Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Adware.Downware.20566.20228.21311.exe

Overview

General Information

Sample name:SecuriteInfo.com.Adware.Downware.20566.20228.21311.exe
Analysis ID:1532473
MD5:8c18150421977fe4528204b8095469d1
SHA1:f69137f7558d0953879378b91b58914507df75a8
SHA256:c45f5f52bbcfbb3540aab96ecf76b14df72f3c82f917cb368c23cbf0a92eaaca
Tags:exe
Infos:

Detection

Score:36
Range:0 - 100
Whitelisted:false
Confidence:0%

Compliance

Score:32
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
EXE planting / hijacking vulnerabilities found
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeVirustotal: Detection: 14%Perma Link
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exe, 00000000.00000000.1719627148.00000000013F4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_18794f72-a
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeEXE: C:\Users\user\Desktop\setup.exeJump to behavior

Compliance

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeEXE: C:\Users\user\Desktop\setup.exeJump to behavior
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeStatic PE information: certificate valid
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: c:\nullsoft\nsis_winamp\Release\nsis_winamp.pdb source: setup.exe, 00000001.00000002.2962784724.0000000002D47000.00000004.00000020.00020000.00000000.sdmp, nsiB2D7.tmp.1.dr
Source: C:\Users\user\Desktop\setup.exeCode function: 1_2_00406436 FindFirstFileW,FindClose,1_2_00406436
Source: C:\Users\user\Desktop\setup.exeCode function: 1_2_00406DFC DeleteFileW,CloseHandle,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,1_2_00406DFC
Source: C:\Users\user\Desktop\setup.exeCode function: 1_2_00402E18 FindFirstFileW,1_2_00402E18
Source: setup.exe, 00000001.00000002.2962784724.0000000002D47000.00000004.00000020.00020000.00000000.sdmp, setup.exe, 00000001.00000002.2962665921.0000000002B42000.00000004.00000020.00020000.00000000.sdmp, nsiB2D7.tmp.1.drString found in binary or memory: ping -n 1 -w 400 www.yahoo.comonlineno connection equals www.yahoo.com (Yahoo)
Source: setup.exe.0.drString found in binary or memory: http://crl.aol.com/AOL/MasterCRL.crl0
Source: setup.exe.0.drString found in binary or memory: http://crl.aol.com/AOLMSPKI/aolCodeSign.crl0
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
Source: setup.exe.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
Source: nsiB2D7.tmp.1.drString found in binary or memory: http://dev.winamp.com/wiki/Main_Page
Source: setup.exe, 00000001.00000002.2962784724.0000000002D47000.00000004.00000020.00020000.00000000.sdmp, setup.exe, 00000001.00000002.2962665921.0000000002B42000.00000004.00000020.00020000.00000000.sdmp, nsiB2D7.tmp.1.drString found in binary or memory: http://download.nullsoft.com/redist/dx/d3dx9_31_42_x86_embed.exed3dx9_31.dll
Source: setup.exe, 00000001.00000002.2962784724.0000000002D47000.00000004.00000020.00020000.00000000.sdmp, setup.exe, 00000001.00000002.2962665921.0000000002B42000.00000004.00000020.00020000.00000000.sdmp, nsiB2D7.tmp.1.drString found in binary or memory: http://download.nullsoft.com/redist/dx/dxwebsetup.exed3dx9_42.dll
Source: setup.exe, 00000001.00000002.2962784724.0000000002D47000.00000004.00000020.00020000.00000000.sdmp, setup.exe, 00000001.00000002.2962665921.0000000002B42000.00000004.00000020.00020000.00000000.sdmp, nsiB2D7.tmp.1.drString found in binary or memory: http://download.nullsoft.com/redist/wm/wmfdist95.exe3287http://download.nullsoft.com/redist/wm/wmfdi
Source: setup.exe, 00000001.00000002.2962784724.0000000002D47000.00000004.00000020.00020000.00000000.sdmp, setup.exe, 00000001.00000002.2962665921.0000000002B42000.00000004.00000020.00020000.00000000.sdmp, nsiB2D7.tmp.1.drString found in binary or memory: http://forums.winamp.comURLUpdateInfo5.66
Source: nsiB2D7.tmp.1.drString found in binary or memory: http://lyricsplugin.com
Source: nsiB2D7.tmp.1.drString found in binary or memory: http://mp3licensing.com
Source: setup.exe, 00000001.00000000.1750300204.0000000000408000.00000002.00000001.01000000.00000006.sdmp, setup.exe, 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmp, setup.exe.0.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeString found in binary or memory: http://ocsp.comodoca.com0
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeString found in binary or memory: http://ocsp.sectigo.com0
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeString found in binary or memory: http://ocsp.sectigo.com0M
Source: setup.exe.0.drString found in binary or memory: http://ocsp.thawte.com0
Source: setup.exe.0.drString found in binary or memory: http://ocsp.web.aol.com:80/ocsp0
Source: setup.exe.0.drString found in binary or memory: http://pki-info.aol.com/AOLMSPKI/index.html0
Source: setup.exe.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: setup.exe.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: setup.exe.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: setup.exe.0.drString found in binary or memory: http://www.winamp.com
Source: setup.exe, 00000001.00000000.1750690873.0000000000678000.00000002.00000001.01000000.00000006.sdmp, setup.exe, 00000001.00000002.2962784724.0000000002D47000.00000004.00000020.00020000.00000000.sdmp, setup.exe, 00000001.00000002.2962665921.0000000002B42000.00000004.00000020.00020000.00000000.sdmp, setup.exe.0.dr, nsiB2D7.tmp.1.drString found in binary or memory: http://www.winamp.com/
Source: nsiB2D7.tmp.1.drString found in binary or memory: http://www.winamp.com/download
Source: nsiB2D7.tmp.1.drString found in binary or memory: http://www.winamp.com/legal/cloud
Source: setup.exe, 00000001.00000002.2962784724.0000000002D47000.00000004.00000020.00020000.00000000.sdmp, setup.exe, 00000001.00000002.2962665921.0000000002B42000.00000004.00000020.00020000.00000000.sdmp, nsiB2D7.tmp.1.drString found in binary or memory: http://www.winamp.com/legal/eula/pc0x3FF0x02
Source: setup.exe, 00000001.00000002.2962784724.0000000002D47000.00000004.00000020.00020000.00000000.sdmp, setup.exe, 00000001.00000002.2962665921.0000000002B42000.00000004.00000020.00020000.00000000.sdmp, nsiB2D7.tmp.1.drString found in binary or memory: http://www.winamp.com/legal/eula/pcopen
Source: nsiB2D7.tmp.1.drString found in binary or memory: http://www.winamp.com/legal/privacy
Source: setup.exe, 00000001.00000002.2962784724.0000000002D47000.00000004.00000020.00020000.00000000.sdmp, setup.exe, 00000001.00000002.2962665921.0000000002B42000.00000004.00000020.00020000.00000000.sdmp, nsiB2D7.tmp.1.drString found in binary or memory: http://www.winamp.com/open
Source: setup.exe, 00000001.00000002.2962784724.0000000002D47000.00000004.00000020.00020000.00000000.sdmp, setup.exe, 00000001.00000002.2962665921.0000000002B42000.00000004.00000020.00020000.00000000.sdmp, nsiB2D7.tmp.1.drString found in binary or memory: http://www.winamp.comPublisherVersionMajorVersionMinorNoRepairNoModifyModifyPathInstallLocationDispl
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeString found in binary or memory: https://curl.se/docs/hsts.html
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: setup.exe.0.drString found in binary or memory: https://pki-info.aol.com/AOL/index.html05
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeString found in binary or memory: https://sectigo.com/CPS0
Source: C:\Users\user\Desktop\setup.exeCode function: 1_2_0040522D GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,1_2_0040522D
Source: C:\Users\user\Desktop\setup.exeCode function: 1_2_00404605 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,1_2_00404605
Source: C:\Users\user\Desktop\setup.exeCode function: 1_2_004039E3 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,InitOnceBeginInitialize,ExitWindowsEx,1_2_004039E3
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeCode function: 0_2_00DE11700_2_00DE1170
Source: C:\Users\user\Desktop\setup.exeCode function: 1_2_0040761C1_2_0040761C
Source: C:\Users\user\Desktop\setup.exeCode function: 1_2_004070331_2_00407033
Source: C:\Users\user\Desktop\setup.exeCode function: 1_2_00404ADC1_2_00404ADC
Source: C:\Users\user\Desktop\setup.exeCode function: String function: 00406404 appears 57 times
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: sus36.winEXE@3/7@0/0
Source: C:\Users\user\Desktop\setup.exeCode function: 1_2_00404605 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,1_2_00404605
Source: C:\Users\user\Desktop\setup.exeCode function: 1_2_004024FB CoCreateInstance,1_2_004024FB
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeFile created: C:\Users\user\Desktop\setup.exeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeFile created: C:\Users\user\AppData\Local\Temp\7zS4AA59CC2Jump to behavior
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeVirustotal: Detection: 14%
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExW\/AddDllDirectoryh1h2h3%10s %512s %u %10s %512s %u "%64[^"]" %u %urt%s %s%s%s %u %s %s%s%s %u "%d%02d%02d %02d:%02d:%02d" %u %d
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exe "C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeProcess created: C:\Users\user\Desktop\setup.exe "C:\Users\user\Desktop\Setup.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeProcess created: C:\Users\user\Desktop\setup.exe "C:\Users\user\Desktop\Setup.exe" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: acgenral.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeStatic PE information: certificate valid
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeStatic file information: File size 69456728 > 1048576
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x613000
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: c:\nullsoft\nsis_winamp\Release\nsis_winamp.pdb source: setup.exe, 00000001.00000002.2962784724.0000000002D47000.00000004.00000020.00020000.00000000.sdmp, nsiB2D7.tmp.1.dr
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\setup.exeCode function: 1_2_0040645D GetModuleHandleA,LoadLibraryA,GetProcAddress,1_2_0040645D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeCode function: 0_2_0137A5E0 push ecx; ret 0_2_0137A5F3
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeFile created: C:\Users\user\Desktop\setup.exeJump to dropped file
Source: C:\Users\user\Desktop\setup.exeFile created: C:\Users\user\AppData\Local\Temp\nsiB326.tmp\nsDialogs.dllJump to dropped file
Source: C:\Users\user\Desktop\setup.exeFile created: C:\Users\user\AppData\Local\Temp\nsiB326.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\setup.exeFile created: C:\Users\user\AppData\Local\Temp\nsiB326.tmp\LangDLL.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsiB326.tmp\nsDialogs.dllJump to dropped file
Source: C:\Users\user\Desktop\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsiB326.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsiB326.tmp\LangDLL.dllJump to dropped file
Source: C:\Users\user\Desktop\setup.exeCode function: 1_2_00406436 FindFirstFileW,FindClose,1_2_00406436
Source: C:\Users\user\Desktop\setup.exeCode function: 1_2_00406DFC DeleteFileW,CloseHandle,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,1_2_00406DFC
Source: C:\Users\user\Desktop\setup.exeCode function: 1_2_00402E18 FindFirstFileW,1_2_00402E18
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exe, 00000000.00000002.1752589497.0000000003710000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_SATA_CD0
Source: SecuriteInfo.com.Adware.Downware.20566.20228.21311.exe, 00000000.00000003.1751240027.0000000000C85000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Cm
Source: C:\Users\user\Desktop\setup.exeAPI call chain: ExitProcess graph end nodegraph_1-5388
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeCode function: 0_2_013D2EAC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_013D2EAC
Source: C:\Users\user\Desktop\setup.exeCode function: 1_2_0040645D GetModuleHandleA,LoadLibraryA,GetProcAddress,1_2_0040645D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeCode function: 0_2_013D73A0 mov eax, dword ptr fs:[00000030h]0_2_013D73A0
Source: C:\Users\user\Desktop\setup.exeCode function: 1_2_6CEB188A CreateControl,GetProcessHeap,GetProcessHeap,HeapAlloc,GetProcessHeap,GetProcessHeap,HeapReAlloc,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,CreateWindowExW,SetPropW,SendMessageW,SendMessageW,SendMessageW,SetWindowLongW,GetProcessHeap,RtlFreeHeap,1_2_6CEB188A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeCode function: 0_2_013D2EAC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_013D2EAC
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeCode function: 0_2_0137A955 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0137A955
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeProcess created: C:\Users\user\Desktop\setup.exe "C:\Users\user\Desktop\Setup.exe" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exeCode function: 0_2_0137B767 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_0137B767
Source: C:\Users\user\Desktop\setup.exeCode function: 1_2_00406966 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,1_2_00406966
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
1
Masquerading
11
Input Capture
1
System Time Discovery
Remote Services11
Input Capture
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts1
Native API
1
DLL Search Order Hijacking
1
DLL Side-Loading
11
Process Injection
LSASS Memory21
Security Software Discovery
Remote Desktop Protocol11
Archive Collected Data
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Search Order Hijacking
1
Deobfuscate/Decode Files or Information
Security Account Manager2
File and Directory Discovery
SMB/Windows Admin Shares1
Clipboard Data
SteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDS4
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Search Order Hijacking
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Adware.Downware.20566.20228.21311.exe15%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\nsiB326.tmp\LangDLL.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsiB326.tmp\LangDLL.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\nsiB326.tmp\System.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsiB326.tmp\System.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\nsiB326.tmp\nsDialogs.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsiB326.tmp\nsDialogs.dll0%VirustotalBrowse
C:\Users\user\Desktop\setup.exe3%ReversingLabs
C:\Users\user\Desktop\setup.exe0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://sectigo.com/CPS00%URL Reputationsafe
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
http://ocsp.sectigo.com00%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
http://download.nullsoft.com/redist/wm/wmfdist95.exe3287http://download.nullsoft.com/redist/wm/wmfdi1%VirustotalBrowse
http://download.nullsoft.com/redist/dx/dxwebsetup.exed3dx9_42.dll1%VirustotalBrowse
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl00%VirustotalBrowse
https://curl.se/docs/http-cookies.html0%VirustotalBrowse
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#0%VirustotalBrowse
http://crl.aol.com/AOLMSPKI/aolCodeSign.crl00%VirustotalBrowse
https://pki-info.aol.com/AOL/index.html050%VirustotalBrowse
http://www.winamp.com/legal/cloud0%VirustotalBrowse
http://ocsp.web.aol.com:80/ocsp00%VirustotalBrowse
https://curl.se/docs/alt-svc.html0%VirustotalBrowse
http://pki-info.aol.com/AOLMSPKI/index.html00%VirustotalBrowse
http://www.winamp.com/download0%VirustotalBrowse
http://mp3licensing.com0%VirustotalBrowse
http://www.winamp.com/open0%VirustotalBrowse
http://www.winamp.com/legal/eula/pc0x3FF0x020%VirustotalBrowse
https://curl.se/docs/hsts.html0%VirustotalBrowse
http://dev.winamp.com/wiki/Main_Page1%VirustotalBrowse
http://www.winamp.com/0%VirustotalBrowse
http://www.winamp.com0%VirustotalBrowse
http://www.winamp.com/legal/eula/pcopen0%VirustotalBrowse
http://download.nullsoft.com/redist/dx/d3dx9_31_42_x86_embed.exed3dx9_31.dll1%VirustotalBrowse
http://crl.aol.com/AOL/MasterCRL.crl00%VirustotalBrowse
http://lyricsplugin.com0%VirustotalBrowse
http://www.winamp.com/legal/privacy0%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0SecuriteInfo.com.Adware.Downware.20566.20228.21311.exefalseunknown
https://pki-info.aol.com/AOL/index.html05setup.exe.0.drfalseunknown
http://download.nullsoft.com/redist/wm/wmfdist95.exe3287http://download.nullsoft.com/redist/wm/wmfdisetup.exe, 00000001.00000002.2962784724.0000000002D47000.00000004.00000020.00020000.00000000.sdmp, setup.exe, 00000001.00000002.2962665921.0000000002B42000.00000004.00000020.00020000.00000000.sdmp, nsiB2D7.tmp.1.drfalseunknown
https://sectigo.com/CPS0SecuriteInfo.com.Adware.Downware.20566.20228.21311.exefalse
  • URL Reputation: safe
unknown
http://download.nullsoft.com/redist/dx/dxwebsetup.exed3dx9_42.dllsetup.exe, 00000001.00000002.2962784724.0000000002D47000.00000004.00000020.00020000.00000000.sdmp, setup.exe, 00000001.00000002.2962665921.0000000002B42000.00000004.00000020.00020000.00000000.sdmp, nsiB2D7.tmp.1.drfalseunknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0SecuriteInfo.com.Adware.Downware.20566.20228.21311.exefalse
  • URL Reputation: safe
unknown
http://ocsp.sectigo.com0SecuriteInfo.com.Adware.Downware.20566.20228.21311.exefalse
  • URL Reputation: safe
unknown
https://curl.se/docs/http-cookies.htmlSecuriteInfo.com.Adware.Downware.20566.20228.21311.exefalseunknown
http://mp3licensing.comnsiB2D7.tmp.1.drfalseunknown
http://ocsp.thawte.com0setup.exe.0.drfalse
  • URL Reputation: safe
unknown
http://www.winamp.com/legal/cloudnsiB2D7.tmp.1.drfalseunknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#SecuriteInfo.com.Adware.Downware.20566.20228.21311.exefalseunknown
http://www.winamp.comPublisherVersionMajorVersionMinorNoRepairNoModifyModifyPathInstallLocationDisplsetup.exe, 00000001.00000002.2962784724.0000000002D47000.00000004.00000020.00020000.00000000.sdmp, setup.exe, 00000001.00000002.2962665921.0000000002B42000.00000004.00000020.00020000.00000000.sdmp, nsiB2D7.tmp.1.drfalse
    unknown
    http://crl.aol.com/AOLMSPKI/aolCodeSign.crl0setup.exe.0.drfalseunknown
    http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#SecuriteInfo.com.Adware.Downware.20566.20228.21311.exefalse
    • URL Reputation: safe
    unknown
    http://nsis.sf.net/NSIS_ErrorErrorsetup.exe, 00000001.00000000.1750300204.0000000000408000.00000002.00000001.01000000.00000006.sdmp, setup.exe, 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmp, setup.exe.0.drfalse
    • URL Reputation: safe
    unknown
    http://ocsp.web.aol.com:80/ocsp0setup.exe.0.drfalseunknown
    https://curl.se/docs/alt-svc.htmlSecuriteInfo.com.Adware.Downware.20566.20228.21311.exefalseunknown
    http://www.winamp.com/downloadnsiB2D7.tmp.1.drfalseunknown
    http://pki-info.aol.com/AOLMSPKI/index.html0setup.exe.0.drfalseunknown
    http://www.winamp.com/opensetup.exe, 00000001.00000002.2962784724.0000000002D47000.00000004.00000020.00020000.00000000.sdmp, setup.exe, 00000001.00000002.2962665921.0000000002B42000.00000004.00000020.00020000.00000000.sdmp, nsiB2D7.tmp.1.drfalseunknown
    http://www.winamp.com/setup.exe, 00000001.00000000.1750690873.0000000000678000.00000002.00000001.01000000.00000006.sdmp, setup.exe, 00000001.00000002.2962784724.0000000002D47000.00000004.00000020.00020000.00000000.sdmp, setup.exe, 00000001.00000002.2962665921.0000000002B42000.00000004.00000020.00020000.00000000.sdmp, setup.exe.0.dr, nsiB2D7.tmp.1.drfalseunknown
    http://dev.winamp.com/wiki/Main_PagensiB2D7.tmp.1.drfalseunknown
    https://curl.se/docs/hsts.htmlSecuriteInfo.com.Adware.Downware.20566.20228.21311.exefalseunknown
    http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tSecuriteInfo.com.Adware.Downware.20566.20228.21311.exefalse
    • URL Reputation: safe
    unknown
    http://www.winamp.com/legal/eula/pc0x3FF0x02setup.exe, 00000001.00000002.2962784724.0000000002D47000.00000004.00000020.00020000.00000000.sdmp, setup.exe, 00000001.00000002.2962665921.0000000002B42000.00000004.00000020.00020000.00000000.sdmp, nsiB2D7.tmp.1.drfalseunknown
    http://forums.winamp.comURLUpdateInfo5.66setup.exe, 00000001.00000002.2962784724.0000000002D47000.00000004.00000020.00020000.00000000.sdmp, setup.exe, 00000001.00000002.2962665921.0000000002B42000.00000004.00000020.00020000.00000000.sdmp, nsiB2D7.tmp.1.drfalse
      unknown
      http://ocsp.sectigo.com0MSecuriteInfo.com.Adware.Downware.20566.20228.21311.exefalse
        unknown
        http://crl.thawte.com/ThawteTimestampingCA.crl0setup.exe.0.drfalse
        • URL Reputation: safe
        unknown
        http://www.winamp.comsetup.exe.0.drfalseunknown
        http://download.nullsoft.com/redist/dx/d3dx9_31_42_x86_embed.exed3dx9_31.dllsetup.exe, 00000001.00000002.2962784724.0000000002D47000.00000004.00000020.00020000.00000000.sdmp, setup.exe, 00000001.00000002.2962665921.0000000002B42000.00000004.00000020.00020000.00000000.sdmp, nsiB2D7.tmp.1.drfalseunknown
        http://www.winamp.com/legal/eula/pcopensetup.exe, 00000001.00000002.2962784724.0000000002D47000.00000004.00000020.00020000.00000000.sdmp, setup.exe, 00000001.00000002.2962665921.0000000002B42000.00000004.00000020.00020000.00000000.sdmp, nsiB2D7.tmp.1.drfalseunknown
        http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#SecuriteInfo.com.Adware.Downware.20566.20228.21311.exefalse
        • URL Reputation: safe
        unknown
        http://crl.aol.com/AOL/MasterCRL.crl0setup.exe.0.drfalseunknown
        http://lyricsplugin.comnsiB2D7.tmp.1.drfalseunknown
        http://www.winamp.com/legal/privacynsiB2D7.tmp.1.drfalseunknown
        No contacted IP infos
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1532473
        Start date and time:2024-10-13 10:26:11 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 6m 9s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:6
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:SecuriteInfo.com.Adware.Downware.20566.20228.21311.exe
        Detection:SUS
        Classification:sus36.winEXE@3/7@0/0
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:Failed
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        No simulations
        No context
        No context
        No context
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        C:\Users\user\AppData\Local\Temp\nsiB326.tmp\LangDLL.dllSetup_10024.exeGet hashmaliciousUnknownBrowse
          http://cainiao-oss-sh-read.oss-cn-shanghai.aliyuncs.com/waybill-print/cainiao-x-print/prod/win/cainiao-x-print-win-86.exeGet hashmaliciousUnknownBrowse
            Air.Live.Drive.v1.4.1.exeGet hashmaliciousSupreme BotnetBrowse
              3DP_Chip_Lite_v2002.exeGet hashmaliciousUnknownBrowse
                3DP_Chip_v1611.exeGet hashmaliciousUnknownBrowse
                  C:\Users\user\AppData\Local\Temp\nsiB326.tmp\System.dllfile.exeGet hashmaliciousUnknownBrowse
                    Setup_10024.exeGet hashmaliciousUnknownBrowse
                      SecuriteInfo.com.Riskware.Application.5189.31489.exeGet hashmaliciousUnknownBrowse
                        LWZyUFvVh1.exeGet hashmaliciousDCRatBrowse
                          sVfXReO3QI.exeGet hashmaliciousUnknownBrowse
                            HolyTom980.exeGet hashmaliciousUnknownBrowse
                              https://xiuxiu.dl.meitu.com/pc_channel64/xiuxiu64_pc.exeGet hashmaliciousUnknownBrowse
                                ReimagePackage.exeGet hashmaliciousXmrigBrowse
                                  ReimagePackage.exeGet hashmaliciousXmrigBrowse
                                    SecuriteInfo.com.W32.PossibleThreat.20191.6097.exeGet hashmaliciousUnknownBrowse
                                      Process:C:\Users\user\Desktop\setup.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):2252864
                                      Entropy (8bit):1.7047412749682476
                                      Encrypted:false
                                      SSDEEP:6144:KzGXwO9nJuDv7MhZ/0qPuegGToy2U4YD86lx+WLP5qm/T:KiXwO9nJlxuegCoyHJnYWz53r
                                      MD5:14AEBB95BCE1952D28BA8C3EBF04FC6E
                                      SHA1:B0EA2C60EB27F11EEB67BBC58ACE7913EBDFAFE9
                                      SHA-256:6ADD93FC77E790D583378B34A0EDE261A4CAEA5D53BFEDBFB0310B62731DF086
                                      SHA-512:5CBFE670C55B5653FC1896B8D04A9093F05863F942BF33F96D185636B8E2A044B3FEB33D763BE8CC58228C693F64BF53AFC81134594DF63A0352D855F34427A3
                                      Malicious:false
                                      Reputation:low
                                      Preview:0.......,.......,...b...l........Z..........................................Q...........................n...............................\.......w...........................................................................................................................................G...J...............................+...............................................f.......,...0...7.......Y.......................[...............g.......9...=...F.......Y.......................................h.......H...L...[.......Y...............................................b.......................................................j.......=...@...F.......Y...............................................................................................................W.......=.......Y...................................................w...........................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\setup.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):5120
                                      Entropy (8bit):4.173096436101749
                                      Encrypted:false
                                      SSDEEP:48:apTVWFeApYx2lxaKe3yfeEIWCGWNpBWLGGrx3pMt4z8mtJ7HofYZVSLa:RFG0xaKkyfjIWTW7BYrhSbmtJ7/V
                                      MD5:A1CD3F159EF78D9ACE162F067B544FD9
                                      SHA1:72671FDF4BFEEB99B392685BF01081B4A0B3AE66
                                      SHA-256:47B9E251C9C90F43E3524965AECC07BD53C8E09C5B9F9862B44C306667E2B0B6
                                      SHA-512:CCC70166C7D7746CD42CD0CEC322B2ADF4A478FF67C35D465F0F0F5B2B369C996A95557B678C09CB21B8311D8A91EED4196DDC218EA7D510F81464669B911362
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                      Joe Sandbox View:
                                      • Filename: Setup_10024.exe, Detection: malicious, Browse
                                      • Filename: , Detection: malicious, Browse
                                      • Filename: Air.Live.Drive.v1.4.1.exe, Detection: malicious, Browse
                                      • Filename: 3DP_Chip_Lite_v2002.exe, Detection: malicious, Browse
                                      • Filename: 3DP_Chip_v1611.exe, Detection: malicious, Browse
                                      Reputation:moderate, very likely benign file
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........i.......................M.....M.....M.....M.....Rich............................PE..L.....GO...........!........."......E........ ...............................p............@.........................."..I.... ..P....P..`....................`....................................................... ..\............................text...F........................... ..`.rdata....... ......................@..@.data...P....0......................@....rsrc...`....P......................@..@.reloc..^....`......................@..B........................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\setup.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):11264
                                      Entropy (8bit):5.729426875863261
                                      Encrypted:false
                                      SSDEEP:192:0N2gQuUwXzioj4KALV2upWzVd7q1QDXEbBZ8KxHdGzyS/Kx:rJoiO8V2upW7vQjS/
                                      MD5:BF712F32249029466FA86756F5546950
                                      SHA1:75AC4DC4808AC148DDD78F6B89A51AFBD4091C2E
                                      SHA-256:7851CB12FA4131F1FEE5DE390D650EF65CAC561279F1CFE70AD16CC9780210AF
                                      SHA-512:13F69959B28416E0B8811C962A49309DCA3F048A165457051A28A3EB51377DCAF99A15E86D7EEE8F867A9E25ECF8C44DA370AC8F530EEAE7B5252EABA64B96F4
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                      Joe Sandbox View:
                                      • Filename: file.exe, Detection: malicious, Browse
                                      • Filename: Setup_10024.exe, Detection: malicious, Browse
                                      • Filename: SecuriteInfo.com.Riskware.Application.5189.31489.exe, Detection: malicious, Browse
                                      • Filename: LWZyUFvVh1.exe, Detection: malicious, Browse
                                      • Filename: sVfXReO3QI.exe, Detection: malicious, Browse
                                      • Filename: HolyTom980.exe, Detection: malicious, Browse
                                      • Filename: , Detection: malicious, Browse
                                      • Filename: ReimagePackage.exe, Detection: malicious, Browse
                                      • Filename: ReimagePackage.exe, Detection: malicious, Browse
                                      • Filename: SecuriteInfo.com.W32.PossibleThreat.20191.6097.exe, Detection: malicious, Browse
                                      Reputation:moderate, very likely benign file
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........U..............]..............XP......Xd......XU......XS.....Rich............PE..L.....GO...........!................('.......0...............................`............@..........................3.......1..P............................P.......................................................0..\............................text...1........................... ..`.rdata.......0......."..............@..@.data...@....@.......&..............@....reloc..L....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\setup.exe
                                      File Type:PC bitmap, Windows 3.x format, 150 x 57 x 24, image size 25766, resolution 2834 x 2834 px/m, cbSize 25820, bits offset 54
                                      Category:dropped
                                      Size (bytes):25820
                                      Entropy (8bit):6.2110665043409785
                                      Encrypted:false
                                      SSDEEP:192:eCaZM20xGzX29rAO0hCrM9G2QKf3FQ3i8Xo0q++ZsITZJGp:eY2eGYgYv2pf3FQb8+yTw
                                      MD5:827358320DD8861C44EAC1E220047C29
                                      SHA1:F31677B280A72C6B2EB87FA206F0586194F2029B
                                      SHA-256:88E8A05BE9CFB8DAEC31872C8322B7313B66CEAA45C361F8EFEDA53809F46910
                                      SHA-512:AC27F720A9BF69DDB5821730558AD1B838DCAD6CF9EAE9990A8051339321AE912E4DC7751238CE3CCD9A1F615AB60B622E3C3248FD808FEE63F39B7A38986FC7
                                      Malicious:false
                                      Reputation:low
                                      Preview:BM.d......6...(.......9............d....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\setup.exe
                                      File Type:PC bitmap, Windows 3.x format, 164 x 314 x 24, image size 154490, resolution 2834 x 2834 px/m, cbSize 154544, bits offset 54
                                      Category:dropped
                                      Size (bytes):154544
                                      Entropy (8bit):4.9456550766606
                                      Encrypted:false
                                      SSDEEP:1536:Q8PkKxrHvI+HzF+xBIrVWDWca1dE0/UTH7P2WmPW+:Q8lv8MADDJ+Wm
                                      MD5:2D63E33FA1CF672338A22C88FA45E6A0
                                      SHA1:86C510009D6C71D05EB2707FE6A10039DF525192
                                      SHA-256:7AE875CFCB6E3B1F4A06460FBDA99D8014DC4674EE256B0B79EC656777C7E292
                                      SHA-512:D42A7401C1D0D77D517D2F8086286BD6CF487CF5400CD8B8D720BCAF15149727751677F444FD9A8E340072DEABAD51347956894C1C034DD81DF793B3B8087252
                                      Malicious:false
                                      Preview:BM.[......6...(.......:...........z[....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\setup.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):9728
                                      Entropy (8bit):5.115973604853638
                                      Encrypted:false
                                      SSDEEP:192:SbEunjqjIcESwFlioU3M0LLF/t8t9pKSfOi:SbESjFCw6oWPFl8jfOi
                                      MD5:4CCC4A742D4423F2F0ED744FD9C81F63
                                      SHA1:704F00A1ACC327FD879CF75FC90D0B8F927C36BC
                                      SHA-256:416133DD86C0DFF6B0FCAF1F46DFE97FDC85B37F90EFFB2D369164A8F7E13AE6
                                      SHA-512:790C5EB1F8B297E45054C855B66DFC18E9F3F1B1870559014DBEFA3B9D5B6D33A993A9E089202E70F51A55D859B74E8605C6F633386FD9189B6F78941BF1BFDB
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Q+.v.J.%.J.%.J.%.2.%.J.%.J.%"J.%..5%.J.%...%.J.%...%.J.%...%.J.%Rich.J.%........PE..L.....GO...........!.........................0...............................p............@......................... 7..k....2.......P.......................`.......................................................0...............................text............................... ..`.rdata.......0......................@..@.data...0....@......................@....rsrc........P....... ..............@..@.reloc..N....`......."..............@..B........................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):12886456
                                      Entropy (8bit):7.995227292198888
                                      Encrypted:true
                                      SSDEEP:196608:UNxQRuR6vMEQO4voQ0HrBGQIPvunb5VVAc6ysyl/8gl32tVT2rZ7MibIZDey1Iju:+QuRAJrlXbPVcysyl/8osIrZVil71
                                      MD5:76954D7DBF005D6DB5E38D64F25A8C20
                                      SHA1:054AD10803AA95F512A2C56293BE7D1A287696F7
                                      SHA-256:E9E2EB114941F9F9157B4FB139E5588665FB89B709DF82D4A8346AE66CCF03E1
                                      SHA-512:49E77880255470096830059BDA1BAF1D955F7F33659118995495AA6A6E090E32C798A8568504F213A90C4D3C3C81DB41C22C54359D0689ADB7B233C96C4FFF4A
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 3%
                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................p.......B...9............@...........................*......K....@.................................d.........'.............P...h............................................................................................text....o.......p.................. ..`.rdata...*.......,...t..............@..@.data....~..........................@....ndata...P ..0...........................rsrc.........'.....................@..@.reloc........*.....................@..B................................................................................................................................................................................................................................................................................................................
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):3.672869770313839
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:SecuriteInfo.com.Adware.Downware.20566.20228.21311.exe
                                      File size:69'456'728 bytes
                                      MD5:8c18150421977fe4528204b8095469d1
                                      SHA1:f69137f7558d0953879378b91b58914507df75a8
                                      SHA256:c45f5f52bbcfbb3540aab96ecf76b14df72f3c82f917cb368c23cbf0a92eaaca
                                      SHA512:bc958762323b135326d9a76627bd3db5fde898abc299a4ca42602e95999d5c59a3d71bb204cc9fd93513db0f0f102087d59f364705b41f7eef33ef3cd4a5b1af
                                      SSDEEP:786432:Mmrq6Y07kDDboJeEO+D9ouNRVMJ89h3ivhdS+9Ix5rUV5:MUNhYtIxG5
                                      TLSH:23E77A8BB211F977A3650CA0161873D046425635FB24D9B97FC277DDD62C08AAEB0B3B
                                      File Content Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$........Lz,W-..W-..W-......V-......_-..W-..T,...b..T-...b..V-...b..[-...b..S-..t}..T-..t}..V-..t}..V-..W-..V-..t}..V-..RichW-.........
                                      Icon Hash:878fd7f3b9353593
                                      Entrypoint:0x99b00c
                                      Entrypoint Section:.text
                                      Digitally signed:true
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x66537734 [Sun May 26 17:53:56 2024 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:6
                                      OS Version Minor:0
                                      File Version Major:6
                                      File Version Minor:0
                                      Subsystem Version Major:6
                                      Subsystem Version Minor:0
                                      Import Hash:a2e9338565484e434757597c46f1629d
                                      Signature Valid:true
                                      Signature Issuer:CN=Sectigo Public Code Signing CA EV R36, O=Sectigo Limited, C=GB
                                      Signature Validation Error:The operation completed successfully
                                      Error Number:0
                                      Not Before, Not After
                                      • 17/08/2023 20:00:00 17/08/2024 19:59:59
                                      Subject Chain
                                      • CN=Cyber Holding Partners LLC, O=Cyber Holding Partners LLC, S=New Jersey, C=US, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.2=New Jersey, OID.1.3.6.1.4.1.311.60.2.1.3=US, SERIALNUMBER=0450768115
                                      Version:3
                                      Thumbprint MD5:9F6024222A122AF737C6E696FF357C9E
                                      Thumbprint SHA-1:F08E233859A8F79ADD05BA4A96FF5FFB1FD28057
                                      Thumbprint SHA-256:CFB460E5E314F4E6D78210E59B1A00C578395DDEB11CB7EBF5C9671C6C84A189
                                      Serial:00F14C5E6AB968284264F1B070B99D3C70
                                      Instruction
                                      call 00007F34CCC59288h
                                      jmp 00007F34CCC5895Fh
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      push edi
                                      push esi
                                      push ebx
                                      xor edi, edi
                                      mov eax, dword ptr [esp+14h]
                                      or eax, eax
                                      jnl 00007F34CCC58AF6h
                                      inc edi
                                      mov edx, dword ptr [esp+10h]
                                      neg eax
                                      neg edx
                                      sbb eax, 00000000h
                                      mov dword ptr [esp+14h], eax
                                      mov dword ptr [esp+10h], edx
                                      mov eax, dword ptr [esp+1Ch]
                                      or eax, eax
                                      jnl 00007F34CCC58AF6h
                                      inc edi
                                      mov edx, dword ptr [esp+18h]
                                      neg eax
                                      neg edx
                                      sbb eax, 00000000h
                                      mov dword ptr [esp+1Ch], eax
                                      mov dword ptr [esp+18h], edx
                                      or eax, eax
                                      jne 00007F34CCC58AFAh
                                      mov ecx, dword ptr [esp+18h]
                                      mov eax, dword ptr [esp+14h]
                                      xor edx, edx
                                      div ecx
                                      mov ebx, eax
                                      mov eax, dword ptr [esp+10h]
                                      div ecx
                                      mov edx, ebx
                                      jmp 00007F34CCC58B23h
                                      mov ebx, eax
                                      mov ecx, dword ptr [esp+18h]
                                      mov edx, dword ptr [esp+14h]
                                      mov eax, dword ptr [esp+10h]
                                      shr ebx, 1
                                      rcr ecx, 1
                                      shr edx, 1
                                      rcr eax, 1
                                      or ebx, ebx
                                      jne 00007F34CCC58AD6h
                                      div ecx
                                      mov esi, eax
                                      mul dword ptr [esp+1Ch]
                                      mov ecx, eax
                                      mov eax, dword ptr [esp+18h]
                                      mul esi
                                      add edx, ecx
                                      jc 00007F34CCC58AF0h
                                      cmp edx, dword ptr [esp+14h]
                                      jnbe 00007F34CCC58AEAh
                                      jc 00007F34CCC58AE9h
                                      cmp eax, dword ptr [esp+10h]
                                      jbe 00007F34CCC58AE3h
                                      dec esi
                                      xor edx, edx
                                      mov eax, esi
                                      dec edi
                                      jne 00007F34CCC58AE9h
                                      neg edx
                                      neg eax
                                      sbb edx, 00000000h
                                      pop ebx
                                      pop esi
                                      pop edi
                                      retn 0010h
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      push edi
                                      push esi
                                      push ebp
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x64498c0xdc.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x64b0000xc38.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x12801400x2fbd218
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x64c0000x11f68.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x63def00x1c.rdata
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x63de300x40.rdata
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x6140000x434.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x612e690x613000ff32538c62a6a6dd5a675a3963a8de4funknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x6140000x31efc0x32000410aa139e2be98d33fbe6ecb1e26f21bFalse0.4121337890625data5.73243670783337IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0x6460000x4f480x1e00a0a29a656e77184070b7114d316fe2f3False0.23268229166666668data4.250105816437091IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rsrc0x64b0000xc380xe005a1b41f0b6ee4aefd6b7abcf2f465bd8False0.3431919642857143data3.6894837610535043IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0x64c0000x11f680x12000efb13c90c3bf8bde2cd69406d86b2ffbFalse0.6414388020833334data6.523286137568852IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_ICON0x64b5000x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.37231182795698925
                                      RT_ICON0x64b7e80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.5472972972972973
                                      RT_DIALOG0x64b9380x90dataEnglishUnited States0.6666666666666666
                                      RT_STRING0x64b9c80x60dataEnglishUnited States0.6979166666666666
                                      RT_STRING0x64ba280x54dataEnglishUnited States0.6904761904761905
                                      RT_STRING0x64ba800x34dataEnglishUnited States0.6538461538461539
                                      RT_GROUP_ICON0x64b9100x22dataEnglishUnited States1.0
                                      RT_VERSION0x64b2500x2acdataEnglishUnited States0.4342105263157895
                                      RT_MANIFEST0x64bab80x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                      DLLImport
                                      SHLWAPI.dllPathFileExistsW
                                      KERNEL32.dllWaitForSingleObjectEx, FindFirstFileA, WriteConsoleW, AreFileApisANSI, IsProcessorFeaturePresent, InitializeCriticalSectionEx, FindFirstFileExA, SetFilePointer, SetEndOfFile, FindNextFileW, IsValidLocale, GetConsoleMode, CreateDirectoryA, GetUserDefaultLCID, FindClose, GetCurrentDirectoryA, GetProcessAffinityMask, VirtualFree, CreateSemaphoreA, TlsGetValue, lstrcatA, SetEnvironmentVariableA, GetFileAttributesW, GetCurrentProcess, ReleaseSRWLockExclusive, GetSystemTimeAsFileTime, CreateFileW, SetStdHandle, GetStartupInfoW, SetFileTime, LCMapStringEx, GetFullPathNameW, GetEnvironmentStringsW, GetCurrentThreadId, MultiByteToWideChar, VerifyVersionInfoW, FileTimeToSystemTime, GetEnvironmentVariableA, IsDebuggerPresent, GetDateFormatW, GetFinalPathNameByHandleW, FreeLibrary, WaitForSingleObject, RtlUnwind, EnumSystemLocalesW, GetLastError, LoadLibraryExW, GetTempPathW, CreateDirectoryW, SetLastError, QueryPerformanceFrequency, LoadLibraryW, GetModuleFileNameA, FreeLibraryAndExitThread, GetFileSize, LeaveCriticalSection, GetTempPathA, RaiseException, GetFileSizeEx, GetCommandLineA, HeapReAlloc, GetCurrentDirectoryW, GetFileAttributesExW, DeleteCriticalSection, RemoveDirectoryA, GetLocaleInfoW, GetTimeFormatW, GetModuleHandleExW, GetSystemDirectoryW, GetModuleHandleA, GetTimeZoneInformation, GetProcAddress, AcquireSRWLockExclusive, ReleaseSemaphore, GetCPInfo, GetDriveTypeW, FlushFileBuffers, SystemTimeToTzSpecificLocalTime, ResetEvent, SetUnhandledExceptionFilter, InitializeCriticalSectionAndSpinCount, GetCurrentProcessId, GetOEMCP, GetStdHandle, SleepEx, FindNextFileA, CreateFileA, GetTickCount64, HeapFree, CreateEventA, EncodePointer, LocalFree, IsValidCodePage, GetFileType, WaitForMultipleObjects, DecodePointer, GetStringTypeW, SetFilePointerEx, WriteFile, InitializeCriticalSection, lstrlenA, GetCommandLineW, HeapAlloc, ExitThread, GetConsoleCP, SetFileAttributesW, ExitProcess, VirtualAlloc, FormatMessageW, TryAcquireSRWLockExclusive, GlobalMemoryStatus, DeleteFileA, GetProcessHeap, FreeEnvironmentStringsW, GetACP, QueryPerformanceCounter, TlsSetValue, HeapSize, DeleteFileW, FindFirstFileW, GetFileInformationByHandle, GetModuleFileNameW, LoadLibraryA, SetCurrentDirectoryW, CreateThread, WideCharToMultiByte, PeekNamedPipe, GetVersionExA, SetEvent, CloseHandle, InitializeSListHead, GetLocaleInfoEx, VerSetConditionMask, ReadConsoleW, GetSystemInfo, GetVersion, TlsAlloc, TerminateProcess, ReadFile, TlsFree, LCMapStringW, EnterCriticalSection, SetCurrentDirectoryA, WakeAllConditionVariable, Sleep, GetTickCount, CompareStringW, UnhandledExceptionFilter, GetFileAttributesA, GetModuleHandleW, SetFileAttributesA, MoveFileExW, FormatMessageA, RemoveDirectoryW
                                      USER32.dllLoadIconA, SetWindowTextW, SetTimer, wsprintfA, CharUpperW, MessageBoxW, ShowWindow, GetWindowLongA, DialogBoxParamW, GetDlgItem, DestroyWindow, EndDialog, SendMessageA, DialogBoxParamA, PostMessageA, SetWindowTextA, LoadStringW, MessageBoxA, SetWindowLongA, LoadStringA, KillTimer, CharUpperA
                                      SHELL32.dllShellExecuteExA
                                      OLEAUT32.dllVariantClear, SysAllocStringLen, SysStringLen
                                      bcrypt.dllBCryptGenRandom
                                      ADVAPI32.dllCryptEncrypt, CryptGetHashParam, CryptCreateHash, CryptDestroyKey, CryptAcquireContextW, CryptDestroyHash, CryptReleaseContext, CryptImportKey, CryptHashData
                                      CRYPT32.dllCertGetCertificateChain, CertGetNameStringW, CertCloseStore, CertAddCertificateContextToStore, CertFreeCertificateChainEngine, CertOpenStore, CertFreeCertificateChain, CertEnumCertificatesInStore, CertCreateCertificateChainEngine, CryptStringToBinaryW, CertFindCertificateInStore, CryptQueryObject, CryptDecodeObjectEx, CertFindExtension, PFXImportCertStore, CertFreeCertificateContext
                                      WLDAP32.dll
                                      WS2_32.dllgethostname, htons, getsockopt, send, WSAWaitForMultipleEvents, getaddrinfo, WSAEventSelect, freeaddrinfo, WSACloseEvent, WSAIoctl, closesocket, WSAGetLastError, ntohs, WSASetLastError, WSAStartup, WSACleanup, ioctlsocket, setsockopt, WSAEnumNetworkEvents, __WSAFDIsSet, select, accept, bind, connect, getsockname, htonl, listen, recv, socket, WSAResetEvent, WSACreateEvent, recvfrom, sendto, getpeername
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 13, 2024 10:27:27.068234921 CEST53541081.1.1.1192.168.2.4

                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:04:27:06
                                      Start date:13/10/2024
                                      Path:C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20566.20228.21311.exe"
                                      Imagebase:0xde0000
                                      File size:69'456'728 bytes
                                      MD5 hash:8C18150421977FE4528204B8095469D1
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:true

                                      Target ID:1
                                      Start time:04:27:10
                                      Start date:13/10/2024
                                      Path:C:\Users\user\Desktop\setup.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\Setup.exe"
                                      Imagebase:0x400000
                                      File size:12'886'456 bytes
                                      MD5 hash:76954D7DBF005D6DB5E38D64F25A8C20
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Antivirus matches:
                                      • Detection: 3%, ReversingLabs
                                      • Detection: 0%, Virustotal, Browse
                                      Reputation:low
                                      Has exited:false

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:14.6%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:5.6%
                                        Total number of Nodes:267
                                        Total number of Limit Nodes:8
                                        execution_graph 953 13d74bc 956 13d7287 953->956 957 13d7293 _abort 956->957 958 13d72ac 957->958 959 13d729a 957->959 980 13d91e2 EnterCriticalSection 958->980 992 13d73e1 GetModuleHandleW 959->992 963 13d7351 981 13d7391 963->981 967 13d7328 971 13d7340 967->971 1005 13d71d3 967->1005 969 13d736e 984 13d73a0 969->984 970 13d739a 1009 13f1170 970->1009 977 13d71d3 _abort 5 API calls 971->977 972 13d72b3 972->963 972->967 1002 13d8b73 972->1002 977->963 980->972 1012 13d922a LeaveCriticalSection 981->1012 983 13d736a 983->969 983->970 1013 13e43f7 984->1013 987 13d73ce 990 13d7425 _abort 8 API calls 987->990 988 13d73ae GetPEB 988->987 989 13d73be GetCurrentProcess TerminateProcess 988->989 989->987 991 13d73d6 ExitProcess 990->991 993 13d729f 992->993 993->958 994 13d7425 GetModuleHandleExW 993->994 995 13d744f GetProcAddress 994->995 996 13d7472 994->996 999 13d7464 995->999 997 13d7478 FreeLibrary 996->997 998 13d7481 996->998 997->998 1000 137a54a _abort 5 API calls 998->1000 999->996 1001 13d72ab 1000->1001 1001->958 1041 13d88ac 1002->1041 1006 13d7202 1005->1006 1007 137a54a _abort 5 API calls 1006->1007 1008 13d722b 1007->1008 1008->971 1010 137a54a _abort 5 API calls 1009->1010 1011 13f117a 1010->1011 1011->1011 1012->983 1014 13e441c 1013->1014 1018 13e4412 1013->1018 1019 13e3aa1 1014->1019 1017 13d73aa 1017->987 1017->988 1026 137a54a 1018->1026 1020 13e3ad1 1019->1020 1023 13e3acd 1019->1023 1020->1018 1021 13e3af1 1021->1020 1024 13e3afd GetProcAddress 1021->1024 1023->1020 1023->1021 1033 13e3b3d 1023->1033 1025 13e3b0d _abort 1024->1025 1025->1020 1027 137a553 IsProcessorFeaturePresent 1026->1027 1028 137a552 1026->1028 1030 137a992 1027->1030 1028->1017 1040 137a955 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 1030->1040 1032 137aa75 1032->1017 1034 13e3b5e LoadLibraryExW 1033->1034 1035 13e3b53 1033->1035 1036 13e3b7b GetLastError 1034->1036 1037 13e3b93 1034->1037 1035->1023 1036->1037 1038 13e3b86 LoadLibraryExW 1036->1038 1037->1035 1039 13e3baa FreeLibrary 1037->1039 1038->1037 1039->1035 1040->1032 1044 13d885b 1041->1044 1043 13d88d0 1043->967 1045 13d8867 _abort 1044->1045 1052 13d91e2 EnterCriticalSection 1045->1052 1047 13d8875 1053 13d88fc 1047->1053 1051 13d8893 _abort 1051->1043 1052->1047 1056 13d8924 1053->1056 1057 13d891c 1053->1057 1054 137a54a _abort 5 API calls 1055 13d8882 1054->1055 1059 13d88a0 1055->1059 1056->1057 1062 13e3386 1056->1062 1057->1054 1127 13d922a LeaveCriticalSection 1059->1127 1061 13d88aa 1061->1051 1063 13e33ba _free 1062->1063 1064 13e3391 RtlFreeHeap 1062->1064 1063->1057 1064->1063 1065 13e33a6 1064->1065 1068 13d9968 1065->1068 1071 13e38ca GetLastError 1068->1071 1072 13e38e9 1071->1072 1073 13e38e3 1071->1073 1078 13e3940 SetLastError 1072->1078 1097 13e3477 1072->1097 1090 13e3d93 1073->1090 1077 13e3903 1081 13e3386 _free 17 API calls 1077->1081 1079 13d996d GetLastError 1078->1079 1079->1063 1083 13e3909 1081->1083 1085 13e3937 SetLastError 1083->1085 1084 13e391f 1111 13e36b8 1084->1111 1085->1079 1088 13e3386 _free 17 API calls 1089 13e3930 1088->1089 1089->1078 1089->1085 1091 13e3aa1 _abort 5 API calls 1090->1091 1092 13e3dba 1091->1092 1093 13e3dd2 TlsGetValue 1092->1093 1094 13e3dc6 1092->1094 1093->1094 1095 137a54a _abort 5 API calls 1094->1095 1096 13e3de3 1095->1096 1096->1072 1100 13e3484 _abort 1097->1100 1098 13e34af RtlAllocateHeap 1098->1100 1101 13e34c2 1098->1101 1099 13e34c4 1102 13d9968 _free 19 API calls 1099->1102 1100->1098 1100->1099 1116 13d623a 1100->1116 1101->1077 1104 13e3de9 1101->1104 1102->1101 1105 13e3aa1 _abort 5 API calls 1104->1105 1106 13e3e10 1105->1106 1107 13e3e2b TlsSetValue 1106->1107 1108 13e3e1f 1106->1108 1107->1108 1109 137a54a _abort 5 API calls 1108->1109 1110 13e3918 1109->1110 1110->1077 1110->1084 1121 13e3690 1111->1121 1117 13d627e _abort EnterCriticalSection LeaveCriticalSection 1116->1117 1120 13d6250 1117->1120 1118 137a54a _abort 5 API calls 1119 13d627a 1118->1119 1119->1100 1120->1118 1122 13e35d0 _abort EnterCriticalSection LeaveCriticalSection 1121->1122 1123 13e36b4 1122->1123 1124 13e3640 1123->1124 1125 13e34d4 _abort 20 API calls 1124->1125 1126 13e3664 1125->1126 1126->1088 1127->1061 1128 13d2b37 1129 13d2b43 _abort 1128->1129 1130 13d2b4a GetLastError ExitThread 1129->1130 1131 13d2b57 1129->1131 1142 13e3846 GetLastError 1131->1142 1133 13d2b5c 1134 13e43f7 _abort 10 API calls 1133->1134 1135 13d2b67 1134->1135 1136 13d2b72 1135->1136 1165 13e42d3 1135->1165 1162 13d2d10 1136->1162 1143 13e385c 1142->1143 1144 13e3862 1142->1144 1145 13e3d93 _abort 11 API calls 1143->1145 1146 13e3477 _abort 20 API calls 1144->1146 1148 13e38b1 SetLastError 1144->1148 1145->1144 1147 13e3874 1146->1147 1149 13e387c 1147->1149 1150 13e3de9 _abort 11 API calls 1147->1150 1148->1133 1151 13e3386 _free 20 API calls 1149->1151 1152 13e3891 1150->1152 1153 13e3882 1151->1153 1152->1149 1154 13e3898 1152->1154 1156 13e38bd SetLastError 1153->1156 1155 13e36b8 _abort 20 API calls 1154->1155 1157 13e38a3 1155->1157 1175 13d9153 1156->1175 1159 13e3386 _free 20 API calls 1157->1159 1161 13e38aa 1159->1161 1161->1148 1161->1156 1267 13d2beb 1162->1267 1166 13e3aa1 _abort 5 API calls 1165->1166 1168 13e42fa 1166->1168 1167 137a54a _abort 5 API calls 1169 13e431f 1167->1169 1168->1167 1169->1136 1170 13d6997 1171 13e38ca _free 20 API calls 1170->1171 1174 13d69ae 1171->1174 1172 137a54a _abort 5 API calls 1173 13d2ba5 1172->1173 1174->1172 1186 13e9655 1175->1186 1178 13d916d IsProcessorFeaturePresent 1180 13d9178 1178->1180 1216 13d2eac 1180->1216 1182 13d9163 1182->1178 1185 13d918b 1182->1185 1222 13d74bc 1185->1222 1225 13e95c3 1186->1225 1189 13e96b0 1190 13e96bc _abort 1189->1190 1191 13e38ca _free 20 API calls 1190->1191 1195 13e96e9 _abort 1190->1195 1198 13e96e3 _abort 1190->1198 1191->1198 1192 13e9735 1193 13d9968 _free 20 API calls 1192->1193 1194 13e973a 1193->1194 1239 13d3076 1194->1239 1201 13e9761 1195->1201 1242 13d91e2 EnterCriticalSection 1195->1242 1197 13f1170 _abort 5 API calls 1200 13e98b7 1197->1200 1198->1192 1198->1195 1215 13e9718 1198->1215 1200->1182 1203 13e97c0 1201->1203 1205 13e97b8 1201->1205 1212 13e97eb 1201->1212 1243 13d922a LeaveCriticalSection 1201->1243 1203->1212 1244 13e96a7 1203->1244 1206 13d74bc _abort 28 API calls 1205->1206 1206->1203 1209 13e3846 _abort 38 API calls 1213 13e984e 1209->1213 1211 13e96a7 _abort 38 API calls 1211->1212 1247 13e9870 1212->1247 1214 13e3846 _abort 38 API calls 1213->1214 1213->1215 1214->1215 1215->1197 1217 13d2ec8 _abort 1216->1217 1218 13d2ef4 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 1217->1218 1219 13d2fc5 _abort 1218->1219 1220 137a54a _abort 5 API calls 1219->1220 1221 13d2fe3 1220->1221 1221->1185 1223 13d7287 _abort 28 API calls 1222->1223 1224 13d74cd 1223->1224 1228 13e9569 1225->1228 1227 13d9158 1227->1182 1227->1189 1229 13e9575 _abort 1228->1229 1234 13d91e2 EnterCriticalSection 1229->1234 1231 13e9583 1235 13e95b7 1231->1235 1233 13e95aa _abort 1233->1227 1234->1231 1238 13d922a LeaveCriticalSection 1235->1238 1237 13e95c1 1237->1233 1238->1237 1251 13d2ffb 1239->1251 1241 13d3082 1241->1215 1242->1201 1243->1205 1245 13e3846 _abort 38 API calls 1244->1245 1246 13e96ac 1245->1246 1246->1211 1248 13e983f 1247->1248 1249 13e9876 1247->1249 1248->1209 1248->1213 1248->1215 1266 13d922a LeaveCriticalSection 1249->1266 1252 13e38ca _free 20 API calls 1251->1252 1253 13d3011 1252->1253 1254 13d3070 1253->1254 1255 13d301f 1253->1255 1262 13d30a3 IsProcessorFeaturePresent 1254->1262 1259 137a54a _abort 5 API calls 1255->1259 1257 13d3075 1258 13d2ffb _abort 26 API calls 1257->1258 1260 13d3082 1258->1260 1261 13d3046 1259->1261 1260->1241 1261->1241 1263 13d30ae 1262->1263 1264 13d2eac _abort 8 API calls 1263->1264 1265 13d30c3 GetCurrentProcess TerminateProcess 1264->1265 1265->1257 1266->1248 1268 13e38ca _free 20 API calls 1267->1268 1271 13d2bf6 1268->1271 1269 13d2bfa ExitThread 1270 13d2c18 1273 13d2c2b 1270->1273 1274 13d2c24 CloseHandle 1270->1274 1271->1269 1271->1270 1284 13e4325 1271->1284 1273->1269 1275 13d2c37 FreeLibraryAndExitThread 1273->1275 1274->1273 1276 13e3477 _abort 20 API calls 1275->1276 1277 13d2c52 1276->1277 1278 13e3386 _free 20 API calls 1277->1278 1279 13d2c5b 1278->1279 1280 13d2c7a 1279->1280 1281 13d2c62 GetModuleHandleExW 1279->1281 1289 13d2bb4 1280->1289 1281->1280 1285 13e3aa1 _abort 5 API calls 1284->1285 1286 13e434c 1285->1286 1287 137a54a _abort 5 API calls 1286->1287 1288 13e436a 1287->1288 1288->1270 1290 13d2b94 1289->1290 1291 13d2bc1 1289->1291 1290->1170 1292 13d2bc7 CloseHandle 1291->1292 1293 13d2bd0 1291->1293 1292->1293 1294 13d2bdf 1293->1294 1295 13d2bd6 FreeLibrary 1293->1295 1296 13e3386 _free 20 API calls 1294->1296 1295->1294 1296->1290 1297 137b00c 1300 137b7b4 1297->1300 1299 137b011 1299->1299 1301 137b7ca 1300->1301 1303 137b7d3 1301->1303 1304 137b767 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 1301->1304 1303->1299 1304->1303

                                        Callgraph

                                        • Executed
                                        • Not Executed
                                        • Opacity -> Relevance
                                        • Disassembly available
                                        callgraph 0 Function_013D74BC 37 Function_013D7287 0->37 1 Function_0137B7B4 53 Function_0137B767 1->53 2 Function_013E3B3D 3 Function_013E7E38 40 Function_013E7FFF 3->40 4 Function_013E36B8 33 Function_013E3690 4->33 81 Function_013E3640 4->81 5 Function_013D623A 42 Function_013D627E 5->42 79 Function_0137A54A 5->79 6 Function_013E95B7 17 Function_013D922A 6->17 7 Function_013D2BB4 36 Function_013E3386 7->36 8 Function_013D2B37 25 Function_013F1120 8->25 29 Function_013D6997 8->29 31 Function_013D2D10 8->31 45 Function_013E43F7 8->45 71 Function_013E42D3 8->71 77 Function_013E3846 8->77 9 Function_013E7EB5 15 Function_013E762A 9->15 16 Function_013E8028 9->16 9->36 49 Function_013E7170 9->49 10 Function_013E96B0 10->0 14 Function_013E962D 10->14 10->17 19 Function_013E96A7 10->19 10->25 48 Function_013D3076 10->48 51 Function_013E9870 10->51 52 Function_013F1170 10->52 55 Function_013D9968 10->55 56 Function_013E95EB 10->56 65 Function_013D91E2 10->65 76 Function_013E38CA 10->76 10->77 11 Function_013E78AF 11->36 12 Function_013D88AC 68 Function_013D885B 12->68 13 Function_013D2EAC 62 Function_0137BA60 13->62 64 Function_013CEDE0 13->64 13->79 15->36 16->36 58 Function_013E7B68 16->58 18 Function_013D7425 18->79 19->77 20 Function_013E4325 24 Function_013E3AA1 20->24 20->79 21 Function_013D73A0 21->18 21->45 22 Function_013D88A0 22->17 23 Function_013D30A3 23->13 24->2 26 Function_013D6B1F 24->26 27 Function_013E3518 27->17 28 Function_0137A590 29->76 29->79 30 Function_013D7391 30->17 57 Function_013D2BEB 31->57 32 Function_013E3D93 32->24 32->79 72 Function_013E35D0 33->72 34 Function_00DE1170 35 Function_013E360C 35->17 54 Function_013D98EF 36->54 36->55 37->18 37->21 37->25 37->30 47 Function_013D7274 37->47 50 Function_013D8B73 37->50 37->52 63 Function_013D73E1 37->63 37->65 73 Function_013D71D3 37->73 38 Function_0137B00C 38->1 39 Function_013E8081 67 Function_013E8058 39->67 41 Function_013D88FC 41->36 41->79 42->28 60 Function_0137A5E0 42->60 42->65 78 Function_013D62C7 42->78 43 Function_013E37FB 43->3 43->9 43->39 44 Function_013D2FFB 44->23 44->44 44->76 44->79 45->24 45->79 46 Function_013E3477 46->5 46->55 75 Function_013D87CF 46->75 48->44 49->36 50->12 51->17 52->79 55->76 57->7 57->20 57->36 57->46 57->76 58->11 58->36 59 Function_013E3DE9 59->24 59->79 61 Function_013E9569 61->6 61->28 61->60 61->65 66 Function_0137A955 68->22 68->28 68->41 68->60 68->65 69 Function_013E34D4 69->27 69->28 69->43 69->60 69->65 70 Function_013E9655 80 Function_013E95C3 70->80 71->24 71->79 72->28 72->35 72->60 72->65 73->79 74 Function_013D9153 74->0 74->10 74->13 74->70 76->4 76->32 76->36 76->46 76->59 77->4 77->32 77->36 77->46 77->59 77->74 78->17 79->66 80->61 81->69 82 Function_00DF82A0

                                        Control-flow Graph

                                        APIs
                                        • GetCurrentProcess.KERNEL32(00000003,?,013D7376,00000003,014243A0,0000000C,013D74CD,00000003,00000002,00000000,?,013D9195,00000003), ref: 013D73C1
                                        • TerminateProcess.KERNEL32(00000000,?,013D7376,00000003,014243A0,0000000C,013D74CD,00000003,00000002,00000000,?,013D9195,00000003), ref: 013D73C8
                                        • ExitProcess.KERNEL32 ref: 013D73DA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1751818674.0000000000DE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DE0000, based on PE: true
                                        • Associated: 00000000.00000002.1751805850.0000000000DE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752184177.00000000013F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752214599.0000000001426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752229905.000000000142B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_de0000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: Process$CurrentExitTerminate
                                        • String ID:
                                        • API String ID: 1703294689-0
                                        • Opcode ID: 7f71a15d3fac48cd22554ad63c0ff555192a5b870794d4248555c5e075048780
                                        • Instruction ID: f77e4bfbeb2cbcabe91373df7cb67802de6488d4dd87a3d23ee8cf5f195331c3
                                        • Opcode Fuzzy Hash: 7f71a15d3fac48cd22554ad63c0ff555192a5b870794d4248555c5e075048780
                                        • Instruction Fuzzy Hash: 46E0EC32140609AFCF226F68E909A997F7DEF44349F10542CFD099B125CB35DD92DB90

                                        Control-flow Graph

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1751818674.0000000000DE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DE0000, based on PE: true
                                        • Associated: 00000000.00000002.1751805850.0000000000DE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752184177.00000000013F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752214599.0000000001426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752229905.000000000142B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_de0000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ErrorLast$_free$_abort
                                        • String ID:
                                        • API String ID: 3160817290-0
                                        • Opcode ID: 28151840aa126d12b5dfc279bdf30392e76f559ea9d523b13f71c49ffc683f35
                                        • Instruction ID: 32ad6e7dac3695af2bc395e86026ba1d879f8fbe1ff412a0e0037acc5b6ea8aa
                                        • Opcode Fuzzy Hash: 28151840aa126d12b5dfc279bdf30392e76f559ea9d523b13f71c49ffc683f35
                                        • Instruction Fuzzy Hash: 5EF0813A24572276D622263D7C0CE6B2EE9BBE176AF250138F918932D4EE3584098611

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 013E38CA: GetLastError.KERNEL32(?,?,?,013D996D,013E34C9,?,013E3874,00000001,00000364,?,013D2B5C,01424340,00000010), ref: 013E38CF
                                          • Part of subcall function 013E38CA: _free.LIBCMT ref: 013E3904
                                          • Part of subcall function 013E38CA: SetLastError.KERNEL32(00000000), ref: 013E3938
                                        • ExitThread.KERNEL32 ref: 013D2BFD
                                        • CloseHandle.KERNEL32(?,?,?,013D2D1D,?,?,013D2B94,00000000), ref: 013D2C25
                                        • FreeLibraryAndExitThread.KERNEL32(?,?,?,?,013D2D1D,?,?,013D2B94,00000000), ref: 013D2C3B
                                        • _free.LIBCMT ref: 013D2C56
                                        • GetModuleHandleExW.KERNEL32(00000004,?,0000000C), ref: 013D2C74
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1751818674.0000000000DE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DE0000, based on PE: true
                                        • Associated: 00000000.00000002.1751805850.0000000000DE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752184177.00000000013F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752214599.0000000001426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752229905.000000000142B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_de0000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ErrorExitHandleLastThread_free$CloseFreeLibraryModule
                                        • String ID:
                                        • API String ID: 333161861-0
                                        • Opcode ID: e342ba3cd7c424e35a1abc5bd5d81b5a46bd9ddd9f51ebe2cd3636f89786cff9
                                        • Instruction ID: 6299a0273aad209add9e0a1951d40f14cb8135bcadf47b1eb19873c5c4433ba6
                                        • Opcode Fuzzy Hash: e342ba3cd7c424e35a1abc5bd5d81b5a46bd9ddd9f51ebe2cd3636f89786cff9
                                        • Instruction Fuzzy Hash: 6411BF325003146BEB35ABA8E808B9B7FA8AF00728F044658FA55872D0DB71E9008790

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 46 13e3b3d-13e3b51 47 13e3b5e-13e3b79 LoadLibraryExW 46->47 48 13e3b53-13e3b5c 46->48 50 13e3b7b-13e3b84 GetLastError 47->50 51 13e3ba2-13e3ba8 47->51 49 13e3bb5-13e3bb7 48->49 52 13e3b86-13e3b91 LoadLibraryExW 50->52 53 13e3b93 50->53 54 13e3baa-13e3bab FreeLibrary 51->54 55 13e3bb1 51->55 56 13e3b95-13e3b97 52->56 53->56 54->55 57 13e3bb3-13e3bb4 55->57 56->51 58 13e3b99-13e3ba0 56->58 57->49 58->57
                                        APIs
                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,013E3AE4,?,00000000,00000000,00000000,?,013E3E10,00000006,FlsSetValue), ref: 013E3B6F
                                        • GetLastError.KERNEL32(?,013E3AE4,?,00000000,00000000,00000000,?,013E3E10,00000006,FlsSetValue,01419D38,FlsSetValue,00000000,00000364,?,013E3918), ref: 013E3B7B
                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,013E3AE4,?,00000000,00000000,00000000,?,013E3E10,00000006,FlsSetValue,01419D38,FlsSetValue,00000000), ref: 013E3B89
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1751818674.0000000000DE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DE0000, based on PE: true
                                        • Associated: 00000000.00000002.1751805850.0000000000DE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752184177.00000000013F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752214599.0000000001426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752229905.000000000142B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_de0000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: LibraryLoad$ErrorLast
                                        • String ID:
                                        • API String ID: 3177248105-0
                                        • Opcode ID: e269ce690b57f58eaabe53ba0b9cb5d71590d7847344cc8a0139ac2dfc678f9d
                                        • Instruction ID: 1cfd054fc65fab618ee8d233554bc6facc4d88fa7576968ddb2a75e8404c9e4e
                                        • Opcode Fuzzy Hash: e269ce690b57f58eaabe53ba0b9cb5d71590d7847344cc8a0139ac2dfc678f9d
                                        • Instruction Fuzzy Hash: FD017132615337ABDF324A69AC4DA577BDCBF45765B110624E917D7281DA20D5008BE0

                                        Control-flow Graph

                                        APIs
                                        • GetLastError.KERNEL32(01424340,00000010), ref: 013D2B4A
                                        • ExitThread.KERNEL32 ref: 013D2B51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1751818674.0000000000DE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DE0000, based on PE: true
                                        • Associated: 00000000.00000002.1751805850.0000000000DE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752184177.00000000013F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752214599.0000000001426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752229905.000000000142B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_de0000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ErrorExitLastThread
                                        • String ID:
                                        • API String ID: 1611280651-0
                                        • Opcode ID: 6773e35f678e9c97fab8f38e3197273b880f679f671bcaad3261c849a0877f2f
                                        • Instruction ID: ba6c64abe62a38eb9c56f16bd4a8901946f9f1c53a64ea5bbbc5e257e0780446
                                        • Opcode Fuzzy Hash: 6773e35f678e9c97fab8f38e3197273b880f679f671bcaad3261c849a0877f2f
                                        • Instruction Fuzzy Hash: 5FF0F671A00315AFDF01AFB8E849AAF3FB4FF18704F10014DE401AB291CB71A941DB60

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 86 13e3aa1-13e3acb 87 13e3acd-13e3acf 86->87 88 13e3b36 86->88 89 13e3ad5-13e3adb 87->89 90 13e3ad1-13e3ad3 87->90 91 13e3b38-13e3b3c 88->91 92 13e3add-13e3adf call 13e3b3d 89->92 93 13e3af7 89->93 90->91 96 13e3ae4-13e3ae7 92->96 95 13e3af9-13e3afb 93->95 97 13e3afd-13e3b0b GetProcAddress 95->97 98 13e3b26-13e3b34 95->98 99 13e3b18-13e3b1e 96->99 100 13e3ae9-13e3aef 96->100 101 13e3b0d-13e3b16 call 13d6b1f 97->101 102 13e3b20 97->102 98->88 99->95 100->92 104 13e3af1 100->104 101->90 102->98 104->93
                                        APIs
                                        • GetProcAddress.KERNEL32(00000000,?), ref: 013E3B01
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1751818674.0000000000DE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DE0000, based on PE: true
                                        • Associated: 00000000.00000002.1751805850.0000000000DE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752184177.00000000013F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752214599.0000000001426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752229905.000000000142B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_de0000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AddressProc
                                        • String ID:
                                        • API String ID: 190572456-0
                                        • Opcode ID: 63d94b948c71d65f5f661e2e245aae395ef4ed6c7c89f860cfa666aca82b8a78
                                        • Instruction ID: eed4cfb7c882e28c14427e01fa8a38ced2549204d8f27ec3b633222a93e57ae0
                                        • Opcode Fuzzy Hash: 63d94b948c71d65f5f661e2e245aae395ef4ed6c7c89f860cfa666aca82b8a78
                                        • Instruction Fuzzy Hash: 6F11E733A003769BEF35DD1CDC5496A77E9BF842287460220FD16AB2C8D631EC4187D1

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 106 13e3477-13e3482 107 13e3484-13e348e 106->107 108 13e3490-13e3496 106->108 107->108 111 13e34c4-13e34cf call 13d9968 107->111 109 13e34af-13e34c0 RtlAllocateHeap 108->109 110 13e3498-13e3499 108->110 112 13e349b-13e34a2 call 13d87cf 109->112 113 13e34c2 109->113 110->109 116 13e34d1-13e34d3 111->116 112->111 119 13e34a4-13e34ad call 13d623a 112->119 113->116 119->109 119->111
                                        APIs
                                        • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,013E3874,00000001,00000364,?,013D2B5C,01424340,00000010), ref: 013E34B8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1751818674.0000000000DE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DE0000, based on PE: true
                                        • Associated: 00000000.00000002.1751805850.0000000000DE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752184177.00000000013F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752214599.0000000001426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752229905.000000000142B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_de0000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AllocateHeap
                                        • String ID:
                                        • API String ID: 1279760036-0
                                        • Opcode ID: b3b8dcaca0254e4891dfc4f1887251419e2d7863692454f3f8d33e69aba0beb9
                                        • Instruction ID: 9b2ec66ac03b05433cc7831c521d740ab51929766c7f6927d00ea5189fd60729
                                        • Opcode Fuzzy Hash: b3b8dcaca0254e4891dfc4f1887251419e2d7863692454f3f8d33e69aba0beb9
                                        • Instruction Fuzzy Hash: FCF0543A60433A66FB236A2A9D0DB5B7BCCBF4167CB158125ED18B72D0DB70D4008AE0
                                        APIs
                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 013D2FA4
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 013D2FAE
                                        • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 013D2FBB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1751818674.0000000000DE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DE0000, based on PE: true
                                        • Associated: 00000000.00000002.1751805850.0000000000DE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752184177.00000000013F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752214599.0000000001426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752229905.000000000142B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_de0000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                        • String ID:
                                        • API String ID: 3906539128-0
                                        • Opcode ID: c617b4781159c4831956d8b0ef3d5883e53f111fc986e80f5858f08f0dc2b157
                                        • Instruction ID: 87a01465d2ee777ba1d5c3f50694cb9eb8e4a040c5f77b0187d919c2558ff41b
                                        • Opcode Fuzzy Hash: c617b4781159c4831956d8b0ef3d5883e53f111fc986e80f5858f08f0dc2b157
                                        • Instruction Fuzzy Hash: 9B31C57590121DABCB61DF68D888B8DBBB8BF18714F5045EAE80CA7250E7349BC5CF44
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1751818674.0000000000DE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DE0000, based on PE: true
                                        • Associated: 00000000.00000002.1751805850.0000000000DE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752184177.00000000013F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752214599.0000000001426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752229905.000000000142B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_de0000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 021a92b14dfa77c8e179fb2b85306cb1d10b34f6f6001ecb8844a991a8867def
                                        • Instruction ID: 82cb46b0f71dde85b2a974cbb0c8b744347315c0d1c105cc3bc871c9406ce0a7
                                        • Opcode Fuzzy Hash: 021a92b14dfa77c8e179fb2b85306cb1d10b34f6f6001ecb8844a991a8867def
                                        • Instruction Fuzzy Hash: A121FD30A101665BC706DE1EC8C05BAB7A0FB49305F86826AEE41DB384C638FD25D7E0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 194 13e7eb5-13e7ec9 195 13e7ecb-13e7ed0 194->195 196 13e7f37-13e7f3f 194->196 195->196 197 13e7ed2-13e7ed7 195->197 198 13e7f86-13e7f9e call 13e8028 196->198 199 13e7f41-13e7f44 196->199 197->196 200 13e7ed9-13e7edc 197->200 208 13e7fa1-13e7fa8 198->208 199->198 202 13e7f46-13e7f83 call 13e3386 * 4 199->202 200->196 203 13e7ede-13e7ee6 200->203 202->198 206 13e7ee8-13e7eeb 203->206 207 13e7f00-13e7f08 203->207 206->207 210 13e7eed-13e7eff call 13e3386 call 13e7170 206->210 213 13e7f0a-13e7f0d 207->213 214 13e7f22-13e7f36 call 13e3386 * 2 207->214 211 13e7faa-13e7fae 208->211 212 13e7fc7-13e7fcb 208->212 210->207 218 13e7fc4 211->218 219 13e7fb0-13e7fb3 211->219 222 13e7fcd-13e7fd2 212->222 223 13e7fe3-13e7fef 212->223 213->214 220 13e7f0f-13e7f21 call 13e3386 call 13e762a 213->220 214->196 218->212 219->218 227 13e7fb5-13e7fc3 call 13e3386 * 2 219->227 220->214 230 13e7fd4-13e7fd7 222->230 231 13e7fe0 222->231 223->208 225 13e7ff1-13e7ffe call 13e3386 223->225 227->218 230->231 232 13e7fd9-13e7fdf call 13e3386 230->232 231->223 232->231
                                        APIs
                                        • ___free_lconv_mon.LIBCMT ref: 013E7EF9
                                          • Part of subcall function 013E7170: _free.LIBCMT ref: 013E718D
                                          • Part of subcall function 013E7170: _free.LIBCMT ref: 013E719F
                                          • Part of subcall function 013E7170: _free.LIBCMT ref: 013E71B1
                                          • Part of subcall function 013E7170: _free.LIBCMT ref: 013E71C3
                                          • Part of subcall function 013E7170: _free.LIBCMT ref: 013E71D5
                                          • Part of subcall function 013E7170: _free.LIBCMT ref: 013E71E7
                                          • Part of subcall function 013E7170: _free.LIBCMT ref: 013E71F9
                                          • Part of subcall function 013E7170: _free.LIBCMT ref: 013E720B
                                          • Part of subcall function 013E7170: _free.LIBCMT ref: 013E721D
                                          • Part of subcall function 013E7170: _free.LIBCMT ref: 013E722F
                                          • Part of subcall function 013E7170: _free.LIBCMT ref: 013E7241
                                          • Part of subcall function 013E7170: _free.LIBCMT ref: 013E7253
                                          • Part of subcall function 013E7170: _free.LIBCMT ref: 013E7265
                                        • _free.LIBCMT ref: 013E7EEE
                                          • Part of subcall function 013E3386: RtlFreeHeap.NTDLL(00000000,00000000,?,013E78DD,?,00000000,?,00000000,?,013E7B81,?,00000007,?,?,013E804D,?), ref: 013E339C
                                          • Part of subcall function 013E3386: GetLastError.KERNEL32(?,?,013E78DD,?,00000000,?,00000000,?,013E7B81,?,00000007,?,?,013E804D,?,?), ref: 013E33AE
                                        • _free.LIBCMT ref: 013E7F10
                                        • _free.LIBCMT ref: 013E7F25
                                        • _free.LIBCMT ref: 013E7F30
                                        • _free.LIBCMT ref: 013E7F52
                                        • _free.LIBCMT ref: 013E7F65
                                        • _free.LIBCMT ref: 013E7F73
                                        • _free.LIBCMT ref: 013E7F7E
                                        • _free.LIBCMT ref: 013E7FB6
                                        • _free.LIBCMT ref: 013E7FBD
                                        • _free.LIBCMT ref: 013E7FDA
                                        • _free.LIBCMT ref: 013E7FF2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1751818674.0000000000DE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DE0000, based on PE: true
                                        • Associated: 00000000.00000002.1751805850.0000000000DE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752184177.00000000013F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752214599.0000000001426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752229905.000000000142B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_de0000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                        • String ID:
                                        • API String ID: 161543041-0
                                        • Opcode ID: d4995b04d72519c718bf5342e79fab25fdc663b936444dcfbfc45c92f77aa304
                                        • Instruction ID: 5341361e0b969f2876f048dbb72eade2c87bd64fe752754c318b1e81047135f4
                                        • Opcode Fuzzy Hash: d4995b04d72519c718bf5342e79fab25fdc663b936444dcfbfc45c92f77aa304
                                        • Instruction Fuzzy Hash: 18312C31A08721AFEB31AA3CE848F9A77E9FF00258F25451DE548D72D0DF31A89586A4

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 013E78AF: _free.LIBCMT ref: 013E78D8
                                        • _free.LIBCMT ref: 013E7BB6
                                          • Part of subcall function 013E3386: RtlFreeHeap.NTDLL(00000000,00000000,?,013E78DD,?,00000000,?,00000000,?,013E7B81,?,00000007,?,?,013E804D,?), ref: 013E339C
                                          • Part of subcall function 013E3386: GetLastError.KERNEL32(?,?,013E78DD,?,00000000,?,00000000,?,013E7B81,?,00000007,?,?,013E804D,?,?), ref: 013E33AE
                                        • _free.LIBCMT ref: 013E7BC1
                                        • _free.LIBCMT ref: 013E7BCC
                                        • _free.LIBCMT ref: 013E7C20
                                        • _free.LIBCMT ref: 013E7C2B
                                        • _free.LIBCMT ref: 013E7C36
                                        • _free.LIBCMT ref: 013E7C41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1751818674.0000000000DE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DE0000, based on PE: true
                                        • Associated: 00000000.00000002.1751805850.0000000000DE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752184177.00000000013F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752214599.0000000001426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752229905.000000000142B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_de0000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast
                                        • String ID:
                                        • API String ID: 776569668-0
                                        • Opcode ID: 135fda3bc3557ad49c123b58d75b07371077b008e0b9b336b431d6201a92d847
                                        • Instruction ID: 7d98407e41b7adbe6da07bf101853126231cbd5326a721ab62d17ac01626da63
                                        • Opcode Fuzzy Hash: 135fda3bc3557ad49c123b58d75b07371077b008e0b9b336b431d6201a92d847
                                        • Instruction Fuzzy Hash: E6115171940B25AAE670BBB4CC4EFCB7BDCAF20744F404A19A299671D0EB65F9058690

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 288 13d7425-13d744d GetModuleHandleExW 289 13d744f-13d7462 GetProcAddress 288->289 290 13d7472-13d7476 288->290 293 13d7464-13d746f 289->293 294 13d7471 289->294 291 13d7478-13d747b FreeLibrary 290->291 292 13d7481-13d748e call 137a54a 290->292 291->292 293->294 294->290
                                        APIs
                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,013D73D6,00000003,?,013D7376,00000003,014243A0,0000000C,013D74CD,00000003,00000002), ref: 013D7445
                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 013D7458
                                        • FreeLibrary.KERNEL32(00000000,?,?,?,013D73D6,00000003,?,013D7376,00000003,014243A0,0000000C,013D74CD,00000003,00000002,00000000), ref: 013D747B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1751818674.0000000000DE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DE0000, based on PE: true
                                        • Associated: 00000000.00000002.1751805850.0000000000DE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752184177.00000000013F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752214599.0000000001426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752229905.000000000142B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_de0000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: AddressFreeHandleLibraryModuleProc
                                        • String ID: CorExitProcess$mscoree.dll
                                        • API String ID: 4061214504-1276376045
                                        • Opcode ID: 4b77e132fd01412afab84d158483e9c1dc8745ef725f8ec7b7c7e9a7d3e57328
                                        • Instruction ID: 6a5591b604c40319f79b3d9191fa253035a92ad402e478dc1a7506dedcd0321a
                                        • Opcode Fuzzy Hash: 4b77e132fd01412afab84d158483e9c1dc8745ef725f8ec7b7c7e9a7d3e57328
                                        • Instruction Fuzzy Hash: 4AF04F31A00218BBDB219FA5EC59BAEBFB8EF4471AF454069E905A2154DB349980DB90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 298 13e38ca-13e38e1 GetLastError 299 13e38ef-13e3901 call 13e3477 298->299 300 13e38e3-13e38ed call 13e3d93 298->300 305 13e390c-13e391a call 13e3de9 299->305 306 13e3903 299->306 300->299 307 13e3940-13e3947 SetLastError 300->307 314 13e391f-13e3935 call 13e36b8 call 13e3386 305->314 315 13e391c-13e391d 305->315 309 13e3904-13e390a call 13e3386 306->309 308 13e3949-13e394e 307->308 316 13e3937-13e393e SetLastError 309->316 314->307 314->316 315->309 316->308
                                        APIs
                                        • GetLastError.KERNEL32(?,?,?,013D996D,013E34C9,?,013E3874,00000001,00000364,?,013D2B5C,01424340,00000010), ref: 013E38CF
                                        • _free.LIBCMT ref: 013E3904
                                        • _free.LIBCMT ref: 013E392B
                                        • SetLastError.KERNEL32(00000000), ref: 013E3938
                                        • SetLastError.KERNEL32(00000000), ref: 013E3941
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1751818674.0000000000DE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DE0000, based on PE: true
                                        • Associated: 00000000.00000002.1751805850.0000000000DE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752184177.00000000013F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752214599.0000000001426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752229905.000000000142B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_de0000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: ErrorLast$_free
                                        • String ID:
                                        • API String ID: 3170660625-0
                                        • Opcode ID: 2135c844579595e3268202d69c08bb8cfbdf01a15c6c9103519d6a229f874a3b
                                        • Instruction ID: b3a6b396e1ea5f388f667910749628a20945d953922161f14aacb6a48163d0ec
                                        • Opcode Fuzzy Hash: 2135c844579595e3268202d69c08bb8cfbdf01a15c6c9103519d6a229f874a3b
                                        • Instruction Fuzzy Hash: 0101D17620572626C322262E6C8CF7B2ADDBBE067DB220128F905A32C5EF7588014621
                                        APIs
                                        • _free.LIBCMT ref: 013E7642
                                          • Part of subcall function 013E3386: RtlFreeHeap.NTDLL(00000000,00000000,?,013E78DD,?,00000000,?,00000000,?,013E7B81,?,00000007,?,?,013E804D,?), ref: 013E339C
                                          • Part of subcall function 013E3386: GetLastError.KERNEL32(?,?,013E78DD,?,00000000,?,00000000,?,013E7B81,?,00000007,?,?,013E804D,?,?), ref: 013E33AE
                                        • _free.LIBCMT ref: 013E7654
                                        • _free.LIBCMT ref: 013E7666
                                        • _free.LIBCMT ref: 013E7678
                                        • _free.LIBCMT ref: 013E768A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1751818674.0000000000DE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DE0000, based on PE: true
                                        • Associated: 00000000.00000002.1751805850.0000000000DE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752184177.00000000013F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752214599.0000000001426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1752229905.000000000142B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_de0000_SecuriteInfo.jbxd
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast
                                        • String ID:
                                        • API String ID: 776569668-0
                                        • Opcode ID: 9e2e3aabf9318f3ab4b215858bea287409297e56d44eeaab325038116d398976
                                        • Instruction ID: 4d3098ca2c0121f4f9d424317441233f9fc71b61eeba2d08496a8ebe0880f1e8
                                        • Opcode Fuzzy Hash: 9e2e3aabf9318f3ab4b215858bea287409297e56d44eeaab325038116d398976
                                        • Instruction Fuzzy Hash: 11F0FF72509321A7DA30EE5CF489C5677D9FB107297A60909F609D77C0CB30F8C04B98

                                        Execution Graph

                                        Execution Coverage:18.3%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:12%
                                        Total number of Nodes:1243
                                        Total number of Limit Nodes:56
                                        execution_graph 6241 401c46 6242 40145c 18 API calls 6241->6242 6243 401c4c 6242->6243 6244 406404 11 API calls 6243->6244 6245 401c59 6244->6245 6246 406dfc 81 API calls 6245->6246 6247 401c64 6246->6247 5704 6d101000 5705 6d101263 5704->5705 5706 6d101018 5704->5706 5707 6d101022 5705->5707 5708 6d10126c DeleteObject 5705->5708 5709 6d10101f 5706->5709 5717 6d101094 5706->5717 5708->5707 5709->5707 5712 6d101031 5709->5712 5713 6d10104a SendDlgItemMessageW SendDlgItemMessageW 5709->5713 5711 6d1010b6 SendDlgItemMessageW SendDlgItemMessageW 5711->5717 5712->5707 5720 6d1015bd 2 API calls 5712->5720 5714 6d101075 5713->5714 5721 6d1015bd 2 API calls 5714->5721 5715 6d101257 ShowWindow 5715->5707 5716 6d10117d 5718 6d101582 2 API calls 5716->5718 5717->5711 5719 6d1010e4 lstrcmpW 5717->5719 5724 6d101112 6 API calls 5717->5724 5725 6d101188 5718->5725 5719->5717 5722 6d101042 KiUserCallbackDispatcher 5720->5722 5721->5722 5722->5707 5724->5715 5724->5716 5725->5715 5726 6d101582 2 API calls 5725->5726 5727 6d1011a0 5726->5727 5727->5715 5728 6d1011b9 lstrcmpW 5727->5728 5728->5715 5729 6d1011d0 10 API calls 5728->5729 5729->5715 6636 402065 6637 401446 18 API calls 6636->6637 6638 40206d 6637->6638 6639 401446 18 API calls 6638->6639 6640 402076 GetDlgItem 6639->6640 6641 4030dc 6640->6641 6642 4030e3 6641->6642 6644 4060b2 wsprintfW 6641->6644 6644->6642 5769 402175 5770 401446 18 API calls 5769->5770 5771 40217c 5770->5771 5772 401446 18 API calls 5771->5772 5773 402186 5772->5773 5774 402197 5773->5774 5775 406404 11 API calls 5773->5775 5776 4021aa EnableWindow 5774->5776 5777 40219f ShowWindow 5774->5777 5775->5774 5778 4030e3 5776->5778 5777->5778 6915 401e0f 6916 401446 18 API calls 6915->6916 6917 401e17 6916->6917 6918 401446 18 API calls 6917->6918 6919 401e21 6918->6919 6920 4030e3 6919->6920 6922 4060b2 wsprintfW 6919->6922 6922->6920 6938 402713 6953 40616a lstrcpynW 6938->6953 6940 40272c 6954 40616a lstrcpynW 6940->6954 6942 402738 6943 402743 6942->6943 6944 40145c 18 API calls 6942->6944 6945 402752 6943->6945 6946 40145c 18 API calls 6943->6946 6944->6943 6947 40145c 18 API calls 6945->6947 6949 402761 6945->6949 6946->6945 6947->6949 6948 40145c 18 API calls 6950 40276b 6948->6950 6949->6948 6951 406404 11 API calls 6950->6951 6952 40277f WritePrivateProfileStringW 6951->6952 6953->6940 6954->6942 6105 401a1f 6106 40145c 18 API calls 6105->6106 6107 401a26 6106->6107 6108 406404 11 API calls 6107->6108 6109 401a49 6108->6109 6110 401a64 6109->6110 6111 401a5c 6109->6111 6159 40616a lstrcpynW 6110->6159 6158 40616a lstrcpynW 6111->6158 6114 401a62 6118 406199 5 API calls 6114->6118 6115 401a6f 6116 406883 3 API calls 6115->6116 6117 401a75 lstrcatW 6116->6117 6117->6114 6150 401a81 6118->6150 6119 406436 2 API calls 6119->6150 6120 405f90 2 API calls 6120->6150 6122 401a98 CompareFileTime 6122->6150 6123 401ba9 6124 4050d2 25 API calls 6123->6124 6126 401bb3 6124->6126 6125 401b5d 6127 4050d2 25 API calls 6125->6127 6128 403550 48 API calls 6126->6128 6129 401b70 6127->6129 6130 401bc6 6128->6130 6133 406404 11 API calls 6129->6133 6132 406404 11 API calls 6130->6132 6131 40616a lstrcpynW 6131->6150 6134 401bda 6132->6134 6139 401b8b 6133->6139 6135 401be9 SetFileTime 6134->6135 6136 401bf8 CloseHandle 6134->6136 6135->6136 6138 401c09 6136->6138 6136->6139 6137 406966 18 API calls 6137->6150 6140 401c21 6138->6140 6141 401c0e 6138->6141 6143 406966 18 API calls 6140->6143 6142 406966 18 API calls 6141->6142 6146 401c16 lstrcatW 6142->6146 6144 401c29 6143->6144 6147 406404 11 API calls 6144->6147 6145 405e00 MessageBoxIndirectW 6145->6150 6146->6144 6148 401c34 6147->6148 6153 405e00 MessageBoxIndirectW 6148->6153 6149 401b50 6151 401b93 6149->6151 6152 401b53 6149->6152 6150->6119 6150->6120 6150->6122 6150->6123 6150->6125 6150->6131 6150->6137 6150->6145 6150->6149 6154 406404 11 API calls 6150->6154 6157 405fb0 GetFileAttributesW CreateFileW 6150->6157 6156 406404 11 API calls 6151->6156 6155 406404 11 API calls 6152->6155 6153->6139 6154->6150 6155->6125 6156->6139 6157->6150 6158->6114 6159->6115 5112 6ceb188a GetProcessHeap HeapAlloc 5113 6ceb18c1 5112->5113 5114 6ceb18d0 5112->5114 5173 6ceb1e83 5113->5173 5148 6ceb1e34 5114->5148 5119 6ceb1b54 5120 6ceb18dc 5122 6ceb1e83 2 API calls 5120->5122 5124 6ceb18e6 GetProcessHeap 5122->5124 5123 6ceb18f5 5126 6ceb2055 2 API calls 5123->5126 5125 6ceb1b4d RtlFreeHeap 5124->5125 5125->5119 5127 6ceb18fd 5126->5127 5156 6ceb1313 GetClientRect 5127->5156 5129 6ceb1915 5130 6ceb1e34 2 API calls 5129->5130 5131 6ceb191d 5130->5131 5131->5120 5132 6ceb1921 GetProcessHeap HeapReAlloc lstrcmpiW 5131->5132 5133 6ceb197c lstrcmpiW 5132->5133 5142 6ceb1961 5132->5142 5134 6ceb19a3 lstrcmpiW 5133->5134 5133->5142 5135 6ceb19ca lstrcmpiW 5134->5135 5134->5142 5136 6ceb19f1 lstrcmpiW 5135->5136 5135->5142 5138 6ceb1a15 lstrcmpiW 5136->5138 5136->5142 5137 6ceb1a9c lstrcmpiW 5139 6ceb1aa8 5137->5139 5140 6ceb1aad CreateWindowExW SetPropW SendMessageW SendMessageW 5137->5140 5141 6ceb1a39 lstrcmpiW 5138->5141 5138->5142 5139->5140 5143 6ceb1b3c 5140->5143 5144 6ceb1b21 SetWindowLongW 5140->5144 5141->5142 5146 6ceb1a5d lstrcmpiW 5141->5146 5142->5137 5176 6ceb2085 wsprintfW 5143->5176 5144->5143 5146->5142 5149 6ceb18d8 5148->5149 5152 6ceb1e3d 5148->5152 5149->5120 5153 6ceb2055 5149->5153 5150 6ceb1e6d GlobalFree 5150->5149 5151 6ceb1e59 lstrcpynW 5151->5150 5152->5149 5152->5150 5152->5151 5154 6ceb1e34 2 API calls 5153->5154 5155 6ceb206f 5154->5155 5155->5123 5157 6ceb1e34 2 API calls 5156->5157 5158 6ceb134c 5157->5158 5163 6ceb1350 5158->5163 5179 6ceb128f lstrlenW CharPrevW 5158->5179 5161 6ceb1e34 2 API calls 5162 6ceb137a 5161->5162 5162->5163 5164 6ceb128f 4 API calls 5162->5164 5163->5129 5165 6ceb138e 5164->5165 5166 6ceb1e34 2 API calls 5165->5166 5167 6ceb13a0 5166->5167 5167->5163 5168 6ceb128f 4 API calls 5167->5168 5169 6ceb13b2 5168->5169 5170 6ceb1e34 2 API calls 5169->5170 5171 6ceb13c4 5170->5171 5171->5163 5172 6ceb128f 4 API calls 5171->5172 5172->5163 5174 6ceb1e8c GlobalAlloc lstrcpynW 5173->5174 5175 6ceb18cb 5173->5175 5174->5175 5175->5119 5177 6ceb1e83 2 API calls 5176->5177 5178 6ceb1b42 GetProcessHeap 5177->5178 5178->5125 5180 6ceb12b4 5179->5180 5181 6ceb12ce 5180->5181 5182 6ceb12bb MulDiv 5180->5182 5184 6ceb12d3 MapDialogRect 5181->5184 5185 6ceb12f6 5181->5185 5182->5185 5184->5185 5185->5161 7088 404a2c 7089 404a51 7088->7089 7090 404a3a 7088->7090 7092 404a5f IsWindowVisible 7089->7092 7098 404a76 7089->7098 7091 404a40 7090->7091 7106 404aba 7090->7106 7093 403f0f SendMessageW 7091->7093 7095 404a6c 7092->7095 7092->7106 7096 404a4a 7093->7096 7094 404ac0 CallWindowProcW 7094->7096 7097 4049ae 5 API calls 7095->7097 7097->7098 7098->7094 7107 40616a lstrcpynW 7098->7107 7100 404aa5 7108 4060b2 wsprintfW 7100->7108 7102 404aac 7103 40141d 80 API calls 7102->7103 7104 404ab3 7103->7104 7109 40616a lstrcpynW 7104->7109 7106->7094 7107->7100 7108->7102 7109->7106 5668 6d10127f 5697 6d101582 5668->5697 5671 6d101541 5672 6d101582 2 API calls 5673 6d1012c9 5672->5673 5673->5671 5674 6d101582 2 API calls 5673->5674 5676 6d1012dd 5674->5676 5675 6d10138d GlobalAlloc 5675->5671 5677 6d1013ae 5675->5677 5676->5671 5676->5675 5678 6d101582 2 API calls 5677->5678 5684 6d1014a3 5677->5684 5685 6d1013d9 lstrlenW GlobalAlloc 5677->5685 5678->5677 5679 6d101582 2 API calls 5681 6d1014b8 5679->5681 5680 6d1014cc DialogBoxParamW 5689 6d1014fb 5680->5689 5681->5680 5682 6d1014e3 5681->5682 5701 6d1015bd 5682->5701 5683 6d101538 GlobalFree 5683->5671 5684->5679 5684->5681 5685->5684 5687 6d101410 lstrcpyW 5685->5687 5690 6d101582 2 API calls 5687->5690 5688 6d101519 GlobalFree 5688->5689 5689->5683 5689->5688 5691 6d101529 GlobalFree 5689->5691 5696 6d10141a 5690->5696 5691->5689 5692 6d101422 lstrlenW GlobalAlloc 5692->5684 5693 6d101457 lstrcpyW 5692->5693 5693->5696 5694 6d1014a1 5694->5684 5695 6d101582 2 API calls 5695->5696 5696->5677 5696->5684 5696->5692 5696->5694 5696->5695 5698 6d1012b7 5697->5698 5699 6d10158b 5697->5699 5698->5671 5698->5672 5699->5698 5700 6d101590 lstrcpyW GlobalFree 5699->5700 5700->5698 5702 6d101600 5701->5702 5703 6d1015c6 GlobalAlloc lstrcpynW 5701->5703 5702->5689 5703->5702 5906 6ceb1791 5907 6ceb17c2 5906->5907 5916 6ceb2025 5907->5916 5909 6ceb17d6 GetDlgItem GetWindowRect MapWindowPoints CreateDialogParamW 5910 6ceb1823 SetWindowPos SetWindowLongW GetProcessHeap HeapAlloc 5909->5910 5911 6ceb1817 5909->5911 5913 6ceb2085 3 API calls 5910->5913 5912 6ceb1e83 2 API calls 5911->5912 5914 6ceb1821 5912->5914 5915 6ceb1886 5913->5915 5914->5915 5917 6ceb1e34 2 API calls 5916->5917 5918 6ceb203f 5917->5918 5918->5909 4908 407dc0 4914 4074a5 4908->4914 4909 407dce 4910 407523 GlobalFree 4911 40752c GlobalAlloc 4910->4911 4911->4909 4911->4914 4912 4075a4 GlobalAlloc 4912->4909 4912->4914 4913 40759b GlobalFree 4913->4912 4914->4909 4914->4910 4914->4911 4914->4912 4914->4913 6215 401cc3 6216 40145c 18 API calls 6215->6216 6217 401cca lstrlenW 6216->6217 6218 4030dc 6217->6218 6219 4030e3 6218->6219 6221 4060b2 wsprintfW 6218->6221 6221->6219 6303 4022cc 6304 40145c 18 API calls 6303->6304 6305 4022d3 6304->6305 6306 406436 2 API calls 6305->6306 6307 4022d9 6306->6307 6309 4022e8 6307->6309 6312 4060b2 wsprintfW 6307->6312 6310 4030e3 6309->6310 6313 4060b2 wsprintfW 6309->6313 6312->6309 6313->6310 6317 4030cf 6318 40145c 18 API calls 6317->6318 6319 4030d6 6318->6319 6321 4030dc 6319->6321 6324 40650d GlobalAlloc lstrlenW 6319->6324 6322 4030e3 6321->6322 6352 4060b2 wsprintfW 6321->6352 6325 406543 6324->6325 6326 406595 6324->6326 6327 406570 GetVersionExW 6325->6327 6353 40618c CharUpperW 6325->6353 6326->6321 6327->6326 6328 40659f 6327->6328 6330 4065c5 LoadLibraryA 6328->6330 6331 4065ae 6328->6331 6330->6326 6333 4065e3 GetProcAddress GetProcAddress GetProcAddress 6330->6333 6331->6326 6332 4066e6 GlobalFree 6331->6332 6334 4066fc LoadLibraryA 6332->6334 6335 40683e FreeLibrary 6332->6335 6336 4067a6 FreeLibrary 6333->6336 6339 40660b 6333->6339 6334->6326 6338 406716 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 6334->6338 6335->6326 6336->6321 6338->6336 6341 406756 6338->6341 6339->6336 6340 40662f FreeLibrary GlobalFree 6339->6340 6344 40664b 6339->6344 6340->6326 6341->6336 6348 40678b 6341->6348 6342 40665d lstrcpyW OpenProcess 6343 4066b0 CloseHandle CharUpperW lstrcmpW 6342->6343 6342->6344 6343->6336 6343->6344 6344->6332 6344->6342 6344->6343 6345 406835 CloseHandle 6345->6335 6346 40684b 6347 406850 CloseHandle FreeLibrary 6346->6347 6349 406865 CloseHandle 6347->6349 6348->6345 6348->6346 6350 4067e6 lstrcmpW 6348->6350 6351 406817 CloseHandle 6348->6351 6349->6347 6350->6348 6350->6349 6351->6348 6352->6322 6353->6325 6419 401cd5 6420 401446 18 API calls 6419->6420 6421 401cdd 6420->6421 6422 401446 18 API calls 6421->6422 6423 401ce8 6422->6423 6424 40145c 18 API calls 6423->6424 6425 401cf1 6424->6425 6426 401d07 lstrlenW 6425->6426 6431 401d43 6425->6431 6427 401d11 6426->6427 6427->6431 6432 40616a lstrcpynW 6427->6432 6429 401d2c 6430 401d39 lstrlenW 6429->6430 6429->6431 6430->6431 6432->6429 5779 6ceb1c7c SendMessageW ShowWindow 5780 6ceb1d01 SetWindowLongW 5779->5780 5781 6ceb1cb0 5779->5781 5782 6ceb1cb7 KiUserCallbackDispatcher IsDialogMessageW 5781->5782 5785 6ceb1d00 5781->5785 5782->5781 5783 6ceb1cd4 IsDialogMessageW 5782->5783 5783->5781 5784 6ceb1ce4 TranslateMessage DispatchMessageW 5783->5784 5784->5781 5785->5780 5786 4055d9 5787 4055f1 5786->5787 5788 40572d 5786->5788 5787->5788 5789 4055fd 5787->5789 5790 40577e 5788->5790 5791 40573e GetDlgItem GetDlgItem 5788->5791 5793 405608 SetWindowPos 5789->5793 5794 40561b 5789->5794 5792 4057d8 5790->5792 5800 40139d 80 API calls 5790->5800 5795 403e9f 19 API calls 5791->5795 5796 403f0f SendMessageW 5792->5796 5801 405728 5792->5801 5793->5794 5797 405620 ShowWindow 5794->5797 5798 405638 5794->5798 5799 405768 SetClassLongW 5795->5799 5824 4057ea 5796->5824 5797->5798 5802 405640 DestroyWindow 5798->5802 5803 40565a 5798->5803 5804 40141d 80 API calls 5799->5804 5808 4057b0 5800->5808 5805 405a5d 5802->5805 5806 405670 5803->5806 5807 40565f SetWindowLongW 5803->5807 5804->5790 5805->5801 5817 405a6d ShowWindow 5805->5817 5809 405719 5806->5809 5810 40567c GetDlgItem 5806->5810 5807->5801 5808->5792 5811 4057b4 SendMessageW 5808->5811 5866 403f2a 5809->5866 5814 4056ac 5810->5814 5815 40568f SendMessageW IsWindowEnabled 5810->5815 5811->5801 5812 40141d 80 API calls 5812->5824 5813 405a3e DestroyWindow EndDialog 5813->5805 5819 4056b9 5814->5819 5821 405700 SendMessageW 5814->5821 5822 4056cc 5814->5822 5831 4056b1 5814->5831 5815->5801 5815->5814 5817->5801 5818 406966 18 API calls 5818->5824 5819->5821 5819->5831 5821->5809 5825 4056d4 5822->5825 5826 4056e9 5822->5826 5823 4056e7 5823->5809 5824->5801 5824->5812 5824->5813 5824->5818 5827 403e9f 19 API calls 5824->5827 5847 40597e DestroyWindow 5824->5847 5857 403e9f 5824->5857 5829 40141d 80 API calls 5825->5829 5828 40141d 80 API calls 5826->5828 5827->5824 5830 4056f0 5828->5830 5829->5831 5830->5809 5830->5831 5863 403e78 5831->5863 5833 405865 GetDlgItem 5834 405883 ShowWindow KiUserCallbackDispatcher 5833->5834 5835 40587a 5833->5835 5860 403ee5 EnableWindow 5834->5860 5835->5834 5837 4058ad EnableWindow 5840 4058c1 5837->5840 5838 4058c6 GetSystemMenu EnableMenuItem SendMessageW 5839 4058f6 SendMessageW 5838->5839 5838->5840 5839->5840 5840->5838 5861 403ef8 SendMessageW 5840->5861 5862 40616a lstrcpynW 5840->5862 5843 405924 lstrlenW 5844 406966 18 API calls 5843->5844 5845 40593a SetWindowTextW 5844->5845 5846 40139d 80 API calls 5845->5846 5846->5824 5847->5805 5848 405998 CreateDialogParamW 5847->5848 5848->5805 5849 4059cb 5848->5849 5850 403e9f 19 API calls 5849->5850 5851 4059d6 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5850->5851 5852 40139d 80 API calls 5851->5852 5853 405a1c 5852->5853 5853->5801 5854 405a24 ShowWindow 5853->5854 5855 403f0f SendMessageW 5854->5855 5856 405a3c 5855->5856 5856->5805 5858 406966 18 API calls 5857->5858 5859 403eaa SetDlgItemTextW 5858->5859 5859->5833 5860->5837 5861->5840 5862->5843 5864 403e85 SendMessageW 5863->5864 5865 403e7f 5863->5865 5864->5823 5865->5864 5867 403f3f GetWindowLongW 5866->5867 5877 403fc8 5866->5877 5868 403f50 5867->5868 5867->5877 5869 403f62 5868->5869 5870 403f5f GetSysColor 5868->5870 5871 403f72 SetBkMode 5869->5871 5872 403f68 SetTextColor 5869->5872 5870->5869 5873 403f90 5871->5873 5874 403f8a GetSysColor 5871->5874 5872->5871 5875 403fa1 5873->5875 5876 403f97 SetBkColor 5873->5876 5874->5873 5875->5877 5878 403fb4 DeleteObject 5875->5878 5879 403fbb CreateBrushIndirect 5875->5879 5876->5875 5877->5801 5878->5879 5879->5877 5186 4039e3 #17 SetErrorMode OleInitialize 5259 40645d GetModuleHandleA 5186->5259 5190 403a51 GetCommandLineW 5264 40616a lstrcpynW 5190->5264 5192 403a63 GetModuleHandleW 5193 403a7b 5192->5193 5194 405e66 CharNextW 5193->5194 5195 403a8a CharNextW 5194->5195 5210 403a9c 5195->5210 5196 403b36 5197 403b55 GetTempPathW 5196->5197 5265 403914 5197->5265 5199 403b6b 5200 403b93 DeleteFileW 5199->5200 5201 403b6f GetWindowsDirectoryW lstrcatW 5199->5201 5273 403679 GetTickCount GetModuleFileNameW 5200->5273 5203 403914 11 API calls 5201->5203 5202 405e66 CharNextW 5202->5210 5205 403b8b 5203->5205 5205->5200 5207 403c2c 5205->5207 5206 403ba7 5206->5207 5208 403c11 5206->5208 5211 405e66 CharNextW 5206->5211 5377 4039a1 5207->5377 5303 405a8c 5208->5303 5210->5196 5210->5202 5216 403b38 5210->5216 5225 403bbe 5211->5225 5214 403c41 5386 405e00 5214->5386 5215 403d2e 5220 403db1 5215->5220 5222 40645d 3 API calls 5215->5222 5360 40616a lstrcpynW 5216->5360 5217 403c21 5219 406248 9 API calls 5217->5219 5219->5207 5227 403d3d 5222->5227 5223 403c57 lstrcatW lstrcmpiW 5223->5207 5230 403c73 CreateDirectoryW SetCurrentDirectoryW 5223->5230 5224 403be9 5361 4068df 5224->5361 5225->5223 5225->5224 5228 40645d 3 API calls 5227->5228 5231 403d46 5228->5231 5233 403c96 5230->5233 5234 403c8b 5230->5234 5235 40645d 3 API calls 5231->5235 5391 40616a lstrcpynW 5233->5391 5390 40616a lstrcpynW 5234->5390 5238 403d4f 5235->5238 5241 403d9d ExitWindowsEx 5238->5241 5246 403d5d GetCurrentProcess 5238->5246 5240 403ca4 5392 40616a lstrcpynW 5240->5392 5241->5220 5245 403daa 5241->5245 5242 403c06 5376 40616a lstrcpynW 5242->5376 5401 40141d 5245->5401 5249 403d6d 5246->5249 5248 406966 18 API calls 5250 403ccc DeleteFileW 5248->5250 5249->5241 5251 403cd9 CopyFileW 5250->5251 5256 403cb3 5250->5256 5251->5256 5252 403d22 5254 406dc9 42 API calls 5252->5254 5254->5207 5255 406966 18 API calls 5255->5256 5256->5248 5256->5252 5256->5255 5258 403d0d CloseHandle 5256->5258 5393 406dc9 5256->5393 5398 405d9f CreateProcessW 5256->5398 5258->5256 5260 406480 GetProcAddress 5259->5260 5261 406475 LoadLibraryA 5259->5261 5262 403a26 SHGetFileInfoW 5260->5262 5261->5260 5261->5262 5263 40616a lstrcpynW 5262->5263 5263->5190 5264->5192 5266 406199 5 API calls 5265->5266 5268 403920 5266->5268 5267 40392a 5267->5199 5268->5267 5404 406883 lstrlenW CharPrevW 5268->5404 5411 405fb0 GetFileAttributesW CreateFileW 5273->5411 5275 4036bc 5302 4036c9 5275->5302 5412 40616a lstrcpynW 5275->5412 5277 4036df 5413 4068b2 lstrlenW 5277->5413 5281 4036f0 GetFileSize 5282 4037ec 5281->5282 5293 403707 5281->5293 5283 4032e7 33 API calls 5282->5283 5284 4037f5 5283->5284 5286 403829 GlobalAlloc 5284->5286 5284->5302 5418 4033bb SetFilePointer 5284->5418 5285 403389 ReadFile 5285->5293 5289 403840 5286->5289 5288 403881 5291 4032e7 33 API calls 5288->5291 5294 405fe0 2 API calls 5289->5294 5290 403812 5292 403389 ReadFile 5290->5292 5291->5302 5295 40381d 5292->5295 5293->5282 5293->5285 5293->5288 5296 4032e7 33 API calls 5293->5296 5293->5302 5297 403851 CreateFileW 5294->5297 5295->5286 5295->5302 5296->5293 5298 403890 5297->5298 5297->5302 5419 4033bb SetFilePointer 5298->5419 5300 40389e 5301 403550 48 API calls 5300->5301 5301->5302 5302->5206 5304 40645d 3 API calls 5303->5304 5305 405aa0 5304->5305 5306 405aa6 5305->5306 5307 405ab8 5305->5307 5429 4060b2 wsprintfW 5306->5429 5308 406034 3 API calls 5307->5308 5309 405ae9 5308->5309 5311 405b08 lstrcatW 5309->5311 5313 406034 3 API calls 5309->5313 5312 405ab6 5311->5312 5420 403ff5 5312->5420 5313->5311 5316 4068df 18 API calls 5317 405b3a 5316->5317 5318 405bd0 5317->5318 5320 406034 3 API calls 5317->5320 5319 4068df 18 API calls 5318->5319 5321 405bd6 5319->5321 5322 405b6c 5320->5322 5323 405be6 5321->5323 5324 406966 18 API calls 5321->5324 5322->5318 5328 405b8f lstrlenW 5322->5328 5331 405e66 CharNextW 5322->5331 5325 405c06 LoadImageW 5323->5325 5431 403fd4 5323->5431 5324->5323 5326 405c31 RegisterClassW 5325->5326 5327 405cc6 5325->5327 5329 405c79 SystemParametersInfoW CreateWindowExW 5326->5329 5357 405cd0 5326->5357 5330 40141d 80 API calls 5327->5330 5332 405bc3 5328->5332 5333 405b9d lstrcmpiW 5328->5333 5329->5327 5336 405ccc 5330->5336 5337 405b8a 5331->5337 5335 406883 3 API calls 5332->5335 5333->5332 5338 405bad GetFileAttributesW 5333->5338 5340 405bc9 5335->5340 5344 403ff5 19 API calls 5336->5344 5336->5357 5337->5328 5341 405bb9 5338->5341 5339 405bfc 5339->5325 5430 40616a lstrcpynW 5340->5430 5341->5332 5342 4068b2 2 API calls 5341->5342 5342->5332 5345 405cdd 5344->5345 5346 405ce9 ShowWindow LoadLibraryW 5345->5346 5347 405d6c 5345->5347 5349 405d08 LoadLibraryW 5346->5349 5350 405d0f GetClassInfoW 5346->5350 5436 4051a7 OleInitialize 5347->5436 5349->5350 5352 405d23 GetClassInfoW RegisterClassW 5350->5352 5353 405d39 DialogBoxParamW 5350->5353 5351 405d72 5354 405d76 5351->5354 5355 405d8e 5351->5355 5352->5353 5356 40141d 80 API calls 5353->5356 5354->5357 5359 40141d 80 API calls 5354->5359 5358 40141d 80 API calls 5355->5358 5356->5357 5357->5217 5358->5357 5359->5357 5360->5197 5574 40616a lstrcpynW 5361->5574 5363 4068f0 5364 405eb9 4 API calls 5363->5364 5365 4068f6 5364->5365 5366 406199 5 API calls 5365->5366 5373 403bf7 5365->5373 5371 406906 5366->5371 5367 40693e lstrlenW 5368 406945 5367->5368 5367->5371 5370 406883 3 API calls 5368->5370 5369 406436 2 API calls 5369->5371 5372 40694b GetFileAttributesW 5370->5372 5371->5367 5371->5369 5371->5373 5374 4068b2 2 API calls 5371->5374 5372->5373 5373->5207 5375 40616a lstrcpynW 5373->5375 5374->5367 5375->5242 5376->5208 5378 4039b2 CloseHandle 5377->5378 5379 4039bc 5377->5379 5378->5379 5380 4039d0 5379->5380 5381 4039c6 CloseHandle 5379->5381 5575 403de3 5380->5575 5381->5380 5387 405e15 5386->5387 5388 403c4f ExitProcess 5387->5388 5389 405e2b MessageBoxIndirectW 5387->5389 5389->5388 5390->5233 5391->5240 5392->5256 5394 40645d 3 API calls 5393->5394 5395 406dd0 5394->5395 5397 406df1 5395->5397 5632 406bfa lstrcpyW 5395->5632 5397->5256 5399 405dda 5398->5399 5400 405dce CloseHandle 5398->5400 5399->5256 5400->5399 5402 40139d 80 API calls 5401->5402 5403 401432 5402->5403 5403->5220 5405 4068a0 lstrcatW 5404->5405 5406 403932 CreateDirectoryW 5404->5406 5405->5406 5407 405fe0 5406->5407 5408 405fed GetTickCount GetTempFileNameW 5407->5408 5409 403946 5408->5409 5410 406023 5408->5410 5409->5199 5410->5408 5410->5409 5411->5275 5412->5277 5414 4068c1 5413->5414 5415 4036e5 5414->5415 5416 4068c7 CharPrevW 5414->5416 5417 40616a lstrcpynW 5415->5417 5416->5414 5416->5415 5417->5281 5418->5290 5419->5300 5421 404009 5420->5421 5444 4060b2 wsprintfW 5421->5444 5423 40407d 5424 406966 18 API calls 5423->5424 5425 404089 SetWindowTextW 5424->5425 5426 4040a4 5425->5426 5427 4040bf 5426->5427 5428 406966 18 API calls 5426->5428 5427->5316 5428->5426 5429->5312 5430->5318 5445 40616a lstrcpynW 5431->5445 5433 403fe8 5434 406883 3 API calls 5433->5434 5435 403fee lstrcatW 5434->5435 5435->5339 5446 403f0f 5436->5446 5438 403f0f SendMessageW 5439 405205 OleUninitialize 5438->5439 5439->5351 5440 406404 11 API calls 5441 4051ca 5440->5441 5441->5440 5443 4051f5 5441->5443 5449 40139d 5441->5449 5443->5438 5444->5423 5445->5433 5447 403f27 5446->5447 5448 403f18 SendMessageW 5446->5448 5447->5441 5448->5447 5452 4013a4 5449->5452 5450 401410 5450->5441 5452->5450 5453 4013dd MulDiv SendMessageW 5452->5453 5454 4015a0 5452->5454 5453->5452 5455 4015fa 5454->5455 5534 40160c 5454->5534 5456 401601 5455->5456 5457 401742 5455->5457 5458 401962 5455->5458 5459 4019ca 5455->5459 5460 40176e 5455->5460 5461 4017b1 5455->5461 5462 401672 5455->5462 5463 401693 5455->5463 5464 401616 5455->5464 5465 4016d6 5455->5465 5466 401897 5455->5466 5467 4018db 5455->5467 5468 40163c 5455->5468 5469 4016bd 5455->5469 5492 401736 5455->5492 5493 401650 5455->5493 5455->5534 5473 406404 11 API calls 5456->5473 5479 401751 ShowWindow 5457->5479 5480 401758 5457->5480 5470 40145c 18 API calls 5458->5470 5477 40145c 18 API calls 5459->5477 5481 40145c 18 API calls 5460->5481 5471 40145c 18 API calls 5461->5471 5482 40145c 18 API calls 5462->5482 5472 401446 18 API calls 5463->5472 5476 40145c 18 API calls 5464->5476 5491 401446 18 API calls 5465->5491 5465->5534 5483 40145c 18 API calls 5466->5483 5474 40145c 18 API calls 5467->5474 5478 401647 PostQuitMessage 5468->5478 5468->5534 5475 406404 11 API calls 5469->5475 5484 401968 GetFullPathNameW 5470->5484 5485 4017b8 5471->5485 5486 40169a 5472->5486 5473->5534 5487 4018e2 5474->5487 5488 4016c7 SetForegroundWindow 5475->5488 5489 40161c 5476->5489 5490 4019d1 SearchPathW 5477->5490 5478->5534 5479->5480 5494 401765 ShowWindow 5480->5494 5480->5534 5495 401775 5481->5495 5496 401678 5482->5496 5497 40189d 5483->5497 5499 4019a1 5484->5499 5500 40197f 5484->5500 5501 406404 11 API calls 5485->5501 5502 406404 11 API calls 5486->5502 5503 40145c 18 API calls 5487->5503 5488->5534 5504 406404 11 API calls 5489->5504 5490->5534 5491->5534 5492->5534 5573 4060b2 wsprintfW 5492->5573 5506 406404 11 API calls 5493->5506 5494->5534 5507 406404 11 API calls 5495->5507 5508 406404 11 API calls 5496->5508 5569 406436 FindFirstFileW 5497->5569 5522 4019b8 GetShortPathNameW 5499->5522 5499->5534 5500->5499 5529 406436 2 API calls 5500->5529 5510 4017c9 5501->5510 5511 4016a7 5502->5511 5512 4018eb 5503->5512 5513 401627 5504->5513 5514 401664 5506->5514 5515 401785 SetFileAttributesW 5507->5515 5516 401683 5508->5516 5562 405eb9 CharNextW CharNextW 5510->5562 5520 4016b1 Sleep 5511->5520 5521 4016ae 5511->5521 5523 40145c 18 API calls 5512->5523 5524 4050d2 25 API calls 5513->5524 5525 40139d 65 API calls 5514->5525 5526 40179a 5515->5526 5515->5534 5527 4050d2 25 API calls 5516->5527 5517 4018c2 5530 406404 11 API calls 5517->5530 5518 4018a9 5528 406404 11 API calls 5518->5528 5520->5534 5521->5520 5522->5534 5531 4018f5 5523->5531 5524->5534 5525->5534 5532 406404 11 API calls 5526->5532 5527->5534 5528->5534 5533 401991 5529->5533 5530->5534 5536 406404 11 API calls 5531->5536 5532->5534 5533->5499 5572 40616a lstrcpynW 5533->5572 5534->5452 5535 401864 5535->5516 5539 40186e 5535->5539 5538 401902 MoveFileW 5536->5538 5537 405e66 CharNextW 5541 4017e6 CreateDirectoryW 5537->5541 5542 401912 5538->5542 5543 40191e 5538->5543 5544 4050d2 25 API calls 5539->5544 5545 4017fe GetLastError 5541->5545 5556 4017d4 5541->5556 5542->5516 5546 401942 5543->5546 5550 406436 2 API calls 5543->5550 5547 401875 5544->5547 5548 401827 GetFileAttributesW 5545->5548 5549 40180b GetLastError 5545->5549 5555 406404 11 API calls 5546->5555 5568 40616a lstrcpynW 5547->5568 5548->5556 5552 406404 11 API calls 5549->5552 5553 401929 5550->5553 5552->5556 5553->5546 5559 406dc9 42 API calls 5553->5559 5554 401882 SetCurrentDirectoryW 5554->5534 5558 40195c 5555->5558 5556->5535 5556->5537 5557 406404 11 API calls 5556->5557 5557->5556 5558->5534 5560 401936 5559->5560 5561 4050d2 25 API calls 5560->5561 5561->5546 5563 405ed6 5562->5563 5566 405ee8 5562->5566 5565 405ee3 CharNextW 5563->5565 5563->5566 5564 405f0c 5564->5556 5565->5564 5566->5564 5567 405e66 CharNextW 5566->5567 5567->5566 5568->5554 5570 4018a5 5569->5570 5571 40644c FindClose 5569->5571 5570->5517 5570->5518 5571->5570 5572->5499 5573->5534 5574->5363 5576 403df1 5575->5576 5577 4039d5 5576->5577 5578 403df6 FreeLibrary GlobalFree 5576->5578 5579 406dfc 5577->5579 5578->5577 5578->5578 5580 4068df 18 API calls 5579->5580 5581 406e0f 5580->5581 5582 406e18 DeleteFileW 5581->5582 5583 406e2f 5581->5583 5623 4039e1 OleUninitialize 5582->5623 5584 406fac 5583->5584 5627 40616a lstrcpynW 5583->5627 5590 406436 2 API calls 5584->5590 5612 406fb9 5584->5612 5584->5623 5586 406e5a 5587 406e64 lstrcatW 5586->5587 5588 406e6e 5586->5588 5589 406e74 5587->5589 5591 4068b2 2 API calls 5588->5591 5593 406e84 lstrcatW 5589->5593 5594 406e7a 5589->5594 5592 406fc5 5590->5592 5591->5589 5597 406883 3 API calls 5592->5597 5592->5623 5596 406e8c lstrlenW FindFirstFileW 5593->5596 5594->5593 5594->5596 5595 406404 11 API calls 5595->5623 5598 406f9c 5596->5598 5606 406eb3 5596->5606 5599 406fcf 5597->5599 5598->5584 5601 406404 11 API calls 5599->5601 5600 405e66 CharNextW 5600->5606 5602 406fda 5601->5602 5603 405f90 2 API calls 5602->5603 5605 406fe2 RemoveDirectoryW 5603->5605 5609 407025 5605->5609 5610 406fee 5605->5610 5606->5600 5607 406f79 FindNextFileW 5606->5607 5614 406404 11 API calls 5606->5614 5616 406dfc 72 API calls 5606->5616 5624 4050d2 25 API calls 5606->5624 5625 4050d2 25 API calls 5606->5625 5626 406dc9 42 API calls 5606->5626 5628 40616a lstrcpynW 5606->5628 5629 405f90 GetFileAttributesW 5606->5629 5607->5606 5608 406f91 FindClose 5607->5608 5608->5598 5611 4050d2 25 API calls 5609->5611 5610->5612 5613 406ff4 5610->5613 5611->5623 5612->5595 5615 406404 11 API calls 5613->5615 5614->5606 5617 406ffe 5615->5617 5616->5606 5618 4050d2 25 API calls 5617->5618 5620 407008 5618->5620 5622 406dc9 42 API calls 5620->5622 5622->5623 5623->5214 5623->5215 5624->5607 5625->5606 5626->5606 5627->5586 5628->5606 5630 405fad DeleteFileW 5629->5630 5631 405f9f SetFileAttributesW 5629->5631 5630->5606 5631->5630 5633 406c48 GetShortPathNameW 5632->5633 5634 406c1f 5632->5634 5636 406c61 5633->5636 5637 406dc3 5633->5637 5658 405fb0 GetFileAttributesW CreateFileW 5634->5658 5636->5637 5639 406c69 WideCharToMultiByte 5636->5639 5637->5397 5638 406c28 CloseHandle GetShortPathNameW 5638->5637 5640 406c40 5638->5640 5639->5637 5641 406c86 WideCharToMultiByte 5639->5641 5640->5633 5640->5637 5641->5637 5642 406c9e wsprintfA 5641->5642 5643 406966 18 API calls 5642->5643 5644 406cca 5643->5644 5659 405fb0 GetFileAttributesW CreateFileW 5644->5659 5646 406cd7 5646->5637 5647 406ce4 GetFileSize GlobalAlloc 5646->5647 5648 406d05 ReadFile 5647->5648 5649 406db9 CloseHandle 5647->5649 5648->5649 5650 406d1f 5648->5650 5649->5637 5650->5649 5660 405f16 lstrlenA 5650->5660 5653 406d38 lstrcpyA 5656 406d5a 5653->5656 5654 406d4c 5655 405f16 4 API calls 5654->5655 5655->5656 5657 406d91 SetFilePointer WriteFile GlobalFree 5656->5657 5657->5649 5658->5638 5659->5646 5661 405f57 lstrlenA 5660->5661 5662 405f30 lstrcmpiA 5661->5662 5664 405f5f 5661->5664 5663 405f4e CharNextA 5662->5663 5662->5664 5663->5661 5664->5653 5664->5654 5730 4023f0 5731 402403 5730->5731 5732 4024da 5730->5732 5733 40145c 18 API calls 5731->5733 5734 4050d2 25 API calls 5732->5734 5735 40240a 5733->5735 5740 4024f1 5734->5740 5736 40145c 18 API calls 5735->5736 5737 402413 5736->5737 5738 402429 LoadLibraryExW 5737->5738 5739 40241b GetModuleHandleW 5737->5739 5741 40243e 5738->5741 5742 4024ce 5738->5742 5739->5738 5739->5741 5756 4064c6 GlobalAlloc WideCharToMultiByte 5741->5756 5743 4050d2 25 API calls 5742->5743 5743->5732 5745 402449 5746 40248c 5745->5746 5747 40244f 5745->5747 5748 4050d2 25 API calls 5746->5748 5749 402457 5747->5749 5750 40246e KiUserCallbackDispatcher 5747->5750 5752 402496 5748->5752 5759 401435 5749->5759 5754 40245f 5750->5754 5753 406404 11 API calls 5752->5753 5753->5754 5754->5740 5755 4024c0 FreeLibrary 5754->5755 5755->5740 5757 4064f1 GetProcAddress 5756->5757 5758 4064fe GlobalFree 5756->5758 5757->5758 5758->5745 5760 4050d2 25 API calls 5759->5760 5761 401443 5760->5761 5761->5754 6707 4020f9 GetDC GetDeviceCaps 6708 401446 18 API calls 6707->6708 6709 402116 MulDiv 6708->6709 6710 401446 18 API calls 6709->6710 6711 40212c 6710->6711 6712 406966 18 API calls 6711->6712 6713 402165 CreateFontIndirectW 6712->6713 6714 4030dc 6713->6714 6715 4030e3 6714->6715 6717 4060b2 wsprintfW 6714->6717 6717->6715 6097 4019fd 6098 40145c 18 API calls 6097->6098 6099 401a04 6098->6099 6100 405fe0 2 API calls 6099->6100 6101 401a0b 6100->6101 6102 6f952728 6103 6f952773 6102->6103 6104 6f952738 VirtualProtect 6102->6104 6104->6103 6767 402afd 6768 40145c 18 API calls 6767->6768 6769 402b04 6768->6769 6774 405fb0 GetFileAttributesW CreateFileW 6769->6774 6771 402b10 6772 4030e3 6771->6772 6775 4060b2 wsprintfW 6771->6775 6774->6771 6775->6772 6160 4029ff 6171 401553 6160->6171 6162 402a09 6163 40145c 18 API calls 6162->6163 6164 402a12 6163->6164 6165 402a1f RegQueryValueExW 6164->6165 6170 401a13 6164->6170 6166 402a3f 6165->6166 6167 4029e4 RegCloseKey 6165->6167 6166->6167 6175 4060b2 wsprintfW 6166->6175 6167->6170 6172 401563 6171->6172 6173 40145c 18 API calls 6172->6173 6174 401589 RegOpenKeyExW 6173->6174 6174->6162 6175->6167 4915 401f80 4939 401446 4915->4939 4917 401f88 4918 401446 18 API calls 4917->4918 4919 401f93 4918->4919 4920 401fa3 4919->4920 4942 40145c 4919->4942 4922 401fb3 4920->4922 4923 40145c 18 API calls 4920->4923 4924 402006 4922->4924 4925 401fbc 4922->4925 4923->4922 4927 40145c 18 API calls 4924->4927 4926 401446 18 API calls 4925->4926 4928 401fc4 4926->4928 4929 40200d 4927->4929 4930 401446 18 API calls 4928->4930 4931 40145c 18 API calls 4929->4931 4932 401fce 4930->4932 4933 402016 FindWindowExW 4931->4933 4934 401ff6 SendMessageW 4932->4934 4935 401fd8 SendMessageTimeoutW 4932->4935 4936 402036 4933->4936 4934->4936 4935->4936 4937 4030e3 4936->4937 4947 4060b2 wsprintfW 4936->4947 4948 406966 4939->4948 4941 401455 4941->4917 4943 406966 18 API calls 4942->4943 4944 401488 4943->4944 4945 401497 4944->4945 4946 406199 5 API calls 4944->4946 4945->4920 4946->4945 4947->4937 4953 406973 4948->4953 4949 406be0 4950 406bf6 4949->4950 4982 40616a lstrcpynW 4949->4982 4950->4941 4952 406a34 GetVersion 4952->4953 4953->4949 4953->4952 4954 406ba7 lstrlenW 4953->4954 4957 406966 10 API calls 4953->4957 4958 406ab3 GetSystemDirectoryW 4953->4958 4960 406ac6 GetWindowsDirectoryW 4953->4960 4962 406b40 lstrcatW 4953->4962 4963 406afa SHGetSpecialFolderLocation 4953->4963 4964 406966 10 API calls 4953->4964 4966 406034 RegOpenKeyExW 4953->4966 4971 4060b2 wsprintfW 4953->4971 4972 40616a lstrcpynW 4953->4972 4973 406199 4953->4973 4954->4953 4957->4954 4958->4953 4960->4953 4962->4953 4963->4953 4965 406b12 SHGetPathFromIDListW CoTaskMemFree 4963->4965 4964->4953 4965->4953 4967 406068 RegQueryValueExW 4966->4967 4968 4060ad 4966->4968 4969 40608a RegCloseKey 4967->4969 4968->4953 4969->4968 4971->4953 4972->4953 4974 4061a6 4973->4974 4976 40621c 4974->4976 4977 40620f CharNextW 4974->4977 4980 4061fb CharNextW 4974->4980 4981 40620a CharNextW 4974->4981 4983 405e66 4974->4983 4975 406222 CharPrevW 4975->4976 4976->4975 4978 406242 4976->4978 4977->4974 4977->4976 4978->4953 4980->4974 4981->4977 4982->4950 4984 405e6c 4983->4984 4985 405e82 4984->4985 4986 405e73 CharNextW 4984->4986 4985->4974 4986->4984 4987 402880 4988 402884 4987->4988 4989 40145c 18 API calls 4988->4989 4990 4028a7 4989->4990 4991 40145c 18 API calls 4990->4991 4992 4028b1 4991->4992 4993 4028ba RegCreateKeyExW 4992->4993 4994 4028e8 4993->4994 4999 4029ef 4993->4999 4995 40145c 18 API calls 4994->4995 5011 402934 4994->5011 4998 4028fc lstrlenW 4995->4998 4996 401446 18 API calls 5001 402947 4996->5001 4997 4029ae RegSetValueExW 5000 4029cb 4997->5000 5012 4029c6 RegCloseKey 4997->5012 5003 402918 4998->5003 5004 40292a 4998->5004 5006 406404 11 API calls 5000->5006 5007 406404 11 API calls 5001->5007 5018 406404 lstrlenW wvsprintfW 5003->5018 5005 406404 11 API calls 5004->5005 5005->5011 5006->5012 5014 402963 5007->5014 5010 402922 5010->4997 5011->4996 5011->5014 5012->4999 5014->4997 5021 403550 5014->5021 5017 406404 11 API calls 5017->5010 5042 406248 5018->5042 5022 403560 SetFilePointer 5021->5022 5023 40357a 5021->5023 5022->5023 5056 4033d2 GetTickCount 5023->5056 5026 40297b 5036 406385 5026->5036 5027 40358b ReadFile 5027->5026 5028 4035ac 5027->5028 5028->5026 5029 4033d2 43 API calls 5028->5029 5030 4035c3 5029->5030 5030->5026 5031 40363e ReadFile 5030->5031 5035 4035d3 5030->5035 5031->5026 5033 4035ee ReadFile 5033->5026 5033->5035 5034 403607 WriteFile 5034->5026 5034->5035 5035->5026 5035->5033 5035->5034 5037 4063a8 5036->5037 5040 4063bd wsprintfW 5037->5040 5041 4063eb 5037->5041 5038 402991 5038->5017 5039 4063f4 lstrcatW 5039->5038 5040->5040 5040->5041 5041->5038 5041->5039 5043 406271 5042->5043 5044 406254 5042->5044 5045 406265 5043->5045 5047 4062e8 5043->5047 5048 40628e 5043->5048 5044->5045 5046 40625e CloseHandle 5044->5046 5045->5010 5046->5045 5047->5045 5049 4062f1 lstrcatW lstrlenW WriteFile 5047->5049 5048->5049 5050 406297 GetFileAttributesW 5048->5050 5049->5045 5055 405fb0 GetFileAttributesW CreateFileW 5050->5055 5052 4062b3 5052->5045 5053 4062c3 WriteFile 5052->5053 5054 4062dd SetFilePointer 5052->5054 5053->5054 5054->5047 5055->5052 5057 403530 5056->5057 5058 403401 5056->5058 5059 4032e7 33 API calls 5057->5059 5069 4033bb SetFilePointer 5058->5069 5065 403537 5059->5065 5061 40340c SetFilePointer 5067 403431 5061->5067 5065->5026 5065->5027 5066 4034ca WriteFile 5066->5065 5066->5067 5067->5065 5067->5066 5068 403521 SetFilePointer 5067->5068 5070 403389 ReadFile 5067->5070 5072 407473 5067->5072 5079 4032e7 5067->5079 5068->5057 5069->5061 5071 4033aa 5070->5071 5071->5067 5073 407493 5072->5073 5074 40749b 5072->5074 5073->5067 5074->5073 5075 407523 GlobalFree 5074->5075 5076 40752c GlobalAlloc 5074->5076 5077 4075a4 GlobalAlloc 5074->5077 5078 40759b GlobalFree 5074->5078 5075->5076 5076->5073 5076->5074 5077->5073 5077->5074 5078->5077 5080 403310 5079->5080 5081 4032f8 5079->5081 5082 403320 GetTickCount 5080->5082 5083 403318 5080->5083 5084 403301 DestroyWindow 5081->5084 5085 403308 5081->5085 5082->5085 5087 40332e 5082->5087 5094 406493 5083->5094 5084->5085 5085->5067 5088 403363 CreateDialogParamW ShowWindow 5087->5088 5089 403336 5087->5089 5088->5085 5089->5085 5098 40324c 5089->5098 5091 403344 wsprintfW 5101 4050d2 5091->5101 5095 4064b0 PeekMessageW 5094->5095 5096 4064c0 5095->5096 5097 4064a6 DispatchMessageW 5095->5097 5096->5085 5097->5095 5099 40325b 5098->5099 5100 40325d MulDiv 5098->5100 5099->5100 5100->5091 5102 4050eb 5101->5102 5111 403361 5101->5111 5103 405109 lstrlenW 5102->5103 5104 406966 18 API calls 5102->5104 5105 405132 5103->5105 5106 405117 lstrlenW 5103->5106 5104->5103 5108 405145 5105->5108 5109 405138 SetWindowTextW 5105->5109 5107 405129 lstrcatW 5106->5107 5106->5111 5107->5105 5110 40514b SendMessageW SendMessageW SendMessageW 5108->5110 5108->5111 5109->5108 5110->5111 5111->5085 5919 6f952a4f 5920 6f952a7f 5919->5920 5961 6f951c1b 5920->5961 5922 6f952a86 5923 6f952b9c 5922->5923 5924 6f952a97 5922->5924 5925 6f952a9e 5922->5925 6021 6f9523c1 5924->6021 6002 6f9528a3 5925->6002 5930 6f952ae4 6034 6f952445 5930->6034 5931 6f952b02 5936 6f952b44 5931->5936 5937 6f952b08 5931->5937 5932 6f952ab4 5935 6f952aba 5932->5935 5941 6f952ac5 5932->5941 5933 6f952acd 5946 6f952ac3 5933->5946 6031 6f951507 5933->6031 5935->5946 6015 6f95124c 5935->6015 5939 6f952445 11 API calls 5936->5939 5943 6f951904 3 API calls 5937->5943 5944 6f952b36 5939->5944 6025 6f9525b2 5941->6025 5948 6f952b1e 5943->5948 5960 6f952b8b 5944->5960 6058 6f95240b 5944->6058 5946->5930 5946->5931 5951 6f952445 11 API calls 5948->5951 5950 6f952acb 5950->5946 5951->5944 5953 6f952b95 GlobalFree 5953->5923 5957 6f952b77 5957->5960 6062 6f951880 wsprintfW 5957->6062 5958 6f952b70 FreeLibrary 5958->5957 5960->5923 5960->5953 6065 6f951581 GlobalAlloc 5961->6065 5963 6f951c3f 6066 6f951581 GlobalAlloc 5963->6066 5965 6f951c4a 6067 6f9515a3 5965->6067 5967 6f951e60 GlobalFree GlobalFree GlobalFree 5968 6f951e7d 5967->5968 5976 6f951ec7 5967->5976 5968->5976 5979 6f9521ad 5968->5979 5980 6f951e99 5968->5980 5969 6f951d04 GlobalAlloc 5993 6f951c52 5969->5993 5970 6f9521ed GetModuleHandleW 5972 6f95220f lstrcmpiW 5970->5972 5973 6f9521fe LoadLibraryW 5970->5973 5971 6f951d7a GlobalFree 5971->5993 5977 6f952221 lstrcmpiW 5972->5977 5978 6f95222d 5972->5978 5973->5972 5973->5976 5974 6f951d55 lstrcpyW 5975 6f951d5f lstrcpyW 5974->5975 5975->5993 5976->5922 5977->5978 5981 6f952296 5977->5981 5978->5981 5985 6f952257 lstrlenW 5978->5985 5979->5970 5979->5976 5980->5976 6074 6f951592 5980->6074 6079 6f95194f WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5981->6079 5983 6f9522a8 5983->5976 5987 6f9522b8 lstrcpyW lstrcatW 5983->5987 5991 6f952264 5985->5991 5992 6f952282 5985->5992 6080 6f95194f WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5987->6080 5988 6f95216c lstrcpyW 5988->5993 5989 6f951dbc 5989->5993 6072 6f9518df GlobalSize GlobalAlloc 5989->6072 5990 6f952019 GlobalFree 5990->5993 5991->5992 5999 6f952276 lstrcatW 5991->5999 6078 6f95194f WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5992->6078 5993->5967 5993->5969 5993->5971 5993->5974 5993->5975 5993->5988 5993->5989 5993->5990 5998 6f951592 2 API calls 5993->5998 6077 6f951581 GlobalAlloc 5993->6077 5996 6f9522f2 5996->5976 6001 6f952302 lstrcatW 5996->6001 5998->5993 5999->5992 6000 6f95228e 6000->5976 6001->5976 6007 6f9528bb 6002->6007 6003 6f951592 2 API calls 6003->6007 6004 6f9515a3 3 API calls 6004->6007 6006 6f952a18 GlobalFree 6006->6007 6008 6f952a49 6006->6008 6007->6003 6007->6004 6007->6006 6009 6f9529d0 GlobalAlloc WideCharToMultiByte 6007->6009 6010 6f95297b GlobalAlloc lstrcpynW 6007->6010 6011 6f952957 lstrlenW 6007->6011 6083 6f951628 6007->6083 6008->5932 6008->5933 6008->5946 6009->6007 6010->6007 6012 6f9529b0 GlobalAlloc CLSIDFromString GlobalFree 6010->6012 6011->6006 6014 6f952966 6011->6014 6012->6006 6014->6006 6088 6f952554 6014->6088 6016 6f95125e 6015->6016 6017 6f951303 LoadImageW 6016->6017 6018 6f951321 6017->6018 6019 6f951412 GetLastError 6018->6019 6020 6f95141d 6018->6020 6019->6020 6020->5946 6022 6f9523d1 6021->6022 6024 6f952407 6021->6024 6023 6f9523e3 GlobalAlloc 6022->6023 6022->6024 6023->6022 6024->5925 6026 6f9525cd 6025->6026 6027 6f95260c GlobalAlloc 6026->6027 6028 6f95261f 6026->6028 6030 6f95262f 6027->6030 6029 6f952625 GlobalSize 6028->6029 6028->6030 6029->6030 6030->5950 6032 6f951512 6031->6032 6033 6f951552 GlobalFree 6032->6033 6037 6f95245e 6034->6037 6036 6f9524f3 lstrcpyW 6036->6037 6037->6036 6038 6f9524e2 wsprintfW 6037->6038 6039 6f952515 GlobalFree 6037->6039 6040 6f9524bf MultiByteToWideChar 6037->6040 6041 6f95253e GlobalFree 6037->6041 6042 6f9524a1 lstrcpynW 6037->6042 6044 6f952490 StringFromGUID2 6037->6044 6045 6f9515e0 2 API calls 6037->6045 6091 6f951581 GlobalAlloc 6037->6091 6092 6f95164f 6037->6092 6038->6037 6039->6037 6040->6037 6041->6037 6043 6f95254f 6041->6043 6042->6037 6047 6f951904 6043->6047 6044->6037 6045->6037 6096 6f951581 GlobalAlloc 6047->6096 6049 6f95190a 6050 6f951917 lstrcpyW 6049->6050 6052 6f951931 6049->6052 6053 6f95194b 6050->6053 6052->6053 6054 6f951936 wsprintfW 6052->6054 6055 6f9515e0 6053->6055 6054->6053 6056 6f951623 GlobalFree 6055->6056 6057 6f9515e9 GlobalAlloc lstrcpynW 6055->6057 6056->5944 6057->6056 6059 6f95241a 6058->6059 6061 6f952442 6058->6061 6060 6f952432 GlobalFree 6059->6060 6059->6061 6060->6059 6061->5957 6061->5958 6063 6f9515e0 2 API calls 6062->6063 6064 6f9518aa 6063->6064 6064->5960 6065->5963 6066->5965 6068 6f9515dd 6067->6068 6069 6f9515ac 6067->6069 6068->5993 6069->6068 6081 6f951581 GlobalAlloc 6069->6081 6071 6f9515ba lstrcpyW GlobalFree 6071->5993 6073 6f9518fd 6072->6073 6073->5989 6082 6f951581 GlobalAlloc 6074->6082 6076 6f95159b lstrcpyW 6076->5976 6077->5993 6078->6000 6079->5983 6080->5996 6081->6071 6082->6076 6084 6f95162f 6083->6084 6085 6f95164a 6083->6085 6086 6f951592 2 API calls 6084->6086 6085->6085 6087 6f951648 6086->6087 6087->6007 6089 6f952562 VirtualAlloc 6088->6089 6090 6f9525aa 6088->6090 6089->6090 6090->6014 6091->6037 6093 6f951658 6092->6093 6094 6f95167a 6092->6094 6093->6094 6095 6f95165e lstrcpyW 6093->6095 6094->6037 6095->6094 6096->6049 6176 40209f GetDlgItem GetClientRect 6177 40145c 18 API calls 6176->6177 6178 4020cf LoadImageW SendMessageW 6177->6178 6179 4020ed DeleteObject 6178->6179 6180 4030e3 6178->6180 6179->6180 5665 4030a9 SendMessageW 5666 4030c2 InvalidateRect 5665->5666 5667 4030e3 5665->5667 5666->5667 5762 401cb2 5763 40145c 18 API calls 5762->5763 5764 401c54 5763->5764 5765 401c64 5764->5765 5766 406404 11 API calls 5764->5766 5767 401c59 5766->5767 5768 406dfc 81 API calls 5767->5768 5768->5765 5880 401eb9 5881 401f24 5880->5881 5882 401ec6 5880->5882 5883 401f53 GlobalAlloc 5881->5883 5884 401f28 5881->5884 5885 401ed5 5882->5885 5891 401ef7 5882->5891 5886 406966 18 API calls 5883->5886 5887 401f36 5884->5887 5890 406404 11 API calls 5884->5890 5888 406404 11 API calls 5885->5888 5889 401f46 5886->5889 5904 40616a lstrcpynW 5887->5904 5899 401ee2 5888->5899 5893 402387 GlobalFree 5889->5893 5898 402708 5889->5898 5890->5887 5902 40616a lstrcpynW 5891->5902 5893->5898 5895 401f06 5903 40616a lstrcpynW 5895->5903 5896 406966 18 API calls 5896->5899 5899->5896 5899->5898 5900 401f15 5905 40616a lstrcpynW 5900->5905 5902->5895 5903->5900 5904->5889 5905->5898

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 249 4039e3-403a79 #17 SetErrorMode OleInitialize call 40645d SHGetFileInfoW call 40616a GetCommandLineW call 40616a GetModuleHandleW 256 403a83-403a97 call 405e66 CharNextW 249->256 257 403a7b-403a7e 249->257 260 403b2a-403b30 256->260 257->256 261 403b36 260->261 262 403a9c-403aa2 260->262 265 403b55-403b6d GetTempPathW call 403914 261->265 263 403aa4-403aaa 262->263 264 403aac-403ab0 262->264 263->263 263->264 266 403ab2-403ab7 264->266 267 403ab8-403abc 264->267 272 403b93-403bad DeleteFileW call 403679 265->272 273 403b6f-403b8d GetWindowsDirectoryW lstrcatW call 403914 265->273 266->267 270 403b18-403b25 call 405e66 267->270 271 403abe-403ac5 267->271 270->260 285 403b27 270->285 275 403ac7-403ace 271->275 276 403ada-403aec call 403948 271->276 287 403c2c-403c3b call 4039a1 OleUninitialize 272->287 288 403baf-403bb5 272->288 273->272 273->287 280 403ad0-403ad3 275->280 281 403ad5 275->281 289 403b01-403b16 call 403948 276->289 290 403aee-403af5 276->290 280->276 280->281 281->276 285->260 301 403c41-403c51 call 405e00 ExitProcess 287->301 302 403d2e-403d34 287->302 292 403c15-403c1c call 405a8c 288->292 293 403bb7-403bc0 call 405e66 288->293 289->270 303 403b38-403b50 call 407ecf call 40616a 289->303 295 403af7-403afa 290->295 296 403afc 290->296 305 403c21-403c27 call 406248 292->305 308 403bd9-403bdb 293->308 295->289 295->296 296->289 310 403db1-403db9 302->310 311 403d36-403d53 call 40645d * 3 302->311 303->265 305->287 312 403bc2-403bd4 call 403948 308->312 313 403bdd-403be7 308->313 314 403dbb 310->314 315 403dbf 310->315 340 403d55-403d57 311->340 341 403d9d-403da8 ExitWindowsEx 311->341 312->313 332 403bd6 312->332 319 403c57-403c71 lstrcatW lstrcmpiW 313->319 320 403be9-403bf9 call 4068df 313->320 314->315 319->287 326 403c73-403c89 CreateDirectoryW SetCurrentDirectoryW 319->326 320->287 334 403bfb-403c11 call 40616a * 2 320->334 330 403c96-403cb6 call 40616a * 2 326->330 331 403c8b-403c91 call 40616a 326->331 350 403cbb-403cd7 call 406966 DeleteFileW 330->350 331->330 332->308 334->292 340->341 344 403d59-403d5b 340->344 341->310 347 403daa-403dac call 40141d 341->347 344->341 348 403d5d-403d6f GetCurrentProcess 344->348 347->310 348->341 355 403d71-403d93 348->355 356 403d18-403d20 350->356 357 403cd9-403ce9 CopyFileW 350->357 355->341 356->350 359 403d22-403d29 call 406dc9 356->359 357->356 358 403ceb-403d0b call 406dc9 call 406966 call 405d9f 357->358 358->356 369 403d0d-403d14 CloseHandle 358->369 359->287 369->356
                                        APIs
                                        • #17.COMCTL32 ref: 00403A02
                                        • SetErrorMode.KERNEL32(00008001), ref: 00403A0D
                                        • OleInitialize.OLE32(00000000), ref: 00403A14
                                          • Part of subcall function 0040645D: GetModuleHandleA.KERNEL32(?,?,00000020,00403A26,00000008), ref: 0040646B
                                          • Part of subcall function 0040645D: LoadLibraryA.KERNEL32(?,?,?,00000020,00403A26,00000008), ref: 00406476
                                          • Part of subcall function 0040645D: GetProcAddress.KERNEL32(00000000), ref: 00406488
                                        • SHGetFileInfoW.SHELL32(0040931C,00000000,?,000002B4,00000000), ref: 00403A3C
                                          • Part of subcall function 0040616A: lstrcpynW.KERNEL32(?,?,00002004,00403A51,0046ADC0,NSIS Error), ref: 00406177
                                        • GetCommandLineW.KERNEL32(0046ADC0,NSIS Error), ref: 00403A51
                                        • GetModuleHandleW.KERNEL32(00000000,004C30A0,00000000), ref: 00403A64
                                        • CharNextW.USER32(00000000,004C30A0,00000020), ref: 00403A8B
                                        • GetTempPathW.KERNEL32(00002004,004D70C8,00000000,00000020), ref: 00403B60
                                        • GetWindowsDirectoryW.KERNEL32(004D70C8,00001FFF), ref: 00403B75
                                        • lstrcatW.KERNEL32(004D70C8,\Temp), ref: 00403B81
                                        • DeleteFileW.KERNEL32(004D30C0), ref: 00403B98
                                        • OleUninitialize.OLE32(?), ref: 00403C31
                                        • ExitProcess.KERNEL32 ref: 00403C51
                                        • lstrcatW.KERNEL32(004D70C8,~nsu.tmp), ref: 00403C5D
                                        • lstrcmpiW.KERNEL32(004D70C8,004CF0B8,004D70C8,~nsu.tmp), ref: 00403C69
                                        • CreateDirectoryW.KERNEL32(004D70C8,00000000), ref: 00403C75
                                        • SetCurrentDirectoryW.KERNEL32(004D70C8), ref: 00403C7C
                                        • DeleteFileW.KERNEL32(004331F8,004331F8,?,00477008,004092BC,00473000,?), ref: 00403CCD
                                        • CopyFileW.KERNEL32(004DF0D8,004331F8,00000001), ref: 00403CE1
                                        • CloseHandle.KERNEL32(00000000,004331F8,004331F8,?,004331F8,00000000), ref: 00403D0E
                                        • GetCurrentProcess.KERNEL32(00000028,00000005,00000005,00000004,00000003), ref: 00403D64
                                        • ExitWindowsEx.USER32(00000002,00000000), ref: 00403DA0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: File$DirectoryHandle$CurrentDeleteExitModuleProcessWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                        • String ID: /D=$ _?=$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp
                                        • API String ID: 2435955865-730752810
                                        • Opcode ID: e95be0038be380c7e2517e2a2a9c89e6addf01deae001849d6bc04820bf084a3
                                        • Instruction ID: 4e18f5f1af3a7f331e2e544c63ade91685479340742a394c6c2d6f2448785750
                                        • Opcode Fuzzy Hash: e95be0038be380c7e2517e2a2a9c89e6addf01deae001849d6bc04820bf084a3
                                        • Instruction Fuzzy Hash: FEA1B571504301BBD6207F629D0AE1B7EACAF4075AF11483FF585B61D2DBBC8A448B6E

                                        Control-flow Graph

                                        APIs
                                        • GetProcessHeap.KERNEL32(00000008,?), ref: 6CEB18A4
                                        • HeapAlloc.KERNEL32(00000000), ref: 6CEB18A7
                                        • GetProcessHeap.KERNEL32(00000000,00000000,error,?,00000000,?,?,?,?,00000000,00000000), ref: 6CEB18E9
                                        • RtlFreeHeap.NTDLL(00000000,?,00000000,?,?,?,?,00000000,00000000), ref: 6CEB1B4E
                                          • Part of subcall function 6CEB1E83: GlobalAlloc.KERNEL32(00000040,?,?,6CEB1061,error,?,00000104,?,00000400), ref: 6CEB1E99
                                          • Part of subcall function 6CEB1E83: lstrcpynW.KERNEL32(00000004,00000104,?,6CEB1061,error,?,00000104,?,00000400), ref: 6CEB1EAF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2963579894.000000006CEB1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CEB0000, based on PE: true
                                        • Associated: 00000001.00000002.2963521789.000000006CEB0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2963612925.000000006CEB3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2963671204.000000006CEB6000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6ceb0000_setup.jbxd
                                        Similarity
                                        • API ID: Heap$AllocProcess$FreeGloballstrcpyn
                                        • String ID: BUTTON$COMBOBOX$EDIT$LINK$LISTBOX$NSIS: nsControl pointer property$RICHEDIT_CLASS$RichEdit$STATIC$error
                                        • API String ID: 1913068523-3375361224
                                        • Opcode ID: 2d3ee0755a4dd01b754fdb35576ebea4d81efbd8f60d6c597b47533cd0d585b1
                                        • Instruction ID: a6381e170e47fcd5257cd04ad9e4c6d86fa39e5830feadf96f4f2dda563d6043
                                        • Opcode Fuzzy Hash: 2d3ee0755a4dd01b754fdb35576ebea4d81efbd8f60d6c597b47533cd0d585b1
                                        • Instruction Fuzzy Hash: 008172B3A04208EBDB219B95CF45FBABBBCEF09314F114526F909B7640DB34E9058B95

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 736 406dfc-406e16 call 4068df 739 406e18-406e2a DeleteFileW 736->739 740 406e2f-406e3a 736->740 741 40702e-407030 739->741 742 406e3c-406e3e 740->742 743 406e4e-406e62 call 40616a 740->743 744 406e44-406e48 742->744 745 406fac-406fb1 742->745 752 406e64-406e6c lstrcatW 743->752 753 406e6e-406e6f call 4068b2 743->753 744->743 744->745 747 406fb3-406fb7 745->747 748 40702c-40702d 745->748 750 406fc0-406fc7 call 406436 747->750 751 406fb9-406fbe 747->751 748->741 750->748 762 406fc9-406fec call 406883 call 406404 call 405f90 RemoveDirectoryW 750->762 754 407016-407023 call 406404 751->754 755 406e74-406e78 752->755 753->755 754->748 759 406e84-406e8a lstrcatW 755->759 760 406e7a-406e82 755->760 763 406e8c-406ead lstrlenW FindFirstFileW 759->763 760->759 760->763 788 407025-407027 call 4050d2 762->788 789 406fee-406ff2 762->789 766 406eb3-406ec8 call 405e66 763->766 767 406f9c 763->767 775 406ed3-406ed7 766->775 776 406eca-406ece 766->776 770 406f9e-406fa1 767->770 770->745 773 406fa3-406fa8 770->773 773->745 779 406ef5-406f05 call 40616a 775->779 780 406ed9-406ee0 775->780 776->775 778 406ed0 776->778 778->775 790 406f07-406f0f 779->790 791 406f1c-406f39 call 406404 call 405f90 DeleteFileW 779->791 783 406ee6-406ee9 780->783 784 406f79-406f8b FindNextFileW 780->784 783->779 785 406eeb-406eef 783->785 784->766 787 406f91-406f9a FindClose 784->787 785->779 785->784 787->770 788->748 793 407011 789->793 794 406ff4-40700f call 406404 call 4050d2 call 406dc9 789->794 790->784 795 406f11-406f1a call 406dfc 790->795 807 406f72-406f74 call 4050d2 791->807 808 406f3b-406f3f 791->808 793->754 794->748 795->784 807->784 811 406f41-406f5c call 406404 call 4050d2 call 406dc9 808->811 812 406f5e-406f70 call 406404 808->812 811->784 812->784
                                        APIs
                                        • DeleteFileW.KERNEL32(?,?,004C30A0), ref: 00406E19
                                        • lstrcatW.KERNEL32(0045C928,\*.*,0045C928,?,74DF2EE0,004D70C8,?,004C30A0), ref: 00406E6A
                                        • lstrcatW.KERNEL32(?,00408838,?,0045C928,?,74DF2EE0,004D70C8,?,004C30A0), ref: 00406E8A
                                        • lstrlenW.KERNEL32(?), ref: 00406E8D
                                        • FindFirstFileW.KERNEL32(0045C928,?), ref: 00406EA1
                                        • FindNextFileW.KERNEL32(?,00000010,000000F2,?), ref: 00406F83
                                        • FindClose.KERNEL32(?), ref: 00406F94
                                        Strings
                                        • RMDir: RemoveDirectory failed("%s"), xrefs: 00407011
                                        • RMDir: RemoveDirectory invalid input("%s"), xrefs: 00406FB9
                                        • \*.*, xrefs: 00406E64
                                        • Delete: DeleteFile on Reboot("%s"), xrefs: 00406F41
                                        • Delete: DeleteFile failed("%s"), xrefs: 00406F5E
                                        • RMDir: RemoveDirectory("%s"), xrefs: 00406FD0
                                        • RMDir: RemoveDirectory on Reboot("%s"), xrefs: 00406FF4
                                        • Delete: DeleteFile("%s"), xrefs: 00406F1D
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                        • String ID: Delete: DeleteFile failed("%s")$Delete: DeleteFile on Reboot("%s")$Delete: DeleteFile("%s")$RMDir: RemoveDirectory failed("%s")$RMDir: RemoveDirectory invalid input("%s")$RMDir: RemoveDirectory on Reboot("%s")$RMDir: RemoveDirectory("%s")$\*.*
                                        • API String ID: 2035342205-3294556389
                                        • Opcode ID: e25bf17fa5cd8a8754a82c370ef333a2a3ae489cf446f822b8942f902ad3cb12
                                        • Instruction ID: 065701ca96279c828ad8c0a907823cf62f9bd73eb8e14a3183d43afd793dd255
                                        • Opcode Fuzzy Hash: e25bf17fa5cd8a8754a82c370ef333a2a3ae489cf446f822b8942f902ad3cb12
                                        • Instruction Fuzzy Hash: 8951F332404306AADB206B71DC45AAF37B8DF41724B21813FF902721C2DB7C5DA2DA6E

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 979 406966-406971 980 406973-406982 979->980 981 406984-406998 979->981 980->981 982 4069b0-4069b6 981->982 983 40699a-4069a7 981->983 985 406be2-406beb 982->985 986 4069bc-4069bd 982->986 983->982 984 4069a9-4069ac 983->984 984->982 987 406bf6-406bf7 985->987 988 406bed-406bf1 call 40616a 985->988 989 4069be-4069cb 986->989 988->987 991 406be0-406be1 989->991 992 4069d1-4069e1 989->992 991->985 993 4069e7-4069ea 992->993 994 406bbb 992->994 995 4069f0-406a2e 993->995 996 406bbe 993->996 994->996 997 406a34-406a3f GetVersion 995->997 998 406b4e-406b57 995->998 999 406bc0-406bcc 996->999 1000 406bce-406bd1 996->1000 1003 406a41-406a49 997->1003 1004 406a5d 997->1004 1001 406b90-406b99 998->1001 1002 406b59-406b5c 998->1002 1005 406bd4-406bda 999->1005 1000->1005 1010 406ba7-406bb9 lstrlenW 1001->1010 1011 406b9b-406ba2 call 406966 1001->1011 1006 406b6c-406b7b call 40616a 1002->1006 1007 406b5e-406b6a call 4060b2 1002->1007 1003->1004 1008 406a4b-406a4f 1003->1008 1009 406a64-406a6b 1004->1009 1005->989 1005->991 1020 406b80-406b86 1006->1020 1007->1020 1008->1004 1013 406a51-406a55 1008->1013 1015 406a70-406a72 1009->1015 1016 406a6d-406a6f 1009->1016 1010->1005 1011->1010 1013->1004 1019 406a57-406a5b 1013->1019 1021 406a74-406a91 call 406034 1015->1021 1022 406aae-406ab1 1015->1022 1016->1015 1019->1009 1020->1010 1025 406b88-406b8e call 406199 1020->1025 1031 406a96-406a9a 1021->1031 1023 406ac1-406ac4 1022->1023 1024 406ab3-406abf GetSystemDirectoryW 1022->1024 1028 406b30-406b32 1023->1028 1029 406ac6-406ad4 GetWindowsDirectoryW 1023->1029 1027 406b34-406b38 1024->1027 1025->1010 1027->1025 1035 406b3a-406b3e 1027->1035 1028->1027 1033 406ad6-406ae0 1028->1033 1029->1028 1034 406aa0-406aa9 call 406966 1031->1034 1031->1035 1037 406ae2-406ae5 1033->1037 1038 406afa-406b10 SHGetSpecialFolderLocation 1033->1038 1034->1027 1035->1025 1036 406b40-406b4c lstrcatW 1035->1036 1036->1025 1037->1038 1041 406ae7-406af8 1037->1041 1042 406b12-406b29 SHGetPathFromIDListW CoTaskMemFree 1038->1042 1043 406b2b-406b2d 1038->1043 1041->1027 1041->1038 1042->1027 1042->1043 1043->1028
                                        APIs
                                        • GetVersion.KERNEL32(0043B238,?,00000000,00405109,0043B238,00000000,00000000,00000000,00000000), ref: 00406A37
                                        • GetSystemDirectoryW.KERNEL32(Show,00002004), ref: 00406AB9
                                          • Part of subcall function 0040616A: lstrcpynW.KERNEL32(?,?,00002004,00403A51,0046ADC0,NSIS Error), ref: 00406177
                                        • GetWindowsDirectoryW.KERNEL32(Show,00002004), ref: 00406ACC
                                        • lstrcatW.KERNEL32(Show,\Microsoft\Internet Explorer\Quick Launch), ref: 00406B46
                                        • lstrlenW.KERNEL32(Show,0043B238,?,00000000,00405109,0043B238,00000000,00000000,00000000,00000000), ref: 00406BA8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: Directory$SystemVersionWindowslstrcatlstrcpynlstrlen
                                        • String ID: Show$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                        • API String ID: 3581403547-2066119300
                                        • Opcode ID: 349b504904d19e27fd4f4c91fd092aa9198956906fd02c1d1d814161a489649c
                                        • Instruction ID: e48cded74d6947d59e8abd59105747811bc68a9d38b3ce97ffc5bdd505d2dbd5
                                        • Opcode Fuzzy Hash: 349b504904d19e27fd4f4c91fd092aa9198956906fd02c1d1d814161a489649c
                                        • Instruction Fuzzy Hash: 4171E5B1A00121ABDF20AF68CD44A7A33B5AF55314F12803BE947F62D0E77C99A1CB4D
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f08b0311c7b190f70b7f6b66510179fe2aae7c875dcf9b09b9f207b7722ad9ec
                                        • Instruction ID: 6d9a96506c23ada9e0f5992c1433d3039d4b40deeb0cc045ecd6cd6b38dbc2b7
                                        • Opcode Fuzzy Hash: f08b0311c7b190f70b7f6b66510179fe2aae7c875dcf9b09b9f207b7722ad9ec
                                        • Instruction Fuzzy Hash: DCF15971908249DBDF18CF28C8946E93BB1FF44345F14852AFD5A9B281D378E986CF86
                                        APIs
                                        • GetModuleHandleA.KERNEL32(?,?,00000020,00403A26,00000008), ref: 0040646B
                                        • LoadLibraryA.KERNEL32(?,?,?,00000020,00403A26,00000008), ref: 00406476
                                        • GetProcAddress.KERNEL32(00000000), ref: 00406488
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: AddressHandleLibraryLoadModuleProc
                                        • String ID:
                                        • API String ID: 310444273-0
                                        • Opcode ID: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                        • Instruction ID: 834e98854e3cd4bdbc26171f75450eebe3d36459cd124193f5d9cd80cd5e6d51
                                        • Opcode Fuzzy Hash: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                        • Instruction Fuzzy Hash: 97D012312001059BC6001B65AF08A5F776DEF95611707C03EF546F3131EB34D415A6AD
                                        APIs
                                        • FindFirstFileW.KERNEL32(004572D0,0045BED8,004572D0,0040692F,004572D0), ref: 00406441
                                        • FindClose.KERNEL32(00000000), ref: 0040644D
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: Find$CloseFileFirst
                                        • String ID:
                                        • API String ID: 2295610775-0
                                        • Opcode ID: cabe7cd0e8d0c42d8893e3e2e2c087770211128cd55027c92275192456ad2468
                                        • Instruction ID: 304157284c36da419ef03f6d9f2c23ccabbefed464cde17f37dc78c4e58848de
                                        • Opcode Fuzzy Hash: cabe7cd0e8d0c42d8893e3e2e2c087770211128cd55027c92275192456ad2468
                                        • Instruction Fuzzy Hash: 37D01271504120AFC34027786E0C89B7A599F16331725CA3AB5EAF21E1C7748C3287EC

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 4055d9-4055eb 1 4055f1-4055f7 0->1 2 40572d-40573c 0->2 1->2 3 4055fd-405606 1->3 4 40578b-4057a0 2->4 5 40573e-405786 GetDlgItem * 2 call 403e9f SetClassLongW call 40141d 2->5 8 405608-405615 SetWindowPos 3->8 9 40561b-40561e 3->9 6 4057e0-4057e5 call 403f0f 4->6 7 4057a2-4057a5 4->7 5->4 19 4057ea-405805 6->19 11 4057a7-4057b2 call 40139d 7->11 12 4057d8-4057da 7->12 8->9 14 405620-405632 ShowWindow 9->14 15 405638-40563e 9->15 11->12 33 4057b4-4057d3 SendMessageW 11->33 12->6 18 405a80 12->18 14->15 20 405640-405655 DestroyWindow 15->20 21 40565a-40565d 15->21 30 405a82-405a89 18->30 28 405807-405809 call 40141d 19->28 29 40580e-405814 19->29 23 405a5d-405a63 20->23 25 405670-405676 21->25 26 40565f-40566b SetWindowLongW 21->26 23->18 34 405a65-405a6b 23->34 31 405719-405728 call 403f2a 25->31 32 40567c-40568d GetDlgItem 25->32 26->30 28->29 36 40581a-405825 29->36 37 405a3e-405a57 DestroyWindow EndDialog 29->37 31->30 38 4056ac-4056af 32->38 39 40568f-4056a6 SendMessageW IsWindowEnabled 32->39 33->30 34->18 41 405a6d-405a76 ShowWindow 34->41 36->37 42 40582b-405878 call 406966 call 403e9f * 3 GetDlgItem 36->42 37->23 44 4056b1-4056b2 38->44 45 4056b4-4056b7 38->45 39->18 39->38 41->18 70 405883-4058bf ShowWindow KiUserCallbackDispatcher call 403ee5 EnableWindow 42->70 71 40587a-405880 42->71 48 4056e2-4056e7 call 403e78 44->48 49 4056c5-4056ca 45->49 50 4056b9-4056bf 45->50 48->31 53 405700-405713 SendMessageW 49->53 55 4056cc-4056d2 49->55 50->53 54 4056c1-4056c3 50->54 53->31 54->48 58 4056d4-4056da call 40141d 55->58 59 4056e9-4056f2 call 40141d 55->59 68 4056e0 58->68 59->31 67 4056f4-4056fe 59->67 67->68 68->48 74 4058c1-4058c2 70->74 75 4058c4 70->75 71->70 76 4058c6-4058f4 GetSystemMenu EnableMenuItem SendMessageW 74->76 75->76 77 4058f6-405907 SendMessageW 76->77 78 405909 76->78 79 40590f-405946 call 403ef8 call 40616a lstrlenW call 406966 SetWindowTextW call 40139d 77->79 78->79 87 40594b-40594d 79->87 87->19 88 405953-405955 87->88 88->19 89 40595b-40595f 88->89 90 405961-405967 89->90 91 40597e-405992 DestroyWindow 89->91 90->18 93 40596d-405973 90->93 91->23 92 405998-4059c5 CreateDialogParamW 91->92 92->23 94 4059cb-405a22 call 403e9f GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 40139d 92->94 93->19 95 405979 93->95 94->18 100 405a24-405a3c ShowWindow call 403f0f 94->100 95->18 100->23
                                        APIs
                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00405615
                                        • ShowWindow.USER32(?), ref: 00405632
                                        • DestroyWindow.USER32 ref: 00405646
                                        • SetWindowLongW.USER32(?,00000000,00000000), ref: 00405662
                                        • GetDlgItem.USER32(?,?), ref: 00405683
                                        • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00405697
                                        • IsWindowEnabled.USER32(00000000), ref: 0040569E
                                        • GetDlgItem.USER32(?,00000001), ref: 0040574D
                                        • GetDlgItem.USER32(?,00000002), ref: 00405757
                                        • SetClassLongW.USER32(?,000000F2,?), ref: 00405771
                                        • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004057C2
                                        • GetDlgItem.USER32(?,00000003), ref: 00405868
                                        • ShowWindow.USER32(00000000,?), ref: 0040588A
                                        • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040589C
                                        • EnableWindow.USER32(?,?), ref: 004058B7
                                        • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004058CD
                                        • EnableMenuItem.USER32(00000000), ref: 004058D4
                                        • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004058EC
                                        • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004058FF
                                        • lstrlenW.KERNEL32(00447250,?,00447250,0046ADC0), ref: 00405928
                                        • SetWindowTextW.USER32(?,00447250), ref: 0040593C
                                        • ShowWindow.USER32(?,0000000A), ref: 00405A70
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                        • String ID: PrD
                                        • API String ID: 3282139019-4282739039
                                        • Opcode ID: a563f3c2c599501beef882c1b7706b334ab1ef7dde5fcc94fc7aa6df061418cd
                                        • Instruction ID: e32f65a829e85eadb9633a2d0af490baa2bc81b7fdf0bb2ead4b0685e6b50708
                                        • Opcode Fuzzy Hash: a563f3c2c599501beef882c1b7706b334ab1ef7dde5fcc94fc7aa6df061418cd
                                        • Instruction Fuzzy Hash: 87C1AF71500B04EBDB216F61EE89E2B3BA9FB45346F00053EF545B21F0DA799891AF1E

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 103 4015a0-4015f4 104 4030e3-4030ec 103->104 105 4015fa 103->105 134 4030ee-4030f2 104->134 106 401601-401611 call 406404 105->106 107 401742-40174f 105->107 108 401962-40197d call 40145c GetFullPathNameW 105->108 109 4019ca-4019e6 call 40145c SearchPathW 105->109 110 40176e-401794 call 40145c call 406404 SetFileAttributesW 105->110 111 401650-40166d call 40137e call 406404 call 40139d 105->111 112 4017b1-4017d8 call 40145c call 406404 call 405eb9 105->112 113 401672-401686 call 40145c call 406404 105->113 114 401693-4016ac call 401446 call 406404 105->114 115 401715-401731 105->115 116 401616-40162d call 40145c call 406404 call 4050d2 105->116 117 4016d6-4016db 105->117 118 401736-4030de 105->118 119 401897-4018a7 call 40145c call 406436 105->119 120 4018db-401910 call 40145c * 3 call 406404 MoveFileW 105->120 121 40163c-401645 105->121 122 4016bd-4016d1 call 406404 SetForegroundWindow 105->122 106->134 138 401751-401755 ShowWindow 107->138 139 401758-40175f 107->139 160 4019a3-4019a8 108->160 161 40197f-401984 108->161 109->104 166 4019ec-4019f8 109->166 110->104 193 40179a-4017a6 call 406404 110->193 111->134 206 401864-40186c 112->206 207 4017de-4017fc call 405e66 CreateDirectoryW 112->207 182 401689-40168e call 4050d2 113->182 187 4016b1-4016b8 Sleep 114->187 188 4016ae-4016b0 114->188 115->134 135 401632-401637 116->135 132 401702-401710 117->132 133 4016dd-4016fd call 401446 117->133 118->104 168 4030de call 4060b2 118->168 183 4018c2-4018d6 call 406404 119->183 184 4018a9-4018bd call 406404 119->184 218 401912-401919 120->218 219 40191e-401921 120->219 121->135 136 401647-40164e PostQuitMessage 121->136 122->104 132->104 133->104 135->134 136->135 138->139 139->104 155 401765-401769 ShowWindow 139->155 155->104 174 4019af-4019b2 160->174 173 401986-401989 161->173 161->174 166->104 168->104 173->174 185 40198b-401993 call 406436 173->185 174->104 189 4019b8-4019c5 GetShortPathNameW 174->189 182->104 183->134 184->134 185->160 210 401995-4019a1 call 40616a 185->210 187->104 188->187 189->104 209 4017ab-4017ac 193->209 214 401890-401892 206->214 215 40186e-40188b call 4050d2 call 40616a SetCurrentDirectoryW 206->215 222 401846-40184e call 406404 207->222 223 4017fe-401809 GetLastError 207->223 209->104 210->174 214->182 215->104 218->182 224 401923-40192b call 406436 219->224 225 40194a-401950 219->225 236 401853-401854 222->236 227 401827-401832 GetFileAttributesW 223->227 228 40180b-401825 GetLastError call 406404 223->228 224->225 242 40192d-401948 call 406dc9 call 4050d2 224->242 232 401957-40195d call 406404 225->232 234 401834-401844 call 406404 227->234 235 401855-40185e 227->235 228->235 232->209 234->236 235->206 235->207 236->235 242->232
                                        APIs
                                        • PostQuitMessage.USER32(00000000), ref: 00401648
                                        • Sleep.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 004016B2
                                        • SetForegroundWindow.USER32(?), ref: 004016CB
                                        • ShowWindow.USER32(?), ref: 00401753
                                        • ShowWindow.USER32(?), ref: 00401767
                                        • SetFileAttributesW.KERNEL32(00000000,00000000,?,000000F0), ref: 0040178C
                                        • CreateDirectoryW.KERNEL32(?,00000000,00000000,0000005C,?,?,?,000000F0,?,000000F0), ref: 004017F4
                                        • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 004017FE
                                        • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 0040180B
                                        • GetFileAttributesW.KERNEL32(?,?,?,000000F0,?,000000F0), ref: 0040182A
                                        • SetCurrentDirectoryW.KERNEL32(?,004CB0B0,?,000000E6,0040F0D0,?,?,?,000000F0,?,000000F0), ref: 00401885
                                        • MoveFileW.KERNEL32(00000000,?), ref: 00401908
                                        • GetFullPathNameW.KERNEL32(00000000,00002004,00000000,?,00000000,000000E3,0040F0D0,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 00401975
                                        • GetShortPathNameW.KERNEL32(00000000,00000000,00002004), ref: 004019BF
                                        • SearchPathW.KERNEL32(00000000,00000000,00000000,00002004,00000000,?,000000FF,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 004019DE
                                        Strings
                                        • Jump: %d, xrefs: 00401602
                                        • Rename on reboot: %s, xrefs: 00401943
                                        • CreateDirectory: can't create "%s" - a file already exists, xrefs: 00401837
                                        • CreateDirectory: can't create "%s" (err=%d), xrefs: 00401815
                                        • SetFileAttributes: "%s":%08X, xrefs: 0040177B
                                        • BringToFront, xrefs: 004016BD
                                        • Aborting: "%s", xrefs: 0040161D
                                        • Sleep(%d), xrefs: 0040169D
                                        • SetFileAttributes failed., xrefs: 004017A1
                                        • detailprint: %s, xrefs: 00401679
                                        • Call: %d, xrefs: 0040165A
                                        • CreateDirectory: "%s" created, xrefs: 00401849
                                        • IfFileExists: file "%s" does not exist, jumping %d, xrefs: 004018C6
                                        • IfFileExists: file "%s" exists, jumping %d, xrefs: 004018AD
                                        • Rename: %s, xrefs: 004018F8
                                        • CreateDirectory: "%s" (%d), xrefs: 004017BF
                                        • Rename failed: %s, xrefs: 0040194B
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: FilePathWindow$AttributesDirectoryErrorLastNameShow$CreateCurrentForegroundFullMessageMovePostQuitSearchShortSleep
                                        • String ID: Aborting: "%s"$BringToFront$Call: %d$CreateDirectory: "%s" (%d)$CreateDirectory: "%s" created$CreateDirectory: can't create "%s" (err=%d)$CreateDirectory: can't create "%s" - a file already exists$IfFileExists: file "%s" does not exist, jumping %d$IfFileExists: file "%s" exists, jumping %d$Jump: %d$Rename failed: %s$Rename on reboot: %s$Rename: %s$SetFileAttributes failed.$SetFileAttributes: "%s":%08X$Sleep(%d)$detailprint: %s
                                        • API String ID: 2872004960-3619442763
                                        • Opcode ID: 611249c6fe28ac30e173d2c2d54e1f8656526d7f35572165d03d3fddfa6d8981
                                        • Instruction ID: 6970006c80b2daef1e7dd2d9cca72418e9fe59065d0b28f5efb0bef5c027f317
                                        • Opcode Fuzzy Hash: 611249c6fe28ac30e173d2c2d54e1f8656526d7f35572165d03d3fddfa6d8981
                                        • Instruction Fuzzy Hash: 67B10431A00214EBDB106F61DD459AE3BA9EF04314B25813FF546B61E2DA7D4E41CAAE

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 417 6d101000-6d101012 418 6d101263-6d10126a 417->418 419 6d101018-6d10101d 417->419 420 6d101273-6d101275 418->420 421 6d10126c-6d10126d DeleteObject 418->421 422 6d101094-6d1010b1 419->422 423 6d10101f-6d101020 419->423 424 6d101276-6d10127c 420->424 421->420 425 6d1010b3 422->425 426 6d101126-6d10112a 422->426 427 6d101022-6d101024 423->427 428 6d101029-6d10102f 423->428 430 6d1010b6-6d1010df SendDlgItemMessageW * 2 call 6d101603 425->430 429 6d10112f-6d101177 SendDlgItemMessageW SetDlgItemTextW SetWindowTextW GetModuleHandleW LoadIconW SendDlgItemMessageW 426->429 427->424 431 6d101031-6d101032 428->431 432 6d10104a-6d101073 SendDlgItemMessageW * 2 428->432 435 6d101257-6d101261 ShowWindow 429->435 436 6d10117d-6d10118a call 6d101582 429->436 442 6d1010e4-6d1010f6 lstrcmpW 430->442 431->420 438 6d101038-6d101048 call 6d1015bd 431->438 433 6d101075-6d101077 432->433 434 6d10107c 432->434 433->434 439 6d101079-6d10107a 433->439 440 6d101081-6d101088 call 6d1015bd 434->440 435->420 436->435 451 6d101190-6d1011a2 call 6d101624 call 6d101582 436->451 449 6d101089-6d10108f KiUserCallbackDispatcher 438->449 439->440 440->449 446 6d101104-6d101110 442->446 447 6d1010f8-6d101100 442->447 446->430 452 6d101112-6d101117 446->452 447->446 449->420 451->435 458 6d1011a8-6d1011ca call 6d101554 lstrcmpW 451->458 452->426 453 6d101119-6d101124 452->453 453->429 458->435 461 6d1011d0-6d101255 GetDC GetDeviceCaps MulDiv lstrcpyW CreateFontIndirectW SendMessageW SendDlgItemMessageW * 4 458->461 461->435
                                        APIs
                                        • KiUserCallbackDispatcher.NTDLL(?,00000000), ref: 6D101089
                                        • SendDlgItemMessageW.USER32(?,000003EA,00000143,00000000,?), ref: 6D1010C7
                                        • SendDlgItemMessageW.USER32(?,000003EA,00000151,00000000,?), ref: 6D1010DB
                                        • lstrcmpW.KERNEL32(?,00000000,00000018), ref: 6D1010EE
                                        • SendDlgItemMessageW.USER32(?,000003EA,0000014E,00000000,00000000), ref: 6D101131
                                        • SetDlgItemTextW.USER32(?,000003EF,6D103020), ref: 6D10113E
                                        • SetWindowTextW.USER32(?,6D103820), ref: 6D10114A
                                        • GetModuleHandleW.KERNEL32(00000000,00000067,00000000), ref: 6D101156
                                        • LoadIconW.USER32(00000000), ref: 6D10115D
                                        • SendDlgItemMessageW.USER32(?,000003F0,00000170,00000000), ref: 6D10116F
                                        • lstrcmpW.KERNEL32(6D104040,MS Shell Dlg), ref: 6D1011C2
                                        • GetDC.USER32(?), ref: 6D1011D5
                                        • GetDeviceCaps.GDI32(00000000), ref: 6D1011DC
                                        • DeleteObject.GDI32(?), ref: 6D10126D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2963717010.000000006D101000.00000020.00000001.01000000.00000008.sdmp, Offset: 6D100000, based on PE: true
                                        • Associated: 00000001.00000002.2963700646.000000006D100000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000001.00000002.2963733206.000000006D102000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000001.00000002.2963749509.000000006D105000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6d100000_setup.jbxd
                                        Similarity
                                        • API ID: Item$MessageSend$Textlstrcmp$CallbackCapsDeleteDeviceDispatcherHandleIconLoadModuleObjectUserWindow
                                        • String ID: MS Shell Dlg$cancel
                                        • API String ID: 234226461-2163976771
                                        • Opcode ID: cad4a9f598bc03d360a271224d71d9c6cc4eb8fc8d551ff3c68f0f1ec337eaa4
                                        • Instruction ID: 01142b60a618b1d2335e4e3547068d2b12bc9690b2c27c592e47838b6929490d
                                        • Opcode Fuzzy Hash: cad4a9f598bc03d360a271224d71d9c6cc4eb8fc8d551ff3c68f0f1ec337eaa4
                                        • Instruction Fuzzy Hash: 20617C70544309BBEB217BA1DC89F3B7ABCEB46749F008419F705E5098DFE89481CA21

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 462 405a8c-405aa4 call 40645d 465 405aa6-405ab6 call 4060b2 462->465 466 405ab8-405af0 call 406034 462->466 475 405b13-405b3c call 403ff5 call 4068df 465->475 471 405af2-405b03 call 406034 466->471 472 405b08-405b0e lstrcatW 466->472 471->472 472->475 480 405bd0-405bd8 call 4068df 475->480 481 405b42-405b47 475->481 487 405be6-405bed 480->487 488 405bda-405be1 call 406966 480->488 481->480 482 405b4d-405b67 call 406034 481->482 486 405b6c-405b75 482->486 486->480 489 405b77-405b7b 486->489 491 405c06-405c2b LoadImageW 487->491 492 405bef-405bf5 487->492 488->487 495 405b7d-405b8c call 405e66 489->495 496 405b8f-405b9b lstrlenW 489->496 493 405c31-405c73 RegisterClassW 491->493 494 405cc6-405cce call 40141d 491->494 492->491 497 405bf7-405bfc call 403fd4 492->497 498 405d95 493->498 499 405c79-405cc1 SystemParametersInfoW CreateWindowExW 493->499 512 405cd0-405cd3 494->512 513 405cd8-405ce3 call 403ff5 494->513 495->496 502 405bc3-405bcb call 406883 call 40616a 496->502 503 405b9d-405bab lstrcmpiW 496->503 497->491 508 405d97-405d9e 498->508 499->494 502->480 503->502 509 405bad-405bb7 GetFileAttributesW 503->509 514 405bb9-405bbb 509->514 515 405bbd-405bbe call 4068b2 509->515 512->508 520 405ce9-405d06 ShowWindow LoadLibraryW 513->520 521 405d6c-405d74 call 4051a7 513->521 514->502 514->515 515->502 523 405d08-405d0d LoadLibraryW 520->523 524 405d0f-405d21 GetClassInfoW 520->524 528 405d76-405d7c 521->528 529 405d8e-405d90 call 40141d 521->529 523->524 526 405d23-405d33 GetClassInfoW RegisterClassW 524->526 527 405d39-405d5c DialogBoxParamW call 40141d 524->527 526->527 531 405d61-405d6a call 403dc8 527->531 528->512 532 405d82-405d89 call 40141d 528->532 529->498 531->508 532->512
                                        APIs
                                          • Part of subcall function 0040645D: GetModuleHandleA.KERNEL32(?,?,00000020,00403A26,00000008), ref: 0040646B
                                          • Part of subcall function 0040645D: LoadLibraryA.KERNEL32(?,?,?,00000020,00403A26,00000008), ref: 00406476
                                          • Part of subcall function 0040645D: GetProcAddress.KERNEL32(00000000), ref: 00406488
                                        • lstrcatW.KERNEL32(004D30C0,00447250,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447250,00000000,00000006,004C30A0,-00000002,00000000,004D70C8,00403C21,?), ref: 00405B0E
                                        • lstrlenW.KERNEL32(Show,?,?,?,Show,00000000,004C70A8,004D30C0,00447250,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447250,00000000,00000006,004C30A0), ref: 00405B90
                                        • lstrcmpiW.KERNEL32(?,.exe,Show,?,?,?,Show,00000000,004C70A8,004D30C0,00447250,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447250,00000000), ref: 00405BA3
                                        • GetFileAttributesW.KERNEL32(Show), ref: 00405BAE
                                          • Part of subcall function 004060B2: wsprintfW.USER32 ref: 004060BF
                                        • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,004C70A8), ref: 00405C17
                                        • RegisterClassW.USER32(0046AD60), ref: 00405C6A
                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405C82
                                        • CreateWindowExW.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405CBB
                                          • Part of subcall function 00403FF5: SetWindowTextW.USER32(00000000,0046ADC0), ref: 00404090
                                        • ShowWindow.USER32(00000005,00000000), ref: 00405CF1
                                        • LoadLibraryW.KERNEL32(RichEd20), ref: 00405D02
                                        • LoadLibraryW.KERNEL32(RichEd32), ref: 00405D0D
                                        • GetClassInfoW.USER32(00000000,RichEdit20A,0046AD60), ref: 00405D1D
                                        • GetClassInfoW.USER32(00000000,RichEdit,0046AD60), ref: 00405D2A
                                        • RegisterClassW.USER32(0046AD60), ref: 00405D33
                                        • DialogBoxParamW.USER32(?,00000000,004055D9,00000000), ref: 00405D52
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: ClassLoad$InfoLibraryWindow$Register$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemTextlstrcatlstrcmpilstrlenwsprintf
                                        • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$PrD$RichEd20$RichEd32$RichEdit$RichEdit20A$Show$_Nb
                                        • API String ID: 608394941-3818575660
                                        • Opcode ID: 80ca71923c634680d402ef98f9edd294887f2eac5f8585db4802c5967787b579
                                        • Instruction ID: 3a6a227fec416dc0362735230570460a00d436347f4cd54f675a02b01ae67812
                                        • Opcode Fuzzy Hash: 80ca71923c634680d402ef98f9edd294887f2eac5f8585db4802c5967787b579
                                        • Instruction Fuzzy Hash: 1271A071104B00AED720AB65AE45E2737ACEB44745F40443FF945B62E2EBB8AC518F2E
                                        APIs
                                          • Part of subcall function 6F951581: GlobalAlloc.KERNEL32(00000040,?,6F9515BA,?,?,6F95185F,?,6F951017), ref: 6F95158B
                                          • Part of subcall function 6F9515A3: lstrcpyW.KERNEL32(00000000,?,?,?,6F95185F,?,6F951017), ref: 6F9515C1
                                          • Part of subcall function 6F9515A3: GlobalFree.KERNEL32 ref: 6F9515D2
                                        • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 6F951D0B
                                        • lstrcpyW.KERNEL32(00000008,?), ref: 6F951D59
                                        • lstrcpyW.KERNEL32(00000808,?), ref: 6F951D63
                                        • GlobalFree.KERNEL32(00000000), ref: 6F951D7D
                                        • GlobalFree.KERNEL32(?), ref: 6F951E69
                                        • GlobalFree.KERNELBASE(?), ref: 6F951E6E
                                        • GlobalFree.KERNEL32(?), ref: 6F951E73
                                        • GlobalFree.KERNEL32(00000000), ref: 6F95201A
                                        • lstrcpyW.KERNEL32(?,?), ref: 6F95217A
                                        • GetModuleHandleW.KERNEL32(00000008), ref: 6F9521EE
                                        • LoadLibraryW.KERNEL32(00000008), ref: 6F9521FF
                                        • lstrcmpiW.KERNEL32(kernel32,00000008), ref: 6F95221B
                                        • lstrcmpiW.KERNEL32(kernel32.dll,00000008), ref: 6F952227
                                        • lstrlenW.KERNEL32(00000808), ref: 6F952258
                                        • lstrcatW.KERNEL32(00000808,6F9530C8), ref: 6F95227C
                                        • lstrcpyW.KERNEL32(?,00000808), ref: 6F9522C7
                                        • lstrcatW.KERNEL32(?,00000057), ref: 6F9522DE
                                        • lstrcatW.KERNEL32(00000808,00000057), ref: 6F952307
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2963785421.000000006F951000.00000020.00000001.01000000.00000007.sdmp, Offset: 6F950000, based on PE: true
                                        • Associated: 00000001.00000002.2963768599.000000006F950000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000001.00000002.2963801682.000000006F953000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000001.00000002.2963817695.000000006F955000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6f950000_setup.jbxd
                                        Similarity
                                        • API ID: Global$Free$lstrcpy$lstrcat$Alloclstrcmpi$HandleLibraryLoadModulelstrlen
                                        • String ID: W$kernel32$kernel32.dll
                                        • API String ID: 2496820534-4093004423
                                        • Opcode ID: 419cac719a9e4dc39c8d947ce9c675112c844857bd0a6f6f916ae80eac10bde9
                                        • Instruction ID: 82a4574e5e9ae6934ed0f91982289f8c6635e47f7dce8ca3642e17b8988368c1
                                        • Opcode Fuzzy Hash: 419cac719a9e4dc39c8d947ce9c675112c844857bd0a6f6f916ae80eac10bde9
                                        • Instruction Fuzzy Hash: A9128B71904706DADB21CFB8C980AEEBBB9FF0A314F10452AD166E61C0D774E6E8CB54

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 00406404: lstrlenW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsiB326.tmp\nsDialogs.dll" (overwriteflag=1),00406FDA,RMDir: RemoveDirectory("%s"),?,?,?), ref: 00406411
                                          • Part of subcall function 00406404: wvsprintfW.USER32(00000000,?,?), ref: 00406428
                                        • lstrcatW.KERNEL32(00000000,00000000,Show,004CB0B0,00000000,00000000), ref: 00401A76
                                        • CompareFileTime.KERNEL32(-00000014,?,Show,Show,00000000,00000000,Show,004CB0B0,00000000,00000000), ref: 00401AA0
                                          • Part of subcall function 0040616A: lstrcpynW.KERNEL32(?,?,00002004,00403A51,0046ADC0,NSIS Error), ref: 00406177
                                          • Part of subcall function 004050D2: lstrlenW.KERNEL32(0043B238,00000000,00000000,00000000), ref: 0040510A
                                          • Part of subcall function 004050D2: lstrlenW.KERNEL32(00403361,0043B238,00000000,00000000,00000000), ref: 0040511A
                                          • Part of subcall function 004050D2: lstrcatW.KERNEL32(0043B238,00403361,00403361,0043B238,00000000,00000000,00000000), ref: 0040512D
                                          • Part of subcall function 004050D2: SetWindowTextW.USER32(0043B238,0043B238), ref: 0040513F
                                          • Part of subcall function 004050D2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405165
                                          • Part of subcall function 004050D2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040517F
                                          • Part of subcall function 004050D2: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040518D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: MessageSendlstrlen$lstrcat$CompareFileTextTimeWindowlstrcpynwvsprintf
                                        • String ID: File: error creating "%s"$File: error, user abort$File: error, user cancel$File: error, user retry$File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"$File: skipped: "%s" (overwriteflag=%d)$File: wrote %d to "%s"$Show
                                        • API String ID: 4286501637-2784701388
                                        • Opcode ID: 14717d050078586d048810e81c1f23feeacbf18b7ebb4633121e82710f30be1d
                                        • Instruction ID: 08d878c9e80d9a323f30b4f94fb3bca26633bf48a784620ab852fc75793eaf31
                                        • Opcode Fuzzy Hash: 14717d050078586d048810e81c1f23feeacbf18b7ebb4633121e82710f30be1d
                                        • Instruction Fuzzy Hash: 88511771901114BADB107BB1CD46EAF3A68DF05369F21423FF516B10D3DB7C4A528AAD

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 906 403679-4036c7 GetTickCount GetModuleFileNameW call 405fb0 909 4036d3-403701 call 40616a call 4068b2 call 40616a GetFileSize 906->909 910 4036c9-4036ce 906->910 918 403707 909->918 919 4037ee-4037fc call 4032e7 909->919 911 40390d-403911 910->911 921 40370c-403723 918->921 926 403802-403805 919->926 927 403889-40388e 919->927 922 403725 921->922 923 403727-403729 call 403389 921->923 922->923 928 40372e-403730 923->928 929 403807-403818 call 4033bb call 403389 926->929 930 403829-403875 GlobalAlloc call 407453 call 405fe0 CreateFileW 926->930 927->911 932 403881-403888 call 4032e7 928->932 933 403736-40373d 928->933 946 40381d-40381f 929->946 957 403890-4038c0 call 4033bb call 403550 930->957 958 403877-40387c 930->958 932->927 936 4037b9-4037bd 933->936 937 40373f-403753 call 405f6c 933->937 941 4037c7-4037cd 936->941 942 4037bf-4037c6 call 4032e7 936->942 937->941 955 403755-40375c 937->955 948 4037dc-4037e6 941->948 949 4037cf-4037d9 call 4073e2 941->949 942->941 946->927 952 403821-403827 946->952 948->921 956 4037ec 948->956 949->948 952->927 952->930 955->941 961 40375e-403765 955->961 956->919 966 4038c5-4038c8 957->966 958->911 961->941 963 403767-40376e 961->963 963->941 965 403770-403777 963->965 965->941 967 403779-403799 965->967 966->927 968 4038ca-4038db 966->968 967->927 969 40379f-4037a3 967->969 970 4038e3-4038e6 968->970 971 4038dd 968->971 972 4037a5-4037a9 969->972 973 4037ab-4037b3 969->973 975 4038e9-4038f1 970->975 971->970 972->956 972->973 973->941 974 4037b5-4037b7 973->974 974->941 975->975 976 4038f3-40390b call 405f6c 975->976 976->911
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 0040368D
                                        • GetModuleFileNameW.KERNEL32(00000000,004DF0D8,00002004), ref: 004036A9
                                          • Part of subcall function 00405FB0: GetFileAttributesW.KERNEL32(00000003,004036BC,004DF0D8,80000000,00000003), ref: 00405FB4
                                          • Part of subcall function 00405FB0: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405FD6
                                        • GetFileSize.KERNEL32(00000000,00000000,004E30E0,00000000,004CF0B8,004CF0B8,004DF0D8,004DF0D8,80000000,00000003), ref: 004036F2
                                        Strings
                                        • Null, xrefs: 00403770
                                        • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00403877
                                        • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403889
                                        • XqB, xrefs: 00403834
                                        • soft, xrefs: 00403767
                                        • Inst, xrefs: 0040375E
                                        • Error launching installer, xrefs: 004036C9
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: File$AttributesCountCreateModuleNameSizeTick
                                        • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$XqB$soft
                                        • API String ID: 4283519449-2120965091
                                        • Opcode ID: a3e47155d5d3e7cfce9060ec4b179857a2ef80f4b34add79b0c4c44f1ba8f5ae
                                        • Instruction ID: f4150b5e2bf86fa70e64154ff4a6ed510d3eaad87e9a8afd50ffd73de6b30a99
                                        • Opcode Fuzzy Hash: a3e47155d5d3e7cfce9060ec4b179857a2ef80f4b34add79b0c4c44f1ba8f5ae
                                        • Instruction Fuzzy Hash: EE71C3B1900204AFDB11AFB5DD85BAE7AACAB04755F10807FFA05B72D1CB789E448B5C

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1045 402880-402882 1046 402884-402886 1045->1046 1047 402888-40288e 1045->1047 1048 402894-4028e2 call 40145c * 2 call 406321 RegCreateKeyExW 1046->1048 1047->1048 1055 4028e8-4028f3 1048->1055 1056 4029ef-4029f5 1048->1056 1058 4028f5-402916 call 40145c lstrlenW 1055->1058 1059 402937-40293d 1055->1059 1057 4030e3-4030f2 1056->1057 1073 402918-402925 call 406404 1058->1073 1074 40292a-402934 call 406404 1058->1074 1060 402966-40296a 1059->1060 1061 40293f-402963 call 401446 call 406404 1059->1061 1065 40296c-4029ab call 403550 call 406385 call 406404 1060->1065 1066 4029ae-4029c4 RegSetValueExW 1060->1066 1061->1060 1065->1066 1069 4029c6-4029c9 1066->1069 1070 4029cb-4029de call 406404 1066->1070 1076 4029e1-4029ea RegCloseKey 1069->1076 1070->1076 1073->1066 1074->1059 1076->1057
                                        APIs
                                        • RegCreateKeyExW.KERNEL32(?,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004028DA
                                        • lstrlenW.KERNEL32(004130D8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004028FD
                                        • RegSetValueExW.KERNEL32(?,?,?,?,004130D8,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004029BC
                                        • RegCloseKey.KERNEL32(?), ref: 004029E4
                                          • Part of subcall function 00406404: lstrlenW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsiB326.tmp\nsDialogs.dll" (overwriteflag=1),00406FDA,RMDir: RemoveDirectory("%s"),?,?,?), ref: 00406411
                                          • Part of subcall function 00406404: wvsprintfW.USER32(00000000,?,?), ref: 00406428
                                        Strings
                                        • WriteRegBin: "%s\%s" "%s"="%s", xrefs: 004029A1
                                        • WriteRegExpandStr: "%s\%s" "%s"="%s", xrefs: 0040292A
                                        • WriteRegStr: "%s\%s" "%s"="%s", xrefs: 00402918
                                        • WriteRegDWORD: "%s\%s" "%s"="0x%08x", xrefs: 00402959
                                        • WriteReg: error creating key "%s\%s", xrefs: 004029F5
                                        • WriteReg: error writing into "%s\%s" "%s", xrefs: 004029D4
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: lstrlen$CloseCreateValuewvsprintf
                                        • String ID: WriteReg: error creating key "%s\%s"$WriteReg: error writing into "%s\%s" "%s"$WriteRegBin: "%s\%s" "%s"="%s"$WriteRegDWORD: "%s\%s" "%s"="0x%08x"$WriteRegExpandStr: "%s\%s" "%s"="%s"$WriteRegStr: "%s\%s" "%s"="%s"
                                        • API String ID: 1641139501-220328614
                                        • Opcode ID: 82f7777af25b21072d9d61eb9cc9595a332ce28b3e617f2132309cd39d519d54
                                        • Instruction ID: 5079a85d00332eb89b956210b0bf8ab3b344c965529248026cf182ae6f79859d
                                        • Opcode Fuzzy Hash: 82f7777af25b21072d9d61eb9cc9595a332ce28b3e617f2132309cd39d519d54
                                        • Instruction Fuzzy Hash: B741AEB2D00208FFDF11AF91CE46EAEBBB9EB04704F21403BF605721A2D6794B519B59

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1090 6d10127f-6d1012b9 call 6d101582 1093 6d101542-6d101544 1090->1093 1094 6d1012bf-6d1012cb call 6d101582 1090->1094 1094->1093 1097 6d1012d1-6d1012df call 6d101582 1094->1097 1100 6d101541 1097->1100 1101 6d1012e5-6d1012f0 1097->1101 1100->1093 1102 6d1012f6 1101->1102 1103 6d10137a-6d10137b call 6d101624 1101->1103 1104 6d1012f9-6d101300 1102->1104 1106 6d101380-6d101387 1103->1106 1107 6d101302 1104->1107 1108 6d101304-6d101308 1104->1108 1106->1100 1109 6d10138d-6d1013a8 GlobalAlloc 1106->1109 1107->1108 1110 6d101310-6d101314 1108->1110 1111 6d10130a 1108->1111 1109->1100 1112 6d1013ae-6d1013b9 1109->1112 1113 6d101316 1110->1113 1114 6d10131c-6d101325 1110->1114 1111->1110 1115 6d1014aa-6d1014b0 1112->1115 1116 6d1013bf-6d1013c5 1112->1116 1113->1114 1114->1104 1117 6d101327-6d101329 1114->1117 1120 6d1014c2-6d1014ca 1115->1120 1121 6d1014b2-6d1014ba call 6d101582 1115->1121 1118 6d1013cb-6d1013d3 call 6d101582 1116->1118 1117->1103 1119 6d10132b-6d10133c 1117->1119 1137 6d1014a3 1118->1137 1138 6d1013d9-6d10140a lstrlenW GlobalAlloc 1118->1138 1119->1100 1123 6d101342-6d101346 1119->1123 1125 6d1014e3-6d1014e5 1120->1125 1126 6d1014cc-6d1014e1 DialogBoxParamW 1120->1126 1121->1120 1140 6d1014bc 1121->1140 1128 6d101354-6d101356 1123->1128 1129 6d101348-6d101352 1123->1129 1132 6d1014e7-6d1014ec 1125->1132 1133 6d1014ee-6d1014f3 1125->1133 1131 6d1014fb-6d101509 1126->1131 1128->1100 1139 6d10135c-6d101363 1128->1139 1129->1123 1129->1128 1135 6d101538-6d101540 GlobalFree 1131->1135 1136 6d10150b 1131->1136 1134 6d1014f6 call 6d1015bd 1132->1134 1133->1134 1134->1131 1135->1100 1142 6d10150d-6d101517 1136->1142 1137->1115 1138->1137 1143 6d101410-6d10141c lstrcpyW call 6d101582 1138->1143 1144 6d101365-6d10136a 1139->1144 1145 6d10136c-6d10136e 1139->1145 1140->1120 1146 6d101519-6d10151a GlobalFree 1142->1146 1147 6d10151c-6d101527 1142->1147 1143->1137 1153 6d101422-6d101455 lstrlenW GlobalAlloc 1143->1153 1149 6d101370-6d101378 1144->1149 1145->1149 1146->1147 1150 6d101529-6d10152a GlobalFree 1147->1150 1151 6d10152c-6d101536 1147->1151 1149->1106 1150->1151 1151->1135 1151->1142 1153->1137 1154 6d101457-6d101462 lstrcpyW 1153->1154 1155 6d101464-6d10146c call 6d101582 1154->1155 1156 6d101487-6d10149b 1154->1156 1155->1137 1160 6d10146e-6d101483 call 6d101624 1155->1160 1156->1118 1157 6d1014a1 1156->1157 1157->1115 1160->1156
                                        APIs
                                          • Part of subcall function 6D101582: lstrcpyW.KERNEL32(?,?,?,6D1012B7,6D103820), ref: 6D10159B
                                          • Part of subcall function 6D101582: GlobalFree.KERNEL32 ref: 6D1015AC
                                        • GlobalAlloc.KERNEL32(00000040,00000000,6D104040,6D104040,?,6D103020,6D103820), ref: 6D10139F
                                        • lstrlenW.KERNEL32(6D104040,6D104040,?,?,6D103020,6D103820), ref: 6D1013DA
                                        • GlobalAlloc.KERNEL32(00000040,?,?,?,6D103020,6D103820), ref: 6D1013E3
                                        • lstrcpyW.KERNEL32(?,6D104040,?,?,6D103020,6D103820), ref: 6D101412
                                        • lstrlenW.KERNEL32(6D104040,6D104040,?,?,6D103020,6D103820), ref: 6D101423
                                        • GlobalAlloc.KERNEL32(00000040,?,?,?,6D103020,6D103820), ref: 6D10142C
                                        • lstrcpyW.KERNEL32(?,6D104040,?,?,6D103020,6D103820), ref: 6D101459
                                        • DialogBoxParamW.USER32(00000065,00000000,6D101000,00000000), ref: 6D1014DB
                                        • GlobalFree.KERNEL32(?), ref: 6D10151A
                                        • GlobalFree.KERNEL32(?), ref: 6D10152A
                                        • GlobalFree.KERNEL32(?), ref: 6D10153E
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2963717010.000000006D101000.00000020.00000001.01000000.00000008.sdmp, Offset: 6D100000, based on PE: true
                                        • Associated: 00000001.00000002.2963700646.000000006D100000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000001.00000002.2963733206.000000006D102000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000001.00000002.2963749509.000000006D105000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6d100000_setup.jbxd
                                        Similarity
                                        • API ID: Global$Free$Alloclstrcpy$lstrlen$DialogParam
                                        • String ID:
                                        • API String ID: 4207030468-0
                                        • Opcode ID: adc452ed561c73320e9bf06032183d251cd7ce1e3d2e22078d465f28ba80a2c6
                                        • Instruction ID: 2d1f2843b7615eefed97a2f7f45929b8385c9af428d580a0d607ad620010965c
                                        • Opcode Fuzzy Hash: adc452ed561c73320e9bf06032183d251cd7ce1e3d2e22078d465f28ba80a2c6
                                        • Instruction Fuzzy Hash: 0B7192716052029BCB14FF95E980F26BBF8AB56318B01C42DE606DB21DDFF8D986CB15

                                        Control-flow Graph

                                        APIs
                                        • GetDlgItem.USER32(?,00000000), ref: 6CEB17D8
                                        • GetWindowRect.USER32(00000000,?), ref: 6CEB17E3
                                        • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 6CEB17F3
                                        • CreateDialogParamW.USER32(00000001,?,6CEB14FC,00000000), ref: 6CEB1808
                                        • SetWindowPos.USER32(00000000,00000000,?,?,?,?,00000014), ref: 6CEB183B
                                        • SetWindowLongW.USER32(?,00000004,6CEB142D), ref: 6CEB1849
                                        • GetProcessHeap.KERNEL32(00000008,00000000), ref: 6CEB1863
                                        • HeapAlloc.KERNEL32(00000000), ref: 6CEB186A
                                          • Part of subcall function 6CEB1E83: GlobalAlloc.KERNEL32(00000040,?,?,6CEB1061,error,?,00000104,?,00000400), ref: 6CEB1E99
                                          • Part of subcall function 6CEB1E83: lstrcpynW.KERNEL32(00000004,00000104,?,6CEB1061,error,?,00000104,?,00000400), ref: 6CEB1EAF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2963579894.000000006CEB1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CEB0000, based on PE: true
                                        • Associated: 00000001.00000002.2963521789.000000006CEB0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2963612925.000000006CEB3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2963671204.000000006CEB6000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6ceb0000_setup.jbxd
                                        Similarity
                                        • API ID: Window$AllocHeap$CreateDialogGlobalItemLongParamPointsProcessRectlstrcpyn
                                        • String ID: error
                                        • API String ID: 1928716940-1574812785
                                        • Opcode ID: 97a66189096ae11339c0b9a767fec8f0c2498c0dd650b99e0206bf602d72d7aa
                                        • Instruction ID: be98db6e31a0095a41b07628531665951f24b4f2c3dc316242512a2d23304411
                                        • Opcode Fuzzy Hash: 97a66189096ae11339c0b9a767fec8f0c2498c0dd650b99e0206bf602d72d7aa
                                        • Instruction Fuzzy Hash: B3212BB1A00219EFCF12DFA5DA49DBE7BB9FB4A311B10441AF605A3240DB709504DB6A

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1173 6f9528a3-6f9528b7 1174 6f9528bb-6f9528d2 1173->1174 1175 6f9528d4-6f9528d9 1174->1175 1176 6f9528fe-6f952903 call 6f951592 1174->1176 1175->1176 1178 6f9528db-6f9528de 1175->1178 1179 6f952908 1176->1179 1180 6f9528e7-6f9528e9 1178->1180 1181 6f9528e0-6f9528e5 call 6f9515a3 1178->1181 1184 6f952909-6f952912 1179->1184 1182 6f9528f9-6f9528fc 1180->1182 1183 6f9528eb-6f9528ee 1180->1183 1181->1184 1182->1184 1183->1182 1186 6f9528f0-6f9528f7 call 6f951628 1183->1186 1187 6f952914-6f952916 1184->1187 1188 6f952918 1184->1188 1186->1179 1191 6f95291a-6f952922 1187->1191 1188->1191 1193 6f952a15 1191->1193 1194 6f952928-6f95292b 1191->1194 1195 6f952a18-6f952a24 GlobalFree 1193->1195 1196 6f952931-6f952934 1194->1196 1197 6f952a0a-6f952a13 call 6f95167f 1194->1197 1199 6f952a26-6f952a34 1195->1199 1200 6f952a49-6f952a4e 1195->1200 1201 6f9529fc-6f952a08 call 6f95167f 1196->1201 1202 6f95293a-6f95293d 1196->1202 1197->1195 1206 6f952a36-6f952a3b 1199->1206 1207 6f952a40-6f952a44 1199->1207 1201->1195 1203 6f9529d0-6f9529f5 GlobalAlloc WideCharToMultiByte 1202->1203 1204 6f952943 1202->1204 1210 6f9529f8-6f9529fa 1203->1210 1204->1195 1209 6f952949-6f95294c 1204->1209 1206->1174 1207->1174 1212 6f95294e-6f952951 1209->1212 1213 6f95297b-6f9529ae GlobalAlloc lstrcpynW 1209->1213 1210->1195 1212->1195 1214 6f952957-6f952960 lstrlenW 1212->1214 1213->1210 1215 6f9529b0-6f9529ce GlobalAlloc CLSIDFromString GlobalFree 1213->1215 1214->1195 1216 6f952966-6f952976 call 6f95167f call 6f952554 1214->1216 1215->1195 1216->1195
                                        APIs
                                        • lstrlenW.KERNEL32(?), ref: 6F952958
                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 6F952985
                                        • lstrcpynW.KERNEL32(00000000,?), ref: 6F952998
                                        • GlobalAlloc.KERNEL32(00000040,00000010), ref: 6F9529B4
                                        • CLSIDFromString.OLE32(00000000,00000000), ref: 6F9529C1
                                        • GlobalFree.KERNEL32(00000000), ref: 6F9529C8
                                        • GlobalAlloc.KERNEL32(00000040), ref: 6F9529D8
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 6F9529EF
                                        • GlobalFree.KERNELBASE(00000000), ref: 6F952A19
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2963785421.000000006F951000.00000020.00000001.01000000.00000007.sdmp, Offset: 6F950000, based on PE: true
                                        • Associated: 00000001.00000002.2963768599.000000006F950000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000001.00000002.2963801682.000000006F953000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000001.00000002.2963817695.000000006F955000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6f950000_setup.jbxd
                                        Similarity
                                        • API ID: Global$Alloc$Free$ByteCharFromMultiStringWidelstrcpynlstrlen
                                        • String ID:
                                        • API String ID: 916651646-0
                                        • Opcode ID: 3e876ff800af75e58e2a559d1f6f366aeed590134c889fe575416fd2505727c6
                                        • Instruction ID: 4006e292df1972aee6b3d404d24a3f841df3edf44532779ba96872249562a8fd
                                        • Opcode Fuzzy Hash: 3e876ff800af75e58e2a559d1f6f366aeed590134c889fe575416fd2505727c6
                                        • Instruction Fuzzy Hash: C541AA71108301AFE764CF788944A6A7BF8FF46321F100A1AE61ADA2D1D730E4B9CF61

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1221 4023f0-4023fd 1222 402403-402419 call 40145c * 2 1221->1222 1223 4024e5-4024f1 call 4050d2 1221->1223 1232 402429-402438 LoadLibraryExW 1222->1232 1233 40241b-402427 GetModuleHandleW 1222->1233 1229 4030e3-4030f2 1223->1229 1235 40243e-40244d call 4064c6 1232->1235 1236 4024ce-4024db call 4050d2 1232->1236 1233->1232 1233->1235 1241 40248c-4024a4 call 4050d2 call 406404 1235->1241 1242 40244f-402455 1235->1242 1236->1223 1247 4024a7-4024aa 1241->1247 1244 402457-402463 call 401435 1242->1244 1245 40246e-40248a KiUserCallbackDispatcher 1242->1245 1244->1247 1256 402465-40246c 1244->1256 1245->1247 1247->1229 1251 4024b0-4024ba call 403e18 1247->1251 1251->1229 1257 4024c0-4024c9 FreeLibrary 1251->1257 1256->1247 1257->1229
                                        APIs
                                        • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 0040241C
                                        • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040242D
                                        • KiUserCallbackDispatcher.NTDLL(?,00002004,00473000,0040B0C0,0040B000,?,?,?,00000008,00000001,000000F0), ref: 00402485
                                          • Part of subcall function 004050D2: lstrlenW.KERNEL32(0043B238,00000000,00000000,00000000), ref: 0040510A
                                          • Part of subcall function 004050D2: lstrlenW.KERNEL32(00403361,0043B238,00000000,00000000,00000000), ref: 0040511A
                                          • Part of subcall function 004050D2: lstrcatW.KERNEL32(0043B238,00403361,00403361,0043B238,00000000,00000000,00000000), ref: 0040512D
                                          • Part of subcall function 004050D2: SetWindowTextW.USER32(0043B238,0043B238), ref: 0040513F
                                          • Part of subcall function 004050D2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405165
                                          • Part of subcall function 004050D2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040517F
                                          • Part of subcall function 004050D2: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040518D
                                          • Part of subcall function 00406404: lstrlenW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsiB326.tmp\nsDialogs.dll" (overwriteflag=1),00406FDA,RMDir: RemoveDirectory("%s"),?,?,?), ref: 00406411
                                          • Part of subcall function 00406404: wvsprintfW.USER32(00000000,?,?), ref: 00406428
                                        • FreeLibrary.KERNEL32(?,?), ref: 004024C3
                                        Strings
                                        • Error registering DLL: %s not found in %s, xrefs: 0040249A
                                        • Error registering DLL: Could not load %s, xrefs: 004024DB
                                        • Error registering DLL: Could not initialize OLE, xrefs: 004024F1
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: MessageSendlstrlen$Library$CallbackDispatcherFreeHandleLoadModuleTextUserWindowlstrcatwvsprintf
                                        • String ID: Error registering DLL: %s not found in %s$Error registering DLL: Could not initialize OLE$Error registering DLL: Could not load %s
                                        • API String ID: 2832544771-945480824
                                        • Opcode ID: deda522cecc8a5779823603240008b0faca4c76850106b13635e3c04ff52d226
                                        • Instruction ID: d8831ef82082564af9a2e195be03e9e7495047a885a7848ebc2eed903ecf7a42
                                        • Opcode Fuzzy Hash: deda522cecc8a5779823603240008b0faca4c76850106b13635e3c04ff52d226
                                        • Instruction Fuzzy Hash: 0B219F35A00208BBCF206FA1CE49A9E7A70AF00314F30813FF512761E1D7BD4A919A5D
                                        APIs
                                        • SendMessageW.USER32(?,0000040D,00000000), ref: 6CEB1C94
                                        • ShowWindow.USER32(00000008), ref: 6CEB1CA2
                                        • KiUserCallbackDispatcher.NTDLL(?,00000000,00000000,00000000), ref: 6CEB1CBE
                                        • IsDialogMessageW.USER32(?), ref: 6CEB1CCE
                                        • IsDialogMessageW.USER32(?), ref: 6CEB1CDE
                                        • TranslateMessage.USER32(?), ref: 6CEB1CE8
                                        • DispatchMessageW.USER32(?), ref: 6CEB1CF2
                                        • SetWindowLongW.USER32(?,00000004), ref: 6CEB1D0C
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2963579894.000000006CEB1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CEB0000, based on PE: true
                                        • Associated: 00000001.00000002.2963521789.000000006CEB0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2963612925.000000006CEB3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2963671204.000000006CEB6000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6ceb0000_setup.jbxd
                                        Similarity
                                        • API ID: Message$DialogWindow$CallbackDispatchDispatcherLongSendShowTranslateUser
                                        • String ID:
                                        • API String ID: 4159918924-0
                                        • Opcode ID: ced51948e744e30fd42157f0d6cf04f1ae0db4228e0cf32e8ba25bccd90afafc
                                        • Instruction ID: c7297475da430f796b600091943cf710f1316bb0a08dce6ec98d96f122d40691
                                        • Opcode Fuzzy Hash: ced51948e744e30fd42157f0d6cf04f1ae0db4228e0cf32e8ba25bccd90afafc
                                        • Instruction Fuzzy Hash: 05112D31A0050AFFCF029BA5EE09EBB3F7EFB46715B104126FA10A2150DB319406CB69
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 004033E7
                                          • Part of subcall function 004033BB: SetFilePointer.KERNEL32(00000000,00000000,00000000,0040389E,?), ref: 004033C9
                                        • SetFilePointer.KERNEL32(00000000,00000000,?,00000000,?,00403583,00000004,00000000,00000000,?,?,?,004038C5,000000FF,00000000,00000000), ref: 0040341A
                                        • WriteFile.KERNEL32(004271E0,0042B879,000000FF,00000000,0042F1E8,00004000,?,00000000,?,00403583,00000004,00000000,00000000,?,?), ref: 004034D8
                                        • SetFilePointer.KERNEL32(001F1E3C,00000000,00000000,0042F1E8,00004000,?,00000000,?,00403583,00000004,00000000,00000000,?,?,?,004038C5), ref: 0040352A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: File$Pointer$CountTickWrite
                                        • String ID: XqB$qB
                                        • API String ID: 2146148272-2352303668
                                        • Opcode ID: 979a132689fdd3b66ddc975673b61f2c520d6a21d2f47b68d5318fd2806375dd
                                        • Instruction ID: 352f119b9731fba5dc1d5d47024dbf085b4ecca43a18aeda97e8958449c38e74
                                        • Opcode Fuzzy Hash: 979a132689fdd3b66ddc975673b61f2c520d6a21d2f47b68d5318fd2806375dd
                                        • Instruction Fuzzy Hash: F841A372604211AFCB209F29EE4593A3F6CFB1435A784027FE511A23B0CB399E55CB5D
                                        APIs
                                        • SetFilePointer.KERNEL32(-00069C40,00000000,00000000,00000000,00000000,?,?,?,004038C5,000000FF,00000000,00000000,004091D8,?), ref: 00403574
                                        • ReadFile.KERNEL32(004091D8,00000004,?,00000000,00000000,00000004,00000000,00000000,?,?,?,004038C5,000000FF,00000000,00000000,004091D8), ref: 004035A2
                                        • ReadFile.KERNEL32(0042F1E8,00004000,?,00000000,004091D8,?,004038C5,000000FF,00000000,00000000,004091D8,?), ref: 004035FC
                                        • WriteFile.KERNEL32(00000000,0042F1E8,?,000000FF,00000000,?,004038C5,000000FF,00000000,00000000,004091D8,?), ref: 00403614
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: File$Read$PointerWrite
                                        • String ID:
                                        • API String ID: 2113905535-0
                                        • Opcode ID: 7052c420235308e1a53cecd41fbf7afbbe8e53aab26b08745c9ca0e470065494
                                        • Instruction ID: a63153eef40669f0ed7c1800638863e54a14cc79a46bc24bc920c3bc8af84b95
                                        • Opcode Fuzzy Hash: 7052c420235308e1a53cecd41fbf7afbbe8e53aab26b08745c9ca0e470065494
                                        • Instruction Fuzzy Hash: 5E31F971500108FBDB21CFA9ED44EAE3BBCEB44351F60483AF904E6290D6359B51DB69
                                        APIs
                                          • Part of subcall function 0040616A: lstrcpynW.KERNEL32(?,?,00002004,00403A51,0046ADC0,NSIS Error), ref: 00406177
                                        • GlobalFree.KERNEL32(008FD7C8), ref: 00402387
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: FreeGloballstrcpyn
                                        • String ID: Exch: stack < %d elements$Pop: stack empty$Show
                                        • API String ID: 1459762280-1347343861
                                        • Opcode ID: 86046051319aa6f15320f2f89dd1da973ef8906580a437cab40d105fcf93cf09
                                        • Instruction ID: 00a269db9d122ce218cb6369f3e7d31d5b123713c6f27ce8ba71e52fe8ccb839
                                        • Opcode Fuzzy Hash: 86046051319aa6f15320f2f89dd1da973ef8906580a437cab40d105fcf93cf09
                                        • Instruction Fuzzy Hash: 6F21D476601105EBD710AB64DD81A6F77A4EF04318721403FF542B72D2E7789C1186AD
                                        APIs
                                        • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 0040230C
                                        • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 0040232E
                                        • GetFileVersionInfoW.VERSION(?,?,?,00000000), ref: 00402347
                                        • VerQueryValueW.VERSION(?,00408838,?,?,?,?,?,00000000), ref: 00402360
                                          • Part of subcall function 004060B2: wsprintfW.USER32 ref: 004060BF
                                        • GlobalFree.KERNEL32(008FD7C8), ref: 00402387
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: FileGlobalInfoVersion$AllocFreeQuerySizeValuewsprintf
                                        • String ID:
                                        • API String ID: 3376005127-0
                                        • Opcode ID: 04190a5ec73ef904f848c902adff7444c08b120d91b8cbbfd7be8fc87318c9d7
                                        • Instruction ID: d706dadd873a054bb948c0373b183cc18cdaf107e69ff1aff3bcb7a8f3beee4c
                                        • Opcode Fuzzy Hash: 04190a5ec73ef904f848c902adff7444c08b120d91b8cbbfd7be8fc87318c9d7
                                        • Instruction Fuzzy Hash: 6E114C72900109AFCF01EFA1DD459AE7BB8EF04344F10407AF606F62A0D7799A51DB59
                                        APIs
                                        • GlobalAlloc.KERNEL32(00000040,00002004), ref: 00402B2B
                                        • WideCharToMultiByte.KERNEL32(?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B61
                                        • lstrlenA.KERNEL32(?,?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B6A
                                        • WriteFile.KERNEL32(00000000,?,?,00000000,?,?,?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B85
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: AllocByteCharFileGlobalMultiWideWritelstrlen
                                        • String ID:
                                        • API String ID: 2568930968-0
                                        • Opcode ID: 55ad496edc2af256c0c88f76fcaffcca9168ec20f4bf31ffebe7fcfc10bf5179
                                        • Instruction ID: 2b6f9eedf6ae11cfe1e36f0213f8387d72ebb0b879c85407db03f4e9eb7306d9
                                        • Opcode Fuzzy Hash: 55ad496edc2af256c0c88f76fcaffcca9168ec20f4bf31ffebe7fcfc10bf5179
                                        • Instruction Fuzzy Hash: A7016171500204BBDB14AF60DE49D9E3B78EF05359F10443AF646BA1E1D6798982DB68
                                        APIs
                                        • GetDlgItem.USER32(?), ref: 004020A3
                                        • GetClientRect.USER32(00000000,?), ref: 004020B0
                                        • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 004020D1
                                        • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 004020DF
                                        • DeleteObject.GDI32(00000000), ref: 004020EE
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                        • String ID:
                                        • API String ID: 1849352358-0
                                        • Opcode ID: 1f7c9829ad23568ddcd68d747fd9c97de9c434eb898eff28d5e97dd8542ad38d
                                        • Instruction ID: a6d8e4af78efbdafb2d3f18e6b80530ac635d705efb76da9f8ac6e555915fa7b
                                        • Opcode Fuzzy Hash: 1f7c9829ad23568ddcd68d747fd9c97de9c434eb898eff28d5e97dd8542ad38d
                                        • Instruction Fuzzy Hash: 95F012B2600508AFDB00EBA4EF89DAF7BBCEB04305B104579F642F6161C6759E418B28
                                        APIs
                                          • Part of subcall function 6F951C1B: GlobalFree.KERNEL32(?), ref: 6F951E69
                                          • Part of subcall function 6F951C1B: GlobalFree.KERNELBASE(?), ref: 6F951E6E
                                          • Part of subcall function 6F951C1B: GlobalFree.KERNEL32(?), ref: 6F951E73
                                        • GlobalFree.KERNEL32(00000000), ref: 6F952AFA
                                        • FreeLibrary.KERNEL32(?), ref: 6F952B71
                                        • GlobalFree.KERNEL32(00000000), ref: 6F952B96
                                          • Part of subcall function 6F9523C1: GlobalAlloc.KERNEL32(00000040,00000000), ref: 6F9523F3
                                          • Part of subcall function 6F9525B2: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,?,6F952ACB,00000000), ref: 6F952611
                                          • Part of subcall function 6F951904: lstrcpyW.KERNEL32(00000000,error,00000000,6F95287B,00000000), ref: 6F951929
                                          • Part of subcall function 6F952445: wsprintfW.USER32 ref: 6F9524E8
                                          • Part of subcall function 6F952445: GlobalFree.KERNEL32(?), ref: 6F952516
                                          • Part of subcall function 6F952445: GlobalFree.KERNEL32(00000000), ref: 6F95253F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2963785421.000000006F951000.00000020.00000001.01000000.00000007.sdmp, Offset: 6F950000, based on PE: true
                                        • Associated: 00000001.00000002.2963768599.000000006F950000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000001.00000002.2963801682.000000006F953000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000001.00000002.2963817695.000000006F955000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6f950000_setup.jbxd
                                        Similarity
                                        • API ID: Global$Free$Alloc$Librarylstrcpywsprintf
                                        • String ID:
                                        • API String ID: 1767494692-3916222277
                                        • Opcode ID: 11ee72a18cce88ff89d727e2c1c84fd7b8f11ac8665c8ac79dfda2c4faab9bdb
                                        • Instruction ID: ee4c0d908d72fa17a4f66c8bd660878bc7153d5a32f497799ee112715a492d1e
                                        • Opcode Fuzzy Hash: 11ee72a18cce88ff89d727e2c1c84fd7b8f11ac8665c8ac79dfda2c4faab9bdb
                                        • Instruction Fuzzy Hash: 7631B3714043459ADF54DFB898C4B963BACAF16328F144426E919AE0D7DBB4E0B5CA60
                                        APIs
                                        • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401FE6
                                        • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401FFE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: MessageSend$Timeout
                                        • String ID: !
                                        • API String ID: 1777923405-2657877971
                                        • Opcode ID: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                                        • Instruction ID: e9a18080beffe971bb15df4a8f5444ede2e1f7f3a5df9d200604b6a011215d0a
                                        • Opcode Fuzzy Hash: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                                        • Instruction Fuzzy Hash: 32219171900209ABDF15AFB4D986ABD7BB9AF00348F14413EF602F60E2D6798A80D758
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 00405FFE
                                        • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,00000000,00403946,004D30C0,004D70C8), ref: 00406019
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: CountFileNameTempTick
                                        • String ID: nsa
                                        • API String ID: 1716503409-2209301699
                                        • Opcode ID: 4c34e6a0a90932f4b551cf1a0ac55fda76427712b032f8561b8497f4a2d6824a
                                        • Instruction ID: be25c3b17c8933440b05da9cd673d95fc9e669a54b60c2a7ae19a21696f833e6
                                        • Opcode Fuzzy Hash: 4c34e6a0a90932f4b551cf1a0ac55fda76427712b032f8561b8497f4a2d6824a
                                        • Instruction Fuzzy Hash: 03F06776600208ABDB10CF59DD09A9EBBADEF94710F00803FFA45E7290E6B09A54C768
                                        APIs
                                        • ShowWindow.USER32(00000000,00000000), ref: 0040219F
                                          • Part of subcall function 00406404: lstrlenW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsiB326.tmp\nsDialogs.dll" (overwriteflag=1),00406FDA,RMDir: RemoveDirectory("%s"),?,?,?), ref: 00406411
                                          • Part of subcall function 00406404: wvsprintfW.USER32(00000000,?,?), ref: 00406428
                                        • EnableWindow.USER32(00000000,00000000), ref: 004021AA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: Window$EnableShowlstrlenwvsprintf
                                        • String ID: HideWindow
                                        • API String ID: 1249568736-780306582
                                        • Opcode ID: 0616bcda597e9750e62a76ee812eb00f220ec1a404151e7fe1b3dec3a2ed7f78
                                        • Instruction ID: d6a52e45258e13aa606ad2b2b5c1a00533a470e73934100eb5490deb1737a6ec
                                        • Opcode Fuzzy Hash: 0616bcda597e9750e62a76ee812eb00f220ec1a404151e7fe1b3dec3a2ed7f78
                                        • Instruction Fuzzy Hash: 02E09232A05111DBCB08BBB5A7495AE76B4EA5532A725007FE243F20D1DA7D8D01C62D
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c36cb06954edc7335e9d92b109141cbd09c7a7193fbcbb3a0e0d18f944b47e5e
                                        • Instruction ID: 7372baf4ca72983a720edb26d3aa8eb56cdb2bb7098e1cb2460684513cc098eb
                                        • Opcode Fuzzy Hash: c36cb06954edc7335e9d92b109141cbd09c7a7193fbcbb3a0e0d18f944b47e5e
                                        • Instruction Fuzzy Hash: 38A14671914248EBDB18CF18C8946ED3BE1FF44355F10912AFD5AAB290D738E981CF85
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1f400c994127adfbf61058f0df631bf6e0d69df8ab50e85f6c29bef2e618aba5
                                        • Instruction ID: 19be9bd041eb831dc497f9eed389fffc0b40ebad8130cd8a8cc9c73c743c8dd7
                                        • Opcode Fuzzy Hash: 1f400c994127adfbf61058f0df631bf6e0d69df8ab50e85f6c29bef2e618aba5
                                        • Instruction Fuzzy Hash: FC913471904248EBDF18CF18C8947E93BA1FF44399F10912AFC5AAB291C738E985CF85
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0eb3c0e8f84787af47df7413a68d2a7b57c255642fcd00871c8e2605327e1244
                                        • Instruction ID: 7f7ee5045e18535129bde91f801cc5c524a8174eb8871a5b0dc4d7b8e610d919
                                        • Opcode Fuzzy Hash: 0eb3c0e8f84787af47df7413a68d2a7b57c255642fcd00871c8e2605327e1244
                                        • Instruction Fuzzy Hash: 40814871918248EBDB14CF29C8447ED3BA1FF44355F10812AFD6AAB290D778E985CF85
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dcf24dacc8478a35d58cb1e451b5f07b4fbd3d5e90387a27a31f51ce211858d9
                                        • Instruction ID: 0b2195dfed2d2eaf31799a866d23b30a47b9bddfdc78d95a245e633d29955650
                                        • Opcode Fuzzy Hash: dcf24dacc8478a35d58cb1e451b5f07b4fbd3d5e90387a27a31f51ce211858d9
                                        • Instruction Fuzzy Hash: 41711271914248EBDF28CF18C844AE93BE1FF48355F10812AFD5AAB291D738E985CF85
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b1648e0811c9f97d55a3022652a548649fa1c26b9f6cb7626f8a21e4732b448f
                                        • Instruction ID: e9ed1edde03ce079a1eac7925ffd26eceee2e589c91d04c2349d82a358760cac
                                        • Opcode Fuzzy Hash: b1648e0811c9f97d55a3022652a548649fa1c26b9f6cb7626f8a21e4732b448f
                                        • Instruction Fuzzy Hash: 51713471918248EBDF18CF18C844BE93BB1FF44345F10812AFD5AAA291C738E985CF86
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 231398222cbd9f561c647f948b9b3d3c6184bd44b9bf4c4e3e1677bf7cb27c81
                                        • Instruction ID: 372954581a63a42c771a5a1ecf6877848c3696302c905df1bb59de476e0b08a4
                                        • Opcode Fuzzy Hash: 231398222cbd9f561c647f948b9b3d3c6184bd44b9bf4c4e3e1677bf7cb27c81
                                        • Instruction Fuzzy Hash: FB613671904248EBEB28CF18C844BAD3BB1FF44345F10912AFD56AA291D778E985CF86
                                        APIs
                                        • GlobalFree.KERNEL32(?), ref: 00407526
                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,00004000,0042F1E8), ref: 0040752F
                                        • GlobalFree.KERNEL32(?), ref: 0040759E
                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,00004000,0042F1E8), ref: 004075A9
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: Global$AllocFree
                                        • String ID:
                                        • API String ID: 3394109436-0
                                        • Opcode ID: 6fc4b81007277366271f5ed8f4823a6fbaedd18a17911aa1f8adf1f3d20f8d2f
                                        • Instruction ID: 69d61f3c28aa3c4651f1fcdc65fbd76dba6520ab561f69162c86fd3f3c29a3b1
                                        • Opcode Fuzzy Hash: 6fc4b81007277366271f5ed8f4823a6fbaedd18a17911aa1f8adf1f3d20f8d2f
                                        • Instruction Fuzzy Hash: C9514471914248EBDB28CF19C854AAD3BE1FF44355F10812AFD5AAA291C738E981CF85
                                        APIs
                                          • Part of subcall function 00401553: RegOpenKeyExW.KERNEL32(?,00000000,00000022,00000000,?,?), ref: 0040158B
                                        • RegCloseKey.KERNEL32(?), ref: 004029E4
                                        • RegEnumKeyW.ADVAPI32(00000000,00000000,?,00002003), ref: 00402AB6
                                        • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 00402AC9
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: Enum$CloseOpenValue
                                        • String ID:
                                        • API String ID: 167947723-0
                                        • Opcode ID: 71ecbc242c05244eee09d6688f759a3b78646090920a111b31f6a68a443b0d85
                                        • Instruction ID: 95ee22d97734955972c485d9abb9d084f4b44991137fab2cec59741c3fa91784
                                        • Opcode Fuzzy Hash: 71ecbc242c05244eee09d6688f759a3b78646090920a111b31f6a68a443b0d85
                                        • Instruction Fuzzy Hash: 02014471604104BBE7149F64EE89A7B766CEB40358F10443FF546B61D0EAB84A419A69
                                        APIs
                                        • RegOpenKeyExW.KERNEL32(?,?,00000000,?,?,00000002,?,00406A96,80000002,Software\Microsoft\Windows\CurrentVersion,?,Show,Show), ref: 0040605E
                                        • RegQueryValueExW.KERNEL32(?,?,00000000,?,?,?,?,00406A96,80000002,Software\Microsoft\Windows\CurrentVersion,?,Show,Show), ref: 00406080
                                        • RegCloseKey.KERNEL32(?,?,00406A96,80000002,Software\Microsoft\Windows\CurrentVersion,?,Show,Show), ref: 004060A7
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: CloseOpenQueryValue
                                        • String ID:
                                        • API String ID: 3677997916-0
                                        • Opcode ID: ce379d2cd2c6934f93681775daff6b6b388132cfaa10fc4de9bcc8a3fbe1b6f0
                                        • Instruction ID: 98a2f5c40708be4a22a19e2b3dffd551e29741b81bdf7905c269ac5831645af6
                                        • Opcode Fuzzy Hash: ce379d2cd2c6934f93681775daff6b6b388132cfaa10fc4de9bcc8a3fbe1b6f0
                                        • Instruction Fuzzy Hash: F301487125020AAADF21CF64ED05BDB3BE9EF18354F014426FA05E2160E335E964DBA9
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2963785421.000000006F951000.00000020.00000001.01000000.00000007.sdmp, Offset: 6F950000, based on PE: true
                                        • Associated: 00000001.00000002.2963768599.000000006F950000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000001.00000002.2963801682.000000006F953000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000001.00000002.2963817695.000000006F955000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6f950000_setup.jbxd
                                        Similarity
                                        • API ID: ErrorImageLastLoad
                                        • String ID:
                                        • API String ID: 2189606529-0
                                        • Opcode ID: 47c6e2a55ff88f4abad91d69f21c64c254611c6d394fab2ceb1002b6fb32cd3e
                                        • Instruction ID: b2b95f15d7a9a8758c2a7720b2ab57bc783bab6d9b8d4ac30d8de2ed798c5a83
                                        • Opcode Fuzzy Hash: 47c6e2a55ff88f4abad91d69f21c64c254611c6d394fab2ceb1002b6fb32cd3e
                                        • Instruction Fuzzy Hash: 0F517B768087049FEB60DF78D9A0B5937A8FB47328F20452AE404CA2C1DB34E5F9DE95
                                        APIs
                                          • Part of subcall function 00401553: RegOpenKeyExW.KERNEL32(?,00000000,00000022,00000000,?,?), ref: 0040158B
                                        • RegCloseKey.KERNEL32(?), ref: 004029E4
                                        • RegQueryValueExW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,?), ref: 00402A32
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: CloseOpenQueryValue
                                        • String ID:
                                        • API String ID: 3677997916-0
                                        • Opcode ID: e94bd00db104d0a2cf1578d6cca9940a8e39714a5f0dfa19380a7ad9a90a7e54
                                        • Instruction ID: d7a97197237819f4b7492ca0bf04413f91ee399627d725b97b5ce9e5d01a5032
                                        • Opcode Fuzzy Hash: e94bd00db104d0a2cf1578d6cca9940a8e39714a5f0dfa19380a7ad9a90a7e54
                                        • Instruction Fuzzy Hash: 03116371A10204EFDF24DFA4DA495AE76B4EF44344B21843FE446F32D0E6B45B41DB19
                                        APIs
                                        • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013F6
                                        • SendMessageW.USER32(00000402,00000402,00000000), ref: 00401406
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                                        • Instruction ID: d71d45502f518029c3ce7990b7c8d381ac94a1bb539c673c2af025244294d997
                                        • Opcode Fuzzy Hash: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                                        • Instruction Fuzzy Hash: 96F0F471A10220DFD7555B74DD04B273699AB80361F24463BF911F62F1E6B8DC528B4E
                                        APIs
                                        • SendMessageW.USER32(?,0000000B,?), ref: 004030B7
                                        • InvalidateRect.USER32(?), ref: 004030C7
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: InvalidateMessageRectSend
                                        • String ID:
                                        • API String ID: 909852535-0
                                        • Opcode ID: 6221ef138abef0cc7f02eb51ea7237b8e00d2cdf30ab43c4de82fd491b7554a6
                                        • Instruction ID: a2afc3cdb4025c47ae200eb0ee8b495955aac6ae4429a00b614700c75c4af1b0
                                        • Opcode Fuzzy Hash: 6221ef138abef0cc7f02eb51ea7237b8e00d2cdf30ab43c4de82fd491b7554a6
                                        • Instruction Fuzzy Hash: 8FE04672A00109EFDB40DF98FE809AE7B79EB40306B1480BAF102F1060C37A8E00DB28
                                        APIs
                                        • GetFileAttributesW.KERNEL32(00000003,004036BC,004DF0D8,80000000,00000003), ref: 00405FB4
                                        • CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405FD6
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: File$AttributesCreate
                                        • String ID:
                                        • API String ID: 415043291-0
                                        • Opcode ID: bb163b9fe6ad53c4c24c626dc6eb2012a5604aa560a8fbe1d65a356919806daf
                                        • Instruction ID: 0718ebe39a3ec8d134d715fe04010489d3ea4afa24b2ee2dc260a56d563539cd
                                        • Opcode Fuzzy Hash: bb163b9fe6ad53c4c24c626dc6eb2012a5604aa560a8fbe1d65a356919806daf
                                        • Instruction Fuzzy Hash: C9D09E71654202EFEF098F60DE1AF6EBBA2EB94B00F01852CB396540F0DA725819DB15
                                        APIs
                                        • GetFileAttributesW.KERNEL32(?,00406FE2,?,?,?), ref: 00405F94
                                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405FA7
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: AttributesFile
                                        • String ID:
                                        • API String ID: 3188754299-0
                                        • Opcode ID: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                        • Instruction ID: 105455ff1efcd328e2e9ce2036d03e870e7956c14fbc8a42dfb904e2d669a030
                                        • Opcode Fuzzy Hash: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                        • Instruction Fuzzy Hash: D1C012B1404801AAD6000B34DF0881A7B62AB90330B268739B0BAE00F0CB3888A99A19
                                        APIs
                                        • lstrcpynW.KERNEL32(?,?,6CEB1053,?,6CEB1053,?), ref: 6CEB1E62
                                        • GlobalFree.KERNELBASE ref: 6CEB1E72
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2963579894.000000006CEB1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CEB0000, based on PE: true
                                        • Associated: 00000001.00000002.2963521789.000000006CEB0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2963612925.000000006CEB3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2963671204.000000006CEB6000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6ceb0000_setup.jbxd
                                        Similarity
                                        • API ID: FreeGloballstrcpyn
                                        • String ID:
                                        • API String ID: 1459762280-0
                                        • Opcode ID: 32eb3d240f1aa0ee9ab99f5dab5dc4293f8ce28f4668a216e8ba739ac79efe95
                                        • Instruction ID: a56aa23add12f3806dc3cb4eabf67ae28e3c2ab791757c2724998747b8df06f8
                                        • Opcode Fuzzy Hash: 32eb3d240f1aa0ee9ab99f5dab5dc4293f8ce28f4668a216e8ba739ac79efe95
                                        • Instruction Fuzzy Hash: FBF0D432316210DFDB11CEA4CA44B66B3F8BF0A719F20482AF595D7650D730E800CB65
                                        APIs
                                        • lstrcpyW.KERNEL32(?,?,?,6D1012B7,6D103820), ref: 6D10159B
                                        • GlobalFree.KERNEL32 ref: 6D1015AC
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2963717010.000000006D101000.00000020.00000001.01000000.00000008.sdmp, Offset: 6D100000, based on PE: true
                                        • Associated: 00000001.00000002.2963700646.000000006D100000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000001.00000002.2963733206.000000006D102000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000001.00000002.2963749509.000000006D105000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6d100000_setup.jbxd
                                        Similarity
                                        • API ID: FreeGloballstrcpy
                                        • String ID:
                                        • API String ID: 1709915452-0
                                        • Opcode ID: e35a0743984ed89f2c992002b3a7b89bc8a1a4c8c0a43ae879c9298a27dc3f75
                                        • Instruction ID: 926defa7fe8d03c77bc72d682c0927aaaad52ccd7e89e817e9d4007427936b0b
                                        • Opcode Fuzzy Hash: e35a0743984ed89f2c992002b3a7b89bc8a1a4c8c0a43ae879c9298a27dc3f75
                                        • Instruction Fuzzy Hash: 69E01A356102019FDB12AFA4D884B6677F8FF6F315B00892AE456C7254DFB49840CF50
                                        APIs
                                        • RegOpenKeyExW.KERNEL32(?,00000000,00000022,00000000,?,?), ref: 0040158B
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: Open
                                        • String ID:
                                        • API String ID: 71445658-0
                                        • Opcode ID: 152b3ead9943045a115202606b4aa47f0bb9bcdc92ab0ec0580d088b3e521770
                                        • Instruction ID: 320ffdfbdc2962e817d17244dae4d4ae4c6b2856982d8e6d6ae96c218de63f7b
                                        • Opcode Fuzzy Hash: 152b3ead9943045a115202606b4aa47f0bb9bcdc92ab0ec0580d088b3e521770
                                        • Instruction Fuzzy Hash: 40F0AC76650115ABD700DB94DE42EA637DCEB04794F054021BA09EB2A1D675E94087AD
                                        APIs
                                        • ReadFile.KERNEL32(004091D8,00000000,00000000,00000000,0042F1E8,004271E0,00403453,0042F1E8,00004000,?,00000000,?,00403583,00000004,00000000,00000000), ref: 004033A0
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: FileRead
                                        • String ID:
                                        • API String ID: 2738559852-0
                                        • Opcode ID: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                        • Instruction ID: c6c40d3f4f7261540deed743693c79d8b23b6d840c968e3368c6ef78f45d931b
                                        • Opcode Fuzzy Hash: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                        • Instruction Fuzzy Hash: B0E08C32114118BBCB119E929C40AE77B5CEB043A2F008432BE54E9290DA30DA04DBA8
                                        APIs
                                        • VirtualProtect.KERNEL32(6F954020,00000004,00000040,6F954028), ref: 6F952746
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2963785421.000000006F951000.00000020.00000001.01000000.00000007.sdmp, Offset: 6F950000, based on PE: true
                                        • Associated: 00000001.00000002.2963768599.000000006F950000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000001.00000002.2963801682.000000006F953000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000001.00000002.2963817695.000000006F955000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6f950000_setup.jbxd
                                        Similarity
                                        • API ID: ProtectVirtual
                                        • String ID:
                                        • API String ID: 544645111-0
                                        • Opcode ID: 03069635955d140c0ddf2036d2fa3eb24a82ed4efe604fb25fbfd9511b65f147
                                        • Instruction ID: fff53f7ca423a7b0522e56333c4449c2e58f2c1976fee1a18332db34d7d71eb7
                                        • Opcode Fuzzy Hash: 03069635955d140c0ddf2036d2fa3eb24a82ed4efe604fb25fbfd9511b65f147
                                        • Instruction Fuzzy Hash: 8EE0AEB190DB409EEBD0CF3CD864B023AF0B75B326F21452AE248D62C0E230913CAF19
                                        APIs
                                          • Part of subcall function 00406199: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,00403920,004D70C8,-00000002,00403B6B), ref: 004061FC
                                          • Part of subcall function 00406199: CharNextW.USER32(?,?,?,00000000), ref: 0040620B
                                          • Part of subcall function 00406199: CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,00403920,004D70C8,-00000002,00403B6B), ref: 00406210
                                          • Part of subcall function 00406199: CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,00403920,004D70C8,-00000002,00403B6B), ref: 00406224
                                        • CreateDirectoryW.KERNEL32(004D70C8,00000000,004D70C8,004D70C8,004D70C8,-00000002,00403B6B), ref: 00403935
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: Char$Next$CreateDirectoryPrev
                                        • String ID:
                                        • API String ID: 4115351271-0
                                        • Opcode ID: f4befcb6106095d9d06c1b39d32d6196981096d2805c3ce9a3ed86820828cee4
                                        • Instruction ID: 5ea94fba79f3f21d5ad716e498331d560289176cc766b9bc92f8e515fc4ca6d3
                                        • Opcode Fuzzy Hash: f4befcb6106095d9d06c1b39d32d6196981096d2805c3ce9a3ed86820828cee4
                                        • Instruction Fuzzy Hash: 14D0C922147D3136C592376A7D06FCF090D8F0279AB0A407BF949B91CA5FAC4B8285FE
                                        APIs
                                          • Part of subcall function 00406966: GetVersion.KERNEL32(0043B238,?,00000000,00405109,0043B238,00000000,00000000,00000000,00000000), ref: 00406A37
                                        • SetDlgItemTextW.USER32(?,?,00000000), ref: 00403EB9
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: ItemTextVersion
                                        • String ID:
                                        • API String ID: 1287519508-0
                                        • Opcode ID: f2b4361e4d7c3881d6a85ce52f9b05fc3d04f2b44ca1c8ee376b4dc84f376a48
                                        • Instruction ID: 6a48e5d75812bfa7c4a09cce31339b59d49678da8d37b8d2777bd432dc215d8f
                                        • Opcode Fuzzy Hash: f2b4361e4d7c3881d6a85ce52f9b05fc3d04f2b44ca1c8ee376b4dc84f376a48
                                        • Instruction Fuzzy Hash: BCC08C71008300BFD241AB14CC02F0FB39CEF90315F00C42EB05CA01D1C63584208A26
                                        APIs
                                        • SendMessageW.USER32(00000028,?,00000001,00405914), ref: 00403F06
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: 8ef0c84af5b69eb6e5c04aecb335cbd5d798096170d60dc049d97623b8df0028
                                        • Instruction ID: f61ffac979fbda5733e9df3da2bdae5977773398d3d4f9e0d67d11d125479468
                                        • Opcode Fuzzy Hash: 8ef0c84af5b69eb6e5c04aecb335cbd5d798096170d60dc049d97623b8df0028
                                        • Instruction Fuzzy Hash: EFB09235181A00AADE614B00DF0AF457A62A764701F008079B245640B0CAB200E0DB08
                                        APIs
                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,0040389E,?), ref: 004033C9
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: FilePointer
                                        • String ID:
                                        • API String ID: 973152223-0
                                        • Opcode ID: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                        • Instruction ID: da19c3e449f5d10d282cbd9bcc1d8f2f369397d5e390659c1e8fea63e82898b0
                                        • Opcode Fuzzy Hash: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                        • Instruction Fuzzy Hash: 0CB09231140204AEDA214B109E05F067A21FB94700F208824B2A0380F086711420EA0C
                                        APIs
                                        • GetDlgItem.USER32(?,00000403), ref: 0040528F
                                        • GetDlgItem.USER32(?,000003EE), ref: 0040529E
                                        • GetClientRect.USER32(?,?), ref: 004052F6
                                        • GetSystemMetrics.USER32(00000015), ref: 004052FE
                                        • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 0040531F
                                        • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405330
                                        • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405343
                                        • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405351
                                        • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405364
                                        • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405386
                                        • ShowWindow.USER32(?,00000008), ref: 0040539A
                                        • GetDlgItem.USER32(?,000003EC), ref: 004053BB
                                        • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004053CB
                                        • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004053E0
                                        • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004053EC
                                        • GetDlgItem.USER32(?,000003F8), ref: 004052AD
                                          • Part of subcall function 00403EF8: SendMessageW.USER32(00000028,?,00000001,00405914), ref: 00403F06
                                          • Part of subcall function 00406966: GetVersion.KERNEL32(0043B238,?,00000000,00405109,0043B238,00000000,00000000,00000000,00000000), ref: 00406A37
                                          • Part of subcall function 00406404: lstrlenW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsiB326.tmp\nsDialogs.dll" (overwriteflag=1),00406FDA,RMDir: RemoveDirectory("%s"),?,?,?), ref: 00406411
                                          • Part of subcall function 00406404: wvsprintfW.USER32(00000000,?,?), ref: 00406428
                                        • GetDlgItem.USER32(?,000003EC), ref: 0040540B
                                        • CreateThread.KERNEL32(00000000,00000000,Function_000051A7,00000000), ref: 00405419
                                        • CloseHandle.KERNEL32(00000000), ref: 00405420
                                        • ShowWindow.USER32(00000000), ref: 00405447
                                        • ShowWindow.USER32(?,00000008), ref: 0040544C
                                        • ShowWindow.USER32(00000008), ref: 00405493
                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054C5
                                        • CreatePopupMenu.USER32 ref: 004054D6
                                        • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004054EB
                                        • GetWindowRect.USER32(?,?), ref: 004054FE
                                        • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405520
                                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040555B
                                        • OpenClipboard.USER32(00000000), ref: 0040556B
                                        • EmptyClipboard.USER32 ref: 00405571
                                        • GlobalAlloc.KERNEL32(00000042,00000000,?,?,00000000,?,00000000), ref: 0040557D
                                        • GlobalLock.KERNEL32(00000000), ref: 00405587
                                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040559B
                                        • GlobalUnlock.KERNEL32(00000000), ref: 004055BD
                                        • SetClipboardData.USER32(0000000D,00000000), ref: 004055C8
                                        • CloseClipboard.USER32 ref: 004055CE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlockVersionlstrlenwvsprintf
                                        • String ID: New install of "%s" to "%s"$PrD${
                                        • API String ID: 2110491804-2508554099
                                        • Opcode ID: 11dd572734fdcc9cd5cd232e0012044d14f9f12b4c407c8bff242ac5f06050a0
                                        • Instruction ID: 894ce410e52ba77d1203c8417793cf84406b50b5a57a64d435ed06079733cfed
                                        • Opcode Fuzzy Hash: 11dd572734fdcc9cd5cd232e0012044d14f9f12b4c407c8bff242ac5f06050a0
                                        • Instruction Fuzzy Hash: 25B15B70800608FFDB119F60DE85EAE7B79FB44355F00813AFA45BA1A0CBB98A519F59
                                        APIs
                                        • GetDlgItem.USER32(?,000003F9), ref: 00404AF3
                                        • GetDlgItem.USER32(?,00000408), ref: 00404B00
                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B4F
                                        • LoadBitmapW.USER32(0000006E), ref: 00404B62
                                        • SetWindowLongW.USER32(?,000000FC,Function_00004A2C), ref: 00404B7C
                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404B8E
                                        • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404BA2
                                        • SendMessageW.USER32(?,00001109,00000002), ref: 00404BB8
                                        • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404BC4
                                        • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404BD4
                                        • DeleteObject.GDI32(?), ref: 00404BD9
                                        • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C04
                                        • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C10
                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CB1
                                        • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00404CD4
                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CE5
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00404D0F
                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D1E
                                        • ShowWindow.USER32(?,00000005), ref: 00404D2F
                                        • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E2D
                                        • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404E88
                                        • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404E9D
                                        • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404EC1
                                        • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404EE7
                                        • ImageList_Destroy.COMCTL32(?), ref: 00404EFC
                                        • GlobalFree.KERNEL32(?), ref: 00404F0C
                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404F7C
                                        • SendMessageW.USER32(?,00001102,?,?), ref: 0040502A
                                        • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405039
                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00405059
                                        • ShowWindow.USER32(?,00000000), ref: 004050A9
                                        • GetDlgItem.USER32(?,000003FE), ref: 004050B4
                                        • ShowWindow.USER32(00000000), ref: 004050BB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                        • String ID: $ @$M$N
                                        • API String ID: 1638840714-3479655940
                                        • Opcode ID: d727e73693a3646156034d8b388d51c81f548d2c458721deff1c8d70a90ce4be
                                        • Instruction ID: ce2321f3f297f3fbf41fbef512ec3ccbffa26c3bd4bbee077dcac70070df60a7
                                        • Opcode Fuzzy Hash: d727e73693a3646156034d8b388d51c81f548d2c458721deff1c8d70a90ce4be
                                        • Instruction Fuzzy Hash: CC025AB0900209AFDF209FA4DD45AAE7BB5FB84314F10413AF615B62E1D7B88E91DF58
                                        APIs
                                        • GetDlgItem.USER32(?,000003F0), ref: 00404659
                                        • IsDlgButtonChecked.USER32(?,000003F0), ref: 00404667
                                        • GetDlgItem.USER32(?,000003FB), ref: 00404687
                                        • GetAsyncKeyState.USER32(00000010), ref: 0040468E
                                        • GetDlgItem.USER32(?,000003F0), ref: 004046A3
                                        • ShowWindow.USER32(00000000,00000008,?,00000008,000000E0), ref: 004046B4
                                        • SetWindowTextW.USER32(?,?), ref: 004046E3
                                        • SHBrowseForFolderW.SHELL32(?), ref: 0040479D
                                        • lstrcmpiW.KERNEL32(Show,00447250,00000000,?,?), ref: 004047DA
                                        • lstrcatW.KERNEL32(?,Show), ref: 004047E6
                                        • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004047F6
                                        • CoTaskMemFree.OLE32(00000000), ref: 004047A8
                                          • Part of subcall function 00405DE4: GetDlgItemTextW.USER32(00000001,00000001,00002004,004040E1), ref: 00405DF7
                                          • Part of subcall function 00406199: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,00403920,004D70C8,-00000002,00403B6B), ref: 004061FC
                                          • Part of subcall function 00406199: CharNextW.USER32(?,?,?,00000000), ref: 0040620B
                                          • Part of subcall function 00406199: CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,00403920,004D70C8,-00000002,00403B6B), ref: 00406210
                                          • Part of subcall function 00406199: CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,00403920,004D70C8,-00000002,00403B6B), ref: 00406224
                                          • Part of subcall function 00403FD4: lstrcatW.KERNEL32(00000000,00000000,0046A560,004C70A8,install.log,00405BFC,004C70A8,004C70A8,004D30C0,00447250,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447250,00000000,00000006), ref: 00403FEF
                                        • GetDiskFreeSpaceW.KERNEL32(00443248,?,?,0000040F,?,00443248,00443248,?,00000000,00443248,?,?,000003FB,?), ref: 004048B9
                                        • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004048D4
                                          • Part of subcall function 00406966: GetVersion.KERNEL32(0043B238,?,00000000,00405109,0043B238,00000000,00000000,00000000,00000000), ref: 00406A37
                                        • SetDlgItemTextW.USER32(00000000,00000400,0040931C), ref: 0040494D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: Item$CharText$Next$FreeWindowlstrcat$AsyncBrowseButtonCheckedDiskFolderPrevShowSpaceStateTaskVersionlstrcmpi
                                        • String ID: A$H2D$PrD$Show
                                        • API String ID: 3347642858-1305367516
                                        • Opcode ID: 563870873e52b2e0a3cdb2865a86a3a579f559fabb233f753f9e034d7750c1c3
                                        • Instruction ID: b0b3c754d12335248bfc7248cfd16ee1359f8a3788a1353c85d9a997a926ad80
                                        • Opcode Fuzzy Hash: 563870873e52b2e0a3cdb2865a86a3a579f559fabb233f753f9e034d7750c1c3
                                        • Instruction Fuzzy Hash: A9B184B1900205ABDF11AFA1CD85AAF7BB8EF84315F10843BF705B72D1D7789A418B69
                                        APIs
                                        • CreateFileW.KERNEL32(00000080,80000000,00000001,00000000,00000003,00000080,00000000,00000000), ref: 00407057
                                        • ReadFile.KERNEL32(00000000,?,0000000C,?,00000000), ref: 00407091
                                        • ReadFile.KERNEL32(00000080,?,00000010,?,00000000), ref: 0040710A
                                        • lstrcpynA.KERNEL32(ys@,?,00000005), ref: 00407116
                                        • lstrcmpA.KERNEL32(name,ys@), ref: 00407128
                                        • CloseHandle.KERNEL32(00000080), ref: 00407347
                                          • Part of subcall function 00406404: lstrlenW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsiB326.tmp\nsDialogs.dll" (overwriteflag=1),00406FDA,RMDir: RemoveDirectory("%s"),?,?,?), ref: 00406411
                                          • Part of subcall function 00406404: wvsprintfW.USER32(00000000,?,?), ref: 00406428
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: File$Read$CloseCreateHandlelstrcmplstrcpynlstrlenwvsprintf
                                        • String ID: %s: failed opening file "%s"$GetTTFNameString$name$ys@
                                        • API String ID: 1916479912-237794762
                                        • Opcode ID: 0715d5e28a72504c5accadc8c16e1503c0709497f081ba3703715ed6f8973fce
                                        • Instruction ID: a1a783c1589cc2114d60951c227a61dfc271eaab027b45fbce8ea6a895ba6447
                                        • Opcode Fuzzy Hash: 0715d5e28a72504c5accadc8c16e1503c0709497f081ba3703715ed6f8973fce
                                        • Instruction Fuzzy Hash: DC91C170D1412DAADF04EBE5C9909FEBBB9EF48301F00406AF592F7290E6385A05EB75
                                        APIs
                                        • CoCreateInstance.OLE32(00409B54,?,00000001,00409B34,?), ref: 0040257E
                                        Strings
                                        • CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d, xrefs: 00402560
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: CreateInstance
                                        • String ID: CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
                                        • API String ID: 542301482-1377821865
                                        • Opcode ID: 72f94041dc772d4d9adb032695cde8a813159a995c234bec806880be495e7e30
                                        • Instruction ID: 8d6901ad6a64056badc23f129c971549208a59aeacbb917aec9ee0bd4eb55a7e
                                        • Opcode Fuzzy Hash: 72f94041dc772d4d9adb032695cde8a813159a995c234bec806880be495e7e30
                                        • Instruction Fuzzy Hash: F9414E74A00205AFCB04EFA0CC99EAE7B79EF48314B20456AF915EB2E1C679A941CB54
                                        APIs
                                        • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402E27
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: FileFindFirst
                                        • String ID:
                                        • API String ID: 1974802433-0
                                        • Opcode ID: 5d3f04000a08ab209f02e52df63f4d3c88daa36f7871475c2abf4056f963e15b
                                        • Instruction ID: 0be6497265b52c9a603a3734c231496b9e64610ba4981580ad79d755a9c283ef
                                        • Opcode Fuzzy Hash: 5d3f04000a08ab209f02e52df63f4d3c88daa36f7871475c2abf4056f963e15b
                                        • Instruction Fuzzy Hash: D1E06D36600200ABC700EBB49D85ABE736C9F01329F20457BF146F20D1D6B88A51976E
                                        APIs
                                        • GlobalAlloc.KERNEL32(00000040,00000FA0), ref: 00406520
                                        • lstrlenW.KERNEL32(?), ref: 0040652D
                                        • GetVersionExW.KERNEL32(?), ref: 0040658B
                                          • Part of subcall function 0040618C: CharUpperW.USER32(?,00406562,?), ref: 00406192
                                        • LoadLibraryA.KERNEL32(PSAPI.DLL), ref: 004065CA
                                        • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 004065E9
                                        • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004065F3
                                        • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004065FE
                                        • FreeLibrary.KERNEL32(00000000), ref: 00406635
                                        • GlobalFree.KERNEL32(?), ref: 0040663E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: AddressProc$FreeGlobalLibrary$AllocCharLoadUpperVersionlstrlen
                                        • String ID: CreateToolhelp32Snapshot$EnumProcessModules$EnumProcesses$GetModuleBaseNameW$Kernel32.DLL$Module32FirstW$Module32NextW$PSAPI.DLL$Process32FirstW$Process32NextW$Unknown
                                        • API String ID: 20674999-2124804629
                                        • Opcode ID: 40333aef454c47322eec6f7f9158de98af9d91ef9b06c0be04974d32da86a69b
                                        • Instruction ID: 8cac56bd889a6922fafa0e84fcbe499284ae1ad590ea9cc90dd23bfef8a88dc9
                                        • Opcode Fuzzy Hash: 40333aef454c47322eec6f7f9158de98af9d91ef9b06c0be04974d32da86a69b
                                        • Instruction Fuzzy Hash: 18918671900219EBDF10AFA5CD88AAE7AB8FF45341F11807AE546F2290DB788A55CF58
                                        APIs
                                        • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004042CD
                                        • GetDlgItem.USER32(?,000003E8), ref: 004042E1
                                        • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004042FE
                                        • GetSysColor.USER32(?), ref: 0040430F
                                        • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 0040431D
                                        • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040432B
                                        • lstrlenW.KERNEL32(?), ref: 00404336
                                        • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404343
                                        • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404352
                                          • Part of subcall function 0040412A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 00404141
                                          • Part of subcall function 0040412A: GlobalAlloc.KERNEL32(00000040,00000001), ref: 00404150
                                          • Part of subcall function 0040412A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000001,00000000,00000000), ref: 00404164
                                        • GetDlgItem.USER32(?,0000040A), ref: 004043AA
                                        • SendMessageW.USER32(00000000), ref: 004043B1
                                        • GetDlgItem.USER32(?,000003E8), ref: 004043DE
                                        • SendMessageW.USER32(00000000,0000044B,00000000,?), ref: 00404421
                                        • LoadCursorW.USER32(00000000,00007F02), ref: 0040442F
                                        • SetCursor.USER32(00000000), ref: 00404432
                                        • ShellExecuteW.SHELL32(0000070B,open,00462540,00000000,00000000,00000001), ref: 00404447
                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00404453
                                        • SetCursor.USER32(00000000), ref: 00404456
                                        • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404485
                                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404497
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: MessageSend$Cursor$Item$ByteCharLoadMultiWide$AllocButtonCheckColorExecuteGlobalShelllstrlen
                                        • String ID: @%F$N$open
                                        • API String ID: 3928313111-3849437375
                                        • Opcode ID: 4ce468f3699d88ed665c706f7775ee9aa6dc059267c0d14d93e3607c8b30f664
                                        • Instruction ID: 5e7a78df94721a13c93f88c26dc0e1e940185c2092e6ea244a57a3ff362b188b
                                        • Opcode Fuzzy Hash: 4ce468f3699d88ed665c706f7775ee9aa6dc059267c0d14d93e3607c8b30f664
                                        • Instruction Fuzzy Hash: 9D71B1B1900609BFDF109F60DD85E6A7B69FB84315F00813AFA04B62D1C778A991CF99
                                        APIs
                                        • GlobalAlloc.KERNEL32(00000040,00000800), ref: 6CEB1126
                                        • GlobalAlloc.KERNEL32(00000040,00000800), ref: 6CEB112D
                                        • GlobalAlloc.KERNEL32(00000040,00000800), ref: 6CEB1135
                                        • GlobalAlloc.KERNEL32(00000040,00000800), ref: 6CEB113D
                                          • Part of subcall function 6CEB1E34: lstrcpynW.KERNEL32(?,?,6CEB1053,?,6CEB1053,?), ref: 6CEB1E62
                                          • Part of subcall function 6CEB1E34: GlobalFree.KERNELBASE ref: 6CEB1E72
                                        • lstrcmpiW.KERNEL32(?,save,?,00000400,00000000,00000400,?,00000400), ref: 6CEB11A0
                                        • GetFileAttributesW.KERNEL32(00000000), ref: 6CEB11AC
                                        • lstrcpyW.KERNEL32(?,00000000), ref: 6CEB11BF
                                        • lstrcpyW.KERNEL32(?,All Files|*.*), ref: 6CEB11DC
                                        • CharNextW.USER32(?), ref: 6CEB11FB
                                        • GetCurrentDirectoryW.KERNEL32(00000004,?), ref: 6CEB1212
                                        • GetSaveFileNameW.COMDLG32(00000058), ref: 6CEB1220
                                        • GetOpenFileNameW.COMDLG32(00000058), ref: 6CEB1228
                                        • CommDlgExtendedError.COMDLG32 ref: 6CEB1235
                                        • GetSaveFileNameW.COMDLG32(00000058), ref: 6CEB124F
                                        • GetOpenFileNameW.COMDLG32(00000058), ref: 6CEB1257
                                        • SetCurrentDirectoryW.KERNEL32(?,6CEB30FC), ref: 6CEB126E
                                        • GlobalFree.KERNEL32(00000000), ref: 6CEB127B
                                        • GlobalFree.KERNEL32(?), ref: 6CEB127E
                                        • GlobalFree.KERNEL32(?), ref: 6CEB1283
                                        • GlobalFree.KERNEL32(?), ref: 6CEB1288
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2963579894.000000006CEB1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CEB0000, based on PE: true
                                        • Associated: 00000001.00000002.2963521789.000000006CEB0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2963612925.000000006CEB3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2963671204.000000006CEB6000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6ceb0000_setup.jbxd
                                        Similarity
                                        • API ID: Global$FileFree$AllocName$CurrentDirectoryOpenSavelstrcpy$AttributesCharCommErrorExtendedNextlstrcmpilstrcpyn
                                        • String ID: All Files|*.*$X$save
                                        • API String ID: 406688562-3147001704
                                        • Opcode ID: b4115f3a2c9d1593f5ae35e4dc97ebba4e01851dc9463f6e7995f3085ebb7f27
                                        • Instruction ID: 805a4f59ec2a811441010f764844e74d453a4618751bb4c916108e53ec3a0431
                                        • Opcode Fuzzy Hash: b4115f3a2c9d1593f5ae35e4dc97ebba4e01851dc9463f6e7995f3085ebb7f27
                                        • Instruction Fuzzy Hash: 47415E71E00618ABCB119FE5CE4AAAE7FB8EF06725F204019F509F7280DB34D945DBA5
                                        APIs
                                        • lstrcpyW.KERNEL32(0045B2D8,NUL,?,00000000,?,00000000,?,00406DF1,000000F1,000000F1,00000001,0040700F,?,00000000,000000F1,?), ref: 00406C0A
                                        • CloseHandle.KERNEL32(00000000,000000F1,00000000,00000001,?,00000000,?,00406DF1,000000F1,000000F1,00000001,0040700F,?,00000000,000000F1,?), ref: 00406C29
                                        • GetShortPathNameW.KERNEL32(000000F1,0045B2D8,00000400), ref: 00406C32
                                          • Part of subcall function 00405F16: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406D34,00000000,[Rename]), ref: 00405F26
                                          • Part of subcall function 00405F16: lstrlenA.KERNEL32(?,?,00000000,00406D34,00000000,[Rename]), ref: 00405F58
                                        • GetShortPathNameW.KERNEL32(000000F1,00460930,00000400), ref: 00406C53
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,0045B2D8,000000FF,0045BAD8,00000400,00000000,00000000,?,00000000,?,00406DF1,000000F1,000000F1,00000001,0040700F), ref: 00406C7C
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00460930,000000FF,0045C128,00000400,00000000,00000000,?,00000000,?,00406DF1,000000F1,000000F1,00000001,0040700F), ref: 00406C94
                                        • wsprintfA.USER32 ref: 00406CAE
                                        • GetFileSize.KERNEL32(00000000,00000000,00460930,C0000000,00000004,00460930,?,?,00000000,000000F1,?), ref: 00406CE6
                                        • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406CF5
                                        • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406D11
                                        • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 00406D41
                                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,0045C528,00000000,-0000000A,004098AC,00000000,[Rename]), ref: 00406D98
                                          • Part of subcall function 00405FB0: GetFileAttributesW.KERNEL32(00000003,004036BC,004DF0D8,80000000,00000003), ref: 00405FB4
                                          • Part of subcall function 00405FB0: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405FD6
                                        • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00406DAC
                                        • GlobalFree.KERNEL32(00000000), ref: 00406DB3
                                        • CloseHandle.KERNEL32(?), ref: 00406DBD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: File$ByteCharCloseGlobalHandleMultiNamePathShortWidelstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                                        • String ID: %s=%s$0F$NUL$[Rename]
                                        • API String ID: 565278875-2063020953
                                        • Opcode ID: e0014d3f174d201f701c5d3f5aee3fb449f0ed8f00eb016f1380403eef9c3722
                                        • Instruction ID: 01698a087521ae3c061db779a59327618d621d7377b5f04441123a8e0743360b
                                        • Opcode Fuzzy Hash: e0014d3f174d201f701c5d3f5aee3fb449f0ed8f00eb016f1380403eef9c3722
                                        • Instruction Fuzzy Hash: B6413732204209BFC2202BA1DD88D6F3AACDF86764B16043EF546F22D1DA3DD819867D
                                        APIs
                                        • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                        • BeginPaint.USER32(?,?), ref: 00401047
                                        • GetClientRect.USER32(?,?), ref: 0040105B
                                        • CreateBrushIndirect.GDI32(00000000), ref: 004010D8
                                        • FillRect.USER32(00000000,?,00000000), ref: 004010ED
                                        • DeleteObject.GDI32(?), ref: 004010F6
                                        • CreateFontIndirectW.GDI32(?), ref: 0040110E
                                        • SetBkMode.GDI32(00000000,00000001), ref: 0040112F
                                        • SetTextColor.GDI32(00000000,000000FF), ref: 00401139
                                        • SelectObject.GDI32(00000000,?), ref: 00401149
                                        • DrawTextW.USER32(00000000,0046ADC0,000000FF,00000010,00000820), ref: 0040115F
                                        • SelectObject.GDI32(00000000,00000000), ref: 00401169
                                        • DeleteObject.GDI32(?), ref: 0040116E
                                        • EndPaint.USER32(?,?), ref: 00401177
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                        • String ID: F
                                        • API String ID: 941294808-1304234792
                                        • Opcode ID: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                                        • Instruction ID: e7530e13063599d95e155ed3b2c7b7521dfa2668d538c4695d9c695e9582dc0d
                                        • Opcode Fuzzy Hash: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                                        • Instruction Fuzzy Hash: 01516C71400209AFCB058F95DE459AF7FB9FF45311F00802EF992AA1A0CB78DA55DFA4
                                        APIs
                                        • SendMessageW.USER32(?,?,?), ref: 6CEB1558
                                        • GetDlgItem.USER32(?,?), ref: 6CEB156B
                                        • GetWindowTextW.USER32(?,?,00000400), ref: 6CEB1693
                                        • DrawTextW.USER32(?,?,000000FF,?,00000414), ref: 6CEB16B4
                                        • GetWindowLongW.USER32(?,000000EB), ref: 6CEB16FF
                                        • SetTextColor.GDI32(?,00FF0000), ref: 6CEB1711
                                        • DrawTextW.USER32(?,?,000000FF,00000000,?), ref: 6CEB172B
                                        • DrawFocusRect.USER32(?,00000010), ref: 6CEB174C
                                        • RemovePropW.USER32(00000000,NSIS: nsControl pointer property), ref: 6CEB1770
                                        Strings
                                        • NSIS: nsControl pointer property, xrefs: 6CEB1768
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2963579894.000000006CEB1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CEB0000, based on PE: true
                                        • Associated: 00000001.00000002.2963521789.000000006CEB0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2963612925.000000006CEB3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2963671204.000000006CEB6000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6ceb0000_setup.jbxd
                                        Similarity
                                        • API ID: Text$Draw$Window$ColorFocusItemLongMessagePropRectRemoveSend
                                        • String ID: NSIS: nsControl pointer property
                                        • API String ID: 2331901045-1714965683
                                        • Opcode ID: e5b129a8899fa837c13c8d8bb7e0655ea4a4f962bc19f9191adfe6b9e37971aa
                                        • Instruction ID: 4477cc54e3e12478ea19617248d51b1cb60ef4430f94cd64486ee80827543c2d
                                        • Opcode Fuzzy Hash: e5b129a8899fa837c13c8d8bb7e0655ea4a4f962bc19f9191adfe6b9e37971aa
                                        • Instruction Fuzzy Hash: 0B71DC715002199BDF118F94CF84BBA3BB9FF02328F348569E861B76A5E770D881CB91
                                        APIs
                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,000000F0), ref: 00402EA9
                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,000000F0), ref: 00402EC5
                                        • GlobalFree.KERNEL32(FFFFFD66), ref: 00402EFE
                                        • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,000000F0), ref: 00402F10
                                        • GlobalFree.KERNEL32(00000000), ref: 00402F17
                                        • CloseHandle.KERNEL32(?,?,?,?,?,000000F0), ref: 00402F2F
                                        • DeleteFileW.KERNEL32(?), ref: 00402F56
                                        Strings
                                        • created uninstaller: %d, "%s", xrefs: 00402F3B
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                        • String ID: created uninstaller: %d, "%s"
                                        • API String ID: 3294113728-3145124454
                                        • Opcode ID: 0a618a7d4b0e64108f75f3258fcb03e0fd23d7f93013cef41cd65d9edaf2d68b
                                        • Instruction ID: 57b2aa6120a879797d080cb9b9733de2ac9adc2ca39637b5dc0b79c3231e6313
                                        • Opcode Fuzzy Hash: 0a618a7d4b0e64108f75f3258fcb03e0fd23d7f93013cef41cd65d9edaf2d68b
                                        • Instruction Fuzzy Hash: BA31C272800115BBCB11AFA8CE45DAF7FB8EF08324F10023AF655B61E1DB794E419B98
                                        APIs
                                        • CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,00406435,00000000), ref: 0040625F
                                        • GetFileAttributesW.KERNEL32(0046A560,?,00000000,00000000,?,?,00406435,00000000), ref: 0040629D
                                        • WriteFile.KERNEL32(00000000,000000FF,00000002,00000000,00000000,0046A560,40000000,00000004), ref: 004062D6
                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,0046A560,40000000,00000004), ref: 004062E2
                                        • lstrcatW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsiB326.tmp\nsDialogs.dll" (overwriteflag=1),004096A8,?,00000000,00000000,?,?,00406435,00000000), ref: 004062FC
                                        • lstrlenW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsiB326.tmp\nsDialogs.dll" (overwriteflag=1),?,?,00406435,00000000), ref: 00406303
                                        • WriteFile.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsiB326.tmp\nsDialogs.dll" (overwriteflag=1),00000000,00406435,00000000,?,?,00406435,00000000), ref: 00406318
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: File$Write$AttributesCloseHandlePointerlstrcatlstrlen
                                        • String ID: File: skipped: "C:\Users\user\AppData\Local\Temp\nsiB326.tmp\nsDialogs.dll" (overwriteflag=1)
                                        • API String ID: 3734993849-3833766187
                                        • Opcode ID: 9fa50d1adb4a17e963d4e637509519975a2aeadd9521b9408314cb2d14ea49f5
                                        • Instruction ID: e74be36d315582b52cf8810fbf669e52dd667146d2b91da865e79faa34e4d15c
                                        • Opcode Fuzzy Hash: 9fa50d1adb4a17e963d4e637509519975a2aeadd9521b9408314cb2d14ea49f5
                                        • Instruction Fuzzy Hash: 1A21C271500240FBD710AFA4DD88DA73728EB41374B25C33AFA26B61E0E7784995CBAD
                                        APIs
                                        • GetWindowLongW.USER32(?,000000EB), ref: 00403F44
                                        • GetSysColor.USER32(00000000), ref: 00403F60
                                        • SetTextColor.GDI32(?,00000000), ref: 00403F6C
                                        • SetBkMode.GDI32(?,?), ref: 00403F78
                                        • GetSysColor.USER32(?), ref: 00403F8B
                                        • SetBkColor.GDI32(?,?), ref: 00403F9B
                                        • DeleteObject.GDI32(?), ref: 00403FB5
                                        • CreateBrushIndirect.GDI32(?), ref: 00403FBF
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                        • String ID:
                                        • API String ID: 2320649405-0
                                        • Opcode ID: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                                        • Instruction ID: d1251e89d25211f29e22ed1568f44ff950bb01ff11d0b068515cddd17a3a0421
                                        • Opcode Fuzzy Hash: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                                        • Instruction Fuzzy Hash: 26115171904705ABC7219F78DE08B5BBFF8AF01715B05893DE886E22A0D738EA488B54
                                        APIs
                                        • StringFromGUID2.OLE32(?,00000000,?,?,?,00000000,6F952B4A,00000000), ref: 6F952499
                                          • Part of subcall function 6F95164F: lstrcpyW.KERNEL32(00000018,00000000,?,6F9511CD,-0000002E,00000000), ref: 6F951674
                                        • wsprintfW.USER32 ref: 6F9524E8
                                        • GlobalFree.KERNEL32(?), ref: 6F952516
                                        • GlobalFree.KERNEL32(00000000), ref: 6F95253F
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2963785421.000000006F951000.00000020.00000001.01000000.00000007.sdmp, Offset: 6F950000, based on PE: true
                                        • Associated: 00000001.00000002.2963768599.000000006F950000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000001.00000002.2963801682.000000006F953000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000001.00000002.2963817695.000000006F955000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6f950000_setup.jbxd
                                        Similarity
                                        • API ID: FreeGlobal$FromStringlstrcpywsprintf
                                        • String ID:
                                        • API String ID: 2435812281-0
                                        • Opcode ID: 823c930d612151a78f766b6447548f1a8828d8accf2fd89adf7ef31d03aa968f
                                        • Instruction ID: 560acae36e457f2707ccaac3fe4a634f1855311bae93c2096d8cf911c55e0734
                                        • Opcode Fuzzy Hash: 823c930d612151a78f766b6447548f1a8828d8accf2fd89adf7ef31d03aa968f
                                        • Instruction Fuzzy Hash: D531AD71208605ABEB20DF788D44C66B7BEFF86364B110615FA51D61D0DB32E879DF20
                                        APIs
                                        • lstrlenW.KERNEL32(0043B238,00000000,00000000,00000000), ref: 0040510A
                                        • lstrlenW.KERNEL32(00403361,0043B238,00000000,00000000,00000000), ref: 0040511A
                                        • lstrcatW.KERNEL32(0043B238,00403361,00403361,0043B238,00000000,00000000,00000000), ref: 0040512D
                                        • SetWindowTextW.USER32(0043B238,0043B238), ref: 0040513F
                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405165
                                        • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040517F
                                        • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040518D
                                          • Part of subcall function 00406966: GetVersion.KERNEL32(0043B238,?,00000000,00405109,0043B238,00000000,00000000,00000000,00000000), ref: 00406A37
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: MessageSend$lstrlen$TextVersionWindowlstrcat
                                        • String ID:
                                        • API String ID: 2740478559-0
                                        • Opcode ID: 5e5d700da742a3d6d340dab77f0fdb3d38b9a8a0b9685d170e55f73d5ea00312
                                        • Instruction ID: 8b6ba25b3567668a3d709078441474e2f94ee86325c17f48cbe0efe0ef4ad692
                                        • Opcode Fuzzy Hash: 5e5d700da742a3d6d340dab77f0fdb3d38b9a8a0b9685d170e55f73d5ea00312
                                        • Instruction Fuzzy Hash: 2021AF71C00618BECF129FA5DD84A9FBFB5EF48314F10813AF908BA290D7784A509F99
                                        APIs
                                          • Part of subcall function 00406404: lstrlenW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsiB326.tmp\nsDialogs.dll" (overwriteflag=1),00406FDA,RMDir: RemoveDirectory("%s"),?,?,?), ref: 00406411
                                          • Part of subcall function 00406404: wvsprintfW.USER32(00000000,?,?), ref: 00406428
                                          • Part of subcall function 004050D2: lstrlenW.KERNEL32(0043B238,00000000,00000000,00000000), ref: 0040510A
                                          • Part of subcall function 004050D2: lstrlenW.KERNEL32(00403361,0043B238,00000000,00000000,00000000), ref: 0040511A
                                          • Part of subcall function 004050D2: lstrcatW.KERNEL32(0043B238,00403361,00403361,0043B238,00000000,00000000,00000000), ref: 0040512D
                                          • Part of subcall function 004050D2: SetWindowTextW.USER32(0043B238,0043B238), ref: 0040513F
                                          • Part of subcall function 004050D2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405165
                                          • Part of subcall function 004050D2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040517F
                                          • Part of subcall function 004050D2: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040518D
                                          • Part of subcall function 00405D9F: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457288,Error launching installer), ref: 00405DC4
                                          • Part of subcall function 00405D9F: CloseHandle.KERNEL32(?), ref: 00405DD1
                                        • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00402288
                                        • GetExitCodeProcess.KERNEL32(?,?), ref: 00402298
                                        • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00402AF2
                                        Strings
                                        • Exec: command="%s", xrefs: 00402241
                                        • Exec: success ("%s"), xrefs: 00402263
                                        • Exec: failed createprocess ("%s"), xrefs: 004022C2
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: MessageSendlstrlen$CloseHandleProcess$CodeCreateExitObjectSingleTextWaitWindowlstrcatwvsprintf
                                        • String ID: Exec: command="%s"$Exec: failed createprocess ("%s")$Exec: success ("%s")
                                        • API String ID: 2014279497-3433828417
                                        • Opcode ID: 404b34b6f9a5d66614f209ce3f2e21ed740509744429fc0c4a3a0e9cd81617b9
                                        • Instruction ID: e2ade92b8e8beb45c5288a0de0c91049ee5acc48a81ea59d75a15a872706837f
                                        • Opcode Fuzzy Hash: 404b34b6f9a5d66614f209ce3f2e21ed740509744429fc0c4a3a0e9cd81617b9
                                        • Instruction Fuzzy Hash: 6E11C232504115EBDB11AFE0DE4AAAE3AA5EF00324B24807FF502B50D1CABC4952DBAD
                                        APIs
                                        • DestroyWindow.USER32(00000000,00000000), ref: 00403302
                                        • GetTickCount.KERNEL32 ref: 00403320
                                        • wsprintfW.USER32 ref: 0040334E
                                          • Part of subcall function 004050D2: lstrlenW.KERNEL32(0043B238,00000000,00000000,00000000), ref: 0040510A
                                          • Part of subcall function 004050D2: lstrlenW.KERNEL32(00403361,0043B238,00000000,00000000,00000000), ref: 0040511A
                                          • Part of subcall function 004050D2: lstrcatW.KERNEL32(0043B238,00403361,00403361,0043B238,00000000,00000000,00000000), ref: 0040512D
                                          • Part of subcall function 004050D2: SetWindowTextW.USER32(0043B238,0043B238), ref: 0040513F
                                          • Part of subcall function 004050D2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405165
                                          • Part of subcall function 004050D2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040517F
                                          • Part of subcall function 004050D2: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040518D
                                        • CreateDialogParamW.USER32(0000006F,00000000,00403268,00000000), ref: 00403372
                                        • ShowWindow.USER32(00000000,00000005), ref: 00403380
                                          • Part of subcall function 0040324C: MulDiv.KERNEL32(0000EE0D,00000064,00011746), ref: 00403261
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                        • String ID: ... %d%%
                                        • API String ID: 722711167-2449383134
                                        • Opcode ID: 96c2a724128113feeb2dba6851438288d590ea99915262e15a0359641590fb8d
                                        • Instruction ID: 7cd9398b14f8ade0b0fcf895a8ee56c548843aa05ddcd0bd44aa2535a42f6e46
                                        • Opcode Fuzzy Hash: 96c2a724128113feeb2dba6851438288d590ea99915262e15a0359641590fb8d
                                        • Instruction Fuzzy Hash: 5C011E30445610EBC721AFA4EE89A9E7E6CEB05706B14413FFE45B11E0CB785A858BAD
                                        APIs
                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 004049C9
                                        • GetMessagePos.USER32 ref: 004049D1
                                        • ScreenToClient.USER32(?,?), ref: 004049E9
                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 004049FB
                                        • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404A21
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: Message$Send$ClientScreen
                                        • String ID: f
                                        • API String ID: 41195575-1993550816
                                        • Opcode ID: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                                        • Instruction ID: 27f0785cdc5f68d0066a8e7a1d7e71ccbf55bb55bf6eb3414b3d297d9b41ad7b
                                        • Opcode Fuzzy Hash: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                                        • Instruction Fuzzy Hash: 81015271A4021CBADB00DB94DD85BEEBBB8AF54711F10412ABA50B61D0D7B45A058BA5
                                        APIs
                                        • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00403286
                                        • wsprintfW.USER32 ref: 004032BA
                                        • SetWindowTextW.USER32(?,?), ref: 004032CA
                                        • SetDlgItemTextW.USER32(?,00000406,?), ref: 004032DC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: Text$ItemTimerWindowwsprintf
                                        • String ID: unpacking data: %d%%$verifying installer: %d%%
                                        • API String ID: 1451636040-1158693248
                                        • Opcode ID: dee786f0fd9cdd3f8c0fb31302e7a2050583a55b44ce5b4915f07339fad65024
                                        • Instruction ID: bfe6641e6ef7cc7b54ecc28104225e3c2b90f8d7ad59e83b9ab1f1d0914f92a4
                                        • Opcode Fuzzy Hash: dee786f0fd9cdd3f8c0fb31302e7a2050583a55b44ce5b4915f07339fad65024
                                        • Instruction Fuzzy Hash: CAF0317050010DABDF209F61DD4ABAA3B69EB10349F00807EFA46B91D1CBB986598F99
                                        APIs
                                        • lstrlenW.KERNEL32(00447250,%u.%u%s%s,?,00000000,00000000,?,FFFFFFDC,00000000,?,000000DF,00447250,?), ref: 004045AA
                                        • wsprintfW.USER32 ref: 004045B7
                                        • SetDlgItemTextW.USER32(?,00447250,000000DF), ref: 004045CA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: ItemTextlstrlenwsprintf
                                        • String ID: %u.%u%s%s$PrD
                                        • API String ID: 3540041739-1882686053
                                        • Opcode ID: 737b4354604b69ed49da521882824f7eacafb09e8a5ec505cdcd8fffed629745
                                        • Instruction ID: 7880dc7fd7a5c0d30aad69498be6142e37c8297d3eb74307a1111cd8f0787a4b
                                        • Opcode Fuzzy Hash: 737b4354604b69ed49da521882824f7eacafb09e8a5ec505cdcd8fffed629745
                                        • Instruction Fuzzy Hash: B211BD72B002043BCB10AA799D45E9E725EEBC5374F10423BF619F30E0E6788B268669
                                        APIs
                                        • CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,00403920,004D70C8,-00000002,00403B6B), ref: 004061FC
                                        • CharNextW.USER32(?,?,?,00000000), ref: 0040620B
                                        • CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,00403920,004D70C8,-00000002,00403B6B), ref: 00406210
                                        • CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,00403920,004D70C8,-00000002,00403B6B), ref: 00406224
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: Char$Next$Prev
                                        • String ID: *?|<>/":
                                        • API String ID: 589700163-165019052
                                        • Opcode ID: 1d09d8738e5602742b586041446eac83eeb7776b51f76f2679a8714e99ae6001
                                        • Instruction ID: 45f9d4f3dcf6299a058aa2101cc88fb20adbc263b608899fab4a560a17f1b311
                                        • Opcode Fuzzy Hash: 1d09d8738e5602742b586041446eac83eeb7776b51f76f2679a8714e99ae6001
                                        • Instruction Fuzzy Hash: 0E11C82580062195CB307B698C4097B76E8AE55790756443FECC6F72C2EB7C9CA1C2AD
                                        APIs
                                          • Part of subcall function 6CEB1E34: lstrcpynW.KERNEL32(?,?,6CEB1053,?,6CEB1053,?), ref: 6CEB1E62
                                          • Part of subcall function 6CEB1E34: GlobalFree.KERNELBASE ref: 6CEB1E72
                                        • SHBrowseForFolderW.SHELL32(?), ref: 6CEB10B4
                                          • Part of subcall function 6CEB1E83: GlobalAlloc.KERNEL32(00000040,?,?,6CEB1061,error,?,00000104,?,00000400), ref: 6CEB1E99
                                          • Part of subcall function 6CEB1E83: lstrcpynW.KERNEL32(00000004,00000104,?,6CEB1061,error,?,00000104,?,00000400), ref: 6CEB1EAF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2963579894.000000006CEB1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CEB0000, based on PE: true
                                        • Associated: 00000001.00000002.2963521789.000000006CEB0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2963612925.000000006CEB3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2963671204.000000006CEB6000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6ceb0000_setup.jbxd
                                        Similarity
                                        • API ID: Globallstrcpyn$AllocBrowseFolderFree
                                        • String ID: E$error
                                        • API String ID: 1025582028-2359134700
                                        • Opcode ID: dcff8f47313ef6cc832419fc907acd8f69dbebdcd4e84f8d18c1920692ba4dc3
                                        • Instruction ID: 7acf966266b1db8b8b301f73c3c2a5091e016cf54e3737eab8e4cd6f5a0161c9
                                        • Opcode Fuzzy Hash: dcff8f47313ef6cc832419fc907acd8f69dbebdcd4e84f8d18c1920692ba4dc3
                                        • Instruction Fuzzy Hash: 2B211A729012199BDB11DFE4DA45AFE77B8AF09329F20415AE904F2640DB34DB488FA5
                                        APIs
                                        • GetDC.USER32(?), ref: 00402100
                                        • GetDeviceCaps.GDI32(00000000), ref: 00402107
                                        • MulDiv.KERNEL32(00000000,00000000), ref: 00402117
                                          • Part of subcall function 00406966: GetVersion.KERNEL32(0043B238,?,00000000,00405109,0043B238,00000000,00000000,00000000,00000000), ref: 00406A37
                                        • CreateFontIndirectW.GDI32(0041F0F0), ref: 0040216A
                                          • Part of subcall function 004060B2: wsprintfW.USER32 ref: 004060BF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: CapsCreateDeviceFontIndirectVersionwsprintf
                                        • String ID: MS Shell Dlg
                                        • API String ID: 1599320355-76309092
                                        • Opcode ID: 600f7a39d98bd087a3fa73ce05d1baab7dfc82f361ba09517c53b02978263ded
                                        • Instruction ID: b852d753667c04f7f8403c46551348dceb61737b9063f8de5ee225c6b1b91025
                                        • Opcode Fuzzy Hash: 600f7a39d98bd087a3fa73ce05d1baab7dfc82f361ba09517c53b02978263ded
                                        • Instruction Fuzzy Hash: B6018472A44650EFE701DBB4ED46BDA3FA4A725315F10C43AF541F61E3C678444A8B2D
                                        APIs
                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004014BF
                                        • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 004014FB
                                        • RegCloseKey.ADVAPI32(?), ref: 00401504
                                        • RegCloseKey.ADVAPI32(?), ref: 00401529
                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00401547
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: Close$DeleteEnumOpen
                                        • String ID:
                                        • API String ID: 1912718029-0
                                        • Opcode ID: b0e9a248c90bc4b219d82b224dbd9c03938a54c8e2e96de430ad7f277ae3d019
                                        • Instruction ID: 926a3fd6ba00d5bb97a34cee5b023bebcb5cad9bd68352020a6bff24d96e3699
                                        • Opcode Fuzzy Hash: b0e9a248c90bc4b219d82b224dbd9c03938a54c8e2e96de430ad7f277ae3d019
                                        • Instruction Fuzzy Hash: C3114972500008FFDF119F90EE85DAA3B7AFB54348F00403AFA06B5170D7759E549A29
                                        APIs
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000808,6F9522A8,?,00000808), ref: 6F951967
                                        • GlobalAlloc.KERNEL32(00000040,00000000,?,00000808,6F9522A8,?,00000808), ref: 6F95196E
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000808,6F9522A8,?,00000808), ref: 6F951982
                                        • GetProcAddress.KERNEL32(6F9522A8,00000000), ref: 6F951989
                                        • GlobalFree.KERNEL32(00000000), ref: 6F951992
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2963785421.000000006F951000.00000020.00000001.01000000.00000007.sdmp, Offset: 6F950000, based on PE: true
                                        • Associated: 00000001.00000002.2963768599.000000006F950000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000001.00000002.2963801682.000000006F953000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000001.00000002.2963817695.000000006F955000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6f950000_setup.jbxd
                                        Similarity
                                        • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                        • String ID:
                                        • API String ID: 1148316912-0
                                        • Opcode ID: 741c5c2255eeea481356ab8b2fc802dd06dc9de8519a549a3447fbae579d8253
                                        • Instruction ID: f9b2c96d3378c016b695fe3bdbf6488b2e54c0c821fd0ebb3d28d1d3b9834e68
                                        • Opcode Fuzzy Hash: 741c5c2255eeea481356ab8b2fc802dd06dc9de8519a549a3447fbae579d8253
                                        • Instruction Fuzzy Hash: 4DF0127210A6347BDA2116B78C4DC9BFF9DDF4B2F5B110211F2189119086615C25DAF1
                                        APIs
                                          • Part of subcall function 00401553: RegOpenKeyExW.KERNEL32(?,00000000,00000022,00000000,?,?), ref: 0040158B
                                        • RegCloseKey.ADVAPI32(00000000), ref: 0040282E
                                        • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040280E
                                          • Part of subcall function 00406404: lstrlenW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsiB326.tmp\nsDialogs.dll" (overwriteflag=1),00406FDA,RMDir: RemoveDirectory("%s"),?,?,?), ref: 00406411
                                          • Part of subcall function 00406404: wvsprintfW.USER32(00000000,?,?), ref: 00406428
                                        Strings
                                        • DeleteRegKey: "%s\%s", xrefs: 00402843
                                        • DeleteRegValue: "%s\%s" "%s", xrefs: 00402820
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: CloseDeleteOpenValuelstrlenwvsprintf
                                        • String ID: DeleteRegKey: "%s\%s"$DeleteRegValue: "%s\%s" "%s"
                                        • API String ID: 1697273262-1764544995
                                        • Opcode ID: aaf22d11741691a3bc273f426292239cee4cbca831d097ea8dede634d4dfb8ac
                                        • Instruction ID: 374c3c3b6278fb1c2beb817405795feef458ca782ed8724690096ffa3588498b
                                        • Opcode Fuzzy Hash: aaf22d11741691a3bc273f426292239cee4cbca831d097ea8dede634d4dfb8ac
                                        • Instruction Fuzzy Hash: BA11C472A00111ABDB10BFA5DD4AABE3AA4EB00354F10443FF50AB61D2D6788A50869D
                                        APIs
                                        • IsWindowVisible.USER32(?), ref: 00404A62
                                        • CallWindowProcW.USER32(?,00000200,?,?), ref: 00404AD0
                                          • Part of subcall function 00403F0F: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403F21
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: Window$CallMessageProcSendVisible
                                        • String ID: $PrD
                                        • API String ID: 3748168415-683102269
                                        • Opcode ID: ce2b7f03bb1297be540aa9391ce969a8123c951ec3d3b567541a8540a2105a5e
                                        • Instruction ID: 796ae977d962bd2fb4eacbf10a92dd87c42d9844f52e2d7c2fef9845d3ca3dba
                                        • Opcode Fuzzy Hash: ce2b7f03bb1297be540aa9391ce969a8123c951ec3d3b567541a8540a2105a5e
                                        • Instruction Fuzzy Hash: 5C118FB1684208ABDF219F61DC40E9B3668BF84369F00803BFA0579192C37C8D519FAD
                                        APIs
                                          • Part of subcall function 00406404: lstrlenW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsiB326.tmp\nsDialogs.dll" (overwriteflag=1),00406FDA,RMDir: RemoveDirectory("%s"),?,?,?), ref: 00406411
                                          • Part of subcall function 00406404: wvsprintfW.USER32(00000000,?,?), ref: 00406428
                                          • Part of subcall function 00406436: FindFirstFileW.KERNEL32(004572D0,0045BED8,004572D0,0040692F,004572D0), ref: 00406441
                                          • Part of subcall function 00406436: FindClose.KERNEL32(00000000), ref: 0040644D
                                        • lstrlenW.KERNEL32 ref: 004026B4
                                        • lstrlenW.KERNEL32(00000000), ref: 004026C1
                                        • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004026EC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: lstrlen$FileFind$CloseFirstOperationwvsprintf
                                        • String ID: CopyFiles "%s"->"%s"
                                        • API String ID: 2577523808-3778932970
                                        • Opcode ID: 882c708a540b1b6e40822fa95cd5da4fbfff49ab246fdf6d56c9b4995ea32088
                                        • Instruction ID: c5bc72853f8421da741d5617367b4824c82a14243d7aff776d7bb0801c040b7d
                                        • Opcode Fuzzy Hash: 882c708a540b1b6e40822fa95cd5da4fbfff49ab246fdf6d56c9b4995ea32088
                                        • Instruction Fuzzy Hash: 94114F71D00214AACB10BBBA994699FBBBCEF04314F10843FE506F7292E6B985118B59
                                        APIs
                                        • wsprintfW.USER32 ref: 004063D9
                                        • lstrcatW.KERNEL32(00000000,...,?,?,?,00402991,?,00000100,004130D8,00000000,?,?,004130D8,0000C018), ref: 004063FC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: lstrcatwsprintf
                                        • String ID: %02x%c$...
                                        • API String ID: 3065427908-1057055748
                                        • Opcode ID: 85df159639746478037a26c2e7b04b1779f54c746bce4477c4c8f2341ae68883
                                        • Instruction ID: 49b15afb37c1c3cbf89587828b9fbcb2b479192470e11d1a121134da54663489
                                        • Opcode Fuzzy Hash: 85df159639746478037a26c2e7b04b1779f54c746bce4477c4c8f2341ae68883
                                        • Instruction Fuzzy Hash: 1201D232510219AFCB01CF58CD85A9EBBB9EB44704F218136F856F3280D6749EA48BA8
                                        APIs
                                          • Part of subcall function 0040616A: lstrcpynW.KERNEL32(?,?,00002004,00403A51,0046ADC0,NSIS Error), ref: 00406177
                                        • WritePrivateProfileStringW.KERNEL32(?,?,?,00000000), ref: 0040278C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: PrivateProfileStringWritelstrcpyn
                                        • String ID: <RM>$Show$WriteINIStr: wrote [%s] %s=%s in %s
                                        • API String ID: 247603264-2407876207
                                        • Opcode ID: 76e29fefa2fcb51dbbedf7035b1aedb250ed7f53bb72e54dbf76baee11489292
                                        • Instruction ID: 42bd81ef3d59a899a4afa764d38de83c0885f73ff342ba6e601af17a918a1269
                                        • Opcode Fuzzy Hash: 76e29fefa2fcb51dbbedf7035b1aedb250ed7f53bb72e54dbf76baee11489292
                                        • Instruction Fuzzy Hash: D301FF75D00319BACB107FA58D859AF7978AF09345F10403FF11A761E3D7B84A508BAD
                                        APIs
                                        • OleInitialize.OLE32(00000000), ref: 004051B7
                                          • Part of subcall function 00403F0F: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403F21
                                        • OleUninitialize.OLE32(00000404,00000000), ref: 00405205
                                          • Part of subcall function 00406404: lstrlenW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsiB326.tmp\nsDialogs.dll" (overwriteflag=1),00406FDA,RMDir: RemoveDirectory("%s"),?,?,?), ref: 00406411
                                          • Part of subcall function 00406404: wvsprintfW.USER32(00000000,?,?), ref: 00406428
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: InitializeMessageSendUninitializelstrlenwvsprintf
                                        • String ID: Section: "%s"$Skipping section: "%s"
                                        • API String ID: 2266616436-4211696005
                                        • Opcode ID: 9faf3df30d8341890c428f77cd47873b5149034e1ce4e1928ca9eebd2d14ad04
                                        • Instruction ID: b096c94640e0452ae870d043d7677ea343cceb766e7301fd1a80b39db48c4c93
                                        • Opcode Fuzzy Hash: 9faf3df30d8341890c428f77cd47873b5149034e1ce4e1928ca9eebd2d14ad04
                                        • Instruction Fuzzy Hash: 54F0D6329047009BE2106754AD02B5777A4DF84714F14003FFE44721E2DAF848418A1D
                                        APIs
                                          • Part of subcall function 6F951581: GlobalAlloc.KERNEL32(00000040,?,6F9515BA,?,?,6F95185F,?,6F951017), ref: 6F95158B
                                        • lstrcpyW.KERNEL32(00000000,error,00000000,6F95287B,00000000), ref: 6F951929
                                        • wsprintfW.USER32 ref: 6F951942
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2963785421.000000006F951000.00000020.00000001.01000000.00000007.sdmp, Offset: 6F950000, based on PE: true
                                        • Associated: 00000001.00000002.2963768599.000000006F950000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000001.00000002.2963801682.000000006F953000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000001.00000002.2963817695.000000006F955000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6f950000_setup.jbxd
                                        Similarity
                                        • API ID: AllocGloballstrcpywsprintf
                                        • String ID: callback%d$error
                                        • API String ID: 2689062267-1307476583
                                        • Opcode ID: 9c263bdf6e1f7c93364d5ce8f93764716ea2bee38dc5fd1dbcd5f8fbffd07099
                                        • Instruction ID: e299194c8e17fa5ce1e9e87d789b3ecc787d4e5690344645c752c4e203f06571
                                        • Opcode Fuzzy Hash: 9c263bdf6e1f7c93364d5ce8f93764716ea2bee38dc5fd1dbcd5f8fbffd07099
                                        • Instruction Fuzzy Hash: D2E04F30608610A78621DE38ADA5D8A777A6F4333CB100665F719DA1D1C722D5FA8A86
                                        APIs
                                          • Part of subcall function 6CEB13F8: GetPropW.USER32(?,NSIS: nsControl pointer property), ref: 6CEB1401
                                        • LoadCursorW.USER32(00000000,00007F89), ref: 6CEB14CE
                                        • SetCursor.USER32(00000000,?,?,?), ref: 6CEB14D5
                                        • CallWindowProcW.USER32(?,?,00000020,?,?), ref: 6CEB14F2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2963579894.000000006CEB1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CEB0000, based on PE: true
                                        • Associated: 00000001.00000002.2963521789.000000006CEB0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2963612925.000000006CEB3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2963671204.000000006CEB6000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6ceb0000_setup.jbxd
                                        Similarity
                                        • API ID: Cursor$CallLoadProcPropWindow
                                        • String ID:
                                        • API String ID: 1635134901-3916222277
                                        • Opcode ID: 111cc8c592568a91baf559c8e089258f47f67e6ed2d4d6a023b882c52a608928
                                        • Instruction ID: a72ccf35e1e2da35f9bf136470379711b3d2bfd5c62962428269db35b047c230
                                        • Opcode Fuzzy Hash: 111cc8c592568a91baf559c8e089258f47f67e6ed2d4d6a023b882c52a608928
                                        • Instruction Fuzzy Hash: FCE0653214424ABBCF011FD0CE09AB93B75FF09356F108030F95999550CB71C0209B61
                                        APIs
                                          • Part of subcall function 6F9515A3: lstrcpyW.KERNEL32(00000000,?,?,?,6F95185F,?,6F951017), ref: 6F9515C1
                                          • Part of subcall function 6F9515A3: GlobalFree.KERNEL32 ref: 6F9515D2
                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 6F95118F
                                        • GlobalFree.KERNEL32(00000000), ref: 6F9511D0
                                        • GlobalFree.KERNEL32(00000000), ref: 6F9511F0
                                        • GlobalFree.KERNEL32(00000000), ref: 6F951204
                                        • GlobalFree.KERNEL32(?), ref: 6F95122E
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2963785421.000000006F951000.00000020.00000001.01000000.00000007.sdmp, Offset: 6F950000, based on PE: true
                                        • Associated: 00000001.00000002.2963768599.000000006F950000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000001.00000002.2963801682.000000006F953000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000001.00000002.2963817695.000000006F955000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6f950000_setup.jbxd
                                        Similarity
                                        • API ID: Global$Free$Alloclstrcpy
                                        • String ID:
                                        • API String ID: 852173138-0
                                        • Opcode ID: 82087f7781fe3d296ff3312cd44e44a3a04f5410752ae22d7bcc630598470b4b
                                        • Instruction ID: 316d472b779a79e379fd7571b5abf471de0850da898e216005dd7db4de5b653f
                                        • Opcode Fuzzy Hash: 82087f7781fe3d296ff3312cd44e44a3a04f5410752ae22d7bcc630598470b4b
                                        • Instruction Fuzzy Hash: 1C31C3B28082009FEB60CF7CCC44A6A7BF8FB47264B200556E854D76D0E735E8B49E20
                                        APIs
                                          • Part of subcall function 6F9515A3: lstrcpyW.KERNEL32(00000000,?,?,?,6F95185F,?,6F951017), ref: 6F9515C1
                                          • Part of subcall function 6F9515A3: GlobalFree.KERNEL32 ref: 6F9515D2
                                        • GlobalFree.KERNEL32(?), ref: 6F951A04
                                        • GlobalFree.KERNEL32(?), ref: 6F951A9C
                                        • GlobalFree.KERNEL32(?), ref: 6F951AA1
                                        • __alldvrm.LIBCMT ref: 6F951ACB
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2963785421.000000006F951000.00000020.00000001.01000000.00000007.sdmp, Offset: 6F950000, based on PE: true
                                        • Associated: 00000001.00000002.2963768599.000000006F950000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000001.00000002.2963801682.000000006F953000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000001.00000002.2963817695.000000006F955000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6f950000_setup.jbxd
                                        Similarity
                                        • API ID: FreeGlobal$__alldvrmlstrcpy
                                        • String ID:
                                        • API String ID: 1811517867-0
                                        • Opcode ID: 30f89d33481757dd4014b647400f95ccd9f521134b74788e087700d2097ea101
                                        • Instruction ID: a642c6a6be5a80771a78e6cedf304b59059f2247557daba0f8f8837f28aae8c7
                                        • Opcode Fuzzy Hash: 30f89d33481757dd4014b647400f95ccd9f521134b74788e087700d2097ea101
                                        • Instruction Fuzzy Hash: 6C512331D04208AB9BA2DFF8C5809ADB7B9EF87354B118257D818971D4E735EFF08A51
                                        APIs
                                        • lstrlenW.KERNEL32(?,00000000,00000400,?,00000400,?,74DEF380), ref: 6CEB129A
                                        • CharPrevW.USER32(?,00000000,?,74DEF380), ref: 6CEB12A5
                                        • MulDiv.KERNEL32(00000000,00000000,00000064), ref: 6CEB12C6
                                        • MapDialogRect.USER32(?,?), ref: 6CEB12EB
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2963579894.000000006CEB1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CEB0000, based on PE: true
                                        • Associated: 00000001.00000002.2963521789.000000006CEB0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2963612925.000000006CEB3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2963671204.000000006CEB6000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6ceb0000_setup.jbxd
                                        Similarity
                                        • API ID: CharDialogPrevRectlstrlen
                                        • String ID:
                                        • API String ID: 3411278111-0
                                        • Opcode ID: ecceb995367189cd757dc8ca8a1d32b810f02145516abab2c89cfab4c19b6b7b
                                        • Instruction ID: 8aa5f0766edfcf5643907a88fbd365f8218049bfc14191b6f9d223836c558895
                                        • Opcode Fuzzy Hash: ecceb995367189cd757dc8ca8a1d32b810f02145516abab2c89cfab4c19b6b7b
                                        • Instruction Fuzzy Hash: B101C871D00A25DBCB119F99CE44ABEBBFCEF46325B110116F801F3600E730D901CA94
                                        APIs
                                          • Part of subcall function 6F951C1B: GlobalFree.KERNEL32(?), ref: 6F951E69
                                          • Part of subcall function 6F951C1B: GlobalFree.KERNELBASE(?), ref: 6F951E6E
                                          • Part of subcall function 6F951C1B: GlobalFree.KERNEL32(?), ref: 6F951E73
                                        • GlobalFree.KERNEL32(00000000), ref: 6F952868
                                          • Part of subcall function 6F9515E0: GlobalAlloc.KERNEL32(00000040,?,?,6F9518AA,?), ref: 6F9515F6
                                          • Part of subcall function 6F9515E0: lstrcpynW.KERNEL32(00000004,?,?,6F9518AA,?), ref: 6F95160C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2963785421.000000006F951000.00000020.00000001.01000000.00000007.sdmp, Offset: 6F950000, based on PE: true
                                        • Associated: 00000001.00000002.2963768599.000000006F950000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000001.00000002.2963801682.000000006F953000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000001.00000002.2963817695.000000006F955000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6f950000_setup.jbxd
                                        Similarity
                                        • API ID: Global$Free$Alloclstrcpyn
                                        • String ID: error
                                        • API String ID: 4250884139-1574812785
                                        • Opcode ID: 60e10450fc4c4e8d87e150fb883463678494fbb0559c5f7c2db204f1b3cf254d
                                        • Instruction ID: 94c860814ed71601deade4170bbe406d724e495d6311dc8494d31e9e68ecb8a4
                                        • Opcode Fuzzy Hash: 60e10450fc4c4e8d87e150fb883463678494fbb0559c5f7c2db204f1b3cf254d
                                        • Instruction Fuzzy Hash: 2901A17240C700ABD768DFB8D844B4A7BE8AF533B8F10051AE3449A1D1DB70E4B58E62
                                        APIs
                                        • CallWindowProcW.USER32(?,?,?,?), ref: 6CEB146D
                                        • DestroyWindow.USER32 ref: 6CEB1484
                                        • GetProcessHeap.KERNEL32(00000000), ref: 6CEB1491
                                        • HeapFree.KERNEL32(00000000), ref: 6CEB1498
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2963579894.000000006CEB1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CEB0000, based on PE: true
                                        • Associated: 00000001.00000002.2963521789.000000006CEB0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2963612925.000000006CEB3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000001.00000002.2963671204.000000006CEB6000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6ceb0000_setup.jbxd
                                        Similarity
                                        • API ID: HeapWindow$CallDestroyFreeProcProcess
                                        • String ID:
                                        • API String ID: 1278960361-0
                                        • Opcode ID: c3a61fe784675a362b653c08bc999b4187401ea447230f0955d6c2c366213f1b
                                        • Instruction ID: cc5dd87b96e1075ada01958642e9d69951d2b1998ce8cbd8738d3a0401b1e1c3
                                        • Opcode Fuzzy Hash: c3a61fe784675a362b653c08bc999b4187401ea447230f0955d6c2c366213f1b
                                        • Instruction Fuzzy Hash: 3E017C32704209EFCF128F95DE08AB97B79FB4A336B218126FA1A92250C730C415DB99
                                        APIs
                                          • Part of subcall function 00407033: CreateFileW.KERNEL32(00000080,80000000,00000001,00000000,00000003,00000080,00000000,00000000), ref: 00407057
                                        • lstrcpynW.KERNEL32(?,?,00000009,00000000), ref: 0040739A
                                        • lstrcmpW.KERNEL32(?,Version ), ref: 004073AB
                                        • lstrcpynW.KERNEL32(?,?,?), ref: 004073C2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: lstrcpyn$CreateFilelstrcmp
                                        • String ID: Version
                                        • API String ID: 512980652-315105994
                                        • Opcode ID: 5b254390c235843b3cd14036e60a35d0405450d943fe7c22a996b54282ed20ac
                                        • Instruction ID: be0c1bc54e1f5d3dac358994bef49e147f417753078ca6f75dbba3536d9e97a2
                                        • Opcode Fuzzy Hash: 5b254390c235843b3cd14036e60a35d0405450d943fe7c22a996b54282ed20ac
                                        • Instruction Fuzzy Hash: 68F08172A0021CABDB109AA49D46EDA777CEB44700F000076FA00F6180E6B5AE058BA5
                                        APIs
                                        • GlobalAlloc.KERNEL32(00000040,00002004,00000000,?,?,00402449,?,?,?,00000008,00000001,000000F0), ref: 004064D1
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00002004,00000000,00000000,?,?,00402449,?,?,?,00000008,00000001), ref: 004064E7
                                        • GetProcAddress.KERNEL32(?,00000000), ref: 004064F6
                                        • GlobalFree.KERNEL32(00000000), ref: 004064FF
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: Global$AddressAllocByteCharFreeMultiProcWide
                                        • String ID:
                                        • API String ID: 2883127279-0
                                        • Opcode ID: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                                        • Instruction ID: cca72bce24a91bf59807d1cc254d6b8728fe87be69838ce7ea74a844989b610b
                                        • Opcode Fuzzy Hash: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                                        • Instruction Fuzzy Hash: 68E0D8312001107BE2101B269E8CD677EADDFCA7B2B05013EF685F11A0CE308C11D638
                                        APIs
                                          • Part of subcall function 004050D2: lstrlenW.KERNEL32(0043B238,00000000,00000000,00000000), ref: 0040510A
                                          • Part of subcall function 004050D2: lstrlenW.KERNEL32(00403361,0043B238,00000000,00000000,00000000), ref: 0040511A
                                          • Part of subcall function 004050D2: lstrcatW.KERNEL32(0043B238,00403361,00403361,0043B238,00000000,00000000,00000000), ref: 0040512D
                                          • Part of subcall function 004050D2: SetWindowTextW.USER32(0043B238,0043B238), ref: 0040513F
                                          • Part of subcall function 004050D2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405165
                                          • Part of subcall function 004050D2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040517F
                                          • Part of subcall function 004050D2: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040518D
                                        • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,004CB0B0,?), ref: 00402202
                                          • Part of subcall function 00406404: lstrlenW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsiB326.tmp\nsDialogs.dll" (overwriteflag=1),00406FDA,RMDir: RemoveDirectory("%s"),?,?,?), ref: 00406411
                                          • Part of subcall function 00406404: wvsprintfW.USER32(00000000,?,?), ref: 00406428
                                        Strings
                                        • ExecShell: success ("%s": file:"%s" params:"%s"), xrefs: 00402226
                                        • ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d, xrefs: 00402211
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: MessageSendlstrlen$ExecuteShellTextWindowlstrcatwvsprintf
                                        • String ID: ExecShell: success ("%s": file:"%s" params:"%s")$ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d
                                        • API String ID: 3156913733-2180253247
                                        • Opcode ID: d319e8e5f0c4e342665e30996792c29846561ab42c4375d59b2148f7763d891f
                                        • Instruction ID: 385da8b202b2a045014f9446d3cad8c85c99a9e265c35722db0b8e87639932c1
                                        • Opcode Fuzzy Hash: d319e8e5f0c4e342665e30996792c29846561ab42c4375d59b2148f7763d891f
                                        • Instruction Fuzzy Hash: C5018FB2B40214B6D72077B69C87F7B2A9CDB41758B20443BF642F60E3E5BD8851927D
                                        APIs
                                        • GetPrivateProfileStringW.KERNEL32(00000000,00000000,?,?,00002003,00000000), ref: 004027CD
                                        • lstrcmpW.KERNEL32(?,?,?,00002003,00000000,000000DD,00000012,00000001), ref: 004027D8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: PrivateProfileStringlstrcmp
                                        • String ID: !N~
                                        • API String ID: 623250636-529124213
                                        • Opcode ID: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                                        • Instruction ID: 7cd271610f6b1cb64eb4c57d825f56a096f62725fe87e34e9129affe44791136
                                        • Opcode Fuzzy Hash: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                                        • Instruction Fuzzy Hash: 37E0E571500208ABDB00BBA0DE85DAE7BBCAF05304F14443AF641F71E3EA7459028718
                                        APIs
                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457288,Error launching installer), ref: 00405DC4
                                        • CloseHandle.KERNEL32(?), ref: 00405DD1
                                        Strings
                                        • Error launching installer, xrefs: 00405DA8
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: CloseCreateHandleProcess
                                        • String ID: Error launching installer
                                        • API String ID: 3712363035-66219284
                                        • Opcode ID: 2afcd463f825584facbc8802dab800c5bb1591f62b8a6ee26e2c87f99b5cd2cd
                                        • Instruction ID: 382474dafc83c3ab62cfa3b3aa405e4b9d7c85dbe04cfe36e17f81e43d348e98
                                        • Opcode Fuzzy Hash: 2afcd463f825584facbc8802dab800c5bb1591f62b8a6ee26e2c87f99b5cd2cd
                                        • Instruction Fuzzy Hash: 6BE0EC70510309AFEB009B64ED0997B7BBCFB00305F508576BD51E2661D779D9148A68
                                        APIs
                                        • lstrlenW.KERNEL32(File: skipped: "C:\Users\user\AppData\Local\Temp\nsiB326.tmp\nsDialogs.dll" (overwriteflag=1),00406FDA,RMDir: RemoveDirectory("%s"),?,?,?), ref: 00406411
                                        • wvsprintfW.USER32(00000000,?,?), ref: 00406428
                                          • Part of subcall function 00406248: CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,00406435,00000000), ref: 0040625F
                                        Strings
                                        • File: skipped: "C:\Users\user\AppData\Local\Temp\nsiB326.tmp\nsDialogs.dll" (overwriteflag=1), xrefs: 00406406, 0040640B
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: CloseHandlelstrlenwvsprintf
                                        • String ID: File: skipped: "C:\Users\user\AppData\Local\Temp\nsiB326.tmp\nsDialogs.dll" (overwriteflag=1)
                                        • API String ID: 3509786178-3833766187
                                        • Opcode ID: 1d2697fad80eb9d0b70210806a91cde17483bf3f8fbb3d9bc72772a253d3c35e
                                        • Instruction ID: 2283ea6708b2d64b9e6789b455a10468216e6ae22039c90fe2b3791cf276606a
                                        • Opcode Fuzzy Hash: 1d2697fad80eb9d0b70210806a91cde17483bf3f8fbb3d9bc72772a253d3c35e
                                        • Instruction Fuzzy Hash: 3ED05E34060316BACA006BA0DD09A997764FBE0384F50052EF443C2070FA748004C70A
                                        APIs
                                        • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406D34,00000000,[Rename]), ref: 00405F26
                                        • lstrcmpiA.KERNEL32(?,?), ref: 00405F3E
                                        • CharNextA.USER32(?,?,00000000,00406D34,00000000,[Rename]), ref: 00405F4F
                                        • lstrlenA.KERNEL32(?,?,00000000,00406D34,00000000,[Rename]), ref: 00405F58
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2961628258.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.2961592171.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961693223.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961742545.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000001.00000002.2961944869.0000000000678000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_setup.jbxd
                                        Similarity
                                        • API ID: lstrlen$CharNextlstrcmpi
                                        • String ID:
                                        • API String ID: 190613189-0
                                        • Opcode ID: 1c7a2535a4787e8fd3488feaed5d2e4763c3f1a0d20cb74bb0a69d7059b13449
                                        • Instruction ID: 33cf2896678c50374ca0d6f3786bc4b10779684cabbb7c7083e1740f3960db9f
                                        • Opcode Fuzzy Hash: 1c7a2535a4787e8fd3488feaed5d2e4763c3f1a0d20cb74bb0a69d7059b13449
                                        • Instruction Fuzzy Hash: E5F0C231105944AFCB019FA4CD04D9F7BA8EF5A350B2540AAE840E7210D634DE01DBA4