Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
runonce.exe

Overview

General Information

Sample name:runonce.exe
Analysis ID:1543805
MD5:346e10b2e65680b29fdd16131dbf12ba
SHA1:51c7d3e93eb83f9474d4c3cbb5c3ac40cea40355
SHA256:0e8dfe0ae97133bf844939886a773489d1b21e520689d38ca7be105d4f832ad6
Infos:

Detection

Score:24
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Sigma detected: System File Execution Location Anomaly
Contains functionality for read data from the clipboard
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files

Classification

  • System is w10x64
  • runonce.exe (PID: 3008 cmdline: "C:\Users\user\Desktop\runonce.exe" MD5: 346E10B2E65680B29FDD16131DBF12BA)
    • WMIC.exe (PID: 3536 cmdline: wmic /NAMESPACE:\\root\CIMV2 path Win32_BIOS get Manufacturer MD5: E2DE6500DE1148C7F6027AD50AC8B891)
      • conhost.exe (PID: 4284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\Users\user\Desktop\runonce.exe", CommandLine: "C:\Users\user\Desktop\runonce.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\runonce.exe, NewProcessName: C:\Users\user\Desktop\runonce.exe, OriginalFileName: C:\Users\user\Desktop\runonce.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Users\user\Desktop\runonce.exe", ProcessId: 3008, ProcessName: runonce.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: runonce.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: runonce.exeStatic PE information: certificate valid
Source: runonce.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\runonce.exeCode function: 0_2_00405C63 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C63
Source: C:\Users\user\Desktop\runonce.exeCode function: 0_2_004068B4 FindFirstFileW,FindClose,0_2_004068B4
Source: C:\Users\user\Desktop\runonce.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
Source: runonce.exe, 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmp, System.dll.0.dr, AccessControl.dll.0.dr, nsExec.dll.0.dr, LogEx.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: runonce.exe, 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmp, System.dll.0.dr, nsExec.dll.0.dr, LogEx.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
Source: runonce.exe, 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmp, System.dll.0.dr, nsExec.dll.0.dr, LogEx.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA.crt0
Source: runonce.exe, 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmp, System.dll.0.dr, nsExec.dll.0.dr, LogEx.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
Source: AccessControl.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: runonce.exe, 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmp, System.dll.0.dr, AccessControl.dll.0.dr, nsExec.dll.0.dr, LogEx.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: runonce.exe, 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmp, System.dll.0.dr, AccessControl.dll.0.dr, nsExec.dll.0.dr, LogEx.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: runonce.exe, 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmp, System.dll.0.dr, AccessControl.dll.0.dr, nsExec.dll.0.dr, LogEx.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: runonce.exe, 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmp, System.dll.0.dr, nsExec.dll.0.dr, LogEx.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: AccessControl.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: runonce.exe, 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmp, System.dll.0.dr, AccessControl.dll.0.dr, nsExec.dll.0.dr, LogEx.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: AccessControl.dll.0.dr, nsExec.dll.0.dr, LogEx.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: runonce.exe, 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmp, System.dll.0.dr, nsExec.dll.0.dr, LogEx.dll.0.drString found in binary or memory: http://crl3.digicert.com/EVCodeSigning-g1.crl03
Source: runonce.exe, 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmp, System.dll.0.dr, nsExec.dll.0.dr, LogEx.dll.0.drString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
Source: runonce.exe, 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmp, System.dll.0.dr, nsExec.dll.0.dr, LogEx.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: AccessControl.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0=
Source: runonce.exe, 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmp, System.dll.0.dr, nsExec.dll.0.dr, LogEx.dll.0.drString found in binary or memory: http://crl4.digicert.com/EVCodeSigning-g1.crl0K
Source: runonce.exe, 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmp, System.dll.0.dr, nsExec.dll.0.dr, LogEx.dll.0.drString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
Source: runonce.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: AccessControl.dll.0.drString found in binary or memory: http://ocsp.digicert.com0
Source: runonce.exe, 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmp, System.dll.0.dr, AccessControl.dll.0.dr, nsExec.dll.0.dr, LogEx.dll.0.drString found in binary or memory: http://ocsp.digicert.com0A
Source: runonce.exe, 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmp, System.dll.0.dr, AccessControl.dll.0.dr, nsExec.dll.0.dr, LogEx.dll.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: runonce.exe, 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmp, System.dll.0.dr, nsExec.dll.0.dr, LogEx.dll.0.drString found in binary or memory: http://ocsp.digicert.com0H
Source: runonce.exe, 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmp, System.dll.0.dr, nsExec.dll.0.dr, LogEx.dll.0.drString found in binary or memory: http://ocsp.digicert.com0I
Source: runonce.exe, 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmp, System.dll.0.dr, AccessControl.dll.0.dr, nsExec.dll.0.dr, LogEx.dll.0.drString found in binary or memory: http://ocsp.digicert.com0X
Source: runonce.exe, 00000000.00000002.2118704065.00000000027D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://opensource.dell.com
Source: runonce.exe, 00000000.00000002.2118704065.00000000027D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://opensource.dell.com/
Source: AccessControl.dll.0.drString found in binary or memory: http://www.digicert.com/CPS0
Source: runonce.exe, 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmp, System.dll.0.dr, nsExec.dll.0.dr, LogEx.dll.0.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: runonce.exe, 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmp, System.dll.0.dr, nsExec.dll.0.dr, LogEx.dll.0.drString found in binary or memory: https://www.digicert.com/CPS0
Source: C:\Users\user\Desktop\runonce.exeCode function: 0_2_0040571B GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040571B
Source: C:\Users\user\Desktop\runonce.exeCode function: 0_2_00403532 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,ExitProcess,CoUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403532
Source: C:\Users\user\Desktop\runonce.exeCode function: 0_2_00406DC60_2_00406DC6
Source: C:\Users\user\Desktop\runonce.exeCode function: 0_2_0040759D0_2_0040759D
Source: runonce.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: sus24.winEXE@4/5@0/0
Source: C:\Users\user\Desktop\runonce.exeCode function: 0_2_00403532 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,ExitProcess,CoUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403532
Source: C:\Users\user\Desktop\runonce.exeCode function: 0_2_004049C7 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004049C7
Source: C:\Users\user\Desktop\runonce.exeCode function: 0_2_004021AF CoCreateInstance,0_2_004021AF
Source: C:\Users\user\Desktop\runonce.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{2AA9978F-CCEB-4156-859E-D84D5CE6A993}
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4284:120:WilError_03
Source: C:\Users\user\Desktop\runonce.exeFile created: C:\Users\user\AppData\Local\Temp\nsjF71D.tmpJump to behavior
Source: runonce.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\runonce.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\runonce.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\runonce.exeFile read: C:\Users\user\Desktop\runonce.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\runonce.exe "C:\Users\user\Desktop\runonce.exe"
Source: C:\Users\user\Desktop\runonce.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic /NAMESPACE:\\root\CIMV2 path Win32_BIOS get Manufacturer
Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\runonce.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic /NAMESPACE:\\root\CIMV2 path Win32_BIOS get ManufacturerJump to behavior
Source: C:\Users\user\Desktop\runonce.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\runonce.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\runonce.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\runonce.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\runonce.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\runonce.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\runonce.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Desktop\runonce.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\runonce.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\runonce.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\runonce.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\runonce.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\runonce.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\runonce.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\runonce.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\runonce.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\runonce.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\runonce.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\runonce.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\runonce.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\runonce.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Users\user\Desktop\runonce.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: runonce.exeStatic PE information: certificate valid
Source: runonce.exeStatic file information: File size 40855120 > 1048576
Source: runonce.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\runonce.exeFile created: C:\Users\user\AppData\Local\Temp\nsjF7BA.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\runonce.exeFile created: C:\Users\user\AppData\Local\Temp\nsjF7BA.tmp\AccessControl.dllJump to dropped file
Source: C:\Users\user\Desktop\runonce.exeFile created: C:\Users\user\AppData\Local\Temp\nsjF7BA.tmp\LogEx.dllJump to dropped file
Source: C:\Users\user\Desktop\runonce.exeFile created: C:\Users\user\AppData\Local\Temp\nsjF7BA.tmp\nsExec.dllJump to dropped file
Source: C:\Users\user\Desktop\runonce.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\runonce.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsjF7BA.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\runonce.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsjF7BA.tmp\AccessControl.dllJump to dropped file
Source: C:\Users\user\Desktop\runonce.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsjF7BA.tmp\LogEx.dllJump to dropped file
Source: C:\Users\user\Desktop\runonce.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsjF7BA.tmp\nsExec.dllJump to dropped file
Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Manufacturer FROM Win32_BIOS
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\runonce.exeCode function: 0_2_00405C63 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C63
Source: C:\Users\user\Desktop\runonce.exeCode function: 0_2_004068B4 FindFirstFileW,FindClose,0_2_004068B4
Source: C:\Users\user\Desktop\runonce.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
Source: C:\Users\user\Desktop\runonce.exeAPI call chain: ExitProcess graph end nodegraph_0-3253
Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\runonce.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic /NAMESPACE:\\root\CIMV2 path Win32_BIOS get ManufacturerJump to behavior
Source: C:\Users\user\Desktop\runonce.exeCode function: 0_2_00403532 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,ExitProcess,CoUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403532
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
DLL Side-Loading
1
Access Token Manipulation
1
Access Token Manipulation
OS Credential Dumping1
Process Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
Process Injection
11
Process Injection
LSASS Memory2
File and Directory Discovery
Remote Desktop Protocol1
Clipboard Data
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
DLL Side-Loading
Security Account Manager13
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1543805 Sample: runonce.exe Startdate: 28/10/2024 Architecture: WINDOWS Score: 24 22 Sigma detected: System File Execution Location Anomaly 2->22 7 runonce.exe 19 2->7         started        process3 file4 14 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 7->14 dropped 16 C:\Users\user\AppData\Local\...\System.dll, PE32 7->16 dropped 18 C:\Users\user\AppData\Local\...\LogEx.dll, PE32 7->18 dropped 20 C:\Users\user\AppData\...\AccessControl.dll, PE32 7->20 dropped 10 WMIC.exe 1 7->10         started        process5 process6 12 conhost.exe 10->12         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
runonce.exe0%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\nsjF7BA.tmp\AccessControl.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsjF7BA.tmp\LogEx.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsjF7BA.tmp\System.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsjF7BA.tmp\nsExec.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://opensource.dell.comrunonce.exe, 00000000.00000002.2118704065.00000000027D9000.00000004.00000020.00020000.00000000.sdmpfalse
    unknown
    http://opensource.dell.com/runonce.exe, 00000000.00000002.2118704065.00000000027D9000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      http://nsis.sf.net/NSIS_ErrorErrorrunonce.exefalse
      • URL Reputation: safe
      unknown
      No contacted IP infos
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1543805
      Start date and time:2024-10-28 13:44:12 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 3m 9s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:4
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:runonce.exe
      Detection:SUS
      Classification:sus24.winEXE@4/5@0/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 27
      • Number of non-executed functions: 31
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Stop behavior analysis, all processes terminated
      • Exclude process from analysis (whitelisted): dllhost.exe
      • Not all processes where analyzed, report is missing behavior information
      • VT rate limit hit for: runonce.exe
      TimeTypeDescription
      08:45:06API Interceptor1x Sleep call for process: WMIC.exe modified
      No context
      No context
      No context
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      C:\Users\user\AppData\Local\Temp\nsjF7BA.tmp\nsExec.dllhttps://dl.dell.com/FOLDER11489837M/1/DPeM_4M3XN_1.7.4_WN64_A00.exeGet hashmaliciousUnknownBrowse
        C:\Users\user\AppData\Local\Temp\nsjF7BA.tmp\LogEx.dllhttps://dl.dell.com/FOLDER11489837M/1/DPeM_4M3XN_1.7.4_WN64_A00.exeGet hashmaliciousUnknownBrowse
          C:\Users\user\AppData\Local\Temp\nsjF7BA.tmp\System.dllhttps://dl.dell.com/FOLDER11489837M/1/DPeM_4M3XN_1.7.4_WN64_A00.exeGet hashmaliciousUnknownBrowse
            Process:C:\Users\user\Desktop\runonce.exe
            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
            Category:dropped
            Size (bytes):274
            Entropy (8bit):3.0980026038071804
            Encrypted:false
            SSDEEP:3:Q/yMLlYrC4ELlilSVnlmA6lmtg5l5lsFWPjDLclulAlAnolvv8RQl4Qfrsvn:Q/xRYrfGGSV48G5ZsFWQB6no22mQfAv
            MD5:69CBB7C54EB8B52AB4EF6F5A121ACDF2
            SHA1:576FEDAA87A617D3CB6F9539EC2AE1B26888B161
            SHA-256:4806F50C4AFF6299F165539A5E59FE9EFDF4E29088CFD7D61AEB7DAF6AFA2650
            SHA-512:5FBF97B29FDB1FA92E59F79EE78F42E2709594E28AAC3778B484B193B8281E6764EE4B723B2BA6889036E45C36DCE38E2EF32AB4EA1CCD8B415D8F848F62FE3E
            Malicious:false
            Reputation:low
            Preview:..-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.I.n.s.t.a.l.l.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.......o.n.I.n.i.t.:.C.o.m.m.a.n.d.L.i.n.e.=.".C.:.\.U.s.e.r.s.\.a.l.f.o.n.s.\.D.e.s.k.t.o.p.\.r.u.n.o.n.c.e...e.x.e.".....M.a.n.u.f.a.c.t.u.r.e.r. .=. .N.N.L.S.G.....
            Process:C:\Users\user\Desktop\runonce.exe
            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):25976
            Entropy (8bit):6.7745195807176675
            Encrypted:false
            SSDEEP:384:ShdGZ2E0YWV2908oj21ILud8YIYitV9Ywd+foAM+o/8E9VF0NyDHw27:ShMFZ01j2yLe8BYiVYwd6oAMxkEX
            MD5:CAFE177FC6D9492042CFEA6F370B7648
            SHA1:6901FFAF7B8E3DE0661AC1E427BDF8E469F94802
            SHA-256:BC2C42EBF191CBD6374818B796BBB2D8C213C1FBFCEB1E8B4253B04894EEFBE8
            SHA-512:53525083E6D6E22E21B53FB5359C8B222CAAAF2E957946715C4142B8082DC4FBF525737A1DBE28BFAF202997EE21F6E020057E941C1AE67FEC099753ED7D2EB2
            Malicious:false
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 0%
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........k..................~...........w...........}....Rich............................PE..L....t6`...........!.....0...........7.......@...............................`.......................................<.......8..P....................<..x)...P..p....................................................................................text...w/.......0.................. ..`.data...\....@.......4..............@....reloc.......P.......6..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\Desktop\runonce.exe
            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):64432
            Entropy (8bit):5.612892222457597
            Encrypted:false
            SSDEEP:768:soaF+ATCQye/I3KWmxj00Jyb8EnovmCErPxFA2PxWEnWD:UF+ATCNmVjj8poIPxtPxoD
            MD5:EC59E06851E742F8415BB1C3C66AE993
            SHA1:EE7C03D70621CE17B6C020932A38ADCC5B08D84A
            SHA-256:19ACE66BDC06055E281DAD38D862612D2DFE2B6F05D273639E65D4CCDA7530DB
            SHA-512:3A1C7ABFCAC696C42E203378E9E576B7B24F79C0B2A545C51BCB513092E80D260A649DD359EA07CA342BBC6CF209306A630A040648CE4B3F46E2C472A0ABA10A
            Malicious:false
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 0%
            Joe Sandbox View:
            • Filename: , Detection: malicious, Browse
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........HeGK)..K)..K)..}...J)...5.._)..BQ..J)..)6..N)..K)...)..}...u)......J)..RichK)..........................PE..L.....M...........!.....P...`...............`......................................Lx...............................k..s...<f..<........................K...........................................................`...............................text....G.......P.................. ..`.rdata..#....`.......`..............@..@.data...`1...p...0...p..............@....reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\Desktop\runonce.exe
            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):31664
            Entropy (8bit):7.115717791943005
            Encrypted:false
            SSDEEP:384:e8PJlt70esj0Mt9vn6ay6MNy6F8E9VF3ZJ5Px+nh5ZsHLwaqaPxh8E9VF0NyV2UZ:e+qesjRL67CErPxFcaPxWETpp
            MD5:BC86B4F2A493162CC45D32188ED6C8C7
            SHA1:D828F960EF068338CB988DBA99C81E824D79D3A2
            SHA-256:474266DEBBF0C41E6B66E5F90581A4640F51688135D2B42C0A7F5080D3153EB1
            SHA-512:CD8783E60A44DEFCC8D30738F13629ED3F76C8837A6A717BB1F9CF6E95808BEB721A392EAB446BB7A3E6BAD67384E4D47D6CFCF90634CA94FEAB0B10B11D5EFC
            Malicious:false
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 0%
            Joe Sandbox View:
            • Filename: , Detection: malicious, Browse
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L....~.\...........!....."...........).......@...............................p.......g....@..........................B.......@..P....................0...K...`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\Desktop\runonce.exe
            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):26032
            Entropy (8bit):7.1739276231495674
            Encrypted:false
            SSDEEP:384:OwbogBz5N66IuGgmkNdNy6F8E9VF3ZJ5PxKe5h5ZsHLodPxh8E9VF0NyyTk:n9cuGLklCErPxpeoPxWEAI
            MD5:1CFC262CCBC117FEEBB7B84FB9488D0C
            SHA1:49B8E5061FD5F940761CB4BC814553EF2729223E
            SHA-256:C52A43D96AF1F31C74696DE1E1971E437B97DFB69C702E6F48F163EA157DB079
            SHA-512:34F210722DB6C99D958FC91D1637D5B456D2BEB0835284B1F1441FF2DC0FCD342E54C9D1A032E9A9258D432450FD2A8A75E79AAB0D5D30B652363655D4CE2D36
            Malicious:false
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 0%
            Joe Sandbox View:
            • Filename: , Detection: malicious, Browse
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................,..................Rich...........PE..L....~.\...........!......................... ...............................P............@..........................$..l.... ..P........................K...@....................................................... ...............................text............................... ..`.rdata..L.... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................
            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
            Entropy (8bit):7.9963964985243905
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:runonce.exe
            File size:40'855'120 bytes
            MD5:346e10b2e65680b29fdd16131dbf12ba
            SHA1:51c7d3e93eb83f9474d4c3cbb5c3ac40cea40355
            SHA256:0e8dfe0ae97133bf844939886a773489d1b21e520689d38ca7be105d4f832ad6
            SHA512:df72f3169230476a45fe4035c7ceb5e36f66f4a4903de88c9c1119d39cb6a9a3162172cb6137469c21bbd002f92d567f0a08713fa869cf0cec997a7aee27905f
            SSDEEP:786432:FYuteBzK4B+5JbbhUQ8xigFJnTRQmZE6b2oFwWqa71SHll9FeuRLNtot2Dqq1+qA:FYuoJWF9Enem3b5SFl9FeuK
            TLSH:7297332E9544A56EEB4EBB3401A0FDB8C35A7C1EF958BC793D24F44468F63E2430D692
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN..s~..PN..VH..PN.Rich.PN.........................PE..L...l..d.................j.........
            Icon Hash:8021c2d8da823100
            Entrypoint:0x403532
            Entrypoint Section:.text
            Digitally signed:true
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Time Stamp:0x64A0DC6C [Sun Jul 2 02:09:48 2023 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:f4639a0b3116c2cfc71144b88a929cfd
            Signature Valid:true
            Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
            Signature Validation Error:The operation completed successfully
            Error Number:0
            Not Before, Not After
            • 30/03/2023 02:00:00 16/04/2026 01:59:59
            Subject Chain
            • CN=IndiLogic LLC, O=IndiLogic LLC, L=Pflugerville, S=Texas, C=US, SERIALNUMBER=801559456, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.2=Texas, OID.1.3.6.1.4.1.311.60.2.1.3=US
            Version:3
            Thumbprint MD5:836850D4406BE5F77C86821943C953B2
            Thumbprint SHA-1:02FF05422A368811E5DEDF3BB3510D1592125B61
            Thumbprint SHA-256:DCF1A6EE23829CF8310F539EE038911DE5A5206F42E1DA067B99BA14CE327F7B
            Serial:03F2B43C723D66131CB16C806393A7F0
            Instruction
            sub esp, 000003F8h
            push ebp
            push esi
            push edi
            push 00000020h
            pop edi
            xor ebp, ebp
            push 00008001h
            mov dword ptr [esp+20h], ebp
            mov dword ptr [esp+18h], 0040A2D8h
            mov dword ptr [esp+14h], ebp
            call dword ptr [004080A4h]
            mov esi, dword ptr [004080A8h]
            lea eax, dword ptr [esp+34h]
            push eax
            mov dword ptr [esp+4Ch], ebp
            mov dword ptr [esp+0000014Ch], ebp
            mov dword ptr [esp+00000150h], ebp
            mov dword ptr [esp+38h], 0000011Ch
            call esi
            test eax, eax
            jne 00007F138529A3AAh
            lea eax, dword ptr [esp+34h]
            mov dword ptr [esp+34h], 00000114h
            push eax
            call esi
            mov ax, word ptr [esp+48h]
            mov ecx, dword ptr [esp+62h]
            sub ax, 00000053h
            add ecx, FFFFFFD0h
            neg ax
            sbb eax, eax
            mov byte ptr [esp+0000014Eh], 00000004h
            not eax
            and eax, ecx
            mov word ptr [esp+00000148h], ax
            cmp dword ptr [esp+38h], 0Ah
            jnc 00007F138529A378h
            and word ptr [esp+42h], 0000h
            mov eax, dword ptr [esp+40h]
            movzx ecx, byte ptr [esp+3Ch]
            mov dword ptr [004347B8h], eax
            xor eax, eax
            mov ah, byte ptr [esp+38h]
            movzx eax, ax
            or eax, ecx
            xor ecx, ecx
            mov ch, byte ptr [esp+00000148h]
            movzx ecx, cx
            shl eax, 10h
            or eax, ecx
            movzx ecx, byte ptr [esp+0000004Eh]
            Programming Language:
            • [EXP] VC++ 6.0 SP5 build 8804
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x86080xa0.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x6b0000x6b238.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x26f3cd80x2978
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x68d80x6a00742185983fa6320c910f81782213e56fFalse0.6695165094339622data6.478461709868021IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x80000x14640x1600a995b118b38426885fc6ccaa984c8b7aFalse0.4314630681818182data4.969091535632612IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0xa0000x2a8180x6009a9bf385a30f1656fc362172b16d9268False0.5247395833333334data4.172601271908501IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .ndata0x350000x360000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rsrc0x6b0000x6b2380x6b40042f71deb3a31dcda02e7ea94c58d3e0fFalse0.1150181199009324data4.670569872110054IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_ICON0x6b5080x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336EnglishUnited States0.12108693079267391
            RT_ICON0xad5300x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.08897728617059032
            RT_ICON0xbdd580x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.08681942400672693
            RT_ICON0xc72000x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.0966728280961183
            RT_ICON0xcc6880x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.09754369390647143
            RT_ICON0xd08b00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.1212655601659751
            RT_ICON0xd2e580x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.15337711069418386
            RT_ICON0xd3f000x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.21475409836065573
            RT_ICON0xd48880x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.26684397163120566
            RT_DIALOG0xd4cf00x200dataEnglishUnited States0.3984375
            RT_DIALOG0xd4ef00xf8dataEnglishUnited States0.6290322580645161
            RT_DIALOG0xd4fe80xd4dataEnglishUnited States0.5990566037735849
            RT_DIALOG0xd50c00xeedataEnglishUnited States0.6302521008403361
            RT_DIALOG0xd51b00x1ecdataEnglishUnited States0.3861788617886179
            RT_DIALOG0xd53a00xe4dataEnglishUnited States0.6359649122807017
            RT_DIALOG0xd54880xc0dataEnglishUnited States0.5885416666666666
            RT_DIALOG0xd55480xdadataEnglishUnited States0.6467889908256881
            RT_DIALOG0xd56280x1f0dataEnglishUnited States0.3911290322580645
            RT_DIALOG0xd58180xe8dataEnglishUnited States0.6508620689655172
            RT_DIALOG0xd59000xc4dataEnglishUnited States0.6020408163265306
            RT_DIALOG0xd59c80xdedataEnglishUnited States0.6621621621621622
            RT_GROUP_ICON0xd5aa80x84dataEnglishUnited States0.7196969696969697
            RT_VERSION0xd5b300x2d4dataEnglishUnited States0.44751381215469616
            RT_MANIFEST0xd5e080x42eXML 1.0 document, ASCII text, with very long lines (1070), with no line terminatorsEnglishUnited States0.5130841121495328
            DLLImport
            ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
            SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
            ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
            COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
            USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
            GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
            KERNEL32.dlllstrcmpiA, CreateFileW, GetTempFileNameW, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, WriteFile, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, SetEnvironmentVariableW
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            No network behavior found

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:08:45:06
            Start date:28/10/2024
            Path:C:\Users\user\Desktop\runonce.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\runonce.exe"
            Imagebase:0x400000
            File size:40'855'120 bytes
            MD5 hash:346E10B2E65680B29FDD16131DBF12BA
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Target ID:1
            Start time:08:45:06
            Start date:28/10/2024
            Path:C:\Windows\SysWOW64\wbem\WMIC.exe
            Wow64 process (32bit):true
            Commandline:wmic /NAMESPACE:\\root\CIMV2 path Win32_BIOS get Manufacturer
            Imagebase:0x1c0000
            File size:427'008 bytes
            MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:moderate
            Has exited:true

            Target ID:2
            Start time:08:45:06
            Start date:28/10/2024
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff6d64d0000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:16.3%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:16.4%
              Total number of Nodes:1334
              Total number of Limit Nodes:19
              execution_graph 3534 404f43 GetDlgItem GetDlgItem 3535 404f95 7 API calls 3534->3535 3543 4051ba 3534->3543 3536 40503c DeleteObject 3535->3536 3537 40502f SendMessageW 3535->3537 3538 405045 3536->3538 3537->3536 3539 40507c 3538->3539 3544 406594 21 API calls 3538->3544 3586 4044d6 3539->3586 3540 40529c 3542 405348 3540->3542 3547 4051ad 3540->3547 3553 4052f5 SendMessageW 3540->3553 3548 405352 SendMessageW 3542->3548 3549 40535a 3542->3549 3543->3540 3568 405229 3543->3568 3591 404e91 SendMessageW 3543->3591 3545 40505e SendMessageW SendMessageW 3544->3545 3545->3538 3546 405090 3552 4044d6 22 API calls 3546->3552 3608 40453d 3547->3608 3548->3549 3556 405373 3549->3556 3557 40536c ImageList_Destroy 3549->3557 3564 405383 3549->3564 3569 4050a1 3552->3569 3553->3547 3559 40530a SendMessageW 3553->3559 3554 40528e SendMessageW 3554->3540 3560 40537c GlobalFree 3556->3560 3556->3564 3557->3556 3558 4054fd 3558->3547 3565 40550f ShowWindow GetDlgItem ShowWindow 3558->3565 3562 40531d 3559->3562 3560->3564 3561 40517c GetWindowLongW SetWindowLongW 3563 405195 3561->3563 3573 40532e SendMessageW 3562->3573 3566 4051b2 3563->3566 3567 40519a ShowWindow 3563->3567 3564->3558 3581 4053be 3564->3581 3596 404f11 3564->3596 3565->3547 3590 40450b SendMessageW 3566->3590 3589 40450b SendMessageW 3567->3589 3568->3540 3568->3554 3569->3561 3572 4050f4 SendMessageW 3569->3572 3574 405177 3569->3574 3575 405132 SendMessageW 3569->3575 3576 405146 SendMessageW 3569->3576 3572->3569 3573->3542 3574->3561 3574->3563 3575->3569 3576->3569 3578 4054c8 3579 4054d3 InvalidateRect 3578->3579 3583 4054df 3578->3583 3579->3583 3580 4053ec SendMessageW 3582 405402 3580->3582 3581->3580 3581->3582 3582->3578 3584 405476 SendMessageW SendMessageW 3582->3584 3583->3558 3605 404e4c 3583->3605 3584->3582 3587 406594 21 API calls 3586->3587 3588 4044e1 SetDlgItemTextW 3587->3588 3588->3546 3589->3547 3590->3543 3592 404ef0 SendMessageW 3591->3592 3593 404eb4 GetMessagePos ScreenToClient SendMessageW 3591->3593 3594 404ee8 3592->3594 3593->3594 3595 404eed 3593->3595 3594->3568 3595->3592 3622 406557 lstrcpynW 3596->3622 3598 404f24 3623 40649e wsprintfW 3598->3623 3600 404f2e 3601 40140b 2 API calls 3600->3601 3602 404f37 3601->3602 3624 406557 lstrcpynW 3602->3624 3604 404f3e 3604->3581 3625 404d83 3605->3625 3607 404e61 3607->3558 3609 404555 GetWindowLongW 3608->3609 3619 404600 3608->3619 3610 40456a 3609->3610 3609->3619 3611 404597 GetSysColor 3610->3611 3612 40459a 3610->3612 3610->3619 3611->3612 3613 4045a0 SetTextColor 3612->3613 3614 4045aa SetBkMode 3612->3614 3613->3614 3615 4045c2 GetSysColor 3614->3615 3616 4045c8 3614->3616 3615->3616 3617 4045d9 3616->3617 3618 4045cf SetBkColor 3616->3618 3617->3619 3620 4045f3 CreateBrushIndirect 3617->3620 3621 4045ec DeleteObject 3617->3621 3618->3617 3620->3619 3621->3620 3622->3598 3623->3600 3624->3604 3626 404d9c 3625->3626 3627 406594 21 API calls 3626->3627 3628 404e00 3627->3628 3629 406594 21 API calls 3628->3629 3630 404e0b 3629->3630 3631 406594 21 API calls 3630->3631 3632 404e21 lstrlenW wsprintfW SetDlgItemTextW 3631->3632 3632->3607 3633 402643 3634 402672 3633->3634 3635 402657 3633->3635 3637 4026a2 3634->3637 3638 402677 3634->3638 3650 402d89 3635->3650 3640 402dab 21 API calls 3637->3640 3639 402dab 21 API calls 3638->3639 3641 40267e 3639->3641 3642 4026a9 lstrlenW 3640->3642 3653 406579 WideCharToMultiByte 3641->3653 3647 40265e 3642->3647 3644 402692 lstrlenA 3644->3647 3645 4026d6 3646 4026ec 3645->3646 3648 4060f9 WriteFile 3645->3648 3647->3645 3647->3646 3654 406128 SetFilePointer 3647->3654 3648->3646 3651 406594 21 API calls 3650->3651 3652 402d9e 3651->3652 3652->3647 3653->3644 3655 406144 3654->3655 3656 40615c 3654->3656 3657 4060ca ReadFile 3655->3657 3656->3645 3658 406150 3657->3658 3658->3656 3659 406165 SetFilePointer 3658->3659 3660 40618d SetFilePointer 3658->3660 3659->3660 3661 406170 3659->3661 3660->3656 3662 4060f9 WriteFile 3661->3662 3662->3656 3453 4015c6 3454 402dab 21 API calls 3453->3454 3455 4015cd 3454->3455 3456 405ed1 4 API calls 3455->3456 3461 4015d6 3456->3461 3457 401636 3459 401668 3457->3459 3460 40163b 3457->3460 3458 405e53 CharNextW 3458->3461 3463 401423 28 API calls 3459->3463 3472 401423 3460->3472 3461->3457 3461->3458 3466 405b05 2 API calls 3461->3466 3467 405b22 5 API calls 3461->3467 3470 40161c GetFileAttributesW 3461->3470 3471 405aab 2 API calls 3461->3471 3469 401660 3463->3469 3466->3461 3467->3461 3468 40164f SetCurrentDirectoryW 3468->3469 3470->3461 3471->3461 3473 4055dc 28 API calls 3472->3473 3474 401431 3473->3474 3475 406557 lstrcpynW 3474->3475 3475->3468 3663 404646 lstrlenW 3664 404665 3663->3664 3665 404667 WideCharToMultiByte 3663->3665 3664->3665 3666 4049c7 3667 4049f3 3666->3667 3668 404a04 3666->3668 3727 405b9b GetDlgItemTextW 3667->3727 3670 404a10 GetDlgItem 3668->3670 3672 404a6f 3668->3672 3671 404a24 3670->3671 3676 404a38 SetWindowTextW 3671->3676 3679 405ed1 4 API calls 3671->3679 3673 404b53 3672->3673 3681 406594 21 API calls 3672->3681 3725 404d02 3672->3725 3673->3725 3729 405b9b GetDlgItemTextW 3673->3729 3674 4049fe 3675 406805 5 API calls 3674->3675 3675->3668 3680 4044d6 22 API calls 3676->3680 3678 40453d 8 API calls 3683 404d16 3678->3683 3684 404a2e 3679->3684 3685 404a54 3680->3685 3686 404ae3 SHBrowseForFolderW 3681->3686 3682 404b83 3687 405f2e 18 API calls 3682->3687 3684->3676 3691 405e26 3 API calls 3684->3691 3688 4044d6 22 API calls 3685->3688 3686->3673 3689 404afb CoTaskMemFree 3686->3689 3690 404b89 3687->3690 3692 404a62 3688->3692 3693 405e26 3 API calls 3689->3693 3730 406557 lstrcpynW 3690->3730 3691->3676 3728 40450b SendMessageW 3692->3728 3700 404b08 3693->3700 3696 404a68 3699 40694b 5 API calls 3696->3699 3697 404b3f SetDlgItemTextW 3697->3673 3698 404ba0 3701 40694b 5 API calls 3698->3701 3699->3672 3700->3697 3702 406594 21 API calls 3700->3702 3708 404ba7 3701->3708 3703 404b27 lstrcmpiW 3702->3703 3703->3697 3705 404b38 lstrcatW 3703->3705 3704 404be8 3731 406557 lstrcpynW 3704->3731 3705->3697 3707 404bef 3709 405ed1 4 API calls 3707->3709 3708->3704 3713 405e72 2 API calls 3708->3713 3714 404c40 3708->3714 3710 404bf5 GetDiskFreeSpaceW 3709->3710 3712 404c19 MulDiv 3710->3712 3710->3714 3712->3714 3713->3708 3715 404cb1 3714->3715 3717 404e4c 24 API calls 3714->3717 3716 404cd4 3715->3716 3718 40140b 2 API calls 3715->3718 3732 4044f8 EnableWindow 3716->3732 3719 404c9e 3717->3719 3718->3716 3721 404cb3 SetDlgItemTextW 3719->3721 3722 404ca3 3719->3722 3721->3715 3723 404d83 24 API calls 3722->3723 3723->3715 3724 404cf0 3724->3725 3733 404920 3724->3733 3725->3678 3727->3674 3728->3696 3729->3682 3730->3698 3731->3707 3732->3724 3734 404933 SendMessageW 3733->3734 3735 40492e 3733->3735 3734->3725 3735->3734 3736 401c48 3737 402d89 21 API calls 3736->3737 3738 401c4f 3737->3738 3739 402d89 21 API calls 3738->3739 3740 401c5c 3739->3740 3741 401c71 3740->3741 3742 402dab 21 API calls 3740->3742 3743 402dab 21 API calls 3741->3743 3747 401c81 3741->3747 3742->3741 3743->3747 3744 401cd8 3746 402dab 21 API calls 3744->3746 3745 401c8c 3748 402d89 21 API calls 3745->3748 3749 401cdd 3746->3749 3747->3744 3747->3745 3750 401c91 3748->3750 3751 402dab 21 API calls 3749->3751 3752 402d89 21 API calls 3750->3752 3754 401ce6 FindWindowExW 3751->3754 3753 401c9d 3752->3753 3755 401cc8 SendMessageW 3753->3755 3756 401caa SendMessageTimeoutW 3753->3756 3757 401d08 3754->3757 3755->3757 3756->3757 3758 4028c9 3759 4028cf 3758->3759 3760 4028d7 FindClose 3759->3760 3761 402c2f 3759->3761 3760->3761 3506 403b4f 3507 403b67 3506->3507 3508 403b59 CloseHandle 3506->3508 3513 403b94 3507->3513 3508->3507 3511 405c63 71 API calls 3512 403b78 3511->3512 3514 403ba2 3513->3514 3515 403b6c 3514->3515 3516 403ba7 FreeLibrary GlobalFree 3514->3516 3515->3511 3516->3515 3516->3516 3765 405550 3766 405560 3765->3766 3767 405574 3765->3767 3769 405566 3766->3769 3770 4055bd 3766->3770 3768 40557c IsWindowVisible 3767->3768 3776 405593 3767->3776 3768->3770 3772 405589 3768->3772 3771 404522 SendMessageW 3769->3771 3773 4055c2 CallWindowProcW 3770->3773 3774 405570 3771->3774 3775 404e91 5 API calls 3772->3775 3773->3774 3775->3776 3776->3773 3777 404f11 4 API calls 3776->3777 3777->3770 3778 4016d1 3779 402dab 21 API calls 3778->3779 3780 4016d7 GetFullPathNameW 3779->3780 3781 4016f1 3780->3781 3782 401713 3780->3782 3781->3782 3785 4068b4 2 API calls 3781->3785 3783 401728 GetShortPathNameW 3782->3783 3784 402c2f 3782->3784 3783->3784 3786 401703 3785->3786 3786->3782 3788 406557 lstrcpynW 3786->3788 3788->3782 3789 401e53 GetDC 3790 402d89 21 API calls 3789->3790 3791 401e65 GetDeviceCaps MulDiv ReleaseDC 3790->3791 3792 402d89 21 API calls 3791->3792 3793 401e96 3792->3793 3794 406594 21 API calls 3793->3794 3795 401ed3 CreateFontIndirectW 3794->3795 3796 40263d 3795->3796 3797 402955 3798 402dab 21 API calls 3797->3798 3799 402961 3798->3799 3800 402977 3799->3800 3801 402dab 21 API calls 3799->3801 3802 406022 2 API calls 3800->3802 3801->3800 3803 40297d 3802->3803 3825 406047 GetFileAttributesW CreateFileW 3803->3825 3805 40298a 3806 402a40 3805->3806 3809 4029a5 GlobalAlloc 3805->3809 3810 402a28 3805->3810 3807 402a47 DeleteFileW 3806->3807 3808 402a5a 3806->3808 3807->3808 3809->3810 3811 4029be 3809->3811 3812 4032b9 35 API calls 3810->3812 3826 4034ea SetFilePointer 3811->3826 3814 402a35 CloseHandle 3812->3814 3814->3806 3815 4029c4 3816 4034d4 ReadFile 3815->3816 3817 4029cd GlobalAlloc 3816->3817 3818 402a11 3817->3818 3819 4029dd 3817->3819 3821 4060f9 WriteFile 3818->3821 3820 4032b9 35 API calls 3819->3820 3823 4029ea 3820->3823 3822 402a1d GlobalFree 3821->3822 3822->3810 3824 402a08 GlobalFree 3823->3824 3824->3818 3825->3805 3826->3815 3827 403fd7 3828 404150 3827->3828 3829 403fef 3827->3829 3831 404161 GetDlgItem GetDlgItem 3828->3831 3847 4041a1 3828->3847 3829->3828 3830 403ffb 3829->3830 3832 404006 SetWindowPos 3830->3832 3833 404019 3830->3833 3834 4044d6 22 API calls 3831->3834 3832->3833 3838 404022 ShowWindow 3833->3838 3839 404064 3833->3839 3835 40418b SetClassLongW 3834->3835 3840 40140b 2 API calls 3835->3840 3836 4041fb 3837 404522 SendMessageW 3836->3837 3844 40414b 3836->3844 3866 40420d 3837->3866 3845 404042 GetWindowLongW 3838->3845 3846 40410e 3838->3846 3841 404083 3839->3841 3842 40406c DestroyWindow 3839->3842 3840->3847 3849 404088 SetWindowLongW 3841->3849 3850 404099 3841->3850 3848 40445f 3842->3848 3843 401389 2 API calls 3851 4041d3 3843->3851 3845->3846 3853 40405b ShowWindow 3845->3853 3852 40453d 8 API calls 3846->3852 3847->3836 3847->3843 3848->3844 3858 404490 ShowWindow 3848->3858 3849->3844 3850->3846 3855 4040a5 GetDlgItem 3850->3855 3851->3836 3856 4041d7 SendMessageW 3851->3856 3852->3844 3853->3839 3854 404461 DestroyWindow EndDialog 3854->3848 3859 4040d3 3855->3859 3860 4040b6 SendMessageW IsWindowEnabled 3855->3860 3856->3844 3857 40140b 2 API calls 3857->3866 3858->3844 3862 4040e0 3859->3862 3864 404127 SendMessageW 3859->3864 3865 4040f3 3859->3865 3872 4040d8 3859->3872 3860->3844 3860->3859 3861 406594 21 API calls 3861->3866 3862->3864 3862->3872 3864->3846 3867 404110 3865->3867 3868 4040fb 3865->3868 3866->3844 3866->3854 3866->3857 3866->3861 3869 4044d6 22 API calls 3866->3869 3873 4044d6 22 API calls 3866->3873 3889 4043a1 DestroyWindow 3866->3889 3870 40140b 2 API calls 3867->3870 3871 40140b 2 API calls 3868->3871 3869->3866 3870->3872 3871->3872 3872->3846 3898 4044af 3872->3898 3874 404288 GetDlgItem 3873->3874 3875 4042a5 ShowWindow EnableWindow 3874->3875 3876 40429d 3874->3876 3901 4044f8 EnableWindow 3875->3901 3876->3875 3878 4042cf EnableWindow 3883 4042e3 3878->3883 3879 4042e8 GetSystemMenu EnableMenuItem SendMessageW 3880 404318 SendMessageW 3879->3880 3879->3883 3880->3883 3882 403fb8 22 API calls 3882->3883 3883->3879 3883->3882 3902 40450b SendMessageW 3883->3902 3903 406557 lstrcpynW 3883->3903 3885 404347 lstrlenW 3886 406594 21 API calls 3885->3886 3887 40435d SetWindowTextW 3886->3887 3888 401389 2 API calls 3887->3888 3888->3866 3889->3848 3890 4043bb CreateDialogParamW 3889->3890 3890->3848 3891 4043ee 3890->3891 3892 4044d6 22 API calls 3891->3892 3893 4043f9 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3892->3893 3894 401389 2 API calls 3893->3894 3895 40443f 3894->3895 3895->3844 3896 404447 ShowWindow 3895->3896 3897 404522 SendMessageW 3896->3897 3897->3848 3899 4044b6 3898->3899 3900 4044bc SendMessageW 3898->3900 3899->3900 3900->3846 3901->3878 3902->3883 3903->3885 3904 4014d7 3905 402d89 21 API calls 3904->3905 3906 4014dd Sleep 3905->3906 3908 402c2f 3906->3908 3909 40195b 3910 402dab 21 API calls 3909->3910 3911 401962 lstrlenW 3910->3911 3912 40263d 3911->3912 3480 4020dd 3481 4021a1 3480->3481 3482 4020ef 3480->3482 3484 401423 28 API calls 3481->3484 3483 402dab 21 API calls 3482->3483 3485 4020f6 3483->3485 3491 4022fb 3484->3491 3486 402dab 21 API calls 3485->3486 3487 4020ff 3486->3487 3488 402115 LoadLibraryExW 3487->3488 3489 402107 GetModuleHandleW 3487->3489 3488->3481 3490 402126 3488->3490 3489->3488 3489->3490 3500 4069ba 3490->3500 3494 402170 3496 4055dc 28 API calls 3494->3496 3495 402137 3497 401423 28 API calls 3495->3497 3498 402147 3495->3498 3496->3498 3497->3498 3498->3491 3499 402193 FreeLibrary 3498->3499 3499->3491 3505 406579 WideCharToMultiByte 3500->3505 3502 4069d7 3503 402131 3502->3503 3504 4069de GetProcAddress 3502->3504 3503->3494 3503->3495 3504->3503 3505->3502 3913 402b5e 3914 402bb0 3913->3914 3915 402b65 3913->3915 3916 40694b 5 API calls 3914->3916 3918 402d89 21 API calls 3915->3918 3921 402bae 3915->3921 3917 402bb7 3916->3917 3919 402dab 21 API calls 3917->3919 3920 402b73 3918->3920 3922 402bc0 3919->3922 3923 402d89 21 API calls 3920->3923 3922->3921 3924 402bc4 IIDFromString 3922->3924 3927 402b7f 3923->3927 3924->3921 3925 402bd3 3924->3925 3925->3921 3931 406557 lstrcpynW 3925->3931 3930 40649e wsprintfW 3927->3930 3928 402bf0 CoTaskMemFree 3928->3921 3930->3921 3931->3928 2925 401761 2931 402dab 2925->2931 2929 40176f 2930 406076 2 API calls 2929->2930 2930->2929 2932 402db7 2931->2932 2941 406594 2932->2941 2935 401768 2937 406076 2935->2937 2938 406083 GetTickCount GetTempFileNameW 2937->2938 2939 4060bd 2938->2939 2940 4060b9 2938->2940 2939->2929 2940->2938 2940->2939 2956 40659f 2941->2956 2942 4067e6 2943 402dd8 2942->2943 2980 406557 lstrcpynW 2942->2980 2943->2935 2958 406805 2943->2958 2945 4067b7 lstrlenW 2945->2956 2946 4066b0 GetSystemDirectoryW 2946->2956 2947 406594 15 API calls 2947->2945 2951 4066c6 GetWindowsDirectoryW 2951->2956 2952 406594 15 API calls 2952->2956 2953 406758 lstrcatW 2953->2956 2954 406805 5 API calls 2954->2956 2956->2942 2956->2945 2956->2946 2956->2947 2956->2951 2956->2952 2956->2953 2956->2954 2957 406728 SHGetPathFromIDListW CoTaskMemFree 2956->2957 2967 406425 2956->2967 2972 40694b GetModuleHandleA 2956->2972 2978 40649e wsprintfW 2956->2978 2979 406557 lstrcpynW 2956->2979 2957->2956 2964 406812 2958->2964 2959 40688d CharPrevW 2960 406888 2959->2960 2960->2959 2962 4068ae 2960->2962 2961 40687b CharNextW 2961->2960 2961->2964 2962->2935 2964->2960 2964->2961 2965 406867 CharNextW 2964->2965 2966 406876 CharNextW 2964->2966 2988 405e53 2964->2988 2965->2964 2966->2961 2981 4063c4 2967->2981 2970 406489 2970->2956 2971 406459 RegQueryValueExW RegCloseKey 2971->2970 2973 406971 GetProcAddress 2972->2973 2974 406967 2972->2974 2975 406980 2973->2975 2985 4068db GetSystemDirectoryW 2974->2985 2975->2956 2977 40696d 2977->2973 2977->2975 2978->2956 2979->2956 2980->2943 2982 4063d3 2981->2982 2983 4063d7 2982->2983 2984 4063dc RegOpenKeyExW 2982->2984 2983->2970 2983->2971 2984->2983 2986 4068fd wsprintfW LoadLibraryExW 2985->2986 2986->2977 2989 405e59 2988->2989 2990 405e6f 2989->2990 2991 405e60 CharNextW 2989->2991 2990->2964 2991->2989 3932 401d62 3933 402d89 21 API calls 3932->3933 3934 401d73 SetWindowLongW 3933->3934 3935 402c2f 3934->3935 3936 4028e3 3937 4028eb 3936->3937 3938 4028ef FindNextFileW 3937->3938 3941 402901 3937->3941 3939 402948 3938->3939 3938->3941 3942 406557 lstrcpynW 3939->3942 3942->3941 3943 403be7 3944 403bf2 3943->3944 3945 403bf9 GlobalAlloc 3944->3945 3946 403bf6 3944->3946 3945->3946 3947 401568 3948 402ba9 3947->3948 3951 40649e wsprintfW 3948->3951 3950 402bae 3951->3950 3952 40196d 3953 402d89 21 API calls 3952->3953 3954 401974 3953->3954 3955 402d89 21 API calls 3954->3955 3956 401981 3955->3956 3957 402dab 21 API calls 3956->3957 3958 401998 lstrlenW 3957->3958 3960 4019a9 3958->3960 3959 4019ea 3960->3959 3964 406557 lstrcpynW 3960->3964 3962 4019da 3962->3959 3963 4019df lstrlenW 3962->3963 3963->3959 3964->3962 3965 40166f 3966 402dab 21 API calls 3965->3966 3967 401675 3966->3967 3968 4068b4 2 API calls 3967->3968 3969 40167b 3968->3969 3970 402af0 3971 402d89 21 API calls 3970->3971 3972 402af6 3971->3972 3973 406594 21 API calls 3972->3973 3974 402933 3972->3974 3973->3974 3975 4026f1 3976 402d89 21 API calls 3975->3976 3983 402700 3976->3983 3977 40283d 3978 40274a ReadFile 3978->3977 3978->3983 3979 4060ca ReadFile 3979->3983 3980 40278a MultiByteToWideChar 3980->3983 3981 40283f 3988 40649e wsprintfW 3981->3988 3982 406128 5 API calls 3982->3983 3983->3977 3983->3978 3983->3979 3983->3980 3983->3981 3983->3982 3985 4027b0 SetFilePointer MultiByteToWideChar 3983->3985 3987 402850 3983->3987 3985->3983 3986 402871 SetFilePointer 3986->3977 3987->3977 3987->3986 3988->3977 3406 401774 3407 402dab 21 API calls 3406->3407 3408 40177b 3407->3408 3409 4017a3 3408->3409 3410 40179b 3408->3410 3446 406557 lstrcpynW 3409->3446 3445 406557 lstrcpynW 3410->3445 3413 4017a1 3417 406805 5 API calls 3413->3417 3414 4017ae 3415 405e26 3 API calls 3414->3415 3416 4017b4 lstrcatW 3415->3416 3416->3413 3427 4017c0 3417->3427 3418 4068b4 2 API calls 3418->3427 3419 406022 2 API calls 3419->3427 3421 4017d2 CompareFileTime 3421->3427 3422 401892 3423 4055dc 28 API calls 3422->3423 3425 40189c 3423->3425 3424 4055dc 28 API calls 3426 40187e 3424->3426 3428 4032b9 35 API calls 3425->3428 3427->3418 3427->3419 3427->3421 3427->3422 3431 406594 21 API calls 3427->3431 3436 406557 lstrcpynW 3427->3436 3441 405bb7 MessageBoxIndirectW 3427->3441 3442 401869 3427->3442 3444 406047 GetFileAttributesW CreateFileW 3427->3444 3429 4018af 3428->3429 3430 4018c3 SetFileTime 3429->3430 3432 4018d5 CloseHandle 3429->3432 3430->3432 3431->3427 3432->3426 3433 4018e6 3432->3433 3434 4018eb 3433->3434 3435 4018fe 3433->3435 3437 406594 21 API calls 3434->3437 3438 406594 21 API calls 3435->3438 3436->3427 3439 4018f3 lstrcatW 3437->3439 3440 401906 3438->3440 3439->3440 3443 405bb7 MessageBoxIndirectW 3440->3443 3441->3427 3442->3424 3442->3426 3443->3426 3444->3427 3445->3413 3446->3414 3989 4014f5 SetForegroundWindow 3990 402c2f 3989->3990 3991 401a77 3992 402d89 21 API calls 3991->3992 3993 401a80 3992->3993 3994 402d89 21 API calls 3993->3994 3995 401a25 3994->3995 3996 401578 3997 401591 3996->3997 3998 401588 ShowWindow 3996->3998 3999 402c2f 3997->3999 4000 40159f ShowWindow 3997->4000 3998->3997 4000->3999 4001 4023f9 4002 402dab 21 API calls 4001->4002 4003 402408 4002->4003 4004 402dab 21 API calls 4003->4004 4005 402411 4004->4005 4006 402dab 21 API calls 4005->4006 4007 40241b GetPrivateProfileStringW 4006->4007 4008 401ffb 4009 402dab 21 API calls 4008->4009 4010 402002 4009->4010 4011 4068b4 2 API calls 4010->4011 4012 402008 4011->4012 4014 402019 4012->4014 4015 40649e wsprintfW 4012->4015 4015->4014 4016 401b7c 4017 402dab 21 API calls 4016->4017 4018 401b83 4017->4018 4019 402d89 21 API calls 4018->4019 4020 401b8c wsprintfW 4019->4020 4021 402c2f 4020->4021 4022 401000 4023 401037 BeginPaint GetClientRect 4022->4023 4024 40100c DefWindowProcW 4022->4024 4026 4010f3 4023->4026 4029 401179 4024->4029 4027 401073 CreateBrushIndirect FillRect DeleteObject 4026->4027 4028 4010fc 4026->4028 4027->4026 4030 401102 CreateFontIndirectW 4028->4030 4031 401167 EndPaint 4028->4031 4030->4031 4032 401112 6 API calls 4030->4032 4031->4029 4032->4031 4033 404980 4034 404990 4033->4034 4035 4049b6 4033->4035 4036 4044d6 22 API calls 4034->4036 4037 40453d 8 API calls 4035->4037 4038 40499d SetDlgItemTextW 4036->4038 4039 4049c2 4037->4039 4038->4035 4040 401680 4041 402dab 21 API calls 4040->4041 4042 401687 4041->4042 4043 402dab 21 API calls 4042->4043 4044 401690 4043->4044 4045 402dab 21 API calls 4044->4045 4046 401699 MoveFileW 4045->4046 4047 4016ac 4046->4047 4053 4016a5 4046->4053 4048 4068b4 2 API calls 4047->4048 4051 4022fb 4047->4051 4050 4016bb 4048->4050 4049 401423 28 API calls 4049->4051 4050->4051 4052 406317 40 API calls 4050->4052 4052->4053 4053->4049 4054 401503 4055 401508 4054->4055 4057 401520 4054->4057 4056 402d89 21 API calls 4055->4056 4056->4057 4058 401a04 4059 402dab 21 API calls 4058->4059 4060 401a0b 4059->4060 4061 402dab 21 API calls 4060->4061 4062 401a14 4061->4062 4063 401a1b lstrcmpiW 4062->4063 4064 401a2d lstrcmpW 4062->4064 4065 401a21 4063->4065 4064->4065 4066 402304 4067 402dab 21 API calls 4066->4067 4068 40230a 4067->4068 4069 402dab 21 API calls 4068->4069 4070 402313 4069->4070 4071 402dab 21 API calls 4070->4071 4072 40231c 4071->4072 4073 4068b4 2 API calls 4072->4073 4074 402325 4073->4074 4075 402336 lstrlenW lstrlenW 4074->4075 4076 402329 4074->4076 4078 4055dc 28 API calls 4075->4078 4077 4055dc 28 API calls 4076->4077 4080 402331 4076->4080 4077->4080 4079 402374 SHFileOperationW 4078->4079 4079->4076 4079->4080 4081 401d86 4082 401d99 GetDlgItem 4081->4082 4083 401d8c 4081->4083 4084 401d93 4082->4084 4085 402d89 21 API calls 4083->4085 4086 401dda GetClientRect LoadImageW SendMessageW 4084->4086 4087 402dab 21 API calls 4084->4087 4085->4084 4089 401e38 4086->4089 4091 401e44 4086->4091 4087->4086 4090 401e3d DeleteObject 4089->4090 4089->4091 4090->4091 4092 402388 4093 40238f 4092->4093 4095 4023a2 4092->4095 4094 406594 21 API calls 4093->4094 4096 40239c 4094->4096 4097 405bb7 MessageBoxIndirectW 4096->4097 4097->4095 3476 401389 3478 401390 3476->3478 3477 4013fe 3478->3477 3479 4013cb MulDiv SendMessageW 3478->3479 3479->3478 4098 402c0a SendMessageW 4099 402c24 InvalidateRect 4098->4099 4100 402c2f 4098->4100 4099->4100 4101 40460c lstrcpynW lstrlenW 4102 40248f 4103 402dab 21 API calls 4102->4103 4104 4024a1 4103->4104 4105 402dab 21 API calls 4104->4105 4106 4024ab 4105->4106 4119 402e3b 4106->4119 4109 4024e3 4111 4024ef 4109->4111 4114 402d89 21 API calls 4109->4114 4110 402dab 21 API calls 4113 4024d9 lstrlenW 4110->4113 4115 40250e RegSetValueExW 4111->4115 4116 4032b9 35 API calls 4111->4116 4112 402933 4113->4109 4114->4111 4117 402524 RegCloseKey 4115->4117 4116->4115 4117->4112 4120 402e56 4119->4120 4123 4063f2 4120->4123 4124 406401 4123->4124 4125 4024bb 4124->4125 4126 40640c RegCreateKeyExW 4124->4126 4125->4109 4125->4110 4125->4112 4126->4125 4127 402910 4128 402dab 21 API calls 4127->4128 4129 402917 FindFirstFileW 4128->4129 4130 40293f 4129->4130 4134 40292a 4129->4134 4135 40649e wsprintfW 4130->4135 4132 402948 4136 406557 lstrcpynW 4132->4136 4135->4132 4136->4134 4137 401911 4138 401948 4137->4138 4139 402dab 21 API calls 4138->4139 4140 40194d 4139->4140 4141 405c63 71 API calls 4140->4141 4142 401956 4141->4142 4143 401491 4144 4055dc 28 API calls 4143->4144 4145 401498 4144->4145 4146 401914 4147 402dab 21 API calls 4146->4147 4148 40191b 4147->4148 4149 405bb7 MessageBoxIndirectW 4148->4149 4150 401924 4149->4150 4151 404695 4152 4047c7 4151->4152 4153 4046ad 4151->4153 4154 404831 4152->4154 4157 4048fb 4152->4157 4160 404802 GetDlgItem SendMessageW 4152->4160 4156 4044d6 22 API calls 4153->4156 4155 40483b GetDlgItem 4154->4155 4154->4157 4158 404855 4155->4158 4159 4048bc 4155->4159 4161 404714 4156->4161 4162 40453d 8 API calls 4157->4162 4158->4159 4166 40487b SendMessageW LoadCursorW SetCursor 4158->4166 4159->4157 4167 4048ce 4159->4167 4184 4044f8 EnableWindow 4160->4184 4164 4044d6 22 API calls 4161->4164 4165 4048f6 4162->4165 4171 404721 CheckDlgButton 4164->4171 4185 404944 4166->4185 4168 4048e4 4167->4168 4169 4048d4 SendMessageW 4167->4169 4168->4165 4173 4048ea SendMessageW 4168->4173 4169->4168 4170 40482c 4174 404920 SendMessageW 4170->4174 4182 4044f8 EnableWindow 4171->4182 4173->4165 4174->4154 4177 40473f GetDlgItem 4183 40450b SendMessageW 4177->4183 4179 404755 SendMessageW 4180 404772 GetSysColor 4179->4180 4181 40477b SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4179->4181 4180->4181 4181->4165 4182->4177 4183->4179 4184->4170 4188 405b7d ShellExecuteExW 4185->4188 4187 4048aa LoadCursorW SetCursor 4187->4159 4188->4187 4189 402896 4190 40289d 4189->4190 4191 402bae 4189->4191 4192 402d89 21 API calls 4190->4192 4193 4028a4 4192->4193 4194 4028b3 SetFilePointer 4193->4194 4194->4191 4195 4028c3 4194->4195 4197 40649e wsprintfW 4195->4197 4197->4191 4198 401f17 4199 402dab 21 API calls 4198->4199 4200 401f1d 4199->4200 4201 402dab 21 API calls 4200->4201 4202 401f26 4201->4202 4203 402dab 21 API calls 4202->4203 4204 401f2f 4203->4204 4205 402dab 21 API calls 4204->4205 4206 401f38 4205->4206 4207 401423 28 API calls 4206->4207 4208 401f3f 4207->4208 4215 405b7d ShellExecuteExW 4208->4215 4210 401f87 4211 402933 4210->4211 4216 4069f6 WaitForSingleObject 4210->4216 4213 401fa4 CloseHandle 4213->4211 4215->4210 4217 406a10 4216->4217 4218 406a22 GetExitCodeProcess 4217->4218 4219 406987 2 API calls 4217->4219 4218->4213 4220 406a17 WaitForSingleObject 4219->4220 4220->4217 4221 402f98 4222 402faa SetTimer 4221->4222 4224 402fc3 4221->4224 4222->4224 4223 403018 4224->4223 4225 402fdd MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4224->4225 4225->4223 4226 40571b 4227 4058c5 4226->4227 4228 40573c GetDlgItem GetDlgItem GetDlgItem 4226->4228 4230 4058f6 4227->4230 4231 4058ce GetDlgItem CreateThread CloseHandle 4227->4231 4271 40450b SendMessageW 4228->4271 4233 405921 4230->4233 4234 405946 4230->4234 4235 40590d ShowWindow ShowWindow 4230->4235 4231->4230 4232 4057ac 4238 4057b3 GetClientRect GetSystemMetrics SendMessageW SendMessageW 4232->4238 4236 405981 4233->4236 4240 405935 4233->4240 4241 40595b ShowWindow 4233->4241 4237 40453d 8 API calls 4234->4237 4273 40450b SendMessageW 4235->4273 4236->4234 4248 40598f SendMessageW 4236->4248 4243 405954 4237->4243 4246 405821 4238->4246 4247 405805 SendMessageW SendMessageW 4238->4247 4242 4044af SendMessageW 4240->4242 4244 40597b 4241->4244 4245 40596d 4241->4245 4242->4234 4250 4044af SendMessageW 4244->4250 4249 4055dc 28 API calls 4245->4249 4251 405834 4246->4251 4252 405826 SendMessageW 4246->4252 4247->4246 4248->4243 4253 4059a8 CreatePopupMenu 4248->4253 4249->4244 4250->4236 4255 4044d6 22 API calls 4251->4255 4252->4251 4254 406594 21 API calls 4253->4254 4256 4059b8 AppendMenuW 4254->4256 4257 405844 4255->4257 4260 4059d5 GetWindowRect 4256->4260 4261 4059e8 TrackPopupMenu 4256->4261 4258 405881 GetDlgItem SendMessageW 4257->4258 4259 40584d ShowWindow 4257->4259 4258->4243 4265 4058a8 SendMessageW SendMessageW 4258->4265 4262 405870 4259->4262 4263 405863 ShowWindow 4259->4263 4260->4261 4261->4243 4264 405a03 4261->4264 4272 40450b SendMessageW 4262->4272 4263->4262 4266 405a1f SendMessageW 4264->4266 4265->4243 4266->4266 4267 405a3c OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4266->4267 4269 405a61 SendMessageW 4267->4269 4269->4269 4270 405a8a GlobalUnlock SetClipboardData CloseClipboard 4269->4270 4270->4243 4271->4232 4272->4258 4273->4233 4274 401d1c 4275 402d89 21 API calls 4274->4275 4276 401d22 IsWindow 4275->4276 4277 401a25 4276->4277 4278 404d1d 4279 404d49 4278->4279 4280 404d2d 4278->4280 4281 404d7c 4279->4281 4282 404d4f SHGetPathFromIDListW 4279->4282 4289 405b9b GetDlgItemTextW 4280->4289 4284 404d5f 4282->4284 4288 404d66 SendMessageW 4282->4288 4286 40140b 2 API calls 4284->4286 4285 404d3a SendMessageW 4285->4279 4286->4288 4288->4281 4289->4285 4290 40149e 4291 4023a2 4290->4291 4292 4014ac PostQuitMessage 4290->4292 4292->4291 4293 401ba0 4294 401bf1 4293->4294 4295 401bad 4293->4295 4297 401bf6 4294->4297 4298 401c1b GlobalAlloc 4294->4298 4296 401c36 4295->4296 4302 401bc4 4295->4302 4299 406594 21 API calls 4296->4299 4311 4023a2 4296->4311 4297->4311 4314 406557 lstrcpynW 4297->4314 4300 406594 21 API calls 4298->4300 4301 40239c 4299->4301 4300->4296 4306 405bb7 MessageBoxIndirectW 4301->4306 4312 406557 lstrcpynW 4302->4312 4304 401c08 GlobalFree 4304->4311 4306->4311 4307 401bd3 4313 406557 lstrcpynW 4307->4313 4309 401be2 4315 406557 lstrcpynW 4309->4315 4312->4307 4313->4309 4314->4304 4315->4311 4316 402621 4317 402dab 21 API calls 4316->4317 4318 402628 4317->4318 4321 406047 GetFileAttributesW CreateFileW 4318->4321 4320 402634 4321->4320 4322 4025a3 4323 402deb 21 API calls 4322->4323 4324 4025ad 4323->4324 4325 402d89 21 API calls 4324->4325 4326 4025b6 4325->4326 4327 4025d2 RegEnumKeyW 4326->4327 4328 4025de RegEnumValueW 4326->4328 4329 402933 4326->4329 4330 4025f3 RegCloseKey 4327->4330 4328->4330 4330->4329 4332 4015a8 4333 402dab 21 API calls 4332->4333 4334 4015af SetFileAttributesW 4333->4334 4335 4015c1 4334->4335 4336 401fa9 4337 402dab 21 API calls 4336->4337 4338 401faf 4337->4338 4339 4055dc 28 API calls 4338->4339 4340 401fb9 4339->4340 4341 405b3a 2 API calls 4340->4341 4342 401fbf 4341->4342 4343 401fe2 CloseHandle 4342->4343 4344 4069f6 5 API calls 4342->4344 4347 402933 4342->4347 4343->4347 4346 401fd4 4344->4346 4346->4343 4349 40649e wsprintfW 4346->4349 4349->4343 3517 40252f 3528 402deb 3517->3528 3520 402dab 21 API calls 3521 402542 3520->3521 3522 40254d RegQueryValueExW 3521->3522 3527 402933 3521->3527 3523 402573 RegCloseKey 3522->3523 3524 40256d 3522->3524 3523->3527 3524->3523 3533 40649e wsprintfW 3524->3533 3529 402dab 21 API calls 3528->3529 3530 402e02 3529->3530 3531 4063c4 RegOpenKeyExW 3530->3531 3532 402539 3531->3532 3532->3520 3533->3523 4350 40202f 4351 402dab 21 API calls 4350->4351 4352 402036 4351->4352 4353 40694b 5 API calls 4352->4353 4354 402045 4353->4354 4355 402061 GlobalAlloc 4354->4355 4358 4020d1 4354->4358 4356 402075 4355->4356 4355->4358 4357 40694b 5 API calls 4356->4357 4359 40207c 4357->4359 4360 40694b 5 API calls 4359->4360 4361 402086 4360->4361 4361->4358 4365 40649e wsprintfW 4361->4365 4363 4020bf 4366 40649e wsprintfW 4363->4366 4365->4363 4366->4358 4367 4021af 4368 402dab 21 API calls 4367->4368 4369 4021b6 4368->4369 4370 402dab 21 API calls 4369->4370 4371 4021c0 4370->4371 4372 402dab 21 API calls 4371->4372 4373 4021ca 4372->4373 4374 402dab 21 API calls 4373->4374 4375 4021d4 4374->4375 4376 402dab 21 API calls 4375->4376 4377 4021de 4376->4377 4378 40221d CoCreateInstance 4377->4378 4379 402dab 21 API calls 4377->4379 4382 40223c 4378->4382 4379->4378 4380 401423 28 API calls 4381 4022fb 4380->4381 4382->4380 4382->4381 2992 403532 SetErrorMode GetVersionExW 2993 403586 GetVersionExW 2992->2993 2994 4035be 2992->2994 2993->2994 2995 403615 2994->2995 2996 40694b 5 API calls 2994->2996 2997 4068db 3 API calls 2995->2997 2996->2995 2998 40362b lstrlenA 2997->2998 2998->2995 2999 40363b 2998->2999 3000 40694b 5 API calls 2999->3000 3001 403642 3000->3001 3002 40694b 5 API calls 3001->3002 3003 403649 3002->3003 3004 40694b 5 API calls 3003->3004 3008 403655 #17 OleInitialize SHGetFileInfoW 3004->3008 3007 4036a4 GetCommandLineW 3081 406557 lstrcpynW 3007->3081 3080 406557 lstrcpynW 3008->3080 3010 4036b6 3011 405e53 CharNextW 3010->3011 3012 4036dc CharNextW 3011->3012 3020 4036ee 3012->3020 3013 4037f0 3014 403804 GetTempPathW 3013->3014 3082 403501 3014->3082 3016 40381c 3017 403820 GetWindowsDirectoryW lstrcatW 3016->3017 3018 403876 DeleteFileW 3016->3018 3021 403501 12 API calls 3017->3021 3092 403082 GetTickCount GetModuleFileNameW 3018->3092 3019 405e53 CharNextW 3019->3020 3020->3013 3020->3019 3026 4037f2 3020->3026 3023 40383c 3021->3023 3023->3018 3025 403840 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3023->3025 3024 40388a 3027 403a7d ExitProcess CoUninitialize 3024->3027 3031 403931 3024->3031 3035 405e53 CharNextW 3024->3035 3028 403501 12 API calls 3025->3028 3177 406557 lstrcpynW 3026->3177 3029 403ab3 3027->3029 3030 403a8f 3027->3030 3033 40386e 3028->3033 3036 403b37 ExitProcess 3029->3036 3037 403abb GetCurrentProcess OpenProcessToken 3029->3037 3251 405bb7 3030->3251 3120 403c29 3031->3120 3033->3018 3033->3027 3048 4038a9 3035->3048 3039 403ad3 LookupPrivilegeValueW AdjustTokenPrivileges 3037->3039 3040 403b07 3037->3040 3039->3040 3044 40694b 5 API calls 3040->3044 3045 403b0e 3044->3045 3050 403b23 ExitWindowsEx 3045->3050 3053 403b30 3045->3053 3046 403907 3178 405f2e 3046->3178 3047 40394a 3194 405b22 3047->3194 3048->3046 3048->3047 3050->3036 3050->3053 3255 40140b 3053->3255 3057 403969 3059 403981 3057->3059 3198 406557 lstrcpynW 3057->3198 3063 4039a7 wsprintfW 3059->3063 3077 4039d3 3059->3077 3060 403926 3193 406557 lstrcpynW 3060->3193 3064 406594 21 API calls 3063->3064 3064->3059 3067 4039e3 GetFileAttributesW 3069 4039ef DeleteFileW 3067->3069 3067->3077 3068 403a1d SetCurrentDirectoryW 3241 406317 MoveFileExW 3068->3241 3069->3077 3071 403a1b 3071->3027 3074 406317 40 API calls 3074->3077 3075 406594 21 API calls 3075->3077 3077->3059 3077->3063 3077->3067 3077->3068 3077->3071 3077->3074 3077->3075 3078 403aa5 CloseHandle 3077->3078 3199 405aab CreateDirectoryW 3077->3199 3202 405b05 CreateDirectoryW 3077->3202 3205 405c63 3077->3205 3245 405b3a CreateProcessW 3077->3245 3248 4068b4 FindFirstFileW 3077->3248 3078->3071 3080->3007 3081->3010 3083 406805 5 API calls 3082->3083 3085 40350d 3083->3085 3084 403517 3084->3016 3085->3084 3258 405e26 lstrlenW CharPrevW 3085->3258 3088 405b05 2 API calls 3089 403525 3088->3089 3090 406076 2 API calls 3089->3090 3091 403530 3090->3091 3091->3016 3261 406047 GetFileAttributesW CreateFileW 3092->3261 3094 4030c2 3112 4030d2 3094->3112 3262 406557 lstrcpynW 3094->3262 3096 4030e8 3263 405e72 lstrlenW 3096->3263 3100 4030f9 GetFileSize 3101 4031f3 3100->3101 3114 403110 3100->3114 3268 40301e 3101->3268 3103 4031fc 3105 40322c GlobalAlloc 3103->3105 3103->3112 3303 4034ea SetFilePointer 3103->3303 3279 4034ea SetFilePointer 3105->3279 3107 40325f 3109 40301e 6 API calls 3107->3109 3109->3112 3110 403215 3113 4034d4 ReadFile 3110->3113 3111 403247 3280 4032b9 3111->3280 3112->3024 3116 403220 3113->3116 3114->3101 3114->3107 3114->3112 3117 40301e 6 API calls 3114->3117 3300 4034d4 3114->3300 3116->3105 3116->3112 3117->3114 3118 403253 3118->3112 3118->3118 3119 403290 SetFilePointer 3118->3119 3119->3112 3121 40694b 5 API calls 3120->3121 3122 403c3d 3121->3122 3123 403c43 3122->3123 3124 403c55 3122->3124 3332 40649e wsprintfW 3123->3332 3125 406425 3 API calls 3124->3125 3126 403c85 3125->3126 3127 403ca4 lstrcatW 3126->3127 3130 406425 3 API calls 3126->3130 3129 403c53 3127->3129 3324 403eff 3129->3324 3130->3127 3133 405f2e 18 API calls 3134 403cd6 3133->3134 3135 403d6a 3134->3135 3138 406425 3 API calls 3134->3138 3136 405f2e 18 API calls 3135->3136 3137 403d70 3136->3137 3139 403d80 LoadImageW 3137->3139 3141 406594 21 API calls 3137->3141 3140 403d08 3138->3140 3142 403e26 3139->3142 3143 403da7 RegisterClassW 3139->3143 3140->3135 3144 403d29 lstrlenW 3140->3144 3147 405e53 CharNextW 3140->3147 3141->3139 3146 40140b 2 API calls 3142->3146 3145 403ddd SystemParametersInfoW CreateWindowExW 3143->3145 3148 403941 3143->3148 3149 403d37 lstrcmpiW 3144->3149 3150 403d5d 3144->3150 3145->3142 3151 403e2c 3146->3151 3152 403d26 3147->3152 3148->3027 3149->3150 3153 403d47 GetFileAttributesW 3149->3153 3154 405e26 3 API calls 3150->3154 3151->3148 3156 403eff 22 API calls 3151->3156 3152->3144 3155 403d53 3153->3155 3157 403d63 3154->3157 3155->3150 3158 405e72 2 API calls 3155->3158 3159 403e3d 3156->3159 3333 406557 lstrcpynW 3157->3333 3158->3150 3161 403e49 ShowWindow 3159->3161 3162 403ecc 3159->3162 3164 4068db 3 API calls 3161->3164 3334 4056af OleInitialize 3162->3334 3166 403e61 3164->3166 3165 403ed2 3168 403ed6 3165->3168 3169 403eee 3165->3169 3167 403e6f GetClassInfoW 3166->3167 3170 4068db 3 API calls 3166->3170 3172 403e83 GetClassInfoW RegisterClassW 3167->3172 3173 403e99 DialogBoxParamW 3167->3173 3168->3148 3175 40140b 2 API calls 3168->3175 3171 40140b 2 API calls 3169->3171 3170->3167 3171->3148 3172->3173 3174 40140b 2 API calls 3173->3174 3176 403ec1 3174->3176 3175->3148 3176->3148 3177->3014 3352 406557 lstrcpynW 3178->3352 3180 405f3f 3353 405ed1 CharNextW CharNextW 3180->3353 3183 403913 3183->3027 3192 406557 lstrcpynW 3183->3192 3184 406805 5 API calls 3190 405f55 3184->3190 3185 405f86 lstrlenW 3186 405f91 3185->3186 3185->3190 3188 405e26 3 API calls 3186->3188 3187 4068b4 2 API calls 3187->3190 3189 405f96 GetFileAttributesW 3188->3189 3189->3183 3190->3183 3190->3185 3190->3187 3191 405e72 2 API calls 3190->3191 3191->3185 3192->3060 3193->3031 3195 40694b 5 API calls 3194->3195 3196 40394f lstrlenW 3195->3196 3197 406557 lstrcpynW 3196->3197 3197->3057 3198->3059 3200 405afb GetLastError 3199->3200 3201 405af7 3199->3201 3200->3201 3201->3077 3203 405b15 3202->3203 3204 405b19 GetLastError 3202->3204 3203->3077 3204->3203 3206 405f2e 18 API calls 3205->3206 3207 405c83 3206->3207 3208 405ca2 3207->3208 3209 405c8b DeleteFileW 3207->3209 3210 405dc2 3208->3210 3359 406557 lstrcpynW 3208->3359 3238 405dd9 3209->3238 3217 4068b4 2 API calls 3210->3217 3210->3238 3212 405cc8 3213 405cdb 3212->3213 3214 405cce lstrcatW 3212->3214 3216 405e72 2 API calls 3213->3216 3215 405ce1 3214->3215 3218 405cf1 lstrcatW 3215->3218 3220 405cfc lstrlenW FindFirstFileW 3215->3220 3216->3215 3219 405de7 3217->3219 3218->3220 3221 405e26 3 API calls 3219->3221 3219->3238 3220->3210 3222 405d1e 3220->3222 3223 405df1 3221->3223 3224 405da5 FindNextFileW 3222->3224 3234 405c63 64 API calls 3222->3234 3236 4055dc 28 API calls 3222->3236 3239 4055dc 28 API calls 3222->3239 3240 406317 40 API calls 3222->3240 3360 406557 lstrcpynW 3222->3360 3361 405c1b 3222->3361 3225 405c1b 5 API calls 3223->3225 3224->3222 3228 405dbb FindClose 3224->3228 3227 405dfd 3225->3227 3229 405e17 3227->3229 3230 405e01 3227->3230 3228->3210 3232 4055dc 28 API calls 3229->3232 3233 4055dc 28 API calls 3230->3233 3230->3238 3232->3238 3235 405e0e 3233->3235 3234->3222 3237 406317 40 API calls 3235->3237 3236->3224 3237->3238 3238->3077 3239->3222 3240->3222 3242 403a2c CopyFileW 3241->3242 3243 40632b 3241->3243 3242->3071 3242->3077 3372 40619d 3243->3372 3246 405b79 3245->3246 3247 405b6d CloseHandle 3245->3247 3246->3077 3247->3246 3249 4068ca FindClose 3248->3249 3250 4068d5 3248->3250 3249->3250 3250->3077 3252 405bcc 3251->3252 3253 403a9d ExitProcess 3252->3253 3254 405be0 MessageBoxIndirectW 3252->3254 3254->3253 3256 401389 2 API calls 3255->3256 3257 401420 3256->3257 3257->3036 3259 405e42 lstrcatW 3258->3259 3260 40351f 3258->3260 3259->3260 3260->3088 3261->3094 3262->3096 3264 405e80 3263->3264 3265 4030ee 3264->3265 3266 405e86 CharPrevW 3264->3266 3267 406557 lstrcpynW 3265->3267 3266->3264 3266->3265 3267->3100 3269 403027 3268->3269 3270 40303f 3268->3270 3271 403030 DestroyWindow 3269->3271 3272 403037 3269->3272 3273 403047 3270->3273 3274 40304f GetTickCount 3270->3274 3271->3272 3272->3103 3304 406987 3273->3304 3275 403080 3274->3275 3276 40305d CreateDialogParamW ShowWindow 3274->3276 3275->3103 3276->3275 3279->3111 3282 4032d2 3280->3282 3281 403300 3283 4034d4 ReadFile 3281->3283 3282->3281 3310 4034ea SetFilePointer 3282->3310 3285 40330b 3283->3285 3286 40346d 3285->3286 3287 40331d GetTickCount 3285->3287 3289 403457 3285->3289 3288 4034af 3286->3288 3293 403471 3286->3293 3287->3289 3296 40336c 3287->3296 3290 4034d4 ReadFile 3288->3290 3289->3118 3290->3289 3291 4034d4 ReadFile 3291->3296 3292 4034d4 ReadFile 3292->3293 3293->3289 3293->3292 3294 4060f9 WriteFile 3293->3294 3294->3293 3295 4033c2 GetTickCount 3295->3296 3296->3289 3296->3291 3296->3295 3297 4033e7 MulDiv wsprintfW 3296->3297 3308 4060f9 WriteFile 3296->3308 3311 4055dc 3297->3311 3322 4060ca ReadFile 3300->3322 3303->3110 3305 4069a4 PeekMessageW 3304->3305 3306 40304d 3305->3306 3307 40699a DispatchMessageW 3305->3307 3306->3103 3307->3305 3309 406117 3308->3309 3309->3296 3310->3281 3312 4055f7 3311->3312 3313 405699 3311->3313 3314 405613 lstrlenW 3312->3314 3317 406594 21 API calls 3312->3317 3313->3296 3315 405621 lstrlenW 3314->3315 3316 40563c 3314->3316 3315->3313 3318 405633 lstrcatW 3315->3318 3319 405642 SetWindowTextW 3316->3319 3320 40564f 3316->3320 3317->3314 3318->3316 3319->3320 3320->3313 3321 405655 SendMessageW SendMessageW SendMessageW 3320->3321 3321->3313 3323 4034e7 3322->3323 3323->3114 3325 403f13 3324->3325 3341 40649e wsprintfW 3325->3341 3327 403f84 3342 403fb8 3327->3342 3329 403cb4 3329->3133 3330 403f89 3330->3329 3331 406594 21 API calls 3330->3331 3331->3330 3332->3129 3333->3135 3345 404522 3334->3345 3336 404522 SendMessageW 3338 40570b OleUninitialize 3336->3338 3337 4056d2 3340 4056f9 3337->3340 3348 401389 3337->3348 3338->3165 3340->3336 3341->3327 3343 406594 21 API calls 3342->3343 3344 403fc6 SetWindowTextW 3343->3344 3344->3330 3346 40453a 3345->3346 3347 40452b SendMessageW 3345->3347 3346->3337 3347->3346 3350 401390 3348->3350 3349 4013fe 3349->3337 3350->3349 3351 4013cb MulDiv SendMessageW 3350->3351 3351->3350 3352->3180 3354 405eee 3353->3354 3357 405f00 3353->3357 3356 405efb CharNextW 3354->3356 3354->3357 3355 405f24 3355->3183 3355->3184 3356->3355 3357->3355 3358 405e53 CharNextW 3357->3358 3358->3357 3359->3212 3360->3222 3369 406022 GetFileAttributesW 3361->3369 3364 405c48 3364->3222 3365 405c36 RemoveDirectoryW 3367 405c44 3365->3367 3366 405c3e DeleteFileW 3366->3367 3367->3364 3368 405c54 SetFileAttributesW 3367->3368 3368->3364 3370 405c27 3369->3370 3371 406034 SetFileAttributesW 3369->3371 3370->3364 3370->3365 3370->3366 3371->3370 3373 4061f3 GetShortPathNameW 3372->3373 3374 4061cd 3372->3374 3376 406312 3373->3376 3377 406208 3373->3377 3399 406047 GetFileAttributesW CreateFileW 3374->3399 3376->3242 3377->3376 3379 406210 wsprintfA 3377->3379 3378 4061d7 CloseHandle GetShortPathNameW 3378->3376 3380 4061eb 3378->3380 3381 406594 21 API calls 3379->3381 3380->3373 3380->3376 3382 406238 3381->3382 3400 406047 GetFileAttributesW CreateFileW 3382->3400 3384 406245 3384->3376 3385 406254 GetFileSize GlobalAlloc 3384->3385 3386 406276 3385->3386 3387 40630b CloseHandle 3385->3387 3388 4060ca ReadFile 3386->3388 3387->3376 3389 40627e 3388->3389 3389->3387 3401 405fac lstrlenA 3389->3401 3392 406295 lstrcpyA 3395 4062b7 3392->3395 3393 4062a9 3394 405fac 4 API calls 3393->3394 3394->3395 3396 4062ee SetFilePointer 3395->3396 3397 4060f9 WriteFile 3396->3397 3398 406304 GlobalFree 3397->3398 3398->3387 3399->3378 3400->3384 3402 405fed lstrlenA 3401->3402 3403 405ff5 3402->3403 3404 405fc6 lstrcmpiA 3402->3404 3403->3392 3403->3393 3404->3403 3405 405fe4 CharNextA 3404->3405 3405->3402 4383 401a35 4384 402dab 21 API calls 4383->4384 4385 401a3e ExpandEnvironmentStringsW 4384->4385 4386 401a52 4385->4386 4388 401a65 4385->4388 4387 401a57 lstrcmpW 4386->4387 4386->4388 4387->4388 4394 4023b7 4395 4023c5 4394->4395 4396 4023bf 4394->4396 4398 4023d3 4395->4398 4399 402dab 21 API calls 4395->4399 4397 402dab 21 API calls 4396->4397 4397->4395 4400 4023e1 4398->4400 4401 402dab 21 API calls 4398->4401 4399->4398 4402 402dab 21 API calls 4400->4402 4401->4400 4403 4023ea WritePrivateProfileStringW 4402->4403 4404 4014b8 4405 4014be 4404->4405 4406 401389 2 API calls 4405->4406 4407 4014c6 4406->4407 4408 402439 4409 402441 4408->4409 4410 40246c 4408->4410 4412 402deb 21 API calls 4409->4412 4411 402dab 21 API calls 4410->4411 4413 402473 4411->4413 4414 402448 4412->4414 4419 402e69 4413->4419 4416 402dab 21 API calls 4414->4416 4418 402480 4414->4418 4417 402459 RegDeleteValueW RegCloseKey 4416->4417 4417->4418 4420 402e76 4419->4420 4421 402e7d 4419->4421 4420->4418 4421->4420 4423 402eae 4421->4423 4424 4063c4 RegOpenKeyExW 4423->4424 4425 402edc 4424->4425 4426 402eec RegEnumValueW 4425->4426 4430 402f0f 4425->4430 4434 402f86 4425->4434 4427 402f76 RegCloseKey 4426->4427 4426->4430 4427->4434 4428 402f4b RegEnumKeyW 4429 402f54 RegCloseKey 4428->4429 4428->4430 4431 40694b 5 API calls 4429->4431 4430->4427 4430->4428 4430->4429 4432 402eae 6 API calls 4430->4432 4433 402f64 4431->4433 4432->4430 4433->4434 4435 402f68 RegDeleteKeyW 4433->4435 4434->4420 4435->4434 4436 40173a 4437 402dab 21 API calls 4436->4437 4438 401741 SearchPathW 4437->4438 4439 40175c 4438->4439 4440 401d3d 4441 402d89 21 API calls 4440->4441 4442 401d44 4441->4442 4443 402d89 21 API calls 4442->4443 4444 401d50 GetDlgItem 4443->4444 4445 40263d 4444->4445

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 0 403532-403584 SetErrorMode GetVersionExW 1 403586-4035b6 GetVersionExW 0->1 2 4035be-4035c3 0->2 1->2 3 4035c5 2->3 4 4035cb-40360d 2->4 3->4 5 403620 4->5 6 40360f-403617 call 40694b 4->6 7 403625-403639 call 4068db lstrlenA 5->7 6->5 12 403619 6->12 13 40363b-403657 call 40694b * 3 7->13 12->5 20 403668-4036cc #17 OleInitialize SHGetFileInfoW call 406557 GetCommandLineW call 406557 13->20 21 403659-40365f 13->21 28 4036d5-4036e9 call 405e53 CharNextW 20->28 29 4036ce-4036d0 20->29 21->20 26 403661 21->26 26->20 32 4037e4-4037ea 28->32 29->28 33 4037f0 32->33 34 4036ee-4036f4 32->34 37 403804-40381e GetTempPathW call 403501 33->37 35 4036f6-4036fb 34->35 36 4036fd-403704 34->36 35->35 35->36 39 403706-40370b 36->39 40 40370c-403710 36->40 44 403820-40383e GetWindowsDirectoryW lstrcatW call 403501 37->44 45 403876-403890 DeleteFileW call 403082 37->45 39->40 42 4037d1-4037e0 call 405e53 40->42 43 403716-40371c 40->43 42->32 61 4037e2-4037e3 42->61 47 403736-40376f 43->47 48 40371e-403725 43->48 44->45 64 403840-403870 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403501 44->64 66 403896-40389c 45->66 67 403a7d-403a8d ExitProcess CoUninitialize 45->67 49 403771-403776 47->49 50 40378c-4037c6 47->50 54 403727-40372a 48->54 55 40372c 48->55 49->50 56 403778-403780 49->56 58 4037c8-4037cc 50->58 59 4037ce-4037d0 50->59 54->47 54->55 55->47 62 403782-403785 56->62 63 403787 56->63 58->59 65 4037f2-4037ff call 406557 58->65 59->42 61->32 62->50 62->63 63->50 64->45 64->67 65->37 71 4038a2-4038ad call 405e53 66->71 72 403935-40393c call 403c29 66->72 69 403ab3-403ab9 67->69 70 403a8f-403a9f call 405bb7 ExitProcess 67->70 77 403b37-403b3f 69->77 78 403abb-403ad1 GetCurrentProcess OpenProcessToken 69->78 87 4038fb-403905 71->87 88 4038af-4038e4 71->88 82 403941-403945 72->82 83 403b41 77->83 84 403b45-403b49 ExitProcess 77->84 80 403ad3-403b01 LookupPrivilegeValueW AdjustTokenPrivileges 78->80 81 403b07-403b15 call 40694b 78->81 80->81 97 403b23-403b2e ExitWindowsEx 81->97 98 403b17-403b21 81->98 82->67 83->84 92 403907-403915 call 405f2e 87->92 93 40394a-403970 call 405b22 lstrlenW call 406557 87->93 90 4038e6-4038ea 88->90 94 4038f3-4038f7 90->94 95 4038ec-4038f1 90->95 92->67 107 40391b-403931 call 406557 * 2 92->107 110 403981-403999 93->110 111 403972-40397c call 406557 93->111 94->90 100 4038f9 94->100 95->94 95->100 97->77 102 403b30-403b32 call 40140b 97->102 98->97 98->102 100->87 102->77 107->72 114 40399e-4039a2 110->114 111->110 116 4039a7-4039d1 wsprintfW call 406594 114->116 120 4039d3-4039d8 call 405aab 116->120 121 4039da call 405b05 116->121 124 4039df-4039e1 120->124 121->124 126 4039e3-4039ed GetFileAttributesW 124->126 127 403a1d-403a3c SetCurrentDirectoryW call 406317 CopyFileW 124->127 128 403a0e-403a19 126->128 129 4039ef-4039f8 DeleteFileW 126->129 135 403a7b 127->135 136 403a3e-403a5f call 406317 call 406594 call 405b3a 127->136 128->114 132 403a1b 128->132 129->128 131 4039fa-403a0c call 405c63 129->131 131->116 131->128 132->67 135->67 144 403a61-403a6b 136->144 145 403aa5-403ab1 CloseHandle 136->145 144->135 146 403a6d-403a75 call 4068b4 144->146 145->135 146->116 146->135
              APIs
              • SetErrorMode.KERNELBASE ref: 00403555
              • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 00403580
              • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 00403593
              • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 0040362C
              • #17.COMCTL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403669
              • OleInitialize.OLE32(00000000), ref: 00403670
              • SHGetFileInfoW.SHELL32(0042AA28,00000000,?,000002B4,00000000), ref: 0040368F
              • GetCommandLineW.KERNEL32(00433700,NSIS Error,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004036A4
              • CharNextW.USER32(00000000,0043F000,00000020,0043F000,00000000,?,00000008,0000000A,0000000C), ref: 004036DD
              • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00008001,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403815
              • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403826
              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403832
              • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403846
              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040384E
              • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040385F
              • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403867
              • DeleteFileW.KERNELBASE(1033,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040387B
              • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0043F000,00000000,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403954
                • Part of subcall function 00406557: lstrcpynW.KERNEL32(?,?,00000400,004036A4,00433700,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406564
              • wsprintfW.USER32 ref: 004039B1
              • GetFileAttributesW.KERNEL32(00437800,C:\Users\user\AppData\Local\Temp\), ref: 004039E4
              • DeleteFileW.KERNEL32(00437800), ref: 004039F0
              • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403A1E
                • Part of subcall function 00406317: MoveFileExW.KERNEL32(?,?,00000005,00405E15,?,00000000,000000F1,?,?,?,?,?), ref: 00406321
              • CopyFileW.KERNEL32(C:\Users\user\Desktop\runonce.exe,00437800,00000001,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403A34
                • Part of subcall function 00405B3A: CreateProcessW.KERNEL32(00000000,00437800,00000000,00000000,00000000,04000000,00000000,00000000,0042FA70,?,?,?,00437800,?), ref: 00405B63
                • Part of subcall function 00405B3A: CloseHandle.KERNEL32(?,?,?,00437800,?), ref: 00405B70
                • Part of subcall function 004068B4: FindFirstFileW.KERNELBASE(75923420,0042FAB8,C:\,00405F77,C:\,C:\,00000000,C:\,C:\,75923420,?,C:\Users\user\AppData\Local\Temp\,00405C83,?,75923420,C:\Users\user\AppData\Local\Temp\), ref: 004068BF
                • Part of subcall function 004068B4: FindClose.KERNELBASE(00000000), ref: 004068CB
              • ExitProcess.KERNEL32(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A7D
              • CoUninitialize.COMBASE(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A82
              • ExitProcess.KERNEL32 ref: 00403A9F
              • CloseHandle.KERNEL32(00000000,00438000,00438000,?,00437800,00000000), ref: 00403AA6
              • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403AC2
              • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403AC9
              • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403ADE
              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403B01
              • ExitWindowsEx.USER32(00000002,80040002), ref: 00403B26
              • ExitProcess.KERNEL32 ref: 00403B49
                • Part of subcall function 00405B05: CreateDirectoryW.KERNELBASE(?,00000000,00403525,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 00405B0B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: File$Process$Exit$CloseDirectory$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
              • String ID: 1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop\runonce.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu%X.tmp
              • API String ID: 2017177436-826633580
              • Opcode ID: ecd133bdca3a5f08cefff4cdf30355b9140becdcd9c01b372e8bc1a196a9c516
              • Instruction ID: 6c1349364f4d22fadfcc29bbd5f82b0434b4f5ba6e08f6571c64e8404a3f48da
              • Opcode Fuzzy Hash: ecd133bdca3a5f08cefff4cdf30355b9140becdcd9c01b372e8bc1a196a9c516
              • Instruction Fuzzy Hash: 64F10270604301ABD320AF659D45B2B7AE8EF8570AF10483EF581B22D1DB7DDA45CB6E

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 290 405c63-405c89 call 405f2e 293 405ca2-405ca9 290->293 294 405c8b-405c9d DeleteFileW 290->294 296 405cab-405cad 293->296 297 405cbc-405ccc call 406557 293->297 295 405e1f-405e23 294->295 298 405cb3-405cb6 296->298 299 405dcd-405dd2 296->299 303 405cdb-405cdc call 405e72 297->303 304 405cce-405cd9 lstrcatW 297->304 298->297 298->299 299->295 302 405dd4-405dd7 299->302 305 405de1-405de9 call 4068b4 302->305 306 405dd9-405ddf 302->306 307 405ce1-405ce5 303->307 304->307 305->295 313 405deb-405dff call 405e26 call 405c1b 305->313 306->295 310 405cf1-405cf7 lstrcatW 307->310 311 405ce7-405cef 307->311 314 405cfc-405d18 lstrlenW FindFirstFileW 310->314 311->310 311->314 330 405e01-405e04 313->330 331 405e17-405e1a call 4055dc 313->331 316 405dc2-405dc6 314->316 317 405d1e-405d26 314->317 316->299 321 405dc8 316->321 318 405d46-405d5a call 406557 317->318 319 405d28-405d30 317->319 332 405d71-405d7c call 405c1b 318->332 333 405d5c-405d64 318->333 322 405d32-405d3a 319->322 323 405da5-405db5 FindNextFileW 319->323 321->299 322->318 326 405d3c-405d44 322->326 323->317 329 405dbb-405dbc FindClose 323->329 326->318 326->323 329->316 330->306 334 405e06-405e15 call 4055dc call 406317 330->334 331->295 343 405d9d-405da0 call 4055dc 332->343 344 405d7e-405d81 332->344 333->323 335 405d66-405d6f call 405c63 333->335 334->295 335->323 343->323 347 405d83-405d93 call 4055dc call 406317 344->347 348 405d95-405d9b 344->348 347->323 348->323
              APIs
              • DeleteFileW.KERNELBASE(?,?,75923420,C:\Users\user\AppData\Local\Temp\,0043F000), ref: 00405C8C
              • lstrcatW.KERNEL32(0042EA70,\*.*,0042EA70,?,?,75923420,C:\Users\user\AppData\Local\Temp\,0043F000), ref: 00405CD4
              • lstrcatW.KERNEL32(?,0040A014,?,0042EA70,?,?,75923420,C:\Users\user\AppData\Local\Temp\,0043F000), ref: 00405CF7
              • lstrlenW.KERNEL32(?,?,0040A014,?,0042EA70,?,?,75923420,C:\Users\user\AppData\Local\Temp\,0043F000), ref: 00405CFD
              • FindFirstFileW.KERNELBASE(0042EA70,?,?,?,0040A014,?,0042EA70,?,?,75923420,C:\Users\user\AppData\Local\Temp\,0043F000), ref: 00405D0D
              • FindNextFileW.KERNELBASE(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405DAD
              • FindClose.KERNEL32(00000000), ref: 00405DBC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
              • String ID: C:\Users\user\AppData\Local\Temp\$\*.*$pB
              • API String ID: 2035342205-1746305512
              • Opcode ID: bc80552e2adf98b6cbbc0c73f9d9449be503fe2b945a8ee0ce3316eb6b08af02
              • Instruction ID: 3df5019795aaf58f6817f8e3609a5bcb0d9fa216103f8ca083ea3247371bac5c
              • Opcode Fuzzy Hash: bc80552e2adf98b6cbbc0c73f9d9449be503fe2b945a8ee0ce3316eb6b08af02
              • Instruction Fuzzy Hash: 2441B231400A14BADB21BB65DC8DAAF7678EF81714F24813BF801B11D1DB7C4A81DEAE

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 526 4068b4-4068c8 FindFirstFileW 527 4068d5 526->527 528 4068ca-4068d3 FindClose 526->528 529 4068d7-4068d8 527->529 528->529
              APIs
              • FindFirstFileW.KERNELBASE(75923420,0042FAB8,C:\,00405F77,C:\,C:\,00000000,C:\,C:\,75923420,?,C:\Users\user\AppData\Local\Temp\,00405C83,?,75923420,C:\Users\user\AppData\Local\Temp\), ref: 004068BF
              • FindClose.KERNELBASE(00000000), ref: 004068CB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: Find$CloseFileFirst
              • String ID: C:\
              • API String ID: 2295610775-3404278061
              • Opcode ID: d8a05a579feb8caf00dd3d3e1258ef949bc643ef28fd0ab534c34ddbe61a4aed
              • Instruction ID: 0f602bcf77736d61886636fd33b874369bd8b56ce32760b4adaf045605f9a717
              • Opcode Fuzzy Hash: d8a05a579feb8caf00dd3d3e1258ef949bc643ef28fd0ab534c34ddbe61a4aed
              • Instruction Fuzzy Hash: 24D012725161309BC2406738AD0C84B7B58AF15331751CA37F56BF21E0D7348C6387A9

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 149 403c29-403c41 call 40694b 152 403c43-403c53 call 40649e 149->152 153 403c55-403c8c call 406425 149->153 162 403caf-403cd8 call 403eff call 405f2e 152->162 157 403ca4-403caa lstrcatW 153->157 158 403c8e-403c9f call 406425 153->158 157->162 158->157 167 403d6a-403d72 call 405f2e 162->167 168 403cde-403ce3 162->168 173 403d80-403da5 LoadImageW 167->173 174 403d74-403d7b call 406594 167->174 168->167 169 403ce9-403d11 call 406425 168->169 169->167 176 403d13-403d17 169->176 178 403e26-403e2e call 40140b 173->178 179 403da7-403dd7 RegisterClassW 173->179 174->173 180 403d29-403d35 lstrlenW 176->180 181 403d19-403d26 call 405e53 176->181 192 403e30-403e33 178->192 193 403e38-403e43 call 403eff 178->193 182 403ef5 179->182 183 403ddd-403e21 SystemParametersInfoW CreateWindowExW 179->183 187 403d37-403d45 lstrcmpiW 180->187 188 403d5d-403d65 call 405e26 call 406557 180->188 181->180 186 403ef7-403efe 182->186 183->178 187->188 191 403d47-403d51 GetFileAttributesW 187->191 188->167 195 403d53-403d55 191->195 196 403d57-403d58 call 405e72 191->196 192->186 202 403e49-403e63 ShowWindow call 4068db 193->202 203 403ecc-403ed4 call 4056af 193->203 195->188 195->196 196->188 208 403e65-403e6a call 4068db 202->208 209 403e6f-403e81 GetClassInfoW 202->209 210 403ed6-403edc 203->210 211 403eee-403ef0 call 40140b 203->211 208->209 214 403e83-403e93 GetClassInfoW RegisterClassW 209->214 215 403e99-403eca DialogBoxParamW call 40140b call 403b79 209->215 210->192 216 403ee2-403ee9 call 40140b 210->216 211->182 214->215 215->186 216->192
              APIs
                • Part of subcall function 0040694B: GetModuleHandleA.KERNEL32(?,00000020,?,00403642,0000000C,?,?,?,?,?,?,?,?), ref: 0040695D
                • Part of subcall function 0040694B: GetProcAddress.KERNEL32(00000000,?), ref: 00406978
              • lstrcatW.KERNEL32(1033,0042CA68,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042CA68,00000000,00000002,75923420,C:\Users\user\AppData\Local\Temp\,00000000,0043F000,00008001), ref: 00403CAA
              • lstrlenW.KERNEL32(004326A0,?,?,?,004326A0,00000000,0043F800,1033,0042CA68,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042CA68,00000000,00000002,75923420), ref: 00403D2A
              • lstrcmpiW.KERNEL32(00432698,.exe,004326A0,?,?,?,004326A0,00000000,0043F800,1033,0042CA68,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042CA68,00000000), ref: 00403D3D
              • GetFileAttributesW.KERNEL32(004326A0), ref: 00403D48
              • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,0043F800), ref: 00403D91
                • Part of subcall function 0040649E: wsprintfW.USER32 ref: 004064AB
              • RegisterClassW.USER32(004336A0), ref: 00403DCE
              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403DE6
              • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403E1B
              • ShowWindow.USER32(00000005,00000000), ref: 00403E51
              • GetClassInfoW.USER32(00000000,RichEdit20W,004336A0), ref: 00403E7D
              • GetClassInfoW.USER32(00000000,RichEdit,004336A0), ref: 00403E8A
              • RegisterClassW.USER32(004336A0), ref: 00403E93
              • DialogBoxParamW.USER32(?,00000000,00403FD7,00000000), ref: 00403EB2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
              • String ID: .DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
              • API String ID: 1975747703-1629884446
              • Opcode ID: bbb1e3748a54a273649d0fbd54a0890110e87f86c4ca5900aa60a5a95311a30e
              • Instruction ID: b78af383561608ccb802af496d710159af2d94eef556b4765221653e5b422f1b
              • Opcode Fuzzy Hash: bbb1e3748a54a273649d0fbd54a0890110e87f86c4ca5900aa60a5a95311a30e
              • Instruction Fuzzy Hash: 9F61C270100640BED220AF66ED46F2B3A6CEB85B5AF50013FF945B62E2DB7C59418B6D

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 223 403082-4030d0 GetTickCount GetModuleFileNameW call 406047 226 4030d2-4030d7 223->226 227 4030dc-40310a call 406557 call 405e72 call 406557 GetFileSize 223->227 228 4032b2-4032b6 226->228 235 403110 227->235 236 4031f5-403203 call 40301e 227->236 238 403115-40312c 235->238 242 403205-403208 236->242 243 403258-40325d 236->243 240 403130-403139 call 4034d4 238->240 241 40312e 238->241 249 40325f-403267 call 40301e 240->249 250 40313f-403146 240->250 241->240 245 40320a-403222 call 4034ea call 4034d4 242->245 246 40322c-403256 GlobalAlloc call 4034ea call 4032b9 242->246 243->228 245->243 271 403224-40322a 245->271 246->243 270 403269-40327a 246->270 249->243 254 4031c2-4031c6 250->254 255 403148-40315c call 406002 250->255 259 4031d0-4031d6 254->259 260 4031c8-4031cf call 40301e 254->260 255->259 274 40315e-403165 255->274 265 4031e5-4031ed 259->265 266 4031d8-4031e2 call 406a38 259->266 260->259 265->238 269 4031f3 265->269 266->265 269->236 275 403282-403287 270->275 276 40327c 270->276 271->243 271->246 274->259 278 403167-40316e 274->278 280 403288-40328e 275->280 276->275 278->259 279 403170-403177 278->279 279->259 281 403179-403180 279->281 280->280 282 403290-4032ab SetFilePointer call 406002 280->282 281->259 283 403182-4031a2 281->283 286 4032b0 282->286 283->243 285 4031a8-4031ac 283->285 287 4031b4-4031bc 285->287 288 4031ae-4031b2 285->288 286->228 287->259 289 4031be-4031c0 287->289 288->269 288->287 289->259
              APIs
              • GetTickCount.KERNEL32 ref: 00403093
              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\runonce.exe,00000400), ref: 004030AF
                • Part of subcall function 00406047: GetFileAttributesW.KERNELBASE(00000003,004030C2,C:\Users\user\Desktop\runonce.exe,80000000,00000003), ref: 0040604B
                • Part of subcall function 00406047: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606D
              • GetFileSize.KERNEL32(00000000,00000000,00443000,00000000,00440800,00440800,C:\Users\user\Desktop\runonce.exe,C:\Users\user\Desktop\runonce.exe,80000000,00000003), ref: 004030FB
              • GlobalAlloc.KERNELBASE(00000040,?), ref: 00403231
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
              • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop\runonce.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
              • API String ID: 2803837635-2466281613
              • Opcode ID: 4024c06592b314d40f0961ad518ac7c722ea73bb9c6d843fd25d11ff0f4bc292
              • Instruction ID: 68b8bf8592918c5e7f10339d86c9767fe938295b8d0ed8def850c2c8f1d184f5
              • Opcode Fuzzy Hash: 4024c06592b314d40f0961ad518ac7c722ea73bb9c6d843fd25d11ff0f4bc292
              • Instruction Fuzzy Hash: 8251A071A00204ABDB20AF65DD85B9E7EACEB49356F10417BF900B62D1C77C9F408BAD

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 354 4032b9-4032d0 355 4032d2 354->355 356 4032d9-4032e2 354->356 355->356 357 4032e4 356->357 358 4032eb-4032f0 356->358 357->358 359 403300-40330d call 4034d4 358->359 360 4032f2-4032fb call 4034ea 358->360 364 4034c2 359->364 365 403313-403317 359->365 360->359 366 4034c4-4034c5 364->366 367 40346d-40346f 365->367 368 40331d-403366 GetTickCount 365->368 371 4034cd-4034d1 366->371 369 403471-403474 367->369 370 4034af-4034b2 367->370 372 4034ca 368->372 373 40336c-403374 368->373 369->372 374 403476 369->374 377 4034b4 370->377 378 4034b7-4034c0 call 4034d4 370->378 372->371 375 403376 373->375 376 403379-403387 call 4034d4 373->376 380 403479-40347f 374->380 375->376 376->364 388 40338d-403396 376->388 377->378 378->364 386 4034c7 378->386 383 403481 380->383 384 403483-403491 call 4034d4 380->384 383->384 384->364 391 403493-40349f call 4060f9 384->391 386->372 390 40339c-4033bc call 406aa6 388->390 396 4033c2-4033d5 GetTickCount 390->396 397 403465-403467 390->397 398 4034a1-4034ab 391->398 399 403469-40346b 391->399 400 403420-403422 396->400 401 4033d7-4033df 396->401 397->366 398->380 406 4034ad 398->406 399->366 404 403424-403428 400->404 405 403459-40345d 400->405 402 4033e1-4033e5 401->402 403 4033e7-40341d MulDiv wsprintfW call 4055dc 401->403 402->400 402->403 403->400 408 40342a-403431 call 4060f9 404->408 409 40343f-40344a 404->409 405->373 410 403463 405->410 406->372 414 403436-403438 408->414 413 40344d-403451 409->413 410->372 413->390 415 403457 413->415 414->399 416 40343a-40343d 414->416 415->372 416->413
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: CountTick$wsprintf
              • String ID: *B$ A$ A$... %d%%
              • API String ID: 551687249-3485722521
              • Opcode ID: b04dab49cf37ea20022f46a8b7c81c1884779548b4bab61156e959bad0df676f
              • Instruction ID: 982be0e2f69b4341102b9ffd21d6361bbd2cc6e706b5ad6adcc0aeecd99e7a45
              • Opcode Fuzzy Hash: b04dab49cf37ea20022f46a8b7c81c1884779548b4bab61156e959bad0df676f
              • Instruction Fuzzy Hash: 1A516F71910219EBCB11CF65DA44B9E7FB8AF04756F10827BE814BB2D1C7789A40CB99

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 417 401774-401799 call 402dab call 405e9d 422 4017a3-4017b5 call 406557 call 405e26 lstrcatW 417->422 423 40179b-4017a1 call 406557 417->423 428 4017ba-4017bb call 406805 422->428 423->428 432 4017c0-4017c4 428->432 433 4017c6-4017d0 call 4068b4 432->433 434 4017f7-4017fa 432->434 442 4017e2-4017f4 433->442 443 4017d2-4017e0 CompareFileTime 433->443 436 401802-40181e call 406047 434->436 437 4017fc-4017fd call 406022 434->437 444 401820-401823 436->444 445 401892-4018bb call 4055dc call 4032b9 436->445 437->436 442->434 443->442 446 401874-40187e call 4055dc 444->446 447 401825-401863 call 406557 * 2 call 406594 call 406557 call 405bb7 444->447 459 4018c3-4018cf SetFileTime 445->459 460 4018bd-4018c1 445->460 457 401887-40188d 446->457 447->432 479 401869-40186a 447->479 461 402c38 457->461 463 4018d5-4018e0 CloseHandle 459->463 460->459 460->463 467 402c3a-402c3e 461->467 464 4018e6-4018e9 463->464 465 402c2f-402c32 463->465 468 4018eb-4018fc call 406594 lstrcatW 464->468 469 4018fe-401901 call 406594 464->469 465->461 475 401906-4023a7 call 405bb7 468->475 469->475 475->465 475->467 479->457 481 40186c-40186d 479->481 481->446
              APIs
              • lstrcatW.KERNEL32(00000000,00000000,Write,00440000,?,?,00000031), ref: 004017B5
              • CompareFileTime.KERNEL32(-00000014,?,Write,Write,00000000,00000000,Write,00440000,?,?,00000031), ref: 004017DA
                • Part of subcall function 00406557: lstrcpynW.KERNEL32(?,?,00000400,004036A4,00433700,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406564
                • Part of subcall function 004055DC: lstrlenW.KERNEL32(0042BA48,00000000,?,759223A0,?,?,?,?,?,?,?,?,?,0040341D,00000000,?), ref: 00405614
                • Part of subcall function 004055DC: lstrlenW.KERNEL32(0040341D,0042BA48,00000000,?,759223A0,?,?,?,?,?,?,?,?,?,0040341D,00000000), ref: 00405624
                • Part of subcall function 004055DC: lstrcatW.KERNEL32(0042BA48,0040341D,0040341D,0042BA48,00000000,?,759223A0), ref: 00405637
                • Part of subcall function 004055DC: SetWindowTextW.USER32(0042BA48,0042BA48), ref: 00405649
                • Part of subcall function 004055DC: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566F
                • Part of subcall function 004055DC: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405689
                • Part of subcall function 004055DC: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405697
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
              • String ID: C:\Users\user\AppData\Local\Temp\nsjF7BA.tmp\LogEx.dll$NNLSG$Write
              • API String ID: 1941528284-1060662145
              • Opcode ID: 5d94e8e5950a8b2ff13ebbfcdf8ec3f64fd71dec5ee91277c9a67e4679359a3d
              • Instruction ID: f3bec3fd9c2ad120a03a9c06557e7274b723a0da437845685234e4033458a62e
              • Opcode Fuzzy Hash: 5d94e8e5950a8b2ff13ebbfcdf8ec3f64fd71dec5ee91277c9a67e4679359a3d
              • Instruction Fuzzy Hash: 0B419471800108BACB11BFA5DD85DBE76B9EF45328B21423FF412B10E2DB3C8A519A2D

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 483 4068db-4068fb GetSystemDirectoryW 484 4068fd 483->484 485 4068ff-406901 483->485 484->485 486 406912-406914 485->486 487 406903-40690c 485->487 489 406915-406948 wsprintfW LoadLibraryExW 486->489 487->486 488 40690e-406910 487->488 488->489
              APIs
              • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068F2
              • wsprintfW.USER32 ref: 0040692D
              • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406941
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: DirectoryLibraryLoadSystemwsprintf
              • String ID: %s%S.dll$UXTHEME
              • API String ID: 2200240437-1106614640
              • Opcode ID: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
              • Instruction ID: a217f45d9ff01499786c61cea798a126a457230594f844882b590dd92c6ddc53
              • Opcode Fuzzy Hash: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
              • Instruction Fuzzy Hash: 69F0F671501219A6CF14BB68DD0DF9B376CAB40304F21447AA646F20E0EB789B69CBA8

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 490 405f2e-405f49 call 406557 call 405ed1 495 405f4b-405f4d 490->495 496 405f4f-405f5c call 406805 490->496 497 405fa7-405fa9 495->497 500 405f6c-405f70 496->500 501 405f5e-405f64 496->501 502 405f86-405f8f lstrlenW 500->502 501->495 503 405f66-405f6a 501->503 504 405f91-405fa5 call 405e26 GetFileAttributesW 502->504 505 405f72-405f79 call 4068b4 502->505 503->495 503->500 504->497 510 405f80-405f81 call 405e72 505->510 511 405f7b-405f7e 505->511 510->502 511->495 511->510
              APIs
                • Part of subcall function 00406557: lstrcpynW.KERNEL32(?,?,00000400,004036A4,00433700,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406564
                • Part of subcall function 00405ED1: CharNextW.USER32(?,?,C:\,?,00405F45,C:\,C:\,75923420,?,C:\Users\user\AppData\Local\Temp\,00405C83,?,75923420,C:\Users\user\AppData\Local\Temp\,0043F000), ref: 00405EDF
                • Part of subcall function 00405ED1: CharNextW.USER32(00000000), ref: 00405EE4
                • Part of subcall function 00405ED1: CharNextW.USER32(00000000), ref: 00405EFC
              • lstrlenW.KERNEL32(C:\,00000000,C:\,C:\,75923420,?,C:\Users\user\AppData\Local\Temp\,00405C83,?,75923420,C:\Users\user\AppData\Local\Temp\,0043F000), ref: 00405F87
              • GetFileAttributesW.KERNELBASE(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,75923420,?,C:\Users\user\AppData\Local\Temp\,00405C83,?,75923420,C:\Users\user\AppData\Local\Temp\), ref: 00405F97
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: CharNext$AttributesFilelstrcpynlstrlen
              • String ID: C:\$C:\Users\user\AppData\Local\Temp\
              • API String ID: 3248276644-1964270705
              • Opcode ID: 7c21406a6ebf8fc224ae0ccc6b020e70a1639b7280e68367676f2d78d50147cb
              • Instruction ID: 0bce86d1d95a7c790b53086ee47358a3377499fb664fcb231eb74dc800c81f90
              • Opcode Fuzzy Hash: 7c21406a6ebf8fc224ae0ccc6b020e70a1639b7280e68367676f2d78d50147cb
              • Instruction Fuzzy Hash: 7AF0F43A105E1269D622733A5C09AAF1555CE86360B5A457BFC91B22C6CF3C8A42CCBE

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 513 406076-406082 514 406083-4060b7 GetTickCount GetTempFileNameW 513->514 515 4060c6-4060c8 514->515 516 4060b9-4060bb 514->516 517 4060c0-4060c3 515->517 516->514 518 4060bd 516->518 518->517
              APIs
              • GetTickCount.KERNEL32 ref: 00406094
              • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403530,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C), ref: 004060AF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: CountFileNameTempTick
              • String ID: C:\Users\user\AppData\Local\Temp\$nsa
              • API String ID: 1716503409-44229769
              • Opcode ID: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
              • Instruction ID: 86e06e500a6970b3bc5bd370241205c1b86a0a172d82c816bfbfc8c597d973d5
              • Opcode Fuzzy Hash: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
              • Instruction Fuzzy Hash: 65F09076B50204FBEB10CF69ED05F9EB7ACEB95750F11803AED05F7240E6B099548768

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 519 403b94-403ba4 call 403b79 522 403bc0-403bc8 519->522 523 403ba6 519->523 524 403ba7-403bbd FreeLibrary GlobalFree 523->524 524->524 525 403bbf 524->525 525->522
              APIs
              • FreeLibrary.KERNELBASE(?,75923420,00000000,C:\Users\user\AppData\Local\Temp\,00403B6C,00403A82,?,?,00000008,0000000A,0000000C), ref: 00403BAE
              • GlobalFree.KERNEL32(?), ref: 00403BB5
              Strings
              • C:\Users\user\AppData\Local\Temp\, xrefs: 00403B94
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: Free$GlobalLibrary
              • String ID: C:\Users\user\AppData\Local\Temp\
              • API String ID: 1100898210-823278215
              • Opcode ID: 522759d04011631da2fa13ba2704cf46823a2ab452b41ebb0ecea140ccdeae61
              • Instruction ID: cb28855b84c3abb27e6c937247341fa4f051846acd49e0d4b6103447305c23c4
              • Opcode Fuzzy Hash: 522759d04011631da2fa13ba2704cf46823a2ab452b41ebb0ecea140ccdeae61
              • Instruction Fuzzy Hash: 5DE0C23362083097C6311F55EE04B1A7778AF89B2AF01402AEC407B2618B74AC538FCC

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 530 4020dd-4020e9 531 4021a8-4021aa 530->531 532 4020ef-402105 call 402dab * 2 530->532 533 4022f6-4022fb call 401423 531->533 542 402115-402124 LoadLibraryExW 532->542 543 402107-402113 GetModuleHandleW 532->543 539 402c2f-402c3e 533->539 544 402126-402135 call 4069ba 542->544 545 4021a1-4021a3 542->545 543->542 543->544 549 402170-402175 call 4055dc 544->549 550 402137-40213d 544->550 545->533 554 40217a-40217d 549->554 551 402156-402166 550->551 552 40213f-40214b call 401423 550->552 558 40216b-40216e 551->558 552->554 563 40214d-402154 552->563 554->539 556 402183-40218d call 403bc9 554->556 556->539 562 402193-40219c FreeLibrary 556->562 558->554 562->539 563->554
              APIs
              • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00402108
                • Part of subcall function 004055DC: lstrlenW.KERNEL32(0042BA48,00000000,?,759223A0,?,?,?,?,?,?,?,?,?,0040341D,00000000,?), ref: 00405614
                • Part of subcall function 004055DC: lstrlenW.KERNEL32(0040341D,0042BA48,00000000,?,759223A0,?,?,?,?,?,?,?,?,?,0040341D,00000000), ref: 00405624
                • Part of subcall function 004055DC: lstrcatW.KERNEL32(0042BA48,0040341D,0040341D,0042BA48,00000000,?,759223A0), ref: 00405637
                • Part of subcall function 004055DC: SetWindowTextW.USER32(0042BA48,0042BA48), ref: 00405649
                • Part of subcall function 004055DC: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566F
                • Part of subcall function 004055DC: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405689
                • Part of subcall function 004055DC: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405697
              • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00402119
              • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 00402196
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
              • String ID:
              • API String ID: 334405425-0
              • Opcode ID: 675ba370df0aff6a88f198f51fec383e6e490030c952a3077ac8e14d7d31a15f
              • Instruction ID: 3664ba2fa099400b069473e4dbd5787d756d46fb785c5e03f539e90392346bbf
              • Opcode Fuzzy Hash: 675ba370df0aff6a88f198f51fec383e6e490030c952a3077ac8e14d7d31a15f
              • Instruction Fuzzy Hash: C9219231904108BADF11AFA5CF49A9D7A71FF84358F20413FF201B91E1CBBD8982AA5D

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 564 405c1b-405c2c call 406022 567 405c5c 564->567 568 405c2e-405c34 564->568 569 405c5e-405c60 567->569 570 405c36-405c3c RemoveDirectoryW 568->570 571 405c3e DeleteFileW 568->571 572 405c44-405c46 570->572 571->572 573 405c48-405c4b 572->573 574 405c4d-405c52 572->574 573->569 574->567 575 405c54-405c56 SetFileAttributesW 574->575 575->567
              APIs
                • Part of subcall function 00406022: GetFileAttributesW.KERNELBASE(?,?,00405C27,?,?,00000000,00405DFD,?,?,?,?), ref: 00406027
                • Part of subcall function 00406022: SetFileAttributesW.KERNELBASE(?,00000000), ref: 0040603B
              • RemoveDirectoryW.KERNELBASE(?,?,?,00000000,00405DFD), ref: 00405C36
              • DeleteFileW.KERNELBASE(?,?,?,00000000,00405DFD), ref: 00405C3E
              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405C56
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: File$Attributes$DeleteDirectoryRemove
              • String ID:
              • API String ID: 1655745494-0
              • Opcode ID: db7f6541ced3958ca03b9484ad33d053af3f68eb31512009fba6ce163230055c
              • Instruction ID: 2cd832b5149a82f614695d38d41b3aba95dfe4f26efc6ce9164d7e3db346642e
              • Opcode Fuzzy Hash: db7f6541ced3958ca03b9484ad33d053af3f68eb31512009fba6ce163230055c
              • Instruction Fuzzy Hash: 9AE02B3110D7915AE32077705E0CB5F2AD8DF86324F05093AF492F10C0DB78488A8A7E

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 576 4015c6-4015da call 402dab call 405ed1 581 401636-401639 576->581 582 4015dc-4015ef call 405e53 576->582 584 401668-4022fb call 401423 581->584 585 40163b-40165a call 401423 call 406557 SetCurrentDirectoryW 581->585 590 4015f1-4015f4 582->590 591 401609-40160c call 405b05 582->591 599 402c2f-402c3e 584->599 585->599 602 401660-401663 585->602 590->591 596 4015f6-4015fd call 405b22 590->596 600 401611-401613 591->600 596->591 606 4015ff-401602 call 405aab 596->606 603 401615-40161a 600->603 604 40162c-401634 600->604 602->599 607 401629 603->607 608 40161c-401627 GetFileAttributesW 603->608 604->581 604->582 611 401607 606->611 607->604 608->604 608->607 611->600
              APIs
                • Part of subcall function 00405ED1: CharNextW.USER32(?,?,C:\,?,00405F45,C:\,C:\,75923420,?,C:\Users\user\AppData\Local\Temp\,00405C83,?,75923420,C:\Users\user\AppData\Local\Temp\,0043F000), ref: 00405EDF
                • Part of subcall function 00405ED1: CharNextW.USER32(00000000), ref: 00405EE4
                • Part of subcall function 00405ED1: CharNextW.USER32(00000000), ref: 00405EFC
              • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161F
                • Part of subcall function 00405AAB: CreateDirectoryW.KERNELBASE(00437800,?), ref: 00405AED
              • SetCurrentDirectoryW.KERNEL32(?,00440000,?,00000000,000000F0), ref: 00401652
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: CharNext$Directory$AttributesCreateCurrentFile
              • String ID:
              • API String ID: 1892508949-0
              • Opcode ID: 6eb1be088149721894534dc5ef05b39002eda9ec2efe8824e8f1ae211de42d0c
              • Instruction ID: 6fd3d265dcb44280b24f8e6f21651466162e19908bb00ba525d5af3adea1cd3c
              • Opcode Fuzzy Hash: 6eb1be088149721894534dc5ef05b39002eda9ec2efe8824e8f1ae211de42d0c
              • Instruction Fuzzy Hash: F211E231404104ABCF206FA5CD0159F36B0EF04368B25493FE945B22F1DA3D4A81DA5E

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 612 40252f-402534 call 402deb 614 402539-402547 call 402dab 612->614 617 402933-40293a 614->617 618 40254d-40256b RegQueryValueExW 614->618 621 402c2f-402c3e 617->621 619 40259b-4025a1 618->619 620 40256d-402571 618->620 624 402601-402608 RegCloseKey 619->624 622 402573-402576 620->622 623 402586-402599 call 40649e 620->623 626 402578-40257c 622->626 627 40257e-4025fa 622->627 623->624 624->617 624->621 626->619 626->627 627->624
              APIs
              • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,00000033), ref: 00402560
              • RegCloseKey.ADVAPI32(?,?,?,NNLSG,00000000,00000011,00000002), ref: 00402602
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: CloseQueryValue
              • String ID:
              • API String ID: 3356406503-0
              • Opcode ID: de231594f5fd9ed2f3d170b787f0c7ae88dddfe38e809d01203d2a2c86ad2b9e
              • Instruction ID: fa4e9c421320e09d3f2bb14c05bc69cdd2f01bdd483ca55c6e8c3e2e171c6fbc
              • Opcode Fuzzy Hash: de231594f5fd9ed2f3d170b787f0c7ae88dddfe38e809d01203d2a2c86ad2b9e
              • Instruction Fuzzy Hash: 11116A71900219EBDB14DFA0DA989AEB7B4FF04349B20447FE406B62C0D7B85A45EB5E
              APIs
              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
              • SendMessageW.USER32(0040A2D8,00000402,00000000), ref: 004013F4
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: MessageSend
              • String ID:
              • API String ID: 3850602802-0
              • Opcode ID: a48e27458ca857e7bf1c95edfaa4f4fc3f64b4f364872359a8149092e2b898a4
              • Instruction ID: 0adee223d2b7ba7d815a442a2885e1f2b60e3b86eb1a18037e9b6c54a102055c
              • Opcode Fuzzy Hash: a48e27458ca857e7bf1c95edfaa4f4fc3f64b4f364872359a8149092e2b898a4
              • Instruction Fuzzy Hash: 0E01FF31620220AFE7195B389E05B6B3698E710329F10863FF851F62F1EA78DC429B4C
              APIs
              • CreateDirectoryW.KERNELBASE(00437800,?), ref: 00405AED
              • GetLastError.KERNEL32 ref: 00405AFB
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: CreateDirectoryErrorLast
              • String ID:
              • API String ID: 1375471231-0
              • Opcode ID: 93d1f65b513afb97053b6d969de6af344d99c991354c8e43ed6bd2c6eb9068ab
              • Instruction ID: ed7a645988c2e2a06802fdc928ba12763e2e88a5fcf473fdfb2f1107ef0c66eb
              • Opcode Fuzzy Hash: 93d1f65b513afb97053b6d969de6af344d99c991354c8e43ed6bd2c6eb9068ab
              • Instruction Fuzzy Hash: 56F0F970D0060DDBDB00CFA4C5497DFBBB4AB04305F00812AD545B6281D7B95248CBA9
              APIs
              • GetModuleHandleA.KERNEL32(?,00000020,?,00403642,0000000C,?,?,?,?,?,?,?,?), ref: 0040695D
              • GetProcAddress.KERNEL32(00000000,?), ref: 00406978
                • Part of subcall function 004068DB: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068F2
                • Part of subcall function 004068DB: wsprintfW.USER32 ref: 0040692D
                • Part of subcall function 004068DB: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406941
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
              • String ID:
              • API String ID: 2547128583-0
              • Opcode ID: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
              • Instruction ID: ff64ee7455e026c1647d72c339307a336527f79dacb59e64982fca04d7429b22
              • Opcode Fuzzy Hash: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
              • Instruction Fuzzy Hash: 38E08673504210AFD61057705D04D27B3A89F85740302443EF946F2140DB34DC32ABA9
              APIs
              • GetFileAttributesW.KERNELBASE(00000003,004030C2,C:\Users\user\Desktop\runonce.exe,80000000,00000003), ref: 0040604B
              • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606D
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: File$AttributesCreate
              • String ID:
              • API String ID: 415043291-0
              • Opcode ID: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
              • Instruction ID: 9d50a09f5748d4f60ef03139cc16a9656d1073ae209d3065c053d14625e31d4c
              • Opcode Fuzzy Hash: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
              • Instruction Fuzzy Hash: 87D09E31654301AFEF098F20DE16F2EBAA2EB84B00F11552CB682941E0DA715819DB15
              APIs
              • GetFileAttributesW.KERNELBASE(?,?,00405C27,?,?,00000000,00405DFD,?,?,?,?), ref: 00406027
              • SetFileAttributesW.KERNELBASE(?,00000000), ref: 0040603B
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: AttributesFile
              • String ID:
              • API String ID: 3188754299-0
              • Opcode ID: bc30e5c928ed30f9cb3e730bb3a024ff28878b527ec9bdb2640fa07c227b463d
              • Instruction ID: 97cbb32404f08d1f6fed837f871d2b37f55cf766f9720be9b575451f5cdabe77
              • Opcode Fuzzy Hash: bc30e5c928ed30f9cb3e730bb3a024ff28878b527ec9bdb2640fa07c227b463d
              • Instruction Fuzzy Hash: A3D0C972504220AFC2102728AE0889BBB55EB542717028A35FCA9A22B0CB304CA68694
              APIs
              • CloseHandle.KERNEL32(FFFFFFFF,00403A82,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403B5A
              Strings
              • C:\Users\user\AppData\Local\Temp\nsjF7BA.tmp\, xrefs: 00403B6E
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: CloseHandle
              • String ID: C:\Users\user\AppData\Local\Temp\nsjF7BA.tmp\
              • API String ID: 2962429428-2104086021
              • Opcode ID: ae973bb0dca4e4815b90d97470301ae31a1ae4600fd43aa67c366af3984d4a62
              • Instruction ID: 69482a2579ef2b85c2ad9764c5c762c9eb4f19b2fcf4b87e51b14fafea8afdc0
              • Opcode Fuzzy Hash: ae973bb0dca4e4815b90d97470301ae31a1ae4600fd43aa67c366af3984d4a62
              • Instruction Fuzzy Hash: EDC0123090470496F1206F79AE8FA153A64574073DBA48726B0B8B10F3CB7C5659555D
              APIs
              • CreateDirectoryW.KERNELBASE(?,00000000,00403525,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 00405B0B
              • GetLastError.KERNEL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405B19
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: CreateDirectoryErrorLast
              • String ID:
              • API String ID: 1375471231-0
              • Opcode ID: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
              • Instruction ID: 8c4969e502f5bc4c8dfdefb7e9c2ba363b64d1215f12130c86bef4ebeef6f559
              • Opcode Fuzzy Hash: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
              • Instruction Fuzzy Hash: 19C08C30310902DACA802B209F087173960AB80340F158439A683E00B4CA30A065C92D
              APIs
              • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004034E7,00000000,00000000,0040330B,000000FF,00000004,00000000,00000000,00000000), ref: 004060DE
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: FileRead
              • String ID:
              • API String ID: 2738559852-0
              • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
              • Instruction ID: a77d82ba430c16999eb1f2306cb11816df14181100402a9e04059793f1b3015d
              • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
              • Instruction Fuzzy Hash: 21E08632150219ABCF10DF948C00EEB3B9CFF04390F018436FD11E3040D630E92197A4
              APIs
              • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040349D,00000000,0041EA20,000000FF,0041EA20,000000FF,000000FF,00000004,00000000), ref: 0040610D
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: FileWrite
              • String ID:
              • API String ID: 3934441357-0
              • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
              • Instruction ID: 78408803ccc59d93ae5352641a5e7b8f709900c8df5e8e9e13d69f82a1dcf02f
              • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
              • Instruction Fuzzy Hash: 8FE08C3220021ABBCF109E908C00EEB3FACEB003A0F014432FA26E6050D670E83097A4
              APIs
              • MessageBoxIndirectW.USER32(0040A3B0), ref: 00405C12
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: IndirectMessage
              • String ID:
              • API String ID: 1874166685-0
              • Opcode ID: 49056a94db685a7e6e8e371eb5eb9c62a0f77d6887f77aab2986bc6a9fcb55c2
              • Instruction ID: 0544aaf5cdacc2413b7ec3f635adb62dd37cf0f8c8cd843599ec734240c2006d
              • Opcode Fuzzy Hash: 49056a94db685a7e6e8e371eb5eb9c62a0f77d6887f77aab2986bc6a9fcb55c2
              • Instruction Fuzzy Hash: CAF0F2755243048FC354CF58EA597563BE1F38A320F10613EEA41A23A0C778A4A8CF4E
              APIs
              • RegOpenKeyExW.KERNELBASE(00000000,0042BA48,00000000,00000000,00000032,?,00000000,?,00406452,?,0042BA48,004326A0,004326A0,004326A0,?,00000000), ref: 004063E8
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: Open
              • String ID:
              • API String ID: 71445658-0
              • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
              • Instruction ID: e31b8ecfa4924c4a0859a1c58e61cb12282203f41ec30ad4fda9f6d7c72ae418
              • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
              • Instruction Fuzzy Hash: 68D0123200020DBBDF115E91ED01FAB3B1DAB08310F014426FE16E5091D776D570A764
              APIs
              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403247,?), ref: 004034F8
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: FilePointer
              • String ID:
              • API String ID: 973152223-0
              • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
              • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
              • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
              • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
              APIs
              • GetDlgItem.USER32(?,00000403), ref: 00405779
              • GetDlgItem.USER32(?,000003EE), ref: 00405788
              • GetClientRect.USER32(?,?), ref: 004057C5
              • GetSystemMetrics.USER32(00000002), ref: 004057CC
              • SendMessageW.USER32(?,00001061,00000000,?), ref: 004057ED
              • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004057FE
              • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405811
              • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040581F
              • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405832
              • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405854
              • ShowWindow.USER32(?,00000008), ref: 00405868
              • GetDlgItem.USER32(?,000003EC), ref: 00405889
              • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405899
              • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004058B2
              • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004058BE
              • GetDlgItem.USER32(?,000003F8), ref: 00405797
                • Part of subcall function 0040450B: SendMessageW.USER32(00000028,?,00000001,00404336), ref: 00404519
              • GetDlgItem.USER32(?,000003EC), ref: 004058DB
              • CreateThread.KERNEL32(00000000,00000000,Function_000056AF,00000000), ref: 004058E9
              • CloseHandle.KERNEL32(00000000), ref: 004058F0
              • ShowWindow.USER32(00000000), ref: 00405914
              • ShowWindow.USER32(?,00000008), ref: 00405919
              • ShowWindow.USER32(00000008), ref: 00405963
              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405997
              • CreatePopupMenu.USER32 ref: 004059A8
              • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004059BC
              • GetWindowRect.USER32(?,?), ref: 004059DC
              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004059F5
              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A2D
              • OpenClipboard.USER32(00000000), ref: 00405A3D
              • EmptyClipboard.USER32 ref: 00405A43
              • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405A4F
              • GlobalLock.KERNEL32(00000000), ref: 00405A59
              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A6D
              • GlobalUnlock.KERNEL32(00000000), ref: 00405A8D
              • SetClipboardData.USER32(0000000D,00000000), ref: 00405A98
              • CloseClipboard.USER32 ref: 00405A9E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
              • String ID: {
              • API String ID: 590372296-366298937
              • Opcode ID: 6951b3530aa72caf7521df0bf8db88f5d1408e2bb92485539c1303395de87c8c
              • Instruction ID: 234ab3d0ec1f6487b719ed7b99e1d6b4405f443d9e8d78e252fa94ab3ac4d3a1
              • Opcode Fuzzy Hash: 6951b3530aa72caf7521df0bf8db88f5d1408e2bb92485539c1303395de87c8c
              • Instruction Fuzzy Hash: 34B139B1900608FFDB11AF60DD89AAE7B79FB48355F00813AFA41BA1A0C7785A51DF58
              APIs
              • GetDlgItem.USER32(?,000003FB), ref: 00404A16
              • SetWindowTextW.USER32(00000000,?), ref: 00404A40
              • SHBrowseForFolderW.SHELL32(?), ref: 00404AF1
              • CoTaskMemFree.OLE32(00000000), ref: 00404AFC
              • lstrcmpiW.KERNEL32(004326A0,0042CA68,00000000,?,?), ref: 00404B2E
              • lstrcatW.KERNEL32(?,004326A0), ref: 00404B3A
              • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404B4C
                • Part of subcall function 00405B9B: GetDlgItemTextW.USER32(?,?,00000400,00404B83), ref: 00405BAE
                • Part of subcall function 00406805: CharNextW.USER32(?,*?|<>/":,00000000,0043F000,75923420,C:\Users\user\AppData\Local\Temp\,00000000,0040350D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 00406868
                • Part of subcall function 00406805: CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00406877
                • Part of subcall function 00406805: CharNextW.USER32(?,0043F000,75923420,C:\Users\user\AppData\Local\Temp\,00000000,0040350D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 0040687C
                • Part of subcall function 00406805: CharPrevW.USER32(?,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000,0040350D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 0040688F
              • GetDiskFreeSpaceW.KERNEL32(0042AA38,?,?,0000040F,?,0042AA38,0042AA38,?,00000001,0042AA38,?,?,000003FB,?), ref: 00404C0F
              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404C2A
                • Part of subcall function 00404D83: lstrlenW.KERNEL32(0042CA68,0042CA68,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404E24
                • Part of subcall function 00404D83: wsprintfW.USER32 ref: 00404E2D
                • Part of subcall function 00404D83: SetDlgItemTextW.USER32(?,0042CA68), ref: 00404E40
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
              • String ID: A
              • API String ID: 2624150263-3554254475
              • Opcode ID: aab1ff152b07609d5ccd452d97b16b322b3ddb3b1e57e49f69f3ed37cd316d4d
              • Instruction ID: 8a45afd3ee22384d80319c7ed67abe130e578f1d2b392c1e8909742cb30e522b
              • Opcode Fuzzy Hash: aab1ff152b07609d5ccd452d97b16b322b3ddb3b1e57e49f69f3ed37cd316d4d
              • Instruction Fuzzy Hash: FCA192B1900208ABDB11EFA5DD45BAFB7B8EF84314F11803BF611B62D1D77C9A418B69
              APIs
              • CoCreateInstance.OLE32(004085E8,?,00000001,004085D8,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040222E
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: CreateInstance
              • String ID:
              • API String ID: 542301482-0
              • Opcode ID: 54fcaebf65a6d80a769d2ffe25eeb1568fba929b3fba522b5b89cb6b807999ae
              • Instruction ID: f0c409d0c9855dc16f3492d495f607d4fcaf843261c47ee8c1995525671fe781
              • Opcode Fuzzy Hash: 54fcaebf65a6d80a769d2ffe25eeb1568fba929b3fba522b5b89cb6b807999ae
              • Instruction Fuzzy Hash: 76411471A00208AFCB40DFE4C989EAD7BB5FF48308B20457AF515EB2D1DB799982CB54
              APIs
              • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291F
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: FileFindFirst
              • String ID:
              • API String ID: 1974802433-0
              • Opcode ID: f7eec81d6910abfa52e209e80917fba1586809f9bcb970d7ef1d97902b1d379f
              • Instruction ID: 4f8030157269cd498ea314d5a86e386b0cfb994e1dea9c94a4400a3869289cfc
              • Opcode Fuzzy Hash: f7eec81d6910abfa52e209e80917fba1586809f9bcb970d7ef1d97902b1d379f
              • Instruction Fuzzy Hash: 17F08C71A04104AAD701EBE4EE499AEB378EF14324F60457BE102F31E0DBB85E159B2A
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ca9fc840679c4677ea5dd763a2b97f011fd48deb17cd4c9d43ec117c62889360
              • Instruction ID: a5eb8001d75a17d38d83411349fde439c8a9064fda1b18d7f978e280ae41e255
              • Opcode Fuzzy Hash: ca9fc840679c4677ea5dd763a2b97f011fd48deb17cd4c9d43ec117c62889360
              • Instruction Fuzzy Hash: ACE19C71A04709DFCB24CF58C880BAABBF1FF45305F15852EE496A72D1E378AA51CB05
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5db23d3e625216a1972a1fea7a98b9ee98c1df0b240da8e2d6c4f39054d3f9c6
              • Instruction ID: e409ec8ffb443055957628c835c79614664982182129ebc37b3e11cb9bcd83e5
              • Opcode Fuzzy Hash: 5db23d3e625216a1972a1fea7a98b9ee98c1df0b240da8e2d6c4f39054d3f9c6
              • Instruction Fuzzy Hash: ECC14772E04219CBCF18CF68C4905EEBBB2BF98354F25866AD85677380D7346942CF95
              APIs
              • GetDlgItem.USER32(?,000003F9), ref: 00404F5B
              • GetDlgItem.USER32(?,00000408), ref: 00404F66
              • GlobalAlloc.KERNEL32(00000040,?), ref: 00404FB0
              • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404FC7
              • SetWindowLongW.USER32(?,000000FC,00405550), ref: 00404FE0
              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404FF4
              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00405006
              • SendMessageW.USER32(?,00001109,00000002), ref: 0040501C
              • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405028
              • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 0040503A
              • DeleteObject.GDI32(00000000), ref: 0040503D
              • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405068
              • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405074
              • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040510F
              • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040513F
                • Part of subcall function 0040450B: SendMessageW.USER32(00000028,?,00000001,00404336), ref: 00404519
              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405153
              • GetWindowLongW.USER32(?,000000F0), ref: 00405181
              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0040518F
              • ShowWindow.USER32(?,00000005), ref: 0040519F
              • SendMessageW.USER32(?,00000419,00000000,?), ref: 0040529A
              • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004052FF
              • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405314
              • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405338
              • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405358
              • ImageList_Destroy.COMCTL32(?), ref: 0040536D
              • GlobalFree.KERNEL32(?), ref: 0040537D
              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004053F6
              • SendMessageW.USER32(?,00001102,?,?), ref: 0040549F
              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004054AE
              • InvalidateRect.USER32(?,00000000,00000001), ref: 004054D9
              • ShowWindow.USER32(?,00000000), ref: 00405527
              • GetDlgItem.USER32(?,000003FE), ref: 00405532
              • ShowWindow.USER32(00000000), ref: 00405539
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
              • String ID: $M$N
              • API String ID: 2564846305-813528018
              • Opcode ID: 14683326fe5d0e21a3b01d942e888f99a0d9647cceadcd168bf81575faddcc86
              • Instruction ID: 91097811874ce85ba3cc7540bcf7dd58db25a3d6f071223140e4d1ec27d7ea12
              • Opcode Fuzzy Hash: 14683326fe5d0e21a3b01d942e888f99a0d9647cceadcd168bf81575faddcc86
              • Instruction Fuzzy Hash: 6C029C70900608AFDF20DF94DD85AAF7BB5FB85314F10817AE611BA2E1D7798A41CF58
              APIs
              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00404013
              • ShowWindow.USER32(?), ref: 00404033
              • GetWindowLongW.USER32(?,000000F0), ref: 00404045
              • ShowWindow.USER32(?,00000004), ref: 0040405E
              • DestroyWindow.USER32 ref: 00404072
              • SetWindowLongW.USER32(?,00000000,00000000), ref: 0040408B
              • GetDlgItem.USER32(?,?), ref: 004040AA
              • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004040BE
              • IsWindowEnabled.USER32(00000000), ref: 004040C5
              • GetDlgItem.USER32(?,00000001), ref: 00404170
              • GetDlgItem.USER32(?,00000002), ref: 0040417A
              • SetClassLongW.USER32(?,000000F2,?), ref: 00404194
              • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004041E5
              • GetDlgItem.USER32(?,00000003), ref: 0040428B
              • ShowWindow.USER32(00000000,?), ref: 004042AC
              • EnableWindow.USER32(?,?), ref: 004042BE
              • EnableWindow.USER32(?,?), ref: 004042D9
              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004042EF
              • EnableMenuItem.USER32(00000000), ref: 004042F6
              • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040430E
              • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00404321
              • lstrlenW.KERNEL32(0042CA68,?,0042CA68,00000000), ref: 0040434B
              • SetWindowTextW.USER32(?,0042CA68), ref: 0040435F
              • ShowWindow.USER32(?,0000000A), ref: 00404493
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
              • String ID:
              • API String ID: 1860320154-0
              • Opcode ID: df8d1fa02ff149c62ea57a685de79d9d3ef227f732b6982a07419eaff96d62a7
              • Instruction ID: 911e0a6aef898d83942fe666095560f38e6effa11f08765efd6836b1f10f2e9c
              • Opcode Fuzzy Hash: df8d1fa02ff149c62ea57a685de79d9d3ef227f732b6982a07419eaff96d62a7
              • Instruction Fuzzy Hash: 29C1B0B1500204BBDB206F61EE89A2B3A68FB85756F01053EF781B51F0CB3958929B2D
              APIs
              • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404733
              • GetDlgItem.USER32(?,000003E8), ref: 00404747
              • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404764
              • GetSysColor.USER32(?), ref: 00404775
              • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404783
              • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404791
              • lstrlenW.KERNEL32(?), ref: 00404796
              • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004047A3
              • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004047B8
              • GetDlgItem.USER32(?,0000040A), ref: 00404811
              • SendMessageW.USER32(00000000), ref: 00404818
              • GetDlgItem.USER32(?,000003E8), ref: 00404843
              • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404886
              • LoadCursorW.USER32(00000000,00007F02), ref: 00404894
              • SetCursor.USER32(00000000), ref: 00404897
              • LoadCursorW.USER32(00000000,00007F00), ref: 004048B0
              • SetCursor.USER32(00000000), ref: 004048B3
              • SendMessageW.USER32(00000111,00000001,00000000), ref: 004048E2
              • SendMessageW.USER32(00000010,00000000,00000000), ref: 004048F4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
              • String ID: N
              • API String ID: 3103080414-1130791706
              • Opcode ID: 04e13e5971a3aaf2d7c3f6bec99ed017c89c89abbf6057be99a5caf0d4384f9a
              • Instruction ID: 3ad42440e7936429012ccc374b67200ab01768f99e4ad58672f49272ac14a637
              • Opcode Fuzzy Hash: 04e13e5971a3aaf2d7c3f6bec99ed017c89c89abbf6057be99a5caf0d4384f9a
              • Instruction Fuzzy Hash: 2E6181B1900209BFDB10AF60DD85EAA7B69FB84315F00853AFA05B62D0C779A951DF98
              APIs
              • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
              • BeginPaint.USER32(?,?), ref: 00401047
              • GetClientRect.USER32(?,?), ref: 0040105B
              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
              • DeleteObject.GDI32(?), ref: 004010ED
              • CreateFontIndirectW.GDI32(?), ref: 00401105
              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
              • SelectObject.GDI32(00000000,?), ref: 00401140
              • DrawTextW.USER32(00000000,00433700,000000FF,00000010,00000820), ref: 00401156
              • SelectObject.GDI32(00000000,00000000), ref: 00401160
              • DeleteObject.GDI32(?), ref: 00401165
              • EndPaint.USER32(?,?), ref: 0040116E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
              • String ID: F
              • API String ID: 941294808-1304234792
              • Opcode ID: f8b3db801d2c504d9e2de6f85bac4b8fdc05036872983a9c428bf394377a2a15
              • Instruction ID: eca0ad76d85821e0a7fbe67f508e5060b260b918cc65b70bf06bca200ae74670
              • Opcode Fuzzy Hash: f8b3db801d2c504d9e2de6f85bac4b8fdc05036872983a9c428bf394377a2a15
              • Instruction Fuzzy Hash: 2F418B71800209AFCB058FA5DE459AFBFB9FF45314F00802EF591AA1A0C738EA54DFA4
              APIs
              • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406338,?,?), ref: 004061D8
              • GetShortPathNameW.KERNEL32(?,00430108,00000400), ref: 004061E1
                • Part of subcall function 00405FAC: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406291,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FBC
                • Part of subcall function 00405FAC: lstrlenA.KERNEL32(00000000,?,00000000,00406291,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FEE
              • GetShortPathNameW.KERNEL32(?,00430908,00000400), ref: 004061FE
              • wsprintfA.USER32 ref: 0040621C
              • GetFileSize.KERNEL32(00000000,00000000,00430908,C0000000,00000004,00430908,?,?,?,?,?), ref: 00406257
              • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406266
              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 0040629E
              • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,0042FD08,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062F4
              • GlobalFree.KERNEL32(00000000), ref: 00406305
              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0040630C
                • Part of subcall function 00406047: GetFileAttributesW.KERNELBASE(00000003,004030C2,C:\Users\user\Desktop\runonce.exe,80000000,00000003), ref: 0040604B
                • Part of subcall function 00406047: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
              • String ID: %ls=%ls$[Rename]
              • API String ID: 2171350718-461813615
              • Opcode ID: 7d01897451b1442b79f1fbad31b5db9882c2a06ae1a72dd2fb598b53c99231a5
              • Instruction ID: 2f157a22eecee44515c187ff3daf75b9e7e255f904fde787f0dd9ddf92a1116e
              • Opcode Fuzzy Hash: 7d01897451b1442b79f1fbad31b5db9882c2a06ae1a72dd2fb598b53c99231a5
              • Instruction Fuzzy Hash: C9312271200315BBD2206B619D49F2B3A5CEF85718F16043EFD42FA2C2DB7D99258ABD
              APIs
              • GetSystemDirectoryW.KERNEL32(004326A0,00000400), ref: 004066B6
              • GetWindowsDirectoryW.KERNEL32(004326A0,00000400,00000000,0042BA48,?,?,00000000,00000000,?,759223A0), ref: 004066CC
              • SHGetPathFromIDListW.SHELL32(00000000,004326A0), ref: 0040672A
              • CoTaskMemFree.OLE32(00000000,?,00000000,00000007), ref: 00406733
              • lstrcatW.KERNEL32(004326A0,\Microsoft\Internet Explorer\Quick Launch,00000000,0042BA48,?,?,00000000,00000000,?,759223A0), ref: 0040675E
              • lstrlenW.KERNEL32(004326A0,00000000,0042BA48,?,?,00000000,00000000,?,759223A0), ref: 004067B8
              Strings
              • Software\Microsoft\Windows\CurrentVersion, xrefs: 00406687
              • \Microsoft\Internet Explorer\Quick Launch, xrefs: 00406758
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
              • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
              • API String ID: 4024019347-730719616
              • Opcode ID: 2066e1c471d7490a15c1c198898eb18b068b97d6eda6cad4e7272ae8e9db0920
              • Instruction ID: fc62ecdfc612bfadb4c03fc2fb2820e4449372332e166df7cb208319b666a0da
              • Opcode Fuzzy Hash: 2066e1c471d7490a15c1c198898eb18b068b97d6eda6cad4e7272ae8e9db0920
              • Instruction Fuzzy Hash: 7D612571A046009BD720AF24DD84B6A76E8EF95328F16053FF643B32D0DB7C9961875E
              APIs
              • GetWindowLongW.USER32(?,000000EB), ref: 0040455A
              • GetSysColor.USER32(00000000), ref: 00404598
              • SetTextColor.GDI32(?,00000000), ref: 004045A4
              • SetBkMode.GDI32(?,?), ref: 004045B0
              • GetSysColor.USER32(?), ref: 004045C3
              • SetBkColor.GDI32(?,?), ref: 004045D3
              • DeleteObject.GDI32(?), ref: 004045ED
              • CreateBrushIndirect.GDI32(?), ref: 004045F7
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
              • String ID:
              • API String ID: 2320649405-0
              • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
              • Instruction ID: 069c4eaec478219780f05c004fc5973679282d3c2eb16bc8cec9dcb23997e36d
              • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
              • Instruction Fuzzy Hash: 592151B1500704ABCB20DF68DE08A5B7BF8AF41714B05892EEA96A22E0D739E944CF54
              APIs
              • ReadFile.KERNEL32(?,?,?,?), ref: 0040275D
              • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402798
              • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027BB
              • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027D1
                • Part of subcall function 00406128: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 0040613E
              • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040287D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: File$Pointer$ByteCharMultiWide$Read
              • String ID: 9
              • API String ID: 163830602-2366072709
              • Opcode ID: 6186ba75392568282b6731289b87e01334a0414050beb0dbbc28c320faadcf08
              • Instruction ID: e892b7cb172a86a35cdf2d5061c859a119b49b65f2ae0b0c69c9b35c58dd84de
              • Opcode Fuzzy Hash: 6186ba75392568282b6731289b87e01334a0414050beb0dbbc28c320faadcf08
              • Instruction Fuzzy Hash: F151FB75D0411AABDF24DFD4CA85AAEBBB9FF04344F10817BE901B62D0D7B49D828B58
              APIs
              • lstrlenW.KERNEL32(0042BA48,00000000,?,759223A0,?,?,?,?,?,?,?,?,?,0040341D,00000000,?), ref: 00405614
              • lstrlenW.KERNEL32(0040341D,0042BA48,00000000,?,759223A0,?,?,?,?,?,?,?,?,?,0040341D,00000000), ref: 00405624
              • lstrcatW.KERNEL32(0042BA48,0040341D,0040341D,0042BA48,00000000,?,759223A0), ref: 00405637
              • SetWindowTextW.USER32(0042BA48,0042BA48), ref: 00405649
              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566F
              • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405689
              • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405697
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: MessageSend$lstrlen$TextWindowlstrcat
              • String ID:
              • API String ID: 2531174081-0
              • Opcode ID: 7a9b63bfacfea3e7ee08c26d0c930c27eafc8712a75251909ef17a9a102c325c
              • Instruction ID: 906fe2e33ec339045028823105f1a28636d6cdc7c4a53a0106b9bb612f22f5f3
              • Opcode Fuzzy Hash: 7a9b63bfacfea3e7ee08c26d0c930c27eafc8712a75251909ef17a9a102c325c
              • Instruction Fuzzy Hash: 9121A171900158BACB119F65DD449CFBFB4EF45350F50843AF508B62A0C3794A50CFA8
              APIs
              • CharNextW.USER32(?,*?|<>/":,00000000,0043F000,75923420,C:\Users\user\AppData\Local\Temp\,00000000,0040350D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 00406868
              • CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00406877
              • CharNextW.USER32(?,0043F000,75923420,C:\Users\user\AppData\Local\Temp\,00000000,0040350D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 0040687C
              • CharPrevW.USER32(?,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000,0040350D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 0040688F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: Char$Next$Prev
              • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\
              • API String ID: 589700163-1201062745
              • Opcode ID: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
              • Instruction ID: fa9c0ef9ae643832d728fa0671e6943ea0b093c18f887e6db6f7fe1f852dcfd9
              • Opcode Fuzzy Hash: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
              • Instruction Fuzzy Hash: F111932780221299DB303B148C40E7766E8AF54794F52C43FED8A722C0F77C4C9286AD
              APIs
              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404EAC
              • GetMessagePos.USER32 ref: 00404EB4
              • ScreenToClient.USER32(?,?), ref: 00404ECE
              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404EE0
              • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404F06
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: Message$Send$ClientScreen
              • String ID: f
              • API String ID: 41195575-1993550816
              • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
              • Instruction ID: eb967d7d92909976ed67768bbc6bf91133f1097352fa1b537f2083fc5134d3bd
              • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
              • Instruction Fuzzy Hash: AB019E71900219BADB00DB94DD81FFEBBBCAF95710F10412BFB11B61C0C7B4AA018BA4
              APIs
              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB6
              • MulDiv.KERNEL32(026F3CD2,00000064,?), ref: 00402FE1
              • wsprintfW.USER32 ref: 00402FF1
              • SetWindowTextW.USER32(?,?), ref: 00403001
              • SetDlgItemTextW.USER32(?,00000406,?), ref: 00403013
              Strings
              • verifying installer: %d%%, xrefs: 00402FEB
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: Text$ItemTimerWindowwsprintf
              • String ID: verifying installer: %d%%
              • API String ID: 1451636040-82062127
              • Opcode ID: 492ce7ecf44becc2b6f328ccb1258d65c9f2870c51930cf6044baf7ee7e6d13e
              • Instruction ID: b4a4546c530c1255e03538258eeb387f0310dfe45b0532776fb26864182fd6cc
              • Opcode Fuzzy Hash: 492ce7ecf44becc2b6f328ccb1258d65c9f2870c51930cf6044baf7ee7e6d13e
              • Instruction Fuzzy Hash: 8D014F71640208BBEF209F60DE49FEE3B79AB04344F108039FA02B91D0DBB99A559B59
              APIs
              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B6
              • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029D2
              • GlobalFree.KERNEL32(?), ref: 00402A0B
              • GlobalFree.KERNEL32(00000000), ref: 00402A1E
              • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A3A
              • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A4D
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: Global$AllocFree$CloseDeleteFileHandle
              • String ID:
              • API String ID: 2667972263-0
              • Opcode ID: 67fe96262b9617a6657bb77028f4b0069242132a66e071a854657c6cce135934
              • Instruction ID: 9240dae09012554c896714223f9a1d047de53ad28ef79bac3653223f28d0231c
              • Opcode Fuzzy Hash: 67fe96262b9617a6657bb77028f4b0069242132a66e071a854657c6cce135934
              • Instruction Fuzzy Hash: 3931AD71D00124BBCF21AFA5CE89D9E7E79AF49324F10423AF521762E1CB794D419BA8
              APIs
              • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402F02
              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F4E
              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F57
              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F6E
              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F79
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: CloseEnum$DeleteValue
              • String ID:
              • API String ID: 1354259210-0
              • Opcode ID: d4675444f2d34e761c1d250a7f981306a9f7540a76c819169e3a9c2f75ea5dca
              • Instruction ID: 7c59605d0ca35e0e1f1170af87acd2d95b5481229a772e02f8b12e0d157fbf49
              • Opcode Fuzzy Hash: d4675444f2d34e761c1d250a7f981306a9f7540a76c819169e3a9c2f75ea5dca
              • Instruction Fuzzy Hash: 2A216B7150010ABFDF119F90CE89EEF7B7DEB54398F100076B949B21E0D7B49E54AA68
              APIs
              • GetDlgItem.USER32(?,?), ref: 00401D9F
              • GetClientRect.USER32(?,?), ref: 00401DEA
              • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E1A
              • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E2E
              • DeleteObject.GDI32(00000000), ref: 00401E3E
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
              • String ID:
              • API String ID: 1849352358-0
              • Opcode ID: 5a50ccc3029d5fde6ea81844b1e337cdf63f6177f9f2d7308e11f2af529302b6
              • Instruction ID: ff9804e90d7d2423da96771145ec8c84d1acc30631874d8c14b803c0354ed8c3
              • Opcode Fuzzy Hash: 5a50ccc3029d5fde6ea81844b1e337cdf63f6177f9f2d7308e11f2af529302b6
              • Instruction Fuzzy Hash: 73210772900119AFCB05DF98EE45AEEBBB5EF08314F14003AF945F62A0D7789D81DB98
              APIs
              • GetDC.USER32(?), ref: 00401E56
              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E70
              • MulDiv.KERNEL32(00000000,00000000), ref: 00401E78
              • ReleaseDC.USER32(?,00000000), ref: 00401E89
              • CreateFontIndirectW.GDI32(0040CDF0), ref: 00401ED8
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: CapsCreateDeviceFontIndirectRelease
              • String ID:
              • API String ID: 3808545654-0
              • Opcode ID: ecb0f290f5c1122776e84f7afc2181d255ab8ed52f1adad26d3dddab1dbe2d45
              • Instruction ID: a825ad976d3f878f3d1ae6f085165680ecf176d60430839047bda31eedf7821d
              • Opcode Fuzzy Hash: ecb0f290f5c1122776e84f7afc2181d255ab8ed52f1adad26d3dddab1dbe2d45
              • Instruction Fuzzy Hash: 62017571905240EFE7005BB4EE49BDD3FA4AB15301F10867AF541B61E2C7B904458BED
              APIs
              • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB8
              • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CD0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: MessageSend$Timeout
              • String ID: !
              • API String ID: 1777923405-2657877971
              • Opcode ID: 069d8cd0b50c9c3d23d30c496d0653b5436aef65d2998253063e1abfe41eec6a
              • Instruction ID: 3d1946e732457e70d46414fe723373bc78a31951f468440fe5e33f287296c6aa
              • Opcode Fuzzy Hash: 069d8cd0b50c9c3d23d30c496d0653b5436aef65d2998253063e1abfe41eec6a
              • Instruction Fuzzy Hash: BC21AD71D1421AAFEB05AFA4D94AAFE7BB0EF84304F10453EF601B61D0D7B84941DB98
              APIs
              • lstrlenW.KERNEL32(0042CA68,0042CA68,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404E24
              • wsprintfW.USER32 ref: 00404E2D
              • SetDlgItemTextW.USER32(?,0042CA68), ref: 00404E40
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: ItemTextlstrlenwsprintf
              • String ID: %u.%u%s%s
              • API String ID: 3540041739-3551169577
              • Opcode ID: 2c674a3dc48973326ebd454f1002488dce618ddc5f98b18a2ee0300ee1e706a4
              • Instruction ID: 0fe25742dfe6cfa92c38baccc724587d3b65f537d6828788df476db8ac6fa50e
              • Opcode Fuzzy Hash: 2c674a3dc48973326ebd454f1002488dce618ddc5f98b18a2ee0300ee1e706a4
              • Instruction Fuzzy Hash: B111EB336042283BDB109A6DAC45E9E329CDF85374F250237FA65F71D1E978DC2282E8
              APIs
              • lstrlenW.KERNEL32(NNLSG,00000023,00000011,00000002), ref: 004024DA
              • RegSetValueExW.ADVAPI32(?,?,?,?,NNLSG,00000000,00000011,00000002), ref: 0040251A
              • RegCloseKey.ADVAPI32(?,?,?,NNLSG,00000000,00000011,00000002), ref: 00402602
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: CloseValuelstrlen
              • String ID: NNLSG
              • API String ID: 2655323295-1518637115
              • Opcode ID: a41cb6f13485af1a9ec10d2b5ae98035f7e48eaeb505393f7ac1ad9e88c8f9fe
              • Instruction ID: e3d4462d3b771ebaa4f16124ca1672ddbf53c4078f16fd27a1e0ad00bfdc49f7
              • Opcode Fuzzy Hash: a41cb6f13485af1a9ec10d2b5ae98035f7e48eaeb505393f7ac1ad9e88c8f9fe
              • Instruction Fuzzy Hash: 8B117F31900118BEEB10EFA5DE59EAEBAB4EF54358F11443FF504B71C1D7B88E419A58
              APIs
              • CharNextW.USER32(?,?,C:\,?,00405F45,C:\,C:\,75923420,?,C:\Users\user\AppData\Local\Temp\,00405C83,?,75923420,C:\Users\user\AppData\Local\Temp\,0043F000), ref: 00405EDF
              • CharNextW.USER32(00000000), ref: 00405EE4
              • CharNextW.USER32(00000000), ref: 00405EFC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: CharNext
              • String ID: C:\
              • API String ID: 3213498283-3404278061
              • Opcode ID: a019630038ff328a8ec37a6ad8a5e0fa1ea3fa9b42c133706ff5938ffc5cdd25
              • Instruction ID: 143c5bdbadb979d876a68ad22b5e9fde56015454fa81a7c55dbcd1e73dec783f
              • Opcode Fuzzy Hash: a019630038ff328a8ec37a6ad8a5e0fa1ea3fa9b42c133706ff5938ffc5cdd25
              • Instruction Fuzzy Hash: 03F09072D04A2395DB317B649C45B7756BCEB587A0B54843BE601F72C0DBBC48818ADA
              APIs
              • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040351F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 00405E2C
              • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040351F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 00405E36
              • lstrcatW.KERNEL32(?,0040A014,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405E48
              Strings
              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405E26
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: CharPrevlstrcatlstrlen
              • String ID: C:\Users\user\AppData\Local\Temp\
              • API String ID: 2659869361-823278215
              • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
              • Instruction ID: dcb1dcffde27bcde4b46a4bd7655c85b8e924b1ae314dab144fc932f30a80b76
              • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
              • Instruction Fuzzy Hash: 9DD0A731501534BAC212AB54AD04DDF62AC9F46344381443BF141B30A5C77C5D51D7FD
              APIs
              • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsjF7BA.tmp\LogEx.dll), ref: 0040269A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: lstrlen
              • String ID: C:\Users\user\AppData\Local\Temp\nsjF7BA.tmp\LogEx.dll$NNLSG
              • API String ID: 1659193697-2410854125
              • Opcode ID: 36d8dbc523c0472d64c73d4eff13f49a76aa2362c52378c6c93c1f1da3cddc08
              • Instruction ID: 71653ae2733df7adc71dfdbaa34589fb2472b89c06e6b839d1f3baa03dac964a
              • Opcode Fuzzy Hash: 36d8dbc523c0472d64c73d4eff13f49a76aa2362c52378c6c93c1f1da3cddc08
              • Instruction Fuzzy Hash: E011E772A40205BBCB00ABB19E56AAE7671AF50748F21443FF402B71C1EAFD4891565E
              APIs
              • DestroyWindow.USER32(?,00000000,004031FC,00000001), ref: 00403031
              • GetTickCount.KERNEL32 ref: 0040304F
              • CreateDialogParamW.USER32(0000006F,00000000,00402F98,00000000), ref: 0040306C
              • ShowWindow.USER32(00000000,00000005), ref: 0040307A
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: Window$CountCreateDestroyDialogParamShowTick
              • String ID:
              • API String ID: 2102729457-0
              • Opcode ID: 3e0f77edca3fe8d4731edd858be8c75d6ac57a75eac47466490e255ad15c8a0f
              • Instruction ID: 9291db8f65f8f9a8906298ccab22143765a9ea5c3e1cf5a275661437a5304794
              • Opcode Fuzzy Hash: 3e0f77edca3fe8d4731edd858be8c75d6ac57a75eac47466490e255ad15c8a0f
              • Instruction Fuzzy Hash: 22F08970602A21AFC6306F50FE09A9B7F68FB45B52B51053AF445B11ACCB345C91CB9D
              APIs
              • IsWindowVisible.USER32(?), ref: 0040557F
              • CallWindowProcW.USER32(?,?,?,?), ref: 004055D0
                • Part of subcall function 00404522: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404534
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: Window$CallMessageProcSendVisible
              • String ID:
              • API String ID: 3748168415-3916222277
              • Opcode ID: 831ed5cf29225e66f7bf56ab76169cd98d2ca93c2364028159cf8fc7ca140134
              • Instruction ID: 994decb8795c597c60d879b60f38f30bda4d2919c1ffc13ce94f3a2918c86729
              • Opcode Fuzzy Hash: 831ed5cf29225e66f7bf56ab76169cd98d2ca93c2364028159cf8fc7ca140134
              • Instruction Fuzzy Hash: 1C01717120060CBFEF219F11DD84A9B3B67EB84794F144037FA41761D5C7398D529A6D
              APIs
              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406291,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FBC
              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405FD4
              • CharNextA.USER32(00000000,?,00000000,00406291,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FE5
              • lstrlenA.KERNEL32(00000000,?,00000000,00406291,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FEE
              Memory Dump Source
              • Source File: 00000000.00000002.2118094318.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2118077558.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118111962.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118129105.0000000000441000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2118228725.00000000004AD000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_runonce.jbxd
              Similarity
              • API ID: lstrlen$CharNextlstrcmpi
              • String ID:
              • API String ID: 190613189-0
              • Opcode ID: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
              • Instruction ID: e9567a821587a5f0376c4e2be66d4cfc8c6f540c5076303c4651ac02cb4e93c6
              • Opcode Fuzzy Hash: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
              • Instruction Fuzzy Hash: E1F09631105519FFC7029FA5DE00D9FBBA8EF05350B2540B9F840F7250D678DE01AB69