255a3157980634192e041
                                              • Instruction Fuzzy Hash: 2401DB35901315EEEB20EF708C46B4E3BE4DF01365F114115F044A60D1DB78AAC89B95
                                              APIs
                                                • Part of subcall function 1005CB8D: _doexit.LIBCMT ref: 1005CB99
                                              • ___set_flsgetvalue.LIBCMT ref: 1005A0B3
                                                • Part of subcall function 1005C268: TlsGetValue.KERNEL32(?,1005C3F4,?,1005D008,?,00000001,?,?,1005D339,00000018,10074220,0000000C,1005D3CA,?,10032958), ref: 1005C271
                                                • Part of subcall function 1005C268: __decode_pointer.LIBCMT ref: 1005C283
                                                • Part of subcall function 1005C268: TlsSetValue.KERNEL32(00000000,1005D008,?,00000001,?,?,1005D339,00000018,10074220,0000000C,1005D3CA,?,10032958,?,1005E1E6,00000004), ref: 1005C292
                                              • ___fls_getvalue@4.LIBCMT ref: 1005A0BE
                                                • Part of subcall function 1005C248: TlsGetValue.KERNEL32(?,?,1005A0C3,00000000), ref: 1005C256
                                              • ___fls_setvalue@8.LIBCMT ref: 1005A0D1
                                                • Part of subcall function 1005C29C: __decode_pointer.LIBCMT ref: 1005C2AD
                                              • GetLastError.KERNEL32(00000000,?,00000000), ref: 1005A0DA
                                              • ExitThread.KERNEL32 ref: 1005A0E1
                                              • GetCurrentThreadId.KERNEL32 ref: 1005A0E7
                                              • __freefls@4.LIBCMT ref: 1005A107
                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 1005A11A
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: Value$CurrentThread__decode_pointer$ErrorExitImageLastNonwritable___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                              • String ID:
                                              • API String ID: 132634196-0
                                              • Opcode ID: 9c1ee79d4b8fa126ac0892ca3995595befa959fa9520c9b333a51b0f7b4be5ed
                                              • Instruction ID: 4ef15d3223001acd04499119b71d57743274634e6d7e17acf1aa4fa898ab6344
                                              • Opcode Fuzzy Hash: 9c1ee79d4b8fa126ac0892ca3995595befa959fa9520c9b333a51b0f7b4be5ed
                                              • Instruction Fuzzy Hash: 57E04F3981421E6FDB00A7F18C0AC8E366DEE41290F004600F914D3002EE24A8894BB1
                                              APIs
                                              • __startOneArgErrorHandling.LIBCMT ref: 077D402D
                                                • Part of subcall function 077D7980: __87except.LIBCMT ref: 077D79BB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393297664.00000000077D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 077D0000, based on PE: true
                                              • Associated: 00000004.00000002.3393280485.00000000077D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393330091.00000000077E1000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393352921.00000000077E7000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393370689.00000000077E8000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393389082.00000000077E9000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393406651.00000000077EB000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_77d0000_FSCapture.jbxd
                                              Similarity
                                              • API ID: ErrorHandling__87except__start
                                              • String ID: pow
                                              • API String ID: 2905807303-2276729525
                                              • Opcode ID: 73db1e4ba182965e5fe5b0ea4cd4b4fa8a2148adcb9105504d1d539bb1e20752
                                              • Instruction ID: f34407f4d50c823af57f5b89116e71be26ba8ab0cce8365b80a093f709486d89
                                              • Opcode Fuzzy Hash: 73db1e4ba182965e5fe5b0ea4cd4b4fa8a2148adcb9105504d1d539bb1e20752
                                              • Instruction Fuzzy Hash: 72515EF1A1C147C6CF197B28C90537A2BB4EB417D5F248D9CE8D54A1E4EB358C9486C3
                                              APIs
                                              • __startOneArgErrorHandling.LIBCMT ref: 1005A86D
                                                • Part of subcall function 1005EAA0: __87except.LIBCMT ref: 1005EADB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: ErrorHandling__87except__start
                                              • String ID: pow
                                              • API String ID: 2905807303-2276729525
                                              • Opcode ID: 3255efe292ec57b261b8eb641d1074979abef8ab492351da889213b11750a76d
                                              • Instruction ID: 5546ebd1354f2cf3b728a84e387e056f39b54941987959c4d21dcf9e6ce61959
                                              • Opcode Fuzzy Hash: 3255efe292ec57b261b8eb641d1074979abef8ab492351da889213b11750a76d
                                              • Instruction Fuzzy Hash: C0512731D0838396D749E724C94137E6BD4EF42790F20CD6DE8D5821A5EE389CCD9A43
                                              APIs
                                              • WebPSafeMalloc.LIBWEBP(?,?,00000004,00000001,?), ref: 1003CDE2
                                                • Part of subcall function 1003BFD0: WebPSafeMalloc.LIBWEBP(?,?,00000010), ref: 1003C002
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: MallocSafe
                                              • String ID: d
                                              • API String ID: 2976254555-2564639436
                                              • Opcode ID: 910d5d6bb1d2a06cf7e77e9a77d645a2ec748baf56f2b3b511467680816decc7
                                              • Instruction ID: 7049609f2c24c392d7668332652c0065e2a9dc60c1cab2852b912c1ce1783ccb
                                              • Opcode Fuzzy Hash: 910d5d6bb1d2a06cf7e77e9a77d645a2ec748baf56f2b3b511467680816decc7
                                              • Instruction Fuzzy Hash: B651AB75608308AFC301DB55C881E6FB7E9EFC5345F05482DF985CB252EA75E905CBA2
                                              APIs
                                              • WebPSafeMalloc.LIBWEBP(00000001,00000000,?,00000000,00000000,?,?,?,00000000,1004C9FD,00000000), ref: 100331F5
                                              • WebPCopyPlane.LIBWEBP(?,?,00000000,?,?,?,00000000,?,?,?,00000000,1004C9FD,00000000), ref: 10033224
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: CopyMallocPlaneSafe
                                              • String ID: gfff
                                              • API String ID: 27801988-1553575800
                                              • Opcode ID: 23f94fa5f40e5b390a1f345ecbba24604b76ff2e55a8ab95cfec59575af22dfe
                                              • Instruction ID: ae09e90b05b7cb6fdf3a290648670da87970850440c600bfa1f788855d9700ec
                                              • Opcode Fuzzy Hash: 23f94fa5f40e5b390a1f345ecbba24604b76ff2e55a8ab95cfec59575af22dfe
                                              • Instruction Fuzzy Hash: 27418CB5604701AFD304CB19E881D6BB7E8EBC8255F44892DF949CB352E631F944CBA2
                                              APIs
                                              • GetModuleHandleA.KERNEL32(KERNEL32,077D399A), ref: 077D6454
                                              • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 077D6464
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393297664.00000000077D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 077D0000, based on PE: true
                                              • Associated: 00000004.00000002.3393280485.00000000077D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393330091.00000000077E1000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393352921.00000000077E7000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393370689.00000000077E8000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393389082.00000000077E9000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393406651.00000000077EB000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_77d0000_FSCapture.jbxd
                                              Similarity
                                              • API ID: AddressHandleModuleProc
                                              • String ID: IsProcessorFeaturePresent$KERNEL32
                                              • API String ID: 1646373207-3105848591
                                              • Opcode ID: 004fac49c480f438180638ce828ab2d324069e81adfff92aebfb040202c093f7
                                              • Instruction ID: 15c5bf68eda5d68f88abd70dd49aa876e1d9c529d160e5aa587e94afc8178a00
                                              • Opcode Fuzzy Hash: 004fac49c480f438180638ce828ab2d324069e81adfff92aebfb040202c093f7
                                              • Instruction Fuzzy Hash: 7FF01DB0A00A4DD2DF001BA1B90F26E7A79BB847C1FD24590D1D2E0084DE7486B08295
                                              APIs
                                              • GetModuleHandleA.KERNEL32(KERNEL32,10059BEA), ref: 1005C028
                                              • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 1005C038
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: AddressHandleModuleProc
                                              • String ID: IsProcessorFeaturePresent$KERNEL32
                                              • API String ID: 1646373207-3105848591
                                              • Opcode ID: c87cc1015036bf67ccf5a706e9910e9112319a81e60a90f0d8c0444ac0913a05
                                              • Instruction ID: 05549967617fdd965919294ef05147626cd3cc21824378fa40f3f32a11d3435c
                                              • Opcode Fuzzy Hash: c87cc1015036bf67ccf5a706e9910e9112319a81e60a90f0d8c0444ac0913a05
                                              • Instruction Fuzzy Hash: 4BF03030900A1ED2FF405BB5AC5DAAF7ABAFB80745F920590D6D1A00D4DF708474C651
                                              APIs
                                              • _memset.LIBCMT ref: 10036D6C
                                              • _memset.LIBCMT ref: 10036D83
                                              • WebPSafeMalloc.LIBWEBP(?,?,00000002,?,00000000,0000007C,?,00000000,0000007C), ref: 10036D97
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: _memset$MallocSafe
                                              • String ID:
                                              • API String ID: 1594756895-0
                                              • Opcode ID: 7be61ca9a903f1eb254e13c8377f69c825722c48d59da557067e9e6e0e0dc199
                                              • Instruction ID: 9fe5d610328c52816c5c827269535c6055e6c2496fea6f08821d9dc9b4759c46
                                              • Opcode Fuzzy Hash: 7be61ca9a903f1eb254e13c8377f69c825722c48d59da557067e9e6e0e0dc199
                                              • Instruction Fuzzy Hash: E4C19675A083528FC366DF18D88066BB7E1FF88351F11896DE989DB241D735E849CB82
                                              APIs
                                              • WebPSafeMalloc.LIBWEBP(00000000,?,?,?,?,00000000,00000004), ref: 1000A284
                                              • _memset.LIBCMT ref: 1000A2F0
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: MallocSafe_memset
                                              • String ID:
                                              • API String ID: 1319453872-0
                                              • Opcode ID: 0ea48e1d1aeeadb647eaa325281b9441608f95c46743acd3bcaf897c34b32c08
                                              • Instruction ID: 2e238d0a35c7d5bba853649bb69ea303134c6504c661b1ff0795defe9801bc60
                                              • Opcode Fuzzy Hash: 0ea48e1d1aeeadb647eaa325281b9441608f95c46743acd3bcaf897c34b32c08
                                              • Instruction Fuzzy Hash: FB519CB55043069FE310DF65D840BABB3E8FB89384F000A2DF94487645E7B5FA88CBA1
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: __aulldiv$_memset
                                              • String ID:
                                              • API String ID: 4237763252-0
                                              • Opcode ID: 9216c1dc1b941f08d4272646e905896504a96fa6d975332836243358ead63806
                                              • Instruction ID: a31d733f297547251cd012d458919a82d4191f6bbcbc4b7969dfca29620be6a2
                                              • Opcode Fuzzy Hash: 9216c1dc1b941f08d4272646e905896504a96fa6d975332836243358ead63806
                                              • Instruction Fuzzy Hash: 2B515CB5604701AFD768CF298881A2BB7FAFBC8741F50892DF489C7651D771E904CB61
                                              APIs
                                              • WebPPictureInitInternal.LIBWEBP(?,0000020F,?,?,?), ref: 10032BB3
                                              • WebPPictureAlloc.LIBWEBP ref: 10032BDF
                                                • Part of subcall function 1003E630: WebPPictureFree.LIBWEBP(?), ref: 1003E63A
                                              • WebPConfigInitInternal.LIBWEBP(?,00000000,?,0000020F), ref: 10032C2E
                                              • WebPPictureFree.LIBWEBP(?,?,?,?,00000000), ref: 10032C9A
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: Picture$FreeInitInternal$AllocConfig
                                              • String ID:
                                              • API String ID: 2539684544-0
                                              • Opcode ID: be2a6ba805ec7572d341e035e5ff8f52206af373471eca9ffe67f88cf9ef8801
                                              • Instruction ID: db1fcf7928b6367ba70eb73d7ea9da4f0233af2c2e2b12fefad03cf21d2290d1
                                              • Opcode Fuzzy Hash: be2a6ba805ec7572d341e035e5ff8f52206af373471eca9ffe67f88cf9ef8801
                                              • Instruction Fuzzy Hash: 6731A076508345AFD321CF54D881BEBB7E8FB88700F004A1DF98897282D775A958CBA2
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c38e2cc6dad26e8223e798c34362fb025cf7b03264ac9fb969d933f15cd4ea6d
                                              • Instruction ID: 743d148eb505c5ada002ba56542c7e9a809b8961cc0498e3d3be23d9679d6ef7
                                              • Opcode Fuzzy Hash: c38e2cc6dad26e8223e798c34362fb025cf7b03264ac9fb969d933f15cd4ea6d
                                              • Instruction Fuzzy Hash: B13167F48156108FE758CF19E648A567EE0FB48315F4681AEE1088F3A2D3BAC548CF49
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393297664.00000000077D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 077D0000, based on PE: true
                                              • Associated: 00000004.00000002.3393280485.00000000077D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393330091.00000000077E1000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393352921.00000000077E7000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393370689.00000000077E8000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393389082.00000000077E9000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393406651.00000000077EB000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_77d0000_FSCapture.jbxd
                                              Similarity
                                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                              • String ID:
                                              • API String ID: 3016257755-0
                                              • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                              • Instruction ID: fb642ef6ce3bac23f7d77b1fc977561f9a1681bea5ade03023d90643064fe229
                                              • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                              • Instruction Fuzzy Hash: 8A1148B244024EFBCF125E84CC05CEE3F72BB192D4B498815FA1899030D376D9B1AB82
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                              • String ID:
                                              • API String ID: 3016257755-0
                                              • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                              • Instruction ID: 68f4a3919ead761f31bd14aab83934d9258496640c8641226989884874fbb651
                                              • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                              • Instruction Fuzzy Hash: 76117B3640444EFBCF128E84CC41CEE3FA2FB08290B148464FA1958031D637EAB9EF91
                                              APIs
                                              • WebPFreeDecBuffer.LIBWEBP(?), ref: 10004097
                                                • Part of subcall function 10002F50: WebPGetWorkerInterface.LIBWEBP ref: 10002F64
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: BufferFreeInterfaceWorker
                                              • String ID:
                                              • API String ID: 3402948626-0
                                              • Opcode ID: d998456223a06daaca197baf90548f56b67bca61c351dc92f8f84430276b3c19
                                              • Instruction ID: e1ac2a6b6020d60ec48af013d97847cc581f3dd8141240a0b1161ab79f6836a3
                                              • Opcode Fuzzy Hash: d998456223a06daaca197baf90548f56b67bca61c351dc92f8f84430276b3c19
                                              • Instruction Fuzzy Hash: 08F06DBA9107119BE620DB709C41B5B73E8EB41281F06491DE6865710ADA35F85487A6
                                              APIs
                                              • __getptd.LIBCMT ref: 077DA6BB
                                                • Part of subcall function 077D7FD9: __getptd_noexit.LIBCMT ref: 077D7FDC
                                                • Part of subcall function 077D7FD9: __amsg_exit.LIBCMT ref: 077D7FE9
                                              • __getptd.LIBCMT ref: 077DA6D2
                                              • __amsg_exit.LIBCMT ref: 077DA6E0
                                              • __lock.LIBCMT ref: 077DA6F0
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393297664.00000000077D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 077D0000, based on PE: true
                                              • Associated: 00000004.00000002.3393280485.00000000077D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393330091.00000000077E1000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393352921.00000000077E7000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393370689.00000000077E8000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393389082.00000000077E9000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                              • Associated: 00000004.00000002.3393406651.00000000077EB000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_77d0000_FSCapture.jbxd
                                              Similarity
                                              • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                              • String ID:
                                              • API String ID: 3521780317-0
                                              • Opcode ID: c19845abb6a0a11456919da3fd0618cc5507dd7de0fe5056c561662922f1fb09
                                              • Instruction ID: 889ad48514210c9aaef1770168faeb7e63b272463a5a60d4b4711ff359b135fd
                                              • Opcode Fuzzy Hash: c19845abb6a0a11456919da3fd0618cc5507dd7de0fe5056c561662922f1fb09
                                              • Instruction Fuzzy Hash: A6F06DB1A40305DBDB20BBB4840975832B0BB047E9F05C54AD8419B2A0CB749E12CBA3
                                              APIs
                                              • __getptd.LIBCMT ref: 10060C4B
                                                • Part of subcall function 1005C456: __getptd_noexit.LIBCMT ref: 1005C459
                                                • Part of subcall function 1005C456: __amsg_exit.LIBCMT ref: 1005C466
                                              • __getptd.LIBCMT ref: 10060C62
                                              • __amsg_exit.LIBCMT ref: 10060C70
                                              • __lock.LIBCMT ref: 10060C80
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                              • String ID:
                                              • API String ID: 3521780317-0
                                              • Opcode ID: 0ade45ac7e3d0c595e53732a9233f60d0ef78d3e241f2c79b345d9bc94aafe48
                                              • Instruction ID: 935b3cb2ed76482d5041cadff8720df992e2e795a1b5a09fe44a78e5c2f41121
                                              • Opcode Fuzzy Hash: 0ade45ac7e3d0c595e53732a9233f60d0ef78d3e241f2c79b345d9bc94aafe48
                                              • Instruction Fuzzy Hash: 52F09036A807189FD320EBB48906F8E73B1EF04360F014319F491A7292DB347945DF96
                                              APIs
                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 1005A042
                                                • Part of subcall function 1005C830: __FindPESection.LIBCMT ref: 1005C88B
                                              • __getptd_noexit.LIBCMT ref: 1005A052
                                              • __freeptd.LIBCMT ref: 1005A05C
                                              • ExitThread.KERNEL32 ref: 1005A065
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: CurrentExitFindImageNonwritableSectionThread__freeptd__getptd_noexit
                                              • String ID:
                                              • API String ID: 3182216644-0
                                              • Opcode ID: 130b87610f953747d7b600629851b505d521a785ff2ae1d62af5aa09110a26ae
                                              • Instruction ID: 0c41d77596b456020636dc087564fe6366e214117bf09f83fc896c8b2ecbcdfe
                                              • Opcode Fuzzy Hash: 130b87610f953747d7b600629851b505d521a785ff2ae1d62af5aa09110a26ae
                                              • Instruction Fuzzy Hash: E7D0173442076A9AEB10A771CC09A2937DAEF0A394B405624F505890E1EFB0ECC8D9A0
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: _memset
                                              • String ID: ($`
                                              • API String ID: 2102423945-1967476404
                                              • Opcode ID: 9904988056d36e1ba59fc7c0ffb4820f2cd68e903ab0b14669b77e9bad955c16
                                              • Instruction ID: 2da91f8386d212c40438f94febd1fa4cc698ba8d6a8e9380ab819d739ad3b7e5
                                              • Opcode Fuzzy Hash: 9904988056d36e1ba59fc7c0ffb4820f2cd68e903ab0b14669b77e9bad955c16
                                              • Instruction Fuzzy Hash: E4C1A1B59087408FD325CF64C881B9BB3E9EFC9305F04492EF5898B251EB75E985CB92
                                              APIs
                                              • VP8GetInfo.LIBWEBP(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 1000AE14
                                              • VP8LGetInfo.LIBWEBP(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 1000AE4E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: Info
                                              • String ID: ALPH
                                              • API String ID: 1807457897-3117416470
                                              • Opcode ID: 84d0fcb6eb2dea2ea8cde1ae898b265a4277d717c7971c325730b3277adad610
                                              • Instruction ID: 77b66d50b87e58df57ddd2e98b8341c957536e6777846b9176399e102d35009f
                                              • Opcode Fuzzy Hash: 84d0fcb6eb2dea2ea8cde1ae898b265a4277d717c7971c325730b3277adad610
                                              • Instruction Fuzzy Hash: 939107B66083858FE314CF58D88095FB7E5EBCA780F514E2EF59687214E730ED888B52
                                              APIs
                                              • VP8LCheckSignature.LIBWEBP(?,00000000,?,00000000,?,1000ADBE,?,?,?,?,?), ref: 1000AB90
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: CheckSignature
                                              • String ID: VP8 $VP8L
                                              • API String ID: 572727604-4029249501
                                              • Opcode ID: 72f330742a467239ddc92276b6e5d424c04b3f0f82ec13160b8151fd185f398e
                                              • Instruction ID: 1d285487e508a45121b469d7176728d12c9325352dada906c6a30674989cca20
                                              • Opcode Fuzzy Hash: 72f330742a467239ddc92276b6e5d424c04b3f0f82ec13160b8151fd185f398e
                                              • Instruction Fuzzy Hash: 1431C8B29041A14FE70CDE7D84F4539BFD2DB432E1B0A43AEE5A74A19ACB289D809750
                                              APIs
                                              • WebPSafeMalloc.LIBWEBP(?,?,00000004), ref: 1003E08E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3393556939.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000004.00000002.3393538483.0000000010000000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393699115.0000000010067000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393736376.0000000010076000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                              • Associated: 00000004.00000002.3393758203.0000000010079000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_10000000_FSCapture.jbxd
                                              Similarity
                                              • API ID: MallocSafe
                                              • String ID: gfff
                                              • API String ID: 2976254555-1553575800
                                              • Opcode ID: fbf46ad3069121c69f437994dd78de115590da39bbd198971450c5a965793dcc
                                              • Instruction ID: 31b2692693949ebd8a8f342ec89fd1c5b3288246a4720ada9fdd023909be69ab
                                              • Opcode Fuzzy Hash: fbf46ad3069121c69f437994dd78de115590da39bbd198971450c5a965793dcc
                                              • Instruction Fuzzy Hash: 053135B660434A6FD314DA09EC8096BB798FBC9365F05062AF845CB381E331FD558BE2